Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Pervasive Computing


Published on

Pervasive and ubiquitous computing

Published in: Technology
  • ★★ How Long Does She Want You to Last? ★★ A recent study proved that the average man lasts just 2-5 minutes in bed (during intercourse). The study also showed that many women need at least 7-10 minutes of intercourse to reach "The Big O" - and, worse still... 30% of women never get there during intercourse. Clearly, most men are NOT fulfilling there women's needs in bed. Now, as I've said many times - how long you can last is no guarantee of being a GREAT LOVER. But, not being able to last 20, 30 minutes or more, is definitely a sign that you're not going to "set your woman's world on fire" between the sheets. Question is: "What can you do to last longer?" Well, one of the best recommendations I can give you today is to read THIS report. In it, you'll discover a detailed guide to an Ancient Taoist Thrusting Technique that can help any man to last much longer in bed. I can vouch 100% for the technique because my husband has been using it for years :) Here's the link to the report 
    Are you sure you want to  Yes  No
    Your message goes here

Pervasive Computing

  3. 3. • Pervasive computing (also called ubiquitous computing) is the growing trend towards embedding microprocessors in everyday objects so they can communicate information. The words pervasive and ubiquitous mean "existing everywhere." Pervasive computing devices are completely connected and constantly available. • Pervasive computing relies on the convergence of wireless technologies, advanced electronics and the Internet. The goal of researchers working in pervasive computing is to create smart products that communicate unobtrusively. The products are connected to the Internet and the data they generate is easily available.
  4. 4. The idea that technology is moving beyond the personal computer to everyday devices with embedded technology and connectivity as computing devices become progressively smaller and more powerful. Also called ubiquitous computing, pervasive computing is the result of computer technology advancing at exponential speeds - - a trend toward all man-made and some natural products having hardware and software.
  5. 5. GOAL OF PERVASIVE COMPUTING Pervasive computing goes beyond the realm of personal computers: it is the idea that almost any device, from clothing to tools to appliances to cars to homes to the human body to your coffee mug, can be imbedded with chips to connect the device to an infinite network of other devices. The goal of pervasive computing, which combines current network technologies with wireless computing, voice recognition, Internet capability and artificial intelligence, is to create an environment where the connectivity of devices is embedded in such a way that the connectivity is unobtrusive and always available.
  6. 6. Layer 1: task management layer  Monitors user task, context and index  Map user's task to need for the services in the environment  To manage complex dependencies Layer 2: environment management layer  To monitor a resource and its capabilities  To map service need, user level states of specific capabilities Layer 3: environment layer  To monitor a relevant resource  To manage reliability of the resources
  7. 7. VISIONS AND CHALLENGE The essence of that vision was the creation of environments saturated with computing and communication capability, yet gracefully integrated with human users. When articulated, this was a vision too far ahead of its time — the hardware technology needed to achieve it simply did not exist.
  8. 8. • Ubiquitous means everywhere. Pervasive means "diffused throughout every part of." In computing terms, those seem like somewhat similar concepts. Ubiquitous computing would be everywhere, and pervasive computing would be in all parts of your life. • That might mean the difference between seeing kiosks on every street corner and finding that you could -- or need to -- use your Palm handheld to do absolutely every information-based task. • And, in fact, that's where the difference between these two types of computing lies. Pervasive computing involves devices like handhelds -- small, easy-to-use devices -- through which we'll be able to get information on anything and everything. That's the sort of thing that Web-enabled cell phones promise. Ubiquitous computing, though, eschews our having to use computers at all. Instead, it's computing in the background, with technology embedded in the things we already use. That might be a car navigation system that, by accessing satellite pictures, alerts us to a traffic jam ahead, or an oven that shuts off when our food is cooked. Pervasive describes things that spread through a place to become established everywhere. Ubiquitous describes things that are everywhere in a place because it is the nature of that place to have those ubiquitous things.
  10. 10. BENEFITS  INVISIBLE: “Smart” environments will be embedded with computing technologies that will be mostly out-of-sight.  SOIALIZATION: “Smart” buildings will illicit a more social response from occupants as computers user interfaces embed themselves within architecture.  DECISION-MAKING: “Smart” environments will help occupants to make better choices as they go about their everyday lives.  EMERGENT BEHAVIOR: Buildings are now becoming more and more kinetic in form and function. Their movements and constructed designs come together dynamically to yield behaviours that make them more adaptive.  INFORMATION PROCESSING: Architecture will go from crunching data to making sense of data; therefore, eliminating our need to constantly input adjustments.  ENHANCING EXPERIENCE: As computers ubiquitously embed themselves in our environments, sensors and actuators will create “smart” environments where architecture space will be goal oriented.  CONVERGENCE: Much of our environment will be supplemented with interconnected digital technologies.
  11. 11. LIMITATIONS  Not entirely secure  Frequent line connections that are broken  Slow connections  Very expensive operating costs
  12. 12. CONCLUSION