SlideShare a Scribd company logo
5 Pen Pc Technology
Contents
 History
 Introduction
 Functions
 Working
 Merits
 Demerits
 Conclusion
 References
History
 "Pen-style Personal Networking Gadget" created in 2012 by
Japanese technology company NEC.
 Designed by Tour Ichihash.
 P-ISM was first featured at the 2011 ITU Telecom world held in
Geneva, Switzerland
Introduction
 P-ISM (“Pen-style Personal Networking Gadget Package”).
 Connected With A Wireless Technology.
 Whole Set Is Connected To Internet Through Cellular Phone
Function.
 This 'pen sort of instrument' produces both the monitor as well as
the keyboard on any flat surfaces from where you can carry out
functions you would normally do on your desktop computer.
Functions of P-ISM
 CPU PEN
 COMMUNICATION PEN
 VISUAL OUTPUT
 VIRTUAL KEYBOARD
 CAMERA
Block Diagram of P-ISM
CPU - pen
 The functionality of the CPU is done by one of the pen.
 It is also known as computing engine.
 Dual Core processor is used.
 Works with windows operating system.
Communication - Pen
 Wireless Bluetooth Technology.
 Connected to internet through cellular phone function.
 Uses Wi-Fi technology.
 Exchange information with wireless connection.
LED Projector
 Monitor is LED Projector
 Size is A4
 Resolution capacity is1024x768 approx.
 It gives more clarity and good picture
Virtual Keyboard
 Virtual laser keyboard is a new gadget.
 It emits laser on desk.
 Uses laser beam to generate full-size perfect keyboard.
 VKB settings can be changed.
Digital Camera
 It is useful in video recording , video conferencing simply as a
webcam.
 Connected with other devices.
 portable.
 360 degree visual communication device.
Battery
 It is the most important part in the portable type of computers.
 Usually batteries are small in size and work for a long time.
 It comes with a battery life of 6+ (i.e. 6 days).
 For normal use it can be used for 2 weeks.
Working
 The P-ISM (Pen-style Personal Networking Gadget Package)
consists of a package of 5pens that all have unique functions,
 Combining together to create virtual computing experience by
producing both monitor and keyboard on any flat surfaces from
where you can carry out functions that you would normally do on
your desktop computer.
Working
 ISM’s are connected with one another via a short-range
(Bluetooth) wireless technology.
 The whole set is connected to the Internet through the cellular
phone function
Merits
 It is convenient to use because of its portability (small and
compact)
 It supports wireless technologies
 Excellent battery life(up to 2 weeks)
Demerits
 It works on wireless technologies and therefore it has limitations of
range.
 It is exorbitantly expensive (30,000$).
 One of the components can be easily misplaced.
 Projection surface should be flat for optimum usage.
Conclusion
 The communication devices are becoming smaller and compact.
 This is only an example for the start of this new technology.
 We can expect more such developments in the future.
Reference
 www.123seminarsonly.com
 www.slideshares.net
 www.webstatschecker.com/ieee_paper_on_5_pen_pc_technology
 www.kguru.info/s/5-pen-pc-technology
 www.ieeexplore.ieee.org/pen-based learning technologies, 2007. plt 2007. first - ieee
Any Questions…?
Thank You

More Related Content

Viewers also liked

Social Media สำหรับธุรกิจท่องเที่ยว
Social Media สำหรับธุรกิจท่องเที่ยว Social Media สำหรับธุรกิจท่องเที่ยว
Social Media สำหรับธุรกิจท่องเที่ยว
Khonkaen University
 
Association for the Development of Pakistan (ADP) 2014 YTD update
Association for the Development of Pakistan (ADP) 2014 YTD updateAssociation for the Development of Pakistan (ADP) 2014 YTD update
Association for the Development of Pakistan (ADP) 2014 YTD update
Association for the Development of Pakistan
 
Managing teacher capability - HR and employment law in education conference 2...
Managing teacher capability - HR and employment law in education conference 2...Managing teacher capability - HR and employment law in education conference 2...
Managing teacher capability - HR and employment law in education conference 2...
Browne Jacobson LLP
 
Blue Ocean Strategy and the Transistor Radio
Blue Ocean Strategy and the Transistor RadioBlue Ocean Strategy and the Transistor Radio
Blue Ocean Strategy and the Transistor Radio
Chris Sandström
 
