Programming Handheld and Mobile devices 1 Programming of Handheld and Mobile Devices Lecture 21 Brave New World Rob Pooley

Slides:



Advertisements
Similar presentations
P2 – Describe the purpose of different types of computer systems
Advertisements

Chapter 1:Introduction to the world of computers
Lesson 01: The Digital Experience  Transition from traditional devices to multipurpose digital devices. Wired phones move to cell phones and now smart.
Chp 1 – Introduction to Computers
9 Lecture The Wireless Revolution. Identify the principal wireless transmission media and devices, cellular network standards and generations, and standards.
Chapter 5 Communications and Networks
Nadine Malone. Blogs A Blog is a website where entries are written in chronological order and commonly displayed in reverse chronological order. "Blog"
Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.
CATEGORIES OF COMPUTERS
Cyber Bullying BEAT BULLYING.
Aiding intelligent next-gen systems with mobile applications Dr. Jeyakesavan Veerasamy University of Texas at Dallas Note: Almost all.
Discovering Computers Chapter 1 Discovering Computers & Microsoft Office 2010.
Part I Introduction to Wireless & Mobile Computing
Smartphones. Lesson Objectives To understand and demonstrate an understanding of Smartphones.
College Collaboration System User Office Desktop USC Mail Server College Mail Server User Home Desktop Net USC College.
Chapter CHAPTER SEVEN OVERVIEW SECTION NETWORKS AND TELECOMMUNICATIONS  Network Basics  Voice over IP  Networking Businesses  Increasing.
Topic 6 – Wireless Technology and handheld devices 1)TechMed scenario covers The uses of wireless technologies and handheld devices In the scenario: “Some.
Component 4: Introduction to Information and Computer Science Unit 10: Future of Computing Lecture 2 This material was developed by Oregon Health & Science.
2020 Ubiquitous Computing of/videos/popscis-future-of-ubiquitous-computing.htm Ubiquitous Computing,
9. Car-Borne Information System
Sensors and Actuator Network Based Architectures and Protocols for Smart Homes Bluetooth enabled Smart Home Mark Shaw Giorgio Politano Supervisor: Mieso.
Giovanni Napolitano 09/11/2007. Since the inception of the iPod video. Podcasts are starting to become the norm now for information sharing. Podcasts.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Introduction to Computers. Objectives Overview Describe the five components of a computer Discuss the advantages and disadvantages that users experience.
Bluetooth By Richard B. Heisler, Jr. Villanova University Distributed Systems CSC 8530 Fall 2006 Instructor - Dr. Paul A. Schragger.
COMMUNICATION SYSTEM (2) CT1401 LECTURE-9 : MOBILE PHONE BY : AFNAN ALAYYASH SUPERVISION : DR.OUIEM BCHIR.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED.
Goodbye! ….. to all things that are connected by cable…… NOW it can be connected using….
Tablets Laptops PDAs Smart Phones Mobile Commerce &Wireless Network.
Component 4: Introduction to Information and Computer Science Unit 10b: Future of Computing.
MiLife Graduate Design Seminar II Discovery & Exploratory Research Synthesis.
Innovative ITS services thanks to Future Internet technologies ITS World Congress Orlando, SS42, 18 October 2011.
Wireless Communication Methods
Chapter 8 Communications and Networks. Today Group work Review the 6 parts of the IT model Communications and networks Discussion.
Digital Forensics - challenges and opportunities Marc Kirby Cranfield University.
Usability in Pervasive Computing Environment Advance Usability October 18, 2004 Anuj A. Nanavati.
Game Play. The Smiths want to be able to play games The Smiths want to play games with each other and with friends outside the house. What are your own.
The traditional ing process. Sender Receiver ISP Server.
A tree line has a central line connecting together a series of star networks. The server is connected to a central line. Tree Network As the star, and.
Semantic Gadgets Pervasive Computing Meets the Semantic Web Reza Zakeri Sharif University of Technology.
Programming of Handheld and Mobile Devices Lecture 2 What is a MID? Rob Pooley
Standards and Protocols Slide show for WiFi Characteristics of a wireless local network. It was named after a group of people who invented. The.
1 The Future of the Contact Center –Rich Tehrani –President –TMC –
A) Describe 3 benefits of a company moving to a wireless network compared to staying with its cabled network(3) b) Describe 2 problems that may occur (2)
Keyboard Computer Mouse Input devices is the information you put into the computer.
Cevgroup.org C utting E dge V isionaries. cevgroup.org TODAY’s TALK 1) Internet Of Things (IoT) 2) Wi-Fi Controlled Robots 3) Augmented Reality.
Peer to peer networks. Peer to peer is when digital devices communicate wirelessly with each others without the need for a transmitter. Wi-Fi Direct 1-
Microsoft Partner Conference Integrated Innovation Don Kerr Partner Technology Specialist.
Virtual Teams Team 4 Chris Vance. Overview Benefits Brief History Communication Applications Company Examples Devices.
Understand how a router works and its purpose
Living in a Digital World Discovering Computers Fundamentals, 2011 Edition.
Wireless Communications Standard ‘wired’ networks are connected together using copper cables that carry data around the network in the form of electrical.
SPK – 4 Golomazov Artem in my life. Hello! My name is Artem and I’d like to tell you about Information Technology by using Information Technology! It.
Internet of Things – Getting Started
Design for usability E6: Human Factors Design IB Technology.
European Computer Driving Licence Syllabus version 5.0 Module 1 – Concepts of ICT Chapter 1 – General concepts Pass ECDL5 for Office 2007 Module 1 Concepts.
Understand how a router works and its purpose
European Computer Driving Licence
Major : Information Technology.
Technologies in everyday’s life
Unit Types of Computer Systems
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Trends in Computing December 2016
Personal Digital Devices Lesson 1
Computer Hardware-Meeting the machine
Objectives Overview Explain why computer literacy is vital to success in today's world Describe the five components of a computer Discuss the advantages.
Network Models, Hardware, Protocols and number systems
Collaborative Smart House Environment Computer Science Department University of Cyprus Contact: Christodoulou Eleni.
Mobile Commerce and Ubiquitous Computing
Presentation transcript:

