SlideShare une entreprise Scribd logo
COMPUTING IS EVERYWHERE
AND ANYWHERE
INTRODUCTION
GOALS OF PERVASIVE COMPUTING
LAYERS IN PERVASIVE COMPUTING
PRINCIPLES OF PERVASIVE COMPUTING
VISIONS AND CHALLENGE
DIFFERENCE BETWEEN UBIQUITOUS AND
PERVASIVE COMPUTING
APPLICATIONS
BENEFITS
LIMITATIONS
CONCLUSION
SYNOPSIS
• Pervasive computing (also called ubiquitous
computing) is the growing trend towards
embedding microprocessors in everyday objects so
they can communicate information. The words
pervasive and ubiquitous mean "existing
everywhere." Pervasive computing devices are
completely connected and constantly available.
• Pervasive computing relies on the convergence
of wireless technologies, advanced electronics and
the Internet. The goal of researchers working in
pervasive computing is to create smart products that
communicate unobtrusively. The products are
connected to the Internet and the data they generate
is easily available.
The idea that technology is moving beyond
the personal computer to everyday devices
with embedded technology and connectivity
as computing devices become progressively
smaller and more powerful. Also
called ubiquitous computing, pervasive
computing is the result of computer
technology advancing at exponential speeds -
- a trend toward all man-made and some
natural products having hardware and
software.
GOAL OF PERVASIVE COMPUTING
Pervasive computing goes beyond the realm of
personal computers: it is the idea that almost any
device, from clothing to tools to appliances to cars to
homes to the human body to your coffee mug, can be
imbedded with chips to connect the device to an
infinite network of other devices. The goal of
pervasive computing, which combines current
network technologies with wireless computing, voice
recognition, Internet capability and artificial
intelligence, is to create an environment where the
connectivity of devices is embedded in such a way
that the connectivity is unobtrusive and always
available.
Layer 1: task management layer
 Monitors user task, context and index
 Map user's task to need for the services in the
environment
 To manage complex dependencies
Layer 2: environment management layer
 To monitor a resource and its capabilities
 To map service need, user level states of specific
capabilities
Layer 3: environment layer
 To monitor a relevant resource
 To manage reliability of the resources
VISIONS AND CHALLENGE
The essence of that vision was the creation of
environments saturated with computing and
communication capability, yet gracefully integrated
with human users. When articulated, this was a
vision too far ahead of its time — the hardware
technology needed to achieve it simply did not
exist.
• Ubiquitous means everywhere. Pervasive means "diffused throughout every part of." In
computing terms, those seem like somewhat similar concepts. Ubiquitous computing
would be everywhere, and pervasive computing would be in all parts of your life.
• That might mean the difference between seeing kiosks on every street corner and
finding that you could -- or need to -- use your Palm handheld to do absolutely every
information-based task.
• And, in fact, that's where the difference between these two types of computing lies.
Pervasive computing involves devices like handhelds -- small, easy-to-use devices --
through which we'll be able to get information on anything and everything. That's the
sort of thing that Web-enabled cell phones promise. Ubiquitous computing, though,
eschews our having to use computers at all. Instead, it's computing in the background,
with technology embedded in the things we already use. That might be a car navigation
system that, by accessing satellite pictures, alerts us to a traffic jam ahead, or an oven
that shuts off when our food is cooked.
Pervasive describes things that spread through a place to become established
everywhere.
Ubiquitous describes things that are everywhere in a place because it is the nature of that
place to have those ubiquitous things.
APPLICATIONS
BENEFITS
 INVISIBLE:
“Smart” environments will be embedded with computing technologies that will be
mostly out-of-sight.
 SOIALIZATION:
“Smart” buildings will illicit a more social response from occupants as computers user
interfaces embed themselves within architecture.
 DECISION-MAKING:
“Smart” environments will help occupants to make better choices as they go about
their everyday lives.
 EMERGENT BEHAVIOR:
Buildings are now becoming more and more kinetic in form and function. Their
movements and constructed designs come together dynamically to yield behaviours
that make them more adaptive.
 INFORMATION PROCESSING:
Architecture will go from crunching data to making sense of data; therefore,
eliminating our need to constantly input adjustments.
 ENHANCING EXPERIENCE:
As computers ubiquitously embed themselves in our environments, sensors and
actuators will create “smart” environments where architecture space will be goal
oriented.
 CONVERGENCE:
Much of our environment will be supplemented with interconnected digital
technologies.
LIMITATIONS
 Not entirely secure
 Frequent line connections that are broken
 Slow connections
 Very expensive operating costs
CONCLUSION
Pervasive Computing

Contenu connexe

Tendances

UBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MUBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary M
Mary Margarat
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
123seminarsonly
 
