SlideShare una empresa de Scribd logo
1 de 29
PRESENTED BY-
INTRODUCTION
What is DIGITAL JEWELLERY?
DIGITAL JEWELLERY and its Components
EAR RINGS
NECKLACE
IBM’S MAGIC DECODER RING
BRACELET
CHARMED COMMUNICATOR EYEPIECE
 TECHNICAL SPECIFICATIONS
DISPLAY TECHNOLOGIES
PROTOTYPE OF DIGITAL JEWELLERY
THE JAVA RING
ADVANTAGES
DISADVANTAGES
CONCLUSION
INTRODUCTION
 In Computer Fashion Wave ,”Digital Jewellery”

looks to be the next sizzling fashion trend of
technological wave.
 The combination of shrinking computer devices
and increasing computer power has allowed
several companies to begin producing fashion
jewellery with embedded intelligence.

 By the end of the decade , we could be wearing
our computers instead of sitting in front of them.
WHAT IS DIGITAL JEWELLERY ????
Digital Jewellery is the fashion jewellery with embedded
intelligence.
 Digital Jewellery can help you solve problems like forgotten
passwords and security badges.

 Digital Jewellery will be the evolution in digital technology
that makes computer elements entirely compatible with the
human form.
 They have the potential to be all-in-one replacements for
your driver’s license, key chain, business cards, credit cards,
health insurance card, corporate security badge and loose cash.
DIGITAL JEWELLERY AND ITS COMPONENTS :
 Soon, “cell phones” will take a totally new
form, appearing to have no form at all.
 The various components that are inside a cell
phone: Microphone, Receiver, Touch
pad, Display, Circuit board, Antenna, and Battery.
 IBM has developed a prototype of a cell phone that
consists of several pieces of digital jewellery that will
work together wirelessly, possibly with Bluetooth
wireless.
Cell phones may one day be comprised of
digital accessories that Work together
through wireless connections.
Speakers : embedded into
these earrings will be the
phone's receiver.
 These days many
manufacturers are developing
things like Bluetooth devices in
the form of pendants or
earrings that people can wear
that help enhance their mobile
phones, computers
PDAs, basically anything that
uses similar Technology .
 Users will talk into the
necklace's embedded
microphone.
 They transfer the information
in the forms of signals.
 It works with the help of
sensors which is embedded in it.
 It is mainly by blue tooth
technology.
Perhaps the most interesting piece of the phone, this "magic
decoder ring” is equipped with LEDs that flash to indicate an
incoming call. It can also be programmed to flash different colors
to identify a particular caller or indicate the importance of a call.
• The same ring that flashes for phone calls could also
inform you that e-mail is piling up in your inbox.
•This flashing alert could also indicate the urgency of
the e-mail.
•The mouse-ring that IBM is developing will use the
company's Track Point technology to wirelessly move
the cursor on a computer-monitor display.
•Track Point is the little button embedded in the
keyboard of some laptops.
•IBM Researchers have transferred Track Point
technology to a ring, which looks something like a
black-pearl.
 Equipped with a video graphics array (VGA)

display, this wrist display could also be used as
a caller identifier that flashes the name and
phone number of the caller.
Bluetooth Bracelet built in rechargeable
battery, when a call is coming the bracelet will
vibrate and lamp flash
CHARMED COMMUNICATOR EYEPIECE :
While IBM is in the development stage, Charmed
Technology is already marketing its digital
jewellery, including a futuristic-looking eyepiece
display. The eyepiece is the display component of the
company's Charmed Communicator, a
wearable, wireless, broadband-Internet device that
can be controlled by voice, pen or handheld keypad.
The company says that the device could be ready for
the mainstream market by the end of 2001 or early
2002. The Communicator can be used as an MP3
player, video player and cell phone. The
Communicator runs on the company's Linux-based
Nanix operating system.
CHARMED COMMUNICATOR EYEPIECE
The eye piece above displays images and data received
wirelessly from the Communicator's belt module.
Technical specifications:
Digital jewellery devices
consist of a screen or display
for information, most likely
consisting of 7-16-segment, or
dot matrix LEDs, LCDs.
 An audio visual or other
'display' could consist of a
speaker, a single flashing light,
a sensor of some kind .
Display Technologies :
The digital jewelry
display, for instance, every
alphabet and number
system has found
representation within the
electronics realm and 'dotmatrix.
It is used to display
Chinese and Japanese and
other character sets, as can
the alternative display for
LCDs (liquid-crystaldisplays) also be used, as
often found in watches.
Digital Jewellery can be made in many different
sizes and shapes with a variety of materials ranging
from plastic and metal to rubber and glass.
This could range from LED 7-segment, 16segment, dot matrix, and other programmable LEDs
devices to LCDs, OLEDs, and other displays.
PROTOTYPES OF DIGITAL JEWELLERY:
Complete HIOX necklace showing all 26
letters of the Roman alphabet extended in 4dimensional space-time.
It seems that everything we access today is under
lock and key. Even the devices we use are
protected by passwords. It can be frustrating trying
to keep with all of the passwords and keys needed
to access any door or computer program.
Dallas semiconductor is developing a new Javabased, computerized ring that will automatically
unlock doors and log on to computers.
The ring has
134 KB of RAM,
32 KB of ROM,
a real-time clock &
a Java virtual machine, which is a piece of software that
recognizes the Java language and translates it for the user's computer
system.

