SlideShare une entreprise Scribd logo
1  sur  33
Télécharger pour lire hors ligne
2110731 Distributed Systems
                         Ubiquitous Computing   Computer Engineering Department
                                                Chulalongkorn University

                                                Present by LogicalSync group

Saturday, September 12, 2009                                                      1
Introduction

       • What is Ubiquitous Computing?


       • Ubiquitous means everywhere


       • From the past, to present and beyond to the future...




Saturday, September 12, 2009                                     2
Ubiquitous Computing

       • This term was coined by Marc Weiser of Xerox PARC around 1988

              The purpose of a computer is to help
              you do something else.


              The best computer is a quiet, invisible
              servant.


              The more you can do by intuition the
              smarter you are; the computer should
              extend your unconscious.




Saturday, September 12, 2009                                             3
Three Waves of Computing

       •Main Frame



       •Personal Computer



       •Ubiquitous Computing




Saturday, September 12, 2009      4
Three Waves of Computing

       •Main Frame
                               Many person -
                               One computer

       •Personal Computer



       •Ubiquitous Computing




Saturday, September 12, 2009                   4
Three Waves of Computing

       •Main Frame
                               Many person -
                               One computer

       •Personal Computer

                One person - One computer

       •Ubiquitous Computing




Saturday, September 12, 2009                   4
Three Waves of Computing

       •Main Frame
                                 Many person -
                                 One computer

       •Personal Computer

                One person - One computer

       •Ubiquitous Computing

                               One person - Many computer




Saturday, September 12, 2009                                4
Moore’s Law

       • The number of transistors that
          can be placed inexpensively
          on an integrated circuit has
          increased exponentially,
          doubling approximately every
          two years.




Saturday, September 12, 2009              5
Computer is every where

       • Mobile Phone


       • Car


       • Refrigerator


       • Shoes (Nike)




Saturday, September 12, 2009     6
Key Elements in Ubiquitous Computing
       Let there be enlightenment




Saturday, September 12, 2009                  7
Key elements of Ubiquitous Computing

       • Ubiquitous Networking


       • Ubiquitous Sensing


       • Ubiquitous Access


       • Ubiquitous Middleware

                                   Ubicomp required
                                   - Networking as a place to share data.
                                   - Sensing as eyes and ears to add more
                                   “
                                   awareness”
                                   - Access from anywhere (mobile, wearable) and
                                   display with more natural - require less attention.
                                   - Middleware to shield application from low-level
                                   details




Saturday, September 12, 2009                                                             8
Ubiquitous Networking




                               Net working is a bare
                               bone for ubicomp

                               In order to access
                               net work, we need
                               “identification” to define
                               which “thing” is
                               accessing.




Saturday, September 12, 2009                              9
Ubiquitous Sensing

       • Give systems “eyes and ears”


       • Adding more “Awareness” to
         Ubiquitous Network
                                        Pressure Sensor   Voice Sensor

       • Automatic Measuring


                                        Acceleration
                                          Sensor




Saturday, September 12, 2009                                             10
Ubiquitous Access

       • Access from anywhere


       • Required less attention


       • Mobile Computer


       • Wearable Computer
                                   Wearable Computer




Saturday, September 12, 2009                           11
Ambient Displays   E-Ink weather


Saturday, September 12, 2009                                      12
Ubiquitous Middleware

       • Typically a software


       • Shield an application from low-level details


       • Interact with Ubiquitous Networking, Sensing and Access




Saturday, September 12, 2009                                       13
How does it works?
       Putting them all together




Saturday, September 12, 2009       14
Identification
       Who am I speaking with?




