Profiles and Context Awareness for Mobile Users a Middleware Approach supporting Personal Security.

Size: px
Start display at page:

Download "Profiles and Context Awareness for Mobile Users a Middleware Approach supporting Personal Security."

Transcription

1 Profiles and Context Awareness for Mobile Users a Middleware Approach supporting Personal Security. Security of Pervasive Communication, SPC 06 T-Systems Enterprise Services GmbH Technologiezentrum ENPS Gerald Eichler, Matthias O. Will

2 Outline... or what can you expect from the upcoming 25 minutes?! Paradigm change for new mobility! Device binding; theses & trends! Profiles and its handling! Ontologies; user & interest profiles! Basic middleware approach: Contigo Toolbox! Context awareness! Sample applications! Use of visual codes! Localisation contextualisation individualisation! Middleware approach! Mobile network operator positioning! Permission & Privacy Gateway + Profile Management Engine! Summary and preliminary results Gerald Eichler, Matthias O. Will Slide 1

3 Paradigm Change. Changed Binding of End User Devices. Multiple dedicated devices Shared & planned usage Stand alone services Multi-functional devices Personal & ad-hoc usage Community services hard binding soft binding Gerald Eichler, Matthias O. Will Slide 2

4 Paradigm Change. Theses on the New Mobility. Digital signatures Context awareness Wireless broadband Communication and information technology go mobile. Miniaturisation Devices representing their users. Interaction Edutainment Localisation Content creation Users want to be involved. Pull vs. push Multiple roles Life runs faster. Context hopping Contents feed individual requests. Personalisation Common devices Filtering/matching Private meets business. Business flexibility Gerald Eichler, Matthias O. Will Slide 3

5 Paradigm Change. Challenging Factors about the New Mobility. Technical trends Economical trends "Powerful smart phones (PDA + cellular) "Multiple access technologies (GPRS, UMTS, WLAN, WiMAX) "Multi-media content exchange (speech, textual SMS, still picture/video MMS, Web n Walk) "Ad-hoc device peering (Bluetooth, IrDA) New personal mobility "Context awareness (location, time, current work) "Open mobile communication culture (interruptability) "Publication of very personal issues (BLOGs, VLOGs) Social trends "Cheaper mobile devices "Bundle offers for sale "Decreasing communication costs (flat rates) "High market penetration of mobile services And who cares about SECURITY?? User Network Provider Service Provider?! Gerald Eichler, Matthias O. Will Slide 4

6 Profiles. User Profile and Semantic Network.! User interests & rejections! are collected by protected user profiles, called Interest Profiles User 1 1..* User Profile * 0..* Interest Rejection! Domains! are represented a set of concepts Pop! are bundled by sub ontologies! Object characteristics! are collected by Resource Profiles! Matching! discovers similarities between Interest and Resource Profiles Frozen contains Don t cry.. Musical is_genre contains is_genre Gr. Hits 2 Evita OST contains performs performs Madonna Gerald Eichler, Matthias O. Will Slide 5

7 Profiles. Manually Ontology based Editing.! User profiles are represented by rated ontologies on selected granularity Hierarchical modelling of characteristics Activation and rating per leaf and /or sub tree Selection of value type (binary, discrete, float) Direct numerical input Graphical input by slider Storage of sub profile Gerald Eichler, Matthias O. Will Slide 6

8 Basic Middleware Approach. Contextual Information to Go (Contigo) Toolbox. Service and User Management Portal XML 3rd Party Services 3rd Application Party Services Services (3rd Party Applications) XML External Systems and Data Bases? API API API API API API API Administration Basic Service Profile BS Matching BS User History BS Annotation BS Tagging & Device BS not yet defined Data Import Filter SQL XML Protected Repository User DB Service DB Accounting DB History DB SQL Protected API Core Profile Management Engine (PME) Protected Profile DB Gerald Eichler, Matthias O. Will Slide 7

9 Context Awareness. Use of Tags: Example - Visual Codes in Visual Maps.! Multiple sources for tag based identification! RFID! Network IDs (GSM cells, WLAN SSIDs,...)! Visual codes (2D barcodes) 96 bits URL association! Advantages of 2D barcodes Unique identifier for visual maps Photographic recognition Multi-functional with angle rotation Easy printable (magazine, wall paper) Without mystery (pull required) Gerald Eichler, Matthias O. Will Slide 8

10 Context Awareness. Mobile & Context aware Applications: T-Systems R&D Prototypes. Stand alone ideas! Context Awareness! Product Find & Information Service! Annotation Service! Contact Builder Identification of common modules! Localisation! Mobile Find Service! Mobile Alerting Service! Mobile Coupon Service Modular framework Gerald Eichler, Matthias O. Will Slide 9

