SlideShare a Scribd company logo
1 of 14
Ubiquity




Heath Johnson, Nick Shaw, Danny Sloan, Brittany
Milbourne, Danny Murphy
What is Ubiquity?



 Defined as the existence or apparent existence
  everywhere at the same time; omnipresence


 More or less means that a piece of technology is used by
  people all around the world.
SOAP
•   Simple Object Access Protocol
•   Effective communication
•   XML, HTTP, SMTP
•   3 main parts:
    -Envelope
    -Set of encoding rules
    -Convention
SOAP Characteristics


Extensibility

Neutrality

Independence
SOAP Pros & Cons



 Advantages:
  -Versatile
  -Tunnels over firewalls & proxies


 Disadvantages:
  -Slower than competing technologies
  -Only one party can use services of the other
What is XML?




 Extensible Markup Language is a set of rules used to encode data.
 Data is encoded inside of tags used to describe each data
  component.
 <example>This is a sample of how to encode data in
  XML</example>
What makes XML Ubiquitous?


 Unicode Language:
  <俄语>данные</俄语>
 Basis of many coding languages
 Many APIs are created to read/write to and from XML
  syntax
 Commonly used applications have version that employ
  open source XML formats
Applications that use XML
Ubiquity In API/GUI
• Found in many devices
   • Phones
   • Computers
   • MP3 players
• Uniform User interface
• Easier, more efficient
Ubiquity in Security



 Many people use security in
  phones, computers, and their homes
 Negative Outcomes
    Easy to bypass a uniform system
    Security must be unique, and will not be
     if ubiquitous
 Many different types of security
  systems
Ubiquitous
  Network
   Access
• Anytime,
  anywhere
• Wi-Fi
• Mobile
  Hotspot
• Routers
Ubiquitous Physical Devices


 Future of physical
  devices
 How we will interact
 How our lives will change
Surface Technology




                 Interactive Environments
                 Microsoft’s Surface
                  Technology
The Cloud




 Importance of Cloud computing
 Future of the Cloud

More Related Content

What's hot

What's hot (13)

First work on ms power point 2
First work on ms power point 2First work on ms power point 2
First work on ms power point 2
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer wireless trends
Computer wireless trendsComputer wireless trends
Computer wireless trends
 
5 g technology
5 g technology5 g technology
5 g technology
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
5 g technology
5 g technology5 g technology
5 g technology
 
Bluetooth technology by shamshad
Bluetooth technology by shamshadBluetooth technology by shamshad
Bluetooth technology by shamshad
 
6. mobile security (cyber awareness series)
6. mobile security (cyber awareness series)6. mobile security (cyber awareness series)
6. mobile security (cyber awareness series)
 
Internet and Securities
Internet and SecuritiesInternet and Securities
Internet and Securities
 
Wi-fi
Wi-fiWi-fi
Wi-fi
 
Planning for the Mobile Enterprise
Planning for the Mobile EnterprisePlanning for the Mobile Enterprise
Planning for the Mobile Enterprise
 
Wireless Network
Wireless NetworkWireless Network
Wireless Network
 

Similar to Ubiquity

Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information TransparencyUsman Arshad
 
Why software freedom matters
Why software freedom mattersWhy software freedom matters
Why software freedom mattersRuwan Ranganath
 
Security and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud ComputingSecurity and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud ComputingRam Kumar K R
 
Application layer security protocol
Application layer security protocolApplication layer security protocol
Application layer security protocolKirti Ahirrao
 
Cloudcamp- The World Wide Cloud
Cloudcamp- The World Wide CloudCloudcamp- The World Wide Cloud
Cloudcamp- The World Wide CloudReuven Cohen
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedAsyathShahina
 
Revision Notes IT CODE 402 Class 10.pdf
Revision Notes IT CODE 402 Class 10.pdfRevision Notes IT CODE 402 Class 10.pdf
Revision Notes IT CODE 402 Class 10.pdfManasGupta211804
 
Mobile computing
Mobile computingMobile computing
Mobile computingamellia27
 
Open Source All The Things
Open Source All The ThingsOpen Source All The Things
Open Source All The ThingsAll Things Open
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Alexander Decker
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Alexander Decker
 
Computer Seminar.pptx
Computer Seminar.pptxComputer Seminar.pptx
Computer Seminar.pptxMelvinShaji12
 
Trends in Embedded system Design
Trends in Embedded system DesignTrends in Embedded system Design
Trends in Embedded system DesignRaman Deep
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networkingshankars73
 
