Free Essay

Ubicomp

In:

Submitted By jorisbij
Words 712
Pages 3
Essay Ubicomp

Dat is geen Punt(en) Ubicomp heeft een groot raakvlak. Je kunt het zo gek niet bedenken of je kunt Ubicomp ontdekken in het dagelijks dingen. En het verwerken ervan is ook niet meer zo moeilijk als het vooreen was. Sensoren en ander registratie apparatuur worden steeds goedkoper en kleiner waardoor je ze overal in kunt verwerken. Dit kan het leven een stuk makkelijker en leuker maken. De laatste tijd komt het woord gamification steeds vaker naar voren als je het over u Ubicomp hebt. Het technologie-onderzoeksbureau Garter heeft gamification in de lijst met hypes gezet. Hierdoor word het steeds vaker toegepast. Maar hoe werkt deze gamification nou eigenlijk. Is het een makkelijk truc om mensen te vermaken door de punten en achievements te geven of zit er een complexe gedrachtsverandering op basis van diepere menselijke psychologie. (1) Een van de meest evectieve systemen zijn de systemen die overeenkomen met de score& puntenengines uit de gamewereld. Deze systemen zijn gespecialiseerd in het meten van de gebruikers acties en geven hier geprogrammeerde feedback op. Maar wat hier wel een nadeel van is is dat het succes van de gebruikerservaring bij het design van de game. Je moet erg letten op hoe je de punten gaat geven aan de gebruiker. Hier zit natuurlijk ook wel een Mogelijkheid. Je kunt de voorkant van het spel keer op keer veranderen waardoor je een andere look en feel krijgt. Hierdoor kan je het zelfde spel aan meerdere doelgroepen aanpassen.(2) In marketing word ook al vaak gamification gebruikt, ook al zijn er marketeers die er nog niet heel er enthousiast over zijn, maar zien er wel potentie in. Bijvoorbeeld het betrokken houden en het gemotiveerd maken van je doelgroep. Het kan zelfs een manier zijn van problemen oplossen. (3) Er zijn een aantal verschillende type gamers. Ik denk dit interessant is omdat je game hier op moet aanpassen er moet iets zijn waar iedereen zich in kan vinden en een positieve en leuke beleving mee heeft. De vier types of player die men heeft aangenomen zijn: - Socializers - Explorers - Achievers - killers Wat je bij gamification maakt is niet iets nieuw maar je maakt iets anders. (3) Bij gamification verander je patronen van mensen die je normaal moeilijk te veranderen zijn. Je moet hun dagelijkse bezigheden veranderen door het altijd in hun leven zijn. Je gebruikt game mechanismen in een non game context. Je stimuleert gedag dat ze normaal niet zouden doen door het toekenen van punten. Er zijn een aantal motivaties waarom mensen mee zouden doen. Als eerste vinden mensen het leuk als ze een beloning krijgen als ze iets doen. Je geeft ze het idee dat ze het goed doen en goed bezig zijn. Dit kun je ook verkeert gebruiken waardoor je mensen verkeert gedrag aan leert. Maar als je het verantwoord gebruikt is dit een hele effectieve manier van mensen manipuleren.

Daarnaast zijn mensen heel erg commutatief. Ze willen beter zijn dan andere en daarom gaan ze letten op dingen waar ze punten voor kunnen scoren. Ze zijn de hele dag bezig om hun doel te halen en na een tijdje gat dit in hun patroon zitten waardoor ze het automatisch doen. De vraag is wel als je alles een game gaat maken, word het dan niet gewoon en moet alles een game worden. De oplossing hiervoor is om gamification exclusief te houden. Je wordt niet dood gegooid met verschillende games. Wat hier dan weer het probleem van is is dat je bedrijven niet kunt verbieden deze technieken te gebruiken. Wat je tegenwoordig ziet bij grote games al Call of Duty is dat ze elk jaar een nieuwe versie uitgeven met aantal toevoegingen. Door het jaar heen komen er steeds meer toepassingen bij. Hierdoor hou je het interessant voor de gebruikers.

(1) http://www.frankwatching.com/archive/2012/03/16/gamification-hoe-maak-je-het-effectiefvoor-jouw-organisatie/ Gepulseerd op : vrijdag 16 maart 2012 | 08:00 uur Gelezen op : zondag 04 november Gepubliceerd op : Christian Kromme (2) http://www.marketingfacts.nl/berichten/gamification-de-front-end-bepaalt-het-succes/ Gepulseerd op : 19 september 2012 Gelezen op : zondag 04 november Gepubliceerd op : Sven Cooler (3) http://www.marketingfacts.nl/berichten/20120127_gamification_serious_business/ Gepulseerd op : 30 januari 2012 Gelezen op : zondag 04 november Gepubliceerd op : John Meulemans

Similar Documents

Free Essay

Ubicomp Computing

...the tablet and IPAD making computing easy and eliminating the need to sit in front of a desktop or lug around storage mediums such as cds. Mark Weiser, most often referred to as the father of ubiquitous computing (ubicomp), coined the term in 1988. Ubiquitous means to exist everywhere at the same time or to be constant. His forward thinking brought about the possibility to compute on the go and from nearly anywhere. Innovation news daily provides readers with insight on innovative technologies and inventions that shaped ubiquitous computing and many other technologies. In an article entitled “In the Future, Computing is (Cunningly) Constant”, the details of ubiquitous computing are outlined. It also features contributing components and the effect of such an evolution in lifestyles and business. Ubiquitous computing has been “under construction” for more than two decades. According to the article, it originated in a Xerox PARC research lab where the father of ubicomp (Weiser) worked. Innovation news refers to it as a state in which mobile devices such as the IPAD combine forces with high speed internet connections, Google docs, and cloud computing to reduce the need for the computer in the computing process. Along with eliminating the need for the computer, ubicomp in the years to come is expected to save the consumer space, on the desk and the headache of trying to find a computer and systems that work for your lifestyle. Consumers will shop for data systems such as cloud...

Words: 635 - Pages: 3

Premium Essay

Essay On Smart Environment

...Currently, we are in the post-PC era where smart-phones and other handheld devices are changing our environment by making it more interactive as well as informative. Mark Weiser, the forefather of ubicomp, defined a smart environment as ‘‘the physical world that is richly and invisibly interwoven with sensors, actuators, displays, and computational elements, embedded seamlessly in the everyday objects of our lives, and connected through a continuous network.’’ The creation of the Internet has marked a foremost milestone toward achieving ubicomp’s vision which enables individual devices to communicate with any other device in the world. The amount of distributed computing resources and storage owned by various...

Words: 986 - Pages: 4

Free Essay

Wireless Networking

...Cue-based Networking using Wireless Sensor Networks: A Video-over-IP Application Yeonsik Jeong ∗ School †‡ , Sriram Lakshmanan∗ , Sandeep Kakumanu∗ , and Raghupathy Sivakumar∗ † Department of Electrical and Computer Engineering, Georgia Institute of Technology, Atlanta, Georgia of Multimedia System Engineering, SungKongHoe University, Seoul, Korea Email: {ysjeong, sriram, ksandeep, siva}@ece.gatech.edu, ysjeong@mail.skhu.ac.kr Abstract—In this paper we present a new approach called cue-based networking that uses hints or cues about the physical environment to optimize networked application behavior. We define the notion of cues and describe how cues can be obtained using a wireless sensor network as the underlying platform. We identify both the research and system challenges that need to be addressed to realize benefits of the approach under a target application of video delivery over IP networks. In the process, we identify a key challenge of wireless sensor networks, namely the timeliness-robustness tradeoff. We design an adaptive algorithm that balances this tradeoff satisfying both timeliness and robustness requirements. Through an implementation of the video delivery application using the proposed algorithm in a real home environment, we highlight the practical benefits of the proposed approach. I. I NTRODUCTION Optimizing the behavior of application and network protocols has been a continuing endeavor since the origins of the Internet. In this paper we present...

Words: 7488 - Pages: 30

Free Essay

Big Data

...Lecture on Big Data Guest Speaker Simon Trang Research Member at DFG RTG 1703 and Chair of Information Management Göttingen University, Germany 2014 The City City of Göttingen • Founded in the Middle Ages • True geographical center of Germany • 130,000 residents Chair of Information Management Lecture on Big Data at Macquarie University 2 2 The University Georg-August-Universität Göttingen (founded in 1737) • • • • One of nine Excellence Universities in Germany 13 faculties, 180 institutes 26,300 students (2013) 11.6% students from abroad (new entrants: approximately 20%) • 13,000 employees (including hospital and medical school), including 420 professors • 115 programs of study from A as in Agricultural Science to Z as in Zoology are offered (73 bachelor / 22 master programs) Chair of Information Management Lecture on Big Data at Macquarie University 3 “The Göttingen Nobel Prize Wonder” Over 40 Nobel prize winners have lived, studied, and/or lived, studied or/and researched 41 Prize researched at the University of Göttingen, among them… at the University of Göttingen, among them… • • • • • • • • • • • • • • Max von Laue, Physics, 1914 Max von Laue, physics, 1914 Max Planck, physics, 1918 Max Planck, Physics, 1918 Werner Heisenberg, physics, 1932 Werner Heisenberg, Physics, 1932 Otto Hahn, chemistry 1944 Otto Hahn, Chemistry 1944 Max Born, physics, 1954 Max Born, Physics, 1954 Manfred Eigen, chemistry, 1967 Manfred Eigen, Chemistry, 1967 Erwin...

Words: 1847 - Pages: 8

Free Essay

Introduction to Information System Security

...HC: Human-Computer Interaction Human–computer interaction (HCI) is concerned with designing the interaction between people and computers and the construction of interfaces to afford this. Interaction between users and computational artefacts occurs at an interface which includes both software and hardware. Interface design impacts the software life-cycle in that it should occur early; the design and implementation of core functionality can influence the user interface – for better or worse. Because it deals with people as well as computers, as a knowledge area HCI draws on a variety of disciplinary traditions including psychology, computer science, product design, anthropology and engineering. HC: Human Computer Interaction (4 Core-Tier1 hours, 4 Core-Tier2 hours) Core-Tier1 hours HCI: Foundations HCI: Designing Interaction HCI: Programming Interactive Systems HCI: User-cantered design & testing HCI: Design for non-Mouse interfaces HCI: Collaboration & communication HCI: Statistical Methods for HCI HCI: Human factors & security HCI: Design-oriented HCI HCI: Mixed, Augmented and Virtual Reality 4 4 Core-Tier2 hours Includes Electives N N HC/Foundations [4 Core-Tier1 hours, 0 Core-Tier2 hours] Motivation: For end-users, the interface is the system. So design in this domain must be interaction-focussed and human-centred. Students need a different repertoire of techniques to address this than is provided elsewhere in the curriculum. Topics: • • • Contexts for HCI (anything...

Words: 1936 - Pages: 8

Free Essay

User Generated Data

...Reach Out and Touch: Using NFC and 2D Barcodes for Service Discovery and Interaction with Mobile Devices Eamonn O’Neill1, Peter Thompson2, Stavros Garzonis1, and Andrew Warr1 1 Department of Computer Science, University of Bath, UK, BA2 7AY {eamonn, s.garzonis, cspaw}@cs.bath.ac.uk http://www.cityware.org.uk 2 Vodafone Group R&D, Newbury, UK, RG14 2FN peter.thompson@vodafone.com Abstract. We investigate the use of 2 tagging technologies: Near Field Communication (NFC) and 2-dimensional barcodes. Our investigation combined a field trial and interview based study with an experimental evaluation. The field trial focused on users’ experience of the usability of NFC for a range of trial services, users’ perceptions of NFC use in their daily life context, and users’ suggestions for potential applications of NFC. The tags were embedded in a variety of postcards, table-top signs and posters. The experimental evaluation compared the ease of use of NFC and 2D barcodes, operationalised in terms of time taken to read a specified sequence of tags on posters. We found that for untrained users the 2D barcodes were quicker to use than the NFC tags but that training significantly improved users’ performance with the NFC tags while having no effect on their performance with the barcodes. 1 Introduction The use of ambient tags read by mobile devices presents new possibilities for service discovery and user interaction. Service discovery is an increasingly important issue as we move towards...

