Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain

Size: px
Start display at page:

Download "Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain"

Transcription

1 Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1, PO Box 1100, FIN Oulu, Finland Tel , Fax {Daniel.Pakkala, Markus.Sihvonen, Abstract. This paper analyses the dilemma of extending enterprise applications to mobile computing domain. The enterprise environments are very much different from the mobile computing environments, and there are many issues to be addressed when extending the legacy enterprise applications to mobile computing and mobile Internet domains. One way of alleviating the development of mobile extensions to legacy enterprise applications is to provide a service platform that incorporates middleware services needed in the enterprise mobile computing interface. Previously prototyped service platform architecture, supporting adaptation, personalization, and context-awareness of mobile services in service gateway based service architecture [1] is taken as a starting point. The research problem of the paper is to analyze requirements and challenges in integrating legacy enterprise applications into mobile service environment. The research is based on the constructive method of the related publications and technologies. The results are derived by the abstractive analysis of the available material. The primary conclusions of the study are enhancements and extensions to service platform for enterprise mobile computing systems. The role and application scenarios of peer to peer technology and content delivery in the enterprise domain are also discussed and adopted to requirements of the service platform. 1. Introduction The current enterprise applications typically reside in servers and desktop PCs connected by a high bandwidth, low latency, and reliable Local Area Network (LAN). Now that wireless technologies have reached a certain degree of maturity, many enterprises are thinking of extending the legacy enterprise applications to mobile computing domain and are planning or implementing their mobility strategies [2]. However, mobilizing the existing enterprise applications is still not an easy task and incorporates many matters to be addressed in order to have a satisfying outcome. In the area of telecommunication systems and mobile Internet the trends are going towards service platforms and frameworks that may considerably alleviate the development of applications to heterogeneous distributed environments [3], like the interface of the enterprise- and mobile domains is. We have previously designed and prototyped a distributed service platform supporting adaptation, personalization, and context-awareness of mobile distributed services in a service gateway based service architecture [1]. The prototyped service platform is taken as a starting point and further enhancements regarding the enterprise mobile computing interface are discussed and proposed here. An important aspect of mobilizing the enterprise applications is to consider the effects of different type of terminal devices that can vary from mobile phone to laptop, and are used essentially differently than desktop PCs that are the terminals for legacy enterprise applications. The user usually always carries along the mobile terminals for example in meetings and outside the enterprise premises. Therefore as difference from the legacy enterprise applications used via desktop PCs, the requirement of adaptive, personalized and context-aware applications and services are present in the mobile computing domain [3]. The variety of mobile terminals creates challenges regarding application development, but also new application scenarios related to mobile worker concept due to way the mobile terminals are used and always carried along. In addition the mobile terminals as part of enterprise systems pose some security considerations. Typically the enterprise applications are designed along the client-server communication model. The same client-server model is also applicable in the mobile domain. On the other hand, essentially different P2P communication model seems to be arising in the Internet community. P2P technology has gained bad reputation due to illegal content exchange in the Internet domain. However, it may have some potential as a

2 service enabler for content delivery and management inside trusted enterprise domains where better control over the delivery channels may be possible. The P2P communication model can be seen as complementing model for the client-server model. The fundamental challenges of extending enterprise applications to mobile computing domain rise from the differences between the enterprise and mobile computing environments. Enterprise computing environments typically have lots of resources like high bandwidth, low latency, reliable fixed networks and high resource PCs as client terminals. Meanwhile the mobile computing environment's characteristics include limited bandwidth, high latency, intermittent connectivity wireless networks and variable processing capability mobile terminals. Because of these characteristics of the mobile computing environment the mobile applications should be adaptive regarding the required processing power and dynamically changing network capabilities [4]. As the enterprise and mobile environments are different so is the design of applications for these environments. The enterprise applications are traditionally designed relying on the resources that are typical for the enterprise environment. Therefore many problems rise when the legacy enterprise applications are to be extended to mobile computing domain that lacks most of these resources. Mainly the problems to be solved come from application design, used middleware technologies, and underlying network capabilities. The simplest approach for extending the enterprise applications to mobile computing domain would be to leave the applications and middleware as is, and replace the fixed LAN connection with wireless Wide Area Network (WAN) connection. However the drawbacks of this approach regarding system performance and reliability, because of mobile network and terminal characteristics, are so extensive that usually alternative solutions must be searched. An alternative approach would be to provide a distributed service platform, partly residing at the user terminal and partly at server in the enterprise network edge, providing middleware services for overcoming the differences in the computing environments and thereby alleviating the application development. This is the approach considered in this paper and requirements and initial architecture overview for such a service platform is provided. Firstly, the challenges of extending the legacy enterprise applications to mobile computing domain are brought up in chapter 2. Secondly, the requirements for a distributed service platform for mobilizing the legacy enterprise applications are gathered in chapter 3, based on the identified challenges. Thirdly, a conceptual architecture for a service platform is proposed in chapter 4, based on extending already prototyped architecture [1]. Finally, conclusions and future research directions are presented in chapter Challenges of Mobilizing the Enterprise Applications The first challenge of mobilizing the enterprise applications comes from the object-oriented and often session based middleware technologies like Java RMI, CORBA, and DCOM that are widely used in enterprise systems as system middleware. Naturally also the enterprise applications are often built on these technologies. The aforementioned object-oriented and session based middleware technologies are not usable in wireless environments as such, but optimizations regarding network usage and behavior in wireless environments have been made [5][6]. Another type of middleware technology that is claimed to be better applicable in mobile computing domain and wireless networks, also exists - Message Oriented Middleware (MOM). MOM uses the network more sparingly, is more robust to intermittent connectivity, and high network latency, and promotes a communication model better suited for mobile computing than its object-oriented counterparts [7]. However the object-oriented middleware technologies in enterprise systems are a proven concept and have clear advantages in the enterprise environment. Thereby the MOM should not be seen as competing technology to object-oriented middleware, but rather a complementary technology for mobilizing the enterprise applications by mobile extensions. Like the object-oriented middleware technologies, also existing enterprise applications are designed to enterprise environment. Thereby mobilizing the existing applications by replacing the fixed LAN connection with wireless WAN connection, even if the problems of the object-oriented middleware in wireless environments could be overcome, is a laissez-faire approach. Instead extending the existing applications with newly designed mobile extensions is an approach that can guarantee fluent, reliable, and secure operation in mobile computing environment. These extensions should be designed so that the

3 amount of transferred data in wireless WAN is optimized, also most of the processing should be done at server instead of client because limited and varying resources of mobile terminals. Alternatively and more sophistically the workload allocation between the server and the mobile terminal could be adaptive to terminal and network capabilities that may vary a great deal. Also the size of the mobile client software is limited because of small amount of memory and lack of permanent storage in many mobile terminals. Further design considerations for the mobile extensions of enterprise applications are due to intermittent connectivity wireless networks, where sudden disconnections should be treated as normal operation instead of exceptions. The user interface design is also challenged as the mobile terminals typically have smaller screens than PCs and input methods differ very much from traditional mouse and keyboard combination. The enterprise environments are typically so called trusted domains, where security is managed. However when extending the enterprise applications outside the enterprise domain security becomes a matter requiring special attention. This is because access to the enterprise network has to be granted from outside the enterprise premises in order to enable the use of wireless WAN access. The popular way to handle data security in this scenario is to tunnel and encrypt the data that is passed outside the enterprise domain by Virtual Private Network (VPN) technologies. Additional security considerations arise from mobile terminals that are usually carried along and can easily get into wrong hands. Therefore users have to be strongly authenticated before letting them access the enterprise networks and applications. 3. Requirements for a Service Platform The requirements for a distributed service platform for mobilizing enterprise applications come mainly from the differences between enterprise and mobile computing environments. A distributed service platform can provide middleware services that can partly hide and overcome these differences or provide services for the applications to deal with the differences fluently. On the other hand some requirements for any mobile application are set by the end user. The requirements of personalized, adaptive, and contextaware applications are partly required by the user and partly by the mobile computing environment s characteristics. Firstly the service platform should take advantage of both the object and message oriented middleware. Object-oriented middleware has clear advantages over the MOM in the enterprise environments and should not be replaced there. However when extending the enterprise applications to be used from the mobile domain, object-oriented middleware technologies become less applicable, and MOM technologies should be favored in mobile extensions. The aforementioned middleware setup, role of the service platform, and mobile extension of an enterprise system is illustrated in Figure 1. Enterprise Domain (Trusted) Mobile Domain (Untrusted) Data Bases Enterprise Server Server Software (Enterprise Server) PC Client Client Software (PC Client) Object Oriented Middleware Enterprise LAN/WLAN M-Server VPN Mobile Server Service Platform (M-Server) PDA Laptop Mobile System Extension Mobile Phone Mobile Client Service Platform (Mobile Terminal) Message Oriented Middleware Wireless WAN Figure 1. System extension for mobilizing the enterprise applications. From Figure 1 it can be seen that the role of the enterprise network resident part of the service platform is to act as the combining node of object-oriented and message based middleware. The software residing over this part of the service platform is referred as Mobile Server. The other part of the service platform residing in the mobile terminal is based on MOM, and the software that resides on top is referred as Mobile Client. The role of the Mobile Server software is to act as a client for enterprise servers and server for the Mobile Client that is used to access the extended enterprise applications from the mobile domain. In other words

4 the Mobile Server acts as a proxy to enterprise network for the Mobile Client. Because the capabilities of mobile terminals vary a lot the mobile terminal resident part of the service platform should be lightweight and the service platform should provide means for adaptive workload allocation between the Mobile Server and Mobile Client software. Because the service platform partly resides outside the normal enterprise systems boundaries, in the mobile domain, security poses some requirements also. The service platform should provide centralized and strong user authentication. Also the data that is transferred inside the distributed service platform should be encrypted either externally with VPN technology or internally by the platform communications services. As the service platform incorporates wireless links it should provide services for network state monitoring for the applications utilizing it. It should also provide services for computing environment monitoring in general, because the monitoring information is needed in adaptive, personalized, and contextaware functionality of the applications [1]. From the user interaction point of view, the service platform should support two different kinds of interaction models to enable wide access from different kinds of mobile terminals. First the web style access using full- and mini browsers, representing the pull interaction model enables access from almost any connected terminal from PC to mobile phone. Secondly the service platform should support combination of pull and push interaction models to enable truly distributed and highly interactive applications that provide added value compared to web style interaction model. The enterprise mobile interface doesn t only pose challenges, but opportunities as well. Because another end of the service platform resides at network, representing a central point for the user s terminals the possible application scenarios for the service platform include for example Personal Information Management- (PIM) and unified messaging applications amongst many others. The proprietary Content Delivery Networks (CDNs) have been important when delivering mass content in the broadcast and Internet domains. The Internet convergence has caused additional business challenges for the referred CDNs especially in terms of peer to peer content delivery [8]. A possible approach to overcome the related illegal delivery of content could be application of peer to peer technologies inside trusted enterprise domains. This kind of an approach is illustrated in Figure 2, in which the possible application scenarios regarding communications and content delivery are overviewed. The P2P communications may provide an alternative or complementing way of delivering content inside the trusted enterprise domain. The service platform for mobilizing the enterprise applications should provide managed P2P communication services to have future potential regarding different communication, content delivery and management scenarios overviewed in Figure 2. Figure 2. P2P Scenarios for the Enterprise Domain. 4. Conceptual Architecture of the Service Platform We have previously designed and prototyped a service platform supporting adaptation, personalization, and context-awareness of distributed mobile applications in a service gateway based service architecture [1]. The setup in Figure 1, where part of the service platform resides at network server and another part in the mobile terminal can be considered as equal to service gateway based service architecture. Therefore we have taken the architecture already prototyped as a starting point for the service platform architecture

5 presented here. The architecture is based on utilizing the Generic Service Element (GSE) approach [3]. Here some extensions and enhancements to the architecture for supporting the mobilization of enterprise applications are proposed. The basic structure of the architecture is kept same but enhancements to six GSEs and platform communications services are proposed. The conceptual architecture for the service platform is presented in Figure 3. The architecture being distributed to both domains provides equal APIs and Platform Interfaces at the both network server- and mobile terminal domains. However the size of the part residing in the mobile terminal can be much smaller than the size of the part residing in the network server. The previous prototype implementation of the service platform architecture [1] resulted to overall size less than 400Kb, of which approximately one third was allocated to mobile terminal domain. This indicated that the architecture is well applicable in resource constrained mobile computing environments. Figure 3. Conceptual architecture of the service platform The service platform consists of six different GSEs that are designed to alleviate the application development to meet the requirements set by the distributed and heterogeneous computing environment and the end users. The service platform s GSEs together with other middleware services support personalization, provide services for application-aware adaptation, and support context-aware behavior of applications. These features of the service platform have already been prototyped and are described in [1]. In addition, the service platform provides tools for coping with the heterogeneous distributed computing environment and wireless connectivity by providing services for sensing the changes in the computing environment and mechanisms for adapting to these changes. The enhancements to service platform GSEs and other platform components regarding the requirements of enterprise-, and mobile computing interface and P2P application scenarios are proposed next. First version of the Access Control GSE [1] provides services for user authorization, terminal profiling, service authorization, user preference profiling and user characteristics profiling. The GSE hosts profiles that are utilized in the application adaptation and retrievable by the applications when needed. The internal profiling of the GSE utilizes the profiling mechanism provided by the Generic Profiling GSE. To police the privacy of user context information the GSE also provides service authorization process for the services to gain a trusted status inside the service platform in order to have access to user context data. The GSE provides authentication services for the applications in centralized way removing the need for per service authentication procedure implementations. The proposed enhancement to this GSE is to provide user authentication services that enable enforcement of multilevel user rights defining access to certain subsets of applications. First version of the Service Delivery GSE [1] provides an important service of delivering, updating, and terminating service instances. The instances can be delivered from the server domain to the mobile terminal domain to be executed there. The GSE can be thought as a remote execution environment for the service instances that can also be seen as parts of a distributed application. A proposed enhancement to this GSE is refinement of the remote execution environment to enable dynamic transfer of application and platform components between the server- and terminal parts of the service platform. Related enhancement is to provide automatic and adaptive workload allocation service that can share the workload based on for example energy cost, network-, and terminal capabilities. Yet enhancing the GSE to support web style interaction model would enhance the accessibility to the applications from terminals not capable of hosting the client side of the service platform but having browsers to access the services. Using the web style interaction model the disconnected mode operation is naturally excluded.

6 First version of the Generic Profiling GSE [1] provides a generic and privacy supporting profiling mechanism to be utilized in the profiling that takes place inside the service platform or services and applications executed over the platform. The GSE provides services for creating and updating of profiles and for adding, removing, and updating of single profile elements. The GSE is used by other middleware services providing personalization, adaptation, and context-awareness support for the applications. The proposed enhancement to this GSE is to base the profiling mechanism on standard, for example XML based technologies, to enhance interoperability with other profiling mechanisms and systems. First version of the Permanent Storage GSE [1] provides permanent storage for the other service platform components to save component specific data in the service platform. This data can be for example component specific parameters or profile information. The first enhancement to this GSE is to provide temporary local storing of data in disconnected mode operation and automatic data synchronization in connected mode operation of the applications. Additional enhancements are data synchronization and interfacing with enterprise data bases and content delivery- and management systems. First version of the Event Notification GSE [1] provides services for generating, delivering, and receiving of events inside the distributed service platform. The event notification is designed to be asynchronous and is based on registered event listeners. It is designed as simple as possible to gain fast, small size, reliable event delivery. The proposed enhancement to this GSE is to support event channeling where the platform and application events can be separated to different event channels and each application may use its own event channels. The need for event channeling is mainly a security issue but may also enhance the performance and reliability of the event delivery inside the service platform. First version of the Environment Monitoring GSE [1] provides services for monitoring the changes in the computing environment and environmental elements surrounding the user in an I-centric communication model, like connectivity, location, and sensor information, in other words the dynamic context. The GSE hosts a retrievable environment profile that describes dynamic context and is used in application adaptation. The GSE can notify these changes by using the Event Notification GSE. No major enhancements were identified for this GSE, only minor enhancements to already existing version. In the first prototype, the focus was in the GSEs and other middleware services. However, a simple MOM was provided as communications service for the GSEs, other middleware services and applications. The proposed enhancements to MOM include better transaction support and message queuing. The enterprise-mobile computing interface requires much more from the communication services than just MOM. Therefore the proposed added communication services are P2P communication services providing support for group communications and possibly acting as an enabler for enterprise content delivery and management. In addition, the communication services of the service platform should include support services for utilizing the existing object-oriented middleware technologies and also applications built on them in the enterprise domain. 5. Conclusions This paper discusses and analyses the requirements of distributed service platform for extending enterprise applications to mobile computing domain. The discussion was based on the constructed lightweight distributed service platform for adaptive mobile services, which focused on the adaptation, personalization, and context-awareness of mobile services [1], and state of the art analysis of legacy enterprise application. The requirements of personalized, adaptive, and context-aware applications are partly required by the user and partly by the mobile computing environment s characteristics. Because the enterprise environments are very much different from the mobile computing environments, additional message oriented middleware and middleware services are needed in the enterprise mobile computing interface. The mobile terminals are located outside the trusted domain, and therefore security matters set essential requirements for the service platform. More detailed, for example, solutions for user authentication, accounting, authorization and privacy protection of the data transfer, are required to be ensured. The inherent characteristic of the wireless domain is continuously changing resources, and therefore a kind of network state monitoring is required to enable well behaving adaptive, personalized, and context-aware applications. From the user interaction point of view, the service platform should support two different kinds of interaction models to enable wide access from different kinds of mobile terminals. First the web style access using full- and mini browsers, representing the pull interaction model enables access from almost any connected terminal from PC to mobile phone. Secondly the service platform should support combination of pull and push interaction