Saturday, September 12, 2009     15
Identification

       • Radio Frequency Identification (RFID)


       • Provide an identity to things


            • Book


            • Clothes


       • Active - has battery


       • Passive - harvest energy from reader


       • Main area of use is in retail supply chain


       • Mobile phones with embedded RFID is being used in Japan



Saturday, September 12, 2009                                       16
Identification

       • Radio Frequency Identification (RFID)


       • Provide an identity to things


            • Book


            • Clothes


       • Active - has battery


       • Passive - harvest energy from reader


       • Main area of use is in retail supply chain


       • Mobile phones with embedded RFID is being used in Japan



Saturday, September 12, 2009                                       16
Identification

       • Visual bar codes


       • QR Codes (Quick Response) is
         widely used in Japan


       • Drawback is rely on user action
         rather than “Automatic”




Saturday, September 12, 2009               17
Identification

       • Visual bar codes


       • QR Codes (Quick Response) is
         widely used in Japan


       • Drawback is rely on user action
         rather than “Automatic”




Saturday, September 12, 2009               17
Location
       Where am I now?




Saturday, September 12, 2009   18
Location

       • The ability to locate objects/devices
         current location


       • Global Positioning System (GPS)


       • Mobile Augmented Reality
         Application - Layar




Saturday, September 12, 2009                     19
Location

       • The ability to locate objects/devices
         current location


       • Global Positioning System (GPS)


       • Mobile Augmented Reality
         Application - Layar




Saturday, September 12, 2009                     19
Context Awareness
       Relevant information in the right form, time and place




Saturday, September 12, 2009                                    20
Context Awareness

       • Intelligent Agents which can “learn”   • Voice analysis, Gaze tracking,
         from experience                          Machine vision


       • Respond to environmental data          • Emotional Awareness


       • Sensor detect your friend come to
         the room, room’s temperature is
         cooling down


       • Sensor detect you are in the
         cinema, so the phone won’t ring




Saturday, September 12, 2009                                                       21
The Aware Home
       A prototype of Ubiquitous Computing application




Saturday, September 12, 2009                             22
A living laboratory for Ubiquitous
                               The Aware Home   Computing

Saturday, September 12, 2009                                                         23
Issues in Ubiquitous Computing
       Today’s problems and solutions




Saturday, September 12, 2009            24
Issues in Ubiquitous Computing

       • Privacy - How can I trust the others


       • Reliability / Availability - Always
         on network


       • Smart Sensors - Are currently in
         research / development


       • Social Impact - It changes our life
         style




Saturday, September 12, 2009                    25
Summary

          Ubiquitous Computing is all about Human!

          Because we love comfortable living

          Sci-fi movie is not far from reality




Saturday, September 12, 2009                         26
References

       • Emerging Technologies for Learning - Volume 2 (2007) - Ubiquitous
         Computing by David Ley, Becta


       • Advances in Ubiquitous Computing by Soraya, Kouadri, Mostefaoui


       • The Aware Home: A Living Laboratory for Ubiquitous Computing Research


       • Mark Weiser - http://en.wikipedia.org/wiki/Mark_Weiser


       • Sensor Devices - http://www.randomterrain.com/futuristic-inventions-cool-
         stuff-sensor.html




Saturday, September 12, 2009                                                         27

Contenu connexe

Tendances

What's next in edge computing?
What's next in edge computing?What's next in edge computing?
What's next in edge computing?Fastly
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESsuthi
 
Deep Learning for Autonomous Driving
Deep Learning for Autonomous DrivingDeep Learning for Autonomous Driving
Deep Learning for Autonomous DrivingJan Wiegelmann
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computingsairamgoud16
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligencechandrika95
 
Edge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud ComputingEdge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud ComputingRamneek Kalra
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous ComputingKamran Ashraf
 
EDGE COMPUTING
EDGE COMPUTINGEDGE COMPUTING
EDGE COMPUTINGMosin A
 
2022 COMP 4010 Lecture 7: Introduction to VR
2022 COMP 4010 Lecture 7: Introduction to VR2022 COMP 4010 Lecture 7: Introduction to VR
2022 COMP 4010 Lecture 7: Introduction to VRMark Billinghurst
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingSangeetha Sg
 
Artificial Intelligence - A Brief Introduction And Application Examples
Artificial Intelligence - A Brief Introduction And Application ExamplesArtificial Intelligence - A Brief Introduction And Application Examples
Artificial Intelligence - A Brief Introduction And Application ExamplesTaylor Ling
 
The sixth sense technology complete ppt
The sixth sense technology complete pptThe sixth sense technology complete ppt
The sixth sense technology complete pptatinav242
 
Pervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FuturePervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FutureKarthikeyan V
 
Edge Computing for the Industry
Edge Computing for the IndustryEdge Computing for the Industry
Edge Computing for the IndustryWilliam Liang
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveChetan Kumar S
 
Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computingLikan Patra
 

Tendances (20)

What's next in edge computing?
What's next in edge computing?What's next in edge computing?
What's next in edge computing?
 
EDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGESEDGE COMPUTING: VISION AND CHALLENGES
EDGE COMPUTING: VISION AND CHALLENGES
 
Deep Learning for Autonomous Driving
Deep Learning for Autonomous DrivingDeep Learning for Autonomous Driving
Deep Learning for Autonomous Driving
 
presentation on Edge computing
presentation on Edge computingpresentation on Edge computing
presentation on Edge computing
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Edge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud ComputingEdge Computing: An Extension to Cloud Computing
Edge Computing: An Extension to Cloud Computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
EDGE COMPUTING
EDGE COMPUTINGEDGE COMPUTING
EDGE COMPUTING
 
2022 COMP 4010 Lecture 7: Introduction to VR
2022 COMP 4010 Lecture 7: Introduction to VR2022 COMP 4010 Lecture 7: Introduction to VR
2022 COMP 4010 Lecture 7: Introduction to VR
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Edge Computing
Edge ComputingEdge Computing
Edge Computing
 
Edge computing
Edge computingEdge computing
Edge computing
 
Artificial Intelligence - A Brief Introduction And Application Examples
Artificial Intelligence - A Brief Introduction And Application ExamplesArtificial Intelligence - A Brief Introduction And Application Examples
Artificial Intelligence - A Brief Introduction And Application Examples
 
Fog computing
Fog computingFog computing
Fog computing
 
The sixth sense technology complete ppt
The sixth sense technology complete pptThe sixth sense technology complete ppt
The sixth sense technology complete ppt
 
Pervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FuturePervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our Future
 
Edge Computing for the Industry
Edge Computing for the IndustryEdge Computing for the Industry
Edge Computing for the Industry
 
Edge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespectiveEdge and Fog computing, a use-case prespective
Edge and Fog computing, a use-case prespective
 
Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computing
 

En vedette

Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingu065932
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computingPreethi AKNR
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security IssuesPhearin Sok
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computingRam kumar
 
Designing Calm Technology
Designing Calm TechnologyDesigning Calm Technology
Designing Calm TechnologyAmber Case
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple pptAgarwaljay
 
Ubiquitious Computing: UX When There is No UI
Ubiquitious Computing: UX When There is No UIUbiquitious Computing: UX When There is No UI
Ubiquitious Computing: UX When There is No UIMarc Resnick
 
Design Calm Technology
Design Calm TechnologyDesign Calm Technology
Design Calm Technology彥豪 陳
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous ComputingKevin Regan
 
Bitcoin Seminar - Stockholm
Bitcoin Seminar - StockholmBitcoin Seminar - Stockholm
Bitcoin Seminar - StockholmRobin Teigland
 
Inside Bitcoins_AlanReiner
Inside Bitcoins_AlanReinerInside Bitcoins_AlanReiner
Inside Bitcoins_AlanReinerMediabistro
 
Project Natick-Data centers under the sea
Project Natick-Data centers under the seaProject Natick-Data centers under the sea
Project Natick-Data centers under the seaVishnu Singh Chundawat
 
Microsoft's project natick(underwater datacentre)
Microsoft's project natick(underwater datacentre)Microsoft's project natick(underwater datacentre)
Microsoft's project natick(underwater datacentre)Mukund Agarwal
 

En vedette (17)

Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Designing Calm Technology
Designing Calm TechnologyDesigning Calm Technology
Designing Calm Technology
 
Cloud computing simple ppt
Cloud computing simple pptCloud computing simple ppt
Cloud computing simple ppt
 
