1 Department of Electrical Engineering and Information Technology Institute for Media Technology Distributed Multimodal Information Processing Group Prof. Dr.-Ing. Eckehard Steinbach Prototyping and Evaluation of an Interactive DoorSign Aufbau und Evaluierung eines interaktiven Türschildes Felix Reitberger Diploma Thesis Author: Address: Felix Reitberger Matriculation Number: Professor: Prof. Dr.-Ing. Eckehard Steinbach Advisor: Prof. Dr. Matthias Kranz Dipl.-Ing. Luis Roalter Begin: End:
3 Abstract Optimized usage of rooms at university becomes more and more important with a growing number of students. As a student today it is close to impossible to reserve a room for learning. Of course there are rooms known to be available at a certain time, but these can not be booked by students so there is the possibility that you and your learning group will compete with some noisy group of other students who occupied the room as well. To improve that situation the Interactive DoorSign, a prototype developed to manage rooms through an Android tablet attached next to them, was put into beta testing. There are existing projects on the topic which were reviewed in chapter 2. The improvements on the existing concept and development required to put the prototype into testing are described as well, especially the casing that was assembled using rapid prototyping technology is unusual. Details of the security implications, the possible attack vectors on the system and the concerns about the privacy of the users are discussed in chapter 3. The evaluation of the prototype can be found in chapter 4 and 6. The methodology of the evaluation is described. The results show that while the prototype implementation receives a low value on the System Usability Scale (SUS) every user was able to complete the given tasks and was able to learn the interaction with the system quickly. Zusammenfassung Die Optimierung der Raumnutzung an Universitäten wird mit wachsender Anzahl Studenten wichtiger. Für einen heutigen Studenten ist es unmöglich, Räume an der Universität für den Zweck einer Lerngruppe zu reservieren. Es ist zwar einsehbar, wann die Räume belegt sind, aber sie in den Zwischenzeiten für einen bestimmten Zweck zu reservieren ist nicht zugelassen und so kann keine ruhige Lernumgebung garantiert werden. Um die Situation zu verbessern wurde das Interactive DoorSign, ein Prototyp der Raummanagement durch ein Android Tablet in direkter Nachbarschaft ermöglicht, einem Betatest unterzogen. Existierende Projekte zu dem Thema und die vorgenommenen Entwicklungen an dem existierenden Konzept wurden in Kapitel 2 diskutiert. Die Evaluierung des Prototypen, sowie die verwendete Methodologie werden in Kapitel 6 und 4 beschrieben. Die Ergebnisse der Evaluation zeigen, dass obwohl das System insgesamt einen geringen Wert auf der SUS erreicht, jeder Benutzer schnell in der Lage war das System zu bedienen. iii
4 Contents Contents iv 1. Introduction 1 2. Development Related Work Secure Authentication Webbased Apps Related Projects Fablab Munich doorlock Fonera Routers as doorlocks Existing Solutions Design of the Prototype Requirements D-printed parts Laser Cut parts Backend Django as Framework REST API Network Components Frontend Security Aspects Physical aspects Protocol User New Attack Vectors Usability Research questions Evaluation of the existing solution iv
5 CONTENTS v 4.3. Evaluation of the existing information display Userstudy Research methodology Who is the target group? How was the questionnaire implemented? Analysing at the Data Challenges Evaluation Sociodemographics System Usability Privacy issues Further functions Evaluation of lectures Conclusion User Study Future Work A. Appendix 47 A.1. python backend A.2. OpenSCAD code of 3d printed parts A.3. Survey questions A.3.1. System Usability Scale A.3.2. Soziodemographie A.3.3. Nutzerfragen List of Figures 54 List of Tables 56 List of Acronyms 57 Bibliography 59
6 Chapter 1. Introduction Recent years have seen a rapidly growing demand for smartphone-controlled light bulbs and door locks . can be the technology that makes home automation systems available to a whole generation of users. Android, being the most widely used smartphone operating system, interfacing with Arduino, a usable embedded systems platform, makes it possible to develop these control systems rapidly and adapt them easily to the given use case. In case of this thesis the use case is the room control and administration of a seminar room at Technische Universität München (TUM). The question might arise why a university lectures do require the physical presence of students at all. Projects like coursera 1, unterrichtsmitschau 2 or the open university 3 show that teaching itself is possible without large halls, and single courses can have infinite participants. Infinite in theory of course, correcting exercises and exams is still a workload that does not scale as easily as web servers and requires qualified personnel. So, what are the reasons for us to move our physical bodies into that central place through real world transportation, just to acquire information? At this central place there are labs, computers and other machines students are allowed to access if they relate to their work at university. Persons needed to be met to organize the proceeding or discuss work. To paraphrase this, there are shared resources a multitude of interested parties wants to access. But coming back to how can this technology be used to improve usage of resources at a university? Most of these resources are behind doors. That is why the need for a system to access these doors easily, without the need of complex administration of physical keys, becomes visible clearly. This leads us to an the Interactive DoorSign which should be deployed and and evaluated by user tests. Why is a door sign next to a room needed instead of an mere online representation of the room? The benefit here is that the interested audience can find room related information at its natural place, next to the room. There is no need to find out which room belongs to which institute, who is responsible for it. If one knows where the room is, one can always find out if and when it is available or occupied, by whom and maybe interact further with the system to leave messages and 1 coursera, https://www.coursera.org/, accessed on LMU video online, accessed on open university, accessed on
