Ubiquitous Computing (Ubi Comp), or pervasive computing is hyped as the 'third wave' in computing (Weiser, 1996) and is best described by its creator Mark Weiser, (1996, p1) as " invisible, everywhere computing that does not live on a personal device of any sort, but is in the woodwork everywhere".

Ubiquitous computing therefore attempts to create technologies that mar the boundary between the users experience with computing and the world by becoming one with it. There are a number of ubiquitous computing research branches such as mobile computing, wearable computing and the intelligent environment.Ubiquitous computing is reputed to evolve our business, learning, entertainment, collaborative and home environments by embedding smart technologies that interact with us quietly behind the scenes (Roussos et al, 2003). The vision is of smart embedded technology grounded in the realizable theory where microprocessors are becoming smaller, less expensive and able to incorporate into everyday objects and environments such as clothes, pencils, paper, toys, tools, home and office appliances, walls, floors and fixtures (Mattern & Strum, 2003). Wireless technologies will be the enabler for these devices and environments seamlessly communicating with other smart devices or services over the internet (Mattern & Strum, 2003). User interfaces will consist of speech or gesture recognition systems designed to blend into the world and require little knowledge for users to accomplish complex tasks (Mattern & Strum 2003; Emerson 1999).

There are several research studies regarding the development and application of ubiquitous computing in environments for example the 'Aware Home' (Kidd et al, 1999), the 'Intelligent Room' (Coen, 1998), the 'Smart Home' (Park et al, 2003) and the 'Smart Classroom' (Jiang et al, 2001). The "Smart Classroom' enables remote students to actively participate in lectures as well as recording the lecturer's verbal presentation (Jiang et al, 2001). The 'Smart Home' seeks to devise intelligent home appliances that provide 'the good life' (Park et al, 2003). 'Roomware' transforms the office environment with interactive walls able to utilise large displays of collaborative work, tables that record group discussions and chairs that adjust accordingly to correct posture and comfort (Streitz et al, 2002).Patterson et al (2002) propose smart technologies in health care to assist Alzheimer's patients by prompting them for activities of daily living and reorientating them to location with an activity compass that leads patients home. Proposed devices include 'Intelligent Paper' that works like real paper (Dymetman ; Copperman, 1998), 'Peek-a-Drawer' a scanning communicating device for children (Siio, 2002) and 'Cyberguide' the guide book that knows where you are (Abowd, 1997).

Park et al (2003) discuss the 'Smart Pen' that finds definitions and saves phrases as well as the 'Smart Pillow' that reads you to sleep and turns off the light amongst many others.Complex issues and constraints arise for government, business and the individual concerning the implementation of ubiquitous computing devices and environments. Mattern and Strum (2003) identified the reality of information overload as well as the political, legal and social concerns regarding locatable and traceable communicating objects. Privacy has become the biggest concern where 'smart' processes within objects and environments will make decisions that will most likely effect our entire lives (Langheinrich 2003; Boyd et al 2002).

Users will be interacting with embedded systems in their working, playing and sleeping lives (Langheinrich, 2003).Does your desk interface inform you of your highest priority task and then inform your boss if you decide to undertake one of less priority? What information does your fridge manufacturer sell about your individual spending habits? Langheinrich (2003) discusses the issue of the invisibility of the technology that mars the border between interaction and surveillance. There are far reaching implications of living in a digitized world where every action can be stored and retrieved for scrutiny later (Langheinrich, 2003). Langheinrich (2003) proposes the following guiding principles: providing notice about data and its use, providing choice and obtaining consent from users, allowing anonymity or pseudonymity and only saving data when the user is witness.

Maintaining security in ubiquitous computing devices and environments is fundamentally difficult due to the wireless nature of the communication transport level and the heavy power consumption of devices (Langheinrich, 2003). Data and information sent over 'airwaves' is inherently at risk so robust security measures would only be implemented for highly sensitive data such as medical records, etc (Langheinrich, 2003).Bohn et al (2003) identify how difficult it is to predict the implications on our lives of extensively embedded technologies in objects and environments and raises points on failed deliverables when proposed benefits of ubiquitous computing don't simplify our lives, save time, or reduce our task list. The perceived loss of control over our environments is an important factor in the user's proliferation of embedded technologies (Bohn et al, 2003).

The is a risk of creating a new digital divide through providing different sections of the population the ability to 'connect' to the new information highway (Bohn et al, 2003).With further development of ubiquitous computing technologies, new devices and services will evolve from the mobile devices we currently use (Mattern ; Strum, 2003). Environments will transform with the ability to sense, learn and adapt to the changing stimulus from the user (Park et al, 2003). Smart objects that have benefited from increases in processing power, memory resources and network connectivity will be able to sense and adapt to the environment and provide new services as well as the services they are originally intended for (Mattern ; Strum 2003; Mavrommati ; Kameas 2003; Mynatt 2000).A medicine cabinet used for storage transforms into a tool that tells you not to take aspirin with ibuprofen or that you forgot to take your contraceptive pill.

The fridge that adjusts its temperature according to the foods stored within it or indicates those foods well past there use by date. Alternatively, in the work environment the 'Snatcher Catcher' a refrigerator that records on video who took your sandwich (Lundberg et al, 2002).The adoption and proliferation of ubiquitous computing technologies in E-business expects to expand as the strategic advantages of implementation become more tangible to business owners. (Roussos et al, 2003) 'Just in time' pricing, 'pay-per-use' and being part of the 'now or new economy' are attractive benefits encouraging business to invest in ubiquitous computing (Langheinrich et al, 2002).Mattern ; Strum (2003) identified a need for further research and development in mobile and portable devices, adequate communication systems and software infrastructures to enable a successful ubiquitous computing wave.