11 Context Awareness. Recombination of Information Sources in Privacy Context. Service Trigger Event Information Sources Personal Area Non Privacy Area Localisation (longitude, latitude) Contextualisation Filtering Matching Individualisation Pseudonymisation Network ID Database Tracing & Prediction Geo Database User Profile Repository User History Service Specific Personal Context Annotation/Rating Gerald Eichler, Matthias O. Will Slide 10

12 Extended Middleware Approach. Mobile Network Operators in the Context aware Environment.! Complex composition of social, technical and legal facts Pro context awareness Contra context awareness! Mobile network operators as trustable partner of customers! New thinking in daily handling with personal mobility! Individual adjustment according user interests and habits # Configurable, modular services # Personal profiles! Improved infrastructure, services and technical base! Acceptance, security issues, no trust in start ups! Complex and inhomogeneous technical infrastructure! High costs for active localisation; high network dynamics! Subscription handling, bundle bindings! Open legal issues (property rights)! Poor usability of mobile devices (missing service individualisation) Gerald Eichler, Matthias O. Will Slide 11

13 Extended Middleware Approach. Permission & Privacy Gateway + Profile Management Engine. User Mobile Access Mobile Services Coupon Service Alert Service Ressource Finder Find Services Contact Builder Context Services Permission & Privacy Gateway Privacy & Permission Mgmt. Profile Matching Engine Tracing & Predictor User Profile Repository Common Basic Functions History Service Composition Usage Metering Identity & User Management Location & Context Mapping Profile Management Engine User Fixed Access Location Sources WLAN GSM/UMTS NFC GPS/A-GPS Geo Database Network ID Database Information Sources Gerald Eichler, Matthias O. Will Slide 12

14 Summary. Preliminary Results. Technology and Services "Context awareness is built upon a protected combination of independently stored profiles, info databases and localisation information. "With mobile devices, supporting multiple access technologies, context awareness becomes more flexible. "Visual codes and maps enable an intuitive user interface for context aware services. User Acceptance and Security "User attractiveness is boosted with personal offers obtained by pull instead of push technology based on individual profiles. "Transient virtual identities for profiles and services protect the user privacy. Profiles and Ontologies "Profiles are considered to be rated ontolgies describing both, user interests and resource offerings. "A positive or negative value indicating preferences and/or objections can be assigned to each node of a user. Business and Success Factors "Location based services become more attractive by extension to context awareness. "Location based and context aware applications need a trusted party to become a business success. "MNOs are in a good position to be accepted as a middleware operator hosting privacy and permission services. Gerald Eichler, Matthias O. Will Slide 13

15 Many thanks for your attention! Any questions? Contacts: Gerald Eichler, Matthias O. Will T-Systems Enterprise Services GmbH, Technologiezentrum ENPS, PCT 42 Deutsche-Telekom-Allee 7, D Darmstadt Telefon: / , / Gerald Eichler, Matthias O. Will Slide 14

Spontaneous Interaction using Mobile Phones and Short Text Messages

Spontaneous Interaction using Mobile Phones and Short Text Messages Spontaneous Interaction using Mobile Phones and Short Text Messages Frank Siegemund Distributed Systems Group, Department of Computer Science, Swiss Federal Institute of Technology (ETH) Zurich, 8092 Zurich,

More information

09. Mobile Commerce. Contents. Mobile Computing and Commerce

09. Mobile Commerce. Contents. Mobile Computing and Commerce 09. (Contents) Mobile Commerce Contents 09. Mobile Commerce Mobile Computing and Commerce Code: 166140-01+02 Course: Electronic Commerce Period: Autumn 2011 Professor: Sangwon Lee, Ph.D. 1 09. (Contents)

More information

Mobile Commerce. Electronic Commerce

Mobile Commerce. Electronic Commerce Mobile Commerce Electronic Commerce Code: 008023-01+02 Course: Electronic Commerce Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic Commerce 1 00. Contents 01. Mobile

More information

From Mobility Management to Connectivity Management

From Mobility Management to Connectivity Management From Mobility Management to Management Jun-Zhao Sun and Jaakko Sauvola MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu P.O.Box 4500, FIN-90014 University of Oulu, Finland {Junzhao.sun,

More information

Version 11

Version 11 The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic

More information

Encapto WiFi OVERVIEW

Encapto WiFi OVERVIEW Encapto WiFi OVERVIEW Encapto WiFi is a one-stop configuration, management, reporting and control system for your WiFi network. Encapto Cloud Deck s intuitive web interface enables secure access from anywhere,

More information

IYOUIT Matthias Wagner

IYOUIT Matthias Wagner IYOUIT Matthias Wagner Smart & Secure Services RG, DOCOMO Euro-Labs Luxembourg, May 11, 2009 Laboratories Europe GmbH Imagine your phone knows Colleague whom whom you you are are with with where where

