SlideShare ist ein Scribd-Unternehmen logo
1 von 30
5 Pen PC Technology
Presented by :
Varsha B. Shidore
Content
• Introduction
• History
• What is 5 pen PC technology?
• Designer of P – ISM
• Definition of 5 Pen PC Technology(P-ISM)
• The Pen style Computer
• Block Diagram of P-ISM
• P-ISM Gadget Package Functions
• Internal Structure
• Functions
• Battery
• Smart Use
• Advanced computing
• Merits / Demerits
• Conclusion
Introduction
• Communication Technology is rapidly increasing in this modern
world. Computer, as everybody knows, is the main communication
machine used.
• Since the time computer has been invented scientists and engineers
have been trying making it more and more compact.
• As a result we have been able to enjoy the numerous functionalities
provided by the computers whether it is Home PCs or Laptops.
Systems have still been reduced so that they are used in Mobiles I-
pods and I-phones have replaced the laptops to an extent.
• It is in this context that Pen Computers come into spot light. These
are computers in the shape of different pens each having a function
of its own and when combined together give us the usage of a full-
blown computer. It is a computer broken apart into pieces, each the
size of a pen.
• The screen and keyboard are projected onto surfaces.
History
• "Pen-style Personal Networking Gadget" created in 2003 by
Japanese technology company NEC.
• Its designer Tour Ichihash.
• P-ISM was first featured at the 2003 ITUTelecom world held in
Geneva, Switzerland.
What is it?
• Just as the name suggests, this technology is comprised of five
major components. It utilizes Bluetooth and internet in order to
communicate.
• The promise made by 5 Pen PC or the P-ISM technology is that it
will allow you to create a computing environment anywhere you
want.
• If you are at a store and want to kill time, take out your P-ISM out
and it projects an A4 size screen anywhere you want.
Designer of P-ISM
Toru Ichihashi said that
“In developing this concept he asked himself-
“What is the future of IT when it is small?”
• The pen was a logical choice.
He also wanted a product that u could touch
and feel.
• Further , the intent is to allow for an office
anywhere.
P-ISM
• P-ISM ("Pen-style Personal Networking Gadget Package"), which is
nothing but the new discovery, which is under developing, stage by
NEC Corporation.
• At the 2003 ITU Telecom World exhibition held in Geneva, the
Tokyo-based NEC Corporation displayed a conceptual $30,000
prototype of P-ISM.
• Surely this will have a great impact on the computer field. In this
device you will find Bluetooth as the main interconnecting device
between different peripherals.
• 5 Pen PC Technology is a gadget package including five functions:
• A pen-style cellular phone with a handwriting data input function,
virtual keyboard, a very small projector, camera scanner, and
personal ID key with cashless pass function.
• 5 Pen PC Technology are connected with one another through
short-range wireless technology.
• The whole set is also connected to the Internet through the cellular
phone function. This personal gadget in a minimalist pen style
enables the ultimate ubiquitous computing.
The pen style computer
• This is the heart of the P-SIM.
• It runs a dual core processor at the
moment and can run Windows.
• It is not a stretch to imagine that it will
run faster processor and run other
operating systems such as Android and
other Linux variants for niche purposes.
Block diagram of P-ISM
P-ISM is a gadget package including
five functions:
• CPU Pen
• DIGITAL CAMERA
• VIRTUAL KEYBOARD
• COMMUNICATION Pen
• LED PROJECTOR
Internal structure
CPU Pen
• The functionality of the CPU is done
by one of the pen.
• It is also known as computing engine.
• Dual Core processor is used.
• Works with windows operating system.
• The central processing unit (CPU) is the
portion of a computer system that
carries out the instructions of a
computer program, and is the primary
element carrying out the computer's
functions.
• The central processing unit carries out
each instruction of the program in
sequence, to perform the basic
arithmetical, logical, and input/output
operations of the system.
• This term has been in use in the computer industry at least since the early
1960s.
• The form, design and implementation of CPU shave changed dramatically
since the earliest examples, but their fundamental operation remains
much the same.
• Early CPUs were custom-designed as apart of a larger, sometimes one-of-
a-kind, and computer. However, this costly method of designing custom
CPUs for a particular application has largely given way to the development
of mass-produced processors that are made for one or many purposes.
• This standardization trend generally began in the era of discrete transistor
mainframes and mini computers and has rapidly accelerated with the
popularization of the integrated circuit(IC).
• The IC has allowed increasingly complex CPUs to be designed and
manufactured to tolerances on the order of nanometers. Both the
miniaturization and standardization of CPUs have increased the presence
of these digital devices in modern life far beyond the limited application of
dedicated computing machines.
• Modern microprocessors appear in everything from automobiles to cell
phones and children's toys.
Communication Pen
• Wireless Bluetooth Technology.
• Connected to internet through cellular phone
function.
• Uses Wi -Fi technology.
• Exchange information with wireless connection.
• They are connected through Tri-wireless modes
(Bluetooth,802.11/ G, and Cellular) which are
made small and kept in a small pen like device.
Connectivity 802.11B/G and
Bluetooth:
• In fact, no-one expects much activity on 802.11n installations until
the middle of 2008. “Rolling out 802.11n would mean a big upgrade
for customers who already have full Wi-Fi coverage, and would be a
complex add-on to existing wired networks, for those who haven't.
• Bluetooth is widely used because we can able to transfer data or
make connections without wires. This is very effective because we
can able to connect whenever we need without having wires. They
are used at the frequency band of 2.4 GHz ISM (although they use
different access mechanisms).
• Bluetooth mechanism is used for exchanging signal status
information between two devices. This techniques have been
developed that do not require communication between the two
devices (such as Bluetooth’s Adaptive Frequency Hopping), the
most efficient and comprehensive solution for the most serious
problems can be accomplished by silicon vendors.
• They can implement information exchange capabilities within the
designs of the Bluetooth. The circuit diagram for the 802.11B/G is
given below. It is nothing but also type of Bluetooth.
• Using this connectivity we can also connect it with the internet and
can access it anywhere in the world.
LED Projector
• When you think about projectors, you think about
those heavy and expensive things you see during
presentations that are mostly rented and not
bought.
• However, projectors have become smaller and
cheaper since.
• There have even been phones with mini projectors
built into them too.
• The P-SIM projector is similar to what you’ll
experience on your portable device.
• Depending on how far you are from a flat surface,
this can be either adequate or very clear.
• As time goes on, newer projectors will be able to
give you even better resolution for high definition
pictures and videos.
• According to NEC, which is developing P-SIM since
2003, the projector could either be stand along or
integrated with the pen style computer.
Functions of LED Projector
• Monitor is LED Projector.
• Size is A4.
• Appropriate Resolution capacity is 1024*768 pixels.
• Gives more clarity and good picture.
Virtual Keyboard
• Virtual laser keyboard is a new
gadget.
• It emits laser on desk.
• It uses laser beam to generate full
size perfect keyboard that smoothly
connects to PC and Most of the
handheld devices (PDA's, tablet PC').
• The I-Tech laser keyboard acts
exactly like any other "ordinary“
keyboard: A direction technology
based on an optical recognition
mechanism enables the user to tap
on the projected key images,
while producing real tapping sounds
(we call it the WOW effect).
How to use Virtual keyboard?
• It is more compatible and it did not require
any practice to operate but you must have
strong fingers to tap.
• The I-Tech Virtual Keyboard uses a light
projection of a full-sized computer keyboard
on almost any surface.
• Used with PDA's and Smart Phones, the
Virtual Keyboard provides a practical way to
do e-mail, word processing and spreadsheet
tasks , enabling users to leave laptops and
computers at home.
• VKB's adaptable technology studies the user's
finger movements to interpret and record
keystrokes. Because the virtual keyboard is an
image projected by light, it disappears
completely when not in use.
Actual use of virtual keyboard
• Cellular Telephones
• Space saving Computers
• Laptops
• Tablet PCs
• Clean Rooms
• Industrial Environments
• Test Equipment
• Sterile and Medical
• Environments
• Transport (Air, Rail,Automotive).
Features of Virtual Keyboards
• VKB settings can be changed by
Sound
• Connection
• Intensity
• Timeouts
• Sensitivity
• Auto-repeat
Digital Camera
• We had digital camera in the shape of pen.
• It is useful in video recording ,video conferencing
simply as a webcam..
• It is connected with other devices through Bluetooth.
• Major advantage : It is small which is easily portable.
• It is 360 degree visual communication device.
• We have seen video phones hundreds of times in
movies.
• Conventional visual communications at a distance
have been limited due to the display devices and
terminals.
• This terminal enables showing of the surrounding
atmosphere and group-to-group communication
with a round display and a central super-wide-angle
camera.
Battery
• Is is the most important part in the portable type of computers.
• Usually batteries are small in size and work for a long time.
• It comes with a battery life of 6+ (i.e 6 days).
• For normal use it can be used for 2 weeks.
Smart Use
Advanced Computing With the
Amazing 5 Pen PC Technology
• Desktop and laptops have been around for more than 2 decades
now and everybody agrees that they have overstayed their
welcome by a few years. That is true for about 95% of the users.
• They don’t want most of what their computer is capable of doing.
• They don’t want to carry 3.5 pound behemoths for their job.
• Sure, smartphones and tablets are one way to replace them, but
the 5 pen PC technology takes computing to the next level.
Merits
• This 'pen sort of instrument' produces both
the monitor as well as the keyboard on any
flat surfaces from where you can carry out
functions you would normally do on your
desktop computer.
• Portable
• Feasible
• Ubiquitous computing is done
• Wi-Fi technology
Demerits
• Currently un clear
• High Cost
• Battery
• Keyboard concept is not new
• Positioning is main
Conclusion
• The communication devices are becoming smaller and compact.
• This is only an example for the start of this new technology.
• We can expect more such developments in the future.
• Overall, the 5 Pen PC is a very promising device.
• It will certainly change the way we use technology, and indeed
eliminate a lot of heavy devices that we use today, for the most part
of it.
THANK YOU !