7 models to enable truly distributed and highly interactive applications that provide added value compared to web style interaction model. The support for, for example, Personal Information Management- (PIM) and unified messaging applications is required. The peer to peer technologies brings challenges to manage digital rights in legal manner, therefore the service platform for mobilizing the enterprise applications should provide support for P2P communication services inside the trusted enterprise domain. Based on the analysis the conceptual architecture of the service platform establishes a solid base for the enhancing the legacy enterprise applications to be applied over the wireless domain with mobile devices. 6. References [1] D. Pakkala, Lightweight Distributed Service Platform for Adaptive Mobile Services, submitted to The 2004 International Conference on Pervasive Computing and Communications (PCC-04), Las Vegas, Nevada, USA, [2] J. Figueras, "The Wireless Enterprise: Two Years on," IEEE Computing & Control Engineering, vol. 14, pp , [3] K. Raatikainen, F. Hohl, J. Latvakoski, T. Lindholm, and S. Tarkoma, "Generic Service Elements for Adaptive Applications," WWRF, White Paper [4] M. Satyanarayanan, "Fundamental Challenges in Mobile Computing," presented at Annual ACM Symposium on Principles of Distributed Computing, Philadelphia, Pennsylvania, United States, [5] S. Adwankar, "Mobile CORBA," presented at Third International Symposium on Distributed Objects and Applications (DOA'01), Rome, Italy, [6] S. Campadello, "Middleware Infrastructure for Distributed Mobile Applications," in Department of Computer Science. Helsinki: University of Helsinki, 2003, pp [7] D.-G. Jung, K.-J. Paek, and T.-Y. Kim, "Design of MOBILE MOM: Message Oriented Middleware Service for Mobile Computing," presented at International Workshop on Parallel Processing, Wakamatsu, Japan, [8] R. Wetzel, "CDN Business Models -The Drama Continues," Business Communications Review, pp , 2002.

Towards a Peer-to-Peer Extended Content Delivery Network

Towards a Peer-to-Peer Extended Content Delivery Network Towards a Peer-to-Peer Extended Content Delivery Network Daniel Pakkala and Juhani Latvakoski VTT Electronics, Kaitoväylä 1, P.O. Box 1100, FIN-90571 Oulu, Finland E-mail: {Daniel.Pakkala, Juhani.Latvakoski}@vtt.fi

More information

MOBILE SOLUTIONS IN BUSINESS PROCESS

MOBILE SOLUTIONS IN BUSINESS PROCESS MOBILE SOLUTIONS IN BUSINESS PROCESS Maija-Kerttu Sarvas Helsinki University of Technology Telecommunications Software and Multimedia Laboratory P.O. Box 5400, FIN-02015 HUT FINLAND Abstract The aim of

More information

Security Considerations for Public Mobile Cloud Computing

Security Considerations for Public Mobile Cloud Computing Security Considerations for Public Mobile Cloud Computing Ronnie D. Caytiles 1 and Sunguk Lee 2* 1 Society of Science and Engineering Research Support, Korea rdcaytiles@gmail.com 2 Research Institute of

More information

Systems Manager Cloud Based Mobile Device Management

Systems Manager Cloud Based Mobile Device Management Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the

More information

SOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems

SOFT 437. Software Performance Analysis. Ch 5:Web Applications and Other Distributed Systems SOFT 437 Software Performance Analysis Ch 5:Web Applications and Other Distributed Systems Outline Overview of Web applications, distributed object technologies, and the important considerations for SPE

More information

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION Arto Hämäläinen and Jari Porras Lappeenranta University of Technology Laboratory of Communications Engineering P.O. Box 20 53851

More information

Event-based middleware services

Event-based middleware services 3 Event-based middleware services The term event service has different definitions. In general, an event service connects producers of information and interested consumers. The service acquires events

More information

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4]

Outline Introduction to Internet, Intranet and Extranet. What is an Intranet? by Awad. Basic Intranet-enabling Technology [Awad, chapter 4] Outline Introduction to Internet, and Yan Wang E6A 339 yan.wang@mq.edu.au Internet Ultranet" 1 2 What is an? by Awad Basic -enabling Technology [Awad, chapter 4] A cluster of networked computers within

More information

Design and Implementation Guide. Apple iphone Compatibility

Design and Implementation Guide. Apple iphone Compatibility Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new

More information

Collaboration Service Integration Platform Using Context-Aware Role-Based Access Model

Collaboration Service Integration Platform Using Context-Aware Role-Based Access Model , pp.126-131 http://dx.doi.org/10.14257/astl.2013.29.26 Collaboration Service Integration Platform Using Context-Aware Role-Based Access Model Shu-Ping Lu 1, Kuei-Kai Shao 1, Yu-Nung Chao 1, Kuo-Shu Luo

More information

A Comparative Study of cloud and mcloud Computing

A Comparative Study of cloud and mcloud Computing A Comparative Study of cloud and mcloud Computing Ms.S.Gowri* Ms.S.Latha* Ms.A.Nirmala Devi* * Department of Computer Science, K.S.Rangasamy College of Arts and Science, Tiruchengode. s.gowri@ksrcas.edu

More information

A Survey Study on Monitoring Service for Grid

A Survey Study on Monitoring Service for Grid A Survey Study on Monitoring Service for Grid Erkang You erkyou@indiana.edu ABSTRACT Grid is a distributed system that integrates heterogeneous systems into a single transparent computer, aiming to provide

More information

System Models for Distributed and Cloud Computing

System Models for Distributed and Cloud Computing System Models for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF Classification of Distributed Computing Systems

More information

Network Station - Thin Client Computing - Overview

Network Station - Thin Client Computing - Overview Network Station - Thin Client Computing - Overview Overview The objective of this document is to help develop an understanding of a Server Based Computing/Thin-Client environment using MS Windows NT 4.0,