Ambient Intelligence made by Shifali Jindal
Ambient Intelligence made by Shifali JindalAmbient Intelligence made by Shifali Jindal
Ambient Intelligence made by Shifali Jindal
ShifaliJindal
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Riya Choudhary
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
Phearin Sok
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
joshuasimon97
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
Vashira Ravipanich
 
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili SaghafiCyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Professor Lili Saghafi
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
chandrika95
 
Nano computing
Nano computingNano computing
Nano computing
manpreetgrewal
 
Pervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FuturePervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our Future
Karthikeyan V
 
Properties of ubiquitous computing
Properties of ubiquitous computingProperties of ubiquitous computing
Properties of ubiquitous computing
Purvi Sankhe
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
Abdullah Alfadhly
 
Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, Applications
Tarika Verma
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
Purvi Sankhe
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
Raquel Salcedo Gomes
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
Govind Raj
 
IoT and connected devices: an overview
IoT and connected devices: an overviewIoT and connected devices: an overview
IoT and connected devices: an overview
Pascal Bodin
 
Virtualization in green computing
Virtualization in green computingVirtualization in green computing
Virtualization in green computing
RAHUL SINHA
 
cloud computing in e commerce
cloud computing in e commercecloud computing in e commerce
cloud computing in e commerce
steffz
 

Tendances (20)

UBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary MUBIQUITOUS COMPUTING - Mary M
UBIQUITOUS COMPUTING - Mary M
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 
Ambient Intelligence made by Shifali Jindal
Ambient Intelligence made by Shifali JindalAmbient Intelligence made by Shifali Jindal
Ambient Intelligence made by Shifali Jindal
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili SaghafiCyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
Cyber Security and Post Quantum Cryptography By: Professor Lili Saghafi
 
Ambient intelligence
Ambient intelligenceAmbient intelligence
Ambient intelligence
 
Nano computing
Nano computingNano computing
Nano computing
 
Pervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our FuturePervasive Computing - Let us Pervade our Future
Pervasive Computing - Let us Pervade our Future
 
Properties of ubiquitous computing
Properties of ubiquitous computingProperties of ubiquitous computing
Properties of ubiquitous computing
 
Introduction to IoT Architectures and Protocols
Introduction to IoT Architectures and ProtocolsIntroduction to IoT Architectures and Protocols
Introduction to IoT Architectures and Protocols
 
Internet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, ApplicationsInternet of things (IoT)- Introduction, Utilities, Applications
Internet of things (IoT)- Introduction, Utilities, Applications
 
Introduction uc
Introduction ucIntroduction uc
Introduction uc
 
Pervasive Computing: Vision and Challenges
Pervasive Computing: Vision and ChallengesPervasive Computing: Vision and Challenges
Pervasive Computing: Vision and Challenges
 
Ubiquitous computing
Ubiquitous computing Ubiquitous computing
Ubiquitous computing
 
IoT and connected devices: an overview
IoT and connected devices: an overviewIoT and connected devices: an overview
IoT and connected devices: an overview
 
Virtualization in green computing
Virtualization in green computingVirtualization in green computing
Virtualization in green computing
 
cloud computing in e commerce
cloud computing in e commercecloud computing in e commerce
cloud computing in e commerce
 

En vedette

I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...
Karen Kaushansky
 
Why docker | OSCON 2013
Why docker | OSCON 2013Why docker | OSCON 2013
Why docker | OSCON 2013
dotCloud
 
Ambient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous ComputingAmbient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous Computing
Rohit Arora
 
Conversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipConversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data Stewardship
Loren Davie
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
Rob Manson
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
Ram kumar
 
Products are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes designProducts are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes design
Mike Kuniavsky
 
Understanding the New World of Cognitive Computing
Understanding the New World of Cognitive ComputingUnderstanding the New World of Cognitive Computing
Understanding the New World of Cognitive Computing
DATAVERSITY
 
Docker on IoT Devices
Docker on IoT DevicesDocker on IoT Devices
Docker on IoT Devices
Docker, Inc.
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016
Bill Chamberlin
 
Fog computing
Fog computingFog computing
Fog computing
Hari Priyanka
 
Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computing
Likan Patra
 
Bitcoin Seminar - Stockholm
Bitcoin Seminar - StockholmBitcoin Seminar - Stockholm
Bitcoin Seminar - Stockholm
Robin Teigland
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingJurema
 
Inside Bitcoins_AlanReiner
Inside Bitcoins_AlanReinerInside Bitcoins_AlanReiner
Inside Bitcoins_AlanReiner
Mediabistro
 
Rich Mironov Presentation
Rich Mironov PresentationRich Mironov Presentation
Brief lessons from the greatest product managers
Brief lessons from the greatest product managersBrief lessons from the greatest product managers
Brief lessons from the greatest product managers
Jeffrey T. Pollock
 
Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114
Clay Melugin
 

En vedette (18)

I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...I hear voices: Explorations of multidevice experiences with conversational as...
I hear voices: Explorations of multidevice experiences with conversational as...
 
