15 Dec 2022

80

The Concept of Ubiquitous (Pervasive) Computing

Format: APA

Academic level: University

Paper type: Essay (Any Type)

Words: 387

Pages: 1

Downloads: 0

A revolutionary computing system that guarantees to have an impact on the way we relate to devices, computers, physical space and other individual is being witnessed in the world. This newly developed technology is called pervasive or ubiquitous computing. Also, a world where embedded processors, sensors, digital communications, and computers are not expensive is the initial vision of ubiquitous computing. The use and dissemination of modern ICT (information and computer technologies) are considered to be the primary condition for achieving the robust economic growth and future competition. The new technologies that have been influenced by ICT have a significant effect on the public administration, the economy, private life, scholarship, and science (Crabtree & Rodden, 2007).

(Galloway, 2004), suggested that, ubiquitous computing has been much felt by individuals in the day to day life; the main technology objective is to interconnect and permeate all areas of life, therefore ensuring that there is a good flow of information and data. The ubiquitous computing is evident in many areas as described in my findings: to begin with is its application and benefits to communication. All form of transformation and exchange of data, knowledge, and information is affected by interaction. Pervasive computing has led to the improvement in the communication sector; this is because of smart objects, for example, RFID mobile phones and messages, have wireless internet access and also email via mobile. This has eased the communication sector since individuals can communicate faster and more efficient without having to meet physically (Galloway, 2004).

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The military has also been affected by ubiquitous computing. The military requires information on fighting and how to avoid external threats that are multi-dimensional, interrelated and close-meshed as possible. This involves the processing and collection of data it also comprises innovation of new weapons designs. Production has also been affected greatly by this new technology since the processing and flow of components during manufacture are controlled by the components, ubiquitous computing has facilitated in the devilment of a system that control, configure and monitor itself. This has seen many companies make profits in the long run since the cost of labor has drastically been reduced (Galloway, 2004).

My house has a variety of smart equipment, for example, lighting, heating, communication and even ventilation equipment. All this have made my personal life easier and more comfortable. 

Conclusion 

Although the development of ICT and AT (Assistive Technology) equipment has led to the improved standard of living, the technological advancement also poses, man limitation such as evidence of pirated software in cyber cafés (RANGASWAMY, 2007) , fraud, and identity theft has also increased. Therefore will the technological advancement in the future pose more threats to the society? And if so how can the problem be averted? 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). The Concept of Ubiquitous (Pervasive) Computing.
https://studybounty.com/the-concept-of-ubiquitous-pervasive-computing-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Security Implication of the Internet of Things

The Internet of Things (IoT) can be described as s system of interconnected devices that have the ability to transfer information over a computer network without the need of human-to-computer or human-to-human...

Words: 892

Pages: 3

Views: 96

Modern Day Attacks Against Firewalls and VPNs

Introduction The need to have an enhanced security of the computer connectivity happens to be one of the reasons that attract companies and organizations towards wide usage of VPNs. Several simple techniques...

Words: 2025

Pages: 7

Views: 134

How to Deploy and Administer Windows Server 2012

Securing a reliable, and expandable configuration for a company is important to build a strong network. The new and enhanced features of the Windows Server 2012 can be used to implement the network. In this...

Words: 1673

Pages: 6

Views: 87

Deployment Model in Cloud Computing

Deployment model is a representation of a cloud environment primarily distinguished by parameters such as accessibility, proprietorship, and storage size. The National Institute of Standards and Technology gives the...

Words: 254

Pages: 1

Views: 81

How to Use Web Search Engines for Business Research

The advancement of technology has made it possible for many people around the world to have easy access to information whenever they want. The development of the Wide World Web-enabled different kinds of information...

Words: 773

Pages: 3

Views: 86

Distributed Database Management System (DDBMS)

Introduction Data management has been a headache to many technology enthusiasts for quite a long period of time. They have successfully managed to logically collect interrelated data and share it. If the data is...

Words: 799

Pages: 3

Views: 127

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration