Towards a Model of Seamless Mobility - User Value and Security in Computing, Content, and Communications
نویسندگان
چکیده
Seamless mobility is a term that encompasses a broad range of technologies and applications. It builds on technology developments in the wireless industry over the last 20 years, starting with mobile telephony, on through mobile IP, convergence of voice and data, and now towards an ever-increasing rate of convergence/collision between the worlds of secure communication, content, and computing. It is well accepted that in each of these domains, that there is exponential growth in capabilities, with a doubling of capabilities in communication technologies every 9 months, in memory technology (storage/content) every 12 months, and in computing technologies (processing) every 18 months. These fundamental increases in the underlying technologies bring increasing value to users in each of these domains. And as Ray Kurzweil makes the case in the “Law of Accelerating Returns” (http://www.kurzweilai.net/articles/art0134.html), these rates are really growing as a double exponential when measured over longer intervals – i.e. the doubling times are reducing over time.
منابع مشابه
Access and Mobility Policy Control at the Network Edge
The fifth generation (5G) system architecture is defined as service-based and the core network functions are described as sets of services accessible through application programming interfaces (API). One of the components of 5G is Multi-access Edge Computing (MEC) which provides the open access to radio network functions through API. Using the mobile edge API third party analytics applications ...
متن کاملA Prototyping and Evaluation of Hospital Dashboard through End-User Computing Satisfaction Model (EUCS)
In today's competitive environment, one of the new tools in the field ofinformation technology is business or organizational dashboards that are as abackup in the process of strategic management of organizations. The aim ofthis study is building a prototype of a hospital dashboard on the principles andguidelines of dashboards and evaluating it based on End UserComputing Satisfaction (EUCS). The...
متن کاملSecurity Challenges in Fog Computing in Healthcare
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...
متن کاملA Model based on Cloud Computing for the implementation and management IT services in Banks
In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...
متن کاملA Model based on Cloud Computing for the implementation and management IT services in Banks
In recent years, the banking industry has made significant changes in technology and communications. The expansion of electronic communications and a large number of people around the world access to the Internet, appropriate to establish trade and economic exchanges provided but high costs, lack of flexibility and agility in existing systems because of the large volume of information, confiden...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005