PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION"

Transcription

1 PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION YANG-TING SHEN, TAY-SHENG TENG Information Architecture Lab, Department of Architecture, National Cheng Kung University, Taiwan. Abstract. The objective of the paper is to explore how the personal mobile devices help the user to interact with space and get personal service. We embed the RFID tag in PDA for the sake of identifying the space. The space adapts itself to fit the user s need by reading the data on the electronic tag. And the user uses PDA to interact with the space and record the interactive experience. We establish an interactive scenario between the user and the space to experiment how the system work. 1. Introduction Until recently, personal mobile devices were increasingly used to deal with the personal tasks in daily life. The functions of personal mobile devices include: (i) Cell phone, (ii) Organizing personal information or schedule, (iii) Accessing internet, (iv) Sending or receiving , (v) Remote controll, (vi) Spatial navigation (GPS). The most popular personal mobile device is the cell phone. Cell phones are largely used to support the subtitles of our everyday life. In addition, people use PDA to organize personal data, schedule tasks, and remind meetings. Increasingly, people connect to the internet using personal mobile devices to explore websites or send and receive mails. In addition to these functions, we regard personal mobile devices as personal digital agents. Besides, as it is argued that humans are surrounded with successive artificial skins that continually vary in number and character according to changing needs and circumstances (Mitchell, 2003), we expect the agents to play an important role of a channel helping people to connect with the next skin of space. The skin of space consists of multimedia and ubiquitous computers that vanish into the background. When we use personal mobile devices to interact with space, the space becomes human explicit boundaries. However, there is a problem, that is, how to compute across the boundaries between private and public, implicit and explicit, personal and multi-user, permanent and temporary interactions. In other words, the personal mobile devices should be considered as media that help us to interact with space for personal services. When we access a space, the space can identify our positions and identification by connecting our personal mobile

2 PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION 383 devices such as PDAs. We interact with the space by PDAs that ensure that interaction is personal. Moreover, these daily experiences of interaction can be stored and retrieved by PDA. So our human experience is accumulated and incrementally modified with the interleaving interactions between personal digital devices and interactive spaces. 2. The Scenario In this paper, we regard personal mobile devices as personal digital agents. We use personal mobile devices to extend personal identification in the environment. And the environment can also identify us through the personal mobile devices. So we become unique to the environment. The personal mobile devices become our second skins the digital skins. The second skins not only demonstrate our identification, but store and retrieve our memory and experience. In this paper, we develop a scenario to describe how the personal mobile devices help people to extend their digital skins. This scenario pays attention to the interaction between exhibition spaces and people. 1. The user holds the PDA embedded with an RFID tag. The user imports his personal data in the electronic tag including personal ID, habits, interests, etc. When the user accesses the exhibition space, the exhibition space has an RFID reader to detect the electronic tag embedded in PDA and conveys the data to server PC in the back space. By means of those data, the exhibition identifies the user and modifies its setting to match the user s interest. The operations include projecting welcome messages on the wall, turning on the air conditioner, and showing some hints such as sparking LED lights to attract the user s attention based on the user s interest. These operations occur as soon as the user steps into the exhibition space. 2. At the same time, the user uses PDA to connect with the backend server by Wireless LAN and gets the corresponding information displayed on PDA s screen. The corresponding information supported by the server PC shows some icons and messages to suggest the next step. The user clicks on the icon on the PDA s screen and gets further hints, suggesting his going to the area of sparking LED light. The area of sparking LED light shows some information based on the user s interest which is imported in the RFID tag in advance. The user goes to the area of sparking LED light and visits multimedia exhibitions. During the visit, the user picks up a physical model. As this moment, the projector starts to project a set of 3D animation to introduce information of this model. When the user puts the physical model down, the animation stops and changes to the original setting. In the meanwhile, the server PC remotely delivers the website about the information

