This document provides an overview of mobile computing and wireless technology. It begins with an introduction to mobile computing and its evolution. It then discusses wireless transmission media and devices, cellular network standards, and standards for mobile web access. The document outlines key applications of mobile technology including location-based services, m-commerce, wireless networks, and their use in industries like healthcare. It concludes by discussing management opportunities and challenges presented by wireless technologies.
The document provides an introduction to information and communication technology (ICT) through 12 lessons, covering topics such as evaluation, usage, differences between computerized and non-computerized systems, the impact of ICT on society, and computer ethics. It also discusses the evolution of computers from first to fifth generations and how ICT is used in daily life for activities like banking, e-commerce, education, and industry. The document aims to educate readers on the basic concepts and applications of ICT.
Brian pickering introduction to seserv - seserv se workshop june 2012ictseserv
This document discusses socio-economic issues related to the future internet. It explores perspectives from both researchers who study the internet and technologists who build the internet. Some key topics discussed include converged networks and internet-connected devices, online identity and privacy, challenges around infrastructure control and regulation, and who the important stakeholders are in these areas.
The document provides 10 tips for mobile app developers to prepare for the future of pervasive, ubiquitous computing and the Internet of Things (IoT). It discusses how mobile development currently focuses too narrowly on smartphones and a few platforms, but the future will involve a vast array of connected devices from sensors to appliances to vehicles. Developers need to design apps that can operate across any device, share content between devices and clouds, and allow for discovery and sharing within transient communities of both human and machine participants.
Saiful Hidayat On Csr Guru Telkom Republika Bagimu Guru Kupersembahkan It...Saiful Hidayat
1) Digital technology is transforming practically everything through greater flexibility, speed of change, and real-time processing.
2) The upcoming era is the Conceptual Age, where knowledge workers who can think creatively with the whole mind will be most valuable.
3) Millennial students have grown up with technology and use it to learn in new ways, such as through social networking, multimedia, games and simulations. They seek fun and engaging learning experiences.
What Telecoms And Computing Can Learn From Each Other Carneybcarney
The document discusses the convergence of telecoms and computing, noting both industries can learn from each other. It describes how the Symbian Foundation was created to open source the Symbian OS, providing an open platform to leverage strengths from both industries. The Foundation plans regular releases of the platform and an open process for community contributions to the roadmap. Membership is now open to drive innovation in creating a mobile internet.
1. The document discusses "Collective Awareness Platforms" (CAPs), which use collective data and intelligence to support more sustainable and participatory decisions by individuals and groups.
2. It provides examples of how CAPs could promote health, energy savings, smart cities, and open participation. CAPs are enabled by trends in IoT, social networks, and collaborative production of knowledge.
3. The EU's Horizon 2020 program includes objectives to fund multidisciplinary pilots of CAPs, as well as coordination actions and research to better understand their technological and social impacts.
The document discusses how mobile application design can be improved by accounting for user context, interactions, and data. It argues that understanding a user's interactions with their environment and each other over time can provide insights to make applications more practical, relevant and interesting for individuals. Capturing contextual data and analyzing usage patterns and behaviors can help optimize applications and better target users. The presenter provides examples of how interactions, like tapping tags, and contextual data, like location, can enhance searches and recommendations. Overall, the document advocates for a people-centric approach to mobile application design and development.
The document provides an introduction to information and communication technology (ICT) through 12 lessons, covering topics such as evaluation, usage, differences between computerized and non-computerized systems, the impact of ICT on society, and computer ethics. It also discusses the evolution of computers from first to fifth generations and how ICT is used in daily life for activities like banking, e-commerce, education, and industry. The document aims to educate readers on the basic concepts and applications of ICT.
Brian pickering introduction to seserv - seserv se workshop june 2012ictseserv
This document discusses socio-economic issues related to the future internet. It explores perspectives from both researchers who study the internet and technologists who build the internet. Some key topics discussed include converged networks and internet-connected devices, online identity and privacy, challenges around infrastructure control and regulation, and who the important stakeholders are in these areas.
The document provides 10 tips for mobile app developers to prepare for the future of pervasive, ubiquitous computing and the Internet of Things (IoT). It discusses how mobile development currently focuses too narrowly on smartphones and a few platforms, but the future will involve a vast array of connected devices from sensors to appliances to vehicles. Developers need to design apps that can operate across any device, share content between devices and clouds, and allow for discovery and sharing within transient communities of both human and machine participants.
Saiful Hidayat On Csr Guru Telkom Republika Bagimu Guru Kupersembahkan It...Saiful Hidayat
1) Digital technology is transforming practically everything through greater flexibility, speed of change, and real-time processing.
2) The upcoming era is the Conceptual Age, where knowledge workers who can think creatively with the whole mind will be most valuable.
3) Millennial students have grown up with technology and use it to learn in new ways, such as through social networking, multimedia, games and simulations. They seek fun and engaging learning experiences.
What Telecoms And Computing Can Learn From Each Other Carneybcarney
The document discusses the convergence of telecoms and computing, noting both industries can learn from each other. It describes how the Symbian Foundation was created to open source the Symbian OS, providing an open platform to leverage strengths from both industries. The Foundation plans regular releases of the platform and an open process for community contributions to the roadmap. Membership is now open to drive innovation in creating a mobile internet.
1. The document discusses "Collective Awareness Platforms" (CAPs), which use collective data and intelligence to support more sustainable and participatory decisions by individuals and groups.
2. It provides examples of how CAPs could promote health, energy savings, smart cities, and open participation. CAPs are enabled by trends in IoT, social networks, and collaborative production of knowledge.
3. The EU's Horizon 2020 program includes objectives to fund multidisciplinary pilots of CAPs, as well as coordination actions and research to better understand their technological and social impacts.
The document discusses how mobile application design can be improved by accounting for user context, interactions, and data. It argues that understanding a user's interactions with their environment and each other over time can provide insights to make applications more practical, relevant and interesting for individuals. Capturing contextual data and analyzing usage patterns and behaviors can help optimize applications and better target users. The presenter provides examples of how interactions, like tapping tags, and contextual data, like location, can enhance searches and recommendations. Overall, the document advocates for a people-centric approach to mobile application design and development.
Connecting the Unconnected - Bridging the Digital Divide Using WiMAXDr. Mazlan Abbas
Dr. Mazlan Abbas presented on connecting the unconnected through bridging the digital divide using WiMAX technology. The presentation discussed (1) the national agenda of expanding broadband access, (2) challenges in connecting rural areas, and (3) how WiMAX technologies like 802.16e and the upcoming 802.16j standard can help provide universal broadband access. The goal is to eliminate boundaries and bring value to communities through affordable and reliable internet connections.
