Profiles and Context Awareness for Mobile Users a Middleware Approach supporting Personal Security.
|
|
- Annabel Carter
- 6 years ago
- Views:
Transcription
1 Profiles and Context Awareness for Mobile Users a Middleware Approach supporting Personal Security. Security of Pervasive Communication, SPC 06 T-Systems Enterprise Services GmbH Technologiezentrum ENPS Gerald Eichler, Matthias O. Will
2 Outline... or what can you expect from the upcoming 25 minutes?! Paradigm change for new mobility! Device binding; theses & trends! Profiles and its handling! Ontologies; user & interest profiles! Basic middleware approach: Contigo Toolbox! Context awareness! Sample applications! Use of visual codes! Localisation contextualisation individualisation! Middleware approach! Mobile network operator positioning! Permission & Privacy Gateway + Profile Management Engine! Summary and preliminary results Gerald Eichler, Matthias O. Will Slide 1
3 Paradigm Change. Changed Binding of End User Devices. Multiple dedicated devices Shared & planned usage Stand alone services Multi-functional devices Personal & ad-hoc usage Community services hard binding soft binding Gerald Eichler, Matthias O. Will Slide 2
4 Paradigm Change. Theses on the New Mobility. Digital signatures Context awareness Wireless broadband Communication and information technology go mobile. Miniaturisation Devices representing their users. Interaction Edutainment Localisation Content creation Users want to be involved. Pull vs. push Multiple roles Life runs faster. Context hopping Contents feed individual requests. Personalisation Common devices Filtering/matching Private meets business. Business flexibility Gerald Eichler, Matthias O. Will Slide 3
5 Paradigm Change. Challenging Factors about the New Mobility. Technical trends Economical trends "Powerful smart phones (PDA + cellular) "Multiple access technologies (GPRS, UMTS, WLAN, WiMAX) "Multi-media content exchange (speech, textual SMS, still picture/video MMS, Web n Walk) "Ad-hoc device peering (Bluetooth, IrDA) New personal mobility "Context awareness (location, time, current work) "Open mobile communication culture (interruptability) "Publication of very personal issues (BLOGs, VLOGs) Social trends "Cheaper mobile devices "Bundle offers for sale "Decreasing communication costs (flat rates) "High market penetration of mobile services And who cares about SECURITY?? User Network Provider Service Provider?! Gerald Eichler, Matthias O. Will Slide 4
6 Profiles. User Profile and Semantic Network.! User interests & rejections! are collected by protected user profiles, called Interest Profiles User 1 1..* User Profile * 0..* Interest Rejection! Domains! are represented a set of concepts Pop! are bundled by sub ontologies! Object characteristics! are collected by Resource Profiles! Matching! discovers similarities between Interest and Resource Profiles Frozen contains Don t cry.. Musical is_genre contains is_genre Gr. Hits 2 Evita OST contains performs performs Madonna Gerald Eichler, Matthias O. Will Slide 5
7 Profiles. Manually Ontology based Editing.! User profiles are represented by rated ontologies on selected granularity Hierarchical modelling of characteristics Activation and rating per leaf and /or sub tree Selection of value type (binary, discrete, float) Direct numerical input Graphical input by slider Storage of sub profile Gerald Eichler, Matthias O. Will Slide 6
8 Basic Middleware Approach. Contextual Information to Go (Contigo) Toolbox. Service and User Management Portal XML 3rd Party Services 3rd Application Party Services Services (3rd Party Applications) XML External Systems and Data Bases? API API API API API API API Administration Basic Service Profile BS Matching BS User History BS Annotation BS Tagging & Device BS not yet defined Data Import Filter SQL XML Protected Repository User DB Service DB Accounting DB History DB SQL Protected API Core Profile Management Engine (PME) Protected Profile DB Gerald Eichler, Matthias O. Will Slide 7
9 Context Awareness. Use of Tags: Example - Visual Codes in Visual Maps.! Multiple sources for tag based identification! RFID! Network IDs (GSM cells, WLAN SSIDs,...)! Visual codes (2D barcodes) 96 bits URL association! Advantages of 2D barcodes Unique identifier for visual maps Photographic recognition Multi-functional with angle rotation Easy printable (magazine, wall paper) Without mystery (pull required) Gerald Eichler, Matthias O. Will Slide 8
10 Context Awareness. Mobile & Context aware Applications: T-Systems R&D Prototypes. Stand alone ideas! Context Awareness! Product Find & Information Service! Annotation Service! Contact Builder Identification of common modules! Localisation! Mobile Find Service! Mobile Alerting Service! Mobile Coupon Service Modular framework Gerald Eichler, Matthias O. Will Slide 9
11 Context Awareness. Recombination of Information Sources in Privacy Context. Service Trigger Event Information Sources Personal Area Non Privacy Area Localisation (longitude, latitude) Contextualisation Filtering Matching Individualisation Pseudonymisation Network ID Database Tracing & Prediction Geo Database User Profile Repository User History Service Specific Personal Context Annotation/Rating Gerald Eichler, Matthias O. Will Slide 10
12 Extended Middleware Approach. Mobile Network Operators in the Context aware Environment.! Complex composition of social, technical and legal facts Pro context awareness Contra context awareness! Mobile network operators as trustable partner of customers! New thinking in daily handling with personal mobility! Individual adjustment according user interests and habits # Configurable, modular services # Personal profiles! Improved infrastructure, services and technical base! Acceptance, security issues, no trust in start ups! Complex and inhomogeneous technical infrastructure! High costs for active localisation; high network dynamics! Subscription handling, bundle bindings! Open legal issues (property rights)! Poor usability of mobile devices (missing service individualisation) Gerald Eichler, Matthias O. Will Slide 11
13 Extended Middleware Approach. Permission & Privacy Gateway + Profile Management Engine. User Mobile Access Mobile Services Coupon Service Alert Service Ressource Finder Find Services Contact Builder Context Services Permission & Privacy Gateway Privacy & Permission Mgmt. Profile Matching Engine Tracing & Predictor User Profile Repository Common Basic Functions History Service Composition Usage Metering Identity & User Management Location & Context Mapping Profile Management Engine User Fixed Access Location Sources WLAN GSM/UMTS NFC GPS/A-GPS Geo Database Network ID Database Information Sources Gerald Eichler, Matthias O. Will Slide 12
14 Summary. Preliminary Results. Technology and Services "Context awareness is built upon a protected combination of independently stored profiles, info databases and localisation information. "With mobile devices, supporting multiple access technologies, context awareness becomes more flexible. "Visual codes and maps enable an intuitive user interface for context aware services. User Acceptance and Security "User attractiveness is boosted with personal offers obtained by pull instead of push technology based on individual profiles. "Transient virtual identities for profiles and services protect the user privacy. Profiles and Ontologies "Profiles are considered to be rated ontolgies describing both, user interests and resource offerings. "A positive or negative value indicating preferences and/or objections can be assigned to each node of a user. Business and Success Factors "Location based services become more attractive by extension to context awareness. "Location based and context aware applications need a trusted party to become a business success. "MNOs are in a good position to be accepted as a middleware operator hosting privacy and permission services. Gerald Eichler, Matthias O. Will Slide 13
15 Many thanks for your attention! Any questions? Contacts: Gerald Eichler, Matthias O. Will T-Systems Enterprise Services GmbH, Technologiezentrum ENPS, PCT 42 Deutsche-Telekom-Allee 7, D Darmstadt Telefon: / , / Gerald Eichler, Matthias O. Will Slide 14
Spontaneous Interaction using Mobile Phones and Short Text Messages
Spontaneous Interaction using Mobile Phones and Short Text Messages Frank Siegemund Distributed Systems Group, Department of Computer Science, Swiss Federal Institute of Technology (ETH) Zurich, 8092 Zurich,
More information09. Mobile Commerce. Contents. Mobile Computing and Commerce
09. (Contents) Mobile Commerce Contents 09. Mobile Commerce Mobile Computing and Commerce Code: 166140-01+02 Course: Electronic Commerce Period: Autumn 2011 Professor: Sangwon Lee, Ph.D. 1 09. (Contents)
More informationMobile Commerce. Electronic Commerce
Mobile Commerce Electronic Commerce Code: 008023-01+02 Course: Electronic Commerce Period: Autumn 2013 Professor: Sync Sangwon Lee, Ph. D D. of Information & Electronic Commerce 1 00. Contents 01. Mobile
More informationFrom Mobility Management to Connectivity Management
From Mobility Management to Management Jun-Zhao Sun and Jaakko Sauvola MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu P.O.Box 4500, FIN-90014 University of Oulu, Finland {Junzhao.sun,
More informationVersion 11
The Big Challenges Networked and Electronic Media European Technology Platform The birth of a new sector www.nem-initiative.org Version 11 1. NEM IN THE WORLD The main objective of the Networked and Electronic
More informationEncapto WiFi OVERVIEW
Encapto WiFi OVERVIEW Encapto WiFi is a one-stop configuration, management, reporting and control system for your WiFi network. Encapto Cloud Deck s intuitive web interface enables secure access from anywhere,
More informationIYOUIT Matthias Wagner
IYOUIT Matthias Wagner Smart & Secure Services RG, DOCOMO Euro-Labs Luxembourg, May 11, 2009 Laboratories Europe GmbH Imagine your phone knows Colleague whom whom you you are are with with where where
More informationContext Aware Computing
CPET 565/CPET 499 Mobile Computing Systems Context Aware Computing Lecture 7 Paul I-Hai Lin, Professor Electrical and Computer Engineering Technology Purdue University Fort Wayne Campus 1 Context-Aware
More informationSELECTION GUIDE
www.em4-remote-plc.com SELECTION GUIDE SELECTION GUIDE 02 www.em4-remote-plc.com WHICH DO YOU NEED? Select the em4 that fits your needs The smartest and easiest way to remotely manage equipment and generate
More informationProf. Dr. Pedro José Marrón
Prof. Dr. Pedro José Marrón Location-Based-Services Information services Accessible through mobile devices Using a data network / channel Combining position information with different data sources Correlation
More informationPanel 1 Service Platform and Network Infrastructure for Ubiquitous Services
Panel 1 Platform and Network Infrastructure for Ubiquitous s Wolfgang Kellerer DoCoMo Euro-Labs Munich, Germany WWRF WG2 ( Architecture) Vice Chair DoCoMo Communications Landsberger Str. 312 80687 Munich
More informationLocation, Location, Location
Location, Location, Location Larry Rudolph 1 Outline Positioning Technology GPS and others Location Specifiers Privacy Issues Universal Location On earth, we need three piece of information: latitude,
More information10/21/2013. The ubiquity of social media has lead inevitably to the involvement of digital evidence in nearly every segment of Criminal Practice
Adam Zion Director of Information Technology Office of the Kings County District Attorney The ubiquity of social media has lead inevitably to the involvement of digital evidence in nearly every segment
More informationRealizing Peer-to-Peer Location-Based Services in Mobile Networks
Realizing Peer-to-Peer Location-Based Services in Mobile Networks Maximilian Zündt 1, Girija Deo 2, Mirko Naumann 3, Dr. Markus Ludwig 4 Institute of Communication Networks 1, Munich University of Technology,
More informationOffline Location Based Services Using Android OS Implemented In Smartphone and Beagleboard Xm
ORIENTAL JOURNAL OF COMPUTER SCIENCE & TECHNOLOGY An International Open Free Access, Peer Reviewed Research Journal Published By: Oriental Scientific Publishing Co., India. www.computerscijournal.org ISSN:
More informationPush-to-Revenue: Maximizing Potential Beyond Basic Push-to-Talk. David Wetherelt, Director International Carrier Sales
Push-to-Revenue: Maximizing Potential Beyond Basic Push-to-Talk David Wetherelt, Director International Carrier Sales Push-to-Talk: The Application Driving Today s Market The First Killer Application For
More informationProject Data. Proposed duration: 30 months Requested total funding: 2.87 MEUR Strategic objective addressed: IST : Software and Services
The SMS project Simple Mobile Services (SMS) The SMS project: creating mobile services that are simple to find, use, trust and develop, and making it easier for individuals and small businesses to become
More informationC O N TA C T !!!!!! Portfolio Summary. for more information July, 2014
C O N TA C T IQ Portfolio Summary July, 2014 for more information www.concerttechnology.com bizdev@concerttechnology.com C o n c e r t T e c h n o l o g y Overview SOCIAL GRAPH ContactIQ is a collection
More informationRequirements for the Operations & Management of 4G Networks
Requirements for the Operations & Management of 4G Networks Prof. James Won-Ki Hong Dept. of Computer Science and Engineering, Korea & Prof. Alberto Leon-Garcia Dept. of Electrical and Computer Engineering
More informationUsing RFID and bluetooth for localised interaction with wireless embedded internet devices
University of Wollongong Research Online Faculty of Engineering and Information Sciences - Papers: Part A Faculty of Engineering and Information Sciences 2006 Using RFID and bluetooth for localised interaction
More informationMobile Security Fall 2011
Mobile Security 14-829 Fall 2011 Patrick Tague Class #9 Smartphones, PANs, and the IoT Announcements HW #2 will be posted this week Project group meetings: I'd like to schedule a meeting with each group
More informationAmbient Aware Information Delivery
Ambient Aware Information Delivery Stephan Steglich, Christian Räck, Stefan Arbanowski steglich@cs.tu-berlin.de, @fokus.fraunhofer.de Technical University Berlin / Fraunhofer FOKUS Institute
More informationConcepts, Technology, and Applications of Mobile Commerce
Concepts, Technology, and Applications of Mobile Commerce Robert Nickerson Professor and Chair Department of Information Systems Director, Center for Electronic Business College of Business San Francisco
More informationAlma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering
Mobile Systems M Alma Mater Studiorum University of Bologna CdS Laurea Magistrale (MSc) in Computer Science Engineering Mobile Systems M course (8 ECTS) II Term Academic Year 2016/2017 08 Application Domains
More informationEnterprise Data Catalog for Microsoft Azure Tutorial
Enterprise Data Catalog for Microsoft Azure Tutorial VERSION 10.2 JANUARY 2018 Page 1 of 45 Contents Tutorial Objectives... 4 Enterprise Data Catalog Overview... 5 Overview... 5 Objectives... 5 Enterprise
More informationLBS 2.0 Enabling User-driven Provision and Contextaware Utilisation of Location-based Services
LBS 2.0 Enabling User-driven Provision and Contextaware Utilisation of Location-based Services Matthias Böhmer, Gernot Bauer, Wolfgang Wicht Münster University of Applied Sciences UBICOMM 2008 September
More informationCisco Access Policy Server
Data Sheet Cisco Access Policy Server The Cisco Access Policy Server is a fully virtualized, carrier-grade network discovery, selection, and authentication solution. It uses the Cisco Policy Suite policy,
More informationBrowsing the World in the Sensors Continuum. Franco Zambonelli. Motivations. all our everyday objects all our everyday environments
Browsing the World in the Sensors Continuum Agents and Franco Zambonelli Agents and Motivations Agents and n Computer-based systems and sensors will be soon embedded in everywhere all our everyday objects
More informationNomadic devices Benefits and market outlook
Nomadic devices Benefits and market outlook Johannes Dünnwald Nokia Automotive Ertico - Jan20th, 2005 First European Nomadic Devices Workshop 1 NOKIA 2004 Nokia Automotive Founded 1996 as Nokia Smart Traffic
More informationPolicy-Based Context-Management for Mobile Solutions
Policy-Based Context-Management for Mobile Solutions Caroline Funk 1,Björn Schiemann 2 1 Ludwig-Maximilians-Universität München Oettingenstraße 67, 80538 München caroline.funk@nm.ifi.lmu.de 2 Siemens AG,
More informationMobile based Text Image Translation System for Smart Tourism. Saw Zay Maung Maung UCSY, Myanmar. 23 November 2017, Brunei
Mobile based Text Image Translation System for Smart Tourism Saw Zay Maung Maung UCSY, Myanmar. 23 November 2017, Brunei 1 Smart Tourism Tourism is cultural and economic phenomenon which entails the movement
More informationGlossary 1. ARPU or Average Revenue per User A method of measuring revenue associated with the delivery of mobile commerce services by MNOs.
Glossary 321 Glossary 1 2G or 2nd Generation The currently available digital communication networks for voice and data communication (e.g., GSM, CDMA, PDC). 2.5G or 2.5th Generation Represents an upgrade
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #4 Wireless Systems II Project proposals: Announcements Written proposal due in 1 week Presentation in class in 1 week Contact me to discuss
More informationAlpha Scanner Pro User manual
WWW.MYALPHALABS.COM Alpha Scanner Pro User manual myalphalabs, #105, 1 st Floor, Meenaakshi Paradise Apartment, 2 nd Main, 3 rd Block, Hosapalya Main Road, Yellukunte. Bangalore, INDIA. Pin Code 560068.