3 384 YANG-TING SHEN, TAY-SHENG TENG of 3D animation and saves it in the user s PDA. After exploring the area, the user may want to visit different information. So the user modifies his personal data in the RFID tag by the RFID writer in the exhibition space. The exhibition space re-detects the modified RFID tag and starts a new pattern of interaction. 3. After exploring the exhibition area, the user moves to another exhibition area. The user interacts with the new exhibition space again through his PDA embedded tag. The user gets new interaction patterns that are different from the previous exhibition space because the personal electronic tag has been modified. 3. Interaction Experience In this scenario, one of the main concepts is provision of personal service. The RFID tag embedded in PDA makes the exhibition space proactively identify the user. And the exhibition space can adapt itself to fit the user s need by reading habits, interests, and records. Different users interact with the exhibition space and have different interaction based on personal data stored in personal RFID tags. The service of space is customized, that is, people act in the same place but get different experiences. Another main concept is adaptive design of personal digital database. In the past, people s daily experiences come from long-term memories in this brains, but the memories aren t supported or augmented by any computational devices. By wearing the RFID tag embedded in PDA, human experience can be recorded, modified, and reused. If the computer detects the changed data, the computer changes the spatial setting to adapt to the new interaction rules. Furthermore, the new rules may trigger new interaction and create new experiences. The personal digital database is correspondingly extended and modified continuously. Besides, the user can take the personal digital database away and reuse it in other places. However, there will be a new mode of interaction because of the modified tag embedded in PDA. 4. Implementation We divide the implementation of the system into three layers: (i) Import (ii) Information processing (ii) Export. This architecture is shown as follows. Figure 1 shows three functional requirements of the personal services including import, information processing, and export function. On Layer 1, there are four devices to receive signals, and import signals into the server database and tag database. When the server database receives the signals from Layer 1, the backend server database analyzes the digital signals and transform the signals into the

4 PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION 385 Figure 1. Three parts of implementation. identifiable information. Then the server database exports the identifiable information to Layer 3. So the devices on Layer 3 come up with some responses based on the signals on Layer 1. Figure 2. The system architecture of PDA in ambient media exhibition space. Figure 2 shows that the user holds PAD embedded RFID tag into exhibition space. The RFID tag has imported some personal data. We plan four grids including ID, Habit, Interest, Record (Tag Database of Layer two) to record personal data in

5 386 YANG-TING SHEN, TAY-SHENG TENG the FID tag. First, we transform the personal data into code for the sake of writing into the RFID tag. The other reason is to make the RFID device identify the electronic tag by the code. For example, the user may enjoy a physical environment with air conditioning and yellow lighting. Once the user goes into the exhibition and approache the RFID device, the latter detects the RFID tag and receives the binary codes in this tag. The RFID device delivers those codes to server PC in the backspace of the exhibition space. The backend server database analyzes those codes and transforms the codes into scripts which the server PC can identify. Based on those scripts, the server starts to activate the devices on Layer 3 through the RF device. For example, the projector may project some texts and images to welcome the user. The air conditioning is activated. The yellow light turns on. The LED in the part of the exhibition area sparks to attract the user s attention. This is so because of the codes recorded in the RFID tag s grid. At the same time, the user uses PDA to connect to server PC by Wireless LAN for the sake of synchronous information to get the scenario supported by the server in the exhibition space (synchronous information of Layer 3). The processes of scenario consist of three parts: (i) Receiving and analyzing data (ii) Computing processing program (iii) Visualizing the result of computing. The PDA only needs to synchronize with the server to get the visual result of the scenario. The PDA needs no computing or pre-loads of any programmes. The visual scenario supported by the server shows some hints to the user. By reading those hints, the user knows how to interact with the exhibition space further. In the process of interaction, the visual scenario may suggest to the user to pick up the related model or go through the floor boards for further interaction. There are some sensors embedded for the sake of detecting the user s action. Once those sensors detect the user s action, they convey some signals to the server. After the backend database analysis, the exhibition shows some virtual information like animation corresponding to the user s action. At the same time, the user can request the server to send the website of the virtual information to save in the PDA. When the user finishes the interactive scenario, the user can modify the RFID tag via the RFID Writer device to save his experience (Tag Database of Layer 2 Record). Therefore, the personal experience is recorded and accumulated continuously by PDA. 5. Conclusion This paper describes how the personal mobile devices help the user to extend his digital boundary and get personal service in an interactive space. The interaction occurs between users and spaces. In the future, we attempt to extend the domain to study the connecting of two or more spaces by the personal mobile devices when the user takes the personal mobile devices from one space to others. The personal information should follow the user flowing from one place to another. The spaces

6 PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION 387 work synchronously or asynchronously to exchange users information by interacting with the personal mobile devices. Finally, we could construct a ubiquitous personal database by the personal mobile devices.