7 Chapter 1. Introduction 2 access the room. As the institution providing this system would not have to worry about users bringing their own hardware to be online, which can ease further development and help making the system as accessible as possible. Some methods of authentication might require users to rely on additional hardware though. There are security concerns related to a fully aware ubiquitous computing system  but the possible benefits outweigh the security concerns. This thesis presents the development of the prototype which was the first step required to put the system into beta testing. The prototype was developed with special consideration of accessibility and rapid prototyping in mind. The details are described in chapter 2. The rest of the thesis is organized as follows. Chapter 3 looks at the implications for security that occur when dealing with a computer system that can open real world doors. As chapter 4 outlines, the main goal of this project was to increase the usability of the existing system and put it through a test with potential users. The need to find out where issues or further potential in everyday use can be found was addressed as well as the evaluation of the existing room reservation backend. Chapter 5 describes the methodology used to conduct the user study. Chapter 6 presents the analysis of the results and finally, Chapter 7 contains the conclusion and view on possible further development.
8 Chapter 2. Development This chapter describes the stages of development. Referring to the previous prototype  the improvements of the new prototype tested in a real world context are highlighted. To mention the requirements shortly, we want an Interactive DoorSign that enables the user to book rooms, evaluate lectures and unlock the door. A more detailed description of the requirements that were followed can be found in subsection Related Work Ambient Displays have been the subject of interest for more than a decade . Today they are common at fairs, train stations and other public spaces. Although they are mostly used for advertising or information display (unidirectional communication) with increased availability and increased acceptance of touch interfaces the opportunity presents itself to use those displays for bidirectional communication as well. What are the use cases expected from an Interactive DoorSign? An ambient display next to an office door can inform the passerby whether the room is occupied or not, in addition it can even give details like contact numbers or . An interactive display can enable the passerby to leave a message directly on the display without thinking about how to write an . Similar to the Prototypes discussing the social aspects of a public interactive display  the owner of the room should have the possibility to update his content on the board to inform about absence, new lectures or sudden changes in the schedule (for example lecture in room x moved to room y). That is the first glimpse on the difficulty of properly authenticating the user on an interface in public space. Taking the described use cases under consideration, if the office is located in a public area where a lot of people walk by there can potentially be a lot of messages. This can lead to a significant administration overhead, quite possibly spam. If the user is asked to authenticate himself the barrier to leave a message is higher then if he can leave messages anonymously, so the probability of unnecessary messages is likely to be lower. This initial interaction, the user seeing the display, maybe checking some of the information on it or leaving a message, can be seen as welcoming the user . While these tests show that the way a door 3
9 Chapter 2. Development 4 behaves towards the user results in a feeling of being welcome it is obvious that the interaction with a closed door without the ability to open it is unpleasant. The Interactive DoorSign therefor has a role as a virtual outer office, that is a place a passerby can interact with until he achieves closure. He achieves closure because he obtained the information he was looking for, because he informed the system about his presence or because he authenticated himself and entered the room With new research questions appear. The wide spread of the Android operating system in combination with the ease of use of the Arduino platform enable researchers to rapidly develop prototypes of ubiquitous computing systems that solve or at least simplify everyday tasks. These systems relate to the Interactive DoorSign in in various ways, partially solving issues that occurred in the development of the prototype as well as partially showcasing or exploring interactions that are likely to occur. One of the first papers that was found was the implementation of an android based intercom. The android based intercom enables the user to ring at the door, leave a message and authenticate himself to open it. The similarity of use cases is evident. An intercom system handles a similar scenario as the