Ubiquitous computing

Ubiquitous computing is a concept in software engineering and computer science where computing is made to appear anytime and everywhere.

Back to glossary

Ubiquitous computing, also known as pervasive computing, is a concept in software engineering and computer science where computing is made to appear anytime and everywhere. In contrast to desktop computing, ubiquitous computing can occur using any device, in any location, and in any format. A user interacts with the computer, which can exist in many different forms including laptop computers, tablets and terminals in everyday objects such as a fridge or a pair of glasses.

The underlying technologies to support ubiquitous computing include Internet, advanced middleware, operating system, mobile code, sensors, microprocessors, new I/O and user interfaces, networks, mobile protocols, location and positioning and new materials. This paradigm is also described as pervasive computing, ambient intelligence, ambient media or 'everyware'. Each term emphasizes slightly different aspects. When primarily concerning the objects involved, it is also known as physical computing, the Internet of Things, haptic computing, and things that think.

History of Ubiquitous Computing

The idea of ubiquitous computing as invisible computation was first articulated by Mark Weiser in 1988 at the Computer Science Lab at Xerox PARC. He proposed that the most profound technologies are those that disappear and weave themselves into the fabric of everyday life until they are indistinguishable from it. The idea was to allow devices to sense changes in their environment and to automatically adapt and act based on these changes, based on predefined rules and regulations.

Since then, the idea has evolved with technology and has started to become reality with the rise of the smartphone. Today, ubiquitous computing has become an essential part of our daily lives. We interact with computing devices and applications from the moment we wake up, through our work day, and until we go to sleep. Our cars, phones, watches, and even our refrigerators are all becoming smarter and more capable thanks to the principles of ubiquitous computing.

Mark Weiser and Xerox PARC

Mark Weiser is considered the father of ubiquitous computing. He was a chief scientist at Xerox PARC, and it was there that he and his team conducted the seminal research that led to the concept of ubiquitous computing. They envisioned a world where technology becomes so integrated into our lives that it becomes invisible, a concept they referred to as "calm technology".

Weiser and his team at Xerox PARC also developed several innovative devices to demonstrate the principles of ubiquitous computing. These included the "Parctab" (a handheld device), the "Pads" (portable, book-sized devices), and "Active Badges" (wearable devices). These devices were designed to blend seamlessly into the background, providing users with intuitive, context-aware services.

Principles of Ubiquitous Computing

Ubiquitous computing is based on the idea of making the computer a part of the environment, rather than having it exist as a distinct object. This involves embedding microprocessors in everyday objects, and having them communicate information. The goal is to create environments that are sensitive and responsive to the presence of people.

Ubiquitous computing environments can be characterized by the presence of a multitude of these smart devices. These devices are networked together, and often have access to vast amounts of data stored in the cloud. They can share information among themselves and perform coordinated actions. They can also adapt their behavior based on the context, including the user's current task, location, and preferences.

Context-Awareness

One of the key principles of ubiquitous computing is context-awareness. This means that devices can sense and react to the environment around them. This can include detecting the user's location, the current time, the temperature, or any other relevant aspect of the environment.

Context-awareness allows devices to provide personalized services, and to anticipate the user's needs. For example, a context-aware mobile phone could automatically switch to silent mode when it detects that it is in a meeting room. Or a context-aware thermostat could adjust the temperature based on the time of day and the presence of people in the house.

Decentralization

Another important principle of ubiquitous computing is decentralization. Unlike traditional computing models where data and processing power are centralized, in ubiquitous computing, these resources are distributed across many devices. This allows for greater flexibility and resilience, as there is no single point of failure.

Decentralization also allows for more efficient use of resources. Devices can cooperate and share resources, allowing them to perform tasks that would be impossible for any single device to perform on its own. For example, a group of smart devices could work together to monitor the environment in a large building, with each device monitoring a small area.

Applications of Ubiquitous Computing

Ubiquitous computing has a wide range of applications, from smart homes and wearable devices to large-scale projects like smart cities. These applications aim to make life easier and more efficient by automating tasks and providing services based on the user's context and preferences.

For example, in a smart home, ubiquitous computing can be used to control lighting, temperature, and appliances based on the user's preferences and patterns of behavior. Wearable devices can monitor the user's health and provide feedback and recommendations. In a smart city, ubiquitous computing can be used to manage traffic, conserve energy, monitor the environment, and provide a wide range of services to the inhabitants.

Smart Homes

One of the most common applications of ubiquitous computing is in smart homes. Here, various devices such as lights, thermostats, and appliances are connected to a network and can communicate with each other. These devices can be controlled remotely through a smartphone or a computer, and can also operate autonomously based on predefined rules.

