Skip to main content

Files as UI

Files as UI vs API -  compares attributes of iCloud vs Dropbox. It starts on an interesting note - the model of a file system in the UI is dying, and should be let go. Beyond that it looks at mappings of each system to a file system from an API point of view and compares the successes of each.

I find the initial thread the most interesting. Drop the mental model of a file system - which maps virtual concepts of files and directories to a physical model of papers, folders and file cabinets - and replace it with...what? This is a paradigm shift for me.

I have to admit, I loath, hate, nay, despise looking for things. If I can't find something easily, it's only about a minute before I start growling and muttering things my mother would disapprove of. On this basis, I like the idea that I can save myself from thinking about where to put things or, where I have already put them. But how do we do this? It's non-trivial, since humans think of "things" and once they think of a thing, it's place is a very closely associated and implicit property of an object. Look at the definition of a Uniform Resource Identifier (URI) - it's built in part upon the URL - Uniform Resource Location.

An obvious approach is to focus on applications - tools - that hide the details of a file system from you? That's not too hard to imagine, but is that a paradigm shift? And is it a strong enough model to prevent "fraying" at the edges, where every once in a while, for edge use cases, you need to think about where your stuff is?

What about "things" (formerly called "files", "data", etc.) having names, which don't include any "where" type information. It's all "what" and "how". An object has a name, and perhaps the name includes information on the type of thing it is. The how information is "Is this backed up?", "Is this available from any device or just one?", "Is this private, really private or public?"


Comments

BenJammin' said…
I'll start this by saying that the comment box, when accessed from my phone, provides autocorrect solutions regarding my address and phone number; weird. Anyway, I think I might have an argument in favor of keeping the location-based paradigm. It has less to do with the technology, and more to do with us. Given the staggering amount of things I may or may not have to remember that are on my computer, I often find I can't even think of the name of what I'm looking for until I've navigated to the place where I know I can find it. Location has a very strong foot in human memory; I would be interested to know what system could replace filling in terms of it's ability to interface with the way we naturally structure our thinking
BenJammin' said…
I'll start this by saying that the comment box, when accessed from my phone, provides autocorrect solutions regarding my address and phone number; weird. Anyway, I think I might have an argument in favor of keeping the location-based paradigm. It has less to do with the technology, and more to do with us. Given the staggering amount of things I may or may not have to remember that are on my computer, I often find I can't even think of the name of what I'm looking for until I've navigated to the place where I know I can find it. Location has a very strong foot in human memory; I would be interested to know what system could replace filling in terms of it's ability to interface with the way we naturally structure our thinking

Popular posts from this blog

You don't really know who you're talking to online...

The following is a story that I think highlights the assumptions that get you into trouble online... https://www.proofpoint.com/us/blog/threat-insight/i-knew-you-were-trouble-ta456-targets-defense-contractor-alluring-social-media This is particularly scary since we found so much utility in online connections during the pandemic and out of necessity, started trusting more online. Please note the timeline for this breach - it was a long, slow process, a key factor in many 'cons'. "Build trust" is a key first step, once someone has identified you as a party. You think...you're convinced you know who your talking to, but if you don't triangulate the identity with some non-online, ideally in-person information, you shouldn't trust. And even if you do get what seems like real-life confirmations of identity, you must look at questioning motives, needs, and keeping danger at arms-length. Online includes email, texting (sms), application chatbots, voice communicati...

Threat Modeling Manifesto

Secure Your Code with Threat Modeling As a software developer, security should be a top priority. By proactively identifying and addressing potential vulnerabilities, you can significantly reduce the risk of breaches and data loss. What is Threat Modeling?   Threat modeling is a systematic approach to identifying, assessing, and mitigating security threats. It involves looking at your system from a hacker's perspective to uncover weaknesses and devise strategies to protect against attacks. See the  OWASP Cheat Sheet   Why is Threat Modeling Important? Proactive Security: By anticipating potential threats, you can take steps to prevent them. Risk Mitigation: Identify and address vulnerabilities before they can be exploited. Regulatory Compliance: Adhere to industry standards and regulations. Enhanced Security Posture: Strengthen your overall security posture. How to Get Started with Threat Modeling   The Threat Modeling Manifesto provides a valuable framewor...

Where threat modeling can shine - an example from the EU MDCG-2019

From the  EU  MDCG 2019-16 Guidance on Cybersecurity for medical devices, December 2019 , this is the guidance on foreseeable risks.  Medical device manufacturers should ensure that a medical device is designed and manufactured in a way that ensures that the risks associated with reasonably foreseeable environmental conditions are removed or minimised. This may include the infield monitoring of the software’s vulnerabilities and the possibility to perform a device update (outside the context of a field safety corrective action) through, for example delivering patches to ensure the continued security of the device. During the risk management process, the manufacturer should foresee or evaluate the potential exploitation of those vulnerabilities that may be a result of reasonably foreseeable misuse. This, however, may depend on the specific situation. For example, using an unsecured memory-stick to enter data into a medical IT system can be considered “reasonably foreseeabl...