Ubiquitious Computing: UX When There is No UI
Ubiquitious Computing: UX When There is No UIUbiquitious Computing: UX When There is No UI
Ubiquitious Computing: UX When There is No UI
 
Design Calm Technology
Design Calm TechnologyDesign Calm Technology
Design Calm Technology
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ubiquitous home
Ubiquitous homeUbiquitous home
Ubiquitous home
 
Bitcoin Seminar - Stockholm
Bitcoin Seminar - StockholmBitcoin Seminar - Stockholm
Bitcoin Seminar - Stockholm
 
Inside Bitcoins_AlanReiner
Inside Bitcoins_AlanReinerInside Bitcoins_AlanReiner
Inside Bitcoins_AlanReiner
 
Project Natick-Data centers under the sea
Project Natick-Data centers under the seaProject Natick-Data centers under the sea
Project Natick-Data centers under the sea
 
Microsoft's project natick(underwater datacentre)
Microsoft's project natick(underwater datacentre)Microsoft's project natick(underwater datacentre)
Microsoft's project natick(underwater datacentre)
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 

Similaire à Ubiquitous Computing

Colin Clark Accessible U Is With J Query And Infusion[1]
Colin Clark Accessible U Is With J Query And Infusion[1]Colin Clark Accessible U Is With J Query And Infusion[1]
Colin Clark Accessible U Is With J Query And Infusion[1]Ajax Experience 2009
 
Stop Motion Animation
Stop Motion AnimationStop Motion Animation
Stop Motion AnimationAlan Crocker
 
Harvesting The Web With Cloud Computing
Harvesting The Web With Cloud ComputingHarvesting The Web With Cloud Computing
Harvesting The Web With Cloud ComputingKing Huang
 
01 Mobile Web Introduction
01 Mobile Web Introduction01 Mobile Web Introduction
01 Mobile Web IntroductionYnon Perek
 
Atlassian - A Different Kind Of Software Company
Atlassian - A Different Kind Of Software CompanyAtlassian - A Different Kind Of Software Company
Atlassian - A Different Kind Of Software CompanyMike Cannon-Brookes
 
20110918 Mobile-Wireless
20110918 Mobile-Wireless20110918 Mobile-Wireless
20110918 Mobile-Wirelesspetch243
 
What Telecoms And Computing Can Learn From Each Other Carney
What Telecoms And Computing Can Learn From Each Other CarneyWhat Telecoms And Computing Can Learn From Each Other Carney
What Telecoms And Computing Can Learn From Each Other Carneybcarney
 
Testing as Communication, Real-World Techniques
Testing as Communication, Real-World TechniquesTesting as Communication, Real-World Techniques
Testing as Communication, Real-World TechniquesActsAsCon
 
10 Things Web Designers Need to Do Before Going Mobile
10 Things Web Designers Need to Do Before Going Mobile10 Things Web Designers Need to Do Before Going Mobile
10 Things Web Designers Need to Do Before Going MobileBarbara Ballard
 
Shift Your Game: Mobile 3.0
Shift Your Game: Mobile 3.0Shift Your Game: Mobile 3.0
Shift Your Game: Mobile 3.0Vivastream
 
A practical guide to connecting hardware to Flex
A practical guide to connecting hardware to FlexA practical guide to connecting hardware to Flex
A practical guide to connecting hardware to FlexJustin Mclean
 
Tech Tools for Meeting Professionals
Tech Tools for Meeting ProfessionalsTech Tools for Meeting Professionals
Tech Tools for Meeting ProfessionalsMidori Connolly
 
Cloud security jean pawluk ewf talk sept 2009
Cloud security jean pawluk ewf talk sept 2009Cloud security jean pawluk ewf talk sept 2009
Cloud security jean pawluk ewf talk sept 2009atlowe
 
Customer Worthy 2012 Customer Experience Forecast
Customer Worthy 2012 Customer Experience ForecastCustomer Worthy 2012 Customer Experience Forecast
Customer Worthy 2012 Customer Experience ForecastClient X Client
 
