SlideShare a Scribd company logo
UBIQUITOUS COMPUTING
Research course Advanced topics in IT
1.0V
prepared by: Eng. Mohammed Ali A. Hadi
Sana’a University
February , 2018
What is Ubicomp ?
 Ubiquitous Computing is a post-desktop model of human-computer
interaction in which information processing has been thoroughly
integrated into everyday objects and activities. Computing is
embedded everywhere in the environment (Computing & processing is
embedded into everyday devices).
 Information access and communication is possible virtually everywhere
 Devices can be connected and networked
 It is also called Pervasive Computing.
History:
 Mark Weiser is the father of ubiquitous computing. He coined the phrase "ubiquitous
computing" around 1988.
 He was working as Chief Technologist at the CS Lab of Xerox Palo Alto Research Center
in the late 1980’s and was articulated the current of computing.
 He wrote some of the earliest papers on the subject, largely defining it and sketching
out its major concerns. He developed the initial initiatives of ubiquitous computing in
the form of tabs, pads, and boards, built at Xerox PARC, 1988-1994.
Examples:
Examples:
Examples:
Ubiquitous Systems:
How to achieve ubiquity?
• Make computing mobile and connected
• Instrument the person
• Instrument the physical environment
 What makes Ubicomp?
• Processing
• Cheaper, faster, smaller, more energy efficient
• Storage
• Big, fast, small in size (Hardware)
• Networking
• Global, local, ad-hoc, low- power, high bandwidth, low latencies
• Sensors
• Types, speed, accuracy, price and robustness
• Displays
• Projection, flexible materials, low power
• Actuators
 Challenges to Ubicomp
• Defining the appropriate physical interaction experience
• Discovering general application features
• Understanding interaction in Ubicomp
• Evaluation challenges for Ubicomp
 Application themes for Ubicomp
• Context-aware computing
Sensed phenomena facilitate easier interaction
• Automated capture and access
Live experiences stored for future access
• Toward continuous interaction
Everyday activities have no clear begin-end conditions
 Summary
• With advanced technology, computing has become an intervention in all
activities and will change life, by putting sensors in the environment
around us became more effective interaction. Now the devices can know
what the user wants through his movements and analyze his activity
Through the mobile can determine the person's behavior
And other smart things such as smart TV, refrigerator, air conditioners
and etc.
 References:
• Article “What is Ubiquitous Computing Technology? Easy Introduction and Complete
Guide” Fahad Nalain M.
https://steemit.com/technology/@faad/what-is-ubiquitous-computing-technology-easy-
introduction-and-complete-guide
• Journal “Ubiquitous Computing: A Brief Review of Impacts and Issues”
• Wikipedia.org
• Google.com

More Related Content

What's hot

UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
Rutvik Pensionwar
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
Abhinav Wagadre
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Sangeetha Sg
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
OMAN1991
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
Aashish Jain
 
Ubiquitous Computing - The Future of Computing
Ubiquitous Computing - The Future of ComputingUbiquitous Computing - The Future of Computing
Ubiquitous Computing - The Future of Computing
Shiraz Shrestha
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentation
Rameshkumar1829
 
Pervasive computing
Pervasive computing Pervasive computing
Pervasive computing
BhaktiKarale
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Anshuman Biswal
 
Internet of Things - a primer
Internet of Things  - a primerInternet of Things  - a primer
Internet of Things - a primer
Joakim Lindbom
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
VENKATA RAMANA PRABHALAVEEDU
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
Mphasis
 
Ubiquoitous Computing
Ubiquoitous ComputingUbiquoitous Computing
Ubiquoitous Computing
Vishwajeet Vatharkar
 
Ubiquitous computing applications
Ubiquitous computing applicationsUbiquitous computing applications
Ubiquitous computing applications
Hamza Malik
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Riya Choudhary
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
Rob Manson
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
Honeyson Joseph
 
Operating System Support for Ubiquitous Computing
Operating System Support for Ubiquitous ComputingOperating System Support for Ubiquitous Computing
Operating System Support for Ubiquitous Computing
Isuru Abeywardana
 
