This chapter is penned to provide a foundation to harness the power of information technology in areas such as e-commerce, wireless applications and communication. The chapter begins with a discussion on e-commerce. Next, electronic data interchange and wireless application protocol (WAP) are studied. The later part of the chapter explains new technologies such as smart card, IPTV, RFID and BCI. The chapter concludes by providing a discussion on the technologies that will in future bring economies of scale to humankind.
After reading this chapter, you will be able to understand:
E-commerce, which is a way of carrying business communications and transactions using computers over Internet, or any other form of network
EDI—a way of exchanging business data between two machines
Wireless application protocol (WAP), which is the worldwide standard protocol stack specified for wireless communication networks by the WAP Forum
Smart card—a small, portable pocket-size card having data storage ability
IPTV, which is a system that provides the television services to the end users via packet switched network
Blogging, a process of creating, maintaining, writing, or adding content to a blog
RFID—an auto-identification technology, which is used to capture and transmit identification details (including location) of an object wirelessly
Brain computer interface (BCI), which is a communication pathway between brain (of either human or animal) and some external device such as a computer system
Imminent technologies including the concept of Pen PC, Napkin PC, Roll top computer, B-membrane PC, and USB memory stick
In the early years, computer use was primarily confined to business and research. However, the 1980s and 1990s saw the development of cheaper and more versatile computers, which has led to an ever-growing number of users in the offices and in homes. Today, IT has interwoven itself into our socioeconomic fabric in such a manner that it is often said that we live in an information age. As we usher in the future, consumers are expected to sign up in record numbers for information, education, and entertainment services provided over networked computers, or perhaps in altogether different computing environment. Technological revolutions have always had different effects on different segments of the economy. The trading activities have become much easier with the use of e-commerce and EDI. The development of services like WAP has enabled people to access global information anywhere and at anytime. Some new trends like Internet protocol television (IPTV) and radio frequency identification (RFID) are directed to make the people's lives more convenient. However, these technologies are not in full use yet. Besides, future has some more interesting PC concepts that if ever developed will not only add to the ease of computer usage but will also enhance its portability.
Traditionally, commerce is seen as the exchange or buying and selling of goods and services, which involves exchange of money, and sometimes transportation of goods from one place to another. We see commercial activities all around us in many forms. For instance, at a grocery store, we can see two main activities that form the essence of commerce, the buying (people purchasing goods or service) and selling (people offering goods and services to buyers). With the passage of time and advancement in technology, commerce has added a new dimension in the form of electronic trade, a more effective and convenient manner than the traditional commerce which is revolutionizing the way business activities are carried out across the world. In today's business world, where time and money are considered as the most important factor for success, E-commerce plays an important role in bridging the gap between buyers and sellers (Figure 23.1).
Figure 23.1 E-Commerce and Business Processes
Most people think E-commerce as buying and selling of products and services on the Internet. However, in reality, it is more than just selling and purchasing goods online. E-commerce is referred to as a way of carrying business communications and transactions using computers over Internet, or any other form of network. Here, transaction is referred to as exchanges taking place between two entities where one sells products or services to the other.
There exist four categories of e-commerce applications: business-to-onsumer (B2C), business-to-consumer (B2C), business to business (B2B), business-to-administration (B2A), and customer-to-customer (C2C).
Business-to-Consumer (B2C): B2C is a concept of online marketing and distribution of products and services over the Internet. It is a natural sequence of steps for many retailers who sell goods directly to the consumer. The general idea for achieving success in B2C e-commerce lies in reaching more customers, providing better services and increasing sales while spending less. For the consumer, it is relatively easier to appreciate the importance of e-commerce as it saves their precious time, which they spend moving around in crowded supermarkets, by enabling them to do the same from their home, by shopping online at any time in virtual Internet shopping malls, and having the goods delivered at their doorstep.
The supplier may be an existing retail outlet such as a grocery store; these businesses may have been slow in gearing-up for e-commerce compared to the innovative Internet companies, but they usally have a sound commercial structure as well as in-depth experience of running a business. This system can also be used to receive information such as share prices, insurance quotes, online newspapers, or weather forecasts.
Business-to-Business (B2B): B2B system is used for e-commerce in a pure business environment. It covers many ways where e-commerce can be used to support one business trading with the other. Much of the attention given to B2B system relates to developments such as e-marketplaces and e-exchanges, but most of the actual use of e-commerce is at a lower level in the e-commerce implementation cycle.
Typically, in the B2B environment, e-commerce can be used in procurement, order fulfilment, and managing trading–partner relationships. In recent times, e-commerce technologies have allowed the smallest of businesses to improve the processes of interacting with customers. They are now developing services for individual clients rather than providing a standard service and evaluating all aspects of their business process from where the greatest return can be obtained. B2B e-commerce can also be used to:
Business-to-Administration (B2A): In the B2A system, business community interacts electronically with public sector organizations. B2A application includes submission of planning applications, tax returns, or patent registration.
Customer-to-Customer (C2C): C2C system refers to e-commerce activities, which uses an auction style model. This model consists of person-to-person transaction that completely excludes businesses from the equation. C2C system enables customers to directly deal with each other. Examples of this type of system are www.ebay.com and www.amazon.com.
All information in e-commerce is expressed in the form of binary values (bits), which makes the product more versatile. For example, a tourism catalogue data stored in a web server database can be presented electronically using the web, printed in a customized catalogue at specific market, or might be included in CD-ROM as a multimedia presentation. If any information is required to be published on the Internet, the hardware and software component required are web server, database, and multimedia authoring tools. Generally, there exist five important processes in an e-commerce lifecycle: information sharing, ordering, online payment, fulfilment, and support and services.
Information Sharing: Sharing of information on the Internet is the foremost process in e-commerce activities. It makes the customer aware of all the product and services offered by the online vendor. This particular activity is carried out by means of advertising, marketing on the Internet, and customer information gathering process (see Figure 23.2). Apart from this, there are various networked communities (chat room, multi-party conference, and newsgroup) available on the Internet for the distribution of information.
Figure 23.2 Information Gathering from Customer
World Wide Web provides one of the effective mediums for communication with the customers. Websites are designed to include product catalogues. One can obtain the data for products that are requested. At the same time, it also allows web visitors to provide information about them. Apart from this, timely notification, product upgradation, and new features are sent through e-mail.
On Internet, numerous support services are provided to the customers. For example, organization maintaining a web server can include questionnaire, which are available to the customer while using company's website. Repeated questions are often compiled into one set and distributed to the customer's e-mail. Large number of websites aim at providing information and data to the general public; however, there exist some significant sites on the Internet that cater to the business communities. These sites are called intermediaries, and their sole purpose lies in making buyers to interact, trade, and make purchases from the sellers.
Ordering: This process involves customers to electronically place order for the company's goods and services. Placing of order requires the use of client/server application where order of goods or services is placed on the electronic form placed on the company's website.
Online Payment: Online payment is a crucial process in e-commerce. The payment activity requires the use of high security to protect online money transactions from any unauthorized use. In most cases, data are transferred in encrypted form on a secured medium. Different mechanisms for payment are available on the Internet and the customers can use any of them.
Fulfilment: Modern businesses are highly dependent on the massive amount of information and precious data, which is continuously being transferred over the computer network across the world. Many online trading companies make use of Internet for transferring funds, generating money, and providing information product (newsletter, articles, stock prices, and reports). However, when product takes the shape of physical entity, support of EDI is required to clear the sale of product to the buyer with up-to-date delivery notification issued to the buyer's e-mail.
