SlideShare a Scribd company logo
The Computer For 21st Century
By:-
Govind Raj
(IT -1001227464)
Topics of Discussion
 What is Ubiquitous Computing??
 Trends in Computing.
 Comparison of Similar Technologies.
 Features of Ubiquitous Computing.
 Some Ubiquitous Computing research
Applications
 Real time challenges
 Conclusion.
What is “Ubiquitous”?
U.biq.ui.tous (yōō-bĭk'wĭ-təs)
existing or being everywhere, esp.
at the same time; omnipresent:
ubiquitous fog; ubiquitous little
ants.
Mark Weiser:
the father of ubiquitous computing
 has called UC “…highest idea is to make a computer so
embedded, so fitting, so natural, that we use it without even
thinking about it.”
 “In the 21st century the technology revolution will move into the everyday,
the small and the invisible…”
 “The most profound technologies are those that disappear. They weave
themselves into the fabrics of everyday life until they are indistinguishable
from it.”
What is Ubiquitous Computing???
Ubiquitous computing is the method of
enhancing computer use by making many
computers available throughout the
physical environment, but making them
effectively invisible to the user
– Mark Weiser
An environment in which people interact with
embedded computers (processors) and in
which networked devices are aware of their
surroundings (to being pervasive)
Three Waves of Computing
● Mainframe computing era
– massive computers to execute big data processing applications
– very few computers in the world
● Desktop computing era
– one computer at every desk to help in business related activities
– computers connected in intranets to a massive global network
(internet), all wired
● Ubiquitous computing era
– tens/hundreds of computing devices in every
room/person, becoming
“invisible” and part of the environment
Computing Trends…
How to achieve Ubiquity???
 Make Computing mobile
and connected
• Instrument the person
 Instrument the physical
surroundings
What makes it possible…
 Processing
 cheaper, faster, smaller, more energy efficient
 Storage
 Big, fast and small in size.
 Networking
 global, local, ad-hoc, low-power, high bandwidth, low latencies
 Sensors
 Displays
 projection, flexible materials, power consumption
1GB in Flashcard format
Related Computing Technologies
 Pervasive Computing
 Wearable Computing
 Ambient Intelligence
When Taken With Objects ,it is also
Internet of Things
Things That Think/Smart Objects(tabs ,boards and
pads)
Technologies continued…
Pervasive Computing:
An environment in which people interact with
embedded (and mostly invisible) computers
(processors) and in which networked devices are aware
of their surroundings and peers and are able to provide
services or use services from peers effectively
Wearable Computing:
Wearable technology, tech togs, or fashion
electronics are clothing and accessories incorporating
computer and advanced electronic technologies.
 In computing , Ambient Intelligence refers to
electronic environments that are sensitive and
responsive to the presence of people. Ambient
intelligence is a vision on the future of consumer
electronics ,telecommunications and computing.
 As these devices grow smaller, more connected and
more integrated into our environment, the technology
disappears into our surroundings …….TOWARDS
UBIQUITY…
Technologies continued…
Key Technologies
Ubiquitous Computing
Ubiquitous vs Cloud Computing
Ubiquitous Computing describes a computer not as a self
contained object, but as multiple objects that are
everywhere (hence, ubiquitous), and are part of our daily
life from the most simple tasks to the most complex ones.
However,
Cloud Computing doesn’t put the computer everywhere
but, instead, it gives access to it everywhere. As for Cloud
Computing doesn’t have the intention to break with
traditional computing.
General Ubicomp Features
 There are three general features that are shared
across a wide variety of ubicomp applications.
 These features are :
1. the ability to provide transparent interfaces
2. the ability to automatically adapt the behavior of a
program based on knowledge of the context of its
use,
3. the ability to automate the capture of live
experiences for later recall.
GUF - (1) TRANSPARENT INTERFACES
 Ubicomp Vision: “pervasive computation without
intrusion.”
 Remove the physical barrier between user and
computational device
 Keyboard and mouse are still the most commonly
used interfaces !!
 Need:
 flexible interfaces
 Varied interfaces that can provide similar functionality
GUF - (2) CONTEXT AWARENESS
 Context – information about the environment in which
the application operates and reacts accordingly.
 LOCATION and TIME are simple examples of context !
 Context aware application:
 is one which can capture the context
 assign meaning to it
 change behavior accordingly
 Need:
 Applications that are context aware and allow rapid
personalization of their services.
GUF - (3) AUTOMATED CAPTURE
 Capture everyday experiences and make the
records available for later use.
 Constraints:
 Multiple streams of information
 Their time synchronization
 Their correlation and integration
 Need:
 Automated tools that support capture, integration and
future access of info.
Sensors and context-aware solutions are
on the market already
Research
organizations Industry Sensors Vendors
+
Universities
Research
Institutes
+
Universities
Research
Institutes
 Smarter Phones
 Health care
 Home care (smarter homes)
 Intelligent Transportation Systems
 Natural disaster-specific warning purposes
 Interactive Wall paper , vanet
 Remote Eyes , active badge
 Goggle Glasses
 Ubiquitous City(U-City)
Applications…
Few Examples…
Challenges of Ubicomp
How to integrate mobile communicators
into complex information infrastructures?
 What effect will they have on work and
leisure?
Secure and reliable services
How to develop and manage
adaptable, context-aware software systems?
What support is needed within the
network?
Power supplies.
Working Example
Conclusion
 Pervasive computing provides an attractive vision for
the future of computing
 Computational power will be available everywhere
through mobile and stationary devices
Ubiquitous computing is the next generation
computing environment with information &
communication technology everywhere, for
everyone, at all times.
Ubiquitous Computing is all about Human!
Because we love comfortable living!!!
Sci-fi movie is not far from reality