Ubi Comp Wla Ola 2008 Short Version
Ubi Comp Wla Ola 2008   Short VersionUbi Comp Wla Ola 2008   Short Version
Ubi Comp Wla Ola 2008 Short Version
Libraryman
 

What's hot (20)

UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
Ubiquitous Computing - The Future of Computing
Ubiquitous Computing - The Future of ComputingUbiquitous Computing - The Future of Computing
Ubiquitous Computing - The Future of Computing
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentation
 
Pervasive computing
Pervasive computing Pervasive computing
Pervasive computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Internet of Things - a primer
Internet of Things  - a primerInternet of Things  - a primer
Internet of Things - a primer
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Ubiquoitous Computing
Ubiquoitous ComputingUbiquoitous Computing
Ubiquoitous Computing
 
Ubiquitous computing applications
Ubiquitous computing applicationsUbiquitous computing applications
Ubiquitous computing applications
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
Introduction to Ubiquitous Computing
Introduction to Ubiquitous ComputingIntroduction to Ubiquitous Computing
Introduction to Ubiquitous Computing
 
Operating System Support for Ubiquitous Computing
Operating System Support for Ubiquitous ComputingOperating System Support for Ubiquitous Computing
Operating System Support for Ubiquitous Computing
 
Ubi Comp Wla Ola 2008 Short Version
Ubi Comp Wla Ola 2008   Short VersionUbi Comp Wla Ola 2008   Short Version
Ubi Comp Wla Ola 2008 Short Version
 

Similar to Ubiquitous computing 1.0

ubicom-ch02-slides.ppt
ubicom-ch02-slides.pptubicom-ch02-slides.ppt
ubicom-ch02-slides.ppt
SattiBabu16
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
Purvi Sankhe
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
deaneal
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
Assem mousa
 
Ubiquitous Computing: an Introduction
Ubiquitous Computing: an IntroductionUbiquitous Computing: an Introduction
Ubiquitous Computing: an Introduction
Alessandra Agostini
 
Embedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignEmbedded & Tangible Interaction Design
Embedded & Tangible Interaction Design
Dave Shaw
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingu065932
 
Lecture # 8.ppt
Lecture # 8.pptLecture # 8.ppt
Lecture # 8.ppt
HumzaWaris1
 
Chap1 introducing today's technologies
Chap1 introducing today's technologiesChap1 introducing today's technologies
Chap1 introducing today's technologies
LeslynBonachita1
 
Hci [5]paradigm
Hci [5]paradigmHci [5]paradigm
Hci [5]paradigm
Welly Dian Astika
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdf
Hina Afzal
 
IOT UNIT I.pptx
IOT UNIT I.pptxIOT UNIT I.pptx
IOT UNIT I.pptx
sufiyashaikh19
 
Ubiquitous Technology and Ambient Learning Opening New Ways to Instructional...
Ubiquitous Technology and Ambient Learning Opening New Ways to  Instructional...Ubiquitous Technology and Ambient Learning Opening New Ways to  Instructional...
Ubiquitous Technology and Ambient Learning Opening New Ways to Instructional...Malik Sajjad Ahmad Awan
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
Dhiraj Shinde
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Ankita Gupta
 
cloud of things Presentation
cloud of things Presentation cloud of things Presentation
cloud of things Presentation
Assem mousa
 
IoT overview 2014
IoT overview 2014IoT overview 2014
IoT overview 2014
Mirko Presser
 
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdfSYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
shubhangisonawane6
 
Designing Smart Things: user experience design for networked devices
Designing Smart Things: user experience design for networked devicesDesigning Smart Things: user experience design for networked devices
Designing Smart Things: user experience design for networked devices
Mike Kuniavsky
 
IOT Introduction.pptx
IOT Introduction.pptxIOT Introduction.pptx
IOT Introduction.pptx
murugesanarumugam
 

Similar to Ubiquitous computing 1.0 (20)

ubicom-ch02-slides.ppt
ubicom-ch02-slides.pptubicom-ch02-slides.ppt
ubicom-ch02-slides.ppt
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
 
Ubiquitous Computing: an Introduction
Ubiquitous Computing: an IntroductionUbiquitous Computing: an Introduction
Ubiquitous Computing: an Introduction
 
Embedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignEmbedded & Tangible Interaction Design
Embedded & Tangible Interaction Design
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Lecture # 8.ppt
Lecture # 8.pptLecture # 8.ppt
Lecture # 8.ppt
 
Chap1 introducing today's technologies
Chap1 introducing today's technologiesChap1 introducing today's technologies
Chap1 introducing today's technologies
 
Hci [5]paradigm
Hci [5]paradigmHci [5]paradigm
Hci [5]paradigm
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdf
 
IOT UNIT I.pptx
IOT UNIT I.pptxIOT UNIT I.pptx
IOT UNIT I.pptx
 
Ubiquitous Technology and Ambient Learning Opening New Ways to Instructional...
Ubiquitous Technology and Ambient Learning Opening New Ways to  Instructional...Ubiquitous Technology and Ambient Learning Opening New Ways to  Instructional...
Ubiquitous Technology and Ambient Learning Opening New Ways to Instructional...
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
cloud of things Presentation
cloud of things Presentation cloud of things Presentation
cloud of things Presentation
 
IoT overview 2014
IoT overview 2014IoT overview 2014
IoT overview 2014
 
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdfSYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
SYBSC(CS)_WCIOT_Sem-II-Unit 3 IoT Architecture.pdf
 
Designing Smart Things: user experience design for networked devices
Designing Smart Things: user experience design for networked devicesDesigning Smart Things: user experience design for networked devices
Designing Smart Things: user experience design for networked devices
 
IOT Introduction.pptx
IOT Introduction.pptxIOT Introduction.pptx
IOT Introduction.pptx
 

Recently uploaded

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

Ubiquitous computing 1.0

  • 1. UBIQUITOUS COMPUTING Research course Advanced topics in IT 1.0V prepared by: Eng. Mohammed Ali A. Hadi Sana’a University February , 2018
  • 2. What is Ubicomp ?  Ubiquitous Computing is a post-desktop model of human-computer interaction in which information processing has been thoroughly integrated into everyday objects and activities. Computing is embedded everywhere in the environment (Computing & processing is embedded into everyday devices).  Information access and communication is possible virtually everywhere  Devices can be connected and networked  It is also called Pervasive Computing.
  • 3. History:  Mark Weiser is the father of ubiquitous computing. He coined the phrase "ubiquitous computing" around 1988.  He was working as Chief Technologist at the CS Lab of Xerox Palo Alto Research Center in the late 1980’s and was articulated the current of computing.  He wrote some of the earliest papers on the subject, largely defining it and sketching out its major concerns. He developed the initial initiatives of ubiquitous computing in the form of tabs, pads, and boards, built at Xerox PARC, 1988-1994.
  • 8. How to achieve ubiquity? • Make computing mobile and connected • Instrument the person • Instrument the physical environment
  • 9.  What makes Ubicomp? • Processing • Cheaper, faster, smaller, more energy efficient • Storage • Big, fast, small in size (Hardware) • Networking • Global, local, ad-hoc, low- power, high bandwidth, low latencies • Sensors • Types, speed, accuracy, price and robustness • Displays • Projection, flexible materials, low power • Actuators
  • 10.  Challenges to Ubicomp • Defining the appropriate physical interaction experience • Discovering general application features • Understanding interaction in Ubicomp • Evaluation challenges for Ubicomp
  • 11.  Application themes for Ubicomp • Context-aware computing Sensed phenomena facilitate easier interaction • Automated capture and access Live experiences stored for future access • Toward continuous interaction Everyday activities have no clear begin-end conditions
  • 12.  Summary • With advanced technology, computing has become an intervention in all activities and will change life, by putting sensors in the environment around us became more effective interaction. Now the devices can know what the user wants through his movements and analyze his activity Through the mobile can determine the person's behavior And other smart things such as smart TV, refrigerator, air conditioners and etc.
  • 13.  References: • Article “What is Ubiquitous Computing Technology? Easy Introduction and Complete Guide” Fahad Nalain M. https://steemit.com/technology/@faad/what-is-ubiquitous-computing-technology-easy- introduction-and-complete-guide • Journal “Ubiquitous Computing: A Brief Review of Impacts and Issues” • Wikipedia.org • Google.com