Words: 8155 - Pages: 33

Premium Essay

Artificial Intelligence and Software Engineering: Status and Future Trends

...Artificial Intelligence and Software Engineering: Status and Future Trends Jörg Rech, Klaus-Dieter Althoff The disciplines of Artificial Intelligence and Software Engineering have many commonalities. Both deal with modeling real world objects from the real world like business processes, expert knowledge, or process models. This article gives a short overview about these disciplines and describes some current research topics against the background of common points of contact. 1 Introduction During the last decades the disciplines of Artificial Intelligence (AI) and Software Engineering (SE) have developed separately without much exchange of research results. In AI we researched techniques for the computations that made it possible to perceive, reason, and act. Research in SE was concerned with supporting human beings to develop better software faster. Today, several research directions of both disciplines come closer together and are beginning to build new research areas. Software Agents play an important role as research objects in Distributed AI (DAI) as well as in agentoriented software engineering (AOSE). Knowledge-Based Systems (KBS) are being investigated for learning software organizations (LSO) as well as knowledge engineering. Ambient Intelligence (AmI) is a new research area for distributed, non-intrusive, and intelligent software systems both from the direction of how to build these systems as well as how to design the collaboration between ambient systems. Last...

Words: 6393 - Pages: 26

Premium Essay

Marketing

...Why Not Now Smart Device & Mobile App Store Boise’s Best Cell Phone Store-Final Draft Alicia Young Keller Graduate School of Management Marketing Management-Section 61681 December 15, 2013 Table of Contents 1.0 Executive Summary………………………………………………………………………....3 2.0 Situational Analysis Overview……………………………………………………………...3 2.1 Market Summary……………………………………………………………………………5 2.2 SWOT Analysis……………………………………………………………………………...6 2.3 Competition………………………………………………………………………………….7 2.4 Product Service Offering……………………………………………………………………8 2.5 Keys to Success………………………………………………………………………………9 2.6 Critical Issues……………………………………………………………………………….10 3.0 Marketing Strategy Overview……………………………………………………………..10 3.1 Mission………………………………………………………………………………………13 3.2 Marketing Objectives………………………………………………………………………13 3.3 Financial Objectives………………………………………………………………………..15 3.4 Target Markets……………………………………………………………………………..17 3.5 Positioning…………………………………………………………………………………..18 3.6 Pricing Strategies…………………………………………………………………………...19 3.7 Market Attack Strategy……………………………………………………………………22 3.8 Marketing Research………………………………………………………………………..24 4.0 Controls……………………………………………………………………………………..27 4.1 Progress Milestones………………………………………………………………………...27 4.2 Market Organization………………………………………………………………………28 4.3 Contingency Planning……………………………………………………………………...28 5.0 Conclusion…………………………………………………………………………………..29 References………………………………………………………………………………………30 1.0 Executive...

Words: 6966 - Pages: 28

Premium Essay

Demo

...Automation is the use of control systems and information technologies to reduce the need for human work in the production of goods and services. In the scope of industrialization, automation is a step beyond mechanization. Whereas mechanization provided human operators with machinery to assist them with the muscular requirements of work, automation greatly decreases the need for human sensory and mental requirements as well. Automation plays an increasingly important role in the world economy and in daily experience. Automation has had a notable impact in a wide range of industries beyond manufacturing (where it began). Once-ubiquitous telephone operators have been replaced largely by automated telephone switchboards and answering machines. Medical processes such as primary screening in electrocardiography or radiography and laboratory analysis of human genes, sera, cells, and tissues are carried out at much greater speed and accuracy by automated systems. Automated teller machines have reduced the need for bank visits to obtain cash and carry out transactions. In general, automation has been responsible for the shift in the world economy from industrial jobs to service jobs in the 20th and 21st centuries.[1] Movable type is the system of printing and typography that uses movable components to reproduce the elements of a document (usually individual letters or punctuation). The world's first known movable-type system for printing was created in China around 1040 A.D. by Bi...

Words: 7787 - Pages: 32

Premium Essay

Humen Resource Manegment

...Human Resource Management Review 23 (2013) 105–113 Contents lists available at SciVerse ScienceDirect Human Resource Management Review journal homepage: www.elsevier.com/locate/humres Human resource information systems: Information security concerns for organizations Humayun Zafar ⁎ Department of Information Systems, Kennesaw State University, 1000 Chastain Road, MD 1101, Kennesaw, GA 30144, United States. a r t i c l e i n f o Keywords: Human resource information system Information security Information privacy Security policies Security legislation Security architecture Security training Risk analysis a b s t r a c t We explore HRIS and e-HR security by presenting information security fundamentals and how they pertain to organizations. With increasing use of enterprise systems such as HRIS and e-HR, security of such systems is an area that is worthy of further exploration. Even then, there is surprisingly little research in this area, albeit that extensive work is present in regard to HRIS privacy. While focusing on HRIS and e-HR security, we introduce aspects of HRIS and e-HR security and how it can be enhanced in organizations. A research model is also presented along with propositions that can guide future research. © 2012 Elsevier Inc. All rights reserved. 1. Introduction A human resource information system (HRIS) is an integrated computerized system used to acquire, store, manipulate, analyze, retrieve, and distribute pertinent...