More Related Content

What's hot

Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
gaurav koriya
 
Internet of things startup basic
Internet of things  startup basicInternet of things  startup basic
Internet of things startup basic
Mathan kumar
 
Human Computer Interaction - INPUT OUTPUT CHANNELS
Human Computer Interaction - INPUT OUTPUT CHANNELSHuman Computer Interaction - INPUT OUTPUT CHANNELS
Human Computer Interaction - INPUT OUTPUT CHANNELS
International Institute of Information Technology (I²IT)
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
Sangeetha Sg
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
Devyani Vasistha
 
IoT
IoTIoT
Mobile Information Architecture
Mobile Information ArchitectureMobile Information Architecture
Mobile Information Architecture
Lifna C.S
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
123seminarsonly
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Dr. Mazlan Abbas
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstract
Priti Punia
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introduction
nicole_wang
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
Purvi Sankhe
 
Virtualization
VirtualizationVirtualization
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
Phearin Sok
 
UBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MUBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary M
Mary Margarat
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
Devdutta Chakrabarti
 
Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computing
Likan Patra
 
Data Analytics for IoT
Data Analytics for IoT Data Analytics for IoT
Data Analytics for IoT
Muralidhar Somisetty
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling Technologies
Prakash Honnur
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
Prakash Honnur
 

What's hot (20)

Mobile Computing
Mobile ComputingMobile Computing
Mobile Computing
 
Internet of things startup basic
Internet of things  startup basicInternet of things  startup basic
Internet of things startup basic
 
Human Computer Interaction - INPUT OUTPUT CHANNELS
Human Computer Interaction - INPUT OUTPUT CHANNELSHuman Computer Interaction - INPUT OUTPUT CHANNELS
Human Computer Interaction - INPUT OUTPUT CHANNELS
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
 
IoT
IoTIoT
IoT
 
Mobile Information Architecture
Mobile Information ArchitectureMobile Information Architecture
Mobile Information Architecture
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstract
 
Mobile computing -- Introduction
Mobile computing -- IntroductionMobile computing -- Introduction
Mobile computing -- Introduction
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 
Virtualization
VirtualizationVirtualization
Virtualization
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
UBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MUBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary M
 
Wireless Sensor Networks ppt
Wireless Sensor Networks pptWireless Sensor Networks ppt
Wireless Sensor Networks ppt
 
Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computing
 
Data Analytics for IoT
Data Analytics for IoT Data Analytics for IoT
Data Analytics for IoT
 
IoT Enabling Technologies
IoT Enabling TechnologiesIoT Enabling Technologies
IoT Enabling Technologies
 
Internet of things (IoT)
Internet of things (IoT)Internet of things (IoT)
Internet of things (IoT)
 

Viewers also liked

Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Preethi AKNR
 
Ambient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous ComputingAmbient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous Computing
Rohit Arora
 
Conversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipConversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data Stewardship
Loren Davie
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
Rob Manson
 
I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...
Karen Kaushansky
 
Products are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes designProducts are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes design
Mike Kuniavsky
 
Understanding the New World of Cognitive Computing
Understanding the New World of Cognitive ComputingUnderstanding the New World of Cognitive Computing
Understanding the New World of Cognitive Computing
DATAVERSITY
 
Docker on IoT Devices
Docker on IoT DevicesDocker on IoT Devices
Docker on IoT Devices
Docker, Inc.
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016
Bill Chamberlin
 