More information

Context Aware Computing

Context Aware Computing CPET 565/CPET 499 Mobile Computing Systems Context Aware Computing Lecture 7 Paul I-Hai Lin, Professor Electrical and Computer Engineering Technology Purdue University Fort Wayne Campus 1 Context-Aware

More information

SELECTION GUIDE

SELECTION GUIDE www.em4-remote-plc.com SELECTION GUIDE SELECTION GUIDE 02 www.em4-remote-plc.com WHICH DO YOU NEED? Select the em4 that fits your needs The smartest and easiest way to remotely manage equipment and generate

More information

Prof. Dr. Pedro José Marrón

Prof. Dr. Pedro José Marrón Prof. Dr. Pedro José Marrón Location-Based-Services Information services Accessible through mobile devices Using a data network / channel Combining position information with different data sources Correlation

More information

Panel 1 Service Platform and Network Infrastructure for Ubiquitous Services

Panel 1 Service Platform and Network Infrastructure for Ubiquitous Services Panel 1 Platform and Network Infrastructure for Ubiquitous s Wolfgang Kellerer DoCoMo Euro-Labs Munich, Germany WWRF WG2 ( Architecture) Vice Chair DoCoMo Communications Landsberger Str. 312 80687 Munich

More information

Location, Location, Location

Location, Location, Location Location, Location, Location Larry Rudolph 1 Outline Positioning Technology GPS and others Location Specifiers Privacy Issues Universal Location On earth, we need three piece of information: latitude,

More information

10/21/2013. The ubiquity of social media has lead inevitably to the involvement of digital evidence in nearly every segment of Criminal Practice

10/21/2013. The ubiquity of social media has lead inevitably to the involvement of digital evidence in nearly every segment of Criminal Practice Adam Zion Director of Information Technology Office of the Kings County District Attorney The ubiquity of social media has lead inevitably to the involvement of digital evidence in nearly every segment

More information

Realizing Peer-to-Peer Location-Based Services in Mobile Networks

Realizing Peer-to-Peer Location-Based Services in Mobile Networks Realizing Peer-to-Peer Location-Based Services in Mobile Networks Maximilian Zündt 1, Girija Deo 2, Mirko Naumann 3, Dr. Markus Ludwig 4 Institute of Communication Networks 1, Munich University of Technology,

More information

Offline Location Based Services Using Android OS Implemented In Smartphone and Beagleboard Xm

Offline Location Based Services Using Android OS Implemented In Smartphone and Beagleboard Xm ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:

More information

Push-to-Revenue: Maximizing Potential Beyond Basic Push-to-Talk. David Wetherelt, Director International Carrier Sales

Push-to-Revenue: Maximizing Potential Beyond Basic Push-to-Talk. David Wetherelt, Director International Carrier Sales Push-to-Revenue: Maximizing Potential Beyond Basic Push-to-Talk David Wetherelt, Director International Carrier Sales Push-to-Talk: The Application Driving Today s Market The First Killer Application For

More information

Project Data. Proposed duration: 30 months Requested total funding: 2.87 MEUR Strategic objective addressed: IST : Software and Services

Project Data. Proposed duration: 30 months Requested total funding: 2.87 MEUR Strategic objective addressed: IST : Software and Services The SMS project Simple Mobile Services (SMS) The SMS project: creating mobile services that are simple to find, use, trust and develop, and making it easier for individuals and small businesses to become

More information

C O N TA C T !!!!!! Portfolio Summary. for more information July, 2014

C O N TA C T !!!!!! Portfolio Summary. for more information  July, 2014 C O N TA C T IQ Portfolio Summary July, 2014 for more information www.concerttechnology.com bizdev@concerttechnology.com C o n c e r t T e c h n o l o g y Overview SOCIAL GRAPH ContactIQ is a collection

More information

Requirements for the Operations & Management of 4G Networks

Requirements for the Operations & Management of 4G Networks Requirements for the Operations & Management of 4G Networks Prof. James Won-Ki Hong Dept. of Computer Science and Engineering, Korea & Prof. Alberto Leon-Garcia Dept. of Electrical and Computer Engineering

More information

Using RFID and bluetooth for localised interaction with wireless embedded internet devices

Using RFID and bluetooth for localised interaction with wireless embedded internet devices University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2006 Using RFID and bluetooth for localised interaction

More information

Mobile Security Fall 2011

Mobile Security Fall 2011 Mobile Security 14-829 Fall 2011 Patrick Tague Class #9 Smartphones, PANs, and the IoT Announcements HW #2 will be posted this week Project group meetings: I'd like to schedule a meeting with each group

More information

Ambient Aware Information Delivery

Ambient Aware Information Delivery Ambient Aware Information Delivery Stephan Steglich, Christian Räck, Stefan Arbanowski steglich@cs.tu-berlin.de, @fokus.fraunhofer.de Technical University Berlin / Fraunhofer FOKUS Institute

