SlideShare une entreprise Scribd logo
1  sur  51
Ubiquitous and Mobile
     Computing
       Ilya Shmorgun
Ubiquitous Computing
The goal of ubiquitous computing is to make
technology invisible by integrating
computational capability into our everyday
life.

Taking cues from the physical world a
ubiquitous computing environment should
include lots of information on the periphery.
Ubiquitous computing aims to enable devices
to move with us, dynamically build
understanding of their changing
environments, and configure their services
accordingly.

Ubiquitous computing is simultaneously very
personal and extremely global.
Ubiquitous computing requires simple, easy-
to-use interfaces and a positive user
experience.

A user should be able to focus on the task
without worrying about the technology
itself.
New Paradigms of
  Interaction
The proliferation of computing into the
physical world suggests new paradigms of
interaction inspired by constant access to
information and computational capabilities.

Ubiquitous computing assumes the
development of applications that are off the
desktop.
The new interaction paradigm should reflect
more closely how humans interact with each
other and the physical world.

This includes the ability to speak, gesture,
and use various tools for writing.
We have come to expect to have entities
from a physical environment to have a
presence on the Internet.

This is were the idea of the Internet of
Things comes into play.
Contextual information allows applications
to provide more relevant services to users
without requiring additional input.
Internet of Things
The Internet of Things encompasses a variety
of technologies and research that aim to
extend the existing Internet to the world of
physical objects.

Examples of connecting physical objects to
the information stored on the Internet
include QR codes and RFID tags.
QR Codes
Quick Response (QR) codes are rectangular
bar codes, which can store large pieces of
information.

QR codes can be found on billboards, bus
stops, advertising and food wrappers.

Users need to download special applications
to decode the information stored in the
codes.
RFID Tags
RFID tags rely on wireless non-contact
systems to transfer data from tagged objects
to readers.

RFIDs enable information to be read without
requiring a line of sight.

Special RFID readers are yet to become
widely adopted.
Context
Context is any information that can be used
to characterize the situation of a person,
place, or object that is relevant to the
interaction between a user and an
application.
Systems can automatically adapt to the
environment by taking into account the
current time, physical location, needs, and
other parameters.
Important aspects of context are: where you
are, who you are with, and what resources
are nearby.
Types of Context
Network connectivity,
Computing context     communication costs,
                    bandwidth, nearby devices.
                      User’s profile, location,
  User context        people nearby, current
                         social situation.

                    Lighting, noise levels, traffic
 Physical context
                     conditions, temperature.

                    Time of day, week, month,
  Time context
                       season of the year.
Ubicomp Reality
Some feel that the world of ubiquitous
computing is just around the corner.

We just need to add a couple of missing
pieces to the puzzle.
Others think that we are already living in the
ubiquitous computing reality thanks to our
smart mobile devices.
Mobile Computing
Mobile computing is about providing access
to information at your fingertips anywhere,
anytime.

As computers become more portable,
people expect to be able to access
information anytime and anywhere on the
devices they carry with them all the time.
The term mobile computer includes many
types of devices, such as laptops, tablets, and
smartphones.
The key ingredients are high-performance
low-power processors, high-density
memory, and standardized wireless
communication.
Mobile computers are resource-poor, their
connectivity is highly variable in regards to
performance and reliability, and they rely on
a limited source of energy.

These constraints are intrinsic to mobility
and not simply artifacts of the current
technology.
Evolution of Mobile
      Phones
Evolution of Tablets
Mobile Platforms
Mobile Coming to
    Desktop
Ubiquitous Mobile
  Interactions
Ubiquitous computing

Contenu connexe

Tendances

Tendances (18)

Internet of-thing
Internet of-thingInternet of-thing
Internet of-thing
 
Ambient intelligence
Ambient intelligence Ambient intelligence
Ambient intelligence
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Ambient Intelligence made by Shifali Jindal
Ambient Intelligence made by Shifali JindalAmbient Intelligence made by Shifali Jindal
Ambient Intelligence made by Shifali Jindal
 
Internet of Thing
Internet of ThingInternet of Thing
Internet of Thing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
pervasive computing
pervasive computingpervasive computing
pervasive computing
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
IoT (Internet Of Things)
IoT (Internet Of Things)IoT (Internet Of Things)
IoT (Internet Of Things)
 
Internet Of Things
Internet Of ThingsInternet Of Things
Internet Of Things
 
Internet Of things
Internet Of things Internet Of things
Internet Of things
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Vision on the city of future
Vision on the city of futureVision on the city of future
Vision on the city of future
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Similaire à Ubiquitous computing

Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegence
Lovely Singla
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Editor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
Editor IJCATR
 