Fog computing
Fog computingFog computing
Fog computing
Hari Priyanka
 
Ubiquitous Technology and Ambient Learning Opening New Ways to Instructional...
Ubiquitous Technology and Ambient Learning Opening New Ways to  Instructional...Ubiquitous Technology and Ambient Learning Opening New Ways to  Instructional...
Ubiquitous Technology and Ambient Learning Opening New Ways to Instructional...
Malik Sajjad Ahmad Awan
 
Mo mo welcome 02.12.13
Mo mo welcome 02.12.13Mo mo welcome 02.12.13
Mo mo welcome 02.12.13
MobileMonday Estonia
 
Nanotechnology, ubiquitous computing and the internet of things
Nanotechnology, ubiquitous computing and the internet of thingsNanotechnology, ubiquitous computing and the internet of things
Nanotechnology, ubiquitous computing and the internet of things
Karlos Svoboda
 
Client Server Transformational System
Client Server Transformational SystemClient Server Transformational System
Client Server Transformational System
ManjuShanmugam1593
 
PervasiveComputing
PervasiveComputingPervasiveComputing
PervasiveComputing
CDAC
 
Ubiquitous home
Ubiquitous homeUbiquitous home
Ubiquitous home
swati sonawane
 

Viewers also liked (16)

Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ambient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous ComputingAmbient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous Computing
 
Conversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipConversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data Stewardship
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...
 
Products are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes designProducts are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes design
 
Understanding the New World of Cognitive Computing
Understanding the New World of Cognitive ComputingUnderstanding the New World of Cognitive Computing
Understanding the New World of Cognitive Computing
 
Docker on IoT Devices
Docker on IoT DevicesDocker on IoT Devices
Docker on IoT Devices
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016
 
Fog computing
Fog computingFog computing
Fog computing
 
Ubiquitous Technology and Ambient Learning Opening New Ways to Instructional...
Ubiquitous Technology and Ambient Learning Opening New Ways to  Instructional...Ubiquitous Technology and Ambient Learning Opening New Ways to  Instructional...
Ubiquitous Technology and Ambient Learning Opening New Ways to Instructional...
 
Mo mo welcome 02.12.13
Mo mo welcome 02.12.13Mo mo welcome 02.12.13
Mo mo welcome 02.12.13
 
Nanotechnology, ubiquitous computing and the internet of things
Nanotechnology, ubiquitous computing and the internet of thingsNanotechnology, ubiquitous computing and the internet of things
Nanotechnology, ubiquitous computing and the internet of things
 
Client Server Transformational System
Client Server Transformational SystemClient Server Transformational System
Client Server Transformational System
 
PervasiveComputing
PervasiveComputingPervasiveComputing
PervasiveComputing
 
Ubiquitous home
Ubiquitous homeUbiquitous home
Ubiquitous home
 

Similar to Ubiquitous computing

pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
RishabhRathore71
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
Assem mousa
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
deaneal
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
Rutvik Pensionwar
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Riya Choudhary
 
Embedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignEmbedded & Tangible Interaction Design
Embedded & Tangible Interaction Design
Dave Shaw
 
The Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing coThe Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing co
carmanl5wisc
 
Ubiquitous Computing: an Introduction
Ubiquitous Computing: an IntroductionUbiquitous Computing: an Introduction
Ubiquitous Computing: an Introduction
Alessandra Agostini
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
Dhiraj Shinde
 
cloud of things Presentation
cloud of things Presentation cloud of things Presentation
cloud of things Presentation
Assem mousa
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
VENKATA RAMANA PRABHALAVEEDU
 
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
Eswar Publications
 
Ambient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali JindalAmbient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali Jindal
ShifaliJindal
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdf
Hina Afzal
 
Ubiquitous computing 1.0
Ubiquitous computing 1.0Ubiquitous computing 1.0
Ubiquitous computing 1.0
jan aljan
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
chandrika95
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
Sweety Singh
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
Rutvik Pensionwar
 
Smart Playing Cards A Ubiquitous Computing Game
Smart Playing Cards A Ubiquitous Computing GameSmart Playing Cards A Ubiquitous Computing Game
Smart Playing Cards A Ubiquitous Computing Game
guest218195
 
Beekman5 std ppt_17
Beekman5 std ppt_17Beekman5 std ppt_17

Similar to Ubiquitous computing (20)

pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Embedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignEmbedded & Tangible Interaction Design
Embedded & Tangible Interaction Design
 
The Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing coThe Five forces that shape StrategyRivalry among existing co
The Five forces that shape StrategyRivalry among existing co
 
Ubiquitous Computing: an Introduction
Ubiquitous Computing: an IntroductionUbiquitous Computing: an Introduction
Ubiquitous Computing: an Introduction
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
 
cloud of things Presentation
cloud of things Presentation cloud of things Presentation
cloud of things Presentation
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
EVALUATION & TRENDS OF SURVEILLANCE SYSTEM NETWORK IN UBIQUITOUS COMPUTING EN...
 
