Browse Definitions :
Definition

disposable computer

A disposable computer is a small data processing device with input/output , memory , and communication capabilities; the device is intended to be used for a limited time period or number of uses and then discarded. Cypak AB, a Swedish company, produces disposable computers and sells them to OEM s (original equipment manufacturers) for about $1 (U.S.) each. The Cypak device, essentially a processor mounted on paperboard, is currently being embedded in packing materials and used, for example, to track delivery data in courier packaging and to monitor patient dosage data from within the packaging for medications. Cypak's disposable computer has 32 kilobyte s of memory, which is enough to allow it to process and exchange several pages of encrypted data; it communicates through RFID .

As the price of embedded system s decreases, their cost becomes a less significant portion of the total cost of production, making the devices practical for a wider range of applications. According to some embedded systems engineers, disposable networked computers could soon be embedded in almost anything in our environment, leading to an envisioned future situation sometimes called ubiquitous computing .

A disposable computer is not necessarily the same thing as a disposable PC , which is a relatively inexpensive but full-featured personal computer that is designed to be discarded rather than fixed when serious problems arise.

This was last updated in September 2005

Continue Reading About disposable computer

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • cyber espionage

    Cyber espionage, also called cyber spying, is a form of cyber attack that is carried out against a competitive company or ...

  • virus (computer virus)

    A computer virus is malicious code that replicates by copying itself to another program, computer boot sector or document and ...

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • dropout

    Dropout refers to data, or noise, that's intentionally dropped from a neural network to improve processing and time to results.

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

Close