Similaire à Ubiquitous computing (20)

Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
 
A Study Mobile Computing
A Study   Mobile ComputingA Study   Mobile Computing
A Study Mobile Computing
 
Ambient intellegence
Ambient intellegenceAmbient intellegence
Ambient intellegence
 
Web². The Internet of everything
Web². The Internet of everythingWeb². The Internet of everything
Web². The Internet of everything
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
IoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile TechnologyIoT: Ongoing challenges and opportunities in Mobile Technology
IoT: Ongoing challenges and opportunities in Mobile Technology
 
Ubiquitous networking
Ubiquitous networkingUbiquitous networking
Ubiquitous networking
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
The Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial RevolutionThe Top 10 Technology Trends Of The 4th Industrial Revolution
The Top 10 Technology Trends Of The 4th Industrial Revolution
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstract
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Societal Change and Transformation by Internet of Things (IoT)
Societal Change and Transformation by Internet of Things (IoT)Societal Change and Transformation by Internet of Things (IoT)
Societal Change and Transformation by Internet of Things (IoT)
 
IoT Challenges: Technological, Business and Social aspects
IoT Challenges: Technological, Business and Social aspectsIoT Challenges: Technological, Business and Social aspects
IoT Challenges: Technological, Business and Social aspects
 
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
A STUDY ON LOCATION-AWARE AND SAFER CARDS: ENHANCING RFID SECURITY AND PRIVAC...
 
Wireless Connectivity of Real-World Applications
Wireless Connectivity of Real-World ApplicationsWireless Connectivity of Real-World Applications
Wireless Connectivity of Real-World Applications
 

Plus de Valeria Gasik

Creating low and medium fidelity prototypes
Creating low and medium fidelity prototypesCreating low and medium fidelity prototypes
Creating low and medium fidelity prototypes
Valeria Gasik
 
Introduction to interaction design
Introduction to interaction designIntroduction to interaction design
Introduction to interaction design
Valeria Gasik
 
Creating Low Fidelity Prototypes
Creating Low Fidelity PrototypesCreating Low Fidelity Prototypes
Creating Low Fidelity Prototypes
Valeria Gasik
 

Plus de Valeria Gasik (20)

What's UX anyway?
What's UX anyway?What's UX anyway?
What's UX anyway?
 
Low Fidelity Prototyping with Paper
Low Fidelity Prototyping with PaperLow Fidelity Prototyping with Paper
Low Fidelity Prototyping with Paper
 
User Research: Personas, scenarios, user stories
User Research: Personas, scenarios, user storiesUser Research: Personas, scenarios, user stories
User Research: Personas, scenarios, user stories
 
Interaction Design's Work
Interaction Design's WorkInteraction Design's Work
Interaction Design's Work
 
Paper Prototyping Basics (IxDworks.com)
Paper Prototyping Basics (IxDworks.com)Paper Prototyping Basics (IxDworks.com)
Paper Prototyping Basics (IxDworks.com)
 
Testing Paper Prototypes (IxDworks.com)
Testing Paper Prototypes (IxDworks.com)Testing Paper Prototypes (IxDworks.com)
Testing Paper Prototypes (IxDworks.com)
 
Personas, Scenarios, User Stories, Use Cases (IxDworks.com)
Personas, Scenarios, User Stories, Use Cases (IxDworks.com)Personas, Scenarios, User Stories, Use Cases (IxDworks.com)
Personas, Scenarios, User Stories, Use Cases (IxDworks.com)
 
TWS 2014 – Testing paper prototypes
TWS 2014 – Testing paper prototypesTWS 2014 – Testing paper prototypes
TWS 2014 – Testing paper prototypes
 
TWS 2014 – Paper Prototyping
TWS 2014 – Paper PrototypingTWS 2014 – Paper Prototyping
TWS 2014 – Paper Prototyping
 
TWS 2014 – Personas, scenarios, user stories
TWS 2014 – Personas, scenarios, user storiesTWS 2014 – Personas, scenarios, user stories
TWS 2014 – Personas, scenarios, user stories
 
TWS 2014: Interaction Design, brief introduction
TWS 2014: Interaction Design, brief introductionTWS 2014: Interaction Design, brief introduction
TWS 2014: Interaction Design, brief introduction
 
Wordress.com alkeet ja sosiaalisen median lyhyt historia
Wordress.com alkeet ja sosiaalisen median lyhyt historiaWordress.com alkeet ja sosiaalisen median lyhyt historia
Wordress.com alkeet ja sosiaalisen median lyhyt historia
 
TSS 2013 – Paper Prototyping
TSS 2013 – Paper PrototypingTSS 2013 – Paper Prototyping
TSS 2013 – Paper Prototyping
 
TSS 2013 – IxD, Personas, Scenarios, User Stories and Use Cases
TSS 2013 – IxD, Personas, Scenarios, User Stories and Use CasesTSS 2013 – IxD, Personas, Scenarios, User Stories and Use Cases
TSS 2013 – IxD, Personas, Scenarios, User Stories and Use Cases
 
TSS 2013 – Interactive Design Tools
TSS 2013 – Interactive Design ToolsTSS 2013 – Interactive Design Tools
TSS 2013 – Interactive Design Tools
 
Creating low and medium fidelity prototypes
Creating low and medium fidelity prototypesCreating low and medium fidelity prototypes
Creating low and medium fidelity prototypes
 
Introduction to interaction design
Introduction to interaction designIntroduction to interaction design
Introduction to interaction design
 
Working on ideas
Working on ideasWorking on ideas
Working on ideas
 
Creating Low Fidelity Prototypes
Creating Low Fidelity PrototypesCreating Low Fidelity Prototypes
Creating Low Fidelity Prototypes
 
01 new media-design
01 new media-design01 new media-design
01 new media-design
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Ubiquitous computing

  • 1. Ubiquitous and Mobile Computing Ilya Shmorgun
  • 3. The goal of ubiquitous computing is to make technology invisible by integrating computational capability into our everyday life. Taking cues from the physical world a ubiquitous computing environment should include lots of information on the periphery.
  • 4.
  • 5. Ubiquitous computing aims to enable devices to move with us, dynamically build understanding of their changing environments, and configure their services accordingly. Ubiquitous computing is simultaneously very personal and extremely global.
  • 6. Ubiquitous computing requires simple, easy- to-use interfaces and a positive user experience. A user should be able to focus on the task without worrying about the technology itself.
  • 7. New Paradigms of Interaction
  • 8. The proliferation of computing into the physical world suggests new paradigms of interaction inspired by constant access to information and computational capabilities. Ubiquitous computing assumes the development of applications that are off the desktop.
  • 9. The new interaction paradigm should reflect more closely how humans interact with each other and the physical world. This includes the ability to speak, gesture, and use various tools for writing.
  • 10. We have come to expect to have entities from a physical environment to have a presence on the Internet. This is were the idea of the Internet of Things comes into play.
  • 11. Contextual information allows applications to provide more relevant services to users without requiring additional input.
  • 13. The Internet of Things encompasses a variety of technologies and research that aim to extend the existing Internet to the world of physical objects. Examples of connecting physical objects to the information stored on the Internet include QR codes and RFID tags.
  • 15.
  • 16. Quick Response (QR) codes are rectangular bar codes, which can store large pieces of information. QR codes can be found on billboards, bus stops, advertising and food wrappers. Users need to download special applications to decode the information stored in the codes.
  • 18.
  • 19. RFID tags rely on wireless non-contact systems to transfer data from tagged objects to readers. RFIDs enable information to be read without requiring a line of sight. Special RFID readers are yet to become widely adopted.
  • 21. Context is any information that can be used to characterize the situation of a person, place, or object that is relevant to the interaction between a user and an application.
  • 22. Systems can automatically adapt to the environment by taking into account the current time, physical location, needs, and other parameters.
  • 23. Important aspects of context are: where you are, who you are with, and what resources are nearby.
  • 25. Network connectivity, Computing context communication costs, bandwidth, nearby devices. User’s profile, location, User context people nearby, current social situation. Lighting, noise levels, traffic Physical context conditions, temperature. Time of day, week, month, Time context season of the year.
  • 27. Some feel that the world of ubiquitous computing is just around the corner. We just need to add a couple of missing pieces to the puzzle.
  • 28. Others think that we are already living in the ubiquitous computing reality thanks to our smart mobile devices.
  • 30. Mobile computing is about providing access to information at your fingertips anywhere, anytime. As computers become more portable, people expect to be able to access information anytime and anywhere on the devices they carry with them all the time.
  • 31. The term mobile computer includes many types of devices, such as laptops, tablets, and smartphones.
  • 32. The key ingredients are high-performance low-power processors, high-density memory, and standardized wireless communication.
  • 33. Mobile computers are resource-poor, their connectivity is highly variable in regards to performance and reliability, and they rely on a limited source of energy. These constraints are intrinsic to mobility and not simply artifacts of the current technology.
  • 35.
  • 36.
  • 37.
  • 39.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47. Mobile Coming to Desktop
  • 48.
  • 49.
  • 50. Ubiquitous Mobile Interactions

Notes de l'éditeur

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. \n
  46. \n
  47. \n
  48. \n
  49. \n
  50. \n
  51. \n