Track f evolving trusted platforms - arm
Track f   evolving trusted platforms - armTrack f   evolving trusted platforms - arm
Track f evolving trusted platforms - armchiportal
 

Similar to Ubiquity (20)

Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 
Ospf
OspfOspf
Ospf
 
Why software freedom matters
Why software freedom mattersWhy software freedom matters
Why software freedom matters
 
Security and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud ComputingSecurity and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud Computing
 
Application layer security protocol
Application layer security protocolApplication layer security protocol
Application layer security protocol
 
Cloudcamp- The World Wide Cloud
Cloudcamp- The World Wide CloudCloudcamp- The World Wide Cloud
Cloudcamp- The World Wide Cloud
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
 
Revision Notes IT CODE 402 Class 10.pdf
Revision Notes IT CODE 402 Class 10.pdfRevision Notes IT CODE 402 Class 10.pdf
Revision Notes IT CODE 402 Class 10.pdf
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Open Source All The Things
Open Source All The ThingsOpen Source All The Things
Open Source All The Things
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...
 
Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...Performance evaluation of network security protocols on open source and micro...
Performance evaluation of network security protocols on open source and micro...
 
Final ppt
Final pptFinal ppt
Final ppt
 
Midori ppt
Midori pptMidori ppt
Midori ppt
 
Computer Seminar.pptx
Computer Seminar.pptxComputer Seminar.pptx
Computer Seminar.pptx
 
Trends in Embedded system Design
Trends in Embedded system DesignTrends in Embedded system Design
Trends in Embedded system Design
 
Introduction to Computer Networking
Introduction to Computer NetworkingIntroduction to Computer Networking
Introduction to Computer Networking
 
Chap 1
Chap 1Chap 1
Chap 1
 
Firewalls
FirewallsFirewalls
Firewalls
 
Track f evolving trusted platforms - arm
Track f   evolving trusted platforms - armTrack f   evolving trusted platforms - arm
Track f evolving trusted platforms - arm
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 

Ubiquity

  • 1. Ubiquity Heath Johnson, Nick Shaw, Danny Sloan, Brittany Milbourne, Danny Murphy
  • 2. What is Ubiquity?  Defined as the existence or apparent existence everywhere at the same time; omnipresence  More or less means that a piece of technology is used by people all around the world.
  • 3. SOAP • Simple Object Access Protocol • Effective communication • XML, HTTP, SMTP • 3 main parts: -Envelope -Set of encoding rules -Convention
  • 5. SOAP Pros & Cons  Advantages: -Versatile -Tunnels over firewalls & proxies  Disadvantages: -Slower than competing technologies -Only one party can use services of the other
  • 6. What is XML?  Extensible Markup Language is a set of rules used to encode data.  Data is encoded inside of tags used to describe each data component.  <example>This is a sample of how to encode data in XML</example>
  • 7. What makes XML Ubiquitous?  Unicode Language: <俄语>данные</俄语>  Basis of many coding languages  Many APIs are created to read/write to and from XML syntax  Commonly used applications have version that employ open source XML formats
  • 9. Ubiquity In API/GUI • Found in many devices • Phones • Computers • MP3 players • Uniform User interface • Easier, more efficient
  • 10. Ubiquity in Security  Many people use security in phones, computers, and their homes  Negative Outcomes  Easy to bypass a uniform system  Security must be unique, and will not be if ubiquitous  Many different types of security systems
  • 11. Ubiquitous Network Access • Anytime, anywhere • Wi-Fi • Mobile Hotspot • Routers
  • 12. Ubiquitous Physical Devices  Future of physical devices  How we will interact  How our lives will change
  • 13. Surface Technology  Interactive Environments  Microsoft’s Surface Technology
  • 14. The Cloud  Importance of Cloud computing  Future of the Cloud