This document discusses emerging technologies and their potential impact on the tourism industry by 2050. It describes how technologies like ubiquitous computing, virtual and augmented reality, gestural interfaces, and biometrics could transform the tourism experience. A story is provided about a woman named Maria who uses many of these technologies on a hypothetical trip to Edinburgh in 2050, such as an intelligent agent to plan her itinerary, augmented reality apps, and eye scans to check into her hotel. The document also discusses artificial intelligence, brain-computer interfaces, virtual avatars, and the concept of technological singularity. In conclusion, it suggests that ubiquitous connectivity and immersive technologies will continue blurring the lines between real and virtual experiences for travelers.
Sundeep Gupta (Director, Orative Corp) takes us through his perspectives on Enterprise mobility and the mobile value-chain on his series on "Hot areas to startup"
Touch&Travel is a project that uses near-field communication (NFC)-enabled mobile phones as tickets for public transportation. It allows passengers to check-in on their phone when starting a trip and check-out when ending to pay automatically based on the travel. The system is being tested in Germany with goals of providing simple, flexible transportation access across multiple operators and modes of transit without needing to purchase tickets in advance. It aims to lower infrastructure costs by using existing mobile networks for communication instead of requiring connection points to power or backend systems.
The recent evolution of mobile auto-identification technologies invites firms to connect to mobile work in altogether new ways. By strategically embedding “smart” devices, organizations involve individual subjects and real objects in their corporate information flows, and execute more and more business pro- cesses through such technologies as mobile Radio-Frequency Identification (RFID). The imminent path from mobility to pervasiveness focuses entirely on improving organizational performance measures and metrics of success. Work itself, and the dramatic changes these technologies introduce to the organiza- tion and to the role of the mobile worker are by and large ignored. The aim of this chapter is to unveil the key changes and challenges that emerge when mobile landscapes are “tagged”, and when mobile workers and mobile auto-identification technologies work side-by-side. The motivation for this chapter is to encourage thoughts that appreciate auto-identification technologies and their socio-technical impact on specific mobile work practices and on the nature of mobile work in general.
Application Development Guidelines: Developing fit-for-purpose applicationsDaniel Appelquist
Presentation on issues with network optimization of mobile apps given at Over the Air 2011, presented by Dr. Kamran Kordi, Deutsche Telekom AG, Group Technology.
Saiful hidayat strengthening cooperation in ict research & development best...Saiful Hidayat
The document discusses research and development in information and communication technologies and how market trends are driving convergence across different areas. It explores key areas for ICT research and development as well as new approaches to market research. Examples of best practices from Telkom's research and development activities are also presented.
A Posteriori Perusal of Mobile ComputingEditor IJCATR
The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote
portable
devices have
access to a shared infrastructure, independent of their physical location. Mobile computing is becoming increasingly vital du
e to the
increase in the number of portable computers and the aspiration to have continuous network connectivity to the Internet i
rrespective of the physical
location of the node.
Mobile computing systems
are computing systems that may be readily moved physically and whose computing ability may be
used while they are being moved. Mobile computing has rapidly become a vital new examp
le in today's real world of networked computing systems. It
includes software, hardware and mobile communication. Ranging from wireless laptops to cellular phones and WiFi/Bluetooth
-
enabled PDA‟s to
wireless sensor networks; mobile computing has become ub
iquitous in its influence on our quotidian lives. In this paper various types of mobile
devices are talking and they are inquiring into in details and existing operation systems that are most famed for mentioned d
evices are talking. Another
aim of this pa
per is to point out some of the characteristics, applications, limitations, and issues of mobile computing
A social web for consumer and embedded devicesVenu Vasudevan
The document discusses bringing the social web to embedded and consumer devices. It explores challenges like efficient web access on constrained devices and opportunities for web overlays to enhance media experiences. Key trends discussed include growing bandwidth, new sensors, and the shift from the web as a destination to a mix-in for content, community and communication. Potential applications proposed include social overlays on mobile and TV, inline search and clip-and-share features for TV.
A review of our Foresight scenarios on the future of intelligent infrastructure systems, five years on. Presented at The Future of Transport conference in Leuven, Belgium, June 2010.
ODCA Forecast 2012 Keynote: Curt Aubley, President, Open Data Center Alliance; VP/CTO NexGen Cyber Innovation & Technology; Lockheed Martin Information Systems & Global Services
Mobile networking is growing rapidly driven by increases in smartphone and tablet adoption. Video now accounts for over 1/3 of consumer internet traffic. Looking ahead, Huawei sees phones becoming the universal device, driven by improved screens, faster networks, and powerful chipsets. This will enable seamless sharing of content between intelligent devices and real-time HD interactions, including cloud-based multiplayer gaming. Mobile operators can capture this growth through differentiated services focused on social networking, communications, and digital media across multiple screens.
Smarcos centers its research on developing new interface designs and increasing usability for interconnected technology users encounter daily. It explores using embedded devices through contextual collaboration and natural human-computer interaction. The document outlines four pilots evaluating these concepts: aviation, monitoring, assistance for disabled people, and vehicle systems. The work iterates through design, implementation, and testing to enhance human-human and human-device interaction employing ubiquitous computing.
Richard Nespola - Presentation at Emerging Communications Conference & Awards...eCommConf
The communications industry is undergoing significant changes as voice services transition to digital platforms and networks. Smartphones and high-speed mobile networks allow for new types of communication applications beyond traditional voice. Major ecosystem players are developing their own voice and messaging services both to gain control of customer relationships and to participate in this changing landscape. Smaller startups are also innovating through new applications and business models that facilitate communication across platforms and networks.
1. The document discusses scenarios of experiential interactive communication through digital arts and cultures. It covers trends in technology, examples, and long-term scenarios.
2. Key technological trends discussed include improvements in interactive surfaces, wireless infrastructure, miniaturized computing, sensors and actuators. Long-term scenarios explore concepts like the semantic web, evolution toolkit, networked and hybrid organisms, and linking minds through cybernetics.
3. Weak signals and pattern management are presented as ways to anticipate the future and create new innovations by breaking down mental models. The document provides an overview of experiential communication through emerging digital technologies.
Immersive technologies like video games, virtual worlds, and social networks are driving innovation in human-computer interfaces. These interfaces are becoming more natural and personalized through technologies like motion tracking, facial recognition, and user profiling. As knowledge becomes embedded in devices and applications, they require less human skill and intelligence to use. This shifts the role of knowledge professionals from disseminating knowledge to developing the technologies that replace human intelligence.
Updated on 9/27/11 - State Maps of Federally Declared Disaster showing FEMA D...coastalwide
All 10 State Maps of Federal Declared Disaster showing Counties Designated by FEMA for Public Assistance (Categories A thru G). Includes map of designated counties in North Carolina, New York, New Jersey, Vermont, Connecticut, Virginia, Pennsylvania, New Hampshire, Rhode Island, and Massachusetts
AFFITNITY Activewear Magazine Covers and AdsAFFITNITY
This document contains a list of 9 image file extensions in the following order: 1.jpg, 2.jpg, 3.jpeg, 4.jpg, 5.jpg, 6.jpg, 7.jpg, 8.jpg, 9.jpg. The document provides a simple listing of sequentially numbered image files.