Ambient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali JindalAmbient Intelligence seminar report made by Shifali Jindal
Ambient Intelligence seminar report made by Shifali Jindal
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdf
 
Ubiquitous computing 1.0
Ubiquitous computing 1.0Ubiquitous computing 1.0
Ubiquitous computing 1.0
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Smart Playing Cards A Ubiquitous Computing Game
Smart Playing Cards A Ubiquitous Computing GameSmart Playing Cards A Ubiquitous Computing Game
Smart Playing Cards A Ubiquitous Computing Game
 
Beekman5 std ppt_17
Beekman5 std ppt_17Beekman5 std ppt_17
Beekman5 std ppt_17
 

More from Govind Raj

INFRA_PPP_FewControl points for growth.ppt
INFRA_PPP_FewControl points for growth.pptINFRA_PPP_FewControl points for growth.ppt
INFRA_PPP_FewControl points for growth.ppt
Govind Raj
 
Project and Infrastructure Finance slides Module1_Ver3.ppt
Project and Infrastructure Finance slides Module1_Ver3.pptProject and Infrastructure Finance slides Module1_Ver3.ppt
Project and Infrastructure Finance slides Module1_Ver3.ppt
Govind Raj
 
Automation Anxiety
Automation AnxietyAutomation Anxiety
Automation Anxiety
Govind Raj
 
Webcrawler
Webcrawler Webcrawler
Webcrawler
Govind Raj
 
Smartquill
SmartquillSmartquill
Smartquill
Govind Raj
 
Wibree
Wibree Wibree
Wibree
Govind Raj
 
Android ppt
Android pptAndroid ppt
Android ppt
Govind Raj
 
Optical Camouflage
Optical CamouflageOptical Camouflage
Optical Camouflage
Govind Raj
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
Govind Raj
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
Govind Raj
 
Blu ray technology
Blu ray technologyBlu ray technology
Blu ray technology
Govind Raj
 
Wordnet
WordnetWordnet
Wordnet
Govind Raj
 

More from Govind Raj (12)

INFRA_PPP_FewControl points for growth.ppt
INFRA_PPP_FewControl points for growth.pptINFRA_PPP_FewControl points for growth.ppt
INFRA_PPP_FewControl points for growth.ppt
 
Project and Infrastructure Finance slides Module1_Ver3.ppt
Project and Infrastructure Finance slides Module1_Ver3.pptProject and Infrastructure Finance slides Module1_Ver3.ppt
Project and Infrastructure Finance slides Module1_Ver3.ppt
 
Automation Anxiety
Automation AnxietyAutomation Anxiety
Automation Anxiety
 
Webcrawler
Webcrawler Webcrawler
Webcrawler
 
Smartquill
SmartquillSmartquill
Smartquill
 
Wibree
Wibree Wibree
Wibree
 
Android ppt
Android pptAndroid ppt
Android ppt
 
Optical Camouflage
Optical CamouflageOptical Camouflage
Optical Camouflage
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
Digital watermarking
Digital watermarkingDigital watermarking
Digital watermarking
 
Blu ray technology
Blu ray technologyBlu ray technology
Blu ray technology
 
Wordnet
WordnetWordnet
Wordnet
 

Recently uploaded

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
Pablo Gómez Abajo
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 

Recently uploaded (20)

Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Mutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented ChatbotsMutation Testing for Task-Oriented Chatbots
Mutation Testing for Task-Oriented Chatbots
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 

Ubiquitous computing

  • 1. The Computer For 21st Century By:- Govind Raj (IT -1001227464)
  • 2. Topics of Discussion  What is Ubiquitous Computing??  Trends in Computing.  Comparison of Similar Technologies.  Features of Ubiquitous Computing.  Some Ubiquitous Computing research Applications  Real time challenges  Conclusion.
  • 3. What is “Ubiquitous”? U.biq.ui.tous (yōō-bĭk'wĭ-təs) existing or being everywhere, esp. at the same time; omnipresent: ubiquitous fog; ubiquitous little ants.
  • 4. Mark Weiser: the father of ubiquitous computing  has called UC “…highest idea is to make a computer so embedded, so fitting, so natural, that we use it without even thinking about it.”  “In the 21st century the technology revolution will move into the everyday, the small and the invisible…”  “The most profound technologies are those that disappear. They weave themselves into the fabrics of everyday life until they are indistinguishable from it.”
  • 5. What is Ubiquitous Computing??? Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical environment, but making them effectively invisible to the user – Mark Weiser An environment in which people interact with embedded computers (processors) and in which networked devices are aware of their surroundings (to being pervasive)
  • 6. Three Waves of Computing ● Mainframe computing era – massive computers to execute big data processing applications – very few computers in the world ● Desktop computing era – one computer at every desk to help in business related activities – computers connected in intranets to a massive global network (internet), all wired ● Ubiquitous computing era – tens/hundreds of computing devices in every room/person, becoming “invisible” and part of the environment
  • 8.
  • 9. How to achieve Ubiquity???  Make Computing mobile and connected • Instrument the person  Instrument the physical surroundings
  • 10. What makes it possible…  Processing  cheaper, faster, smaller, more energy efficient  Storage  Big, fast and small in size.  Networking  global, local, ad-hoc, low-power, high bandwidth, low latencies  Sensors  Displays  projection, flexible materials, power consumption 1GB in Flashcard format
  • 11. Related Computing Technologies  Pervasive Computing  Wearable Computing  Ambient Intelligence When Taken With Objects ,it is also Internet of Things Things That Think/Smart Objects(tabs ,boards and pads)
  • 12. Technologies continued… Pervasive Computing: An environment in which people interact with embedded (and mostly invisible) computers (processors) and in which networked devices are aware of their surroundings and peers and are able to provide services or use services from peers effectively Wearable Computing: Wearable technology, tech togs, or fashion electronics are clothing and accessories incorporating computer and advanced electronic technologies.
  • 13.  In computing , Ambient Intelligence refers to electronic environments that are sensitive and responsive to the presence of people. Ambient intelligence is a vision on the future of consumer electronics ,telecommunications and computing.  As these devices grow smaller, more connected and more integrated into our environment, the technology disappears into our surroundings …….TOWARDS UBIQUITY… Technologies continued…
  • 15. Ubiquitous vs Cloud Computing Ubiquitous Computing describes a computer not as a self contained object, but as multiple objects that are everywhere (hence, ubiquitous), and are part of our daily life from the most simple tasks to the most complex ones. However, Cloud Computing doesn’t put the computer everywhere but, instead, it gives access to it everywhere. As for Cloud Computing doesn’t have the intention to break with traditional computing.
  • 16. General Ubicomp Features  There are three general features that are shared across a wide variety of ubicomp applications.  These features are : 1. the ability to provide transparent interfaces 2. the ability to automatically adapt the behavior of a program based on knowledge of the context of its use, 3. the ability to automate the capture of live experiences for later recall.
  • 17. GUF - (1) TRANSPARENT INTERFACES  Ubicomp Vision: “pervasive computation without intrusion.”  Remove the physical barrier between user and computational device  Keyboard and mouse are still the most commonly used interfaces !!  Need:  flexible interfaces  Varied interfaces that can provide similar functionality
  • 18. GUF - (2) CONTEXT AWARENESS  Context – information about the environment in which the application operates and reacts accordingly.  LOCATION and TIME are simple examples of context !  Context aware application:  is one which can capture the context  assign meaning to it  change behavior accordingly  Need:  Applications that are context aware and allow rapid personalization of their services.
  • 19. GUF - (3) AUTOMATED CAPTURE  Capture everyday experiences and make the records available for later use.  Constraints:  Multiple streams of information  Their time synchronization  Their correlation and integration  Need:  Automated tools that support capture, integration and future access of info.
  • 20. Sensors and context-aware solutions are on the market already Research organizations Industry Sensors Vendors + Universities Research Institutes + Universities Research Institutes
  • 21.  Smarter Phones  Health care  Home care (smarter homes)  Intelligent Transportation Systems  Natural disaster-specific warning purposes  Interactive Wall paper , vanet  Remote Eyes , active badge  Goggle Glasses  Ubiquitous City(U-City) Applications…
  • 23. Challenges of Ubicomp How to integrate mobile communicators into complex information infrastructures?  What effect will they have on work and leisure? Secure and reliable services How to develop and manage adaptable, context-aware software systems? What support is needed within the network? Power supplies.
  • 25. Conclusion  Pervasive computing provides an attractive vision for the future of computing  Computational power will be available everywhere through mobile and stationary devices Ubiquitous computing is the next generation computing environment with information & communication technology everywhere, for everyone, at all times. Ubiquitous Computing is all about Human! Because we love comfortable living!!! Sci-fi movie is not far from reality