More information

Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices

Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices Architectural Model for Wireless Peer-to-Peer (WP2P) File Sharing for Ubiquitous Mobile Devices O.O. Abiona 1, A. I. Oluwaranti 2, T. Anjali 3, C. E. Onime 4, E.O. Popoola 5, G.A. Aderounmu 6, A. O Oluwatope

More information

New Methods for Performance Monitoring of J2EE Application Servers

New Methods for Performance Monitoring of J2EE Application Servers New Methods for Performance Monitoring of J2EE Application Servers Adrian Mos (Researcher) & John Murphy (Lecturer) Performance Engineering Laboratory, School of Electronic Engineering, Dublin City University,

More information

Service-Oriented Architecture and Software Engineering

Service-Oriented Architecture and Software Engineering -Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based

More information

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide p 1/6 White Paper A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide Francis Vander Ghinst Head of Sales & Marketing

More information

Whitepaper On Agent versus Agent less management

Whitepaper On Agent versus Agent less management Whitepaper On Agent versus Agent less management Swaminathan V Tecknodreams Restricted Page 1 of 7 Copyright Copyright 2008 Tecknodreams Software Consulting Pvt. Ltd. All Rights Reserved. Restricted Rights

More information

IBM 000-281 EXAM QUESTIONS & ANSWERS

IBM 000-281 EXAM QUESTIONS & ANSWERS IBM 000-281 EXAM QUESTIONS & ANSWERS Number: 000-281 Passing Score: 800 Time Limit: 120 min File Version: 58.8 http://www.gratisexam.com/ IBM 000-281 EXAM QUESTIONS & ANSWERS Exam Name: Foundations of

More information

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity Manufacturing companies have invested billions of dollars in industrial

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

ABSTRACT. Keywords Virtual Reality, Java, JavaBeans, C++, CORBA 1. INTRODUCTION

ABSTRACT. Keywords Virtual Reality, Java, JavaBeans, C++, CORBA 1. INTRODUCTION Tweek: Merging 2D and 3D Interaction in Immersive Environments Patrick L Hartling, Allen D Bierbaum, Carolina Cruz-Neira Virtual Reality Applications Center, 2274 Howe Hall Room 1620, Iowa State University

More information

Legacy System Integration Technology for Legacy Application Utilization from Distributed Object Environment

Legacy System Integration Technology for Legacy Application Utilization from Distributed Object Environment Legacy System Integration Technology for Legacy Application Utilization from Distributed Object Environment 284 Legacy System Integration Technology for Legacy Application Utilization from Distributed

More information

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška

More information

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com

Wireless VPN White Paper. WIALAN Technologies, Inc. http://www.wialan.com Wireless VPN White Paper WIALAN Technologies, Inc. http://www.wialan.com 2014 WIALAN Technologies, Inc. all rights reserved. All company and product names are registered trademarks of their owners. Abstract

More information

Network and Facility Management: Needs, Challenges and Solutions

Network and Facility Management: Needs, Challenges and Solutions Network and Facility Management: Needs, Challenges and Solutions Graham Jones Harris Broadcast Communications gjones04@harris.com New tools are needed to enable broadcasters to efficiently manage the modern

More information

CME: A Middleware Architecture for Network-Aware Adaptive Applications

CME: A Middleware Architecture for Network-Aware Adaptive Applications CME: A Middleware Architecture for Network-Aware Adaptive Applications Jun-Zhao Sun, Jari Tenhunen, and Jaakko Sauvola MediaTeam, Machine Vision and Media Processing Unit, Infotech Oulu P.O.Box 4500 4SOINFO,

More information

How To Set Up Egnyte For Netapp Sync For Netapp

How To Set Up Egnyte For Netapp Sync For Netapp Egnyte Storage Sync For NetApp Installation Guide Introduction... 2 Architecture... 2 Key Features... 3 Access Files From Anywhere With Any Device... 3 Easily Share Files Between Offices and Business Partners...

More information

Internet of Things (IoT): Middleware. Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.

Internet of Things (IoT): Middleware. Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia. Internet of Things (IoT): Middleware Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ A Fence Surveillance System Y. Kim et al, Autonomics

More information

What is Middleware? Software that functions as a conversion or translation layer. It is also a consolidator and integrator.

What is Middleware? Software that functions as a conversion or translation layer. It is also a consolidator and integrator. What is Middleware? Application Application Middleware Middleware Operating System Operating System Software that functions as a conversion or translation layer. It is also a consolidator and integrator.

More information

Cellular and 802.11 Networks Application and Data Usage

Cellular and 802.11 Networks Application and Data Usage Cellular and 802.11 Networks Application and Data Usage Wireless connectivity has become a necessity for application usage and productivity workflows. Network connectivity changes as users move from indoors

More information

Deploying a distributed data storage system on the UK National Grid Service using federated SRB

Deploying a distributed data storage system on the UK National Grid Service using federated SRB Deploying a distributed data storage system on the UK National Grid Service using federated SRB Manandhar A.S., Kleese K., Berrisford P., Brown G.D. CCLRC e-science Center Abstract As Grid enabled applications

More information

Virtual machine interface. Operating system. Physical machine interface

Virtual machine interface. Operating system. Physical machine interface Software Concepts User applications Operating system Hardware Virtual machine interface Physical machine interface Operating system: Interface between users and hardware Implements a virtual machine that

More information

The Advantages of Using Aventail VPN

The Advantages of Using Aventail VPN SECURE MOBILE ACCESS USING SSL VPNS September 2005 Prepared by Peter Rysavy http://www.rysavy.com 1-541-386-7475 Executive Summary Remote access has become increasingly complex. It s no longer about traveling

More information

XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing

XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing International Journal of Computational Engineering Research Vol, 03 Issue, 10 XMPP A Perfect Protocol for the New Era of Volunteer Cloud Computing Kamlesh Lakhwani 1, Ruchika Saini 1 1 (Dept. of Computer