This document provides information about response to intervention (RTI) practices at Ranchwood Elementary school. It discusses how RTI is used to identify and support students struggling academically as early as possible. It also outlines guidelines for placing students into different intervention tiers and using data to monitor their progress and determine if they qualify for special education services. The goal of RTI is to improve outcomes for all students through early and increasingly intensive intervention.
State Maps of Federally Declared Disaster showing FEMA Designated Counties fo...coastalwide
All 12 State Maps of Federal Declared Disaster showing Counties Designated by FEMA for Public Assistance (Categories A thru G). Includes map of designated counties in North Carolina, New York, New Jersey, Vermont, Connecticut, Virginia, Pennsylvania, New Hampshire, Rhode Island, Massachusetts, Maine and Maryland.
Connecting the Unconnected - Bridging the Digital Divide Using WiMAXDr. Mazlan Abbas
Dr. Mazlan Abbas presented on connecting the unconnected through bridging the digital divide using WiMAX technology. The presentation discussed (1) the national agenda of expanding broadband access, (2) challenges in connecting rural areas, and (3) how WiMAX technologies like 802.16e and the upcoming 802.16j standard can help provide universal broadband access. The goal is to eliminate boundaries and bring value to communities through affordable and reliable internet connections.
This document discusses emerging technologies and their potential impact on the tourism industry by 2050. It describes how technologies like ubiquitous computing, virtual and augmented reality, gestural interfaces, and biometrics could transform the tourism experience. A story is provided about a woman named Maria who uses many of these technologies on a hypothetical trip to Edinburgh in 2050, such as an intelligent agent to plan her itinerary, augmented reality apps, and eye scans to check into her hotel. The document also discusses artificial intelligence, brain-computer interfaces, virtual avatars, and the concept of technological singularity. In conclusion, it suggests that ubiquitous connectivity and immersive technologies will continue blurring the lines between real and virtual experiences for travelers.
Sundeep Gupta (Director, Orative Corp) takes us through his perspectives on Enterprise mobility and the mobile value-chain on his series on "Hot areas to startup"
Touch&Travel is a project that uses near-field communication (NFC)-enabled mobile phones as tickets for public transportation. It allows passengers to check-in on their phone when starting a trip and check-out when ending to pay automatically based on the travel. The system is being tested in Germany with goals of providing simple, flexible transportation access across multiple operators and modes of transit without needing to purchase tickets in advance. It aims to lower infrastructure costs by using existing mobile networks for communication instead of requiring connection points to power or backend systems.
The recent evolution of mobile auto-identification technologies invites firms to connect to mobile work in altogether new ways. By strategically embedding “smart” devices, organizations involve individual subjects and real objects in their corporate information flows, and execute more and more business pro- cesses through such technologies as mobile Radio-Frequency Identification (RFID). The imminent path from mobility to pervasiveness focuses entirely on improving organizational performance measures and metrics of success. Work itself, and the dramatic changes these technologies introduce to the organiza- tion and to the role of the mobile worker are by and large ignored. The aim of this chapter is to unveil the key changes and challenges that emerge when mobile landscapes are “tagged”, and when mobile workers and mobile auto-identification technologies work side-by-side. The motivation for this chapter is to encourage thoughts that appreciate auto-identification technologies and their socio-technical impact on specific mobile work practices and on the nature of mobile work in general.
Application Development Guidelines: Developing fit-for-purpose applicationsDaniel Appelquist
Presentation on issues with network optimization of mobile apps given at Over the Air 2011, presented by Dr. Kamran Kordi, Deutsche Telekom AG, Group Technology.
Saiful hidayat strengthening cooperation in ict research & development best...Saiful Hidayat
The document discusses research and development in information and communication technologies and how market trends are driving convergence across different areas. It explores key areas for ICT research and development as well as new approaches to market research. Examples of best practices from Telkom's research and development activities are also presented.
A Posteriori Perusal of Mobile ComputingEditor IJCATR
The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote
portable
devices have
access to a shared infrastructure, independent of their physical location. Mobile computing is becoming increasingly vital du
e to the
increase in the number of portable computers and the aspiration to have continuous network connectivity to the Internet i
rrespective of the physical
location of the node.
Mobile computing systems
are computing systems that may be readily moved physically and whose computing ability may be
used while they are being moved. Mobile computing has rapidly become a vital new examp
le in today's real world of networked computing systems. It
includes software, hardware and mobile communication. Ranging from wireless laptops to cellular phones and WiFi/Bluetooth
-
enabled PDA‟s to
wireless sensor networks; mobile computing has become ub
iquitous in its influence on our quotidian lives. In this paper various types of mobile
devices are talking and they are inquiring into in details and existing operation systems that are most famed for mentioned d
evices are talking. Another
aim of this pa
per is to point out some of the characteristics, applications, limitations, and issues of mobile computing
A social web for consumer and embedded devicesVenu Vasudevan
The document discusses bringing the social web to embedded and consumer devices. It explores challenges like efficient web access on constrained devices and opportunities for web overlays to enhance media experiences. Key trends discussed include growing bandwidth, new sensors, and the shift from the web as a destination to a mix-in for content, community and communication. Potential applications proposed include social overlays on mobile and TV, inline search and clip-and-share features for TV.
A review of our Foresight scenarios on the future of intelligent infrastructure systems, five years on. Presented at The Future of Transport conference in Leuven, Belgium, June 2010.
ODCA Forecast 2012 Keynote: Curt Aubley, President, Open Data Center Alliance; VP/CTO NexGen Cyber Innovation & Technology; Lockheed Martin Information Systems & Global Services
Mobile networking is growing rapidly driven by increases in smartphone and tablet adoption. Video now accounts for over 1/3 of consumer internet traffic. Looking ahead, Huawei sees phones becoming the universal device, driven by improved screens, faster networks, and powerful chipsets. This will enable seamless sharing of content between intelligent devices and real-time HD interactions, including cloud-based multiplayer gaming. Mobile operators can capture this growth through differentiated services focused on social networking, communications, and digital media across multiple screens.
Smarcos centers its research on developing new interface designs and increasing usability for interconnected technology users encounter daily. It explores using embedded devices through contextual collaboration and natural human-computer interaction. The document outlines four pilots evaluating these concepts: aviation, monitoring, assistance for disabled people, and vehicle systems. The work iterates through design, implementation, and testing to enhance human-human and human-device interaction employing ubiquitous computing.
Richard Nespola - Presentation at Emerging Communications Conference & Awards...eCommConf
The communications industry is undergoing significant changes as voice services transition to digital platforms and networks. Smartphones and high-speed mobile networks allow for new types of communication applications beyond traditional voice. Major ecosystem players are developing their own voice and messaging services both to gain control of customer relationships and to participate in this changing landscape. Smaller startups are also innovating through new applications and business models that facilitate communication across platforms and networks.
