Assignment1
Assignment1
Assignment1
format format
x2 x2 x2 x1 x1 x1 x1
Ashesh Anand
Ubiquitous
Jun 09, 2022
Computing:
Characteristi
cs,
Advantages
&
FUNDAMENTALS OF INFORMATION AND COMMUNICATION TECHNOLOGY
Challenges. (CSC034)
PREPARED FOR
PREPARED BY
P1005U02
ASSIGNMENT 1 :
WORD PROCESSOR
CSC034 PUTERI FARAH HANNAH
Table Of Contents
Table of Contents……………………………………………………………………………1
Sentient Computing............................................................................................. 5
Discussion...................................................................................................................9
WORD PROCESSOR 1
CSC034 PUTERI FARAH HANNAH
Computing everywhere and at any time not only improves efficacy and efficiency, but
it also saves money. The concept of ubiquitous computing, also known as pervasive
computing, ambient intelligence, or "everywhere," is one of the most advanced forms
of computing. The simplicity of being in-network has always offered an assortment of
technological breakthroughs in both wired and wireless networks, thanks to the
emergence of ubiquitous computing applications. However, "What is Ubiquitous
Computing?" is a question that emerges here.
WORD PROCESSOR 2
CSC034 PUTERI FARAH HANNAH
The concept of ubiquitous computing dates back to the late 1980s. The phrase
"ubiquitous computing" was coined by Mark Weiser, who worked as the Chief
Technologist at Xerox PARC (Palo Alto Research Center) in 1988. He co-authored
some of the first studies on the issue alongside PARC Director and Chief Scientist
John Seely Brown. Weiser is credited with coining the term "ubiquitous computing"
and exploring its key difficulties.
WORD PROCESSOR 3
CSC034 PUTERI FARAH HANNAH
WORD PROCESSOR 4
CSC034 PUTERI FARAH HANNAH
Ubiquitous computing is made up of numerous layers, each with its own function,
that work together to form a single system.
1) The Task Management layer examines user tasks, context, and indexes. It
also takes care of the territory's complicated interdependencies.
2) The Environment Management layer keeps track of resources and their
capabilities, as well as mapping service requirements and user-level statuses
of specific capabilities.
3) The Environment layer keeps track of important resources and manages their
dependability.
Sentient Computing
WORD PROCESSOR 5
CSC034 PUTERI FARAH HANNAH
The basic goal of ubiquitous computing is to create smart, linked products that make
communication and data sharing easier and less intrusive.
i. The human component is taken into account, and the paradigm is placed in a
human, rather than a computational, environment.
ii. Use of low-cost processors, resulting in lower memory and storage
requirements.
iii. Real-time properties are captured.
iv. Computer gadgets that are always linked and available.
v. In the environment, focus on many-to-many relationships rather than one-to-
one, many-to-one, or one-to-many, as well as the idea of technology, which is
always present.
vi. Takes into account local/global, social/personal, public/private, and
invisible/visible characteristics, as well as knowledge creation and distribution.
vii. It is built on the convergence of the Internet, wireless technologies, and
modern electronics.
viii. Because digital gadgets are worn and always connected, there may be
increased surveillance and possibly restrictions and interference with user
privacy.
ix. As technology advances, the reliability of many pieces of equipment may be
impacted.
WORD PROCESSOR 6
CSC034 PUTERI FARAH HANNAH
Some of the advantages of ubiquitous computing include lower service costs through
smart networks, increased industrial scheduling and productivity, and faster
response times in health care settings. More precise targeted advertising and more
convenient personal financial transactions are two further advantages.
Rural education can also be delivered via interactive media delivery technology,
which allows students and instructors to communicate in a personal setting without
having to be in the same classroom.
WORD PROCESSOR 7
CSC034 PUTERI FARAH HANNAH
One of the most serious issues that ubiquitous computing faces is privacy. Protecting
system security, privacy, and safety is critical in ubiquitous computing.
It's also worth noting that, despite progress in ubiquitous computing, the sector
continues to confront challenges in areas like human-machine interfaces and data
security, as well as technical impediments that cause concerns with availability and
reliability.
Despite the rapid proliferation of smart devices today, making ubiquitous computing
available to everyone with a comprehensive infrastructure and ease of use is a
difficult undertaking. Senior persons and individuals living in rural areas are still at a
disadvantage, which must be addressed if ubiquitous computing is to be adopted in
a healthy way.
Information has evolved into a connected, dynamic 4th dimensional field that can
only be seen when a portion of it is requested. It is impossible to feel or access all of
it at once, and our interfaces are still limited in that we can only access this data
through flat, two-dimensional screens.
WORD PROCESSOR 8
CSC034 PUTERI FARAH HANNAH
Discussion
The takeaway of ubiquitous computing is that it has many benefits that can help daily
activities become much more simpler and faster. Not only that, Ubiquitous computing
contributes to many work areas in making work run smoothly. It benefits and create
business possibilities to many. Nevertheless, it also has its downsides because of
how exposed it is towards privacy. However, the users of ubiquitous computing must
take note to protect one’s privacy and build up security walls to eliminate breaches of
privacy. This step should not be taken lightly as it can save us from the unwanted
outcomes. With that being said, it is crystal clear that ubiquitous computing is not
only helping those who are around you, but developing the world into a better future,
with hopes that the challenges can be overcome.
WORD PROCESSOR 9