Protecting Public Hotspots
Protecting Public HotspotsProtecting Public Hotspots
Protecting Public HotspotsAlex Payne
 
Mobile Web App Development
Mobile Web App DevelopmentMobile Web App Development
Mobile Web App DevelopmentBrian LeRoux
 
Umbrella Webcast: Redefining Security for the Nomadic Worker
Umbrella Webcast: Redefining Security for the Nomadic WorkerUmbrella Webcast: Redefining Security for the Nomadic Worker
Umbrella Webcast: Redefining Security for the Nomadic WorkerOpenDNS
 

Similaire à Ubiquitous Computing (20)

Colin Clark Accessible U Is With J Query And Infusion[1]
Colin Clark Accessible U Is With J Query And Infusion[1]Colin Clark Accessible U Is With J Query And Infusion[1]
Colin Clark Accessible U Is With J Query And Infusion[1]
 
Stop Motion Animation
Stop Motion AnimationStop Motion Animation
Stop Motion Animation
 
Harvesting The Web With Cloud Computing
Harvesting The Web With Cloud ComputingHarvesting The Web With Cloud Computing
Harvesting The Web With Cloud Computing
 
01 Mobile Web Introduction
01 Mobile Web Introduction01 Mobile Web Introduction
01 Mobile Web Introduction
 
Atlassian - A Different Kind Of Software Company
Atlassian - A Different Kind Of Software CompanyAtlassian - A Different Kind Of Software Company
Atlassian - A Different Kind Of Software Company
 
20110918 Mobile-Wireless
20110918 Mobile-Wireless20110918 Mobile-Wireless
20110918 Mobile-Wireless
 
What Telecoms And Computing Can Learn From Each Other Carney
What Telecoms And Computing Can Learn From Each Other CarneyWhat Telecoms And Computing Can Learn From Each Other Carney
What Telecoms And Computing Can Learn From Each Other Carney
 
Scaling Django Dc09
Scaling Django Dc09Scaling Django Dc09
Scaling Django Dc09
 
Testing as Communication, Real-World Techniques
Testing as Communication, Real-World TechniquesTesting as Communication, Real-World Techniques
Testing as Communication, Real-World Techniques
 
Making SharePoint Mobile
Making SharePoint MobileMaking SharePoint Mobile
Making SharePoint Mobile
 
10 Things Web Designers Need to Do Before Going Mobile
10 Things Web Designers Need to Do Before Going Mobile10 Things Web Designers Need to Do Before Going Mobile
10 Things Web Designers Need to Do Before Going Mobile
 
fingertips
fingertipsfingertips
fingertips
 
Shift Your Game: Mobile 3.0
Shift Your Game: Mobile 3.0Shift Your Game: Mobile 3.0
Shift Your Game: Mobile 3.0
 
A practical guide to connecting hardware to Flex
A practical guide to connecting hardware to FlexA practical guide to connecting hardware to Flex
A practical guide to connecting hardware to Flex
 
Tech Tools for Meeting Professionals
Tech Tools for Meeting ProfessionalsTech Tools for Meeting Professionals
Tech Tools for Meeting Professionals
 
Cloud security jean pawluk ewf talk sept 2009
Cloud security jean pawluk ewf talk sept 2009Cloud security jean pawluk ewf talk sept 2009
Cloud security jean pawluk ewf talk sept 2009
 
Customer Worthy 2012 Customer Experience Forecast
Customer Worthy 2012 Customer Experience ForecastCustomer Worthy 2012 Customer Experience Forecast
Customer Worthy 2012 Customer Experience Forecast
 
Protecting Public Hotspots
Protecting Public HotspotsProtecting Public Hotspots
Protecting Public Hotspots
 
Mobile Web App Development
Mobile Web App DevelopmentMobile Web App Development
Mobile Web App Development
 
Umbrella Webcast: Redefining Security for the Nomadic Worker
Umbrella Webcast: Redefining Security for the Nomadic WorkerUmbrella Webcast: Redefining Security for the Nomadic Worker
Umbrella Webcast: Redefining Security for the Nomadic Worker
 