1. The document discusses scenarios of experiential interactive communication through digital arts and cultures. It covers trends in technology, examples, and long-term scenarios.
2. Key technological trends discussed include improvements in interactive surfaces, wireless infrastructure, miniaturized computing, sensors and actuators. Long-term scenarios explore concepts like the semantic web, evolution toolkit, networked and hybrid organisms, and linking minds through cybernetics.
3. Weak signals and pattern management are presented as ways to anticipate the future and create new innovations by breaking down mental models. The document provides an overview of experiential communication through emerging digital technologies.
Immersive technologies like video games, virtual worlds, and social networks are driving innovation in human-computer interfaces. These interfaces are becoming more natural and personalized through technologies like motion tracking, facial recognition, and user profiling. As knowledge becomes embedded in devices and applications, they require less human skill and intelligence to use. This shifts the role of knowledge professionals from disseminating knowledge to developing the technologies that replace human intelligence.
Updated on 9/27/11 - State Maps of Federally Declared Disaster showing FEMA D...coastalwide
All 10 State Maps of Federal Declared Disaster showing Counties Designated by FEMA for Public Assistance (Categories A thru G). Includes map of designated counties in North Carolina, New York, New Jersey, Vermont, Connecticut, Virginia, Pennsylvania, New Hampshire, Rhode Island, and Massachusetts
AFFITNITY Activewear Magazine Covers and AdsAFFITNITY
This document contains a list of 9 image file extensions in the following order: 1.jpg, 2.jpg, 3.jpeg, 4.jpg, 5.jpg, 6.jpg, 7.jpg, 8.jpg, 9.jpg. The document provides a simple listing of sequentially numbered image files.
This document provides information about response to intervention (RTI) practices at Ranchwood Elementary school. It discusses how RTI is used to identify and support students struggling academically as early as possible. It also outlines guidelines for placing students into different intervention tiers and using data to monitor their progress and determine if they qualify for special education services. The goal of RTI is to improve outcomes for all students through early and increasingly intensive intervention.
State Maps of Federally Declared Disaster showing FEMA Designated Counties fo...coastalwide
All 12 State Maps of Federal Declared Disaster showing Counties Designated by FEMA for Public Assistance (Categories A thru G). Includes map of designated counties in North Carolina, New York, New Jersey, Vermont, Connecticut, Virginia, Pennsylvania, New Hampshire, Rhode Island, Massachusetts, Maine and Maryland.
Technology for our 21st century learnersebarrera628
The document discusses a technology plan and the E-Rate program. The technology plan aims to prepare students for the future through access to current technologies and partnerships with the community. The E-Rate program provides discounts of 20-90% on telecom services for schools and libraries depending on location and economic need, to ensure affordable access. An application process is required to obtain the E-Rate discounts.
The document discusses key aspects of Response to Intervention (RTI) and how speech-language pathologists (SLPs) can be involved. It outlines the tiers of intervention in RTI from universal screening to increasingly intensive supports. SLPs are encouraged to participate in universal screenings, collaborate on intervention teams, and use data to inform instruction for all students. The goal of RTI is to provide evidence-based, systematic interventions to students struggling in the general education setting before considering special education.
PTOLEMUS Consulting Group provides strategic consulting services to assist clients in the areas of positioning, navigation, location-based content and services, intelligent transportation systems, mobile content and social networking, connectivity, and telematics.
Mobile machines are becoming connected through technologies like GPS, SIM cards, and multi-bearer connected modules, allowing them to know their location, communicate, and become smarter. Industries that will see growth in mobile machine-to-machine communications include transportation and logistics, retail and distribution, hospitality, energy and mining, construction, consumer, emergency services, and health.
Despite assumptions that machines will consume most mobile network bandwidth, projections estimate that by 2014 only 0.38% of the
1) Pervasive computing involves embedding computers into everyday objects and environments to create intelligent environments.
2) Current technologies that enable pervasive computing include wearable computers, smart dust, and context-aware mobile devices.
3) Key challenges for pervasive computing include developing adaptive and context-aware applications, addressing privacy and security concerns, and managing the complexity of large-scale intelligent environments.
Pervasive/ubiquitous computing refers to embedding microprocessors in everyday objects to communicate information and connect devices. The goal is for connectivity to be unobtrusive and always available. Key aspects include wireless technologies, advanced electronics, and the internet connecting smart products. Challenges include creating seamless integration between technology and users.
This document discusses pervasive computing, which involves embedding microprocessors in everyday objects to allow ubiquitous communication and sharing of digital information. Key points include:
- Pervasive computing aims to make technologies seamlessly integrated into daily life through miniaturized, networked "smart objects".
- It builds upon distributed and mobile computing trends towards constant connectivity anywhere.
- Major challenges include scaling the technology as more devices connect, integrating heterogeneous systems, and ensuring user privacy and interface invisibility.
- Research initiatives like Oxygen, Aura and Cooltown aim to advance this vision of ambient intelligence through objects and environments that are responsive to human needs.
- The document discusses how mobile devices enable nomadic computing at the network layer through continuous connectivity and location awareness, but applications still operate largely independently without integration of services and data.
- For nomadic computing to be fully realized, applications need to exhibit transparency, integration, convenience and adaptability across all tiers of the enterprise architecture through shared services and data between applications.
- Achieving nomadic computing at the applications layer could drive greater adoption of mobile devices and new business opportunities by making the mobile experience more seamless.
1) 3G is the third generation of cellular technology that focuses on digital data in addition to voice. It uses technologies like WCDMA and CDMA2000 1x EV-DO.
2) 3G aims to provide high-speed mobile data services like video calling through personal communicators, connecting people to express identities, optimizing traffic, and enabling social learning through community connections.
3) For 3G to succeed, cellular operators need to separate into network providers and service providers while content providers learn the technologies and needs to deliver customized services across different user groups.
Mobile computing allows users to access information and computing resources while mobile. It began in 1981 with the Osborne 1 portable microcomputer. Today's mobile devices like smartphones and tablets use wireless networks to access the internet and cloud-based apps and data from anywhere. They utilize mobile operating systems like Android and iOS and rely on technologies like 4G LTE for high-speed data connectivity on the go. The future of mobile computing may include more powerful devices using nanotechnology, as well as virtual assistants accessible through natural language commands to help users remotely.
This document provides an introduction to mobile computing. It discusses how information is the foundation of decision making and differentiates humans from animals. It explores the evolution of computing from centralized mainframes to ubiquitous computing accessible anywhere, anytime from any device. The document examines the attributes of mobility and how physical mobility evolved into logical mobility. It outlines some motivations and functions of mobile computing as well as examples of mobile applications.
Mobile computing The brief explanation of mobile computing and how it usedAsyathShahina
Mobile computing allows users to access network services anywhere through mobile devices like smartphones and tablets connected to wireless networks. It involves mobile communication infrastructure, portable hardware devices, and software applications designed for mobility. The document outlines the key benefits of mobile computing like connectivity and productivity. It also discusses wireless network technologies, limitations around power and security, and applications in fields like real estate, law, and emergency services. Current trends include advances in artificial intelligence, internet of things, 5G networks, mobile payments, and e-commerce. While limitations remain, mobile computing continues to improve with technological progress.
