Moving in a different direction

Simpkins, Dan
June 2005
CED;Jun2005, Vol. 31 Issue 6, p64
Trade Publication
The article focuses on the usage of video interface. In this context John Carey, professor of communications and media management at Fordham University Business School in New York, who has studied video interface usage for more than two decades says that usually four to six buttons are used by viewers in rare cases more than ten buttons are used. He further mentions that too many buttons increase the possibility that many features are not going to be used. The usefulness of the conventional remote control and on-screen user interface is coming to an end. The value is decreasing because consumers require a more vital and visual way. INSET: Movies On Demand.


Related Articles

  • A Literature Survey on Applications of Neural Networks for Human-Computer Interaction. Yasdi, R. // Neural Computing & Applications;2000, Vol. 9 Issue 4, p245 

    This article presents an overview of the neural networks approach to user modelling and intelligent interface. We analyse and discuss activities in user modelling and intelligent interface. Activities of various neural networks models are introduced to illustrate how user modelling problems can...

  • USING INTERFACES. Alleyne, Llanor // Residential Systems;Oct2015, Vol. 16 Issue 10, pA2 

    The article focuses on various products that integrate user interface devices, including the touchpanels, touchscreens, remote controls, and mobile applications, for home automation and control concept, such as the Creston Pyng, the ELAN Home Systems suite, and the TiO Home native application.

  • Remote monitoring and control. Gilmer, Brad // Broadcast Engineering;Aug2005, Vol. 47 Issue 8, p28 

    Discusses remote monitoring and control of broadcast facilities. Factors that contributed to the increase in remote monitoring capabilities; Possibility of remotely monitoring and controlling all sorts of equipment; Function of telnet is an application that emulates a computer terminal; Remote...

  • Monitoring the SDI stream. Luff, John // Broadcast Engineering;Aug2005, Vol. 47 Issue 8, p82 

    Explains how to monitoring the serial digital interface (SDI) stream. Frequency response issues; Differential gain, video levels, signal timing and many other parameters that identify the health of the signal and a lot about the quality of the picture itself; Aspects of serial data transport...

  • More Capabilities Meet More Demands. Katzel, Jeanine // Control Engineering;Nov2003, Vol. 50 Issue 11, p47 

    Discusses developments in operator interfaces (OI). Reasons for increased application; Indications of the purchasing patterns; Description of OI; Examples of OI products.

  • TINY TRACKBALL MEETS PORTABLE NEEDS. Schweber, Bill; Granville, Fran // EDN;2/5/2004, Vol. 49 Issue 3, p16 

    Evaluates the miniature Trackball 360° interface device from ITT Industries, Cannon. Functional capabilities; Application specifications; Price.

  • Interface Pains. Filman, Robert E. // IEEE Internet Computing;Sep/Oct2004, Vol. 8 Issue 5, p4 

    This article discusses the goals of good computer interface design. Interface design is complicated, both the complexity of the design space and the pragmatics of usable systems. The user-interface designer can choose from a large variety of mechanisms, including command languages, character...

  • Remarks on Interface Oriented Software Systems Modelling. Bocu, Dorin; Bocu, Răzvan // International Journal of Computers, Communications & Control;Oct2013, Vol. 8 Issue 5, p662 

    This paper explores the foundations regarding the systematic usage of the concept of interface in order to sketch a methodological approach, in which the fundamental perspectives that guide the abstracting of a software system solution (referred to as UP, SP and BP in the paper) are unified,...

  • Implementation of Power Analysis Attack using SASEBO-W. Rani, Deevi Radha; Venkateswarlu, S. // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 3, p3994 

    Side Channel Attacks exploit information that leaks from a cryptographic device. Power Analysis is a kind of side channel attack which reveals the key of cryptographic device by analyzing its power consumption. Power analysis attack causes serious threat to the security of cryptographic devices....


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics