Professional Documents
Culture Documents
Ubiquitous Computing
The idea of ubiquitous computing first came about in 1988, when a scientist by the name
of Mark D. Weiser first brought it to the computing community’s attention.
Born in the US in 1952, Weiser was an employee of Xerox PARC at the time – but he would
later go on to become known as the father of ubiquitous computing, and would be credited
with having the foresight to develop a theory that would apply for years to come.
Personal computers were only just on the cusp of becoming popular, and a world where
smartphones and tablets were so pervasive that they were in everyone’s bags and pockets
seemed a long way off.
It could become, as he termed it, “dramatic” – in the sense that manufacturers and computer
scientists would begin to create products so intriguing and unusual that they would stand a
good chance of bedding into a user’s life permanently and unavoidable.
Since then, there have been a whole host of ubiquitous computing-related events and
institutions, including conferences like the Ubicomp event, and the idea has gained lots of
traction.
CASE STUDY - Ubiquitous Applications and Different Devices.
Relationship between Ubiquitous Computing and Internet of Things.
TCOER
Poornima Ghodke
Artificial intelligence plays a part in ubiquitous computing, and the future of the frontend side
of web development is also uncertain due to advances in the artificial intelligence industry.
Anyway:
Fast forward to the modern-day, and Weiser’s original prediction that the world of computing
would evolve to work for us in the backgrounds of our lives has largely come true.
And that’s what they’re supposed to do: exist all over a room, a building, a system or even a
community without intruding.
Another example that a person is likely to come across is home automation systems which
allow for remote monitoring of properties.
Drivers, in particular, are likely to start seeing the effects of ubiquitous computing soon.
From self-driving cars to road toll systems which rely on smart, electronic systems to work,
this area is particularly in demand.
CASE STUDY - Ubiquitous Applications and Different Devices.
Relationship between Ubiquitous Computing and Internet of Things.
TCOER
Poornima Ghodke
Wherever a piece of technology is used to enable a smoother action to take place, then, it’s
likely that a ubiquitous computing-focused thought process has contributed to making that
happen.
The range of devices that are compatible with ubiquitous computing systems, meanwhile, is
wide.
Smartphones are perhaps the most obvious and immediate example, as these are often the
tools of choice for people who want to control their home automation systems and other
ubiquitous applications.
But many other devices are used as part of ubiquitous computing networks, too.
Sensors, for example, are classic nodes in a ubiquitous system, as they are often activated by
movement rather than when a conscious, user-directed input is detected.
A tech user only has to look around to see how Mark Weiser’s legacy has been largely
vindicated. And as time goes on, this will likely continue to be the case.
But there are also likely to be challenges to the dominance of ubiquitous computing ideas,
though.
Because ubiquitous computing applications are everywhere, they inevitably are going to end
up collecting more and more data on their subjects – and in today’s rightfully data security-
conscious society, the prospect of information being collected every time one of several
ubiquitous devices fire is worrying.
Services like Apple’s iCloud, which allows users to seamlessly access their data from a range
of devices no matter where they are, are obvious parts of the ubiquitous computing paradigm.
CASE STUDY - Ubiquitous Applications and Different Devices.
Relationship between Ubiquitous Computing and Internet of Things.
TCOER
Poornima Ghodke
But recent incidents like the iCloud hack of 2017 show that ubiquitous computing
applications can actually be a target as well as a beneficial product.
With data protection regulations like the European General Data Protection Regulation
coming into force in recent years, meanwhile, there’s no indication that the focus on data
security is likely to soften any time soon.
For ubiquitous computing providers, then, the most pressing need is now likely to be ensuring
that adequate data security features, such as encryption and two-factor authentication, are
built into their interfaces as standard.
Ultimately, however, there is no doubt that the convenience and ease which ubiquitous
computing platforms can offer are going to continue to provide value for many years to come.
The NEST smart home system alone, for example, includes everything from automatic
energy use regulation when on holiday to handy temperature scheduling systems, so it’s easy
to see why the popularity of ubiquitous devices is on the rise.
And with so many other providers offering similar benefits, the benefits of ubiquitous
computing are likely to, on the whole, outweigh the negatives every time.
CASE STUDY - Ubiquitous Applications and Different Devices.
Relationship between Ubiquitous Computing and Internet of Things.
TCOER
Poornima Ghodke
The internet of things has evolved the new concept of the Internet network. This enables
Smart devices
Mobile devices
The architecture of the Internet of Things provides effective communication between all
Objects
Gates
Network infrastructure
Cloud infrastructure
There are multiple benefits of using IoT and cloud computing together:
In a cloud infrastructure, you can deploy applications to process and analyze data
It is estimated that almost 4.4 trillion GB data is going to generate by the year
2020. This is no doubt that it will put a massive strain on its infrastructure. Hence,
there is a need to minimize this huge pressure and find a solution to transfer the
data. Cloud computing, on the other hand, provides adequate performance and
IoT and cloud computing has a complementary relationship. While IoT generates
large amounts of data, many cloud providers allow data transfer via the internet,
IoT developers can store the data remotely and access easily.
IoT devices which utilize common APIs and back-end infrastructure can receive
important security updates instantly through Cloud as soon as any security breach
happens in the infrastructure. This IoT and Cloud computing combined feature is
Conclusion
Our study shows that the application of ubiquitous computing are identified in three parts,
first is ubiquitous mobile application, second is ubiquitous web application, and third is
ubiquitous payment system application. For each explanation of that application, we conclude
that the uses of Ubiquitous Computing technology in Indonesia are still in development stage.
Further, the challenges to improve the use of ubiquitous computing in Indonesia is to provide
the infrastructure and the environment of ubiquitous computing so that many application of
ubiquitous computing can be available and identify in Indonesia. We also hope the research
of ubicomp technology in Indonesia will improve for the next year because it is still rarely to
find the paper which discuss about this technology
CASE STUDY - Ubiquitous Applications and Different Devices.
Relationship between Ubiquitous Computing and Internet of Things.
TCOER
Poornima Ghodke
References