160 likes | 321 Vues
Pervasive Computing Review. Joshua R. Smith, Class of 2006 Interdisciplinary Engineering and Management Mentor: Dr. Sunil Kumar July 31, 2003. Definitions and Rationale. What is pervasive computing? Computer of today vs. pervasive computing Interest in automation and simplification.
E N D
Pervasive Computing Review Joshua R. Smith, Class of 2006 Interdisciplinary Engineering and Management Mentor: Dr. Sunil Kumar July 31, 2003
Definitions and Rationale • What is pervasive computing? • Computer of today vs. pervasive computing • Interest in automation and simplification
Topics • Brief history • Applications • Infrastructure Systems • Personal Systems • Critical technologies • Adoption Hesitation • Conclusions
History • Roots in late 1980s at Xerox PARC • Merger of two research projects • Intuitive input/output device • How computers impact people • Weiser 1991 Scientific American article
Topics • Brief history • Applications • Infrastructure Systems • Personal Systems • Critical technologies • Adoption Hesitation • Conclusions
Applications: Infrastructure Systems • Classroom 2000 • Enhance education by recording lecture (shift attention from notes to speaker) • Rapid development strategy
Applications: Infrastructure Systems • Classroom 2000 • Enhance education by recording lecture (shift attention from notes to speaker) • Rapid development strategy
Applications: Personal Systems • Inspection / Maintenance • BIW, Maine 80:1 return over 3 years (70% reduction in inspection times)
Topics • Brief history • Applications • Infrastructure Systems • Personal Systems • Critical technologies • Adoption Hesitation • Conclusions
Critical Technologies • Technologies exist independently, pervasive computing focuses on integrating them • Wireless networking • Sensors • Portable and embedded displays • Software • Discovery services, compression, middleware
Topics • Brief history • Applications • Infrastructure Systems • Personal Systems • Critical technologies • Adoption Hesitation • Conclusions
Adoption Hesitation • Hesitation • “Big Brother” – Collection of personal information important for context • Privacy and Security • RFID
Topics • Brief history • Applications • Infrastructure Systems • Personal Systems • Critical technologies • Adoption Hesitation • Conclusions
Conclusions • Desktop computers not replaced • Working smarter and more efficiently • “Always on” • Streamlining tedious computing tasks • New possibilities • Augmented social networks • Learning environments • Museums, grocery shopping…