Section Title Here Smartphones

Total Page:16

File Type:pdf, Size:1020Kb

Section Title Here Smartphones SectionSmartphones Title Here Editor: Editor Name HereEditor: n Roy Editor Want affiliation n Google here n n [email protected] editor email here Smartphones: Past, Present, and Future Nayeem Islam, Qualcomm Roy Want, Google or most of us, it’s hard to imagine a few useful applications. The user inter- US market. However, success was F a time when we couldn’t read our face was typically a small, restricted key- mainly limited to enterprise custom- email using a mobile phone or post pic- board, and novel (but painfully slow) ers who wanted secure email access. tures of events and then instantly share use of the number keypad allowed for The Blackberry was small, but with a them. Today, we use smartphones like text input. Nonetheless, these devices well-designed full-feature miniature personal assistants to search for and hinted at the tremendous possibilities keyboard, suited to rapid two-thumb locate stores, hotels, and restaurants. We for an integrated device. typing, but it never became a fully gen- even use our smartphones to monitor Later came IBM’s Simon, Nokia’s eral-purpose mobile computing device. our health through activity logging, find Communicator, and Qualcomm’s PdQ, In the 2000s, 3G networks were our location on maps, watch videos, and which were launched through the latter deployed, further increasing speeds and buy products on the Internet. We have 1990s, combining an expanded com- the reach of high-speed data. Other devel- lived through an unprecedented revolu- puting and phone functionality. These opments, such as Qualcomm’s Binary tion in which cellphones have evolved devices were more generally character- Runtime Environment for Wireless from devices primarily used to make ized as feature phones, rather than smart- (BREW), also allowed cellular carriers phone calls, to computing devices that phones, but that changed in 1999, when to deploy mobile ecosystems worldwide. let us stay connected with other people Japan’s NTT DoCoMo introduced the In 2007, Apple launched its iPhone, and information at all times. i-mode system. setting a new standard for mobile Here, we review this evolution—dis- The one major thing missing from computer-integrated telephony, with an cussing how technology finally caught the user experience of these devices was open developer community contribut- up with the vision of an integrated rich content, and the i-mode system ing a wide spectrum of novel capabili- device—and consider what’s next on let mobile users access sophisticated ties through Apple’s app store opened in the horizon. In particular, we focus on Internet services, such as websites and 2008. Subsequently, Google released the six trends that we predict will strongly Internet email. The initial i-mode sys- Android operating system as the AOSP influence the function and design of tem took advantage of websites written (Android Open Source Project), which future smartphones. in a restricted subset of HTML, called was adopted by many smartphone C-HTML, enabling data to be viewed handset manufacturers and launched HisTORY OF The MOBILE on a mobile phone browser with a lim- worldwide. Accelerated by both open PHONE ited display. The i-mode system had software and the wide variety of phone As long ago as the 1970s, researchers widespread adoption and attracted tens hardware it could run on, the developer such as Theodore G. Paraskevakos con- of millions of subscribers within a few community expanded even more rap- ceptualized devices that combined tele- short years of its release. Clearly, i-mode idly, creating its own extensive app store. phony and computing. Two decades devices brought increased functionality, later, in the early 1990s, several pro- facilitated by higher network speeds that TODAY’S SMARTphONES totype multifunction devices finally let users have a more compelling user According to IDC, Android and iOS appeared (see Table 1). Many of these experience than previous technologies. currently lead the world smartphone prototypes were bulky, ran on low data- At about the same time, the Black- market, with Android holding a share rate networks at speeds less than 100 berry smartphone became estab- of approximately 81.1 percent, and iOS kbps (typically 14.4 kbps), and had only lished and started flourishing in the holding 15.2 percent. The remaining Published by the IEEE CS n 1536-1268/14/$31.00 © 2014 IEEE PERVASIVE computing 89 SMARTPHONES SMARTPHONES TABLE 1 market share is Windows Mobile at 2.7 A history of the mobile phone leading up to the modern smartphone. (Only models with significant evolution in phone capability are listed.) percent, Blackberry at 0.5 percent, and others at 0.6 percent (see Figure 1).1 Year Cell phone model Company This revolution has made Internet 1973 “First Cellphone” demo Motorola applications, once only available to desk- 1984 DynaTAC 8000X Motorola top users, easily accessible to anybody 1989 MicroTAC 9800X Motorola with a mobile device, resulting in almost anytime, anywhere access. Along the way, 1992 1011 Nokia several innovations have been critical for 1994 Simon IBM the adoption of smartphones—namely, 1996 9000 Communicator Nokia high-speed data networks such as 3G 1999 pdQ Qualcomm and 4G (LTE), which have been widely 1999 9110 Nokia deployed; modern operating systems with 1999 8210 Nokia easy-to-program interfaces and rich pro- 1999 850 Blackberry gramming tools; and business models for deploying applications such as app stores. 