Synchronizing Clipboards of Multiple Computers Rob Miller Brad Myers School of Computer Science Carnegie Mellon University UIST ‘99November 7-10, 1999.

Slides:



Advertisements
Similar presentations
Topology The physical topology of a network refers to the configuration of cables, computers and other peripherals. The main types of network topologies.
Advertisements

Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
Notes to the presenter. I would like to thank Jim Waldo, Jon Bostrom, and Dennis Govoni. They helped me put this presentation together for the field.
Peer-to-Peer Technology and Security Issues By Raul Rodriguez, Arash Zarrinbakhsh, Cynthia Roger and Phillip Shires College of Business Administration.
1 Component Description Pebbles PDA Software Human Computer Interaction Institute Carnegie Mellon University Prepared by: Brad Myers, March.
Basic Computer Networks Configurations (cont.) School of Business Eastern Illinois University © Abdou Illia, Spring 2006 Week 2, Thursday 1/19/2006)
UNICORE UNiform Interface to COmputing REsources Olga Alexandrova, TITE 3 Daniela Grudinschi, TITE 3.
SM3121 Software Technology Mark Green School of Creative Media.
The Interaction Design of Microsoft Windows CE Sarah Zuberec Productivity Appliance Division, Microsoft Corp. Presented By: Ugur Kuter Dept. of Computer.
? INTERNET WHAT, WHY, HOW. DEFINITION The Internet is a massive public spiderweb of computer connections. It connects personal computers, laptops, tablets,
P EER - TO -P EER N ETWORKS Michael Fine 1. W HAT ARE P EER -T O -P EER N ETWORKS ? Napster Social networking spawned from this concept. Emerged in the.
Cli/Serv.: JXTA/151 Client/Server Distributed Systems v Objective –explain JXTA, a support environment for P2P services and applications ,
An Analysis of IMAP Security CMPE 209 Presented By Divya Panchal Bepsy Paul Menachery.
2-3 note. 2 Peripheral Devices “Peripheral devices” are hardware plugged into ports or connected to a computer wirelessly. These devices can be for input,
Version 4.0. Objectives Describe how networks impact our daily lives. Describe the role of data networking in the human network. Identify the key components.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
Microsoft Active Directory(AD) A presentation by Robert, Jasmine, Val and Scott IMT546 December 11, 2004.
NETWORKING PRACTICAL EXAMPLE. REQUIRED HARDWARE BASICS Network Interface Card Ethernet Cable Client Server.
Network Operating Systems versus Operating Systems Computer Networks.
Software 1. Software is divided into parts System software Operating system Utility software Application software 2.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
DCE (distributed computing environment) DCE (distributed computing environment)
Living Online Module Lesson 23 — Networks and Telecommunication
Section 2 Section 2.1 Identify hardware Describe processing components Compare and contrast input and output devices Compare and contrast storage devices.
A system sharing informati on and services with individuals and groups webster.com/dictionary/ne tworking webster.com/dictionary/ne.
Access to Enterprise data from any device Grapevine Software Access to enterprise data from any device… University of Washington 2001 Business Plan Competition.
1 Chapter 7 Operating System & Utility Programs.  consists of the programs that control or maintain the operations of the computer and its devices. It.
1 Introduction to Microsoft Windows 2000 Windows 2000 Overview Windows 2000 Architecture Overview Windows 2000 Directory Services Overview Logging On to.
Integrated Management Solutions for Network Access Control and IPAM RT Com USA 10 Millpond Dr., Unit #2 Lafayette, NJ Phone: Fax:
BASIC NETWORKS. What is a Network? A network consists of two or more computers that are linked in order to share resources exchange files, or allow electronic.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Application Layer Functionality and Protocols Network Fundamentals.
Sharing Projectors Myungcheol Doo & Andy Wu. Intro & Motivation Increase efficiency of group meeting –Reduce delay in switching a VGA cable Increase the.
Copyright©2008 N.AlJaffan®KSU1 Chapter 7 Operating System and Utility Programs.
Using ICT systems The computer. Using ICT systems Computers in an ICT System Multiple computers, usually with username and password entry Looking after.
Living Online Module Lesson 23 — Networks and Telecommunication Computer Literacy BASICS.
Networks Am I hooked up?. Networks definition sizes of networks types advantages and disadvantages how data is sent transmission media business uses.
Chapter 17 - Clients + Servers = Distributed Computing Introduction Large Computers Use Networks For Input and Output Small Computers Use Networks To Interact.
Desktop Integration with the Appx Client. Launch Documents Run Desktop Programs Transfer Files to the Client Transfer Files from the Client Client-Side.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Communications & Networks National 4 & 5 Computing Science.
Strong Authentication Infrastructure Requirement: Trusted Input Devices National ID Workshop Carnegie Mellon University November 28, 2001 Lark M. Allen.
Introduction TO Network Administration
© 1stworks Corp. The Connected Community 85% of US corporations have a PC 75% of these PCs have an Internet connection 50% of US households have a PC 80%
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
HNC COMPUTING - Network Concepts 1 Network Concepts Network Concepts Network Operating Systems Network Operating Systems.
Ms. Tracy  Identify the purpose of an operating system.  Identify different operating systems.  Describe computer user interaction with multiple.
I NTRODUCTION TO N ETWORK A DMINISTRATION. W HAT IS A N ETWORK ? A network is a group of computers connected to each other to share information. Networks.
Hands-On Microsoft Windows Server Implementing User Profiles A local user profile is automatically created at the local computer when you log on.
LO2 Understand the key components used in networking.
Premium Entry $ Device Capabilities Windows 10 IoT Core One Windows Platform Connected Secure Powering the next generation of intelligent devices Windows.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
2.2 Interfacing Computers MR JOSEPH TAN CHOO KEE TUESDAY 1330 TO 1530
Is there a Box in your future? George G. Robertson Principal Researcher Visualization and Interaction Research Microsoft Corporation George G. Robertson.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Networking Chapter 7. This presentation covers What is a network? Types of network.
Contents Software components All users in one location:
Topology The physical topology of a network refers to the configuration of cables, computers and other peripherals. The main types of network topologies.
Peer 2 Peer & Client Server
Virtual Private Networks (VPN)
Networks and Connecting to the Internet
Computer Technology Notes #4
An Introduction to Computer Networking
Lesson 8 Operating Systems
PREPARED BY: RIDDHI PATEL (09CE085)
Client/Server and Peer to Peer
Presentation transcript:

Synchronizing Clipboards of Multiple Computers Rob Miller Brad Myers School of Computer Science Carnegie Mellon University UIST ‘99November 7-10, 1999

One User, Many Computers Desktops Laptops PDAs Cell phones Pagers Car PCs Live Boards... Windows Unix/X Macintosh Palm Windows CE... How do I move data between programs running on different computers? URLs addresses Phone numbers Text Files

Inter-Application Data Transfer Same Computer Filesystem Drag-and-drop Clipboard Different Computers Network filesystem Pick-and-drop [Rekimoto, UIST 97] Hyperdragging [Rekimoto, CHI 99] Synchronized clipboards

Synchronized Clipboards Key idea: synchronize the clipboards so that their contents are always identical. User’s clipboard group consists of all computers in active personal use (ideally).

Advantages Cut/copy/paste is a familiar, universal UI –All popular GUIs have a clipboard –No extra hardware is required Synchronization is invisible –User doesn’t need to explicitly name source or target computer in each data transfer (unlike other “network clipboards”)

Limitations Best for one user only –Two users can’t actively share a synchronized clipboard Computers must be in close proximity –Unsuitable for long-range transfers

Model #1: Client-Server Client Server Client Network traffic on all client clipboard operations Client clipboards must be interceptable XX

Model #2: Peer-to-Peer A A B C No network traffic for local clipboard operations Clipboards must allow delayed data transfer Peer A

Prototype Uses Both Models PalmPilot: client-server –Palm clients connected to server PC by serial cable or cradle Windows, Unix/X: peer-to-peer –Java/RMI across the network Both models interoperate –Just hook up server as a peer

Setting Up Clipboard Group PalmPilot: plug/unplug Palm in cradle –Clipboard group connection is automatic Windows, Unix: add/remove hostnames –Automatic discovery (e.g. Jini) would help My clipboard group should contain all devices I’m actively using –But perfect tracking is tricky

Security Authentication by popup dialog SSL, Kerberos, PGP, … would help –But all require some infrastructure: trusted authorities, key management, etc.

Conclusion Synchronized clipboards extend the familiar clipboard model for seamless data transfer between computers Prototype (for Palm, Windows, Unix) is available at: