SlideShare ist ein Scribd-Unternehmen logo
1 von 4
Downloaden Sie, um offline zu lesen
IS 746 - ASSIGNMENT 1: The Computer for the 21st Century




                    "Ubiquitous Computing" and
“Comparing Advancements (in terms of software, hardware and network)
   in mobile computing today with the ideas of Mark Weiser in 1991”




                            Fatih Özlü
                              1777762
                  Middle East Technical University

                           10 April, 2011




                                                                       1
Ubiquity and Mark’s Ideas Compared to Today
As people are starting to use the most common technologies just about anywhere, at any time,
as a result they become as a part of our everyday life, though mostly we are not aware of the
fact that any technology is accessible to us at shop, at home, at work, or even from your car
via mobile devices, pads, laptops or embedded systems. This phenomenon is named as
“ubiquity”, as Mark Weiser mentioned about that this kind of ubiquity calculation would
become a part of environment in the forms of live boards, pads, tabs, etc in different sizes and
with different abilities, in his article (Computer for the 21st Century, 1991).


In addition, he gives example of engines that evolves and started to be used in many areas like
for locking and unlocking doors, cleaning the windshield, and so on. So these technologies are
very common and we are not aware of them where they are used until to think about them, in
detail. The introduction sentence of the article reveals the main idea: “Specialized elements of
hardware and software, connected by wires, radio waves and infrared, will be so ubiquitous
that no one will notice their presence.”


Mark supposes that ubiquities computers will be common to help people in all areas of the life
in different sizes, each assigned to a particular task. As he describes, in the “embodied
virtuality”, tabs, pads and boards (yard size displays) participate at every part of the people
life like wall notes, clocks, thermostats, or even a small piece of paper. The smallest ones are
the tabs that will be used as pocket calculator or organizer that can make simple tasks of
people by keeping tracks of people. These components could interact with other mobile
computers, so they can exchange information, for example by shrinking a window onto the
tab. The other ones, Pads about in the size of papers, will become alternative to the windows
and will fulfill many more of paper’s functions. Boards which have large displays will serve a
lot with its screen for meetings, or other forms of collaborations for conference rooms and
open areas.


Compared to today, many similar devices are being used in our everyday lives as Mark has
foreseen. IPods and IPhones or such mobile devices are very common, and people got
accustomed to using them almost as the first necessity. In addition, examples of the boards
can be seen at many areas for advertising of show cards, or scoreboards at stadiums, etc. So
when thinking of these devices could interact between computers or other devices with many
messaging protocols via Bluetooth or infrared, Mark is said to be good at foreseeing.

                                                                                              2
In the article, Mark adds that “Prototype tabs, pads and boards are just the beginning of
ubiquitous computing.” and specifies that the real power of the concept comes from
interaction of all of them. He takes attention to the fact that linking wired and wireless
networks has some obstacles like common communication protocols or efficient data
transmission rates.


Although these issues are also important to be taken into consideration, the technology is as
advanced as Mark foresighted. The mobile networks are now more interoperated and data
transmission rate is fairly high, so as a result video telephone calls are even available by
mobile phones.


Another Mark’s prediction is about “micro-kernel” operating systems to perform specific
functions can be added or removed without shutting down computers or mobile systems. He
thinks future operating systems based on this principle can shrink quickly “to fit the changing
needs of ubiquitous computation”.


Such an approach to this kind of problem is also important for today’s systems and most
applications have tendency to have a base platform to be developed, though they have not
need to be working mostly while adding a new functionality or removing. At now, most
systems have these abilities.


Last issue to be mentioned is about privacy, as considered in many information systems
applications. Mark specifies that cryptographic techniques can be applied while sending
messages one computer to another one to ensure private data is isolated from the public.


Maybe, today’s the one of most important problems is privacy and to be ensured to safeguard
private information. As Mark suggests his solution to this problem by cryptography, it is one
of the choices can be applied to provide a total private information guard.