The document summarizes key telecom trends including the growth of connected devices and machines, big data challenges, cloud computing advances, emerging applications, and the evolution of networks towards more intelligent, automated, and distributed architectures. Major technology directions include the internet of things, content-centric networking, heterogeneous networks, virtualization, and the changing role of telecom operators.
Project Oxygen was an ambitious proposal by MIT to create a global intelligent assistant network. It aimed to make computation ubiquitous and accessible to help humans through natural communication like speech and vision. Major challenges included making the system pervasive, adaptable, and eternal. The proposed approach involved technologies like embedded devices, networks, software, and perception tools to build applications that provide knowledge access, automation, and collaboration.
Mobile computing allows users to access computing resources anywhere through portable devices. It began with early portable calculators and computers and expanded with wireless connectivity. Key aspects include mobile OSes, cellular networks from 1G to 4G, and a variety of applications. Challenges include security, unreliable wireless links, limited resources, and health concerns. However, advances in areas like AI, integrated circuits, and smartphones point to a future with even more powerful and ubiquitous mobile access to information and services.
The document discusses several key concepts in advanced computing techniques including networks, computing, pervasive computing, mobile computing, cloud computing, and big data. Networks allow nodes to share resources by exchanging data through connections established via cable or wireless media. Cloud computing provides on-demand access to configurable computing resources like servers, storage, databases, and applications via the internet. Big data involves extremely large data sets that are difficult to process using traditional data management tools due to their size, diversity and complexity.
What is Ubiquitous Computing?
Ubiquitous computing (alias: Pervasive Computing) is a paradigm in which the processing of information is linked with each activity or object as encountered. It involves connecting electronic devices, including embedding microprocessors to communicate information. Devices that use ubiquitous computing have constant availability and are completely connected.
Ubiquitous computing focuses on learning by removing the complexity of computing and increases efficiency while using computing for different daily activities.
Ubiquitous computing is also known as pervasive computing, everyware and ambient intelligence.
Mobile computing allows access to information from any location using portable devices like phones, laptops, and PDAs. It enables users to access data anytime, anywhere, and in any form. While mobile devices have become more powerful over time, challenges remain around limited bandwidth, smaller screens, and battery life. Emerging technologies like 5G networks and improved processors are helping to address these issues and driving innovations in mobile applications. The future of mobile computing is expected to bring many new products taking advantage of continuing advances in technology.
The document discusses ubiquitous and mobile computing. It describes how ubiquitous computing aims to integrate technology seamlessly into everyday life so that it is invisible to users. It also discusses how mobile computing provides access to information anywhere through devices like smartphones and tablets. Finally, it suggests that as technology becomes more integrated into our lives and environments, new paradigms of interaction will continue to emerge that are inspired by constant access to information through ubiquitous and mobile devices.
Mobile computing allows users to access network services and applications from portable devices anywhere and anytime. It involves wireless communication technologies that power mobile phones, tablets, laptops and other devices. These devices run mobile operating systems like Android and iOS that optimize for limited resources while providing full functionality. Mobile computing has many applications including emergency response, vehicle telematics, e-commerce, industrial automation, home assistance, office productivity and more. It represents a natural evolution of computing towards ubiquitous access through portable, connected devices.
Ubiquitous computing aims to establish an environment where people can access information and computing power anywhere and anytime without being constrained by specific devices. It envisions computing technologies being embedded in everyday objects and the environment. Key aspects include devices that can sense their surroundings and adapt accordingly, as well as making computing virtually invisible to users. The document discusses several scenarios that could benefit from ubiquitous computing technologies and outlines some of the core properties and system designs needed to realize this vision, such as distributed, context-aware and autonomous systems.
NKonnect Infoway is an information technology company headquartered in Rajkot, India that was founded in 2011. It develops innovative solutions including mobile and cloud technologies, the Internet of Things, embedded mobile systems, and human-machine interfaces. The company's vision is to use technology to solve common problems and make systems accessible to all.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Things to Consider When Choosing a Website Developer for your Website | FODUUFODUU
Choosing the right website developer is crucial for your business. This article covers essential factors to consider, including experience, portfolio, technical skills, communication, pricing, reputation & reviews, cost and budget considerations and post-launch support. Make an informed decision to ensure your website meets your business goals.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
20240609 QFM020 Irresponsible AI Reading List May 2024
20110918 Mobile-Wireless
1. Pornprom Ateetanan
Deputy Director
NSTDA Academy
http://www.NSTDAacademy.com
pornprom [dot] ateetanan [at] nstda [dot] or [dot] th
@pornprom
http://www.facebook.com/pornprom.ateetanan
http://www.linkedin.com/in/Pornprom
http://www.slideshare.net/pornprom
1
Sep 18, 2011
Mobile and Wireless Information System
1. Introductory Aspects of Mobile Computing and
Applications
2. The Wireless Revolution
3. Integrating Wireless Technology in Business
4. Wireless Technology: An Entrepreneurial
View
2
2. INTRODUCTION TO MOBILE
COMPUTING
3
Introduction to Mobile Computing
“information at any time, any place, and in any form.
Whether in the office, at home or virtually any
place on earth.”
“mobile computing is the use of computers in a non-
static environment.”
“mobile computing is associated with mobility of
hardware, data and software in computer
applications.”
“The combination of mobile computers and wireless
communications is promoting the evolution of
information technologies to enable an environment
that is often called nomadic/ubiquitous
computing.” 4
3. Ubiquity
3
Anytime Anyplace Anyhow
5
Mobile Computing – an evolution
Primitive
Simple
Limited Capacity
Cumbersome
Unattractive
Sophisticated
Powerful
Complex
Refined
Elegant
6
Explain the mobile computing evolution and compare between them in the past and these days
4. Mobile Devices
Pagers
Mobile Telephone
Notebook/Laptop
PDA
Palmtop/Handheld
Hybrids (Technology Convergence)
Sensors/Embedded Controllers
Wearable Technology
7
Mobile Computing – an evolution
Advances in technology
• more computing power in smaller devices (mobile
chips)
• flat, lightweight displays with low power
consumption
• new user interfaces (due to smaller dimensions)
• more bandwidth per cubic meter
• multiple wireless interfaces: wireless LANs, wireless
WANs, IRDA, Bluetooth etc.
• battery/power improvements
Explain the main developments that have been done to mobile device to increase their ability
8
5. Mobile Computing – an evolution
Context/Location Sensitive Technology
computers are aware of their environment and adapt
(“location awareness”)
Technology Convergence
small, “cheap”, portable, combined, replaceable - no
more separate devices
9
Mobile Computing – a revolution
• Mobile Computing and Technology radically
changes how we do things
• The personal perspective (our private life)
• The organisational perspective (our working life)
• Mobile Computing and Technology is becoming
an integrated and expected part of our existence
• Would you give up the freedom of owning a
mobile phone?