Support and Services: Support and services are regarded as one of the most important processes in e-commerce activity. The continuing relationship of an organization with the customer depends on the kind of support and services provided to the customers. Relationship of an organization with the customer starts with the sale of the product. It might happen that customer will require assistance with product and services in future. Therefore, items such as technical notes, FAQs, and support documentation should be available on the company's website.
The method of making payment on the Internet is essentially the electronic version of the traditional payment system, used in everyday life. The fundamental difference between the electronic payment system and the traditional one is that every transaction is carried in the form of digital string. Generally, there exist three major types of payment mode: e-cash, e-cheque, and credit card.
E-cash: E-cash is one of the systems that fit small-scale commercial transactions in realtime environment on the Internet. In e-cash, the currency is transformed into an electronic form. A bank issues electronic money and debits the customer's account by withdrawing the specified amount from customer account, which equals the value of currency (token) issued to the customer. The bank then authenticates each token with the digital stamp before transmitting it to the customer computer. Now whenever the customer wants to spend e-cash, a token of roper amount to the merchant is transmitted who then relays them to the bank for verification and redemption. To ensure that no fraudulent activity occurs, bank records the serial number of each token that the customer spends. If the serial number of the token was already recorded in the bank's database, the bank would inform the merchant for its invalidity.
E-cheque: The payment mode for e-cheque is not much different from the paper cheque. A paper cheque is a kind of message given to the consumer's bank to transfer adequate fund from one customer's account to someone else's account. The message is sent to the intended receiver of the fund who presents the cheque to the bank in order to collect the money. In all aspects, an e-cheque also has the same features as the paper cheque. It sends a message to the receiver who endorses the cheque and presents it in his bank to obtain money. One advantage that e-cheque has over paper cheque is that it provides protection to the customer's account by encoding the account number with the bank's public key. This prevents the merchant from knowing the customer's account, thereby eliminating the chances of fraudulent transactions.
Credit Card: In credit card payment, customer gives a preliminary proof of the ability to pay by giving the credit card number to the vendor. The vendor then verifies it from the bank and issues a purchase slip for the consumer to endorse. The vendor then uses a copy of the purchase slip to collect money from the bank and in the next billing cycle, the consumer receives a statement of recorded transaction at the address specified by the customer. Using credit card to make purchases over the Internet requires additional steps to make transaction secure for both the buyer and seller. Credit card information is sent as encrypted credit card number over the Internet.
Some of the advantages of e-commerce are as follows:
Every innovation in technology brings certain limitations and drawbacks along with it. The same is the case with e-commerce. The following are its disadvantages:
Previously, we had discussed that E-commerce uses digital methods to exchange the variety of data needed to conduct business. Like every other business organization, online companies also exchange data related to ordering and paying for items. In fact, e-commerce covers a broad spectrum of all types of data exchange in such paperless environment. Every day, businesses generate and process a large volume of paper documents. The paper documents, ranging from purchase orders and invoices to product catalogues and sales reports, provide vital information flow which must precede, accompany, or follow the physical goods in a commercial transaction. Any interruption in the physical or information flow halts the smooth operation of the supply chain, leading to significant cost overruns.
Today, a majority of the data in commercial paper documents are generated from computer applications. These paper documents are printed and copied before the information they contain is finally communicated to the respected parties. The business partner, in turn, inputs all this information into another computer application for further processing. An increasing number of companies have found the above process extremely slow, costly, and unreliable. The need for a faster, cheaper, and more accurate solution for exchanging commercial data has become a significant priority for many companies and organizations. This gave rise to EDI. It is a subset of e-commerce and is a new way of managing information. At its most basic, EDI is the transmission of business data between two machines. More specifically, EDI is defined as a collection of public standard message formats and a data element dictionary that allows trading partners to exchange data in a simple way using any electronic messaging service. Trading partners are all the entities involved in an exchange such as a vendor and its customers. These standard message formats provide an application-neutral format (that is, a format independent of any application) for direct computer-to-computer exchange of information.