As a result, by looking over the article itself, it is not possible to believe that it is an article
with ideas from 1991. Each detail and issue has been nearly implemented or used in the real
life, so it could be said that Mark had come up with exact practical ideas.




                                                                                                  3
REFERENCES

   Mark Weiser, Palo Alto Research Center, Xerox, CA, USA, (September, 1991). The
    Computer for the 21st Century.




                                                                                     4

Weitere ähnliche Inhalte

Was ist angesagt?

Electronic Ink
Electronic InkElectronic Ink
Electronic Inkdwicz
 
Ai for everyone
Ai for everyoneAi for everyone
Ai for everyoneTrang Tran
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalEslam Nader
 
Speech Recognition Technology
Speech Recognition TechnologySpeech Recognition Technology
Speech Recognition TechnologyAamir-sheriff
 
IRJET- Automatic Smart Mop for Floor Cleaning
IRJET-  	  Automatic Smart Mop for Floor CleaningIRJET-  	  Automatic Smart Mop for Floor Cleaning
IRJET- Automatic Smart Mop for Floor CleaningIRJET Journal
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Thingspkshc01
 
Daknet report full (prepared by me for my seminar in my college)
Daknet report full (prepared by me for my seminar in my college)Daknet report full (prepared by me for my seminar in my college)
Daknet report full (prepared by me for my seminar in my college)Nikhil Jain
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarRAJESHKUMARG12
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergDr. Mazlan Abbas
 
Comparison of the parts of the robot and human
Comparison of the parts of the robot and humanComparison of the parts of the robot and human
Comparison of the parts of the robot and humanAMOSOGAGAH
 
Introduction to smartphones
Introduction to smartphonesIntroduction to smartphones
Introduction to smartphonesKamran Zahid
 
Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar reportSKS
 

Was ist angesagt? (20)

Electronic Ink
Electronic InkElectronic Ink
Electronic Ink
 
Artificial inteligence
Artificial inteligenceArtificial inteligence
Artificial inteligence
 
Ai for everyone
Ai for everyoneAi for everyone
Ai for everyone
 
Eye gaze communication
Eye gaze communicationEye gaze communication
Eye gaze communication
 
Internet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digitalInternet of things (IOT) connects physical to digital
Internet of things (IOT) connects physical to digital
 
Speech Recognition Technology
Speech Recognition TechnologySpeech Recognition Technology
Speech Recognition Technology
 
IoT
IoTIoT
IoT
 
IRJET- Automatic Smart Mop for Floor Cleaning
IRJET-  	  Automatic Smart Mop for Floor CleaningIRJET-  	  Automatic Smart Mop for Floor Cleaning
IRJET- Automatic Smart Mop for Floor Cleaning
 
Internet of Things (IoT) - IK
Internet of Things (IoT) - IKInternet of Things (IoT) - IK
Internet of Things (IoT) - IK
 
Internet of Things
Internet of ThingsInternet of Things
Internet of Things
 
Daknet report full (prepared by me for my seminar in my college)
Daknet report full (prepared by me for my seminar in my college)Daknet report full (prepared by me for my seminar in my college)
Daknet report full (prepared by me for my seminar in my college)
 
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.RajeshkumarInternet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
Internet of Things(IOT)_Seminar_Dr.G.Rajeshkumar
 
Internet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An IcebergInternet of Things (IoT) - We Are at the Tip of An Iceberg
Internet of Things (IoT) - We Are at the Tip of An Iceberg
 
EYE GAZE SYSTEM
EYE GAZE SYSTEMEYE GAZE SYSTEM
EYE GAZE SYSTEM
 
Humans versus robots
Humans versus robotsHumans versus robots
Humans versus robots
 
Comparison of the parts of the robot and human
Comparison of the parts of the robot and humanComparison of the parts of the robot and human
Comparison of the parts of the robot and human
 