Interactive DoorSign. The possibility of leaving messages in case of absence is important for both, unlocking the door as well. While being a powerful platform for systems requiring real-time behavior android is not designed primarily for that purpose, therefor the effort required to implement such functionalities will be significant . The requirement for a real-time system that handles room administration is achieved through the replacement of JQuery based web application with a native android app and is discussed in . Several studies have been done on [1, 9 11]. Most of these tutorials focus on a proof on concept and show basic interaction, for example turning a light on and off through a web interface. None of them provides solutions for multi user interaction with an Android device, secure authentication or acceptance by the user. They proof to be a valuable entry point into development but don t necessarily provide viable solutions because the requirements in a professional scenario extend those in a experimental or at home scenario far Secure Authentication The importance and the challenges of secure authentication on a mobile device is discussed by several researchers [12 14]. Few of those papers focus on the multi user usage of such a device . The possibility and amount of use cases of a Radio-frequency identification (RFID) based indoor tracking system is emphasized in . The approach, that basic movements like approaching the door or lifting the RFID tag up in front of the door to open it, can result in a variety of
12 Chapter 2. Development 7 be found in Figure 2.1. The diagram shows that only after the user called and entered his morse code correctly the door will open. Figure 2.1.: The states of the Fablab doorlock, UML by Robert Meisenecker, prototype by Riccardo Giordani
13 Chapter 2. Development Fonera Routers as doorlocks Another idea from the sphere of hackerspaces is using a cheap router hardware that runs some unix to authenticate the user and enable him to run a script on the router that unlocks the door. A good example for that approach is the Fonera hardware 4 running on OpenWrt 5. In order to have a secure authentication the user has to carry a device capable of Wireless Fidelity (WiFi) and Secure Shell (SSH). The logon to the device happens via SSH, once logged on the user can use terminal commands to open the door. This method can be perceived as not user friendly but it works reliably. The biggest advantage of this system is the price of the hardware. Fonera routers are available around 15 and provide a reasonably secure system for unlocking the door. The user experience is great for an experienced user who is familiar with a command line interface but most likely will not be accepted by a target group that is used to input through graphical user interface (GUI). This example implementation illustrates that for a technical experienced user group there might be solutions for the unlocking that do not require relatively costly hardware, in terms of energy consumption and complexity of development. Figure 2.2.: Opened fonera FON2100 router, running OpenWrt and attached board for control of a door lock. 4 Fon, manufacturer of fonera routers, accessed on OpenWrt, unix operating system for embedded systems, https://openwrt.org/, accessed on
14 Chapter 2. Development Existing Solutions There are only few existing solutions for door signs that enable user interaction, but some scientific projects that use a door sign to demonstrate ubiquitous computing use cases. Interactive and Networked digital Doorsign from ETH Zürich 6 that focuses on the display of room related information and uses real data from the university room management system. Hermes project from Lancaster University that differentiates in detail between door signs in different scenarios . Interactive Doorsign project from NTNU Trondheim that shows how to implement an Interactive Doorsign as part of the common SCRUM development process . The Interactive DoorSign in this thesis aims to evaluate the everyday use of such a system Design of the Prototype There are different solutions how to mount a tablet sized device on a wall. Most of them do not address the issue of accessibility. The problem is, that average sized people (1.81m according to ) find themselves rarely confronted with, such a device on a wall put up in a way that it is best readable for most it won t be readable for little persons like children or wheelchair users. Furthermore, the prototype should enable a certain kind of user interaction (the user touching the screen) while it forbids other interactions (usage of home button, turn off, change volume). The issue was resolved by designing a new wall mount and using rapid prototyping technology (laser cutter + 3d printer) to manufacture the required parts. To design the enclosure for the device OpenSCAD 7 was used to define a parametric 3d model of the wall mount enclosing the tablet Requirements The requirements listed here concern both software and hardware of the prototype. Walk through a set of use cases. The prototype can showcase some typical use cases without any manual assistance or Wizard of Oz setup. Everything should be working similar to a final product, fully automated and with realistic data. Mounting on the wall. This is required to collect feedback from colleagues, students and maybe administration. It can also be useful to see how it would withstand the usage by 6 Interactive and Networked digital Doorsign doorsign2, accessed on OpenSCAD, The Programmers Solid 3D CAD Modeller accessed on
15 Chapter 2. Development 10 passerby s. Automated manufacturing The existing wall mount was crafted in a way that did not allow automated production. Following these requirements lead to the design and construction of the prototype D-printed parts To model the wall mount I subtracted the size of the tablet from a cuboid large enough to contain the tablet and an aluminum rod making the angle adjustable. The print itself was done on an Ultimaker 8 using Polylactic acid (PLA). The reason to use PLA in this context is that the base of the parts to be printed is fairly large (225mm x 180mm). When printing objects with a large base an effect called warping occurs . This effect relates to the temperature difference during the print. Using a material with as little temperature difference as possible the effect is significantly reduced (PLA is printed best around 210 C, compared to Acrylonitrile butadiene styrene (ABS) which is printed around 240 C). Also using a build platform that sticks well to the PLA helps a lot to avoid warping even with objects that have a footprint of that size. Warping is an effect that occurs especially during the process of fused deposition modeling (FDM), an additive manufacturing process open source 3D printers like the Ultimaker are based on. It describes the contraction of the material on the build platform undergoes while cooling down. This leads to several bugs when either the nozzle pushed the raised corner of the object or the object looses grip from the build platform. The source of the printed parts can be found in??. Figure 2.3.: Left: view of the 3D printed parts in OpenSCAD, Right: wall mount in the real world test setup next to a door 8 Ultimaker accessed on
16 Chapter 2. Development Laser Cut parts To connect the printed parts and fully enclose the tablet, laser cut acrylic glass plates of 3mm thickness were used. The parts were connected with self-cutting screws that get good grip in the printed parts. The connectors to the wall were laser cut out of medium-density fiberboard (MDF) and glued together. While 3D-printing these parts would be theoretically possible laser cutting them is faster. Studies from Hasso-Plattner Institute also show the advantages of using laser cut objects instead of additive manufacturing (3D-printing) . The advantage is that the required time to manufacture a needed part is reduced. There is less time for the machine to fail, during the 17h needed to print one part of the enclosure on an Ultimaker there are plenty of reasons for the machine to fail due to a tiny mechanical bug. The laser cutter takes approximately 5 minutes to cut one plate, it is more precise and there is less maintenance per operating hour required. The time for one iteration in the development of a fitting enclosure is significantly shorter then on a 3D-printer. The parts drawn in OpenSCAD were most sufficient overall because of existing code that was reused from the modeling of the 3D parts but basically any 2D vector graphics software can be used. 3D models can be translated into laser cut layers easily using the projection function built into OpenSCAD Backend The requirement for the backend was that it should contain the events taking place in the room, it should enable the user to create new events and book the room in the future. Leaving messages was another requirement, addressing the need of evaluation in case of a seminar room and the need of notifying about absence in case of an office Django as Framework The existing backend from  was written in Java to run on a Tomcat server. Asking Programmers about which language is best to use for a certain problem can easily result in kind of a intense discussion without result. This is best explained by the identification with what the backend is required to do. So a Java programmer will try to use Java for every project, a PHP programmer will try to use PHP. Previous projects showed that the use of a Java Tomcat Server can be a big bottleneck. Not only the Codebase is huge but also Tomcat Server had some performance issues. A more detailed Analysis of the performance of different web servers can be found in . For the first tests where no user would directly interact with the backend performance with simultaneous requests was not an issue. There would be only a few tablets (less then 5) that might 9 3D to 2D projection accessed on
19 Chapter 2. Development Network Components In this section the involved hardware as well as possible changes to network architecture to get better control about the required communication are described. Figure 2.5 shows the current topology of the system. With the existing architecture communication through a web service is required . The acceptance of not being able to open the door because connectivity to the internet is lost is hard to grasp for a user. If the server would exist within the local network then the message to open the door would not have to travel through the internet but could remain within the secure university or company network. This does not allow the attacker to sniff the packets at multiple points of the connection, he would have to listen them inside of the campus Local Area Network (LAN). The proposed topology would look like Figure 2.6. The blue line highlights the communication from user through the frontend to the server. The black line displays the communication between server and door lock that happens when the "unlock" command is processed. The green line shows the alternative way of accessing the backend through a web interface for administration purposes. For the implementation of the prototype a Tablet running Android 2.2 was used 10. To unlock the door a radio key from TUM was used and controlled through a relay on the Arduino 11. To receive TCP connections a network shield was used as well. The final hardware used in the live setup that users