• A luxury or a necessity?
10
6. Perceptions
and
Reality
11
Mobile Technology - Perceptions
12
7. Mobile Technology - Reality
Wireless Voice/Data Communications
Global Positioning Systems
Remote Imaging
Access to Information Systems
What are the main usage of mobile devices in reality ?
13
Mobile Computing Technologies
Systems
Integration Interface
Considerations
Communications, Applications/
Persistent Storage Connectivity and Network Programming
Media Infrastructure
Data Repositories/ Usability
Issues
Database Systems
14
8. Mobile Technology - Applications
• Location Based Systems
• User Requests - Pull
• Show me...
• Where am I and what’s near me?
• Where is the nearest…?
• Where are my friends/resources?
• Broadcasting - Push
• Did you know that…?
• intelligent travel guide with up-to-date
location dependent information
Location Based system is one of the applications of mobile, mention the 2 categories of how it is used 15
Mobile Technology Applications
• Vehicle tracking
16
9. Mobile Technology Applications
Navigation assistance
17
Mobile Technology Applications
Personnel/Asset tracking
Personal security services
Mobiles can be used in location based systems, state some examples about how to use them in such applications 18
10. Mobile Technology Applications
Entertainment
outdoor Internet access
ad-hoc networks for multi user games
MMS
19
Mobile Technology Applications
Emergencies
early transmission of patient data to the hospital,
current status, first diagnosis
replacement of a fixed infrastructures in case of
earthquakes, hurricanes, fire etc.
crisis, war, ...
20
11. Mobile Technology Applications
Health Care
21
Mobile Technology Applications
Mobile Office
Direct access to customer files stored in a central
location
consistent databases for all agents/clients
22
12. Mobile Technology Applications
Education
Enhancing the educational value for students in terms
of provision, availability and access to campus
Welcome to
information through the use of mobile and wireless The
Wireless
computing. Campus
Adopting mobile and wireless technology as
educational technology for the delivery of learning
support material.
Reminder:
Coursework
deadline on Fri.
Message sponsored by
Campus Bookshop
23
Mobile Technology Applications
Field/Knowledge Workers
24
13. Mobile Technology Applications
Mobile Commerce
The ability to purchase goods or services virtually
anywhere through a wireless Internet-enabled
device.
An e-commerce shopping model in which the mobile
phone / PDA replaces the PC.
25
Mobile Technology Applications
Your Applications?
26
14. Conclusion
• Mobile computing technology is becoming more
pervasive each day
• Mobile computing applications are capable of
delivering real business goals and objectives
27
Review Questions
• Explain the mobile computing evolution and compare
between them in the past and these days
• Explain the main developments that have been done to
mobile device to increase their ability
• What are the main usages of mobile devices in reality?
• Location Based system is one of the applications of
mobile, mention the 2 categories of how it is used
• Mobiles can be used in location based systems, state
some examples about how to use them in such
applications
• state some mobile applications.
28
15. THE WIRELESS REVOLUTION
29
Objectives
• Identify the principal wireless transmission media and
devices, cellular network standards and generations,
and standards for mobile Web access
• Describe the major standards for wireless networks
and for wireless Internet access
• Evaluate the role of m-commerce in business and
describe the most important m-commerce applications
• Assess the business value of wireless technology and
describe important wireless applications in business
• Identify and describe the challenges posed by wireless
technology and management solutions
30
16. Boston Public Library Case
Challenge: provide Internet access and services to
thousands of patrons in an historic one million
square foot building
Solution: Develop 802.11b (Wi-Fi) network with 70
access points providing Internet access to
patrons using wireless laptops and PDAs
Extend wireless network to adjacent park and to
library staff to enhance service levels
Illustrates the importance of wireless networking to
service customers at reasonable costs
31
THE WIRELESS COMPUTING LANDSCAPE
The Wireless Revolution
• Mobile phones have become mobile platforms for
delivering digital data, used for recording and
downloading photos, video and music, Internet access,
and transmitting payments.
• An array of technologies provides high-speed wireless
access to the Internet for PCs and other wireless
handheld devices and cell phones.
• Businesses increasingly use wireless to cut costs,
increase flexibility, and create new products and
services.
32
17. THE WIRELESS COMPUTING LANDSCAPE
Mobile Versus Fixed-line Subscribers Worldwide
Source: International Telecommunications
Union, 2002 and 2003, and authors. Figure 9-1
33
THE WIRELESS COMPUTING LANDSCAPE
Business Value of Wireless Networking
• Wireless communication helps businesses easily stay
in touch with customers, suppliers, and employees.
• Wireless networking increases worker productivity and
output, as workers take less time to establish contact
with people and to access information.
• Companies can save on wiring offices, moving, and
making network changes by using wireless networks.
• Wireless technology has also been the source of new
products, services, and sales channels in a variety of
industries, e.g. OnStar, Starbucks “hot spots”.
34
18. THE WIRELESS COMPUTING LANDSCAPE
Wireless Transmission Media and Devices
• All wireless media rely on various parts of
the electromagnetic spectrum.
• Microwave systems transmit high-frequency
radio signals through the atmosphere.
• Communication satellites are used for
geographically dispersed organizations.
35
THE WIRELESS COMPUTING LANDSCAPE
Frequency Ranges for Communications Media and Devices
Figure 9-2
36
19. THE WIRELESS COMPUTING LANDSCAPE
Amoco’s Satellite Transmission System
Figure 9-3 37
THE WIRELESS COMPUTING LANDSCAPE
Devices for Wireless Transmission:
• Paging systems
• E-mail handhelds
• Cellular telephones
• Personal Digital Assistants (PDAs)
• Smart phones
38
20. THE WIRELESS COMPUTING LANDSCAPE
Cellular Network Standards and Generations
Standards:
• Global System for Mobile Communication (GSM)
• Code Division Multiple Access (CDMA)
39
THE WIRELESS COMPUTING LANDSCAPE
Cellular Generations:
• 1G: Analog cellular networks for voice communication
• 2G: Digital wireless networks, primarily for voice
communication; limited data transmission capability
• 2.5G: Interim step toward 3G in the United States
• 3G: High-speed; mobile; supports video and other
rich media; always-on transmission for e-mail, Web
browsing, instant messaging
40
21. THE WIRELESS COMPUTING LANDSCAPE
Mobile Wireless Standards for Web Access
• Wireless Application Protocol (WAP): Uses Wireless
Markup Language (WML) and microbrowsers
• I-mode: Uses compact HTML and allows for continuous
connection
41
THE WIRELESS COMPUTING LANDSCAPE
Wireless Application Protocol (WAP) versus I-mode
Figure 9-4
42
22. WIRELESS COMPUTER NETWORKS AND INTERNET ACCESS
The Institute of Electrical and Electronics Engineers (IEEE)
established a hierarchy of complementary standards for
wireless computer networks.
Global Wireless Network Standards:
• IEEE 802.15 (Bluetooth) for the Personal Area Network
(PAN)
• IEEE 802.11 (Wi-Fi) for the Local Area Network (LAN)
• IEEE 802.16 (WiMax) for the Metropolitan Area Network
(MAN)
• IEEE 802.20 (proposed) standard for the Wide Area
Network (WAN)
43
WIRELESS COMPUTER NETWORKS AND INTERNET ACCESS
Bluetooth
• Can link up to 8 devices in 10-m area
• Low power requirements
44
23. WIRELESS COMPUTER NETWORKS AND INTERNET ACCESS
Wi-Fi
• Three standards: 802.11a, 802.11b, 802.11g
• Infrastructure mode: Devices use access point to
communicate with wired network
• Ad-hoc mode (peer-to-peer): Wireless devices
communicate directly with each other
45
WIRELESS COMPUTER NETWORKS AND INTERNET ACCESS
A Bluetooth Network (PAN)
Figure 9-5
46
24. WIRELESS COMPUTER NETWORKS AND INTERNET ACCESS
An 802.11 Wireless LAN
Figure 9-6
47
M-COMMERCE AND MOBILE COMPUTING
• M-commerce: The use of the Internet for purchasing
goods and services and also for transmitting
messages using wireless mobile devices
• Mobile computing: Enables internet-enabled cell
phones, PDAs, and other wireless computing
devices to access digital information on the Internet
from any location
48
25. M-COMMERCE AND MOBILE COMPUTING
M-Commerce Services and Applications
• Information-based services: Instant messaging, e-mail,
searching for a movie or restaurant using a cell phone or
handheld PDA
• Transaction-based services: Purchasing stocks, concert tickets,
music, or games; searching for the best price for an item using a
cell phone and buying it in a physical store or on the Web
• Personalized services: Services that anticipate what a customer
wants based on that person’s location or data profile, such as
updated airline flight information or beaming coupons for nearby
restaurants
49
M-COMMERCE AND MOBILE COMPUTING
Customer Personalization with the Ubiquitous Internet
Figure 9-8
50
26. M-COMMERCE AND MOBILE COMPUTING
Accessing Information from the Wireless Web
• Wireless portals: Content and services optimized for smaller screens of
mobile devices to steer users to the information they are most likely to
need
• Voice portals: Accept voice commands for accessing Web content, e-
mail, and other electronic applications from a cell phone or standard
telephone
51
M-COMMERCE AND MOBILE COMPUTING
Digital Payment Systems and M-Commerce
• Micropayment system
o Individual service providers run their own separate
payment systems
o Small payments added on to single bill
• Stored payment system
o Cell phone equipped with smart card storing
rechargeable electronic cash
• Mobile Wallets (m-Wallets): Store personal data to use in
online transactions
52
27. M-COMMERCE AND MOBILE COMPUTING
M-Commerce Challenges
• Slow data transfer speeds on second-generation cellular
networks, resulting in higher costs to customer
Limited memory and power supplies
• More Web sites need to be designed specifically for small
wireless devices.
• Keyboards and screens on cell phones are still tiny and
awkward to use.
53
WIRELESS TECHNOLOGY IN THE ENTERPRISE
Wireless Applications for Customer Relationship Management
Wireless CRM enables sales and field service professionals
to:
• Access customer account records and information
at any time or location
• Update customer accounts and deal information to
update customer database instantaneously
Receive alerts to important events
Enter, perform, and update transactions and product
information
54
28. WIRELESS TECHNOLOGY IN THE ENTERPRISE
Pitney Bowes’s Wireless CRM System
Figure 9-9
55
WIRELESS TECHNOLOGY IN THE ENTERPRISE
Wireless Supply Chain Management (SCM)
and Radio Frequency Identification (RFID)
• Wireless supply chain management systems:
Provide simultaneous accurate information about
demand, supply, production, and logistics as
goods move among supply chain partners
• Radio Frequency Identification (RFID) systems:
Provide a powerful technology for tracking the
movement of goods throughout the supply chain
56
29. WIRELESS TECHNOLOGY IN THE ENTERPRISE
How RFID Works
Figure 9-10
57
WIRELESS TECHNOLOGY IN THE ENTERPRISE
Wireless in Health Care
Wireless Applications:
• Electronic Medical Record (EMR) retrieval
• Wireless note taking for patient charts
• Lab test results
• Prescription generation
• Medical databases
58
30. WIRELESS TECHNOLOGY IN THE ENTERPRISE
Wireless Sensor Networks and Pervasive Computing
• Wireless sensor networks (WSNs): Networks of
interconnected wireless devices that are embedded
into the physical environment to provide
measurements of many points over large spaces
• Pervasive computing: Wireless technologies are
pushing computing into every facet of life, including
cars, homes, office buildings, tools and factories;
providing connections anywhere and anytime.
59
WIRELESS TECHNOLOGY IN THE ENTERPRISE
A Wireless Sensor Network
Figure 9-11
Source: From Jason Hill, Mike Horton, Ralph King, and Lakshman Krishnamurthy, “The Platforms Enabling Wireless Sensor
Networks,” Communications of the ACM 47, no. 6 (June 2004). 60
31. MANAGEMENT OPPORTUNITIES, CHALLENGES, AND SOLUTIONS
Management Opportunities:
Wireless technology offers:
• Flexible business processes
• Business processes not limited by time or space
• New channel for communicating with client
• Source of new products and services
61
MANAGEMENT OPPORTUNITIES,
CHALLENGES, AND SOLUTIONS
Management Challenges:
• Integrating wireless technology into the
firm’s IT infrastructure
• Maintaining security and privacy
62
32. MANAGEMENT OPPORTUNITIES,
CHALLENGES, AND SOLUTIONS
Solution Guidelines:
The following are some of the guidelines for managing
mobile technology in the enterprise:
• Identifying areas in which wireless can provide
value
• Creating a management framework for wireless
technology
• Using a pilot program before full-scale rollout of
wireless systems
63
INTEGRATING WIRELESS
TECHNOLOGY IN BUSINESS
64
33. Talking points
1. Explain the business benefits of using wireless
technology
2. Describe the wireless trends that benefit
consumers and businesses
65
BUSINESS DRIVERS FOR A
MOBILE WORKFORCE
• Companies worldwide are going wireless to
increase productivity, speed delivery to market,
and reduce operating costs
• Wireless transmissions rely on radio waves,
microwaves, and satellites to send data across
high frequency radio ranges that later connect
to wired media
66
34. BUSINESS DRIVERS FOR A
MOBILE WORKFORCE
• The terms mobile and wireless are
often used synonymously, but actually
denote two different technologies
• Mobile means the technology can travel
with the user, but it is not necessarily in
real-time
• Wireless gives users a live (Internet)
connection via satellite or radio
transmitters 67
BUSINESS DRIVERS FOR
WIRELESS TECHNOLOGY
68
35. BUSINESS DRIVERS FOR A
MOBILE WORKFORCE
69
BUSINESS DRIVERS FOR A
MOBILE WORKFORCE
70
36. MOBILE WORKFORCE TRENDS
• Social networking gets mobilized
• Mobile TV
• Multi-function devices become cheaper and
more versatile
• Location-based services
• Mobile advertising
• Wireless providers move into home
entertainment
• Wireless security moves to the forefront
• Enterprise mobility
71
CASE: Social Networks
1. Are Facebook, MySpace and LinkedIn using
disruptive or sustaining technology to run
their businesses?
2. What are some of the business challenges
facing social networking sites?
3. What are the characteristics of a social
network?
72
37. CASE: Social Networks
4. What security issues do social networking
sites create?
5. What are some current social networking
trends?
6. How can social networking sites generate
revenue beyond selling banner and text ads?
73
WIRELESS TECHNOLOGY
AN ENTREPRENEURIAL
VIEW
74
38. Wireless Explosion
Wireless Markets Are Dynamic
• Growth markets in wireless technology
include:
• Digital Mobile Telephony
• Wireless Ethernet (802.11x)
• Wireless Mobile Hand held computers
• GPRS
• Convergence is happening in wireless first
• Integrated voice and data
WHY?
75
Why So Much Wireless Activity?
“Wireless technology provides real solutions to
real problems that consumers are willing to pay
for. End of story!”
76
39. An Entrepreneurial Approach
• First of all having a vision is essential.
• Secondly technology is good…
• But technology alone is insufficient
• Thirdly, think beyond the hype.
• What is really needed?
• What will actually work? Can it actually be
built?
• Who is the customer and how much are they
willing to pay?
• Identify what can be leveraged
• Time to market, technology barrier, etc. 77
Vision
Exploring The Possibilities
• Ubiquitous Wireless Service
• Quality, integrated wireless services everywhere
• Fully integrated services and devices
• Media integration Voice, Video and Data
• Service integration – email, vmail, document access,
etc.
• Integrated devices and integrated device
communication
• Security differentiation
• Better than “legacy” wired communication mediums.
• New and improved devices and interfaces
78
40. Reality
Business and Technical Challenges
• Infrastructure is inadequate
• Capacity is constrained, bandwidth limited
• Frequency spectrum is rationed
• Stringent investment community standards
• Un-profitable businesses are punished
• Un-profitable IPOs are a thing of the past
• Venture capital setting a higher bar
• Requiring experience, competitive barrier, and
profitability
• Established vendors/operators are playing it safe
• Tending towards small, evolutionary steps
79
Reality
Network Operators Under The Gun
• Subscriber revenues are declining
• Willing to pay less each year for commodity services
• Specifically Internet access and mobile phone
services
• Operators want new billable services to add
• Appetite for investment in capacity is low
• Need to leverage capacity that exists
• Operators want new, billable services…
• Without having to invest significantly in infrastructure!
80
41. Categorizing Opportunities
• Disruptive
• Obsoletes existing technology
• Digital Mobile Telephony replaced analog
• 802.11x
• Evolutionary
• Enhancements to existing technology
• 802.11a – increased bandwidth over 802.11b
• Text Messaging added to digital telephony
• Integration
• Combining technology to create new product offerings
81
Opportunities
Enhancing Existing Services…
• Video/Satellite broadcast
• Adding bi-directional data flow and interactivity
• Mobile Telephony
• Better Service by improving range, density, quality
• Integration with data
• Wireless Packet Networking
• Reduce power, increase range, integrate security
82
42. Opportunities
Practical Solutions
• Short haul consumer market
• Eliminate wires: Infra-red, Blue Tooth, etc.
• Integrated wireless links between devices
• Security Enhancement and integration
• Simplification of administration
• Integration of encryption/authentication/policy mgt.
• Client/End user
• Power reduction, Miniaturization and cost reduction
• Display enhancement
83
Opportunities
Next Generation
• Broadband Wireless
• Convergence of voice, video and data
• Broadcast media integration
• Integration of satellite and terrestrial networks
The Final Realization Of The Wireless
Vision!
84
43. Rules For Success
Increasing Density and Capacity
• “Capacity problems are best solved by increasing
capacity”
• Spectrum limitations must be solved
• Band aid solutions are not sustainable
• Many solutions intrude on neighboring
vendors/networks/solutions
• Increasing spectrum is the ONLY long term solution
• Bandwidth constraints
• Best solved with added capacity
• QOS only helps when congestion has already occurred
• Customers don’t pay more for better class of service
• They simply change vendors until they’re happy
85
Rules For Success
Wireless Security
• “Encryption in and of itself, is not security.”
• Essential security components need development
• Service Permissions
• Who gets access to what data and services?
• Authentication
• Are you really who you say you are?
• Network protocol and data security
• Is someone watching your activities?
• Can your key be hacked?
• Can your network session be spoofed?
• Integrated management and account administration
• Administrator must easily add, delete and change accounts
86
44. Rules For Success
Simplification
• “Do not expose the customer to technical complexity.”
• Example: Early Deployments of DSL
• Difficult to deploy
• Complex to manage
• Capacity constrained
• Resulted customer dissatisfaction
• 3G – can we avoid another DSL experience?
• New, complex services vs better existing service?
• Capacity is still constrained
• Japan’s 3G killer app – free text messaging
• Vodaphone’s difficulties in deployment in Europe
87
Rules For Success
Sizing Development Efforts
• “ Keep tasks bounded and well defined.”
• Clearly defined development effort
• Believable schedules
• Sensible staff requirements
• Integration with existing platforms
• Well defined interfaces are essential
88
45. • 2.5G-3G will prevail
• It’s a logical incremental, evolutionary step
• Will people really pay more for 3G services?
• WI FI will evolve into a service
• Technology hurdles are surmountable
• It’s here, it works and it’s simple
• Integrators will seize this opportunity
• At some point broadband wireless will happen
• And it will evolve out of 2.5G and Wi Fi
The industry will evolve on a path of least
resistance
89
Summary
Having a vision is better than not having one!
Having the correct vision is even better
Hype generates media attention, not profits
Wireless broadband can and will happen
Enabled by existing technology and integration
Simplicity will prevail
Packet based networks
Intuitive, useful services, available on appropriate
devices
Services that are easily managed and billed for
90
46. References
1. Software Development for Mobile Computing
Applications, Staffordshire University , UK
2. Management Information Systems, Chapter 9 The
Wireless Revolution , @2006 Prentice Hall
3. Integrating Wireless Technology in Business,
Business Driven Technology by Baltzan, Phillips
4. Wireless Technology - An Entrepreneurial View,
Michael Hathaway, Venture Partner, Austin
Ventures
91
This Concludes Today’s Presentation
Thank you for your attention
92