Programming Handheld and Mobile devices 1 Programming of Handheld and Mobile Devices Lecture 21 Brave New World Rob Pooley

Programming Handheld and Mobile devices 2 Are we easily fooled? O wonder! How many goodly creatures are there here! How beauteous mankind is! O brave new world, That has such people in't! Miranda The Tempest

Programming Handheld and Mobile devices 3 Ad hoc networks An ad hoc network is created “on the fly” as devices connect and disconnect from it without central control Bluetooth is often seen as a model for ad hoc networks –Pico nets allow up to 8 devices to connect –Scatternets allow any number to do so Maybe WiFi or some other approach? S M S S SS S S M

Programming Handheld and Mobile devices 4 Desirable properties Seamless connection Stable behaviour Secure Transparent connection Easy to use Not there yet!

Programming Handheld and Mobile devices 5 u·biq·ui·tous (y -b k w -t s) adj. Being or seeming to be everywhere at the same time; omnipresent: "plodded through the shadows fruitlessly like an ubiquitous spook" Joseph Heller. Claims for ubiquitous computing have been made for many years Typical applications include –Intelligent washing machines –Intelligent shoes –Smart dust Low cost, connected, unobtrusive Personal area networks Home area networks

Programming Handheld and Mobile devices 6 Claims for ubiquity Diagnostic –Health monitoring of people –Servicing requirements for machines Supportive –Reporting of status of house/car/fridge Ubiquitous –Linked by wireless comms –Linked by Web

Programming Handheld and Mobile devices 7 Pervasive Pervasive computing relates to services It is built on top of ubiquity It depends on seamless handove It uses agent technology It uses redirection of services It supports virtual devices It supports virtual users

Programming Handheld and Mobile devices 8 Scenario You are at home when your boss phones you to collect a parcel on your way to work –Your TV becomes a video terminal –Your PDA downloads the details You go to your car, with your PDA linked by Bluetooth to your home phone for low cost calls Your PDA uploads the details into your car’s SatNav system You drive as directed to the Post Office You get near the Post Office and your car computer downloads details of parcels waiting to be collected

Programming Handheld and Mobile devices 9 Scenario continued You spot a second parcel which looks like it belongs to your company You contact your boss requesting authorisation to collect both parcels Electronic authorisation is sent to the Post Office and to your PDA (now Bluetoothed to your car phone) Your car phone signals to the Post Office to have the parcels waiting for you You collect the parcels and al parties (including the sender) are informed

Programming Handheld and Mobile devices 10 Utopia? Much of this already happens in a restricted way The GPO and major couriers have Web-based reporting on parcels Postal workers, meter readers etc have PDAs and some have wireless links to their bases Phones, sat nav systems and PDAs are becoming more integrated Sat nav maps etc can be replenished dynamically

Programming Handheld and Mobile devices 11 Was Miranda right? O wonder! How many goodly creatures are there here! How beauteous mankind is! O brave new world, That has such people in't! So where are the people in our brave new world?

Programming Handheld and Mobile devices 12 Some issues in the world of handheld devices This short note is an agenda for you to think about the world of handheld devices and portable, user friendly computing. As we move to wards more power and more memory, the limits on devices are retreating. What does this mean? Would people rather have a portable computer or a PDA or an intelligent mobile phone? What will the differences be in the future? What applications will people want? E- books, e-newspapers, online diaries, wireless conferencing? Will we want point to point, peer to peer models of connection? Will we want to be part of some super- internet? Is local power preferable to a simple device connecting to various pervasive services on networked servers? Do we really trust these devices and their networks? Can we relax in the bath reading our PDA? Who is excluded by the rise of PDAs etc. The disabled? The poor? The old? Who stands to benefit? Microsoft? Big business (smartcards etc?) or the individual? We have been moving from the specific (games consoles, personal diaries etc.) to the general. Is that the future or will we find a world of sensors and dumb networked devices? (Phone your fridge and ask it to speak to the oven?) Intelligent shoes, intelligent car seats? Where do we interface when systems learn our preferences from our behaviour? (Personalisation versus learned responses?)

Programming Handheld and Mobile devices 13 Final thought – prove me wrong I pitied thee, Took pains to make thee speak, taught thee each hour One thing or other: when thou didst not, savage, Know thine own meaning, but wouldst gabble like A thing most brutish, I endow'd thy purposes With words that made them known. But thy vile race, Though thou didst learn, had that in't which good natures Could not abide to be with; therefore was thou Deserv'dly confined into this rock, who hadst Deserv'd more than a prison. Prospero to Caliban The Tempest