2000 R320 Ericsson Components such as the capacitive mul- 2002 SCP-5300 Sanyo titouch screen that let our fingers easily 2002 N21i (i-mode) NEC zoom and select graphical components 2003 7230 BlackBerry of a complex user interface are equally 2004 Razr V3 (Symbian) Motorola important ingredients for improved 2005 II Sidekick usability, reducing the difficulty of inter- acting with a pocket-sized device for 2007 iPhone (iOS) Apple real-world tasks. These innovations have 2007 m550i (i-mode) Sony Ericsson transformed the mobile phone ecosystem. 2009 Droid (Android) Motorola 2011 HD7 (Windows Phone 7) HTC WHAT’S NeXT? 2012 Galaxy S3 (Android) Samsung As we look forward to the next decade, the 2012 iPhone 5 (iOS) Apple smartphone experience is about to change 2012 Lumia 920 (Windows Phone 8) Nokia once again. Here, we look into our crystal ball and predict tremendous growth in the 2014 Galaxy S5 (Android) Samsung following six areas (see Table 2). 2014 iPhone 6 (iOS) Apple Personal Computers Smartphones are already being designed around multicore proces- sors and will follow a path to similar 80 desktop and laptop performance, only 70 lagging behind due to limited battery 60 capacity and operating temperatures. 50 However, desktops already have more 40 processing performance than is neces- sary for many common applications, Percentage 30 and a lower-power smartphone can 20 still meet many of our requirements. As 10 CMOS transistor technology continues 0 to improve, the future smartphone will Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 Q2 Q3 Q4 Q1 be capable of all but the most compute- 2011 2012 2013 2014 intensive tasks required for our daily work. Some of the improvements in Android iOS Windows phone Blackberry OS Others performance will result from system- on-chip (SoC) designs, which might Figure 1. The market share of the various mobile OSs by year.1 include highly specialized low-power 90 PERVASIVE computing www.computer.org/pervasive SMARTPHONES TABLE 2 Six major trends affecting future smartphone design and use. Trends Impact Personal computing Smartphones will become our primary computing platform and will dock with nearby displays and key- boards. They will become our computation, storage, and network hub. Internet of Things (IoT) The smartphone will be the on-ramp for the IoT, letting you locate and interact with the world around you as easily as you currently search for information on the Internet. Multimedia delivery The smartphone will rival more traditional platforms, such as the TV or desktop computer, for watching videos, and even storing libraries of multimedia content. Low power operation The battery in smartphones will last longer, aided by new software structuring techniques and low- power hardware accelerators. Wearable computing The smartphone will be foldable and will take on unconventional shapes. It will merge into a diverse set of wearable technologies, from wrist-mounted devices to glasses and extensions of our clothing. Context awareness Smartphones will be more context-aware and able to adapt to nearby people, places, and things. accelerator hardware for common to the need for high-bandwidth links larger screens, or devices known today as applications, such as video compression used in the general Internet. Exam- phablets—something that is in-between a or cryptographic encryption. ples of technologies that facilitate IoT phone and tablet. There will soon be a lot New memory technologies that have are near-field communication and the more devices with five-inch screens. higher capacities, consume less power, nascent Bluetooth Low Energy stan- The challenge won’t be the screen and are cheaper will enable smartphones dard, which can be used in conjunction resolution but the enormous comput- to store terabytes of data. This will lead with existing cellular and Wi-Fi radio ing power in the CPU and GPU, and the to a new breed of applications that store technologies. As these newer standards hardware interconnects required to move personal content and context, enhancing are used more widely, the mobile phone such large amounts of data inside the the speed of access and privacy of user will become a control and sensing hub. SoC. The cellular service provider proto- data. As a result, sophisticated apps will The applications of IoT are immense cols supported by the handsets must also be developed that mine person data to and can take over areas that have tra- evolve to support the download of high- present relevant information or that take ditionally been the domain of bespoke resolution streaming video.
Recommended publications
  • Building Blocks for Tomorrow's Mobile App Store
    Building Blocks for Tomorrow’s Mobile App Store by Justin G. Manweiler Department of Computer Science Duke University Date: Approved: Romit Roy Choudhury, Supervisor Jeffrey S. Chase Landon P. Cox Victor Bahl Dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2012 Abstract (0984) Building Blocks for Tomorrow’s Mobile App Store by Justin G. Manweiler Department of Computer Science Duke University Date: Approved: Romit Roy Choudhury, Supervisor Jeffrey S. Chase Landon P. Cox Victor Bahl An abstract of a dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Department of Computer Science in the Graduate School of Duke University 2012 Copyright c 2012 by Justin G. Manweiler All rights reserved Abstract In our homes and in the enterprise, in our leisure and in our professions, mobile computing is no longer merely “exciting;” it is becoming an essential, ubiquitous tool of the modern world. New and innovative mobile applications continue to inform, entertain, and surprise users. But, to make the daily use of mobile technologies more gratifying and worthwhile, we must move forward with new levels of sophistication. The Mobile App Stores of the future must be built on stronger foundations. This dissertation considers a broad view of the challenges and intuitions behind a diverse selection of such new primitives. Some of these primitives will mitigate exist- ing and fundamental challenges of mobile computing, especially relating to wireless communication. Others will take an application-driven approach, being designed to serve a novel purpose, and be adapted to the unique and varied challenges from their disparate domains.
    [Show full text]
  • Toward Building a Safe, Secure, and Easy-To-Use Internet of Things
    IOT CONNECTION Toward Building a Safe, Secure, and Easy-to-Use Sal glances at the display near her office door and sees that her next meeting is in 10 Internet of Things minutes. One participant is out of town and the other two people are running late, but the meeting room is still occupied Infrastructure by several people. The display also suggests it might be a Yuvraj Agarwal and Anind K. Dey, Carnegie Mellon University good time to get coffee because the lines are short at the cafe downstairs. Her good friend Joe Carnegie Mellon University is leading a happens to be at the cafe, too. multi-institutional effort to build an open Sal checks an app she recently built and sees that the coffee is infrastructure to support the Internet of Things. freshly brewed. “That simplifies things,” she thinks to herself as she heads toward the cafe. safe and secure world enabled by the Inter- This is the unique promise of a successful IoT, and is net of Things (IoT) promises to lead to truly what we are aiming for with GIoTTO, the IoT program connected environments, where people and at Carnegie Mellon University (CMU) named after the things collaborate to improve the overall famous Renaissance painter. qualityA of life. The IoT will give us actionable informa- tion at our fingertips, without us having to ask for it or NEED FOR AN OPEN INFRASTRUCTURE even recognizing that it might be needed. Consider this Although numerous commercial and academic programs example that combines many simple uses of the IoT to cu- focus on building IoT systems, it’s clear that for any IoT mulatively form an omnipotent assistant: stack to be widely adopted, it must be open—without a 40 COMPUTER PUBLISHED BY THE IEEE COMPUTER SOCIETY 0018-9162/16/$33.00 © 2016 IEEE EDITOR ROY WANT Google; [email protected] singular organization claiming own- ership.