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
Presentation on 5 pen technology
Presentation on 5 pen technologyPresentation on 5 pen technology
Presentation on 5 pen technology
 
E-ball Technology ppt
E-ball Technology pptE-ball Technology ppt
E-ball Technology ppt
 
5 pen technology
5 pen technology5 pen technology
5 pen technology
 
FIVE PEN PC TECHNOLOGY
FIVE PEN PC TECHNOLOGYFIVE PEN PC TECHNOLOGY
FIVE PEN PC TECHNOLOGY
 
E-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORTE-BALL TECHNOLOGY SEMINAR REPORT
E-BALL TECHNOLOGY SEMINAR REPORT
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
Abstract E-BALL TECHNOLOGY
Abstract   E-BALL TECHNOLOGYAbstract   E-BALL TECHNOLOGY
Abstract E-BALL TECHNOLOGY
 
5 pen pc technology
5 pen pc technology5 pen pc technology
5 pen pc technology
 
5pen pc Technology
5pen pc Technology5pen pc Technology
5pen pc Technology
 
E ball technology
E ball technologyE ball technology
E ball technology
 
Virtual keyboard
Virtual keyboardVirtual keyboard
Virtual keyboard
 
Virtual keyboard seminar ppt
Virtual keyboard seminar pptVirtual keyboard seminar ppt
Virtual keyboard seminar ppt
 
e ball presentation
e ball presentatione ball presentation
e ball presentation
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
5 PEN PC TECHNOLOGY with GEN OF Computers
5 PEN PC TECHNOLOGY with GEN OF Computers5 PEN PC TECHNOLOGY with GEN OF Computers
5 PEN PC TECHNOLOGY with GEN OF Computers
 
Virtual keyboard
Virtual keyboardVirtual keyboard
Virtual keyboard
 
E ball ppt
E ball pptE ball ppt
E ball ppt
 
5 pen pc technology ppt for seminor
5 pen pc technology ppt for seminor5 pen pc technology ppt for seminor
5 pen pc technology ppt for seminor
 
5 pen pc tech
5 pen pc tech5 pen pc tech
5 pen pc tech
 

Ähnlich wie 5 pen pc technology

Ähnlich wie 5 pen pc technology (20)