Digital jewelry, (designed to supplement the personal computer,)
will be the evolution in digital technology that makes computer
elements entirely compatible with the human form.
BLUE DOT RECEPTOR :
The Java Ring is snapped
into a reader, called a
Blue Dot receptor, to allow
communication between a
host system and the Java
Ring. The Java Ring is a
stainless-steel ring, 16millimeters (0.6 inches) in
diameter, which houses a
1-million-transistor
processor, called an
iButton.
HIGHLIGHTS OF JAVA RING :

Runs Java better (plus portions enhance Java
Card 2.0).
Careful attention to physical security.
Durability to stand up to everyday use.
High memory capacity (up to 134K bytes NV
SRAM).
Retail connectivity to 250 million existing
computers.
ADVANTAGES:
1) It provides SECURITY.
For example.,
JAVA RING is used to lock or unlock doors or computers...as
we use passwords and keys to lock our doors and computers.
we dont need to remember all those passwords and carry all
those keys. So java ring is designed to provide security.
2)

As COMPUTING DEVICES are embedded it is not
necessary to carry CELLS or COMPUTERS...hence it is easy
to carry everywhere.
DISADVANTAGES:

Charging capabilities & Cost
are just a sample of problems.
CONCLUSION:
 The basic idea behind the digital jewelry
concept is to have the convenience of
wireless, wearable computers while remaining
fashionably sound.
It is hoped to be marketable
soon, however, several bugs remain. Charging
capabilities and cost are just a sample of the
problems that lurk.
Digital jewellery by SH
Digital jewellery by SH

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Digital jewellery janardhan
Digital jewellery janardhanDigital jewellery janardhan
Digital jewellery janardhan
 
Digital jewellery ppt
Digital   jewellery pptDigital   jewellery ppt
Digital jewellery ppt
 
Digital jewellery ppt
Digital jewellery pptDigital jewellery ppt
Digital jewellery ppt
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewellery ppt
Digital jewellery  pptDigital jewellery  ppt
Digital jewellery ppt
 
Java Ring
Java RingJava Ring
Java Ring
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellery final report
Digital jewellery final reportDigital jewellery final report
Digital jewellery final report
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155Ppt digital jewelry prachi jain 110155
Ppt digital jewelry prachi jain 110155
 
Ppt
PptPpt
Ppt
 
digital jewelry
digital jewelrydigital jewelry
digital jewelry
 
Wireless networks ppt
Wireless networks pptWireless networks ppt
Wireless networks ppt
 
Wearable technologies
Wearable technologiesWearable technologies
Wearable technologies
 
Wearables ppt
Wearables pptWearables ppt
Wearables ppt
 
Presentation on Gi-Fi
Presentation on Gi-FiPresentation on Gi-Fi
Presentation on Gi-Fi
 
DIGITAL JEWELLERY
DIGITAL JEWELLERYDIGITAL JEWELLERY
DIGITAL JEWELLERY
 
Computer science seminar topics
Computer science seminar topicsComputer science seminar topics
Computer science seminar topics
 

Destacado (14)

Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewellery ppt
Digital jewellery  pptDigital jewellery  ppt
Digital jewellery ppt
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
Digital jewellary
Digital jewellaryDigital jewellary
Digital jewellary
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 
Digital jewellery
Digital jewellery Digital jewellery
Digital jewellery
 
Brain gate
Brain gateBrain gate
Brain gate
 
seminar on invisible eye
seminar on invisible eyeseminar on invisible eye
seminar on invisible eye
 