More information

Desktop Central Managing Windows Computers in WAN

Desktop Central Managing Windows Computers in WAN Overview ManageEngine Desktop Central is Web-Based windows desktop administration software that helps administrators to effectively manage the desktops from a central point. It provides Software Deployment,

More information

Offline Data Synchronization in Order Management System

Offline Data Synchronization in Order Management System Offline Data Synchronization in Order Management System Abstract: We live in an increasingly connected world. However, in many cases we cannot rely on connectivity 100 percent of the time. Your users may

More information

An Analysis of Service Continuity in Mobile Services

An Analysis of Service Continuity in Mobile Services An Analysis of Continuity in Mobile s Ivar Jørstad Norwegian University of Science and Technology, Dept. of Telematics, O.S. Bragstads plass 2E, N-749 Trondheim, Norway ivar@ongx.org Do Van Thanh Telenor

More information

PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION

PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION YANG-TING SHEN, TAY-SHENG TENG Information Architecture Lab, Department of Architecture, National Cheng Kung University, Taiwan. bowbowshen@yahoo.com.tw

More information

SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS

SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS Karen Scarfone, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Many people

More information

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES

REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES REVIEW PAPER ON PERFORMANCE OF RESTFUL WEB SERVICES Miss.Monali K.Narse 1,Chaitali S.Suratkar 2, Isha M.Shirbhate 3 1 B.E, I.T, JDIET, Yavatmal, Maharashtra, India, monalinarse9990@gmail.com 2 Assistant

More information

Deployment Best Practices for Citrix XenApp over Galaxy Managed Network Services

Deployment Best Practices for Citrix XenApp over Galaxy Managed Network Services Enterprise Networks that Deliver Deployment Best Practices for Citrix XenApp over Galaxy Managed Network Services Developed by Hughes Network Systems Enterprise Networks that Deliver Galaxy Broadband Communications

More information

3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19

3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19 3-Tier Architecture Prepared By Channu Kambalyal Page 1 of 19 Table of Contents 1.0 Traditional Host Systems... 3 2.0 Distributed Systems... 4 3.0 Client/Server Model... 5 4.0 Distributed Client/Server

More information

A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL. Rainer Steffen, Rudi Knorr*

A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL. Rainer Steffen, Rudi Knorr* A TRUST BASED DELEGATION SYSTEM FOR MANAGING ACCESS CONTROL Rainer Steffen, Rudi Knorr* Abstract Trust is considered to be a powerful approach for managing access control in pervasive computing scenarios.

More information

Smartphone Enterprise Application Integration

Smartphone Enterprise Application Integration WHITE PAPER MARCH 2011 Smartphone Enterprise Application Integration Rhomobile - Mobilize Your Enterprise Overview For more information on optimal smartphone development please see the Rhomobile White

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

SCADA Cloud Computing

SCADA Cloud Computing SCADA Cloud Computing Information on Cloud Computing with SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: erik.daalder@nl.yokogawa.com

More information

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3

ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 ADDENDUM 12 TO APPENDIX 8 TO SCHEDULE 3.3 TO THE Overview EXHIBIT T to Amendment No. 60 Secure Wireless Network Services are based on the IEEE 802.11 set of standards and meet the Commonwealth of Virginia

More information

Special Properties of Ad-hoc Wireless Network and Security Models

Special Properties of Ad-hoc Wireless Network and Security Models Special Properties of Ad-hoc Wireless Network and Security Models Han Zhong Department of Computer Science, University of Auckland E-mail: hzho023@aucklanduni.ac.nz Abstract:There are certain amounts of

More information

JoramMQ, a distributed MQTT broker for the Internet of Things

JoramMQ, a distributed MQTT broker for the Internet of Things JoramMQ, a distributed broker for the Internet of Things White paper and performance evaluation v1.2 September 214 mqtt.jorammq.com www.scalagent.com 1 1 Overview Message Queue Telemetry Transport () is

More information

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS

ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS NETWORKS USING AGLETS ANNALS OF THE FACULTY OF ENGINEERING HUNEDOARA 2006, Tome IV, Fascicole 1, (ISSN 1584 2665) FACULTY OF ENGINEERING HUNEDOARA, 5, REVOLUTIEI, 331128, HUNEDOARA ADMINISTRATION AND CONFIGURATION OF HETEROGENEOUS

More information

JSLEE and SIP-Servlets Interoperability with Mobicents Communication Platform

JSLEE and SIP-Servlets Interoperability with Mobicents Communication Platform JSLEE and SIP-Servlets Interoperability with Mobicents Communication Platform Jean Deruelle Jboss R&D, a division of Red Hat jderuell@redhat.com Abstract JSLEE is a more complex specification than SIP

More information

A Survey on Availability and Scalability Requirements in Middleware Service Platform

A Survey on Availability and Scalability Requirements in Middleware Service Platform International Journal of Computer Sciences and Engineering Open Access Survey Paper Volume-4, Issue-4 E-ISSN: 2347-2693 A Survey on Availability and Scalability Requirements in Middleware Service Platform

More information

Base One's Rich Client Architecture

Base One's Rich Client Architecture Base One's Rich Client Architecture Base One provides a unique approach for developing Internet-enabled applications, combining both efficiency and ease of programming through its "Rich Client" architecture.

More information

Cisco Virtual Office Express

Cisco Virtual Office Express . Q&A Cisco Virtual Office Express Overview Q. What is Cisco Virtual Office Express? A. Cisco Virtual Office Express is a solution that provides secure, rich network services to workers at locations outside

More information

Comparing Mobile VPN Technologies WHITE PAPER

Comparing Mobile VPN Technologies WHITE PAPER Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203.

VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. VALLIAMMAI ENGNIEERING COLLEGE SRM Nagar, Kattankulathur 603203. DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING Year & Semester : II / III Section : CSE Subject Code : CP7028 Subject Name : ENTERPRISE

More information

Advanced Peer to Peer Discovery and Interaction Framework

Advanced Peer to Peer Discovery and Interaction Framework Advanced Peer to Peer Discovery and Interaction Framework Peeyush Tugnawat J.D. Edwards and Company One, Technology Way, Denver, CO 80237 peeyush_tugnawat@jdedwards.com Mohamed E. Fayad Computer Engineering

More information

Tablets: Will They Replace PCs?