evaluated can be seen on Figure 2.7. It is based on Additional hardware required are the digital lock 12 and the corresponding radio key. How these existing components could be used to interact more directly with the tablet is discussed in Protocol. The cost of implementation might be the reason why computers are not found attached to doors yet. So lets look at the cost of implementing the hardware. It took us approximately 8 hours to install the system (prepare network and electricity, drill through the wall, attach prototype, attach cable, clean up) which can be reduced by using more professional gear and craftsmen. The cost of the hardware can be seen in detail at table 2.1. Compared to commercial systems which start around 1k this seems rather cheap but it would be required to look into the details of warranty and capabilities of the system to compare the quality/price ratio to estimate the real cost of such a system Frontend For the development of the fronted of the existing android app was aligned with the TUM Corporate Design (CD) 13. In the CD guide there is no section about mobile application development. The 10 Point of View Tegra Tablet detail&product_id=188, accessed on Arduino homepage accessed on Simons Voss digital lock handbook Schliesszylinder3061_VdS_D.pdf, accessed on TUM CD guide accessed on
20 Chapter 2. Development 15 Table 2.1.: The cost of the components required in addition to the existing digital door lock hardware. The amounts listed here are calculated without bulk discount. Hardware approximated cost Android Tablet 50 Arduino board 20 Arduino Ethernet shield 30 Relay + Proto shield 10 hardware cost per door 100 Figure 2.5.: Diagram showing the network components and hardware parts interacting to provide the functionality of the prototype. One issue is the packet that has to travel to a web server and back again to the door lock to unlock the door. CD colors from the guide were used and instead of the light screen design of the website large areas of the screen black were kept black. The navigation is located on the right and leads the user directly to all views. These views have either informational character (info and about) or provide possibilities to interact (now, reserve and schedule). An informational view displays static Hypertext Markup Language (HTML) which is sufficient for the current state of development. In the interactive now view you see the current and upcoming event, you can leave a message on one of these events and in case there is an event running currently you can open the door (see Figure 2.8). The schedule view of the application provides a good overview what is scheduled in the current week as well as possibilities to interact. In this view new events can be created, existing events can be commented on and it is possible to scroll in the past or future to get information
Mobile Testing Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality, usability and consistency. A mobile application
2015 Mobile App Testing Guide Basics of Mobile App Testing Introduction Technology is on peek, where each and every day we set a new benchmark. Those days are gone when computers were just a machine and
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: firstname.lastname@example.org Information in this document is subject to change without notice. Companies names
EN SwannEye HD Plug & Play Wi-Fi Security Camera Quick Start Guide Welcome! Lets get started. QHADS453080414E Swann 2014 1 1 Introduction Congratulations on your purchase of this SwannEye HD Plug & Play
Motorised IP Video surveillance camera for smartphones, tablets and PC / MAC. Protect your home and family remotely! User s manual for Android Application Thanks We thank you for choosing Aquila Vizion.
// tutorial Using the Push Notifications Extension Part 1: Certificates and Setup Version 1.0 This tutorial is the second part of our tutorials covering setting up and running the Push Notifications Native
Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within
ORACLE MOBILE APPLICATION FRAMEWORK DATA SHEET PRODUCTIVE ENTERPRISE MOBILE APPLICATIONS DEVELOPMENT KEY FEATURES Visual and declarative development Mobile optimized user experience Simplified access to
ORACLE ADF MOBILE DATA SHEET PRODUCTIVE ENTERPRISE MOBILE APPLICATIONS DEVELOPMENT KEY FEATURES Visual and declarative development Java technology enables cross-platform business logic Mobile optimized
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: email@example.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
MOOCviz 2.0: A Collaborative MOOC Analytics Visualization Platform Preston Thompson Kalyan Veeramachaneni Any Scale Learning for All Computer Science and Artificial Intelligence Laboratory Massachusetts
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
Smart Shopping- An Android Based Shopping Application 1 Adarsh Borkar, 2 Madhura Ansingkar, 3 Monali Khobragade, 4 Pooja Nashikkar, 5 Arti Raut 1,2,3,4 Department of Computer Science and Engineering, 5
Quick Heal Total Security for Android Anti-Theft Security. Web Security. Backup. Real-Time Protection. Call & SMS Blocking. Product Highlights Complete protection for your Android device that simplifies
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
User's Guide [Home Network] app Model No. Table of Contents Table of Contents 1 Welcome to the Panasonic Home Network System!...5 1.1 What is the Panasonic Home Network System?...5 1.2 What can I use it
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
User Manual December 2014 202-11380-01 NETGEAR, Inc. 350 East Plumeria Drive San Jose, CA 95134, USA Support For product updates and web support, visit http://support.arlo.com. Trademarks NETGEAR, Inc.