Editor's Notes

  1. SOAP stands for Simple Object Access Protocol. It is used in the exchange of structured information in the implementation of Web Services in computer networks. It allows for effective communication between two electronic devices over a network. SOAP relies on XML for its message format and also relies on for message negotiation and transmission. SOAP consists of three parts that work together in the transmission of data. The first part is the envelope, which defines what is in the message and determines how to process it. The second part is a set of encoding rules for expressing instances of application-defined data types. The last part is a convention for representing procedure calls and responses. The diagram seen below is a conceptual representation of how SOAP works.
  2. There are three main characteristics of SOAP that contribute to its ubiquity. Extensibility is the first characteristic, with security and Web service routing as the extensions under development for SOAP. Neutrality is another important feature, as SOAP can be used over any transport protocol such as HTTP, SMTP, or even TCP. The third feature is independence, as SOAP allows for any programming model to operate.
  3. One of the advantages of SOAP is that it is versatile enough to allow for the use of different transport protocols. Standard SOAP stacks use HTTP, but Java Message Service (JMS) and SMTP are also viable options. Another advantage is that since SOAP travels fine in the HTTP get/response model, it can tunnel easily over firewalls and proxies without modifications to the protocol and can use existing infrastructures.One disadvantage of SOAP is that due to the verbosity of XML, SOAP can be slower than competing middleware technologies like CORBA, which stands for Common Object Request Broker Architecture. Another disadvantage is comes from relying on HTTP and not using Web Services Addressing or an Enterprise Service Bus (ESB). This makes the roles of interacting parties fixed, so that only one party, the client, can use the services of the other. In these common cases, developers must use polling instead of notifications.
  4. Extensible Markup Language (XML) is a markup language created by the World Wide Web Consortium as a uniform way of transferring data. XML uses tags &lt;&gt; to separate and describe various pieces of data. The tags can be customized to say whatever is required to describe the data, unlike HTML which has a predefined set of tags to use.
  5. Unicode Language: XML is a Unicode language, which means that almost any character can be used. This means that XML can transcend language barriers, as you could have multiple languages in the same XML file. (Chinese and Cyrillic)XML is used as the basis of hundreds of code languages, including XHTML, SOAP, WSDL, and RSS.APIs are created to read a confusing XML file into a format that is easier for a user to comprehend. They can also be used to allow the user to enter the data they need and then have it converted into the XML syntax required.Many applications have built around XML format
  6. Office Open XML – zipped XML based file format used to represent spreadsheets, charts, presentations, and word documents.OpenOffice – Developed by Sun, uses XML based format similar to Office Open XMLiWork – Keynote = Powerpoint, Pages = Word, Numbers = Excel
  7. Ubiquity plays a large part in GUI’s, because of the uniform omnipresence that they come with. Anyone who has a smart phone, a computer, or any of the products listed above, uses a GUI. This easy access and availability makes creating one uniform user interface that will be the future standard for GUI’s easier and effective. An API, or application program interface, is a particular set of rules or code, and specifications that software programscan follow to communicate with each other. It serves as an interface between different software programs and facilitates their interaction, similar to the way the user interfacefacilitates interaction between humans and computers. This process of communication between software creates a unified, ubiquitous system.
  8. Security does have some ubiquitous aspects. It is used by many people on phones, homes and other related items. It can also be used by many people to get a job. However, there are many different forms of security, such as finger print scanning, eye retina recognition, or password security. The multitude of different user recognition software is what makes security effective. If security, in relation to homes or computers, were to become uniform and ubiquitous, it would be very easy to bypass whatever obstacles the security presented.
  9. Ubiquitous network access allow people to access andexchange information anytime and anywhere. You can do this using:Wi-Fi: With Wi-Fi, people can access the Internet pretty much anywhere. Hotspots: Mobile hotspots are small devices that provide Internet access to Wi-Fi enabled devices at the same time. The new iPhone has an Wi-Fi hotspot feature that lets you connect your computers and devices to the Internet using the Cellular Data connection on your iPhone. Routers: Can connect several computer devices to the Internet.Picture: Represent Japan’s future ubiquitous network access. Everyone can do anything they want anytime and place through technology.
  10. The future of physical devices such as smart phones, computers, mp3 players, and cameras is one with seamless integration between human interaction as well as interaction between each physical device. Interaction will become effortless as physical devices will be able to share information with one another by simply touching or swiping a surface. This new surface technology will surround us in our day-to-day lives and will allow us to access and share information everywhere we go.
  11. Institutions like MIT have been developing interactive environments such as smart kitchens for example that create an interface that allows more then one person and multiple devises at a time to interact with each other. Microsoft is also innovating Surface technology with the advent of their Surface computer that allows a multi touch surface that responds to natural hand gestures as well as real world objects and electronic devices to interact with the surface computer.
  12. In order for Surface technologies to develop and continue to advance Cloud computing is going to need to increase in ability. The Cloud uses wireless storage via the internet and an outside storage site to allow physical devices to access storage and information. Cloud computing is going to need to be available for all devices if surface technology is going to be a real possibility. However this is already happening as most of the new devices such as smartphones and laptops come cloud ready.