Premium Essay

A Man-Machine Interface

In: Science

Submitted By alhaines
Words 1361
Pages 6
Alfred J Haines
Eng 215
Dr. Melissa Olt
Research Paper
Dec. 18, 2011

Abstract
The Man Machine Love-Hate relationship is examined and the eventual blending of the two to create an augmented form of reality. The problems with such a task are not only with the hardware but with the Human sense of spiritual bonding to the past. A past imbued with fear, pain and hardship, a meta-ethnic past that some long for and believe to have been a simpler time.

The Personal Computer will someday become an invisible extension of our minds with no peripherals nor external hardware to obstruct the users from achieving their creative goals. From its beginning mechanical computers have frightened Humans who believed that they would be replaced by these thinking machines. The human beings mechanical mobility has evolved out of our spirits need to interact with the universe and the next step, the one that frees mankind from physical limitations will be the use of machines that will be ubiquitous, in effect, working as natural extensions of the body. The continuous innovations in electronics are making more and more components ubiquitous. The convergence of man and machine requires that computers become an integral part of the human body. The hurdles are many and those in opposition of such a world are afraid that these changes can only come about with the sacrifice of the soul. The last huddle that will stand in mans way of a true Man-Machine interface may well be one of posed by the threat that others may seek to control the machine portion and enslave mankind as mindless cyber-men.
How did these fears of mechanical computers, these thinking machines, replacing Humans get started and fears founded in reason? Human computers have been used by government and business since the dawn of the man to calculate taxes and manage accounts. While working on calculating machines…...

Similar Documents

Free Essay

Automation

...flow of inputs from (physical) sensors and events with the flow of outputs to actuators and events. This leads to precisely controlled actions that permit a tight control of almost any industrial process. Human-machine interfaces (HMI) or computer human interfaces (CHI), formerly known as man-machine interfaces, are usually employed to communicate with PLCs and other computers, such as entering and monitoring temperatures or pressures for further automated control or emergency response. Service personnel who monitor and control these interfaces are often referred to as stationary engineers. During the 19th century a number of machines such as looms and lathes became increasingly self-regulating. At the same time transfer-machines were developed, whereby a series of machine-tools, each doing one operation automatically, became linked in a continuous production line by pneumatic or hydraulic devices transferring components from one operation to the next. In addition to these technological advances in automation, the theory of ‘scientific management’, which was based on the early time-and-motion studies of Frederick Winslow Taylor in Philadelphia, USA, in the 1880s was designed by Taylor to enhance the efficiency and productivity of workers and machines. In the early 20th century, with the development of electrical devices and time-switches, more processes became automatically controlled, and a number of basic industries such as oil-refining, chemicals, and......

Words: 3283 - Pages: 14

Free Essay

Aviation Human Factors

...Running Head : Aviation Aerospace Human Factors in Aviation Aerospace Some of the greatest challenges in the operation and design of large machine systems such as aviation vehicles and aerospace vessels, arise from human factors . It is from such challenges that human-factor engineering has emerged, determined to optimize the interaction between man and machines for the purposes of safety and efficiency. As such, human-factors engineering concerns itself with operating procedures and the training of personnel , as well as issues of interface design (Britannica , 2008 ). These are crucial issues to aviation and aerospace, as human error has been identified as a primary contributor to more than 70 percent of commercial airplane hull-loss accidents. Graeber (1999) asserts that human error is a major concern within the areas of not only flight operations but in maintenance and traffic management as well. To remedy these matters, human factors engineering must identify the limits and characteristics of cognition , information processing and memory and how they can most effectively be integrated into the day to day operations of aviation and aerospace. This means going beyond mere personnel training and redundant safety protocols, but making knowledgeable and flexible observations about how humans interface with aviation and aerospace technology. Because technology tends to evolve faster than our ability to predict how humans interact with it, the overseers of aviation......

Words: 358 - Pages: 2

Premium Essay

Scrap

...WEST VISAYAS STATE UNIVERSITY INSTITUTE OF INFORMATION AND COMMUNICATIONS TECHNOLOGY La Paz, Iloilo City A Digital Scrapbook in Basic Networking Submitted to: ARNEL N. SECONDES Subject Instructor Submitted by: Frenze Chloe Baluco Janice Gayapa Christian John Elnacin BSIT 2A October 3, 2014 TABLE OF CONTENTS Title Page Table of Contents Introduction Networking Fundamentals Networking Lexicon Network Types Network Design Standard Topologies Hubs Switches Variation of Major Topologies Network Media Network Cabling: Tangible Physical Media Primary Cable Types Wireless Networking: Intangible Media Types of Wireless Network Network Interface Card Network Interface Card (NIC) Basics Special-Purpose NIC’s References ------------------------------------------------- Networking Fundamentals Networking History and Evolution The earliest form of electronic networking for the purpose of message transfer was the local telephone exchange, which has evolved to become a carrier network providing transport services for both voice and data traffic on a global scale. Data networks designed exclusively for computing environments followed the introduction of business computing in the 1950s. Prior to that time, computers were used mostly for research and national defense purposes. Milestones in the history of data networking include: * 1960s—The first large-scale commercial computer network is created for an airline reservation......

Words: 7158 - Pages: 29

Free Essay

Design, Culture & Technology

...TECHNOLOGY | Worksheet no.SD2005 | Weekly Individual Report | 28/9/2012 | POLYU HDMDT | Weekly Group Report Please fill in the form and submit to the course web site: http://courses.sd.polyu.edu.hk/ |Student and Project information | |Student name |Student ID |Role & responsibility | |Lui Yan Yan |11078781D |Define keywords, Collect and Classify data | |Poon Ka Man |11147491D |Define keywords, Collect and Classify data | |Lam Ching Mei |11039135D |Define keywords, Collect and Classify data | |Ngai Sze Ming, Ice |11352703D |Define keywords, Collect and Classify data | | | | | | ......

Words: 1094 - Pages: 5

Free Essay

Cp-2

...Project Industrial Process Human Machine Interface has a total cost of $129,600.00 with a scheduled start date of 5/27/12 and ending on 9/19/13, for project duration of 344 days. This project will also require 4,144 working hours, consume 39 tasks, and utilize 11 total resources; 2 of which are material resources while all other resources are man power. Below is a project summary document to give summary detail for Project Industrial Process Human Machine Interface: Project Industrial Process Human Machine Interface Also listed in the appendix is a detailed schedule for project Industrial Process Human Machine Interface (Appendix “Project Task Schedule”, 3) listing start and end dates, task durations, and slack time per task. This project schedule will be will be a very useful tool when to assist with decision making and potentially resources re-allocation in the event of unforeseen issues related to project time and cost constraints. Also listed is a project Gantt chart detailing tasks, task durations, task dependencies, task resources, and cost associated with each task(Appendix, “Project Gantt Chart Tasks 1 - 22”, 4), (Appendix, “Project Gantt Chart Tasks 22 39”, 4). Project Description: The Industrial Process Human Machine Interface Project is a proposed project to create a software application to enable machine operators to easily operate and control industrial machines with a touch screen and/or computer application interface. Many industrial controls......

Words: 2237 - Pages: 9

Free Essay

Hotel Paris

...process knowledge and manufacturing skills for full automation of technical processes. In such interactive, semi-automated systems human operators are facing a high amount of process information that need to be evaluated according to individual skills and knowledge to situational and necessary actions including the evaluation of alternatives etc. In order to benefit from human abilities of information fusion and sophisticated comprehension of process coherence in complexity gaining environments, integrated approaches as framework for guiding and supervision assistance systems of semi-automated, technical systems can be developed. Thereby, the advantage of having an uniform description of the entire, interactive system (consisting of human, machine, and technical process) as framework allows the implementation of methods for a situational, task-oriented assessment of existing information and corresponding filtering, respectively. The resulting reduced set of process-relevant information allows the human operator to focus during the decision making process and supports maintaining process reliability and quality. In this contribution, recent modeling approaches of Human-Automation-Interaction, e.g. Message-based Part State Graphs [1] or Enriched Labeled Transition Systems [2] are discussed with respect to their ability of being suitable to serve as framework and are compared to the Situation-Operator-Model (SOM) introduced by [3]. Using the SOM approach, considered interactive......

Words: 5143 - Pages: 21

Premium Essay

Basic Commands in Linux and Windows

...example, "delete" and "del‚" are the same command. Tools ping host Verify contact with the machine “host” The command ping sends "packets" using ICMP (Internet Control Message Protocol) to another computer, to learn whether it is accessible through the network. In addition, it shows a statistical summary about the percentage of packets that have not been answered and the response time. The name of the machine can be used directly or its IP address. Examples: ping www.google.com ping 193.145.85.2 Some options are: - n N: send N packets - t: ping the specified host until stopped (press CTRL+C to end) To see more options: ping /h 8 LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS tracert host Show the route that packets follow to reach the machine “host” The command tracert is the abbreviation of trace route, which allows you to learn the route that a packet follows from the origin, (your machine) to the destination machine. It can also tell you the time it takes to make each jump. At the most, 30 jumps will be listed. It is sometimes interesting to observe the names of the machines through which the packets travel. Examples: tracert www.google.com tracert 193.145.85.2 Some options are: - h N: to specify N, at the most, jumps. - d: to not show the names of the machines. ipconfig To see more options: tracert Display information on the active interfaces (ethernet, ppp, etc.) in the computer. Some options: /all: to show more......

Words: 2543 - Pages: 11

Free Essay

Ip Spoofing

...IP Spoofing: An Introduction Criminals have long employed the tactic of masking their true identity, from disguises to aliases to caller-id blocking. It should come as no surprise then, that criminals who conduct their nefarious activities on networks and computers should employ such techniques. IP spoofing is one of the most common forms of on-line camouflage. In IP spoofing, an attacker gains unauthorized access to a computer or a network by making it appear that a malicious message has come from a trusted machine by “spoofing” the IP address of that machine. In this article, we will examine the concepts of IP spoofing: why it is possible, how it works, what it is used for and how to defend against it.Internet Protocol – IP Internet protocol (IP) is a network protocol operating at layer 3 (network) of the OSI model. It is a connectionless model, meaning there is no information regarding transaction state, which is used to route packets on a network. Additionally, there is no method in place to ensure that a packet is properly delivered to the destination.Examining the IP header, we can see that the first 12 bytes (or the top 3 rows of the header) contain various information about the packet. The next 8 bytes (the next 2 rows), however, contains the source and destination IP addresses. Using one of several tools, an attacker can easily modify these addresses – specifically the “source address” field. It's important to note that each datagram is sent independent of all......

Words: 1398 - Pages: 6

Free Essay

Packet Sniffing

.....................................................................................................................5 5.1.2 MAC-based sniffing ......................................................................................................................................5 5.1.3 ARP-based sniffing........................................................................................................................................5 6.0 Anti sniff assumption........................................................................................................................................7 7.0 Anti-Sniff detection methods…………………………………………………………………….7 7.1 Mac Detection…………………………………………………………………………………..7 7.1.1 Ethernet Network Interface Cards…………………………………………………………….8 7.1.2 TCP/IP on Ethernet ………………………………………………………………………….8 7.1.3 Implementation ……………………………….………………………………………………8 7.1.4 Results ………………………………………………………………………………………..9 7.2 DNS Detection………………………………………………………………………………….10 7.2.1 Exploit Sniffer Behavior………………………………………………………………………11 7.2.2 Implementation……………………………………………………………………………….12 7.2.3 Results ………………………………………………………………………………………..13 8.0 Conclusion……………………………………………………………………………………...14 9.0 References……………………………………………………………………………………....15 1.0 Introduction Packet sniffing is a technique of monitoring every packet that crosses the network. A packet sniffer is a piece of software or hardware that monitors all network traffic. This is unlike standard network hosts......

Words: 3356 - Pages: 14

Premium Essay

Final Review

...a Linux machine to display the IP address? ifconfig 8. What is the maximum length of a horizontal cable run that still allows for the length of the patch cables and extra cabling on each end? 90 meters 9. A data problem is reported to the network administrator. The problem is found to be with the UTP network connection. What would the network administrator do to isolate the problem. Test the link, perform a traceroute command, depends on what type of problem is occurring with the cabling. 10. Describes interconnection of LANs within a limited geographic area. MAN (Metropolitan Area Network) (page 5) 11. Which describes an Ethernet system operating at 100 Mbps? Fast Ethernet or 100BaseT (page 32) 12. What is another term for network congestion? Bottlenecking (page 59) 13. A network address of 192.168.6.0 and a subnet mask of 255.255.254.0 can be written in CIDR as? 192.168.168.0/3 (page 180) 14. The three packets exchanged at the beginning of a TCP connection between two ports are: SYN, SYN+ACK, & ACK (page 159) 15. IP addresses are assigned by which of the following? ARIN (American Registry for Internet Numbers (page 173) 16. The connection to a router's console port input is typically which of the following? RS-232 serial communications port using an RJ-45 jack to connect to its interface (page 201) 17. What is the help command in the CISCO IOS? “?” is the universal help command (page 207) 18. AUI stands for: Attachment Unit Interface (page......

Words: 1091 - Pages: 5

Premium Essay

Eglish

... 2. What is the difference between a computer and a workstation? Computers perform three simple tasks: input, process, and output while a workstation is a connected computer/s and has an IP address. 3. What is the main purpose of a CPU and a NIC? The central processing unit (CPU) main function is to execute instructions from computer programs. The network interface card (NIC) is an additional card plugged into a motherboard slot which provides a connection between the computer and the network. 4. What is the difference between RAM AND ROM? Storage types, short-term storage (RAM) and the permanent, long term, (ROM). 5. How is data stored? Characters, bits or bytes? It is stored in bits (1, 0). 6. What is the main purpose of a bus in computers? The main purpose of the bus in computers is to carry data from one place to another on the computer. In a computer, there are buses between the CPU, RAM, disk drives, and expansion slots. The bus connecting expansion slots to the motherboard connect a network interface card (NIC) into one of these slots, the faster and busier your computer is, the faster its bus type needs to be. 7. Why are protocols important? Network protocols are the rules and formats a computer uses when sending data across the network. Network protocols complete tasks required to make networking possible. Most of the complexity in networking is handled by......

Words: 753 - Pages: 4

Free Essay

Ergonomics in Modern Planning and Design

...Ergonomics, human engineering or human factors engineering is the science of creating products or designing machines which maximize safety, comfort or efficiency of people who use them. People who work with ergonomics apply general principles of industrial engineering, psychology, anthropometrics, which is the science of human measurement, and even biomechanics to adapt certain designs of products or workplaces to peoples constitution, strengths and limitations. This science also takes into consideration peoples reactions and the amount of time they need to process a specific task or information received from their environment, as well as the capacity of dealing with certain psychological factors, mainly stress and isolation. Once a study about a certain group of peoples reactions to their environment has been made, people who design with ergonomics attempt to develop the best possible design for a system or product. Ergonomists view people and a the object or machine they will use as a sole unit, and the ergonomic approach to design blends the persons abilities with those of the machine. When designing one must take into account the several limitations of both the mechanical and the human factor involved in a certain workspace. Human beings need to rest or experience less stress when realizing a certain task or they will spend their energies quickly and begin making mistakes when working, they are also subject to illness, accidents and the need of rest. The...

Words: 1341 - Pages: 6

Free Essay

Lab Step

...exploiting a cross-site scripting (XSS) vulnerability in the Damn Vulnerable Web Application (DVWA) tool. In the lab environment, you will be capturing traffic on one interface. In a real-world situation, it is likely the machine would be straddling both an internal network and an external network. In that case, you would want to want to monitor both sides of the interface. Monitoring outside network traffic allows information systems security practitioners to see who and what is attempting to infiltrate your IP network. Monitoring internal traffic allows network analysts to see exactly which hosts may be compromised and what destination IP addresses internal employees are accessing. 1. Double-click the RDP folder on the vWorkstation desktop to open the folder. 2. Double-click the TargetLinux01 file in the RDP folder to open a remote connection to the Linux machine. The remote desktop opens with the IP address of the remote machine (172.30.0.11) in the title bar at the top of the window. 3. From the Linux toolbar, select Applications > Accessories > Terminal to open the Linux command prompt. 4. At the command prompt, type su and press Enter to use the superuser account, instead of the student account, to access the root directory. 5. When prompted for a password, type toor and press Enter. 6. At the command prompt, type man tcpdump and press Enter to open the onscreen manual for the TCPdump utility. This screen displays all of the command line options for the tool and......

Words: 3168 - Pages: 13

Premium Essay

Linux

...also acts as an interface between user and the computer hardware. Components of operating system enable the different part of a computer to work together. The interface provides user an environment to execute and use the computer resources in an efficient manner. The interface is also known as shell. Operating system has following components: a) Kernel b) Networking c) Security d) Shell Kernel is the core of the operating system and it acts as a bridge between application and the actual data processing done at hardware level. These facilities available to application processes through inter-process communication mechanisms and system calls. It provides the lowest-level abstraction layer for the resources that application software must control to perform its function. It also decides at a particular time which process should be allocated to the processor. It is also responsible for allocating memory to various processes. Shell is the software that provides an interface for an operating system to access the services of kernel. The primary purpose of shell is to execute another program. The user interface of the operating system is usually referred to as a shell. Shells are normally of two types: command line and graphical. Command line provides a command line interface (CLI) to the operating system whereas graphical provides a graphical user interface (GUI).......

Words: 785 - Pages: 4

Premium Essay

Information Teclnology

... Independent Information Technology Research John Cooper Personal Computers The term "PC" has been traditionally used to describe an "IBM-compatible" personal computer. "IBM-compatible" PC was associated with business and use, while the "Mac," known for its more intuitive user interface, was associated with graphic design and desktop publishing. Microsoft is the world's leading producer of computer software. Microsoft was incorporated in 1981, but the company's roots go back at least as far as 1975, Because Microsoft Windows is the dominant operating system on microcomputers, the decisions Microsoft makes about new software developments are a predominant driving force in the way computers will work in the future. On January 24, 1984, Apple announced the Macintosh. Before the Macintosh, all computers were 'text-based' meaning you operated them by typing words onto the keyboard. The Macintosh is run by activating pictures (icons) on the screen with a small hand-operated device called a "mouse" Macintosh showed its greatest difference, a graphical user interface (GUI). Most modern day computers now operate on this principle; the tiny computer was a radical departure from the systems still on the market, and a growing number of IBM compatible computers. NEEDS ASSESSMENT Needs Assessments are used to identify strategic priorities. A needs assessment also prioritizes the......

Words: 1835 - Pages: 8