Emerging Technologies 2007
Total Page:16
File Type:pdf, Size:1020Kb
Ubiquitous Computing David Ley, Becta 6 The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it. 1 Mark Weiser 18 Mainframe (one computer, many people) Ubiquitous computing is a vision of computing 16 PC (one person, one computer) power ‘invisibly’ embedded in the world around Ubiquitous Computing 14 us and accessed through intelligent interfaces: ‘Its (one person, many computers) highest ideal is to make a computer so embedded, 12 so fitting, so natural, that we use it without even 10 ii thinking about it.’ This is about a shift to human- 8 Sales/Yr centred computing, where technology is no longer a 6 barrier, but works for us, adapting to our needs and 4 preferences and remaining in the background until 2 required. This implies a change in our relationship 0 with ICT to a much more natural way of interacting and using the power of networked computing 1940 1945 1950 1955 1960 1965 1970 1975 1980 1985 1990 1995 2000 2005 systems which will be connected not just to the The three waves of computing [Source: http://sandbox. internet or other computers, but to places, people, xerox.com/ubicomp/] everyday objects and things in the world around us. Implications If achieved, such a vision would be transformational The increasing maturity, performance and miniaturisation and have profound implications for how we live, work, of processors, networking technologies, memory, interact and learn. When Mark Weiser wrote about displays and sensors is enabling a move towards ubiquitous computing in 1991, his vision of computing pervasive computing, ubiquitous connectivity and more power deeply embedded in objects, places and devices adaptable interfaces that are sensitive and responsive. seemed some way off. Today, various elements of Many objects and devices already have embedded ubiquitous computing are beginning to appear and processors and sensors. Some cars, for example, use be useful in their own right, as increasing numbers of sensors to monitor wheel slippage and apply the brakes devices and objects become addressable (have a unique to stop us skidding. Radar-controlled cruise control will ID) and connected (usually wirelessly). automatically keep the distance with the car in front. Just as with the rapid development of the internet and However, these systems tend to be stand-alone and do web technologies, many applications of ubiquitous not necessarily interact with other connected objects computing cannot be predicted today and rely on these and devices. Washing machines have sophisticated technologies reaching a critical mass. Weiser saw three electronic programmes, but we need to explicitly control waves of computing: the mainframe age when many them. In the ubiquitous computing world, the washing people shared a computer; the personal computer wave machine would automatically interrogate tags embedded when one person has one computer (the focus of many in our clothes and adjust the wash cycle accordingly. initiatives); moving to the ubiquitous computing wave Increasingly then, connections are not just people– when each person shares many computers. The current people or people–computers, but between people– internet age is seen as a transitional phase between the things and most strikingly, things–things.3 PC and ubiquitous waves. 1 Weiser, M. (1991): The Computer for the 21st Century. In: Scientific American 265, Nr. 3, S. 94-101. 2 Weiser, M http://sandbox.xerox.com/ubicomp/ 3 ‘Things’ here means objects and devices that are not computers 6 6 This is what the International Telecommunication Many parts of ubiquitous computing are still in Union (ITU) calls the ‘internet of things’4. These new development and many of the possible uses and connections create the possibility of new interactions implications of the technologies are still unknown. and access to enormous amounts of information. However, there are already clear possibilities for This changes the web from being a purely virtual, improving learning both through individual technologies online space to a system that can provide appropriate and increasingly through using these technologies information, help and services in the real world. If in unison. As will be explored, ubiquitous computing properly harnessed this information will make us better technologies can lower the barriers to using the power informed and enable smarter decisions by both people of ICT, enable much more personalised, context-aware and machines. interactions and help with a move to more experiential These technologies have modes of use that can be learning: learning by doing, interacting and sharing. implicit or explicit. Explicit interactions are those where a conscious action by a user enables an interaction. Implicit interactions are automatic and can happen without any direct user intervention. Our opportunities for explicit Key elements of ubiquitous interactions with the real world are increasing, but it is the computing implicit, unseen interactions that will provide a real shift in The key elements that devices/objects/nodes in how we use and gain benefit from computer systems. a ubiquitous computing environment need are: Ubiquitous computing encompasses most areas of identification, location, sensing and connectivity IT and achieving the vision will rely on several factors coming together: Identification • Miniaturisation (smaller, lower power processors, In order for objects and devices to usefully become sensors and wireless technologies.) part of a wider intelligent, information sharing network, • Ubiquitous connectivity it is vital that each one has a unique identity. This not only enables more things to be interconnected, it also • Interoperability (standards for networks and devices; means that objects that surround us can become identification; network and device discovery; self- resources and act as interfaces to other resources. Two configuring, seamless networks etc.) important technologies used to provide identity are Radio • Improved intelligent interfaces (natural interfaces; Frequency Identification (RFID) tags and visual barcodes. intelligent agents; display technologies etc) • Intelligent systems (including sensor networks; RFID context awareness; location; semantic networks; data Radio Frequency Identification (RFID) is a type of handling; and search etc.) auto identification system and refers to technologies • Security and reliability (reliable, secure systems; and that use radio waves to identify objects, locations or privacy features) people. RFID is a generic term and does not refer to a particular technology. However, more recently, the term 4 ITU Internet Reports 2005: The Internet of things (ITU 2005 7th edition) 6 6 has become associated with a form of the technology ABI Research5 believes that by 2009 50 per cent of called RFID tags. These are tiny microchips attached to mobile phones will have embedded RFID chips to antennae (transponders). The data on these chips can access services and pay for goods. This technology is be read by a wireless reader (transceiver) and the data already being used in Japan [http://www.nttdocomo. passed back to computer systems. There are two main com/presscenter/pressreleases/press/pressrelease. types of RFID tags: passive (energy harvested from the html?param[no]=474]. reader) and active (with their own power supply). The In education the main use of RFID tags so far has been more sophisticated tags offer read/write capabilities. in library management systems, for asset tagging and 2 RFID chips can be as small as 0.05 mm and can be ID/tracking purposes. However, a number of more embedded in paper. More recently, printable tags have innovative education projects have shown the value of been developed. RFID systems do not require line learners being able to interact with tagged objects in of sight and work over various distances from a few the real world. For example, an object’s ID could trigger centimetres to 100 metres depending on the frequency information or sounds to be sent to a learner’s device. used and type of system. Standards for tags and Such systems are increasingly being used in museums electronic product codes (EPC) are being overseen by [http://www.rfid-weblog.com/50226711/rfid_in_ EPC Global [http://www.epcglobalinc.org]. museums_another_growing_market.php]. The ability to identify, locate and track RFID tags is seen RFID tags can also play a part in creating intelligent as a transformational technology, potentially allowing classrooms (see below). any object to be interrogated by computer systems. RFID readers can now also be included in mobile However, high costs, technical issues and concerns phones, potentially making the readers as ubiquitous about privacy will need to be overcome before RFID tags as the tags are expected to become. However, RFID become widespread. Currently, the main area of use is tags can operate without user intervention, automating in the retail supply chain, but analysts predict that 50 per many applications and providing huge amounts of data, cent of the uses for RFID in 2012 have not even been which creates a need for more sophisticated systems to thought of yet. support them (see data handling). The retail/supply sector is only one area of use for the technology. Some examples of other uses are: security, authentication of goods/banknotes [http://networks. silicon.com/lans/0,39024663,39122553,00.htm], asset tagging, document tagging, library book tagging, road tolls, safety systems,