Limitations of Ubiquitous Computing

Even ubiquitous computing has a wide role to play in creating and sharing the data objects any where required; a proper environment to support this infrastructure is always required. In most of the cases, Ubiquitous computing techniques fails due to these infrastructure issues, where some environments may not support the ubiquitous infrastructure. Always a sophisticated environment like newly constructed buildings are required to support the infrastructure of ubiquitous computing which is not practically possible all the time and this can be considered as the important limitation of Ubiquitous computing.

Another important limitation with the Ubiquitous computing is that, a typical ubiquitous computing design involves a wide range of devices and components that were produced by different manufactures and service providers. In general, each and every service provider will implement different and their own protocols which are suited for their own components. To design a perfect ubiquitous design, all these components should be integrated and during this process, it may become difficult to place all the components under a single platform and even there are some cases where the integration failed during assembling the ubiquitous components.

System administration of ubiquitous computing is really a tough job to implement. In a typical ubiquitous computing infrastructure, there are many computers connected from different places and if the administration is not proper, there are chances where the complete network topology is crashed and thus administration can be considered as really a challenge in Ubiquitous computing .

 Apart from the technical discussions covered by the author, even there are some limitations in the research process conducted by author. Author has considered a single location Korea for a limited period of time. Author has considered all the positive hypothesis statements and there is no scope for the negative hypothesis and negative questions in the questioners considered. If he has considered negative hypothesis statements, may be the empirical results would have varied a lot from the values that were presented in the table as discussed.

All the hypothesis statements considered are mainly focused on technical and business aspects and if the statements cover the end user perspective, more accurate results would have been achieved. Apart from the location based approach to gather the information, if the data is in global standards, where the same Ubiquitous computing technology is implemented across different environments and infrastructures, author would have got exact empirical results and hypothesis values and he failed in covering these aspects in terms of research.

Author has failed to gather the information from system administrator of Ubiquitous computing, where they can give more accurate technical and cost risks in installing the desired technology across the business values. Service providers of Ubiquitous components are also neglected in this research, where they face different problems in integrating the peripherals while assembling the ubiquitous design. Author has given the empirical results as different values and failed to provide the formulas used in calculating these values, where the users reading this article may not understand how these values are derived.

Conclusion: 

This complete article is based on the technical and business aspects of Ubiquitous computing and author has referred good references to gather the information. Basic research methodology implemented by author is really worth full and the hypothesis statements are quite positive to achieve the desired results. Empirical results derived prove these hypotheses in terms of System, service, information and business value.

With the proper implementation of Ubiquitous computing techniques, organizations can increase their business value and thus increasing the customer base. Using the ubiquitous techniques, customer needs can be directly identified and solved and thus organizations can directly reach the customers through the shared data objects. Author has failed to consider the limitations during the research and collecting the data and apart from these aspects, this is a good article to understand the u-business values based on the ubiquitous computing techniques.

Leave a Reply

Your email address will not be published. Required fields are marked *