Browse Definitions :
Definition

pervasive Wi-Fi

Pervasive Wi-Fi is the intercommunication of wireless networks in order to form a communications network that permeates the networked world.

Pervasive Wi-Fi is the communications backbone that is intended to further the IoT and pervasive computing. This communication network would also allow users to connect to anyone or thing from just about anywhere.

Not only does pervasive Wi-Fi look to unify the communications of Wi-Fi access points, but it also aims to bring in RFID, cellular phone communications, plus vehicle to vehicle communications of driverless, guidance and accident prevention systems. Some researchers are developing hardware to interpret and patch these systems into existing Wi-Fi networks. Many researchers claim unified communications protocols will be the real step in bringing pervasive Wi-Fi to reality.

This unified communication could be used for medical equipment by using this near omnipresent network to call doctors when patient vitals reach critical points from just about wherever they may be.

Pervasive Wi-Fi is an attractive proposition to those who want to avoid mobile data charges on cellphones. This technology is already used to connect masses at stadiums and on cruise ships as the expectation of Wi-Fi becomes a normal part of customer service expectations.

Pervasive Wi-Fi has to be fast, available and reliable. To ensure these desired characteristics, it may be that devices of normally closed networks will be required to be opened. This opening of networks, along with the pervasive nature of sensitive data transmission, is not without security and privacy concerns. While usedful, pervasive communication can be a stressor and can breakdown our ability to have regular, attentive and respectful in person communication.

This was last updated in October 2016

Continue Reading About pervasive Wi-Fi

SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

  • Lean Six Sigma

    Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits.

  • change management

    Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes...

SearchHRSoftware
SearchCustomerExperience
  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

  • neuromarketing

    Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...

  • contextual marketing

    Contextual marketing is an online marketing strategy model in which people are served with targeted advertising based on their ...

Close