More informationSupporting Nomadic Agent-based Applications in the FIPA Agent Architecture
Supporting Nomadic Agent-based Applications in the FIPA Agent Architecture Heikki Helin (Heikki.j.Helin@teliasonera.com) FDPW 03, Petrozavodsk, June 26 th, 2003 Introduction Multi-agent system implementing
More informationCAPNET Program Context-aware Pervasive Networking Mobile Forum s Research Focus Area
CAPNET Program Context-aware Pervasive Networking Mobile Forum s Research Focus Area Contents Introduction to the CAPNET Program Further information on application scenarios illustrated in videos CAPNET
More informationMobile Internet: Business Necessity or Toys for Boys?
Mobile Internet: Business Necessity or Toys for Boys? Antonio Prišan, B. Sc. EE Business Internet Solution Manager Product Development, Marketing and Sales Department VIPnet d.o.o. a.priscan@vipnet.hr
More informationDocVerify Document Library Tutorial.
DocVerify Document Library Tutorial www.docverify.com Table of Contents Step 1 Create a New PDF Document OR Existing PDF:... 4 Step 2 Click Add New :... 4 Step 3 Add New Library Document Button:... 5 Step
More informationWhite Paper. EVERY THING CONNECTED How Web Object Technology Is Putting Every Physical Thing On The Web
White Paper EVERY THING CONNECTED Is Putting Every Physical Thing Every Thing Connected The Internet of Things a term first used by technology visionaries at the AUTO-ID Labs at MIT in the 90s 1 has received
More informationThin Client Content Options
Content Adaptation and Provisioning David Tipper Associate Professor Department of Information Science and Telecommunications University of Pittsburgh tipper@tele.pitt.edu http://www.sis.pitt.edu/~dtipper/2727.html
More informationContext-Aware Systems. Michael Maynord Feb. 24, 2014
Context-Aware Systems Michael Maynord Feb. 24, 2014 The precise definition of 'context' is contentious. Here we will be using 'context' as any information that can be used to characterize the situation
More informationKINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK. Sub.Code/ Name : IT1452 FUNDAMENTALS OF PERVASIVE COMPUTING
IT1452 Fundamentals Of Pervasive Computing 1 KINGS COLLEGE OF ENGINEERING DEPARTMENT OF INFORMATION TECHNOLOGY QUESTION BANK Sub.Code/ Name : IT1452 FUNDAMENTALS OF PERVASIVE COMPUTING Year / Sem : IV
More informationEnergy market: Opportunities and Technologies
Energy market: Opportunities and Technologies Dominique Vincent Business Development Manager, Digi Singapore Market opportunities Agenda Energy Management: X-Grid, SmartLee, Smart metering: market, technology
More informationGlossary. xii. Marina Yue Zhang and Mark Dodgson Downloaded from Elgar Online at 02/04/ :16:01PM via free access
Glossary 2.5G Second-and-a-half Generation mobile communications system 3G Third Generation mobile communications system 3GPP The Third Generation Partnership Project ADSL Asymmetric Digital Subscriber
More informationSystem Challenges for Pervasive and Ubiquitous Computing
System Challenges for Pervasive and Ubiquitous Computing 18 th Roy Want Intel Research May 2005, ICSE 05 St. Louis th May 2005, ICSE What is Ubiquitous Computing? The most profound technologies are those
More informationGovt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester. Contact Hrs / week: 4 Total hrs: 64
Govt. of Karnataka, Department of Technical Education Diploma in Computer Science Sixth Semester Subject: Mobile Computing Contact Hrs / week: 4 Total hrs: 64 Table of Contents SN Topic Hours Marks 1 Introduction
More informationOverview. M-commerce vs. E-commerce
M-COMMERCE Overview What is M-Commerce? M-commerce vs. E-commerce Classes of M-Commerce Applications Benefits of M-commerce Advantages of M-Commerce Disadvantages of M-Commerce Mobile Computing: Content,
More informationTHE SECOND WEB. 1 March John Blossom, President, Shore Communications Inc.
THE SECOND WEB John Blossom, President, Shore Communications Inc. About Shore 1 Web: shore.com Content Marketing Strategists Enhance your strategies for publishing and content technology products and services
More informationEnabling the Mobile Service Access
Enabling the Mobile Access Telecommunications Forum, 1.11.2000 Petteri.Koponen@ firsthop.com www.firsthop.com Presentation Agenda Market vision First Hop overview First Hop products Future Outlook 1 Market
More informationContents. Mobile Middleware Course. Introduction and Overview Sasu Tarkoma. Lecture Outline. Course Book. Mobile Evolution.
Contents Mobile Middleware Course Introduction and Overview Sasu Tarkoma Lecture outline Motivation Mobile middleware overview Examples Summary Lecture Outline Course Book 16.3. 16-18 Introduction and
More informationSmart Homes and Cities
Smart Homes and Cities 1 Wireless Sensors at Smart Home Security sensors, cameras, thermostats, smart plugs, lights, Entertainment systems. Do-it-Yourself (DIY) sensors Actuators Smart plug Motion detector
More informationFeature Extraction in Wireless Personal and Local Area Networks
Feature Extraction in Wireless Personal and Local Area Networks 29. October 2003, Singapore Institut für Praktische Informatik Johannes Kepler Universität Linz, Austria rene@soft.uni-linz.ac.at < 1 > Content
More informationSentinet for BizTalk Server SENTINET
Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication
More informationCEN 538 Wireless LAN & MAN Networks
King Saud University College of Computer and Information Sciences Department of Computer Engineering CEN 538 Wireless LAN & MAN Networks Dr. Ridha OUNI rouni@ksu.edu.sa LMS web site References Text book
More informationHow to Select the Right Marketing Cloud Edition
How to Select the Right Marketing Cloud Edition Email Studio, Mobile Studio, and Web Studio ith Salesforce Marketing Cloud, marketers have one platform to manage 1-to-1 customer journeys through the entire
More informationMetadata, Chief technicolor
Metadata, the future of home entertainment Christophe Diot Christophe Diot Chief Scientist @ technicolor 2 2011-09-26 What is a metadata? Metadata taxonomy Usage metadata Consumption (number of views,
More informationBuilding Pervasive Computing Applications on Sensor Networks. Rutgers, The State University of New Jersey
Building Pervasive Computing Applications on Sensor Networks Rutgers, The State University of New Jersey www.winlab.rutgers.edu 1 Introduction: Sensor Networks Wireless Sensor Nets Telecom Internet + Telecom
More informationApplication management in Nokia: Getting the most from Company Apps
Application management in Nokia: Getting the most from Case Study 2 Contents 1 Challenge...3 2...5 2.1 Deployment options...5 2.2 App security and authentication...7 2.3 Nokia...7 3 Company Hub...9 3.1
More informationSeamless integration of heterogeneous wireless network technologies -?/!
Seamless integration of heterogeneous wireless network technologies -?/! Jochen Schiller Computer Systems & Telematics Freie Universität Berlin Germany schiller@computer.org Prof. Dr.-Ing. Jochen Schiller,
More informationBeyond RFID - Internet of Things
Beyond RFID - Internet of Things 4. Vision Mark Harrison 11th February 2008 What do we mean by the Internet of Things? Connecting objects and locations in the real world to information on the web Considering
More informationiapps Experience Manager
iapps Experience Manager Manage your customers journey with a web content management system built on a marketing automation engine. Copyright Bridgeline Digital Inc. bridgeline.com 1-800-603-9936 Building
More informationCarrier APIs do they offer more or less than 3rd parties?
Carrier APIs do they offer more or less than 3rd parties? Bryan Sullivan, AT&T non-proprietary/public information But first, we interrupt our program for Somewhere Over the Top An Open Platform is a Beautiful
More informationHow HP is implementing an Omnichannel support experience
How HP is implementing an Omnichannel support experience Fulvio Marfoni HP What Omni-Channel Customer Support Experience means Omni-channel is a multichannel approach that seeks to provide the customer
More informationAT&T Government Solutions, Inc. Lewis Hart & Patrick Emery
AT&T Government Solutions, Inc. Lewis Hart & Patrick Emery http://codip.grci.com Program Overview Problems Addressed intelligent distribution of information based on its semantics Integration of multiple
More informationContext software. A prototype platform for contextual mobile applications. Mika Raento
Context software A prototype platform for contextual mobile applications Mika Raento Basic Research Unit, Helsinki Institute for Information Technology Department of Computer Science, University of Helsinki
More informationMobile Middleware Course. Introduction and Overview Sasu Tarkoma
Mobile Middleware Course Introduction and Overview Sasu Tarkoma Contents Course outline Motivation Mobile middleware overview Course Overview 4 credit course Three components Lectures Assignment Literature
More informationReal Estate Mobile App Features
Real Estate Mobile App Features How To Review The App Demo On Your Device Download the Preview Your App app today on your ios or Android Devices from the App Store or Google Play Store. To view this demo
More informationPRISM: Platform for Remote Sensing using Smartphones
PRISM: Platform for Remote Sensing using Smartphones Tathagata Das Microsoft Research India Bangalore 560080, India tathadas@microsoft.com Prashanth Mohan University of California, Berkeley Berkeley, CA
More informationRecognizing and Predicting Context by Learning from User Behavior
Recognizing and Predicting Context by Learning from User Behavior 15. September 2003, Jakarta Institut für Praktische Informatik Johannes Kepler Universität Linz, Austria rene@soft.uni-linz.ac.at < 1 >
More informationChapter 7. Telecommunications, the Internet, and Wireless Technology
Chapter 7 Telecommunications, the Internet, and Wireless Technology LEARNING OBJECTIVES What are the principal components of telecommunications networks and key networking technologies? What are the different
More informationMany countries decided on IMT-2000
s Evolution Evgeni Karakanovsky Director Business Development and s MobilTel EAD UMTS Forum member Many countries decided on IMT-2000 Today s s Market Status June 2002 worldwide Voice > 1 billion users
More informationConnect with Remedy: SmartIT: Social Event Manager Webinar Q&A
Connect with Remedy: SmartIT: Social Event Manager Webinar Q&A Q: Will Desktop/browser alerts be added to notification capabilities on SmartIT? A: In general we don't provide guidance on future capabilities.
More informationMobile Computing Introduction
Mobile Computing Introduction UNIT - 1 Prepared By:- NITIN PANDYA Assistant Professor, SVBIT. What is Mobile Computing 2 NTIIN PANDYA 3 NTIIN PANDYA Definitions Mobile Computing What is mobile computing?
More informationTurban and Volonino. Mobile Commerce. Information Technology for Management Improving Performance in the Digital Economy
Turban and Volonino Chapter 7 Mobile Commerce Information Technology for Management Improving Performance in the Digital Economy 7 th edition John Wiley & Sons, Inc. Slides contributed by Dr. Sandra Reid
More informationSecure Over-The-Air Services in NFC Ecosystems
Secure Over-The-Air Services in NFC Ecosystems Sirpa Nordlund Venyon Hagenberg March 20th, 2007 Contents of the presentation 1. Building up NFC ecosystem 2. Trusted third party and value proposition 3.
More informationAndroid Samsung Galaxy S6 Edge
Android 6.0.1 Samsung Galaxy S6 Edge Access your quick menu by using two fingers to pull down the menu from the top-center of the screen. You can use this to quickly turn your Wi-Fi, Location, Bluetooth,
More informationDRAFT. University of Colorado Advanced Technology Series. Bob Marcus
University of Colorado Advanced Technology Series Bob Marcus marcus@roguewave.com Time Frames and Possible Collaboration between RW and UC Far future - We could support your research with software Near
More informationCisco Prime Home 5.1 Technical
Data Sheet Cisco Prime Home 5.1 Technical The proliferation of Internet-connected devices and the explosion of video and data traffic are driving complexity in the home network. Increasing numbers of new
More informationCorporate R&D: Excellence in Wireless Innovation. September
Corporate R&D: Excellence in Wireless Innovation September 2011 www.qualcomm.com/research State of the Art Capabilities Fostering Innovation Human Resources Complete Development Labs 30% of engineers with
More informationWatchdata SIMachine (M2M Solution)
Watchdata SIMachine (M2M Solution) A Introduction to M2M B Introduction to SIMachine C SIMachine Product Applications Technology Evolution ~ 1950 ~ 1980 ~ 1995 ~ 1999 Computer Internet Mobile Communication
More informationAutoMedia: Linking the Vehicle with Consumer Electronics and Services. Jason Flinn. University of Michigan
AutoMedia: Linking the Vehicle with Consumer Electronics and Services University of Michigan Problem: Vehicle is an island Each vehicle is an island unto itself data crosses the border generally with carried
More informationSelf-Sensing Spaces: Smart Plugs For Smart Environments
Self-Sensing Spaces: Smart Plugs For Smart Environments Hicham Elzabadani, Abdelsalam (Sumi) Helal, Bessam Abdulrazak and Erwin Jansen Computer and Information Science and Engineering Department University
More informationLesson 1 Key-Terms Meanings: Web Connectivity of Devices and Devices Network
Lesson 1 Key-Terms Meanings: Web Connectivity of Devices and Devices Network 1 Application Application: A software (S/W) for an application, such as, creating and sending an SMS, measuring and sending