Why docker | OSCON 2013
Why docker | OSCON 2013Why docker | OSCON 2013
Why docker | OSCON 2013
 
Ambient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous ComputingAmbient intelligence & Ubiquitous Computing
Ambient intelligence & Ubiquitous Computing
 
Conversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data StewardshipConversational Architecture, CAVE Language, Data Stewardship
Conversational Architecture, CAVE Language, Data Stewardship
 
Pervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In ItPervasive Computing : You're Already Knee Deep In It
Pervasive Computing : You're Already Knee Deep In It
 
Security and privacy issues of pervasive computing
Security and privacy issues of pervasive computingSecurity and privacy issues of pervasive computing
Security and privacy issues of pervasive computing
 
Products are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes designProducts are Services, how ubiquitous computing changes design
Products are Services, how ubiquitous computing changes design
 
Understanding the New World of Cognitive Computing
Understanding the New World of Cognitive ComputingUnderstanding the New World of Cognitive Computing
Understanding the New World of Cognitive Computing
 
Docker on IoT Devices
Docker on IoT DevicesDocker on IoT Devices
Docker on IoT Devices
 
Cognitive Computing : Trends to Watch in 2016
Cognitive Computing:  Trends to Watch in 2016Cognitive Computing:  Trends to Watch in 2016
Cognitive Computing : Trends to Watch in 2016
 
Fog computing
Fog computingFog computing
Fog computing
 
Seminar on pervasive computing
Seminar  on pervasive computingSeminar  on pervasive computing
Seminar on pervasive computing
 
Bitcoin Seminar - Stockholm
Bitcoin Seminar - StockholmBitcoin Seminar - Stockholm
Bitcoin Seminar - Stockholm
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Inside Bitcoins_AlanReiner
Inside Bitcoins_AlanReinerInside Bitcoins_AlanReiner
Inside Bitcoins_AlanReiner
 
Rich Mironov Presentation
Rich Mironov PresentationRich Mironov Presentation
Rich Mironov Presentation
 
Brief lessons from the greatest product managers
Brief lessons from the greatest product managersBrief lessons from the greatest product managers
Brief lessons from the greatest product managers
 
Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114Guide Report - Wireless Fundementals v1.0 150114
Guide Report - Wireless Fundementals v1.0 150114
 

Similaire à Pervasive Computing

Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
Rutvik Pensionwar
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
Rutvik Pensionwar
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
deaneal
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
RishabhRathore71
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
Valeria Gasik
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
Sunil Mahadeva
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentation
Rameshkumar1829
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
Pravallika Reddy
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
Assem mousa
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstract
Priti Punia
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
Hatum Hussain
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
Hatum Hussain
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
ijsptm
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
Pallav Kumar
 
WEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptxWEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptx
KLakshmi13
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
sanjaymps
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
ShailiPal1
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
ShailiPal1
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
VENKATA RAMANA PRABHALAVEEDU
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
Dhiraj Shinde
 

Similaire à Pervasive Computing (20)

Quality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous ComputingQuality Metrics In Ubiquitous Computing
Quality Metrics In Ubiquitous Computing
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
pervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.pptpervasive-computing-09022014092937-pervasive-computing.ppt
pervasive-computing-09022014092937-pervasive-computing.ppt
 
Ubiquitous computing
Ubiquitous computingUbiquitous computing
Ubiquitous computing
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Ubiquitous computing presentation
Ubiquitous computing presentationUbiquitous computing presentation
Ubiquitous computing presentation
 
Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02Pervasivecomputing 140422034057-phpapp02
Pervasivecomputing 140422034057-phpapp02
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
 
Ubiquitous computing abstract
Ubiquitous computing abstractUbiquitous computing abstract
Ubiquitous computing abstract
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Ubiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacyUbiquitous computing-and-its-privacy
Ubiquitous computing-and-its-privacy
 
Towards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud ServicesTowards Pervasive Computing Environments With Cloud Services
Towards Pervasive Computing Environments With Cloud Services
 
Pervasive computing
Pervasive computingPervasive computing
Pervasive computing
 
WEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptxWEARABLE COMPUTER.pptx
WEARABLE COMPUTER.pptx
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
Presentation1.pptx
Presentation1.pptxPresentation1.pptx
Presentation1.pptx
 
PERVASIVE COMPUTING
PERVASIVE COMPUTINGPERVASIVE COMPUTING
PERVASIVE COMPUTING
 
Chap 1 libre
Chap 1 libreChap 1 libre
Chap 1 libre
 

Dernier

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
saastr
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
flufftailshop
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
HarisZaheer8
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 

Dernier (20)

Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
Overcoming the PLG Trap: Lessons from Canva's Head of Sales & Head of EMEA Da...
 
