CRITICAL REVIEW 5
is that it has a severe bandwidth, energy and implications resulting from destruction. Multiple
users, however, propel this. It was necessary to develop a technique for unmasking the uneven
condition of the environment. Factors such as economics and business models determine the
penetration rate of pervasive computing into the infrastructure. Satyanarayanan (2001) has well
used the example of scenarios to bring real word of application of pervasive technology.
In the article of Schmidt, Beigl, & Gellersen (1999), contexts are either explicitly
acquired when the user specifies, or by implicitly through observing both the user and the
computer-based activity. According to Schmidt, Beigl, & Gellersen (1999), in mobile computing,
the usage of applications is set in different environments at different times, hence establishing a
varying context that will lie separately from the human-computer system interface. According to
Schmidt, Beigl, & Gellersen (1999), ultra-mobile devices are integrated with sensor technologies
that advance in respect to size, processing requirement, power utilization and cost-effectiveness.
The sensor technologies include; vision, audio, motion, location, bio-sensors, specialized
sensors.
Advantages
Satyanarayanan (2001)’s proposal in pervasive computing is crucial for effective
proactivity and ability to track the user’s intention. Satyanarayanan (2001) explains that this
helps in determining the user activity rather than ending it in case of a problem. Accomplishing
this vision will bring into reality the need to have small-size devices, light and long life batteries.
However, this comes with a constraint that mobile users will require capabilities of computing
and manipulation of data beyond those of lightweight mobile computers. However, the problem
can be solved with the application of cyber foraging. In Schmidt, Beigl, & Gellersen (1999),