More informationTowards a Delay-tolerant Future: Reconsidering some Assumptions in Networking. Reconsidering the Internet Design. Number of layers
Towards a Delay-tolerant Future: Reconsidering some ssumptions in Networking CHINTI Jörg tt 2 July 2009 tubs.city 2009 Jörg tt 1 Reconsidering the Internet Design Communication paradigms
More informationIs SharePoint the. Andrew Chapman
Is SharePoint the Andrew Chapman Records management (RM) professionals have been challenged to manage electronic data for some time. Their efforts have tended to focus on unstructured data, such as documents,
More informationForescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2
Forescout Version 1.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More informationWireless Network Security Spring 2013
Wireless Network Security 14-814 Spring 2013 Patrick Tague Class #19 Location Privacy & Tracking Agenda Location privacy and tracking Implications / risks of location information Location privacy and anonymity
More information3CX Mobile Device Manager
3CX Mobile Device Manager Manual 1 Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples
More informationCamera Phones with Pen Input as Annotation Devices
Camera Phones with Pen Input as Annotation Devices Michael Rohs and Christof Roduner Department of Computer Science ETH Zürich ETH Zürich Taskforce Kommunikation Camera Phones with Pen Input for Generating
More informationThe Core-Edge Dynamics Toolkit
The Core-Edge Dynamics Toolkit Objective: Turn methodology into step-by-step tools for sponsors to apply to their own case studies Approach: Use current taxonomy and methodology Apply methods and lessons
More informationApplying MUPE Context Producers in developing Location and Context Aware Applications
Applying MUPE Context Producers in developing Location and Context Aware Applications Kimmo Koskinen kimmo.m.koskinen@iki.fi Kari Heikkinen kari.heikkinen@lut.fi Jouni Ikonen jouni.ikonen@lut.fi Lappeenranta
More informationWLAN Connection Manual SPP-R410. Mobile Printer Rev
WLAN Connection Manual SPP-R410 Mobile Printer Rev. 1.00 http://www.bixolon.com Table of Contents 1. Manual Information... 3 2. Precautions... 3 3. How to Connect... 4 3-1 Android Soft AP mode... 6 3-2
More informationAccelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation
Accelerating solutions for highway safety, renewal, reliability, and capacity Regional Operations Forums Connected Vehicles and the Future of Transportation ti Session Overview What are connected and automated
More informationWebSphere Puts Business In Motion. Put People In Motion With Mobile Apps
WebSphere Puts Business In Motion Put People In Motion With Mobile Apps Use Mobile Apps To Create New Revenue Opportunities A clothing store increases sales through personalized offers Customers can scan
More informationPervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008
Pervasive Wireless Scenarios and Research Challenges Spring 08 Research Review Jun 2, 2008 Prof. D. Raychaudhuri ray@winlab.rutgers.edu www.winlab.rutgers.edu 1 Introduction: The Promise of Wireless Everywhere
More informationBanner Connected Data Solutions Web Service
Banner Connected Data Solutions Web Service Instruction Manual Original Instructions 178337 Rev. E 14 September 2018 Banner Engineering Corp. All rights reserved 178337 Contents 1 Banner Web Services...
More informationIntegration of distributed data sources for mobile services
Integration of distributed data sources for mobile services Gianpietro Ammendola, Alessandro Andreadis, Giuliano Benelli, Giovanni Giambene Dipartimento di Ingegneria dell Informazione, Università di Siena
More informationActionable User Intentions for Real-Time Mobile Assistant Applications
Actionable User Intentions for Real-Time Mobile Assistant Applications Thimios Panagos, Shoshana Loeb, Ben Falchuk Applied Research, Telcordia Technologies One Telcordia Drive, Piscataway, New Jersey,
More informationCIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products
CIAM: Need for Identity Governance & Assurance Yash Prakash VP of Products Key Tenets of CIAM Solution Empower consumers, CSRs & administrators Scale to millions of entities, cloud based service Security
More informationMobile and Sensor Systems
Mobile and Sensor Systems Lecture 1: Introduction to Mobile Systems Prof Cecilia Mascolo About Me time In this course The course will include aspects related to general understanding of Mobile and ubiquitous
More information