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfNunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdf
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
AWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptxAWS Cloud Cost Optimization Presentation.pptx
AWS Cloud Cost Optimization Presentation.pptx
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 

Pervasive Computing

  • 2. INTRODUCTION GOALS OF PERVASIVE COMPUTING LAYERS IN PERVASIVE COMPUTING PRINCIPLES OF PERVASIVE COMPUTING VISIONS AND CHALLENGE DIFFERENCE BETWEEN UBIQUITOUS AND PERVASIVE COMPUTING APPLICATIONS BENEFITS LIMITATIONS CONCLUSION SYNOPSIS
  • 3. • Pervasive computing (also called ubiquitous computing) is the growing trend towards embedding microprocessors in everyday objects so they can communicate information. The words pervasive and ubiquitous mean "existing everywhere." Pervasive computing devices are completely connected and constantly available. • Pervasive computing relies on the convergence of wireless technologies, advanced electronics and the Internet. The goal of researchers working in pervasive computing is to create smart products that communicate unobtrusively. The products are connected to the Internet and the data they generate is easily available.
  • 4. The idea that technology is moving beyond the personal computer to everyday devices with embedded technology and connectivity as computing devices become progressively smaller and more powerful. Also called ubiquitous computing, pervasive computing is the result of computer technology advancing at exponential speeds - - a trend toward all man-made and some natural products having hardware and software.
  • 5. GOAL OF PERVASIVE COMPUTING Pervasive computing goes beyond the realm of personal computers: it is the idea that almost any device, from clothing to tools to appliances to cars to homes to the human body to your coffee mug, can be imbedded with chips to connect the device to an infinite network of other devices. The goal of pervasive computing, which combines current network technologies with wireless computing, voice recognition, Internet capability and artificial intelligence, is to create an environment where the connectivity of devices is embedded in such a way that the connectivity is unobtrusive and always available.
  • 6.
  • 7. Layer 1: task management layer  Monitors user task, context and index  Map user's task to need for the services in the environment  To manage complex dependencies Layer 2: environment management layer  To monitor a resource and its capabilities  To map service need, user level states of specific capabilities Layer 3: environment layer  To monitor a relevant resource  To manage reliability of the resources
  • 8.
  • 9. VISIONS AND CHALLENGE The essence of that vision was the creation of environments saturated with computing and communication capability, yet gracefully integrated with human users. When articulated, this was a vision too far ahead of its time — the hardware technology needed to achieve it simply did not exist.
  • 10. • Ubiquitous means everywhere. Pervasive means "diffused throughout every part of." In computing terms, those seem like somewhat similar concepts. Ubiquitous computing would be everywhere, and pervasive computing would be in all parts of your life. • That might mean the difference between seeing kiosks on every street corner and finding that you could -- or need to -- use your Palm handheld to do absolutely every information-based task. • And, in fact, that's where the difference between these two types of computing lies. Pervasive computing involves devices like handhelds -- small, easy-to-use devices -- through which we'll be able to get information on anything and everything. That's the sort of thing that Web-enabled cell phones promise. Ubiquitous computing, though, eschews our having to use computers at all. Instead, it's computing in the background, with technology embedded in the things we already use. That might be a car navigation system that, by accessing satellite pictures, alerts us to a traffic jam ahead, or an oven that shuts off when our food is cooked. Pervasive describes things that spread through a place to become established everywhere. Ubiquitous describes things that are everywhere in a place because it is the nature of that place to have those ubiquitous things.
  • 12. BENEFITS  INVISIBLE: “Smart” environments will be embedded with computing technologies that will be mostly out-of-sight.  SOIALIZATION: “Smart” buildings will illicit a more social response from occupants as computers user interfaces embed themselves within architecture.  DECISION-MAKING: “Smart” environments will help occupants to make better choices as they go about their everyday lives.  EMERGENT BEHAVIOR: Buildings are now becoming more and more kinetic in form and function. Their movements and constructed designs come together dynamically to yield behaviours that make them more adaptive.  INFORMATION PROCESSING: Architecture will go from crunching data to making sense of data; therefore, eliminating our need to constantly input adjustments.  ENHANCING EXPERIENCE: As computers ubiquitously embed themselves in our environments, sensors and actuators will create “smart” environments where architecture space will be goal oriented.  CONVERGENCE: Much of our environment will be supplemented with interconnected digital technologies.
  • 13. LIMITATIONS  Not entirely secure  Frequent line connections that are broken  Slow connections  Very expensive operating costs