Critical Disability Theory and Non-Refoulement
Critical Disability Theory and Non-RefoulementCritical Disability Theory and Non-Refoulement
Critical Disability Theory and Non-Refoulement
Andreas Dimopoulos
 
9 Things You Should Add to your Social Media Marketing Campaigns
9 Things You Should Add to your Social Media Marketing Campaigns9 Things You Should Add to your Social Media Marketing Campaigns
9 Things You Should Add to your Social Media Marketing Campaigns
Roel Manarang
 
Biological inspired system applied to Computer Vision
Biological inspired system applied to Computer VisionBiological inspired system applied to Computer Vision
Biological inspired system applied to Computer VisionFederico Raue
 
Dynamic Scoring at CBO
Dynamic Scoring at CBODynamic Scoring at CBO
Dynamic Scoring at CBO
Congressional Budget Office
 
DevOp คืออะไร?
DevOp คืออะไร? DevOp คืออะไร?
DevOp คืออะไร?
IMC Institute
 
Mailchimp
MailchimpMailchimp
Effectively Managing User Permissions with a Governance Strategy by Justice S...
Effectively Managing User Permissions with a Governance Strategy by Justice S...Effectively Managing User Permissions with a Governance Strategy by Justice S...
Effectively Managing User Permissions with a Governance Strategy by Justice S...
Salesforce Admins
 
Perlawanan Goa
Perlawanan GoaPerlawanan Goa
Perlawanan Goa
Lianita Dian
 
Facebookmarketing
FacebookmarketingFacebookmarketing
Facebookmarketing
Khonkaen University
 
Introduction to IP: Basics of Patents, Trademarks, & Trade Secrets
Introduction to IP: Basics of Patents, Trademarks, & Trade SecretsIntroduction to IP: Basics of Patents, Trademarks, & Trade Secrets
Introduction to IP: Basics of Patents, Trademarks, & Trade Secrets
Knobbe Martens - Intellectual Property Law
 
커뮤니티 활동과 스터디
커뮤니티 활동과 스터디커뮤니티 활동과 스터디
커뮤니티 활동과 스터디
Javajigi Jaesung
 

Viewers also liked (15)

Social Media สำหรับธุรกิจท่องเที่ยว
Social Media สำหรับธุรกิจท่องเที่ยว Social Media สำหรับธุรกิจท่องเที่ยว
Social Media สำหรับธุรกิจท่องเที่ยว
 
Association for the Development of Pakistan (ADP) 2014 YTD update
Association for the Development of Pakistan (ADP) 2014 YTD updateAssociation for the Development of Pakistan (ADP) 2014 YTD update
Association for the Development of Pakistan (ADP) 2014 YTD update
 
Managing teacher capability - HR and employment law in education conference 2...
Managing teacher capability - HR and employment law in education conference 2...Managing teacher capability - HR and employment law in education conference 2...
Managing teacher capability - HR and employment law in education conference 2...
 
Blue Ocean Strategy and the Transistor Radio
Blue Ocean Strategy and the Transistor RadioBlue Ocean Strategy and the Transistor Radio
Blue Ocean Strategy and the Transistor Radio
 
Critical Disability Theory and Non-Refoulement
Critical Disability Theory and Non-RefoulementCritical Disability Theory and Non-Refoulement
Critical Disability Theory and Non-Refoulement
 
9 Things You Should Add to your Social Media Marketing Campaigns
9 Things You Should Add to your Social Media Marketing Campaigns9 Things You Should Add to your Social Media Marketing Campaigns
9 Things You Should Add to your Social Media Marketing Campaigns
 
Biological inspired system applied to Computer Vision
Biological inspired system applied to Computer VisionBiological inspired system applied to Computer Vision
Biological inspired system applied to Computer Vision
 
Dynamic Scoring at CBO
Dynamic Scoring at CBODynamic Scoring at CBO
Dynamic Scoring at CBO
 
DevOp คืออะไร?
DevOp คืออะไร? DevOp คืออะไร?
DevOp คืออะไร?
 
Mailchimp
MailchimpMailchimp
Mailchimp
 
Effectively Managing User Permissions with a Governance Strategy by Justice S...
Effectively Managing User Permissions with a Governance Strategy by Justice S...Effectively Managing User Permissions with a Governance Strategy by Justice S...
Effectively Managing User Permissions with a Governance Strategy by Justice S...
 