    [Show full text]
  • Passing the Torch
    From the Editor in Chief Editor in Chief: M. Satyanarayanan ■ Carnegie Mellon University ■ [email protected] Passing the Torch M. Satyanarayanan his issue marks the end of my sec- a highly portable information appliance LOOKING BACK, T ond two-year term as editor in that transforms nearby displays and LOOKING FORWARD chief. I am delighted to introduce my input devices into a transient personal- In August 2001, 10 years after the successor, Roy Want of Intel Research, computing environment. Roy has pub- publication of Mark Weiser’s seminal who will begin his term on 1 January lished extensively over his research career paper introducing the concept of ubiq- 2006. I will continue to serve as active and has over 50 patents to his credit. uitous computing,1 I summarized the editor in chief until that time and will It is hard to imagine a person more field’s progress and reflected on the work closely with Roy to ensure a qualified than Roy to be the next editor challenges ahead in a paper entitled smooth and efficient transition. My in chief of IEEE Pervasive Computing. “Pervasive Computing: Vision and involvement with this publication will In 2001, he was part of the founding edi- Challenges.”2 Looking back, it is grat- continue even after I step down, as I will torial board that created this publication ifying to see how much progress has remain on the editorial board. occurred in just four short years. Many forces have converged to make IN GOOD HANDS It is hard to this progress possible, one of which was Roy received his PhD from Cambridge imagine a substantial industry investment in prod- University in 1988, under the supervision person more uct development relevant to mobile and of Roger Needham.
    [Show full text]
  • Professional Skills in Computer Science Lecture 3: Historical Aspects of Computing
    Professional Skills in Computer Science Lecture 3: Historical Aspects of Computing Ullrich Hustadt Department of Computer Science School of Electrical Engineering, Electronics, and Computer Science University of Liverpool Ullrich Hustadt COMP110 Professional Skills in Computer Science L3 { 1 Further milestones The Future Contents 1 Further milestones 2 The Future Fundamental questions Model-View-Controller Relevant learning outcome: 1 Ability to describe and discuss economic, historic, organisational, research, and social aspects of computing as a discipline and computing in practice; Ullrich Hustadt COMP110 Professional Skills in Computer Science L3 { 2 Further milestones The Future What have computers been used for? (Summary) • 1600 { now: Calculation Manipulation of numbers • 1960 { now: Information Processing Manipulation of numbers, text, images, audio, video • 1960 { now: Cognition (Reasoning) Manipulation of knowledge via reasoning / inference • 1970 { now: Interaction Allowing people to communicate, cooperate, compete • 1970 { now: Automation Computer-controlled machines and robots Hypotheses: • The wave of innovation in the 60s and 70s is due to the increased availability of computing resources to more and more researchers • Leadership is mostly due to early exposure to state-of-the-art systems and due to hard work Ullrich Hustadt COMP110 Professional Skills in Computer Science L3 { 3 Further milestones The Future What have computers been used for? What important milestones in the development and use of computers were not covered
    [Show full text]
  • Curriculum Vitae: Roy Want
    Curriculum Vitae: Roy Want E-mail: roywant AT google.com ; roywant AT acm.org Google Inc, Mail-Stop: US-MTV-B43 1600 Amphitheatre Parkway Mountain View, CA 94043, USA Office/Cell: (650) 691 3600 Date: January, 2019 Up-to-date CV: http://www.roywant.com/cv/vita.htm Research Interests Mobile & ubiquitous computing, location & context-aware systems, electronic tagging(RFID/NFC/BLE), hardware design, electronic commerce, smart cards, distributed systems, multimedia systems, cellular automata, novel UI, and MEMS. Professional ACM Fellow: 2005, and ACM (Association of Computer Machinery) member since 1996. IEEE Fellow: 2005 and IEEE (Institute for Electrical and Electronic Engineers) member since 1991. Lillian Gilbreth lectureship, National Academy of Engineering (NAE), Washington DC, Oct 12th, 2003 Education Ph.D. Cambridge University UK, Churchill College, Computer Science, Advisor: Roger Needham, 1983-88 o Thesis title: "Reliable Management of Voice in a Distributed System" BA hons. Cambridge University UK, Churchill College, Nat. Science/Computer Science, Tutor: Frank King, 1980-83 o Dissertation title: “A Local Area Network (LAN) Based on the Domestic Mains Supply” High School: William Ellis Grammar School, London UK, 1972-79 Experience Google Inc. (2011-present) o Senior Research Scientist: Google Research and Android Location & Context Team Intel Corporation (2001-2011) o Senior Principal Engineer (SPE) 2008-2011 -Assoc. Director: ILSC (2009-10) & Director (NPL) 2010-11 o Principal Engineer (PE) 2000-2007 Xerox - Palo Alto Research Center (PARC). Computer Science Laboratory (CSL). 1991 - 2001 (reporting to Mark Weiser, Laboratory Manager for CSL; CTO) o Principal Scientist 2000-2001 o Area Manager for Embedded Systems Area 1992-1999 o Member of Research Staff II 1991-1992.