Words: 7376 - Pages: 30

Free Essay

Routing Approaches of Delay Tolerant Networks

...©2010 International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 17 Routing Approaches in Delay Tolerant Networks: A Survey R. J. D'Souza National Institute of Technology Karnataka, Surathkal, India Johny Jose National Institute of Technology Karnataka, Surathkal, India ABSTRACT Delay Tolerant Networks (DTNs) have evolved from Mobile Ad Hoc Networks (MANET). It is a network, where contemporaneous connectivity among all nodes doesn’t exist. This leads to the problem of how to route a packet from one node to another, in such a network. This problem becomes more complex, when the node mobility also is considered. The researchers have attempted to address this issue for over a decade. They have found that communication is possible in such a challenged network. The design of routing protocol for such networks is an important issue. This work surveys the literature and classifies the various routing approaches. discontinuity in the network. There are also methods that have employed additional mobile nodes, to provide better message delivery. Researchers are even exploring how the social interaction of humans can be utilized for routing in a DTN. This survey has made an extensive study of the various routing strategies taken by the researchers in the past few years. We have classified them based on the type of knowledge used for routing. 2. FLOODING BASED APPROACHES Knowledge about the network helps in deciding the best next hop. It can happen that the...

Words: 6818 - Pages: 28

Premium Essay

Augmented Reality

...Chapter 3 Augmented Reality – Where it Started from and Where It’s Going Veronika Szucs, Silvia Paxian and Cecília Sik Lanyi Additional information is available at the end of the chapter http://dx.doi.org/10.5772/59796 1. Introduction This study provides an overview of augmented reality (Augmented Reality, AR) and some of its important and popular areas of application. Augmented reality technology integrates 3D virtual objects into a real 3D environment, in real time. This book chapter presents the areas of everyday life where AR can be used (including, but not limited to): medical informatics, production repair, visualization, route planning, entertainment and military applications, marketing tasks and education. The basic characteristics of AR systems, the need for compro‐ mise in their applicability, and optical and video mixing approaches are presented in the chapter. The chapter introduces the two main areas of sensor errors, which are considered as a basic problem during the design of efficient augmented reality systems. We summarize how the current devices are able to solve these problems. The expected future direction of AR technology developments and the areas where further research is needed are simultaneously introduced. 1.1. Aims In the course of preparing the study, the actualities of augmented reality technologies have been reviewed. Questions associated with differing scope of application, design and imple‐ mentation problems of augmented...

Words: 8102 - Pages: 33

Premium Essay

An Evolution of Computer Science Research

...Abbreviated version of this report is published as "Trends in Computer Science Research" Apirak Hoonlor, Boleslaw K. Szymanski and M. Zaki, Communications of the ACM, 56(10), Oct. 2013, pp.74-83 An Evolution of Computer Science Research∗ Apirak Hoonlor, Boleslaw K. Szymanski, Mohammed J. Zaki, and James Thompson Abstract Over the past two decades, Computer Science (CS) has continued to grow as a research field. There are several studies that examine trends and emerging topics in CS research or the impact of papers on the field. In contrast, in this article, we take a closer look at the entire CS research in the past two decades by analyzing the data on publications in the ACM Digital Library and IEEE Xplore, and the grants awarded by the National Science Foundation (NSF). We identify trends, bursty topics, and interesting inter-relationships between NSF awards and CS publications, finding, for example, that if an uncommonly high frequency of a specific topic is observed in publications, the funding for this topic is usually increased. We also analyze CS researchers and communities, finding that only a small fraction of authors attribute their work to the same research area for a long period of time, reflecting for instance the emphasis on novelty (use of new keywords) and typical academic research teams (with core faculty and more rapid turnover of students and postdocs). Finally, our work highlights the dynamic research landscape in CS, with its focus constantly ...

Words: 15250 - Pages: 61