Abowd, G.D. (1997). Ubiquitous computing: research themes and open issues from an applications perspective.

Retrieved March 11, 2004, from http://citeseer.ist.psu.edu/cache/papers/cs/63/ftp:zSzzSzftp.gvu.

gatech.eduzSzpubzSzgvuzSztrzSz96-24.pdf/abowd97ubiquitous.pdf/Bohn, J., Coroama, V., Langheinrich, M.

, Mattern, F., ; Rohs, M. (2003). Disappearing Computers Everywhere: Living in a World of Smart Everyday Objects.

Retrieved March 11, 2004 from http://www.vs.inf.ethz.

ch/publ/papers/emtel.pdfBoyd, D., Jensen, C., Lederer, S.

, ; Nguyen, D.H. (2002). Privacy in Digital Environments: Empowering Users. Retrieved March 11, 2004, fromhttp://www.cc.

gatech.edu/~everyday-computing/projects/privacyMirrors/pubs/privacyworkshop-cscw2002.pdfCoen, M.H.

(1998). Design Principles for Intelligent Environments. Retrieved March 11, 2004 from http://www.ai.

mit.edu/projects/aire/pub-repository/aaai98.pdfDymetman, M., ; Copperman, M. (1998). Intelligent Paper.

Retrieved March 11, 2004, from http://citeseer.ist.psu.edu/cache/papers/cs/22091/http:zSzzSzwww.xrce.xerox.

comzSzpubliszSzmlttzSzdym-intelligent-paper-98.pdf/dymetman98intelligent.pdf/Emerson, T. (1999).

New Trends in Virtual Environment User Interface Research: Case Studies at the Human Interface Technology Laboratory. Retrieved March 11, 2004, from http://citeseer.ist.psu.edu/cache/papers/cs/2585/http:zSzzSzwww.hitl.

washington.eduzSzpublicationszSzr-98-15zSzzSzr-98-15.pdf/new-trends-in-virtual.pdf/Jiang, C., Shi, Y., ; Xu, G.

(2001). Classroom in the era of ubiquitous computing - smart classroom. Retrieved March 11, 2004, from http://media.cs.

tsinghua.edu.cn/~pervasive/paper/200112-1.pdfKidd, C.

D., Orr, R., Abowd, G.D.

, Atkeson, C.G., Essa, I.A., MacIntyre, B., Mynatt, E.

, Starner, T.E., ; Newstetter, W. (1999).

The Aware Home: A Living Laboratory for Ubiquitous Computing Research. Retrieved March 11, 2004, from http://www2.parc.com/spl/members/zhao/stanford-cs428/readings/apps/Kidd_AwareHome_cobuild99.

pdfLangheinrich, M. (2001). Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems. Retrieved March 11, 2004, from http://citeseer.ist.psu.

edu/cache/papers/cs/23220/http:zSzzSzwww.inf.ethz.chzSzvszSzpublzSzpaperszSzprivacy-principles.

pdf/privacy-by-design-principles.pdf/Langheinrich, M., Coroama, V., Bohn, J., ; Rohs, M.

(2002). As we may live: Real-world implications of ubiquitous computing. Retrieved March 11, 2004, from http://www.vs.inf.

ethz.ch/publ/papers/implications-uc2002.pdfLundberg, J., Ibrahim, A.

, J�nsson, D., Lindquist, S., ; Qvarfordt, P. (2002). "The Snatcher Catcher" - an interactive refrigerator.

Retrieved March 11, 2004 from http://cid.nada.kth.se/pdf/CID-194.pdfMattern, F.

, ; Sturm, P. (). Investigating research issues in ubiquitous computing: The state of the art, trends, and prospects of future networked systems. Retrieved March 11, 2004 from http://www.vs.inf.

ethz.ch/publ/papers/DisSysUbiComp.pdfMavrommati, I., ; Kameas, A. (2003). The evolution of objects into hyper-objects: will it be mostly harmless [Electronic version].

Personal and Ubiquitous Computing, 7, 176-181Mynatt, E. D. (2000). Co-opting everyday objects.

Retrieved March 11, 2004, from http://www.cc.gatech.edu/~everyday-computing/projects/projectThemes/everydayComputing/everydayObjects-dare2000.pdfPark, S.H.

, Won, S.H., Lee, J.B., ; Kim, S.

W. (2003). Smart home - digitally engineered domestic life. [Electronic version]. Personal and Ubiquitous Computing, 7, 189-196Patterson, D.J.

, Etzioni, O., Fox, D., ; Kautz, H. (2002).

Intelligent ubiquitous computing to support alzheimer's patients: Enabling the cognitively disabled. Retrieved February 24, 2004, from http://www.cs.washington.edu/homes/djp3/AI/AssistedCognition/publications/UBICOMP/acubi.pdfRoussos, G.

, Gershman, A., & Kourouthanassis, P. (2003). Ubiquitous Commerce. Retrieved March 11, 2004 from http://www.dcs.

bbk.ac.uk/~gr/u-commerce/ubicommerce.pdfSiio, I.

, Rowan, J., & Mynatt, E. (2002). Peek-A-Drawer: Communication by Furniture.

Retrieved March 11, 2004, from http://www.cc.gatech.edu/~everyday-computing/projects/dude/pubs/peekADrawer-chi2002.pdfStreitz, N.

, Prante, T., M�ller-Tomfelde, C., Tandler, P., & Magerkurth, C. (2002). Roomware: The second generation.

Retrieved March 11, 2004, from http://www.ipsi.fraunhofer.de/ambiente/paper/2002/Roomware-chi02.

pdfWeiser, M. (1996). Ubiquitous computing. Retrieved February 24, 2004, from http://www.ubiq.com/hypertext/weiser/UbiHome.html