More information

Concepts, Technology, and Applications of Mobile Commerce

Concepts, Technology, and Applications of Mobile Commerce Concepts, Technology, and Applications of Mobile Commerce Robert Nickerson Professor and Chair Department of Information Systems Director, Center for Electronic Business College of Business San Francisco

More information

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering

Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M course (8 ECTS) II Term Academic Year 2016/2017 08 Application Domains

More information

Enterprise Data Catalog for Microsoft Azure Tutorial

Enterprise Data Catalog for Microsoft Azure Tutorial Enterprise Data Catalog for Microsoft Azure Tutorial VERSION 10.2 JANUARY 2018 Page 1 of 45 Contents Tutorial Objectives... 4 Enterprise Data Catalog Overview... 5 Overview... 5 Objectives... 5 Enterprise

More information

LBS 2.0 Enabling User-driven Provision and Contextaware Utilisation of Location-based Services

LBS 2.0 Enabling User-driven Provision and Contextaware Utilisation of Location-based Services LBS 2.0 Enabling User-driven Provision and Contextaware Utilisation of Location-based Services Matthias Böhmer, Gernot Bauer, Wolfgang Wicht Münster University of Applied Sciences UBICOMM 2008 September

More information

Cisco Access Policy Server

Cisco Access Policy Server Data Sheet Cisco Access Policy Server The Cisco Access Policy Server is a fully virtualized, carrier-grade network discovery, selection, and authentication solution. It uses the Cisco Policy Suite policy,

More information

Browsing the World in the Sensors Continuum. Franco Zambonelli. Motivations. all our everyday objects all our everyday environments

Browsing the World in the Sensors Continuum. Franco Zambonelli. Motivations. all our everyday objects all our everyday environments Browsing the World in the Sensors Continuum Agents and Franco Zambonelli Agents and Motivations Agents and n Computer-based systems and sensors will be soon embedded in everywhere all our everyday objects

More information

Nomadic devices Benefits and market outlook

Nomadic devices Benefits and market outlook Nomadic devices Benefits and market outlook Johannes Dünnwald Nokia Automotive Ertico - Jan20th, 2005 First European Nomadic Devices Workshop 1 NOKIA 2004 Nokia Automotive Founded 1996 as Nokia Smart Traffic

More information

Policy-Based Context-Management for Mobile Solutions

Policy-Based Context-Management for Mobile Solutions Policy-Based Context-Management for Mobile Solutions Caroline Funk 1,Björn Schiemann 2 1 Ludwig-Maximilians-Universität München Oettingenstraße 67, 80538 München caroline.funk@nm.ifi.lmu.de 2 Siemens AG,

More information

Mobile based Text Image Translation System for Smart Tourism. Saw Zay Maung Maung UCSY, Myanmar. 23 November 2017, Brunei

Mobile based Text Image Translation System for Smart Tourism. Saw Zay Maung Maung UCSY, Myanmar. 23 November 2017, Brunei Mobile based Text Image Translation System for Smart Tourism Saw Zay Maung Maung UCSY, Myanmar. 23 November 2017, Brunei 1 Smart Tourism Tourism is cultural and economic phenomenon which entails the movement

More information

Glossary 1. ARPU or Average Revenue per User A method of measuring revenue associated with the delivery of mobile commerce services by MNOs.

Glossary 1. ARPU or Average Revenue per User A method of measuring revenue associated with the delivery of mobile commerce services by MNOs. Glossary 321 Glossary 1 2G or 2nd Generation The currently available digital communication networks for voice and data communication (e.g., GSM, CDMA, PDC). 2.5G or 2.5th Generation Represents an upgrade

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #4 Wireless Systems II Project proposals: Announcements Written proposal due in 1 week Presentation in class in 1 week Contact me to discuss

More information

Alpha Scanner Pro User manual

Alpha Scanner Pro User manual WWW.MYALPHALABS.COM Alpha Scanner Pro User manual myalphalabs, #105, 1 st Floor, Meenaakshi Paradise Apartment, 2 nd Main, 3 rd Block, Hosapalya Main Road, Yellukunte. Bangalore, INDIA. Pin Code 560068.

More information

Supporting Nomadic Agent-based Applications in the FIPA Agent Architecture

Supporting Nomadic Agent-based Applications in the FIPA Agent Architecture Supporting Nomadic Agent-based Applications in the FIPA Agent Architecture Heikki Helin (Heikki.j.Helin@teliasonera.com) FDPW 03, Petrozavodsk, June 26 th, 2003 Introduction Multi-agent system implementing

More information

CAPNET Program Context-aware Pervasive Networking Mobile Forum s Research Focus Area

CAPNET Program Context-aware Pervasive Networking Mobile Forum s Research Focus Area CAPNET Program Context-aware Pervasive Networking Mobile Forum s Research Focus Area Contents Introduction to the CAPNET Program Further information on application scenarios illustrated in videos CAPNET

More information

Mobile Internet: Business Necessity or Toys for Boys?

