Pervasive Computing: Why Did the Logistics Soldier Cross the Road?
ARMY TANK-AUTOMOTIVE COMMAND WARREN MI
Pagination or Media Count:
Enterprise networks are becoming distributed. The central data center has given way to a distributed network environment containing distributed server clusters, edge servers that optimize data process and dissemination, and a new tier of network-enabled devices that provide ubiquitous access. In essence, the network is expanding outward and embracing a series of new processing nodes e.g., PDAs, cell phones, vehicles, MP3 players, consumer appliances, etc.. These network nodes are called pervasive devices. The goal of pervasive computing PvC is to make data and application services available to any authorized user anywhere, anytime, and on any device. This is accomplished through a robust architecture including software abstraction both at the device level and at the back end. In part, abstraction is facilitated through the use of the Java Virtual Machine JVM. A JVM consists of interpreters and a run-time environment which can read java byte code. It enables the construction of machine and operating system OS independent applications and services because there are JVMs for most Operating Systems OSs. This paper will go over pervasive technology in general, it will review potential considerations, a PvC architecture, and data mining of PvC information. Throughout this paper there are examples of how PvC can be used to impact the Department of Defense DoD, however its uses are only limited by imagination.
- Computer Programming and Software
- Computer Systems