SlideShare a Scribd company logo
Mobilities Throughout The Ages Image by: igylo –Flickr, Creative Commons   By: Rebecca Jane McKee
Mobilities were originally designed to  cater to an older demographic  Image by: performimpact –Flickr, Creative Commons
Image by: ginny_j –Flickr, Creative Commons Over time, the market has expanded to incorporate the entire family, creating applications to meet the needs of every age
Toddlers     &  Mobilities! Image by: b3nj1 –Flickr, Creative Commons
Mobilities are now being designed with the youngest of the household in mind by creating specialized apps to help with their developmental progress Image by: emeth –Flickr, Creative Commons
“Learning to count and recognizing colours, shapes, sounds and patterns are all things that can be done” -Rob Ferguson, author of iPhone Apps a Hit With Preschoolers Image by: oxtopus –Flickr, Creative Commons Source: Iphone Apps a Hit With Preschoolers, Toronto Star
Image by: emeth –Flickr, Creative Commons With these new applications “new pipelines have opened up for play and learning...It’s a very exciting time,” says  Warren Buckleitner of Children’s Technology Review Source: Iphone Apps a Hit With Preschoolers, Toronto Star
Image by: sarahs –Flickr, Creative Commons With the development of toddler applications and the increasing number of mobilities sold to parents, will this extinguish toys such as Leapster from the marketplace?
Kids  & Mobilities!! Image by: loopseque –Flickr, Creative Commons
The children of today have been brought up in a time of rapid technological change Image by: justinm –Flickr, Creative Commons
"Kids today are digital natives. Our research shows that they use their mobile phones to talk, text, take pictures, play games and check Facebook“ -Rose Read of MobileMuster Image by: MelCarminati –Flickr, Creative Commons Source: Schools Should Teach Kids Phone Safety, 9news
A study conducted by Sybase Inc  discovered that children today are more likely to  own a mobile phone than a book!  Image by: bettycrockeras –Flickr, Creative Commons Source: The Growth of Mobile: Stats and figures that will shock you, Sybase Inc
It is great that children are able to use the latest technology but it is important that parents and teachers instruct them about the potential risks associated with having these exciting gadgets Image by: Passive Income Dream.com –Flickr, Creative Commons
Teenagers  & Mobilities! Image by: Cavan Images –Flickr, Creative Commons
Image by: Cavan Images –Flickr, Creative Commons With the emergence of social networking,  parents have been worried about their teenagers social skills with the dramatic shift away from  personal face to face conversations to  predominantly online conversations
Now with the ever growing popularity of data communication, people are beginning to prefer texting as  oppose to calling Image by: Cavan Images –Flickr, Creative Commons
“In December of 2009, the 400 million mobile broadband subscribers accounted for a greater amount of traffic than the world's remaining 4.6 billion mobile phone customers”-from Data Bigger Than Voice On Mobile Networks Image by: stevec –Flickr, Creative Commons Source: Data bigger than voice on mobile networks, The Telegraph
Does this mean that teenagers are shifting away from voice communication too? Image by: Cavan Images –Flickr, Creative Commons
Adults & Mobilities! Image by: Cavan Images –Flickr, Creative Commons
Mobilities have unbelievable capabilities for the adult user.  With an app for just about everything, it makes life a little bit easier!  Image by: Cavan Images –Flickr, Creative Commons
There are some drawbacks with these incredible mobilities though... Image by: Passive Income Dream.com –Flickr, Creative Commons
Recent studies have discovered that iPhones secretly keep track of wherever you go and document the locations it into its system Image by: stevec –Flickr, Creative Commons
“...meaning that anyone who stole the phone or the computer could discover details about the owner's movements using a simple program”- Charles Arthur of “iPhone Keeps Record of Everywhere You Go” Image by: PandukaSenaka –Flickr, Creative Commons Source: Iphone keeps record of everywhere you go, guardian.co.uk
Not only do children have to be careful, so too do adult mobility users! Image by: stevec –Flickr, Creative Commons
Despite a few negative aspects, the development of mobilities has been and continues to be extremely beneficial for the entire family.  Image by: lonisme123 –Flickr, Creative Commons
With the astonishing capabilities of mobilities today, it is hard to fathom what they will be able to do  in the future! Image by: davepatten –Flickr, Creative Commons

More Related Content

What's hot

Wearable Technology - FILM 260
Wearable Technology - FILM 260Wearable Technology - FILM 260
Wearable Technology - FILM 260
venuschung
 