For example, a smart thermostat can learn the homeowner's schedule and adjust the temperature accordingly to save energy. Lights can be programmed to turn on and off at certain times, or to respond to the presence of people. Appliances can be set to operate at times when electricity is cheaper, and can even order groceries when they detect that certain items are running low.

Wearable Devices

Wearable devices are another major application of ubiquitous computing. These devices, such as smartwatches and fitness trackers, are worn on the body and provide a wide range of services including health monitoring, fitness tracking, notification delivery, and even mobile payments.

These devices are constantly collecting data about the user's health and activities, and can provide valuable insights and recommendations. For example, a fitness tracker can monitor the user's heart rate and activity levels, and can provide feedback on how to improve their fitness. A smartwatch can provide notifications and reminders, and can even allow the user to respond to messages and perform tasks without having to use their phone.

Challenges and Concerns in Ubiquitous Computing

While ubiquitous computing offers many benefits, it also raises several challenges and concerns. These include issues related to privacy, security, interoperability, and user acceptance.

As ubiquitous computing devices are constantly collecting and sharing data, they can potentially invade the user's privacy. For example, a smart home device could reveal when the user is at home, or a wearable device could reveal sensitive health information. Therefore, it is crucial to have strong privacy protections in place.

Privacy

Privacy is a major concern in ubiquitous computing. As these devices are often collecting sensitive data, it is crucial to ensure that this data is protected and that the user's privacy is respected. This involves not only securing the data from unauthorized access, but also ensuring that the data is used in a way that respects the user's preferences and consent.

For example, a smart home device could potentially gather a lot of data about the user's habits and behaviors. This data could be very valuable for marketing purposes, but it could also be very invasive if it is used without the user's consent. Therefore, it is important to have clear policies about how this data is used, and to give the user control over their own data.

Security

Security is another major concern in ubiquitous computing. These devices are often connected to the internet, which makes them potential targets for hackers. A security breach could result in unauthorized access to sensitive data, or could even allow the hacker to take control of the devices.

Therefore, it is crucial to have strong security measures in place. This includes not only securing the devices themselves, but also securing the networks they are connected to, and the data they are transmitting. This can involve a combination of encryption, secure protocols, and regular security updates.

Future of Ubiquitous Computing

The future of ubiquitous computing is very promising, with many exciting developments on the horizon. As technology continues to advance, we can expect to see more and more devices becoming "smart" and connected, leading to a truly ubiquitous computing environment.

One of the key trends in the future of ubiquitous computing is the rise of the Internet of Things (IoT). This refers to the increasing number of devices that are connected to the internet and can communicate with each other. These devices can range from household appliances and wearable devices to industrial machines and city infrastructure. The IoT has the potential to revolutionize many aspects of our lives, from our homes and workplaces to our cities and transportation systems.

Internet of Things (IoT)

The Internet of Things (IoT) is a key trend in the future of ubiquitous computing. The IoT refers to the network of physical objects that are connected to the internet and can communicate with each other. These objects can include everything from household appliances and wearable devices to cars and city infrastructure.

The IoT has the potential to revolutionize many aspects of our lives. For example, in a smart home, the IoT can allow all the devices to communicate with each other and work together to provide a seamless and intuitive user experience. In a smart city, the IoT can allow for efficient management of resources and services, leading to improved quality of life for the inhabitants.

Artificial Intelligence (AI)

Artificial Intelligence (AI) is another key trend in the future of ubiquitous computing. AI can be used to analyze the vast amounts of data generated by ubiquitous computing devices, and to make intelligent decisions based on this analysis.

For example, AI can be used to learn the user's habits and preferences, and to provide personalized services based on this knowledge. AI can also be used to detect patterns and anomalies in the data, which can be useful for things like predictive maintenance and anomaly detection.

Conclusion

Ubiquitous computing is a powerful concept that has the potential to revolutionize many aspects of our lives. By making computing devices more integrated and context-aware, we can create environments that are more responsive and intuitive. However, it also raises several challenges and concerns, particularly in terms of privacy and security. Therefore, it is crucial to address these issues and to develop robust solutions that respect the user's rights and protect their data.

As technology continues to advance, we can expect to see more and more applications of ubiquitous computing. From smart homes and wearable devices to smart cities and the Internet of Things, the possibilities are truly endless. With the right approach, ubiquitous computing can lead to a future where technology is not just a tool, but a seamless and integral part of our lives.

Author Sofie Meyer

About the author

Sofie Meyer is a copywriter and phishing aficionado here at Moxso. She has a master´s degree in Danish and a great interest in cybercrime, which resulted in a master thesis project on phishing.

Similar definitions

Precedence Piracy Volatile Boltzmann constant Spam Actuator Distributed denial of service (DDoS) On-premises software Tweaking Not safe for work (NSFW) Microsoft Access Query Scrum Master Hyperlink Postscript