A two-way working process of EDI-based transactions between vendor and supplier has been depicted in Figure 23.3. After business agreements are reached between the two EDI-enabled partners, no human touch is required. The ultimate EDI implementation is a totally automated interaction between the business applications. A step-wise execution of processes involved in EDI transaction for purchase, shipment, and payment is as follows:
Figure 23.3 Working of EDI
The goal of EDI is to provide a standard format and data element dictionary to exchange data in an electronic environment. EDI solves the problem of sharing data between dissimilar operating systems, applications, and computers using some neutral format. EDI is designed to:
EDI is not a technology but a new way of doing business. Though identifying the costs related to EDI is relatively easy, identifying the benefits of EDI, especially when a company is not using EDI, is hard, since most of the real benefits are strategic and intangible in nature. As such, EDI will require a different approach to cost-benefit analysis and it is essential for the success of a corporate EDI program that management has appropriate expectations on the return on investment (ROI). Still a cost-benefit analysis is not so essential as to justify the investment in EDI in order to prioritize applications and the allocation of information technology resources.
Hardly a decade ago, when Internet just started, it was mere a thought to access the global information from our own room. In the late 1990s as the Internet grew, this thought turned into reality. From the last few years, people are more inclined to mobility, which implies a growing need of accessing global information from anywhere and at all the time. Today, the access to Internet is no more restricted to desktop computers only; people can access Internet on their mobile phones or PDAs also. One can even connect mobile phone with a computer to access Internet on the computer. The technology that has made this wireless Internet feasible is WAP.
WAP is the worldwide standard protocol stack specified for wireless communication networks by the WAP Forum. It enables developing wireless applications independent of the wireless access technology being used and accessing Internet using mobile devices. WAP uses wireless markup language (WML), which is a form of eXtensible Markup Language (XML), and provides a way of adding information to the extent that tells the device receiving the content as to what action to perform.
There were certain issues in bringing wireless Internet on the mobile devices. Most cell phones and WAP-enabled PDAs have data transfer rate of 14.4 kbps or less as compared to a typical 56 kbps modem. The relatively small size of the LCD on a cell phone or PDA presented another challenge. Most web pages were designed for a resolution of 640 × 480 pixels, which is acceptable for a desktop computer. However, the pages do not fit on a mobile device's screen, which have a resolution of around 150 × 150 pixels. WAP took each of these limitations into account and provided a way to work with a typical wireless device.
Note: Like WWW, the user interface to WAP is through a mini browser in the WAP-enabled devices.
The WAP Model: WAP model is based on the existing WWW model, with the significant difference of having a gateway between the client and web server. The role of gateway is to translate the WAP-formatted messages received from WAP-enabled device into HTTP messages that can be sent to any web server on the Internet and vice versa. The following steps describe the process of retrieving information from a website using WAP-enabled device.
Figure 23.4 WAP Model
WAP Applications: One of the most significant advantages of mobile Internet over personal computer is the ability to instantly identify user's geographic location. Some other interesting applications of WAP are as follows:
Earlier, the WAP services were limited to simple information services, but with the availability of higher bandwidth and speeds, several new service types have emerged. Some of these services are:
Smart cards are small, portable pocket-size cards having data storage ability. Some people might confuse smart cards with conventional credit/debit cards that have a plastic base with magnetic stripe containing some information. But smart cards are quite different from magnetic stripe cards. Most smart cards incorporate an Integrated Circuit Chip (ICC) inside them having some computational functionality and I/O support. They come in various sizes ranging from as small as mobile phone prepaid cards to as big as credit/debit cards.
