Fifteen years from now, your alarm goes off at 7:30 AM, pulling you out of a dead sleep. You roll over, grumbling a command, and the alarm obediently shuts up. You drift off again, but ten minutes later the alarm returns, more insistent. It won’t be so easily pacified this time; the loose sensory netting inside your pillow will keep the noise going until it detects alpha waves in drastically higher numbers than theta waves. Or until it gets the automated password from the shower. Sighing, you roll out of bed, pull your Computing ID (CID) card from the alarm unit, and stumble out of the bedroom. Pausing briefly to drop your CID into your desktop computer, you make your way to the shower and begin washing. Your alarm triggered the shower’s heating unit, so the water comes out at a pleasant 108 degrees, exactly your preference. (42 degrees, you remind yourself — the transition to metric still isn’t second nature, after almost two full years.) You wash quickly to avoid exceeding your water quota, and step out refreshed, ready to meet the day.
After your shower, you grab a bowl of cereal and head to the living room. Your desktop has already torrented last night’s episode of your favorite comedy show, saturating the municipal gigabit fiber connection for almost a full minute to grab the 20-minute program. (You have it set to download in basic 8K, eschewing the 3D and live mashup feeds.) At a spoken command, your TV turns on and begins playback. When a confirmation box pops up on the screen, you state your name to authorize payment for the episode. Unfortunately, because you spent extra time sleeping, you’re in too much of a rush to finish the episode. You tell the TV to send the rest to local storage, pull your CID from the desktop, and put it into your phone. While you get dressed, your phone plays back your social streams from last night, filtered to only the closest tier of relationships. After listening to your mother’s voice detailing plans for the upcoming holiday, and your best friend summarizing the game he went to, you tell the phone to retrieve streams from one tier further. Ten seconds into yet another political rant from your cousin, you tell it to cancel and you set off for work.
The Homework on A Day Without a Phone
Over this past weekend, when given the challenge to shut off my phone for 24 hours, I didn’t believe I could make it. My phone is probably involved in almost every activity I do throughout the day. Weather its taking notes down for my classes or tweeting my latest pointless thought. It guides me when its dark, tells me when its going to rain, and even notifies me when I get poked on Facebook. I ...
As the door closes behind you, you absently wave your phone by the doorbell panel. The embedded RFID chip triggers the locks and security system, and sends a command to start your car. You climb in and place your phone in its dock. Quickly checking the car’s charge and its wireless connection, you say, “Go to work,” and lean back into your seat as it rolls out of the driveway. Telling your phone to resume playback, you watch the rest of your show as you wait for your commute to finish. (You’re vaguely aware that the car isn’t going to the freeway today — there must have been a hack-cident — and you feel irritation yet again at the arbitrarily low speed limits, wishing there was a way to ignore them.) After the show is over, you call up your work email and calendar, and prepare for the rest of the day. It’s not until the car comes to a halt and beeps at you that you realize you’ve arrived in the parking structure. As the induction coils top off your car’s charge, you exit the structure and walk over to your building’s entrance. After waving your phone past the entry sensor, you stand as still as you can and slowly think your full name. The fMRI sensors process the input quickly and decide you are who you think you are.
As the door closes behind you, you absently wave your phone by the doorbell panel. The embedded RFID chip triggers the locks and security system, and sends a command to start your car. You climb in and place your phone in its dock. Quickly checking the car’s charge and its wireless connection, you say, “Go to work,” and lean back into your seat as it rolls out of the driveway. Telling your phone to resume playback, you watch the rest of your show as you wait for your commute to finish. (You’re vaguely aware that the car isn’t going to the freeway today — there must have been a hack-cident — and you feel irritation yet again at the arbitrarily low speed limits, wishing there was a way to ignore them.) After the show is over, you call up your work email and calendar, and prepare for the rest of the day. It’s not until the car comes to a halt and beeps at you that you realize you’ve arrived in the parking structure. As the induction coils top off your car’s charge, you exit the structure and walk over to your building’s entrance. After waving your phone past the entry sensor, you stand as still as you can and slowly think your full name. The fMRI sensors process the input quickly and decide you are who you think you are.
The Essay on Car Rental System
Today, there are wide varieties of vehicle anti-theft devices in the market. These include from simple security devices, such as steering lock, gear lock and immobilizer, to a more advanced security system that can track down stolen vehicles. Unfortunately, despite the availability of such security systems, vehicle theft is still growing. This issue has affected the car rental businesses ...