The mobile classroom
The mobile classroomThe mobile classroom
The mobile classroomlogansemple
 
Apples Apps for the Win
Apples Apps for the WinApples Apps for the Win
Apples Apps for the Win8cwj
 
Apple's Apps for the Win
Apple's Apps for the WinApple's Apps for the Win
Apple's Apps for the Win8cwj
 
Millenials and Mobiles Flipbook
Millenials and Mobiles FlipbookMillenials and Mobiles Flipbook
Millenials and Mobiles Flipbook
lchase67
 
The Rise of Wearable Technology
The Rise of Wearable TechnologyThe Rise of Wearable Technology
The Rise of Wearable Technology
Emily McKeown
 
The web you were used to is gone. Architecture and strategy for your content.
The web you were used to is gone. Architecture and strategy for your content.The web you were used to is gone. Architecture and strategy for your content.
The web you were used to is gone. Architecture and strategy for your content.
Alberta Soranzo
 
Teaching Kids to Code
Teaching Kids to CodeTeaching Kids to Code
Teaching Kids to Code
GrahamAttwell
 
Millenials and Mobiles
Millenials and Mobiles Millenials and Mobiles
Millenials and Mobiles
lchase67
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
Julie Coles
 
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Donovan Gopaul
 
Mobile Privacy in the Digital Age
Mobile Privacy in the Digital AgeMobile Privacy in the Digital Age
Mobile Privacy in the Digital Age
helena_wade
 
Mobile Phone Addiction
Mobile Phone Addiction Mobile Phone Addiction
Mobile Phone Addiction
kangus314
 
Our addiction to being connected
Our addiction to being connected Our addiction to being connected
Our addiction to being connected
Emily Duggan
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & Etiquette
Christie Stelling
 
Traverse kolb 2010
Traverse kolb 2010Traverse kolb 2010
Traverse kolb 2010elizkeren
 
And We Shall Call it Freedom: How We Chose to End Privacy
And We Shall Call it Freedom: How We Chose to End PrivacyAnd We Shall Call it Freedom: How We Chose to End Privacy
And We Shall Call it Freedom: How We Chose to End Privacy
Robbie Venis
 
Bread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to OurselvesBread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to Ourselves
Jonah Chin
 
Toddlers and Touch Screens
Toddlers and Touch ScreensToddlers and Touch Screens
Toddlers and Touch Screenslenlen1313
 

What's hot (20)

Wearable Technology - FILM 260
Wearable Technology - FILM 260Wearable Technology - FILM 260
Wearable Technology - FILM 260
 
The mobile classroom
The mobile classroomThe mobile classroom
The mobile classroom
 
Apples Apps for the Win
Apples Apps for the WinApples Apps for the Win
Apples Apps for the Win
 
Apple's Apps for the Win
Apple's Apps for the WinApple's Apps for the Win
Apple's Apps for the Win
 
Millenials and Mobiles Flipbook
Millenials and Mobiles FlipbookMillenials and Mobiles Flipbook
Millenials and Mobiles Flipbook
 
The Rise of Wearable Technology
The Rise of Wearable TechnologyThe Rise of Wearable Technology
The Rise of Wearable Technology
 
The web you were used to is gone. Architecture and strategy for your content.
The web you were used to is gone. Architecture and strategy for your content.The web you were used to is gone. Architecture and strategy for your content.
The web you were used to is gone. Architecture and strategy for your content.
 
Teaching Kids to Code
Teaching Kids to CodeTeaching Kids to Code
Teaching Kids to Code
 
Millenials and Mobiles
Millenials and Mobiles Millenials and Mobiles
Millenials and Mobiles
 
Film 260 flipbook
Film 260 flipbookFilm 260 flipbook
Film 260 flipbook
 
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.Data:The Fine Balance.We Trade Privacy for Convenience and Security.
Data:The Fine Balance.We Trade Privacy for Convenience and Security.
 
Flipbook
FlipbookFlipbook
Flipbook
 
Mobile Privacy in the Digital Age
Mobile Privacy in the Digital AgeMobile Privacy in the Digital Age
Mobile Privacy in the Digital Age
 
Mobile Phone Addiction
Mobile Phone Addiction Mobile Phone Addiction
Mobile Phone Addiction
 
Our addiction to being connected
Our addiction to being connected Our addiction to being connected
Our addiction to being connected
 
The Evolution of Technology & Etiquette
The Evolution of Technology & EtiquetteThe Evolution of Technology & Etiquette
The Evolution of Technology & Etiquette
 
Traverse kolb 2010
Traverse kolb 2010Traverse kolb 2010
Traverse kolb 2010
 
And We Shall Call it Freedom: How We Chose to End Privacy
And We Shall Call it Freedom: How We Chose to End PrivacyAnd We Shall Call it Freedom: How We Chose to End Privacy
And We Shall Call it Freedom: How We Chose to End Privacy
 
Bread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to OurselvesBread Crumbs: How We are Building an Online Map to Ourselves
Bread Crumbs: How We are Building an Online Map to Ourselves
 
Toddlers and Touch Screens
Toddlers and Touch ScreensToddlers and Touch Screens
Toddlers and Touch Screens
 

Similar to Mobilities Throughout The Ages

Kids and Mobile Phones
Kids and Mobile PhonesKids and Mobile Phones
Kids and Mobile Phonesjmaria31
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
Aleque Juneau
 
Children, Technology and the Future
Children, Technology and the Future Children, Technology and the Future
Children, Technology and the Future chawla15c
 
How Young is Too Young?
How Young is Too Young? How Young is Too Young?
How Young is Too Young?
sshrimali
 
Toddlers and Touch Screens
Toddlers and Touch ScreensToddlers and Touch Screens
Toddlers and Touch Screenslenlen1313
 
Children and mobile education
Children and mobile educationChildren and mobile education
Children and mobile education
danseanmac
 
Film flipbook mobilities
Film flipbook   mobilitiesFilm flipbook   mobilities
Film flipbook mobilitiesagoody
 
Digital Technology for a Digitized Culture
Digital Technology for a Digitized CultureDigital Technology for a Digitized Culture
Digital Technology for a Digitized Culture
samanthawymes
 
Technological Classroom
Technological ClassroomTechnological Classroom
Technological ClassroomAngela Su
 
Children, Technology, and the Evolution of Education
Children, Technology, and the Evolution of EducationChildren, Technology, and the Evolution of Education
Children, Technology, and the Evolution of Education
8cr1
 
Networked Individualism
Networked IndividualismNetworked Individualism
Networked Individualism
kels33
 
Blackberry... or Crackberry?
Blackberry... or Crackberry?Blackberry... or Crackberry?
Blackberry... or Crackberry?
Margaret O'Donoghue
 
The Touch-Screen Generation
The Touch-Screen GenerationThe Touch-Screen Generation
The Touch-Screen Generation
sehannay
 

Similar to Mobilities Throughout The Ages (20)

Film 315 presentation
Film 315 presentationFilm 315 presentation
Film 315 presentation
 
Kids and Mobile Phones
Kids and Mobile PhonesKids and Mobile Phones
Kids and Mobile Phones
 
Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?Is Online Privacy a Thing of the Past?
Is Online Privacy a Thing of the Past?
 
Children, Technology and the Future
Children, Technology and the Future Children, Technology and the Future
Children, Technology and the Future
 
How Young is Too Young?
How Young is Too Young? How Young is Too Young?
How Young is Too Young?
 
Toddlers and Touch Screens
Toddlers and Touch ScreensToddlers and Touch Screens
Toddlers and Touch Screens
 
e learning
e learninge learning
e learning
 
Children and mobile education
Children and mobile educationChildren and mobile education
Children and mobile education
 
Elearning
ElearningElearning
Elearning
 
Flipbook
FlipbookFlipbook
Flipbook
 
Film project 2
Film project 2Film project 2
Film project 2
 
Film flipbook mobilities
Film flipbook   mobilitiesFilm flipbook   mobilities
Film flipbook mobilities
 
Digital Technology for a Digitized Culture
Digital Technology for a Digitized CultureDigital Technology for a Digitized Culture
Digital Technology for a Digitized Culture
 
Untitled1
Untitled1Untitled1
Untitled1
 
Technological Classroom
Technological ClassroomTechnological Classroom
Technological Classroom
 
Children, Technology, and the Evolution of Education
Children, Technology, and the Evolution of EducationChildren, Technology, and the Evolution of Education
Children, Technology, and the Evolution of Education
 
Networked Individualism
Networked IndividualismNetworked Individualism
Networked Individualism
 
Slide
SlideSlide
Slide
 
Blackberry... or Crackberry?
Blackberry... or Crackberry?Blackberry... or Crackberry?
Blackberry... or Crackberry?
 
The Touch-Screen Generation
The Touch-Screen GenerationThe Touch-Screen Generation
The Touch-Screen Generation
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 

Mobilities Throughout The Ages

  • 1. Mobilities Throughout The Ages Image by: igylo –Flickr, Creative Commons By: Rebecca Jane McKee
  • 2. Mobilities were originally designed to cater to an older demographic Image by: performimpact –Flickr, Creative Commons
  • 3. Image by: ginny_j –Flickr, Creative Commons Over time, the market has expanded to incorporate the entire family, creating applications to meet the needs of every age
  • 4. Toddlers & Mobilities! Image by: b3nj1 –Flickr, Creative Commons
  • 5. Mobilities are now being designed with the youngest of the household in mind by creating specialized apps to help with their developmental progress Image by: emeth –Flickr, Creative Commons
  • 6. “Learning to count and recognizing colours, shapes, sounds and patterns are all things that can be done” -Rob Ferguson, author of iPhone Apps a Hit With Preschoolers Image by: oxtopus –Flickr, Creative Commons Source: Iphone Apps a Hit With Preschoolers, Toronto Star
  • 7. Image by: emeth –Flickr, Creative Commons With these new applications “new pipelines have opened up for play and learning...It’s a very exciting time,” says Warren Buckleitner of Children’s Technology Review Source: Iphone Apps a Hit With Preschoolers, Toronto Star
  • 8. Image by: sarahs –Flickr, Creative Commons With the development of toddler applications and the increasing number of mobilities sold to parents, will this extinguish toys such as Leapster from the marketplace?
  • 9. Kids & Mobilities!! Image by: loopseque –Flickr, Creative Commons
  • 10. The children of today have been brought up in a time of rapid technological change Image by: justinm –Flickr, Creative Commons
  • 11. "Kids today are digital natives. Our research shows that they use their mobile phones to talk, text, take pictures, play games and check Facebook“ -Rose Read of MobileMuster Image by: MelCarminati –Flickr, Creative Commons Source: Schools Should Teach Kids Phone Safety, 9news
  • 12. A study conducted by Sybase Inc discovered that children today are more likely to own a mobile phone than a book! Image by: bettycrockeras –Flickr, Creative Commons Source: The Growth of Mobile: Stats and figures that will shock you, Sybase Inc
  • 13. It is great that children are able to use the latest technology but it is important that parents and teachers instruct them about the potential risks associated with having these exciting gadgets Image by: Passive Income Dream.com –Flickr, Creative Commons
  • 14. Teenagers & Mobilities! Image by: Cavan Images –Flickr, Creative Commons
  • 15. Image by: Cavan Images –Flickr, Creative Commons With the emergence of social networking, parents have been worried about their teenagers social skills with the dramatic shift away from personal face to face conversations to predominantly online conversations
  • 16. Now with the ever growing popularity of data communication, people are beginning to prefer texting as oppose to calling Image by: Cavan Images –Flickr, Creative Commons
  • 17. “In December of 2009, the 400 million mobile broadband subscribers accounted for a greater amount of traffic than the world's remaining 4.6 billion mobile phone customers”-from Data Bigger Than Voice On Mobile Networks Image by: stevec –Flickr, Creative Commons Source: Data bigger than voice on mobile networks, The Telegraph
  • 18. Does this mean that teenagers are shifting away from voice communication too? Image by: Cavan Images –Flickr, Creative Commons
  • 19. Adults & Mobilities! Image by: Cavan Images –Flickr, Creative Commons
  • 20. Mobilities have unbelievable capabilities for the adult user. With an app for just about everything, it makes life a little bit easier! Image by: Cavan Images –Flickr, Creative Commons
  • 21. There are some drawbacks with these incredible mobilities though... Image by: Passive Income Dream.com –Flickr, Creative Commons
  • 22. Recent studies have discovered that iPhones secretly keep track of wherever you go and document the locations it into its system Image by: stevec –Flickr, Creative Commons
  • 23. “...meaning that anyone who stole the phone or the computer could discover details about the owner's movements using a simple program”- Charles Arthur of “iPhone Keeps Record of Everywhere You Go” Image by: PandukaSenaka –Flickr, Creative Commons Source: Iphone keeps record of everywhere you go, guardian.co.uk
  • 24. Not only do children have to be careful, so too do adult mobility users! Image by: stevec –Flickr, Creative Commons
  • 25. Despite a few negative aspects, the development of mobilities has been and continues to be extremely beneficial for the entire family. Image by: lonisme123 –Flickr, Creative Commons
  • 26. With the astonishing capabilities of mobilities today, it is hard to fathom what they will be able to do in the future! Image by: davepatten –Flickr, Creative Commons