SOUTHERN POLYTECHNIC STATE UNIVERSITY Snort and Wireshark IT-6873 Lab Manual Exercises Lucas Varner and Trevor Lewis Fall 2013 This document contains instruction manuals for using the tools Wireshark and
STB- 2 Installation and Operation Manual Index 1 Unpacking your STB- 2 2 Installation 3 WIFI connectivity 4 Remote Control 5 Selecting Video Mode 6 Start Page 7 Watching TV / TV Guide 8 Recording & Playing
www.agileload.com There is no second thought about the exponential increase in importance and usage of mobile applications. Simultaneously better user experience will remain most important factor to attract
Semester Thesis Traffic Monitoring in Sensor Networks Raphael Schmid Departments of Computer Science and Information Technology and Electrical Engineering, ETH Zurich Summer Term 2006 Supervisors: Nicolas
DOMIQ, SIP and Mobotix cameras This tutorial is the second in the series in which we present integration of Mobotix devices with the DOMIQ system. The main subject of this tutorial is the implementation
SafeNet Authentication Service Welcome Guide 1 Document Information Document Part Number 007-012414-002, Rev. B Release Date February 2015 Trademarks All intellectual property is protected by copyright.
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
White Paper The Principles of Tokenless Two-Factor Authentication Table of contents Instroduction... 2 What is two-factor authentification?... 2 Access by hardware token... 3 Advantages and disadvantages
Using MioNet Copyright 2006 by Senvid, Inc. All rights reserved. 2445 Faber Place, Suite 200, Palo Alto, CA 94303 Voice: (650) 354-3613 Fax: (650) 354-8890 1 COPYRIGHT NOTICE No part of this publication
IPThermo206G Offline/online data collector, SMS alarm sender, watchdog terminal for IPThermo Pro network IPThermo 206G is the central data handling terminal of the IPThermo Pro measurement network. This
HP AppPulse Active Software Version: 2.2 For AppPulse Active Document Release Date: February 2015 Software Release Date: November 2014 Legal Notices Warranty The only warranties for HP products and services
Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day firstname.lastname@example.org v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
Home Monitoring and Control service provided by Verizon Online LLC A separate subscription to Verizon FiOS TV is required for use with FiOS TV service. About This Manual This manual is designed for online
Amcrest 960H DVR Quick Start Guide Welcome Thank you for purchasing our Amcrest 960H DVR! This quick start guide will help you become familiar with our DVR in a very short time. Before installation and
Mobile web apps: The best option for business? A whitepaper from mrc Introduction Mobile apps have finally reached the point where businesses can no longer afford to ignore them. Recent surveys and studies
Connect Bridge - Mobile CRM Android User Manual Summary This document describes the Android app Mobile CRM, its functionality and features available. The document is intended for end users as user manual
RF-ATTENDANCE RFID BASED STUDENT ATTENDANCE AUTOMATION SYSTEM NECESSITY All the parents & Institute Administration are always concerned about their ward s / student s irregular attendance, their tendency
Building Web-based Infrastructures for Smart Meters Andreas Kamilaris 1, Vlad Trifa 2, and Dominique Guinard 2 1 University of Cyprus, Nicosia, Cyprus 2 ETH Zurich and SAP Research, Switzerland Abstract.
Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made
Quick Heal Mobile Security Anti-Theft Security. Real-Time Protection. Call & SMS Blocking. Product Highlights With an easy-to-update virus protection and a dynamic yet simple interface, virus removal from
Quick Start Guide Cisco Small Business WAP371 Wireless AC/N Dual Radio Access Point with Single Point Setup Quick Start Guide Versión en Español para México en el CD Version en français sur CD Versione
Mobile Application Security Sharing Session Agenda Introduction of speakers Mobile Application Security Trends and Challenges 5 Key Focus Areas for an mobile application assessment 2 Introduction of speakers
How Secure is your Authentication Technology? Compare the merits and vulnerabilities of 1.5 Factor Authentication technologies available on the market today White Paper Introduction A key feature of any
Online Test Administrator Quick Reference Guide Updated 08/02/2012 v.2.0 M e s s a g e T e s t N a v ( W h a t D o e s T h i s M e a n? ) Login Screen The student will type in the Login ID and Test Code
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.
OWASP Top 10 for IoT - Explained Table of Contents Introduction... 1 Insecure Web Interface... 2 Insufficient Authentication/Authorization... 3 Insecure Network Services... 3 Lack of Transport Encryption...
Media Server Installation & Administration Guide Smarter Surveillance for a Safer World On-Net Surveillance Systems, Inc. One Blue Hill Plaza, 7 th Floor, PO Box 1555 Pearl River, NY 10965 Phone: (845)
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Document management and exchange system supporting education process Emil Egredzija, Bozidar Kovacic Information system development department, Information Technology Institute City of Rijeka Korzo 16,
mysensors Information to Users mysensors Wireless Sensors and Ethernet Gateway Quick Start Guide This equipment has been tested and found to comply with the limits for a Class B digital devices, pursuant
SALIENT SYSTEMS WHITE PAPER Deploying VSaaS and Hosted Solutions Using CompleteView Understanding the benefits of CompleteView for hosted solutions and successful deployment architecture Salient Systems
Attribute to: Fernando Pires VP, Sales and Marketing Morse Watchmans Best Practices Provide Best Value When Implementing Key Control and Asset Management Systems Abstract Key control and asset management
Business Enhancement Ltd. STANDARD OPERATING INSTRUCTION Business Enhancement Ltd Tel: +44 (0)1277-372301 Fax: +44 (0)1277-373505 e-mail: email@example.com Owner: TECHNICAL DIRECTOR Date: 07 July 2000
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Wave 4.5 Wave ViewPoint Mobile 2.0 User Guide 2014 by Vertical Communications, Inc. All rights reserved. Vertical Communications and the Vertical Communications logo and combinations thereof and Applications
Working Together Managing and Securing Enterprise Mobility WHITE PAPER Larry Klimczyk Digital Defence P: 222.333.4444 Contents Executive Summary... 3 Introduction... 4 Security Requirements... 5 Authentication...
WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS
3D PASSWORD Tejal Kognule Yugandhara Thumbre Snehal Kognule ABSTRACT 3D passwords which are more customizable and very interesting way of authentication. Now the passwords are based on the fact of Human
Mobile Application Platform from FeedHenry Next generation cloud-based solution that simplifies the development, deployment and management of mobile apps for enterprise. Develop native, hybrid and HTML5
Surveillance System Using Wireless Sensor Networks Dan Nguyen, Leo Chang Computer Engineering, Santa Clara University Santa Clara, California, USA firstname.lastname@example.org email@example.com Abstract The
Locking down a Hitachi ID Suite server 2016 Hitachi ID Systems, Inc. All rights reserved. Organizations deploying Hitachi ID Identity and Access Management Suite need to understand how to secure its runtime
Windows Operating Systems Basic Security Objectives Explain Windows Operating System (OS) common configurations Recognize OS related threats Apply major steps in securing the OS Windows Operating System
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...
zen Platform technical white paper The zen Platform as Strategic Business Platform The increasing use of application servers as standard paradigm for the development of business critical applications meant
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Chapter 2 Planning the Installation and Installing SQL Server In This Chapter c SQL Server Editions c Planning Phase c Installing SQL Server 22 Microsoft SQL Server 2012: A Beginner s Guide This chapter
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
Overview M ODELS Remote Insight Lights-Out Edition 157866-001 New Remote Insight Lights-Out Edition provides virtual graphical control using any standard browser to your remote or data centre server, giving
Quick Setup Guide What is Bitdefender BOX? Think about Bitdefender BOX like an antivirus for your network. It s a hardware device that sits next to your Wi-Fi router and protects all Internet connected
Your consent to our cookies if you continue to use this website.