According to the applications for which smart cards are used, they are classified as microprocessor cards and memory cards. A microprocessor card is just like a complete computer in itself. It is embedded with a microprocessor and memory (RAM, ROM, and EEPROM) on the chip. The microprocessor helps in processing of information stored on the card and this processing is carried out in RAM. The data on the card are stored in the form of different files that are arranged in a file system in EEPROM. In ROM, the operating system resides that is responsible for managing the file system in EEPROM, executing the required functions in RAM, and for security and access control to data. The inclusion of operating system makes these cards multifunctional. The data on microprocessor cards can be added, deleted, or manipulated. Examples of these cards are stored-value cards (cards that hold some monetary value) and the cards that allow set-top boxes on televisions to remain secure from piracy. A memory card, on the other hand, is embedded with memory (EEPROM) only. Thus, data can only be read from such cards but cannot be added or manipulated. The memory cards are designed to undertake pre-defined operations. The prepaid mobile phone cards are the most widely used memory cards.
Note: The present-day microprocessor cards are embedded with 32-bit RISC processor.
Depending on the way the smart cards are used, they are categorized as contact and contactless cards. The contact smart cards have the same size as that of conventional credit/ debit cards. These cards have contact pads attached to the chip that needs to be in the direct contact with the smart card reader whenever these cards are to be accessed. On the other hand, the contactless smart cards need not come in direct contact with the reader. They have an embedded antenna attached to the chip that communicates with the reader to read or write data on the card. Some contactless smart cards can be accessed accurately up to 1.5 m away from the reader while some need to be only few millimetres away.
Smart Card Applications: Smart cards have greatly improved the convenience and security of transaction. They provide tamper-proof storage of user and account identity. They also provide vital components of system security for the exchange of data throughout any type of network. They protect against a full range of security threats, from careless storage of user passwords to sophisticated system hacks. Multifunction cards can also serve as network system access and store value and other data. People worldwide are using smart cards for a wide variety of daily tasks, which include:
IPTV is a system that provides the television services to the end users via packet switched network. This network uses Internet protocol suite to transmit audio, video, and control signals, thereby providing quality of service, security, and reliability.
IPTV sends data to the end user(s) in two ways, namely, unicast and multicast (or broadcast). In unicasting, data are sent to a single end user. Video on demand (VoD) is the best example of unicast in which only the subscriber who has requested for the video can view the transmitted video. On the other hand, in multicasting (or broadcasting), the same data are sent to multiple users simultaneously. For example, in Live TV, a particular video is delivered to many viewers (Figure 23.5).
Figure 23.5 IPTV
The core of any IPTV system is the operator's central distribution centre where the video stream is encoded and split into packets, which are transmitted over the IP network. The packets travelling through the network are received by the local exchanges—the IPTV middleware that routes the packets to the individual subscribers. The local exchanges are responsible for dealing with user authentication, VoD requests, billing, or channel change requests from the subscribers. In addition, here, some local content like advertisements, VoD, etc., can also be added. From the local exchanges, the packets are sent to the subscribers via local network. At the subscribers’ end, there is a device known as set-top box, which receives the incoming data, reassembles the packets into coherent video stream, and decodes it to be viewed on the television or some other form of screen.
Note: To use the bandwidth efficiently, the IPTV video is compressed using compression techniques, MPEG-2 and MPEG-4.
IPTV offers many advantages, some of which are as follows:
The term blog is the shortened form of web log which was discovered by Jorn Barger in the year 1997. It is basically a type or part of website maintained by an individual with regular entries of news on some particular topic (like education, entertainment, or politics), description of events, personal thoughts, and so on. Primarily, blogs include information in textual form, but they may also include hypertext, images, videos, and links to other blogs or web pages. An important property of blog is that it allows the readers to leave their comments and share their thoughts with the blog owner or other readers. The entries posted on blog are usually arranged and displayed in reverse chronological order and can be viewed in an HTML browser.
A blog is an innovative way to organize your thoughts and present articles. Moreover, it helps to keep up with the latest information posted on various sites making it a popular personal publishing tool. The process of creating, maintaining, writing, or adding content to a blog is known as blogging and the person who posts entries onto the blogs is known as blogger.