Tablets: Will They Replace PCs? Tablets: Will They Replace PCs? By Phil Clarke Research Analyst, Nemertes Research Executive Summary As mobility becomes more prevalent within the enterprise, tablets are becoming crucial tools with specific

More information

Managing Mobile Devices Over Cellular Data Networks

Managing Mobile Devices Over Cellular Data Networks Managing Mobile Devices Over Cellular Data Networks Best Practices Document Best Practices Document www.soti.net We Manage Mobility TABLE OF CONTENTS UNIQUE CHALLENGES OF MANAGING DEVICES OVER CELLULAR

More information

Module 17. Client-Server Software Development. Version 2 CSE IIT, Kharagpur

Module 17. Client-Server Software Development. Version 2 CSE IIT, Kharagpur Module 17 Client-Server Software Development Lesson 42 CORBA and COM/DCOM Specific Instructional Objectives At the end of this lesson the student would be able to: Explain what Common Object Request Broker

More information

Mobile Performance Testing Approaches and Challenges

Mobile Performance Testing Approaches and Challenges NOUS INFOSYSTEMS LEVERAGING INTELLECT Mobile Performance Testing Approaches and Challenges ABSTRACT Mobile devices are playing a key role in daily business functions as mobile devices are adopted by most

More information

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual

Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics

More information

Persistent, Reliable JMS Messaging Integrated Into Voyager s Distributed Application Platform

Persistent, Reliable JMS Messaging Integrated Into Voyager s Distributed Application Platform Persistent, Reliable JMS Messaging Integrated Into Voyager s Distributed Application Platform By Ron Hough Abstract Voyager Messaging is an implementation of the Sun JMS 1.0.2b specification, based on

More information

Middleware- Driven Mobile Applications

Middleware- Driven Mobile Applications Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary

More information

Web Foundations Series Internet Business Associate

Web Foundations Series Internet Business Associate Web Foundations Series Internet Business Associate Internet Business Associate prepares students to work effectively in today's business environment. In this course, you will learn about the tasks involved

More information

An Open Platform for Digitizing Real World through Sentient Artefact Model. Fahim Kawsar Waseda University, Japan

An Open Platform for Digitizing Real World through Sentient Artefact Model. Fahim Kawsar Waseda University, Japan An Open Platform for Digitizing Real World through Sentient Artefact Model Fahim Kawsar Waseda University, Japan 1 Talk Outline Motivation Scenario Sentient Artefact Design Principle Sentient Artefact

More information

Total System Operations and Management for Network Computing Environment

Total System Operations and Management for Network Computing Environment Total System Operations and Management for Network Computing Environment Hitachi Review Vol. 47 (1998), No. 6 291 Satoshi Miyazaki, D. Eng. Toshiaki Hirata Masaaki Ohya Eiji Matsumura OVERVIEW: The architecture

More information

SwanLink: Mobile P2P Environment for Graphical Content Management System

SwanLink: Mobile P2P Environment for Graphical Content Management System SwanLink: Mobile P2P Environment for Graphical Content Management System Popovic, Jovan; Bosnjakovic, Andrija; Minic, Predrag; Korolija, Nenad; and Milutinovic, Veljko Abstract This document describes

More information

Huawei Technologies ERC Position Statement: Towards a Future Internet Public Private Partnership

Huawei Technologies ERC Position Statement: Towards a Future Internet Public Private Partnership Huawei Technologies ERC Position Statement: Towards a Future Internet Public Private Partnership Kostas Pentikousis, Mirko Schramm, and Cornel Pampu Huawei Technologies European Research Centre Carnotstrasse

More information

An Overview of Distributed Databases

An Overview of Distributed Databases International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 207-214 International Research Publications House http://www. irphouse.com /ijict.htm An Overview

More information

Intergiciels et systèmes distribués

Intergiciels et systèmes distribués Intergiciels et systèmes distribués Christophe Gransart IFSTTAR - LEOST 20 Novembre 2012 Christophe Gransart (IFSTTAR) GERI STICITS 20 Novembre 2012 1 / 38 Plan 1 Introduction 2 Service Oriented Architecture

More information

Getting Familiar with Cloud Terminology. Cloud Dictionary

Getting Familiar with Cloud Terminology. Cloud Dictionary Getting Familiar with Cloud Terminology Cloud computing is a hot topic in today s IT industry. However, the technology brings with it new terminology that can be confusing. Although you don t have to know

More information

SERVICE DISCOVERY AND MOBILITY MANAGEMENT

SERVICE DISCOVERY AND MOBILITY MANAGEMENT Objectives: 1) Understanding some popular service discovery protocols 2) Understanding mobility management in WLAN and cellular networks Readings: 1. Fundamentals of Mobile and Pervasive Computing (chapt7)

More information

Managing a Fibre Channel Storage Area Network

Managing a Fibre Channel Storage Area Network Managing a Fibre Channel Storage Area Network Storage Network Management Working Group for Fibre Channel (SNMWG-FC) November 20, 1998 Editor: Steven Wilson Abstract This white paper describes the typical

More information

AGENT TECHNOLOGY ASA SOLUTION FOR NETWORK-ENABLED GIS

AGENT TECHNOLOGY ASA SOLUTION FOR NETWORK-ENABLED GIS AGENT TECHNOLOGY ASA SOLUTION FOR NETWORK-ENABLED Saeid M. Kalantari a, Ali A. Alesheikh b a Graduate student of master, Dept. of Eng. sm_kalantary@yahoo.com b Assistant Professor, Dept. of Eng. alesheikh@kntu.ac.ir

More information

Mobile Cloud Computing Security Considerations

Mobile Cloud Computing Security Considerations 보안공학연구논문지 (Journal of Security Engineering), 제 9권 제 2호 2012년 4월 Mobile Cloud Computing Security Considerations Soeung-Kon(Victor) Ko 1), Jung-Hoon Lee 2), Sung Woo Kim 3) Abstract Building applications

More information

Cisco Virtual Office Unified Contact Center Architecture

Cisco Virtual Office Unified Contact Center Architecture Guide Cisco Virtual Office Unified Contact Center Architecture Contents Scope of Document... 1 Introduction... 1 Platforms and Images... 2 Deployment Options for Cisco Unified Contact Center with Cisco

More information

SavvyDox Publishing Augmenting SharePoint and Office 365 Document Content Management Systems

SavvyDox Publishing Augmenting SharePoint and Office 365 Document Content Management Systems SavvyDox Publishing Augmenting SharePoint and Office 365 Document Content Management Systems Executive Summary This white paper examines the challenges of obtaining timely review feedback and managing

More information

Features of AnyShare

Features of AnyShare of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...