Mobile Internet: Business Necessity or Toys for Boys? Mobile Internet: Business Necessity or Toys for Boys? Antonio Prišan, B. Sc. EE Business Internet Solution Manager Product Development, Marketing and Sales Department VIPnet d.o.o. a.priscan@vipnet.hr

More information

DocVerify Document Library Tutorial.

DocVerify Document Library Tutorial. DocVerify Document Library Tutorial www.docverify.com Table of Contents Step 1 Create a New PDF Document OR Existing PDF:... 4 Step 2 Click Add New :... 4 Step 3 Add New Library Document Button:... 5 Step

More information

White Paper. EVERY THING CONNECTED How Web Object Technology Is Putting Every Physical Thing On The Web

White Paper. EVERY THING CONNECTED How Web Object Technology Is Putting Every Physical Thing On The Web White Paper EVERY THING CONNECTED Is Putting Every Physical Thing Every Thing Connected The Internet of Things a term first used by technology visionaries at the AUTO-ID Labs at MIT in the 90s 1 has received

More information

Thin Client Content Options

Thin Client Content Options Content Adaptation and Provisioning David Tipper Associate Professor Department of Information Science and Telecommunications University of Pittsburgh tipper@tele.pitt.edu http://www.sis.pitt.edu/~dtipper/2727.html

More information

Context-Aware Systems. Michael Maynord Feb. 24, 2014

Context-Aware Systems. Michael Maynord Feb. 24, 2014 Context-Aware Systems Michael Maynord Feb. 24, 2014 The precise definition of 'context' is contentious. Here we will be using 'context' as any information that can be used to characterize the situation

More information

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK. Sub.Code/ Name : IT1452 FUNDAMENTALS OF PERVASIVE COMPUTING

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK. Sub.Code/ Name : IT1452 FUNDAMENTALS OF PERVASIVE COMPUTING IT1452 Fundamentals Of Pervasive Computing 1 KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Sub.Code/ Name : IT1452 FUNDAMENTALS OF PERVASIVE COMPUTING Year / Sem : IV

More information

Energy market: Opportunities and Technologies

Energy market: Opportunities and Technologies Energy market: Opportunities and Technologies Dominique Vincent Business Development Manager, Digi Singapore Market opportunities Agenda Energy Management: X-Grid, SmartLee, Smart metering: market, technology

More information

Glossary. xii. Marina Yue Zhang and Mark Dodgson Downloaded from Elgar Online at 02/04/ :16:01PM via free access

Glossary. xii. Marina Yue Zhang and Mark Dodgson Downloaded from Elgar Online at 02/04/ :16:01PM via free access Glossary 2.5G Second-and-a-half Generation mobile communications system 3G Third Generation mobile communications system 3GPP The Third Generation Partnership Project ADSL Asymmetric Digital Subscriber

More information

System Challenges for Pervasive and Ubiquitous Computing

System Challenges for Pervasive and Ubiquitous Computing System Challenges for Pervasive and Ubiquitous Computing 18 th Roy Want Intel Research May 2005, ICSE 05 St. Louis th May 2005, ICSE What is Ubiquitous Computing? The most profound technologies are those

More information

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64

Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64 Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester Subject: Mobile Computing Contact Hrs / week: 4 Total hrs: 64 Table of Contents SN Topic Hours Marks 1 Introduction

More information

Overview. M-commerce vs. E-commerce

Overview. M-commerce vs. E-commerce M-COMMERCE Overview What is M-Commerce? M-commerce vs. E-commerce Classes of M-Commerce Applications Benefits of M-commerce Advantages of M-Commerce Disadvantages of M-Commerce Mobile Computing: Content,

More information

THE SECOND WEB. 1 March John Blossom, President, Shore Communications Inc.

THE SECOND WEB. 1 March John Blossom, President, Shore Communications Inc. THE SECOND WEB John Blossom, President, Shore Communications Inc. About Shore 1 Web: shore.com Content Marketing Strategists Enhance your strategies for publishing and content technology products and services

More information

Enabling the Mobile Service Access

Enabling the Mobile Service Access Enabling the Mobile Access Telecommunications Forum, 1.11.2000 Petteri.Koponen@ firsthop.com www.firsthop.com Presentation Agenda Market vision First Hop overview First Hop products Future Outlook 1 Market

More information

Contents. Mobile Middleware Course. Introduction and Overview Sasu Tarkoma. Lecture Outline. Course Book. Mobile Evolution.

Contents. Mobile Middleware Course. Introduction and Overview Sasu Tarkoma. Lecture Outline. Course Book. Mobile Evolution. Contents Mobile Middleware Course Introduction and Overview Sasu Tarkoma Lecture outline Motivation Mobile middleware overview Examples Summary Lecture Outline Course Book 16.3. 16-18 Introduction and

More information

Smart Homes and Cities

Smart Homes and Cities Smart Homes and Cities 1 Wireless Sensors at Smart Home Security sensors, cameras, thermostats, smart plugs, lights, Entertainment systems. Do-it-Yourself (DIY) sensors Actuators Smart plug Motion detector

More information

Feature Extraction in Wireless Personal and Local Area Networks

Feature Extraction in Wireless Personal and Local Area Networks Feature Extraction in Wireless Personal and Local Area Networks 29. October 2003, Singapore Institut für Praktische Informatik Johannes Kepler Universität Linz, Austria rene@soft.uni-linz.ac.at < 1 > Content

More information

Sentinet for BizTalk Server SENTINET

Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication

More information

CEN 538 Wireless LAN & MAN Networks

CEN 538 Wireless LAN & MAN Networks King Saud University College of Computer and Information Sciences Department of Computer Engineering CEN 538 Wireless LAN & MAN Networks Dr. Ridha OUNI rouni@ksu.edu.sa LMS web site References Text book

More information

How to Select the Right Marketing Cloud Edition

How to Select the Right Marketing Cloud Edition How to Select the Right Marketing Cloud Edition Email Studio, Mobile Studio, and Web Studio ith Salesforce Marketing Cloud, marketers have one platform to manage 1-to-1 customer journeys through the entire

More information

Metadata, Chief technicolor

Metadata, Chief technicolor Metadata, the future of home entertainment Christophe Diot Christophe Diot Chief Scientist @ technicolor 2 2011-09-26 What is a metadata? Metadata taxonomy Usage metadata Consumption (number of views,

More information

Building Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey

Building Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey Building Pervasive Computing Applications on Sensor Networks Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Introduction: Sensor Networks Wireless Sensor Nets Telecom Internet + Telecom

More information

Application management in Nokia: Getting the most from Company Apps

Application management in Nokia: Getting the most from Company Apps Application management in Nokia: Getting the most from Case Study 2 Contents 1 Challenge...3 2...5 2.1 Deployment options...5 2.2 App security and authentication...7 2.3 Nokia...7 3 Company Hub...9 3.1

More information

Seamless integration of heterogeneous wireless network technologies -?/!

Seamless integration of heterogeneous wireless network technologies -?/! Seamless integration of heterogeneous wireless network technologies -?/! Jochen Schiller Computer Systems & Telematics Freie Universität Berlin Germany schiller@computer.org Prof. Dr.-Ing. Jochen Schiller,

More information

Beyond RFID - Internet of Things

Beyond RFID - Internet of Things Beyond RFID - Internet of Things 4. Vision Mark Harrison 11th February 2008 What do we mean by the Internet of Things? Connecting objects and locations in the real world to information on the web Considering

More information

iapps Experience Manager

iapps Experience Manager iapps Experience Manager Manage your customers journey with a web content management system built on a marketing automation engine. Copyright Bridgeline Digital Inc. bridgeline.com 1-800-603-9936 Building

More information

Carrier APIs do they offer more or less than 3rd parties?

Carrier APIs do they offer more or less than 3rd parties? Carrier APIs do they offer more or less than 3rd parties? Bryan Sullivan, AT&T non-proprietary/public information But first, we interrupt our program for Somewhere Over the Top An Open Platform is a Beautiful

More information

How HP is implementing an Omnichannel support experience

How HP is implementing an Omnichannel support experience How HP is implementing an Omnichannel support experience Fulvio Marfoni HP What Omni-Channel Customer Support Experience means Omni-channel is a multichannel approach that seeks to provide the customer

More information

AT&T Government Solutions, Inc. Lewis Hart & Patrick Emery

AT&T Government Solutions, Inc. Lewis Hart & Patrick Emery AT&T Government Solutions, Inc. Lewis Hart & Patrick Emery http://codip.grci.com Program Overview Problems Addressed intelligent distribution of information based on its semantics Integration of multiple

More information

Context software. A prototype platform for contextual mobile applications. Mika Raento

Context software. A prototype platform for contextual mobile applications. Mika Raento Context software A prototype platform for contextual mobile applications Mika Raento Basic Research Unit, Helsinki Institute for Information Technology Department of Computer Science, University of Helsinki

More information

Mobile Middleware Course. Introduction and Overview Sasu Tarkoma

Mobile Middleware Course. Introduction and Overview Sasu Tarkoma Mobile Middleware Course Introduction and Overview Sasu Tarkoma Contents Course outline Motivation Mobile middleware overview Course Overview 4 credit course Three components Lectures Assignment Literature

More information

Real Estate Mobile App Features

Real Estate Mobile App Features Real Estate Mobile App Features How To Review The App Demo On Your Device Download the Preview Your App app today on your ios or Android Devices from the App Store or Google Play Store. To view this demo

More information

PRISM: Platform for Remote Sensing using Smartphones

PRISM: Platform for Remote Sensing using Smartphones PRISM: Platform for Remote Sensing using Smartphones Tathagata Das Microsoft Research India Bangalore 560080, India tathadas@microsoft.com Prashanth Mohan University of California, Berkeley Berkeley, CA

More information

Recognizing and Predicting Context by Learning from User Behavior

Recognizing and Predicting Context by Learning from User Behavior Recognizing and Predicting Context by Learning from User Behavior 15. September 2003, Jakarta Institut für Praktische Informatik Johannes Kepler Universität Linz, Austria rene@soft.uni-linz.ac.at < 1 >

More information

Chapter 7. Telecommunications, the Internet, and Wireless Technology

Chapter 7. Telecommunications, the Internet, and Wireless Technology Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different

More information

Many countries decided on IMT-2000

Many countries decided on IMT-2000 s Evolution Evgeni Karakanovsky Director Business Development and s MobilTel EAD UMTS Forum member Many countries decided on IMT-2000 Today s s Market Status June 2002 worldwide Voice > 1 billion users

More information

Connect with Remedy: SmartIT: Social Event Manager Webinar Q&A

Connect with Remedy: SmartIT: Social Event Manager Webinar Q&A Connect with Remedy: SmartIT: Social Event Manager Webinar Q&A Q: Will Desktop/browser alerts be added to notification capabilities on SmartIT? A: In general we don't provide guidance on future capabilities.

More information

Mobile Computing Introduction

Mobile Computing Introduction Mobile Computing Introduction UNIT - 1 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. What is Mobile Computing 2 NTIIN PANDYA 3 NTIIN PANDYA Definitions Mobile Computing What is mobile computing?

More information

Turban and Volonino. Mobile Commerce. Information Technology for Management Improving Performance in the Digital Economy

Turban and Volonino. Mobile Commerce. Information Technology for Management Improving Performance in the Digital Economy Turban and Volonino Chapter 7 Mobile Commerce Information Technology for Management Improving Performance in the Digital Economy 7 th edition John Wiley & Sons, Inc. Slides contributed by Dr. Sandra Reid

More information

Secure Over-The-Air Services in NFC Ecosystems

Secure Over-The-Air Services in NFC Ecosystems Secure Over-The-Air Services in NFC Ecosystems Sirpa Nordlund Venyon Hagenberg March 20th, 2007 Contents of the presentation 1. Building up NFC ecosystem 2. Trusted third party and value proposition 3.

More information

Android Samsung Galaxy S6 Edge

Android Samsung Galaxy S6 Edge Android 6.0.1 Samsung Galaxy S6 Edge Access your quick menu by using two fingers to pull down the menu from the top-center of the screen. You can use this to quickly turn your Wi-Fi, Location, Bluetooth,

More information

DRAFT. University of Colorado Advanced Technology Series. Bob Marcus

DRAFT. University of Colorado Advanced Technology Series. Bob Marcus University of Colorado Advanced Technology Series Bob Marcus marcus@roguewave.com Time Frames and Possible Collaboration between RW and UC Far future - We could support your research with software Near

More information

Cisco Prime Home 5.1 Technical

Cisco Prime Home 5.1 Technical Data Sheet Cisco Prime Home 5.1 Technical The proliferation of Internet-connected devices and the explosion of video and data traffic are driving complexity in the home network. Increasing numbers of new

More information

Corporate R&D: Excellence in Wireless Innovation. September

Corporate R&D: Excellence in Wireless Innovation. September Corporate R&D: Excellence in Wireless Innovation September 2011 www.qualcomm.com/research State of the Art Capabilities Fostering Innovation Human Resources Complete Development Labs 30% of engineers with

More information

Watchdata SIMachine (M2M Solution)

Watchdata SIMachine (M2M Solution) Watchdata SIMachine (M2M Solution) A Introduction to M2M B Introduction to SIMachine C SIMachine Product Applications Technology Evolution ~ 1950 ~ 1980 ~ 1995 ~ 1999 Computer Internet Mobile Communication

More information

AutoMedia: Linking the Vehicle with Consumer Electronics and Services. Jason Flinn. University of Michigan

AutoMedia: Linking the Vehicle with Consumer Electronics and Services. Jason Flinn. University of Michigan AutoMedia: Linking the Vehicle with Consumer Electronics and Services University of Michigan Problem: Vehicle is an island Each vehicle is an island unto itself data crosses the border generally with carried

More information

Self-Sensing Spaces: Smart Plugs For Smart Environments

Self-Sensing Spaces: Smart Plugs For Smart Environments Self-Sensing Spaces: Smart Plugs For Smart Environments Hicham Elzabadani, Abdelsalam (Sumi) Helal, Bessam Abdulrazak and Erwin Jansen Computer and Information Science and Engineering Department University

More information

Lesson 1 Key-Terms Meanings: Web Connectivity of Devices and Devices Network

Lesson 1 Key-Terms Meanings: Web Connectivity of Devices and Devices Network Lesson 1 Key-Terms Meanings: Web Connectivity of Devices and Devices Network 1 Application Application: A software (S/W) for an application, such as, creating and sending an SMS, measuring and sending

More information

Towards a Delay-tolerant Future: Reconsidering some Assumptions in Networking. Reconsidering the Internet Design. Number of layers

Towards a Delay-tolerant Future: Reconsidering some Assumptions in Networking. Reconsidering the Internet Design. Number of layers Towards a Delay-tolerant Future: Reconsidering some ssumptions in Networking CHINTI Jörg tt 2 July 2009 tubs.city 2009 Jörg tt 1 Reconsidering the Internet Design Communication paradigms

More information

Is SharePoint the. Andrew Chapman

Is SharePoint the. Andrew Chapman Is SharePoint the Andrew Chapman Records management (RM) professionals have been challenged to manage electronic data for some time. Their efforts have tended to focus on unstructured data, such as documents,

More information

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2 Forescout Version 1.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Wireless Network Security Spring 2013

Wireless Network Security Spring 2013 Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity

More information

3CX Mobile Device Manager

3CX Mobile Device Manager 3CX Mobile Device Manager Manual 1 Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples

More information

Camera Phones with Pen Input as Annotation Devices

Camera Phones with Pen Input as Annotation Devices Camera Phones with Pen Input as Annotation Devices Michael Rohs and Christof Roduner Department of Computer Science ETH Zürich ETH Zürich Taskforce Kommunikation Camera Phones with Pen Input for Generating

More information

The Core-Edge Dynamics Toolkit

The Core-Edge Dynamics Toolkit The Core-Edge Dynamics Toolkit Objective: Turn methodology into step-by-step tools for sponsors to apply to their own case studies Approach: Use current taxonomy and methodology Apply methods and lessons

More information

Applying MUPE Context Producers in developing Location and Context Aware Applications

Applying MUPE Context Producers in developing Location and Context Aware Applications Applying MUPE Context Producers in developing Location and Context Aware Applications Kimmo Koskinen kimmo.m.koskinen@iki.fi Kari Heikkinen kari.heikkinen@lut.fi Jouni Ikonen jouni.ikonen@lut.fi Lappeenranta

More information

WLAN Connection Manual SPP-R410. Mobile Printer Rev

WLAN Connection Manual SPP-R410. Mobile Printer Rev WLAN Connection Manual SPP-R410 Mobile Printer Rev. 1.00 http://www.bixolon.com Table of Contents 1. Manual Information... 3 2. Precautions... 3 3. How to Connect... 4 3-1 Android Soft AP mode... 6 3-2

More information

Accelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation

Accelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation Accelerating solutions for highway safety, renewal, reliability, and capacity Regional Operations Forums Connected Vehicles and the Future of Transportation ti Session Overview What are connected and automated

More information

WebSphere Puts Business In Motion. Put People In Motion With Mobile Apps

WebSphere Puts Business In Motion. Put People In Motion With Mobile Apps WebSphere Puts Business In Motion Put People In Motion With Mobile Apps Use Mobile Apps To Create New Revenue Opportunities A clothing store increases sales through personalized offers Customers can scan

More information

Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008

Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008 Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008 Prof. D. Raychaudhuri ray@winlab.rutgers.edu www.winlab.rutgers.edu 1 Introduction: The Promise of Wireless Everywhere

More information

Banner Connected Data Solutions Web Service

Banner Connected Data Solutions Web Service Banner Connected Data Solutions Web Service Instruction Manual Original Instructions 178337 Rev. E 14 September 2018 Banner Engineering Corp. All rights reserved 178337 Contents 1 Banner Web Services...

More information

Integration of distributed data sources for mobile services

Integration of distributed data sources for mobile services Integration of distributed data sources for mobile services Gianpietro Ammendola, Alessandro Andreadis, Giuliano Benelli, Giovanni Giambene Dipartimento di Ingegneria dell Informazione, Università di Siena

More information

Actionable User Intentions for Real-Time Mobile Assistant Applications

Actionable User Intentions for Real-Time Mobile Assistant Applications Actionable User Intentions for Real-Time Mobile Assistant Applications Thimios Panagos, Shoshana Loeb, Ben Falchuk Applied Research, Telcordia Technologies One Telcordia Drive, Piscataway, New Jersey,

More information

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products CIAM: Need for Identity Governance & Assurance Yash Prakash VP of Products Key Tenets of CIAM Solution Empower consumers, CSRs & administrators Scale to millions of entities, cloud based service Security

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Prof Cecilia Mascolo About Me time In this course The course will include aspects related to general understanding of Mobile and ubiquitous

More information