Types of Blog: There are different types of blog depending upon the purpose for which blog has been created, the content a blog contains, or the way the content has been added to a blog. Some common types of blog are listed below:
Apart from these types, blogs can also be categorized on the basis of device type used to add content to the blogs. For example, blogs added by using mobile devices like cell phone are known as moblog.
Creating and Using a Blog: Many websites offer to create a blog account free of cost. Some of these websites include www.blogger.com, www.weebly.com, www.blogspot.com, www.thoughts.com, and many more. Here, we will explain the steps to create a blog on www.blogger.com website.
Figure 23.6 Home Page of Website
Figure 23.7 Create a Google Account Webpage
Figure 23.8 Name Your Blog Webpage
Figure 23.9 Choose a Starter Template Webpage
Figure 23.10 Blog Created
Figure 23.11 Webpage with Posting as the Active Tab
Figure 23.12 Text and Image Added to the Blog Post
Figure 23.13 Publishing Blog Post
Figure 23.14 Viewing the Blog Posts
RFID is an auto-identification technology, which is used to capture and transmit identification details (including location) of an object wirelessly. RFID system consists of the three basic components, namely, RFID tag (or transponder), reader, and processing device (such as computer). An RFID tag contains the identification number and other data of the object on the silicon chip in encoded form. It is placed on or embedded in the object to be tracked. The stored data on RFID tag is accessed (i.e. read/write) by the reader. A reader is a device that activates the RFID tag (when it comes in the response range of the reader) by emitting radio frequency signal through antenna. Upon receiving the signal from the reader, the tag responds by transmitting the data to the reader. This data are then sent by the reader to the computer connected with it for further processing (Figure 23.15).
Figure 23.15 An RFID System
Bar code technology is also an auto-identification technology; however, RFID is an improvement over barcode in many ways.
RFID does not require any wire or line of sight between the reader and an RFID tag. This helps in identifying an object within a particular range without even seeing (or touching) it.
RFID has read/write capabilities. The information stored on RFID tag can be changed whenever required.
RFID can detect moving objects within long range (say 100 feet) and can work in harsh environment.
More than one RFID tag can be accessed simultaneously.
Various applications of RFID technology are as follows:
BCI, as the name implies, is a communication pathway between the brain (of either human or animal) and some external device like computer system. BCI devices are used to transmit or capture the brain signals, which can further be used to restore function or movement to sensory organs or to direct implanted prosthetic device as natural limbs. BCI is an important achievement in medical technology as it enables the persons suffering from some kind of physical disability to carry out their tasks like walking, picking up a glass of water, etc., just by thinking. As for now, BCI devices have succeeded in restoring damaged sight, movement, hearing, and in curing neurological problems such as depression. However, in the near future, it will be possible to intensify the human capacity and to influence someone's thinking (Figure 23.16).
Figure 23.16 A Human Interacting through BCI
The BCI works just because of the way the brain functions. Our brain is full of neurons, which fire whenever we think or perform some action. As the neurons fre, the electric signals are generated. These signals move at a very fast speed from neuron to neuron through a complex web of connections. Though the path that the electric signals follow is insulated by a white fatty substance in the brain called myelin, some electric signals get away. These signals are captured by the researchers and used for controlling some external device, activity, or for helping people to overcome their severe physical disabilities.
Types of BCI: BCI can be of the following types.
Techniques of BCI: There are various means of reading the brain activity, some of which are as follows:
Evolution of technology in the current world shall prevail, as long as there remains gift of knowledge and wisdom in humanity. Striving for success has made humankind to make the best use of technology in making things easier and faster in everyday life. Some futuristic technologies are discussed below.
Pen size computer is one of the major breakthroughs of this era. It is a revolutionary miniature computer that comes in the shape and size of a pen. The conceptual prototype of this computer was developed by a Japanese company, NEC Corp and NEC Design Ltd., way back in 2003, and was named as P-ISM (Pen-style Personal Networking Gadget Package) (Figure 23.17).