    [Show full text]
  • Introduction to Smartphones Beginners Guide TOPIC INTRODUCTION to SMARTPHONES
    Tech Savvy Seniors Introduction to Smartphones Beginners Guide TOPIC INTRODUCTION TO SMARTPHONES OVERVIEW Phones used to be all about making calls, but now your mobile can do so much more. The range of new touchscreen smartphones allows you to access the internet, use social media, get live news updates, play music and video, and much more. They almost universally use touchscreens for control, however, which can be a challenge for people new to the technology. WHO IS THIS Maybe you’ve never owned a mobile and are curious WORKSHOP FOR? about why you’d choose a smartphone. Perhaps you want a mobile phone that does more than your current keypad-style handset, or are looking to learn more about the smartphone you already own. This workshop has something to satisfy each of you. WHAT YOU’LL An internet-connected smartphone; either your NEED own or supplied by the workshop organisers. You may need to share a smartphone with others in the workshop. An existing Apple account (or Apple ID), for downloading apps to an iPhone smartphone. An existing Google account (or Google ID), for downloading apps to an Android smartphone. WHAT YOU’LL In this workshop, you will learn the basics of how LEARN to navigate your way around a smartphone with a touchscreen. You will learn how to turn the phone on and off, make and receive calls, add a contact and look up a contact, and change the volume on the phone. You will also learn briefly about apps, what they are, how to download them, and the costs associated with them.
    [Show full text]
  • SOUL: an Edge-Cloud System for Mobile Applications in a Sensor-Rich World
    2016 IEEE/ACM Symposium on Edge Computing SOUL: An Edge-cloud System for Mobile Applications in a Sensor-rich World Minsung Jang∗, HyunJong Lee†, Karsten Schwan‡, Ketan Bhardwaj‡ ∗AT&T Labs - Research, [email protected] †University of Michigan, [email protected] ‡Georgia Institute of Technology, {karsten, ketanbj}@gatech.edu Abstract—With the Internet of Things, sensors are becoming In order for such apps to efficiently interact with and ever more ubiquitous, but interacting with them continues manage the dynamic sets of currently accessible sensors with to present numerous challenges, particularly for applications the associated actuators and software services, SOUL (Sensors running on resource-constrained devices like smartphones. The Of Ubiquitous Life) SOUL abstractions in this paper address two issues faced • by such applications: (1) access to sensors with the levels of externalizes sensor & actuator interactions and process- convenience needed for their ubiquitous, dynamic use, and only ing from the resource-constrained device to edge- and by parties authorized to do so, and (2) scalability in sensor remote-cloud resources, to leverage their computational and access, given today’s multitude of sensors. Toward this end, storage abilities for running the complex sensor processing SOUL, first, introduces a new abstraction for the applications to functionality; transparently and uniformly access both on-device and ambient • sensors with associated actuators. Second, potentially expensive automates reconfiguration of these interactions when sensor-related processing needs not just occur on smartphones, better-matched sensors and actuators become physically but can also leverage edge- and remote-cloud resources. Finally, available; SOUL provides access control methods that permit users to easily • supports existing sensor-based applications allowing define access permissions for sensors, which leverages users’ social ties and captures the context in which access requests them to use SOUL’s capabilities without requiring modi- are made.
