3. The goal of ubiquitous computing is to make
technology invisible by integrating
computational capability into our everyday
life.
Taking cues from the physical world a
ubiquitous computing environment should
include lots of information on the periphery.
4.
5. Ubiquitous computing aims to enable devices
to move with us, dynamically build
understanding of their changing
environments, and configure their services
accordingly.
Ubiquitous computing is simultaneously very
personal and extremely global.
6. Ubiquitous computing requires simple, easy-
to-use interfaces and a positive user
experience.
A user should be able to focus on the task
without worrying about the technology
itself.
8. The proliferation of computing into the
physical world suggests new paradigms of
interaction inspired by constant access to
information and computational capabilities.
Ubiquitous computing assumes the
development of applications that are off the
desktop.
9. The new interaction paradigm should reflect
more closely how humans interact with each
other and the physical world.
This includes the ability to speak, gesture,
and use various tools for writing.
10. We have come to expect to have entities
from a physical environment to have a
presence on the Internet.
This is were the idea of the Internet of
Things comes into play.
11. Contextual information allows applications
to provide more relevant services to users
without requiring additional input.
13. The Internet of Things encompasses a variety
of technologies and research that aim to
extend the existing Internet to the world of
physical objects.
Examples of connecting physical objects to
the information stored on the Internet
include QR codes and RFID tags.
16. Quick Response (QR) codes are rectangular
bar codes, which can store large pieces of
information.
QR codes can be found on billboards, bus
stops, advertising and food wrappers.
Users need to download special applications
to decode the information stored in the
codes.
19. RFID tags rely on wireless non-contact
systems to transfer data from tagged objects
to readers.
RFIDs enable information to be read without
requiring a line of sight.
Special RFID readers are yet to become
widely adopted.
21. Context is any information that can be used
to characterize the situation of a person,
place, or object that is relevant to the
interaction between a user and an
application.
22. Systems can automatically adapt to the
environment by taking into account the
current time, physical location, needs, and
other parameters.
23. Important aspects of context are: where you
are, who you are with, and what resources
are nearby.
25. Network connectivity,
Computing context communication costs,
bandwidth, nearby devices.
User’s profile, location,
User context people nearby, current
social situation.
Lighting, noise levels, traffic
Physical context
conditions, temperature.
Time of day, week, month,
Time context
season of the year.
30. Mobile computing is about providing access
to information at your fingertips anywhere,
anytime.
As computers become more portable,
people expect to be able to access
information anytime and anywhere on the
devices they carry with them all the time.
31. The term mobile computer includes many
types of devices, such as laptops, tablets, and
smartphones.
32. The key ingredients are high-performance
low-power processors, high-density
memory, and standardized wireless
communication.
33. Mobile computers are resource-poor, their
connectivity is highly variable in regards to
performance and reliability, and they rely on
a limited source of energy.
These constraints are intrinsic to mobility
and not simply artifacts of the current
technology.