Figure 23.17 Pen Size Computer
The main idea underlying the concept of pen size computer is to break a computer into parts. Pen size computer is a set of five different components (pens) that altogether make up a computer and each component has a specific function to perform. All the pens are connected to each other wirelessly and communicate using Bluetooth technology. The description of different components of pen size computer is as follows (Figure 23.18):
Figure 23.18 Components of Pen Size Computer
All the pens of pen size computer rest on a holding block which keeps the mass storage together as well as recharges the batteries.
Have you ever thought that your PC can resemble the design of a napkin holder? This revolutionary idea of PC prototype named as Napkin PC is given by Avery Holleman. He has also won Microsoft's Next-Gen PC Design Competition's first prize for this innovative idea.
The Napkin PC consists of a napkin holder having a base station PC, number of e-paper napkins, and a set of coloured pens. The e-paper napkin looks like a paper and works as a storage and display medium. It is reusable—can be rewritten thousands of times. The user can write or draw on the napkin (i.e. can give commands) using one of the pens. Anything that the user writes on the napkin is transmitted by the pen to the napkin interface using short-range RF technology. Not only this, the pen also keeps track of who is drawing what. Note that both the pen and the napkin interface interact with the base station using long-range RF (Figure 23.19).
Figure 23.19 Napkin PC
The best part of Napkin PC is that it is very easy to work with because of the use of pen and paper. Besides this, it offers many other advantages, some of which are as follows:
Roll top computer is a portable and stylized computer concept unveiled by Orkin Design of Germany. The basic idea behind this concept is to enhance the portability of conventional book-form laptops by turning them into unfurling and convolving portable computers. Due to enhanced portability of roll top computer, you can roll it like a newspaper (when not in use) and carry it around wherever you want.
The conceptual prototype of roll top computer comprises two parts: an energy-efficient and flexible OLED (organic light-emitting diode) display with multi-touch screen capabilities and a tower on which the display can be wrapped around (see Figure 23.20 (a)). The tower incorporates a power adapter, USB ports, webcam, and speaker within itself. A multimedia integrated pen is also incorporated in the device.
Figure 23.20 Roll Top Computer
The roll top computer can be used as a laptop, tablet PC, or a Television. As you unroll it (but not fully), it can be used as a 13-inch laptop/notebook (see Figure 23.20 (b)) with a portion of display being used as a keyboard. If you flatten it out, it can be used as a graphics tablet with an enclosed stylus pen (see Figure 23.20 (c)). When you fully unroll it, you get a 17-inch flat screen display to view the videos. This conceptual device also contains a hanging belt using which it can be easily carried over the shoulders. In short, the roll top computer is an all-in-one gadget that removes the burden of carrying heavy laptop bags.
B-membrane is an innovative and revolutionary PC prototype designed by a Korean designer Won-Seok-Lee. On the first look, it does not seem like a conventional computer at all; rather it resembles a space ship. It contains all the computer components within itself. The features that make the B-membrane computer concept interesting include:
Figure 23.21 B-membrance PC
Apart from being used as a PC, B-membrane computer can also be used as a source of ambient light. When you turn off this computer, its projector transforms it to an ambient light effect system that can display lighting on any surface. One aspect that seems unfavourable to B-membrane computer is its shape and size, which makes it difficult to carry it around.
A Japanese designer Mac Funamizu devised the idea of USB memory stick that combines the concept of disco lights with flash drive. The USB memory stick looks similar to pen/flash drive and has a transparent (glass) body that illuminates to present its storage capacity as well as the data stored in it. The glass shows different colours of light to indicate different type of data stored in the flash drive. For example, it shows pink light for images, blue for documents, and green for movies. However, if the glass shows no light, then it indicates no data are stored in it. On the other hand, if the glass is filled with lights then it means no storage space is available in the flash drive (Figure 23.22).
Figure 23.22 USb Memory Stick
3.14.131.212