    [Show full text]
  • The Ways Young Adults Access Digital Information Cydney Lauren Palmer Louisiana State University and Agricultural and Mechanical College, [email protected]
    Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2011 There's an app for that: the ways young adults access digital information Cydney Lauren Palmer Louisiana State University and Agricultural and Mechanical College, [email protected] Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_theses Part of the Mass Communication Commons Recommended Citation Palmer, Cydney Lauren, "There's an app for that: the ways young adults access digital information" (2011). LSU Master's Theses. 711. https://digitalcommons.lsu.edu/gradschool_theses/711 This Thesis is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Master's Theses by an authorized graduate school editor of LSU Digital Commons. For more information, please contact [email protected]. THERE’S AN APP FOR THAT: THE WAYS YOUNG ADULTS ACCESS DIGITAL INFORMATION A Thesis Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Master in Mass Communication in The Manship School of Mass Communication by Cydney Lauren Palmer B.A., Louisiana State University, 2008 December 2011 ACKOWLEDGMENTS First, I would like to thank my parents, Allan and Karin Palmer, for their support and encouragement while pursuing my master’s degree. I would also like to thank Dr. Yongick Jeong for his continuous guidance and support throughout the tedious development of this academic research project. Finally, I would like to thank my additional thesis committee members, Dr. Lance Porter and Dr.
    [Show full text]
  • Running IBM Websphere Application Server on System P and AIX: Optimization and Best Practices
    Front cover Running IBM WebSphere Application Server on System p and AIX: Optimization and Best Practices System p and AIX configuration strategies for WebSphere Application Server How JVM runtime and WebSphere Application Server interact with AIX Implementation scenarios Lutz Werner Denefleh Anderson de Sousa Ribeiro Dias Simon Kapadia Monty Poppe Colin Renouf Kwan-Ming Wan ibm.com/redbooks International Technical Support Organization Running IBM WebSphere Application Server on System p and AIX: Optimizaton and Best Practices September 2008 SG24-7347-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition September 2008 This edition applies to IBM WebSphere Application Server Version 6.1, IBM AIX Version 5.3, and IBM AIX Version 6.1. © Copyright International Business Machines Corporation 2008. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . x Preface . xi The team that wrote this book . xi Acknowledgements . xiii Become a published author . xiii Comments welcome. xiv Chapter 1. Introduction to running WebSphere Application Server on System p and AIX . 1 1.1 The whole system view: WebSphere, JVM, AIX, and System p . 2 1.1.1 Points of view . 2 1.1.2 A holistic system approach . 3 1.2 System layers and points of view . 3 1.2.1 Points of view and terminology . 4 1.3 The remainder of this book . 5 Chapter 2. WebSphere on System p and AIX 5 strategies . 7 2.1 Scalability considerations .
    [Show full text]
  • Die Meilensteine Der Computer-, Elek
    Das Poster der digitalen Evolution – Die Meilensteine der Computer-, Elektronik- und Telekommunikations-Geschichte bis 1977 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 und ... Von den Anfängen bis zu den Geburtswehen des PCs PC-Geburt Evolution einer neuen Industrie Business-Start PC-Etablierungsphase Benutzerfreundlichkeit wird gross geschrieben Durchbruch in der Geschäftswelt Das Zeitalter der Fensterdarstellung Online-Zeitalter Internet-Hype Wireless-Zeitalter Web 2.0/Start Cloud Computing Start des Tablet-Zeitalters AI (CC, Deep- und Machine-Learning), Internet der Dinge (IoT) und Augmented Reality (AR) Zukunftsvisionen Phasen aber A. Bowyer Cloud Wichtig Zählhilfsmittel der Frühzeit Logarithmische Rechenhilfsmittel Einzelanfertigungen von Rechenmaschinen Start der EDV Die 2. Computergeneration setzte ab 1955 auf die revolutionäre Transistor-Technik Der PC kommt Jobs mel- All-in-One- NAS-Konzept OLPC-Projekt: Dass Computer und Bausteine immer kleiner, det sich Konzepte Start der entwickelt Computing für die AI- schneller, billiger und energieoptimierter werden, Hardware Hände und Finger sind die ersten Wichtige "PC-Vorläufer" finden wir mit dem werden Massenpro- den ersten Akzeptanz: ist bekannt. Bei diesen Visionen geht es um die Symbole für die Mengendarstel- schon sehr früh bei Lernsystemen. iMac und inter- duktion des Open Source Unterstüt- möglichen zukünftigen Anwendungen, die mit 3D-Drucker zung und lung. Ägyptische Illustration des Beispiele sind: Berkley Enterprice mit neuem essant: XO-1-Laptops: neuen Technologien und Konzepte ermöglicht Veriton RepRap nicht Ersatz werden.
    [Show full text]
  • Getmobile MOBILE COMPUTING & COMMUNICATIONS REVIEW
    GetMobile MOBILE COMPUTING & COMMUNICATIONS REVIEW Volume 21, Issue 2 • June 2017 CONTENTS 3 Message from the Editor-in-Chief 16 22 (ALMOST) UNPUBLISHABLE HIGHLIGHTS 5 RESULTS 22 EmotionCheck: A Wearable Device 16 Experiences Deploying an to Regulate Anxiety through False EXPERIMENTAL METHODS Always-On Farm Network Heart Rate Feedback 5 How Do You Know If 85% Accuracy Is Good Enough for Your Application? 26 9 31 26 HemaApp: Noninvasive Blood Screening of Hemoglobin Using Smartphone Cameras MOBILE PLATFORMS 9 Beyond Reality: Head-Mounted 31 Who Are the Smartphone Users? Displays for Mobile Systems Identifying User Groups with Researchers Apps Usage Behaviors 35 Interpretable Machine Learning for Mobile Notification Management: An Overview of PrefMiner 35 2 GetMobile June 2017 | Volume 21, Issue 2 MESSAGE FROM THE EDITOR-IN-CHIEF CONTRIBUTORS EDITOR-IN-CHIEF IN THIS ISSUE, we highlight four papers Eyal de Lara, University of Toronto from ACM UbiComp 2016. MANAGING EDITOR Donna Paris “EmotionCheck: A Wearable Device DESIGNER JoAnn McHardy to Regulate Anxiety through False Heart SENIOR ADVISORS (Past Editors-in-Chief) Rate Feedback,” by Jean Costa, Alexander Paramvir Bahl, Microsoft Research T. Adams, Malte F. Jung, François Suman Banerjee, University of Wisconsin, Madison Guimbretière, and Tanzeem Choudhury, Srikanth Krishnamurthy, University of California, Riverside describes a device that generates subtle Jason Redi, BBN Technologies vibrations on the wrist to resemble a pulse, Mani Srivastava, University of California, Los Angeles which helps users regulate their anxiety Eyal de Lara Nitin Vaidya, University of Illinois, Urbana-Champaign through false feedback of a slow heart rate. SECTION EDITORS In “HemaApp: Noninvasive Blood Screening of Hemoglobin Ardalan Amiri Sami, University of California, Irvine Using Smartphone Cameras,” Edward Jay Wang, William Li, Doug Aruna Balasubramanian, Stony Brook University Nilanjan Banerjee, University of Maryland, Hawkins, Terry Gernsheimer, Colette Norby-Slycord, and Shwetak N.
    [Show full text]
  • A Study of the Growth and Evolution of Personal Computer Devices Throughout the Pc Age
    A STUDY OF THE GROWTH AND EVOLUTION OF PERSONAL COMPUTER DEVICES THROUGHOUT THE PC AGE A dissertation submitted in partial fulfilment of the requirements for the degree of Bachelor of Science (Honours) in Software Engineering Ryan Abbott ST20074068 Supervisor: Paul Angel Department of Computing & Information Systems Cardiff School of Management Cardiff Metropolitan University April 2017 Declaration I hereby declare that this dissertation entitled A Study of the Growth and Evolution of Personal Computer Devices Throughout the PC Age is entirely my own work, and it has never been submitted nor is it currently being submitted for any other degree. Candidate: Ryan Abbott Signature: Date: 14/04/2017 Supervisor: Paul Angel Signature: Date: 2 Table of Contents Declaration .................................................................................................................................. 2 List of Figures ............................................................................................................................... 4 1. ABSTRACT ............................................................................................................................ 5 2. INTRODUCTION .................................................................................................................... 6 3. METHODOLOGY.................................................................................................................... 8 4. LITERATURE REVIEW ............................................................................................................
    [Show full text]