More information

SSL VPN vs. IPSec VPN

SSL VPN vs. IPSec VPN SSL VPN vs. IPSec VPN White Paper 254 E. Hacienda Avenue Campbell, CA 95008 www.arraynetworks.net (408) 378-6800 1 SSL VPN vs. IPSec VPN Copyright 2002 Array Networks, Inc. SSL VPN vs. IPSec VPN White

More information

VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY. 03/27/09 Version

VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY. 03/27/09 Version VIRGINIA DEPARTMENT OF MOTOR VEHICLES SECURITY ARCHITECTURE POLICY 03/27/09 Version Approved April 30, 2009 Approval of Enterprise Security Architecture Policy (03/27/2009 Version) Douglas G. Mack IT Security

More information

Position Paper for The Fourth W3C Web and TV Workshop. Mingmin Wang Oriental Cable Network wmm@scn.com.cn

Position Paper for The Fourth W3C Web and TV Workshop. Mingmin Wang Oriental Cable Network wmm@scn.com.cn Position Paper for The Fourth W3C Web and TV Workshop Abstract This paper introduces multiple screen technology research and services implementation in China, which has the close relationship between Web

More information

OPCNet Broker TM for Industrial Network Security and Connectivity

OPCNet Broker TM for Industrial Network Security and Connectivity OPCNet Broker TM for Industrial Network Security and Connectivity Tunneling Process Data Securely Through Firewalls A Solution To OPC - DCOM Connectivity from Integration Objects Compatible for DA, HDA

More information

Motivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures

Motivation Definitions EAI Architectures Elements Integration Technologies. Part I. EAI: Foundations, Concepts, and Architectures Part I EAI: Foundations, Concepts, and Architectures 5 Example: Mail-order Company Mail order Company IS Invoicing Windows, standard software IS Order Processing Linux, C++, Oracle IS Accounts Receivable

More information

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies 2011 International Conference on Computer Communication and Management Proc.of CSIT vol.5 (2011) (2011) IACSIT Press, Singapore Collaborative & Integrated Network & Systems Management: Management Using

More information

New Choices in Windows * Device Management

New Choices in Windows * Device Management White Paper 4th Generation Intel Core Processors and Intel Atom Processors Intel and Windows 8.1* Mobility New Choices in Windows * Device Management Considerations in Deciding How to Manage Windows Devices

More information

Keywords: mobile agents, supply chain management, industrial application.

Keywords: mobile agents, supply chain management, industrial application. A Shipment Tracking System using Wireless technology and Mobile agents Mei-Ling L. Liu, Alfredo Macias, Thuan Ngo Computer Science Department, California Polytechnic State University, San Luis Obispo mliu@csc.calpoly.edu

More information

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive

More information

Wireless ATA: A New Data Transport Protocol for Wireless Storage

Wireless ATA: A New Data Transport Protocol for Wireless Storage Wireless ATA: A New Data Transport Protocol for Wireless Storage Serdar Ozler and Ibrahim Korpeoglu Department of Computer Engineering, Bilkent University, 06800 Bilkent, Ankara, Turkey {ozler, korpe}@cs.bilkent.edu.tr

More information

SECURE ACCESS TO THE VIRTUAL DATA CENTER

SECURE ACCESS TO THE VIRTUAL DATA CENTER SOLUTION BRIEF SECURE ACCESS TO THE VIRTUAL DATA CENTER Ensure that Remote Users Can Securely Access the Virtual Data Center s Virtual Desktops and Other Resources Challenge VDI is driving a unique need

More information

Client/server is a network architecture that divides functions into client and server

Client/server is a network architecture that divides functions into client and server Page 1 A. Title Client/Server Technology B. Introduction Client/server is a network architecture that divides functions into client and server subsystems, with standard communication methods to facilitate

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

Software Testing for Ubiquitous Computing Devices

Software Testing for Ubiquitous Computing Devices Software Testing for Ubiquitous Computing Devices Ichiro Satoh National Institute of Informatics 2-1-2 Hitotsubashi, Chiyoda-ku, Tokyo 101-8430, Japan E-mail: ichiro@nii.ac.jp Abstract We describe an approach

More information

Secured Voice over VPN Tunnel and QoS. Feature Paper

Secured Voice over VPN Tunnel and QoS. Feature Paper Secured Voice over VPN Tunnel and QoS Feature Paper Table of Contents Introduction...3 Preface...3 Chapter 1: The Introduction of Virtual Private Network (VPN) 3 1.1 The Functions and Types of VPN...3

More information

Wireless Solutions Beyond Email

Wireless Solutions Beyond Email Wireless Solutions Beyond Email Wireless Solutions Beyond Email Agenda Wireless Beyond Email in the Enterprise Key Success Factors for Wireless Enterprise Applications Understanding ROI & TCO for Wireless

More information

Horizontal IoT Application Development using Semantic Web Technologies

Horizontal IoT Application Development using Semantic Web Technologies Horizontal IoT Application Development using Semantic Web Technologies Soumya Kanti Datta Research Engineer Communication Systems Department Email: Soumya-Kanti.Datta@eurecom.fr Roadmap Introduction Challenges

More information