SlideShare a Scribd company logo
1 of 27
WHAT IS UBIQUITOUS COMPUTING?
 It is also called pervasive computing.
 Ubiquitous computing (ubicomp) is a concept
in software engineering and computer science
where computing is made to appear anytime
and everywhere. Ubiquitous computing can
occur using any device, in any location, and in
any format.
 The word pervasive and ubiquitous means
“Existing Everywhere” .
 It supports one user to many computers.
EXAMPLE OF UBIQUITOUS COMPUTING :
 An other example of practical application or
pervasive computing is the replacement of old
electric meter with smart meter.
HISTORY OF UBIQUITOUS COMPUTING
 The father of ubiquitous computing is ‘MARK
WEISER’ who was also the chief scientist at
Xerox PARC(Palo Alto Research Center) in the
United State and invented the term ‘Ubiquitous
Computing’.
 Researcher in the C.S. lab at research center
first articulated the idea of ubiquitous computing
in 1988 & has called UC “....highest ideal is to
make computer so imbedded , so fitting, so
THREE GENERATION OF COMPUTING :
 The first era of computing is known as
mainframe era – many people to one computer,
this computer was the central system from which
entire offices, and sometimes, companies called their
computing infrastructure.
 The second era of computing is known as the PC era-
one computer to one person.
 The third era of computing is known as the
UBIQUITOUS COMPUTING - one person using many
computers.
ADVANTAGE :
Manage informaion quickly, efficiently.
Remove complexity of new technology.
Invisible.
Socialization.
Decision Making.
Information processing.
Enhancing Experience.
APPLICATIONS :
Information access.
Text retrieval.
Multimedia document retrieval.
Automatic indexing.
Networking.
Electronic books.
Speech Recognition.
Wireless protocols.
User sensitive device.
WHY IS UBIQUITOUS COMPUTING
IMPORTANT ?
 Communicate in different ways
 Be more active
 Have more control
 Social & Personal
KEY ELEMENTS OF UBIQUITOUS
COMPUTING :
 Ubiquitous access
 Ubiquitous middleware
 Ubiquitous networking
 Ubiquitous sensing
USES OF PERVASIVE COMPUTING :
BUSINESS USES
Healthcare Military Micropayment
Personal Uses
Personal
Information
Flight
Schedule
Location
 Pervasive computing not entirely secure.
 Frequent line connection that are broken.
 Slow connection.
 Very expensive operating cost.
Disadvantage :
CONCLUSION
 removal of wires in the network computing
available to everyone, everywhere.
 information can be accessed when & where it
is needed.
 but still privacy & security major drawback of
the pervasive computing.
 computational power will be available every
where through mobile and devices…..
Ubiquitous computing
Ubiquitous computing
Ubiquitous computing

More Related Content

What's hot

5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt5 pen-pc-technology complete ppt
5 pen-pc-technology complete pptatinav242
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligencechandrika95
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingAnkita Gupta
 
BLUE EYES TECHNOLOGY
BLUE EYESTECHNOLOGYBLUE EYESTECHNOLOGY
BLUE EYES TECHNOLOGYChaitanya Ram
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingPriti Punia
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introductionnicole_wang
 
Virtual keyboard seminar ppt
Virtual keyboard seminar pptVirtual keyboard seminar ppt
Virtual keyboard seminar pptShruti Maheshwari
 
5 Pen PC technology seminar report
5 Pen PC technology seminar report5 Pen PC technology seminar report
5 Pen PC technology seminar reportRituraj Singh Panwar
 
Wimp interface
Wimp interfaceWimp interface
Wimp interfaceAbrish06
 
Presentation mobile computing
Presentation mobile computingPresentation mobile computing
Presentation mobile computingcegonsoft1999
 
Ambient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali JindalAmbient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali JindalShifaliJindal
 

What's hot (20)

Brain gate
Brain gateBrain gate
Brain gate
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt5 pen-pc-technology complete ppt
5 pen-pc-technology complete ppt
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Edge computing
Edge computingEdge computing
Edge computing
 
Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
BLUE EYES TECHNOLOGY
BLUE EYESTECHNOLOGYBLUE EYESTECHNOLOGY
BLUE EYES TECHNOLOGY
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introduction
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Virtual keyboard seminar ppt
Virtual keyboard seminar pptVirtual keyboard seminar ppt
Virtual keyboard seminar ppt
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
5 Pen PC technology seminar report
5 Pen PC technology seminar report5 Pen PC technology seminar report
5 Pen PC technology seminar report
 
Wimp interface
Wimp interfaceWimp interface
Wimp interface
 
Presentation mobile computing
Presentation mobile computingPresentation mobile computing
Presentation mobile computing
 
Ambient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali JindalAmbient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali Jindal
 

Similar to Ubiquitous computing

Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing PaperAssem mousa
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computingdeaneal
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptRishabhRathore71
 
Ubiquitous computing 1.0
Ubiquitous computing 1.0Ubiquitous computing 1.0
Ubiquitous computing 1.0jan aljan
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyHatum Hussain
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyHatum Hussain
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingsanjaymps
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentationRameshkumar1829
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingRutvik Pensionwar
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computingabhisheksaini
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptxShailiPal1
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHina Afzal
 
WEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptxWEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptxKLakshmi13
 

Similar to Ubiquitous computing (20)

Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
Ubiquitous computing 1.0
Ubiquitous computing 1.0Ubiquitous computing 1.0
Ubiquitous computing 1.0
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentation
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdf
 
WEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptxWEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptx
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 

Recently uploaded

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Recently uploaded (20)

Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

Ubiquitous computing

  • 1.
  • 2. WHAT IS UBIQUITOUS COMPUTING?  It is also called pervasive computing.  Ubiquitous computing (ubicomp) is a concept in software engineering and computer science where computing is made to appear anytime and everywhere. Ubiquitous computing can occur using any device, in any location, and in any format.
  • 3.  The word pervasive and ubiquitous means “Existing Everywhere” .  It supports one user to many computers.
  • 4. EXAMPLE OF UBIQUITOUS COMPUTING :
  • 5.  An other example of practical application or pervasive computing is the replacement of old electric meter with smart meter.
  • 6. HISTORY OF UBIQUITOUS COMPUTING  The father of ubiquitous computing is ‘MARK WEISER’ who was also the chief scientist at Xerox PARC(Palo Alto Research Center) in the United State and invented the term ‘Ubiquitous Computing’.  Researcher in the C.S. lab at research center first articulated the idea of ubiquitous computing in 1988 & has called UC “....highest ideal is to make computer so imbedded , so fitting, so
  • 7. THREE GENERATION OF COMPUTING :  The first era of computing is known as mainframe era – many people to one computer, this computer was the central system from which entire offices, and sometimes, companies called their computing infrastructure.  The second era of computing is known as the PC era- one computer to one person.  The third era of computing is known as the UBIQUITOUS COMPUTING - one person using many computers.
  • 8.
  • 9. ADVANTAGE : Manage informaion quickly, efficiently. Remove complexity of new technology. Invisible. Socialization. Decision Making. Information processing. Enhancing Experience.
  • 10. APPLICATIONS : Information access. Text retrieval. Multimedia document retrieval. Automatic indexing. Networking. Electronic books. Speech Recognition. Wireless protocols. User sensitive device.
  • 11. WHY IS UBIQUITOUS COMPUTING IMPORTANT ?  Communicate in different ways  Be more active  Have more control  Social & Personal
  • 12. KEY ELEMENTS OF UBIQUITOUS COMPUTING :  Ubiquitous access  Ubiquitous middleware  Ubiquitous networking  Ubiquitous sensing
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18. USES OF PERVASIVE COMPUTING : BUSINESS USES Healthcare Military Micropayment
  • 19.
  • 21.
  • 22.
  • 23.  Pervasive computing not entirely secure.  Frequent line connection that are broken.  Slow connection.  Very expensive operating cost. Disadvantage :
  • 24. CONCLUSION  removal of wires in the network computing available to everyone, everywhere.  information can be accessed when & where it is needed.  but still privacy & security major drawback of the pervasive computing.  computational power will be available every where through mobile and devices…..