5 pen pc technology (pen style computing)
5 pen pc technology (pen style computing)5 pen pc technology (pen style computing)
5 pen pc technology (pen style computing)
 
pen-pc
 pen-pc pen-pc
pen-pc
 
5pen pc
5pen pc5pen pc
5pen pc
 
Pen pc
Pen pcPen pc
Pen pc
 
Pen pc tecn
Pen pc tecnPen pc tecn
Pen pc tecn
 
5 pen pc
5 pen pc 5 pen pc
5 pen pc
 
5 pen technology
5 pen technology5 pen technology
5 pen technology
 
5-Pen-PC-Technology-ppt-Presentation (1) - Copy
5-Pen-PC-Technology-ppt-Presentation (1) - Copy5-Pen-PC-Technology-ppt-Presentation (1) - Copy
5-Pen-PC-Technology-ppt-Presentation (1) - Copy
 
5penpctechnology
5penpctechnology 5penpctechnology
5penpctechnology
 
5penpctechnology 130402085735-phpapp01
5penpctechnology 130402085735-phpapp015penpctechnology 130402085735-phpapp01
5penpctechnology 130402085735-phpapp01
 
47 5penpctechnology
47 5penpctechnology47 5penpctechnology
47 5penpctechnology
 
5penpctechnology 130402085735-phpapp01
5penpctechnology 130402085735-phpapp015penpctechnology 130402085735-phpapp01
5penpctechnology 130402085735-phpapp01
 
5 PEN TECHNOLOGY SLIDES
5 PEN TECHNOLOGY SLIDES5 PEN TECHNOLOGY SLIDES
5 PEN TECHNOLOGY SLIDES
 
5 pen-pc-technology-powerpoint-presentation.ppt (1)
5 pen-pc-technology-powerpoint-presentation.ppt (1)5 pen-pc-technology-powerpoint-presentation.ppt (1)
5 pen-pc-technology-powerpoint-presentation.ppt (1)
 
5 Pen PC Technology
5 Pen PC Technology5 Pen PC Technology
5 Pen PC Technology
 
5 pen pc tech
5 pen pc tech5 pen pc tech
5 pen pc tech
 
5 Pen Technology
5 Pen Technology5 Pen Technology
5 Pen Technology
 
5pc pen technology
5pc pen technology5pc pen technology
5pc pen technology
 
5 pen technology documentation
5 pen technology documentation5 pen technology documentation
5 pen technology documentation
 
5-pen pc ppt by SSS
5-pen pc ppt by SSS5-pen pc ppt by SSS
5-pen pc ppt by SSS
 

Kürzlich hochgeladen

Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESNarmatha D
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxVelmuruganTECE
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxRomil Mishra
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfRajuKanojiya4
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxsiddharthjain2303
 

Kürzlich hochgeladen (20)

Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Industrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIESIndustrial Safety Unit-I SAFETY TERMINOLOGIES
Industrial Safety Unit-I SAFETY TERMINOLOGIES
 
Internet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptxInternet of things -Arshdeep Bahga .pptx
Internet of things -Arshdeep Bahga .pptx
 
Mine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptxMine Environment II Lab_MI10448MI__________.pptx
Mine Environment II Lab_MI10448MI__________.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
National Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdfNational Level Hackathon Participation Certificate.pdf
National Level Hackathon Participation Certificate.pdf
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Energy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptxEnergy Awareness training ppt for manufacturing process.pptx
Energy Awareness training ppt for manufacturing process.pptx
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 