Robotics in medical
Robotics in medicalRobotics in medical
Robotics in medical
 
Introduction to smartphones
Introduction to smartphonesIntroduction to smartphones
Introduction to smartphones
 
basic ppt on IOT
basic ppt on IOTbasic ppt on IOT
basic ppt on IOT
 
Cloud computing in iot seminar report
Cloud computing in iot seminar reportCloud computing in iot seminar report
Cloud computing in iot seminar report
 

Ähnlich wie The computer for the 21st century

Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computingdeaneal
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing PaperAssem mousa
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHina Afzal
 
Coming Of Calm Technology
Coming Of Calm TechnologyComing Of Calm Technology
Coming Of Calm TechnologyChuka Okoye
 
Being digital, the skills of the interactive systems designer.pptx
Being digital, the skills of the interactive systems designer.pptxBeing digital, the skills of the interactive systems designer.pptx
Being digital, the skills of the interactive systems designer.pptxHamzakhalid708089
 
Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write upWhoGoesThere
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computingu065932
 
Ad Hoc Networking An Introduction
Ad Hoc Networking  An IntroductionAd Hoc Networking  An Introduction
Ad Hoc Networking An IntroductionSabrina Ball
 
Embedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignEmbedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignDave Shaw
 
Ubiquitous computing 1.0
Ubiquitous computing 1.0Ubiquitous computing 1.0
Ubiquitous computing 1.0jan aljan
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingAnkita Gupta
 
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?Olivia Moran
 
THE EVOLUTION OF HUMANITY'S GREATEST INVENTION, THE COMPUTER, AND ITS FUTURE.pdf
THE EVOLUTION OF HUMANITY'S GREATEST INVENTION, THE COMPUTER, AND ITS FUTURE.pdfTHE EVOLUTION OF HUMANITY'S GREATEST INVENTION, THE COMPUTER, AND ITS FUTURE.pdf
THE EVOLUTION OF HUMANITY'S GREATEST INVENTION, THE COMPUTER, AND ITS FUTURE.pdfFaga1939
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectAnneilynLeal
 
Seamless Computing Notes
Seamless Computing NotesSeamless Computing Notes
Seamless Computing Notesphilipely
 
Intermediate project by harsha
Intermediate project by harshaIntermediate project by harsha
Intermediate project by harshaHARSHA DURUGOJI
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 

Ähnlich wie The computer for the 21st century (20)

Ubiqutous Computing
Ubiqutous ComputingUbiqutous Computing
Ubiqutous Computing
 
Ubiquitous computing Paper
 Ubiquitous computing Paper Ubiquitous computing Paper
Ubiquitous computing Paper
 
How to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdfHow to overcome security issues of smart home.pdf
How to overcome security issues of smart home.pdf
 
Coming Of Calm Technology
Coming Of Calm TechnologyComing Of Calm Technology
Coming Of Calm Technology
 
Being digital, the skills of the interactive systems designer.pptx
Being digital, the skills of the interactive systems designer.pptxBeing digital, the skills of the interactive systems designer.pptx
Being digital, the skills of the interactive systems designer.pptx
 
Pervasive computing write up
Pervasive computing write upPervasive computing write up
Pervasive computing write up
 
Ubiquitous Computing
Ubiquitous ComputingUbiquitous Computing
Ubiquitous Computing
 
AdvancedTech
AdvancedTechAdvancedTech
AdvancedTech
 
Ad Hoc Networking An Introduction
Ad Hoc Networking  An IntroductionAd Hoc Networking  An Introduction
Ad Hoc Networking An Introduction
 
Embedded & Tangible Interaction Design
Embedded & Tangible Interaction DesignEmbedded & Tangible Interaction Design
Embedded & Tangible Interaction Design
 
Ubiquitous computing 1.0
Ubiquitous computing 1.0Ubiquitous computing 1.0
Ubiquitous computing 1.0
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?
Technology Infrastructure For The Pervasive Vision, Does It Exist Yet?
 