Plus de Vashira Ravipanich

Future of IT Market in Thailand
Future of IT Market in ThailandFuture of IT Market in Thailand
Future of IT Market in ThailandVashira Ravipanich
 
Foundation of Web Application Developmnet - XHTML
Foundation of Web Application Developmnet - XHTMLFoundation of Web Application Developmnet - XHTML
Foundation of Web Application Developmnet - XHTMLVashira Ravipanich
 
Video Browsing By Direct Manipulation - Draft 1
Video Browsing By Direct Manipulation - Draft 1Video Browsing By Direct Manipulation - Draft 1
Video Browsing By Direct Manipulation - Draft 1Vashira Ravipanich
 
Information Virtualization with Microformats - draft
Information Virtualization with Microformats - draftInformation Virtualization with Microformats - draft
Information Virtualization with Microformats - draftVashira Ravipanich
 
Agile Software Development with XP
Agile Software Development with XPAgile Software Development with XP
Agile Software Development with XPVashira Ravipanich
 

Plus de Vashira Ravipanich (6)

Lean Software Development
Lean Software DevelopmentLean Software Development
Lean Software Development
 
Future of IT Market in Thailand
Future of IT Market in ThailandFuture of IT Market in Thailand
Future of IT Market in Thailand
 
Foundation of Web Application Developmnet - XHTML
Foundation of Web Application Developmnet - XHTMLFoundation of Web Application Developmnet - XHTML
Foundation of Web Application Developmnet - XHTML
 
Video Browsing By Direct Manipulation - Draft 1
Video Browsing By Direct Manipulation - Draft 1Video Browsing By Direct Manipulation - Draft 1
Video Browsing By Direct Manipulation - Draft 1
 
Information Virtualization with Microformats - draft
Information Virtualization with Microformats - draftInformation Virtualization with Microformats - draft
Information Virtualization with Microformats - draft
 
Agile Software Development with XP
Agile Software Development with XPAgile Software Development with XP
Agile Software Development with XP
 

Dernier

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Dernier (20)

Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Ubiquitous Computing

  • 1. 2110731 Distributed Systems Ubiquitous Computing Computer Engineering Department Chulalongkorn University Present by LogicalSync group Saturday, September 12, 2009 1
  • 2. Introduction • What is Ubiquitous Computing? • Ubiquitous means everywhere • From the past, to present and beyond to the future... Saturday, September 12, 2009 2
  • 3. Ubiquitous Computing • This term was coined by Marc Weiser of Xerox PARC around 1988 The purpose of a computer is to help you do something else. The best computer is a quiet, invisible servant. The more you can do by intuition the smarter you are; the computer should extend your unconscious. Saturday, September 12, 2009 3
  • 4. Three Waves of Computing •Main Frame •Personal Computer •Ubiquitous Computing Saturday, September 12, 2009 4
  • 5. Three Waves of Computing •Main Frame Many person - One computer •Personal Computer •Ubiquitous Computing Saturday, September 12, 2009 4
  • 6. Three Waves of Computing •Main Frame Many person - One computer •Personal Computer One person - One computer •Ubiquitous Computing Saturday, September 12, 2009 4
  • 7. Three Waves of Computing •Main Frame Many person - One computer •Personal Computer One person - One computer •Ubiquitous Computing One person - Many computer Saturday, September 12, 2009 4
  • 8. Moore’s Law • The number of transistors that can be placed inexpensively on an integrated circuit has increased exponentially, doubling approximately every two years. Saturday, September 12, 2009 5
  • 9. Computer is every where • Mobile Phone • Car • Refrigerator • Shoes (Nike) Saturday, September 12, 2009 6
  • 10. Key Elements in Ubiquitous Computing Let there be enlightenment Saturday, September 12, 2009 7
  • 11. Key elements of Ubiquitous Computing • Ubiquitous Networking • Ubiquitous Sensing • Ubiquitous Access • Ubiquitous Middleware Ubicomp required - Networking as a place to share data. - Sensing as eyes and ears to add more “ awareness” - Access from anywhere (mobile, wearable) and display with more natural - require less attention. - Middleware to shield application from low-level details Saturday, September 12, 2009 8
  • 12. Ubiquitous Networking Net working is a bare bone for ubicomp In order to access net work, we need “identification” to define which “thing” is accessing. Saturday, September 12, 2009 9
  • 13. Ubiquitous Sensing • Give systems “eyes and ears” • Adding more “Awareness” to Ubiquitous Network Pressure Sensor Voice Sensor • Automatic Measuring Acceleration Sensor Saturday, September 12, 2009 10
  • 14. Ubiquitous Access • Access from anywhere • Required less attention • Mobile Computer • Wearable Computer Wearable Computer Saturday, September 12, 2009 11
  • 15. Ambient Displays E-Ink weather Saturday, September 12, 2009 12
  • 16. Ubiquitous Middleware • Typically a software • Shield an application from low-level details • Interact with Ubiquitous Networking, Sensing and Access Saturday, September 12, 2009 13
  • 17. How does it works? Putting them all together Saturday, September 12, 2009 14
  • 18. Identification Who am I speaking with? Saturday, September 12, 2009 15
  • 19. Identification • Radio Frequency Identification (RFID) • Provide an identity to things • Book • Clothes • Active - has battery • Passive - harvest energy from reader • Main area of use is in retail supply chain • Mobile phones with embedded RFID is being used in Japan Saturday, September 12, 2009 16
  • 20. Identification • Radio Frequency Identification (RFID) • Provide an identity to things • Book • Clothes • Active - has battery • Passive - harvest energy from reader • Main area of use is in retail supply chain • Mobile phones with embedded RFID is being used in Japan Saturday, September 12, 2009 16
  • 21. Identification • Visual bar codes • QR Codes (Quick Response) is widely used in Japan • Drawback is rely on user action rather than “Automatic” Saturday, September 12, 2009 17
  • 22. Identification • Visual bar codes • QR Codes (Quick Response) is widely used in Japan • Drawback is rely on user action rather than “Automatic” Saturday, September 12, 2009 17
  • 23. Location Where am I now? Saturday, September 12, 2009 18
  • 24. Location • The ability to locate objects/devices current location • Global Positioning System (GPS) • Mobile Augmented Reality Application - Layar Saturday, September 12, 2009 19
  • 25. Location • The ability to locate objects/devices current location • Global Positioning System (GPS) • Mobile Augmented Reality Application - Layar Saturday, September 12, 2009 19
  • 26. Context Awareness Relevant information in the right form, time and place Saturday, September 12, 2009 20
  • 27. Context Awareness • Intelligent Agents which can “learn” • Voice analysis, Gaze tracking, from experience Machine vision • Respond to environmental data • Emotional Awareness • Sensor detect your friend come to the room, room’s temperature is cooling down • Sensor detect you are in the cinema, so the phone won’t ring Saturday, September 12, 2009 21
  • 28. The Aware Home A prototype of Ubiquitous Computing application Saturday, September 12, 2009 22
  • 29. A living laboratory for Ubiquitous The Aware Home Computing Saturday, September 12, 2009 23
  • 30. Issues in Ubiquitous Computing Today’s problems and solutions Saturday, September 12, 2009 24
  • 31. Issues in Ubiquitous Computing • Privacy - How can I trust the others • Reliability / Availability - Always on network • Smart Sensors - Are currently in research / development • Social Impact - It changes our life style Saturday, September 12, 2009 25
  • 32. Summary Ubiquitous Computing is all about Human! Because we love comfortable living Sci-fi movie is not far from reality Saturday, September 12, 2009 26
  • 33. References • Emerging Technologies for Learning - Volume 2 (2007) - Ubiquitous Computing by David Ley, Becta • Advances in Ubiquitous Computing by Soraya, Kouadri, Mostefaoui • The Aware Home: A Living Laboratory for Ubiquitous Computing Research • Mark Weiser - http://en.wikipedia.org/wiki/Mark_Weiser • Sensor Devices - http://www.randomterrain.com/futuristic-inventions-cool- stuff-sensor.html Saturday, September 12, 2009 27