5 pen pc technology

  • 1. 5 Pen PC Technology Presented by : Varsha B. Shidore
  • 2. Content • Introduction • History • What is 5 pen PC technology? • Designer of P – ISM • Definition of 5 Pen PC Technology(P-ISM) • The Pen style Computer • Block Diagram of P-ISM • P-ISM Gadget Package Functions • Internal Structure • Functions • Battery • Smart Use • Advanced computing • Merits / Demerits • Conclusion
  • 3. Introduction • Communication Technology is rapidly increasing in this modern world. Computer, as everybody knows, is the main communication machine used. • Since the time computer has been invented scientists and engineers have been trying making it more and more compact. • As a result we have been able to enjoy the numerous functionalities provided by the computers whether it is Home PCs or Laptops. Systems have still been reduced so that they are used in Mobiles I- pods and I-phones have replaced the laptops to an extent. • It is in this context that Pen Computers come into spot light. These are computers in the shape of different pens each having a function of its own and when combined together give us the usage of a full- blown computer. It is a computer broken apart into pieces, each the size of a pen. • The screen and keyboard are projected onto surfaces.
  • 4. History • "Pen-style Personal Networking Gadget" created in 2003 by Japanese technology company NEC. • Its designer Tour Ichihash. • P-ISM was first featured at the 2003 ITUTelecom world held in Geneva, Switzerland.
  • 5. What is it? • Just as the name suggests, this technology is comprised of five major components. It utilizes Bluetooth and internet in order to communicate. • The promise made by 5 Pen PC or the P-ISM technology is that it will allow you to create a computing environment anywhere you want. • If you are at a store and want to kill time, take out your P-ISM out and it projects an A4 size screen anywhere you want.
  • 6. Designer of P-ISM Toru Ichihashi said that “In developing this concept he asked himself- “What is the future of IT when it is small?” • The pen was a logical choice. He also wanted a product that u could touch and feel. • Further , the intent is to allow for an office anywhere.
  • 7. P-ISM • P-ISM ("Pen-style Personal Networking Gadget Package"), which is nothing but the new discovery, which is under developing, stage by NEC Corporation. • At the 2003 ITU Telecom World exhibition held in Geneva, the Tokyo-based NEC Corporation displayed a conceptual $30,000 prototype of P-ISM. • Surely this will have a great impact on the computer field. In this device you will find Bluetooth as the main interconnecting device between different peripherals. • 5 Pen PC Technology is a gadget package including five functions: • A pen-style cellular phone with a handwriting data input function, virtual keyboard, a very small projector, camera scanner, and personal ID key with cashless pass function. • 5 Pen PC Technology are connected with one another through short-range wireless technology. • The whole set is also connected to the Internet through the cellular phone function. This personal gadget in a minimalist pen style enables the ultimate ubiquitous computing.
  • 8. The pen style computer • This is the heart of the P-SIM. • It runs a dual core processor at the moment and can run Windows. • It is not a stretch to imagine that it will run faster processor and run other operating systems such as Android and other Linux variants for niche purposes.
  • 10. P-ISM is a gadget package including five functions: • CPU Pen • DIGITAL CAMERA • VIRTUAL KEYBOARD • COMMUNICATION Pen • LED PROJECTOR
  • 12. CPU Pen • The functionality of the CPU is done by one of the pen. • It is also known as computing engine. • Dual Core processor is used. • Works with windows operating system. • The central processing unit (CPU) is the portion of a computer system that carries out the instructions of a computer program, and is the primary element carrying out the computer's functions. • The central processing unit carries out each instruction of the program in sequence, to perform the basic arithmetical, logical, and input/output operations of the system.
  • 13. • This term has been in use in the computer industry at least since the early 1960s. • The form, design and implementation of CPU shave changed dramatically since the earliest examples, but their fundamental operation remains much the same. • Early CPUs were custom-designed as apart of a larger, sometimes one-of- a-kind, and computer. However, this costly method of designing custom CPUs for a particular application has largely given way to the development of mass-produced processors that are made for one or many purposes. • This standardization trend generally began in the era of discrete transistor mainframes and mini computers and has rapidly accelerated with the popularization of the integrated circuit(IC). • The IC has allowed increasingly complex CPUs to be designed and manufactured to tolerances on the order of nanometers. Both the miniaturization and standardization of CPUs have increased the presence of these digital devices in modern life far beyond the limited application of dedicated computing machines. • Modern microprocessors appear in everything from automobiles to cell phones and children's toys.
  • 14. Communication Pen • Wireless Bluetooth Technology. • Connected to internet through cellular phone function. • Uses Wi -Fi technology. • Exchange information with wireless connection. • They are connected through Tri-wireless modes (Bluetooth,802.11/ G, and Cellular) which are made small and kept in a small pen like device.