Brain gate
Brain gateBrain gate
Brain gate
 
Brain chips
Brain chipsBrain chips
Brain chips
 
Rain technology
Rain technologyRain technology
Rain technology
 
Brain gate
Brain gateBrain gate
Brain gate
 
ppt on femtocell
ppt on femtocellppt on femtocell
ppt on femtocell
 

Similar a Digital jewellery by SH

Digital Jewellery ppt.pptx is about the elctronic devices
Digital Jewellery  ppt.pptx is about the elctronic devicesDigital Jewellery  ppt.pptx is about the elctronic devices
Digital Jewellery ppt.pptx is about the elctronic devicesmisbanausheenparvam
 
35.digital jewellery
35.digital jewellery35.digital jewellery
35.digital jewelleryNaga Dinesh
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital JwelleryJawhar Ali
 
Alternate metal-jewelry Inox Jewelry
Alternate metal-jewelry Inox JewelryAlternate metal-jewelry Inox Jewelry
Alternate metal-jewelry Inox JewelrySanskruti Mehta
 
DIGITAL JWELLERY
DIGITAL JWELLERYDIGITAL JWELLERY
DIGITAL JWELLERYMD Ibrahim
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewelleryjyothi9491
 
Digital jewellery-report
Digital jewellery-reportDigital jewellery-report
Digital jewellery-reportramyagajji
 
AKSHITHA Digital jewellery ppt.pptx
AKSHITHA Digital jewellery ppt.pptxAKSHITHA Digital jewellery ppt.pptx
AKSHITHA Digital jewellery ppt.pptxSanGeet25
 
Presentation on digital jwellary.pptx
Presentation on digital jwellary.pptxPresentation on digital jwellary.pptx
Presentation on digital jwellary.pptxGarimaKabra3
 
Digital Jewellery.pptx
Digital Jewellery.pptxDigital Jewellery.pptx
Digital Jewellery.pptxTapasDash11
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptxKDivyaLatha
 
90664078-Digital-Jewellery-Power-Point.ppt
90664078-Digital-Jewellery-Power-Point.ppt90664078-Digital-Jewellery-Power-Point.ppt
90664078-Digital-Jewellery-Power-Point.pptJayakeerthanaS
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelryRacksaviR
 

Similar a Digital jewellery by SH (20)

Digital Jewellery ppt.pptx is about the elctronic devices
Digital Jewellery  ppt.pptx is about the elctronic devicesDigital Jewellery  ppt.pptx is about the elctronic devices
Digital Jewellery ppt.pptx is about the elctronic devices
 
Vankam ppt.ppt
Vankam ppt.pptVankam ppt.ppt
Vankam ppt.ppt
 
Digital Jewellery ppt
Digital Jewellery  pptDigital Jewellery  ppt
Digital Jewellery ppt
 
35.digital jewellery
35.digital jewellery35.digital jewellery
35.digital jewellery
 
seminar presentation on Digital Jwellery
seminar presentation on Digital Jwelleryseminar presentation on Digital Jwellery
seminar presentation on Digital Jwellery
 
Digital Jewellery ppt 0.pptx
Digital Jewellery  ppt 0.pptxDigital Jewellery  ppt 0.pptx
Digital Jewellery ppt 0.pptx
 
Alternate metal-jewelry Inox Jewelry
Alternate metal-jewelry Inox JewelryAlternate metal-jewelry Inox Jewelry
Alternate metal-jewelry Inox Jewelry
 
DIGITAL JWELLERY
DIGITAL JWELLERYDIGITAL JWELLERY
DIGITAL JWELLERY
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
vishala.pptx
vishala.pptxvishala.pptx
vishala.pptx
 
Dj ppt
Dj pptDj ppt
Dj ppt
 
Digital jewellery-report
Digital jewellery-reportDigital jewellery-report
Digital jewellery-report
 
AKSHITHA Digital jewellery ppt.pptx
AKSHITHA Digital jewellery ppt.pptxAKSHITHA Digital jewellery ppt.pptx
AKSHITHA Digital jewellery ppt.pptx
 
Presentation on digital jwellary.pptx
Presentation on digital jwellary.pptxPresentation on digital jwellary.pptx
Presentation on digital jwellary.pptx
 
Digital Jewellery.pptx
Digital Jewellery.pptxDigital Jewellery.pptx
Digital Jewellery.pptx
 
Digital jewellery2.pptx
Digital jewellery2.pptxDigital jewellery2.pptx
Digital jewellery2.pptx
 
digitaljewelry.vaishu.pdf
digitaljewelry.vaishu.pdfdigitaljewelry.vaishu.pdf
digitaljewelry.vaishu.pdf
 
Digital jewellery
Digital jewelleryDigital jewellery
Digital jewellery
 
90664078-Digital-Jewellery-Power-Point.ppt
90664078-Digital-Jewellery-Power-Point.ppt90664078-Digital-Jewellery-Power-Point.ppt
90664078-Digital-Jewellery-Power-Point.ppt
 
Digital jewelry
Digital jewelryDigital jewelry
Digital jewelry
 

Más de shhajira

Right to education act 2009
Right to education act    2009Right to education act    2009
Right to education act 2009shhajira
 
Modernization and social change
Modernization and social changeModernization and social change
Modernization and social changeshhajira
 
RUBRICS TOOL BY SH
RUBRICS TOOL BY SHRUBRICS TOOL BY SH
RUBRICS TOOL BY SHshhajira
 
Adolescents & media challenges in 21 st century
Adolescents & media challenges in 21 st centuryAdolescents & media challenges in 21 st century
Adolescents & media challenges in 21 st centuryshhajira
 
PHOTOSHOP BASICS
PHOTOSHOP BASICSPHOTOSHOP BASICS
PHOTOSHOP BASICSshhajira
 
Solar system
Solar systemSolar system
Solar systemshhajira
 
Data flow diagrams
Data flow diagramsData flow diagrams
Data flow diagramsshhajira
 

Más de shhajira (7)

Right to education act 2009
Right to education act    2009Right to education act    2009
Right to education act 2009
 
Modernization and social change
Modernization and social changeModernization and social change
Modernization and social change
 
RUBRICS TOOL BY SH
RUBRICS TOOL BY SHRUBRICS TOOL BY SH
RUBRICS TOOL BY SH
 
Adolescents & media challenges in 21 st century
Adolescents & media challenges in 21 st centuryAdolescents & media challenges in 21 st century
Adolescents & media challenges in 21 st century
 
PHOTOSHOP BASICS
PHOTOSHOP BASICSPHOTOSHOP BASICS
PHOTOSHOP BASICS
 
Solar system
Solar systemSolar system
Solar system
 
Data flow diagrams
Data flow diagramsData flow diagrams
Data flow diagrams
 

Último

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 

Último (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

Digital jewellery by SH

  • 2. INTRODUCTION What is DIGITAL JEWELLERY? DIGITAL JEWELLERY and its Components EAR RINGS NECKLACE IBM’S MAGIC DECODER RING BRACELET CHARMED COMMUNICATOR EYEPIECE  TECHNICAL SPECIFICATIONS DISPLAY TECHNOLOGIES PROTOTYPE OF DIGITAL JEWELLERY THE JAVA RING ADVANTAGES DISADVANTAGES CONCLUSION
  • 3. INTRODUCTION  In Computer Fashion Wave ,”Digital Jewellery” looks to be the next sizzling fashion trend of technological wave.  The combination of shrinking computer devices and increasing computer power has allowed several companies to begin producing fashion jewellery with embedded intelligence.  By the end of the decade , we could be wearing our computers instead of sitting in front of them.
  • 4. WHAT IS DIGITAL JEWELLERY ???? Digital Jewellery is the fashion jewellery with embedded intelligence.  Digital Jewellery can help you solve problems like forgotten passwords and security badges.  Digital Jewellery will be the evolution in digital technology that makes computer elements entirely compatible with the human form.  They have the potential to be all-in-one replacements for your driver’s license, key chain, business cards, credit cards, health insurance card, corporate security badge and loose cash.
  • 5. DIGITAL JEWELLERY AND ITS COMPONENTS :  Soon, “cell phones” will take a totally new form, appearing to have no form at all.  The various components that are inside a cell phone: Microphone, Receiver, Touch pad, Display, Circuit board, Antenna, and Battery.  IBM has developed a prototype of a cell phone that consists of several pieces of digital jewellery that will work together wirelessly, possibly with Bluetooth wireless.
  • 6. Cell phones may one day be comprised of digital accessories that Work together through wireless connections.
  • 7. Speakers : embedded into these earrings will be the phone's receiver.  These days many manufacturers are developing things like Bluetooth devices in the form of pendants or earrings that people can wear that help enhance their mobile phones, computers PDAs, basically anything that uses similar Technology .
  • 8.  Users will talk into the necklace's embedded microphone.  They transfer the information in the forms of signals.  It works with the help of sensors which is embedded in it.  It is mainly by blue tooth technology.
  • 9. Perhaps the most interesting piece of the phone, this "magic decoder ring” is equipped with LEDs that flash to indicate an incoming call. It can also be programmed to flash different colors to identify a particular caller or indicate the importance of a call.
  • 10. • The same ring that flashes for phone calls could also inform you that e-mail is piling up in your inbox. •This flashing alert could also indicate the urgency of the e-mail. •The mouse-ring that IBM is developing will use the company's Track Point technology to wirelessly move the cursor on a computer-monitor display. •Track Point is the little button embedded in the keyboard of some laptops. •IBM Researchers have transferred Track Point technology to a ring, which looks something like a black-pearl.
  • 11.  Equipped with a video graphics array (VGA) display, this wrist display could also be used as a caller identifier that flashes the name and phone number of the caller.
  • 12. Bluetooth Bracelet built in rechargeable battery, when a call is coming the bracelet will vibrate and lamp flash
  • 14. While IBM is in the development stage, Charmed Technology is already marketing its digital jewellery, including a futuristic-looking eyepiece display. The eyepiece is the display component of the company's Charmed Communicator, a wearable, wireless, broadband-Internet device that can be controlled by voice, pen or handheld keypad. The company says that the device could be ready for the mainstream market by the end of 2001 or early 2002. The Communicator can be used as an MP3 player, video player and cell phone. The Communicator runs on the company's Linux-based Nanix operating system.
  • 15. CHARMED COMMUNICATOR EYEPIECE The eye piece above displays images and data received wirelessly from the Communicator's belt module.
  • 16. Technical specifications: Digital jewellery devices consist of a screen or display for information, most likely consisting of 7-16-segment, or dot matrix LEDs, LCDs.  An audio visual or other 'display' could consist of a speaker, a single flashing light, a sensor of some kind .
  • 17. Display Technologies : The digital jewelry display, for instance, every alphabet and number system has found representation within the electronics realm and 'dotmatrix. It is used to display Chinese and Japanese and other character sets, as can the alternative display for LCDs (liquid-crystaldisplays) also be used, as often found in watches.
  • 18. Digital Jewellery can be made in many different sizes and shapes with a variety of materials ranging from plastic and metal to rubber and glass. This could range from LED 7-segment, 16segment, dot matrix, and other programmable LEDs devices to LCDs, OLEDs, and other displays.
  • 19. PROTOTYPES OF DIGITAL JEWELLERY: Complete HIOX necklace showing all 26 letters of the Roman alphabet extended in 4dimensional space-time.
  • 20.
  • 21. It seems that everything we access today is under lock and key. Even the devices we use are protected by passwords. It can be frustrating trying to keep with all of the passwords and keys needed to access any door or computer program. Dallas semiconductor is developing a new Javabased, computerized ring that will automatically unlock doors and log on to computers.
  • 22. The ring has 134 KB of RAM, 32 KB of ROM, a real-time clock & a Java virtual machine, which is a piece of software that recognizes the Java language and translates it for the user's computer system. Digital jewelry, (designed to supplement the personal computer,) will be the evolution in digital technology that makes computer elements entirely compatible with the human form.
  • 23. BLUE DOT RECEPTOR : The Java Ring is snapped into a reader, called a Blue Dot receptor, to allow communication between a host system and the Java Ring. The Java Ring is a stainless-steel ring, 16millimeters (0.6 inches) in diameter, which houses a 1-million-transistor processor, called an iButton.
  • 24. HIGHLIGHTS OF JAVA RING : Runs Java better (plus portions enhance Java Card 2.0). Careful attention to physical security. Durability to stand up to everyday use. High memory capacity (up to 134K bytes NV SRAM). Retail connectivity to 250 million existing computers.
  • 25. ADVANTAGES: 1) It provides SECURITY. For example., JAVA RING is used to lock or unlock doors or computers...as we use passwords and keys to lock our doors and computers. we dont need to remember all those passwords and carry all those keys. So java ring is designed to provide security. 2) As COMPUTING DEVICES are embedded it is not necessary to carry CELLS or COMPUTERS...hence it is easy to carry everywhere.
  • 26. DISADVANTAGES: Charging capabilities & Cost are just a sample of problems.
  • 27. CONCLUSION:  The basic idea behind the digital jewelry concept is to have the convenience of wireless, wearable computers while remaining fashionably sound. It is hoped to be marketable soon, however, several bugs remain. Charging capabilities and cost are just a sample of the problems that lurk.