17,061 research outputs found

    Wearable and mobile devices

    Get PDF
    Information and Communication Technologies, known as ICT, have undergone dramatic changes in the last 25 years. The 1980s was the decade of the Personal Computer (PC), which brought computing into the home and, in an educational setting, into the classroom. The 1990s gave us the World Wide Web (the Web), building on the infrastructure of the Internet, which has revolutionized the availability and delivery of information. In the midst of this information revolution, we are now confronted with a third wave of novel technologies (i.e., mobile and wearable computing), where computing devices already are becoming small enough so that we can carry them around at all times, and, in addition, they have the ability to interact with devices embedded in the environment. The development of wearable technology is perhaps a logical product of the convergence between the miniaturization of microchips (nanotechnology) and an increasing interest in pervasive computing, where mobility is the main objective. The miniaturization of computers is largely due to the decreasing size of semiconductors and switches; molecular manufacturing will allow for “not only molecular-scale switches but also nanoscale motors, pumps, pipes, machinery that could mimic skin” (Page, 2003, p. 2). This shift in the size of computers has obvious implications for the human-computer interaction introducing the next generation of interfaces. Neil Gershenfeld, the director of the Media Lab’s Physics and Media Group, argues, “The world is becoming the interface. Computers as distinguishable devices will disappear as the objects themselves become the means we use to interact with both the physical and the virtual worlds” (Page, 2003, p. 3). Ultimately, this will lead to a move away from desktop user interfaces and toward mobile interfaces and pervasive computing

    Spam

    Get PDF
    With the advent of the electronic mail system in the 1970s, a new opportunity for direct marketing using unsolicited electronic mail became apparent. In 1978, Gary Thuerk compiled a list of those on the Arpanet and then sent out a huge mailing publicising Digital Equipment Corporation (DEC—now Compaq) systems. The reaction from the Defense Communications Agency (DCA), who ran Arpanet, was very negative, and it was this negative reaction that ensured that it was a long time before unsolicited e-mail was used again (Templeton, 2003). As long as the U.S. government controlled a major part of the backbone, most forms of commercial activity were forbidden (Hayes, 2003). However, in 1993, the Internet Network Information Center was privatized, and with no central government controls, spam, as it is now called, came into wider use. The term spam was taken from the Monty Python Flying Circus (a UK comedy group) and their comedy skit that featured the ironic spam song sung in praise of spam (luncheon meat)—“spam, spam, spam, lovely spam”—and it came to mean mail that was unsolicited. Conversely, the term ham came to mean e-mail that was wanted. Brad Templeton, a UseNet pioneer and chair of the Electronic Frontier Foundation, has traced the first usage of the term spam back to MUDs (Multi User Dungeons), or real-time multi-person shared environment, and the MUD community. These groups introduced the term spam to the early chat rooms (Internet Relay Chats). The first major UseNet (the world’s largest online conferencing system) spam sent in January 1994 and was a religious posting: “Global alert for all: Jesus is coming soon.” The term spam was more broadly popularised in April 1994, when two lawyers, Canter and Siegel from Arizona, posted a message that advertized their information and legal services for immigrants applying for the U.S. Green Card scheme. The message was posted to every newsgroup on UseNet, and after this incident, the term spam became synonymous with junk or unsolicited e-mail. Spam spread quickly among the UseNet groups who were easy targets for spammers simply because the e-mail addresses of members were widely available (Templeton, 2003)

    WCDMA in Malaysia

    Get PDF
    Wideband Code Division Multiple Access (WCDMA) A 3G highspeed digital data service provided by cellular carriers that use the time division multiplexing (TDMA) or GSM technology worldwide, including AT&T (formerly Cingular) and T-Mobile in the U.S. WCDMA works on WCDMA cell phones as well as laptops and portable devices with WCDMA modems [1]. Users have typically experienced downstream data rates up to 400 Kbps [1]. WCDMA has been used in the Japanese Freedom of Mobile Multimedia Access (FOMA) system and in the Universal Mobile Telecommunications System (UMTS); a third generation follow-on to the 2G GSM networks deployed worldwide [1]. Although TDMA and GSM carriers both use TDMA modulation, WCDMA stems from CDMA. Part of the 3GPP initiative, the International Telecommunication Union (ITU) refers to WCDMA as the Direct Sequence (DS) interface within the IMT-2000 global 3G standards [1]

    Mobile Broadband Possibilities considering the Arrival of IEEE 802.16m & LTE with an Emphasis on South Asia

    Get PDF
    This paper intends to look deeper into finding an ideal mobile broadband solution. Special stress has been put in the South Asian region through some comparative analysis. Proving their competency in numerous aspects, WiMAX and LTE already have already made a strong position in telecommunication industry. Both WiMAX and LTE are 4G technologies designed to move data rather than voice having IP networks based on OFDM technology. So, they aren't like typical technological rivals as of GSM and CDMA. But still a gesture of hostility seems to outburst long before the stable commercial launch of LTE. In this paper various aspects of WiMAX and LTE for deployment have been analyzed. Again, we tried to make every possible consideration with respect to south Asia i.e. how mass people of this region may be benefited. As a result, it might be regarded as a good source in case of making major BWA deployment decisions in this region. Besides these, it also opens the path for further research and in depth thinking in this issue.Comment: IEEE Publication format, ISSN 1947 5500, http://sites.google.com/site/ijcsis

    Calling Dick Tracy! Or, Cellphone Use, Progress, and a Racial Paradigm

    Get PDF
    The hero and phone-watch from Dick Tracy are evoked regularly in news and studies of cellphone use. This paper argues that the racial paradigm of White law enforcer and Dark law-breaker in the comic strip resonates in contemporary evocations and in discussions of cellphone use and crime. Representations of mobile communication and racialized criminality in Dick Tracy were inspired by the 1930s “war on crime” that intersected with wireless innovations and with lynching. This paper interprets that repeated evocation of the comic strip is a “perverse nostalgia” for an old-fashioned form of law and order premised on racialized violence and viewing

    Integrative Information Platforms: The Case of Zero-Rating

    Get PDF
    • …
    corecore