  • 16. • In fact, no-one expects much activity on 802.11n installations until the middle of 2008. “Rolling out 802.11n would mean a big upgrade for customers who already have full Wi-Fi coverage, and would be a complex add-on to existing wired networks, for those who haven't. • Bluetooth is widely used because we can able to transfer data or make connections without wires. This is very effective because we can able to connect whenever we need without having wires. They are used at the frequency band of 2.4 GHz ISM (although they use different access mechanisms). • Bluetooth mechanism is used for exchanging signal status information between two devices. This techniques have been developed that do not require communication between the two devices (such as Bluetooth’s Adaptive Frequency Hopping), the most efficient and comprehensive solution for the most serious problems can be accomplished by silicon vendors. • They can implement information exchange capabilities within the designs of the Bluetooth. The circuit diagram for the 802.11B/G is given below. It is nothing but also type of Bluetooth. • Using this connectivity we can also connect it with the internet and can access it anywhere in the world.
  • 17. LED Projector • When you think about projectors, you think about those heavy and expensive things you see during presentations that are mostly rented and not bought. • However, projectors have become smaller and cheaper since. • There have even been phones with mini projectors built into them too. • The P-SIM projector is similar to what you’ll experience on your portable device. • Depending on how far you are from a flat surface, this can be either adequate or very clear. • As time goes on, newer projectors will be able to give you even better resolution for high definition pictures and videos. • According to NEC, which is developing P-SIM since 2003, the projector could either be stand along or integrated with the pen style computer.
  • 18. Functions of LED Projector • Monitor is LED Projector. • Size is A4. • Appropriate Resolution capacity is 1024*768 pixels. • Gives more clarity and good picture.
  • 19. Virtual Keyboard • Virtual laser keyboard is a new gadget. • It emits laser on desk. • It uses laser beam to generate full size perfect keyboard that smoothly connects to PC and Most of the handheld devices (PDA's, tablet PC'). • The I-Tech laser keyboard acts exactly like any other "ordinary“ keyboard: A direction technology based on an optical recognition mechanism enables the user to tap on the projected key images, while producing real tapping sounds (we call it the WOW effect).
  • 20. How to use Virtual keyboard? • It is more compatible and it did not require any practice to operate but you must have strong fingers to tap. • The I-Tech Virtual Keyboard uses a light projection of a full-sized computer keyboard on almost any surface. • Used with PDA's and Smart Phones, the Virtual Keyboard provides a practical way to do e-mail, word processing and spreadsheet tasks , enabling users to leave laptops and computers at home. • VKB's adaptable technology studies the user's finger movements to interpret and record keystrokes. Because the virtual keyboard is an image projected by light, it disappears completely when not in use.
  • 21. Actual use of virtual keyboard • Cellular Telephones • Space saving Computers • Laptops • Tablet PCs • Clean Rooms • Industrial Environments • Test Equipment • Sterile and Medical • Environments • Transport (Air, Rail,Automotive).
  • 22. Features of Virtual Keyboards • VKB settings can be changed by Sound • Connection • Intensity • Timeouts • Sensitivity • Auto-repeat
  • 23. Digital Camera • We had digital camera in the shape of pen. • It is useful in video recording ,video conferencing simply as a webcam.. • It is connected with other devices through Bluetooth. • Major advantage : It is small which is easily portable. • It is 360 degree visual communication device. • We have seen video phones hundreds of times in movies. • Conventional visual communications at a distance have been limited due to the display devices and terminals. • This terminal enables showing of the surrounding atmosphere and group-to-group communication with a round display and a central super-wide-angle camera.
  • 24. Battery • Is is the most important part in the portable type of computers. • Usually batteries are small in size and work for a long time. • It comes with a battery life of 6+ (i.e 6 days). • For normal use it can be used for 2 weeks.
  • 26. Advanced Computing With the Amazing 5 Pen PC Technology • Desktop and laptops have been around for more than 2 decades now and everybody agrees that they have overstayed their welcome by a few years. That is true for about 95% of the users. • They don’t want most of what their computer is capable of doing. • They don’t want to carry 3.5 pound behemoths for their job. • Sure, smartphones and tablets are one way to replace them, but the 5 pen PC technology takes computing to the next level.
  • 27. Merits • This 'pen sort of instrument' produces both the monitor as well as the keyboard on any flat surfaces from where you can carry out functions you would normally do on your desktop computer. • Portable • Feasible • Ubiquitous computing is done • Wi-Fi technology
  • 28. Demerits • Currently un clear • High Cost • Battery • Keyboard concept is not new • Positioning is main
  • 29. Conclusion • The communication devices are becoming smaller and compact. • This is only an example for the start of this new technology. • We can expect more such developments in the future. • Overall, the 5 Pen PC is a very promising device. • It will certainly change the way we use technology, and indeed eliminate a lot of heavy devices that we use today, for the most part of it.