Perlawanan Goa
Perlawanan GoaPerlawanan Goa
Perlawanan Goa
 
Facebookmarketing
FacebookmarketingFacebookmarketing
Facebookmarketing
 
Introduction to IP: Basics of Patents, Trademarks, & Trade Secrets
Introduction to IP: Basics of Patents, Trademarks, & Trade SecretsIntroduction to IP: Basics of Patents, Trademarks, & Trade Secrets
Introduction to IP: Basics of Patents, Trademarks, & Trade Secrets
 
커뮤니티 활동과 스터디
커뮤니티 활동과 스터디커뮤니티 활동과 스터디
커뮤니티 활동과 스터디
 

Recently uploaded

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
QADay
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Ransomware Mallox [EN].pdf
Ransomware         Mallox       [EN].pdfRansomware         Mallox       [EN].pdf
Ransomware Mallox [EN].pdf
Overkill Security
 

Recently uploaded (20)

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Ransomware Mallox [EN].pdf
Ransomware         Mallox       [EN].pdfRansomware         Mallox       [EN].pdf
Ransomware Mallox [EN].pdf
 

5 pen pc technology **GoneInc**

  • 1. 5 Pen Pc Technology
  • 2. Contents  History  Introduction  Functions  Working  Merits  Demerits  Conclusion  References
  • 3. History  "Pen-style Personal Networking Gadget" created in 2012 by Japanese technology company NEC.  Designed by Tour Ichihash.  P-ISM was first featured at the 2011 ITU Telecom world held in Geneva, Switzerland
  • 4. Introduction  P-ISM (“Pen-style Personal Networking Gadget Package”).  Connected With A Wireless Technology.  Whole Set Is Connected To Internet Through Cellular Phone Function.
  • 5.  This 'pen sort of instrument' produces both the monitor as well as the keyboard on any flat surfaces from where you can carry out functions you would normally do on your desktop computer.
  • 6. Functions of P-ISM  CPU PEN  COMMUNICATION PEN  VISUAL OUTPUT  VIRTUAL KEYBOARD  CAMERA
  • 8. CPU - pen  The functionality of the CPU is done by one of the pen.  It is also known as computing engine.  Dual Core processor is used.  Works with windows operating system.
  • 9. Communication - Pen  Wireless Bluetooth Technology.  Connected to internet through cellular phone function.  Uses Wi-Fi technology.  Exchange information with wireless connection.
  • 10. LED Projector  Monitor is LED Projector  Size is A4  Resolution capacity is1024x768 approx.  It gives more clarity and good picture
  • 11. Virtual Keyboard  Virtual laser keyboard is a new gadget.  It emits laser on desk.  Uses laser beam to generate full-size perfect keyboard.  VKB settings can be changed.
  • 12. Digital Camera  It is useful in video recording , video conferencing simply as a webcam.  Connected with other devices.  portable.  360 degree visual communication device.
  • 13. Battery  It is the most important part in the portable type of computers.  Usually batteries are small in size and work for a long time.  It comes with a battery life of 6+ (i.e. 6 days).  For normal use it can be used for 2 weeks.
  • 14. Working  The P-ISM (Pen-style Personal Networking Gadget Package) consists of a package of 5pens that all have unique functions,  Combining together to create virtual computing experience by producing both monitor and keyboard on any flat surfaces from where you can carry out functions that you would normally do on your desktop computer.
  • 15. Working  ISM’s are connected with one another via a short-range (Bluetooth) wireless technology.  The whole set is connected to the Internet through the cellular phone function
  • 16. Merits  It is convenient to use because of its portability (small and compact)  It supports wireless technologies  Excellent battery life(up to 2 weeks)
  • 17. Demerits  It works on wireless technologies and therefore it has limitations of range.  It is exorbitantly expensive (30,000$).  One of the components can be easily misplaced.  Projection surface should be flat for optimum usage.
  • 18. Conclusion  The communication devices are becoming smaller and compact.  This is only an example for the start of this new technology.  We can expect more such developments in the future.
  • 19. Reference  www.123seminarsonly.com  www.slideshares.net  www.webstatschecker.com/ieee_paper_on_5_pen_pc_technology  www.kguru.info/s/5-pen-pc-technology  www.ieeexplore.ieee.org/pen-based learning technologies, 2007. plt 2007. first - ieee