THE EVOLUTION OF HUMANITY'S GREATEST INVENTION, THE COMPUTER, AND ITS FUTURE.pdf
THE EVOLUTION OF HUMANITY'S GREATEST INVENTION, THE COMPUTER, AND ITS FUTURE.pdfTHE EVOLUTION OF HUMANITY'S GREATEST INVENTION, THE COMPUTER, AND ITS FUTURE.pdf
THE EVOLUTION OF HUMANITY'S GREATEST INVENTION, THE COMPUTER, AND ITS FUTURE.pdf
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
 
UBIQUITOUS COMPUTING
UBIQUITOUS COMPUTINGUBIQUITOUS COMPUTING
UBIQUITOUS COMPUTING
 
Seamless Computing Notes
Seamless Computing NotesSeamless Computing Notes
Seamless Computing Notes
 
cscw
cscwcscw
cscw
 
Intermediate project by harsha
Intermediate project by harshaIntermediate project by harsha
Intermediate project by harsha
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 

Mehr von Fatih Özlü

Commonly Used Image File Formats
Commonly Used Image File FormatsCommonly Used Image File Formats
Commonly Used Image File FormatsFatih Özlü
 
Android Implementation using MQTT Protocol
Android Implementation using MQTT ProtocolAndroid Implementation using MQTT Protocol
Android Implementation using MQTT ProtocolFatih Özlü
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computingFatih Özlü
 
Presentation: Location in ubiquitous computing
Presentation: Location in ubiquitous computingPresentation: Location in ubiquitous computing
Presentation: Location in ubiquitous computingFatih Özlü
 
Marketing and sales in Cloud Computing
Marketing and sales in Cloud ComputingMarketing and sales in Cloud Computing
Marketing and sales in Cloud ComputingFatih Özlü
 
Measuring e-Governance as an Innovation in the Public Sector
Measuring e-Governance as an Innovation in the Public SectorMeasuring e-Governance as an Innovation in the Public Sector
Measuring e-Governance as an Innovation in the Public SectorFatih Özlü
 
Operating System Windows CE 7.0 and Processor ARM Advantages and Disadvantages
Operating System Windows CE 7.0 and Processor ARM Advantages and DisadvantagesOperating System Windows CE 7.0 and Processor ARM Advantages and Disadvantages
Operating System Windows CE 7.0 and Processor ARM Advantages and DisadvantagesFatih Özlü
 
Porters Value Chain
Porters Value ChainPorters Value Chain
Porters Value ChainFatih Özlü
 

Mehr von Fatih Özlü (9)

Commonly Used Image File Formats
Commonly Used Image File FormatsCommonly Used Image File Formats
Commonly Used Image File Formats
 
Android Implementation using MQTT Protocol
Android Implementation using MQTT ProtocolAndroid Implementation using MQTT Protocol
Android Implementation using MQTT Protocol
 
Design Patterns
Design PatternsDesign Patterns
Design Patterns
 
Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
Presentation: Location in ubiquitous computing
Presentation: Location in ubiquitous computingPresentation: Location in ubiquitous computing
Presentation: Location in ubiquitous computing
 
Marketing and sales in Cloud Computing
Marketing and sales in Cloud ComputingMarketing and sales in Cloud Computing
Marketing and sales in Cloud Computing
 
Measuring e-Governance as an Innovation in the Public Sector
Measuring e-Governance as an Innovation in the Public SectorMeasuring e-Governance as an Innovation in the Public Sector
Measuring e-Governance as an Innovation in the Public Sector
 
Operating System Windows CE 7.0 and Processor ARM Advantages and Disadvantages
Operating System Windows CE 7.0 and Processor ARM Advantages and DisadvantagesOperating System Windows CE 7.0 and Processor ARM Advantages and Disadvantages
Operating System Windows CE 7.0 and Processor ARM Advantages and Disadvantages
 
Porters Value Chain
Porters Value ChainPorters Value Chain
Porters Value Chain
 

The computer for the 21st century

  • 1. IS 746 - ASSIGNMENT 1: The Computer for the 21st Century "Ubiquitous Computing" and “Comparing Advancements (in terms of software, hardware and network) in mobile computing today with the ideas of Mark Weiser in 1991” Fatih Özlü 1777762 Middle East Technical University 10 April, 2011 1
  • 2. Ubiquity and Mark’s Ideas Compared to Today As people are starting to use the most common technologies just about anywhere, at any time, as a result they become as a part of our everyday life, though mostly we are not aware of the fact that any technology is accessible to us at shop, at home, at work, or even from your car via mobile devices, pads, laptops or embedded systems. This phenomenon is named as “ubiquity”, as Mark Weiser mentioned about that this kind of ubiquity calculation would become a part of environment in the forms of live boards, pads, tabs, etc in different sizes and with different abilities, in his article (Computer for the 21st Century, 1991). In addition, he gives example of engines that evolves and started to be used in many areas like for locking and unlocking doors, cleaning the windshield, and so on. So these technologies are very common and we are not aware of them where they are used until to think about them, in detail. The introduction sentence of the article reveals the main idea: “Specialized elements of hardware and software, connected by wires, radio waves and infrared, will be so ubiquitous that no one will notice their presence.” Mark supposes that ubiquities computers will be common to help people in all areas of the life in different sizes, each assigned to a particular task. As he describes, in the “embodied virtuality”, tabs, pads and boards (yard size displays) participate at every part of the people life like wall notes, clocks, thermostats, or even a small piece of paper. The smallest ones are the tabs that will be used as pocket calculator or organizer that can make simple tasks of people by keeping tracks of people. These components could interact with other mobile computers, so they can exchange information, for example by shrinking a window onto the tab. The other ones, Pads about in the size of papers, will become alternative to the windows and will fulfill many more of paper’s functions. Boards which have large displays will serve a lot with its screen for meetings, or other forms of collaborations for conference rooms and open areas. Compared to today, many similar devices are being used in our everyday lives as Mark has foreseen. IPods and IPhones or such mobile devices are very common, and people got accustomed to using them almost as the first necessity. In addition, examples of the boards can be seen at many areas for advertising of show cards, or scoreboards at stadiums, etc. So when thinking of these devices could interact between computers or other devices with many messaging protocols via Bluetooth or infrared, Mark is said to be good at foreseeing. 2
  • 3. In the article, Mark adds that “Prototype tabs, pads and boards are just the beginning of ubiquitous computing.” and specifies that the real power of the concept comes from interaction of all of them. He takes attention to the fact that linking wired and wireless networks has some obstacles like common communication protocols or efficient data transmission rates. Although these issues are also important to be taken into consideration, the technology is as advanced as Mark foresighted. The mobile networks are now more interoperated and data transmission rate is fairly high, so as a result video telephone calls are even available by mobile phones. Another Mark’s prediction is about “micro-kernel” operating systems to perform specific functions can be added or removed without shutting down computers or mobile systems. He thinks future operating systems based on this principle can shrink quickly “to fit the changing needs of ubiquitous computation”. Such an approach to this kind of problem is also important for today’s systems and most applications have tendency to have a base platform to be developed, though they have not need to be working mostly while adding a new functionality or removing. At now, most systems have these abilities. Last issue to be mentioned is about privacy, as considered in many information systems applications. Mark specifies that cryptographic techniques can be applied while sending messages one computer to another one to ensure private data is isolated from the public. Maybe, today’s the one of most important problems is privacy and to be ensured to safeguard private information. As Mark suggests his solution to this problem by cryptography, it is one of the choices can be applied to provide a total private information guard. As a result, by looking over the article itself, it is not possible to believe that it is an article with ideas from 1991. Each detail and issue has been nearly implemented or used in the real life, so it could be said that Mark had come up with exact practical ideas. 3
  • 4. REFERENCES  Mark Weiser, Palo Alto Research Center, Xerox, CA, USA, (September, 1991). The Computer for the 21st Century. 4