Ubiquitous Computing Go to the O drive, ICT, BTEC, BTEC 2013, Unit 1, LA A, Ubiquitous Computing.

Slides:



Advertisements
Similar presentations
ICT in Healthcare Topic 6.
Advertisements

Land transportation simply means any form of transportation that takes place onland.
Part 1: Basic Fashion and Business Concepts
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 16 Integrating Wireless Technology in business.
Key Word Challenge This is when a computer uses services provided by another organisation’s computer systems. A computer hardware system which acts as.
ICT For Preparatory Programs
Lab Practical 1 Study about different types of networks
Automatic Check-Out Beverly DeVane February 5, 2007 CTCT 2200 Mr. Scott Blair.
Groups 23 & 24. What is it? Radio frequency identification Small electronic device consisting of a microchip or antenna containing up to 2 KB of data.
1 A study on Location Aware Computing Presenter : Narendiran Visvanathan Instructor : Dr. Chin-Chih Chang Course : CS 898T Mobile and Wireless Networks.
RFID Chris Harris Carey Mears Rebecca Silvers Alex Carper.
Asmt. 10: ID chips in product Pro RFID chips in product Group 3. Team A Ivan Augustino Andres Crucitti.
RFID l. goetzinger ● m. lines ● c. mclaughlin ● c. sailer ● m. schwab Presented to the Class of BA 457.
R adio F requency Id entification Ta’Tyana McElroy Jeffrey Tuma.
RADIO FREQUENCY IDENTIFICATION By Basia Korel. Automatic Identification Technology for identifying items Three step process 1) Identify people/objects.
RFID in Mobile Commerce and Security Concerns Chassica Braynen April 25, 2007.
RFID passports How does is work? Step by step By: Einav Mimram.
 The Global Positioning System (GPS) is a navigational system involving satellites and computers that can determine the latitude and longitude of a receiver.
Welcome to CMPE003 Personal Computer Concepts: Hardware and Software Winter 2003 UC Santa Cruz Instructor: Guy Cox.
 A device that has the ability to read or identify a product or an object  Mainly tracks and identifies objects  Used for security and identification,
ECE1770 Eric Yu Feb.12 th.2007 RFID Middleware Agenda  Introduction  Application  Standard EPCglobal Network RFID Infrastructure Application Level.
IPM Asset Solutions: Where Innovation Meets Experience.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
RFID in the Military Rana, Mohammed,Trandel, Ahmed.
David A. Olive General Manager, Fujitsu Limited WITSA Public Policy Chairman WITSA Public Policy Meeting Hanoi, Vietnam November 26, 2005 Radio Frequency.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Radio Frequency Identification (RFID) Be Safe Security Solutions.
Data Capture and Sensing Evanna Agnew CBLT. AIDC Technologies Automatic Identification and Data Capture (AIDC)
RFID Technology What is it? (And why should you care?)
CS3900 Richard Emerson1 Radio Frequency ID Tags Smart labels that send/receive data via radio waves Usually works like a barcode – contains a product code.
Wal-Mart leads RFID adoption Prepared by: Rayma Figueroa Olesya Tkachenko Olya Elfimova.
Ubiquitous Computing Go to the O drive, ICT, BTEC, BTEC 2013, Unit 1, LA A, Ubiquitous Computing.
CLOUD COMPUTING JAZ PATERNOSTER. DEFINITION Cloud computing is the use of ‘the cloud’ as a place to save files rather than in a personal computer, allowing.
Online Communication 1 & Ubiquitous Computing. Online Communication *The red circles show the position of the keyframes on the timeline. 1. Explain what.
{ Cloud computing. Exciting and relatively new technologies allow computing to be a part of our everyday lives. Cloud computing allows users to save their.
清華大學工業工程與工程管理研究所 賴俊翰 彭俊昌 許琬婷 The Principle and Application of RFID -For H Distribution Company Jeffrey Richard Georgia.
What is The Cloud?. The Cloud.
Networks. What is a computer network? A network is two or more computers that are linked together so that they are able to share resources.
Company small business cloud solution Client UNIVERSITY OF BEDFORDSHIRE.
THE INTERNET OF THINGS (IOT). THE INTERNET OF THINGS Objects can transmit and share information without any human intervention.
The Supply Chain Doctors Warehousing Fundamentals The Supply Chain Doctors Kimball Bullington, Ph.D. Cliff Welborn, Ph.D.
( ) The reading is mainly about ____. (A) the advantages and disadvantages of implanting children with chips (B) the reasons why there are so many missing.
Describe direct data entry and associated devices, e. g
By Jack Stewart. Cloud computing, or something being in the cloud, is a colloquial expression used to describe a variety of different types of computing.
Review Future Technology. Definition Biometrics refers to technologies used to detect and recognize human physical characteristics.
Describe direct data entry and associated devices, e. g
Social effects of information systems.  Many of the old boring jobs can now be done by a computer, which leaves workers to do more interesting tasks.
Smart Card And GSM Based Advanced Security System
Cloud Computing By Reedy McGeady. What is Cloud Computing? Cloud Computing is using another organisations computer, which are known as hosts.
Accessing active files Keeping track of files, both paper and electronic, requires all employees to adhere strictly to procedures outlined in the OPPM.
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
Ubiquitous means ‘everywhere’
Yes? Or No?. Radio-frequency identification is the use of an object (typically referred to as an RFID tag) applied to or incorporated into a product,
Cloud Computing 10 Cloud Computing 10. Cloud Computing 10 You’ll have heard about the ‘Cloud’ Lots of you will use it! But you need to be clear about.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
Regulation models addressing data protection issues in the EU concerning RFID technology Ioannis Iglezakis Assistant Professor in Computers & Law Faculty.
Unit 2 Technology Systems
Microwave Communication Project
Integrating Wireless Technology in business
Implications of Digital Technology for Business and Customers
Networks.
Designing a Production Plan
Radio Frequency Identification (RFID)
RFID Source Tracking Tim Durkin PPD.
LESSON 3.
Fashion Merchandising
Team 7 Technical Presentation
Radio Frequency Identification
Automatic Identification and Data Collection Technology
Revision PowerPoint By Nicole Davidson.
Presentation transcript:

Ubiquitous Computing Go to the O drive, ICT, BTEC, BTEC 2013, Unit 1, LA A, Ubiquitous Computing.

Find out what is Ubiquitous Computing?

Lesson Objectives Identify the benefits and concerns of using cloud computing and cloud storage. Understand the term ‘Ubiquitous computing’ Be able to give examples of Ubiquitous computing. Explain the benefits and concerns with ubiquitous computing.

Cloud computing and cloud storage Data and files may be available anywhere in the world where there is an internet connection As the files are being stored by the host, you have no control over them. You need to be aware of their security terms and policies. The host might not be using the latest, fastest and most secure version You only pay for the storage that you have used. You don’t have to provide and maintain hardware locally The speed of retrieval of data may be slower than it would be in the local database held in-house You need to be able to get through to the host to access and process data Benefit Availability Concern

RFID Radio Frequency Identification systems Ubiquitous Computing RFID Radio Frequency Identification systems

What is Ubiquitous computing Ubiquitous means ‘everywhere’ Processors (computers) can be embedded in any device including clothing, Appliances vehicles, buildings and people to connect them to the internet.

Radio Frequency Identification (RFID) Currently RFID chips are used for Ubiquitous computing. These chips use radio waves to transfer data to a tag on a person or object. These tags contain information that is stored electronically. It is similar to a bar code but does not need to be scanned.

Examples Cat flaps that only open when the correct animal that has a chip on their collar. Oyster touch cards to pay for travel in London. Agriculture – monitoring the health of livestock.

Find three more examples and explain the benefits for each. http://www.simonsothcott.com/2011/11/what-is-rfid-10-examples-of-rfid.html http://www.pixelpod.co.uk/blog/2008/12/04/12-examples-of-rfid-across-industries/ http://www.rfidc.com/docs/introductiontorfid_technology.htm

Government Government – The U.S. Department of Defence is planning to use RFID technology to trace military supply shipments and in soldiers. Benefits: this means that if any of the military supplies go missing they can track them and they can track soldiers.

People tracking People Tracking – The United Nations uses RFID technology to track the movements of its personnel. Disadvantages: people disagree with having their lives tracked Benefits:if everyone had one there would be a reduction of crime and birth cetificates etc would not be needed.

pharmaceuticals Pharmaceuticals – Pharmaceutical companies have embedded RFID chips in drug containers to track and avert the theft of highly controlled drugs, such as OxyContin