Towards a Transparent Proactive User Interface for a Shopping Assistant

Towards a Transparent Proactive User Interface for a Shopping Assistant Towards a Transparent Proactive User Interface for a Shopping Assistant Michael Schneider Department of Computer Science, Saarland University, Stuhlsatzenhausweg, Bau 36.1, 66123 Saarbrücken, Germany mschneid@cs.uni-sb.de

More information

NFC Based Equipment Management Inventory System

NFC Based Equipment Management Inventory System Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 NFC Based Equipment Management Inventory System Rung-Shiang

More information

What is the Next Generation of Human-Computer Interaction? CHI 2006 WORKSHOP

What is the Next Generation of Human-Computer Interaction? CHI 2006 WORKSHOP What is the Next Generation of Human-Computer Interaction? CHI 2006 WORKSHOP George Fitzmaurice Autodesk 210 King Street East, Toronto, Ontario, Canada fitzmaurice@acm.org To answer what is the next generation

More information

The preliminary design of a wearable computer for supporting Construction Progress Monitoring

The preliminary design of a wearable computer for supporting Construction Progress Monitoring The preliminary design of a wearable computer for supporting Construction Progress Monitoring 1 Introduction Jan Reinhardt, TU - Dresden Prof. James H. Garrett,Jr., Carnegie Mellon University Prof. Raimar

More information

Evolving Bar Codes. Y398 Internship. William Holmes

Evolving Bar Codes. Y398 Internship. William Holmes Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved

More information

EXPERIMENTAL INVESTIGATION OF THE INTEGRATION OF VIRTUAL MODELS AND THE PHYSICAL CONSTRUCTION

EXPERIMENTAL INVESTIGATION OF THE INTEGRATION OF VIRTUAL MODELS AND THE PHYSICAL CONSTRUCTION EXPERIMENTAL INVESTIGATION OF THE INTEGRATION OF VIRTUAL MODELS AND THE PHYSICAL CONSTRUCTION Abiola A. Akanmu 1, Chimay J. Anumba 2, John I. Messner 2, Sanghoon Lee 2, and Deepa Kundur 3 abiola.akanmu@wmich.edu,

More information

Towards Personal, Mobile & Location Based Learning Content Management

Towards Personal, Mobile & Location Based Learning Content Management 101 Towards Personal, Mobile & Location Based Learning Content Management Fabrizio Cardinali, Giunti Labs November 20 & 21, 2008 Produced by Designing and Managing Mobile Learning An Open Abstract Framework

More information

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,

More information

Call Answer/Message Manager with Aliant Voicemail Online

Call Answer/Message Manager with Aliant Voicemail Online Call Answer/Message Manager with Aliant Voicemail Online Call Answer/Message Manager automatically takes a message when you re away, on the telephone or on Dial up Internet. You ll enjoy the convenience

More information

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1,

More information

Quick Start Guide. www.uptrendsinfra.com

Quick Start Guide. www.uptrendsinfra.com Quick Start Guide Uptrends Infra is a cloud service that monitors your on-premise hardware and software infrastructure. This Quick Start Guide contains the instructions to get you up to speed with your

More information

Remote E-mail Access with Outlook 2003 Using RPC over HTTPS

Remote E-mail Access with Outlook 2003 Using RPC over HTTPS Remote E-mail Access with Outlook 2003 Using RPC over HTTPS Information Services now offers full remote access to your Exchange e-mail, calendar, contacts, etc. via the Outlook client without having to

More information

Do Handheld Devices Facilitate Face-to-Face Collaboration? Handheld Devices with Large Shared Display Groupware

Do Handheld Devices Facilitate Face-to-Face Collaboration? Handheld Devices with Large Shared Display Groupware Do Handheld Devices Facilitate Face-to-Face Collaboration? Handheld Devices with Large Shared Display Groupware Chen-Chung Liu Assistant Professor Graduate Institute of Network Learning Technology National

More information

Mobile Devices and Systems Lesson 04 Smart Systems Labels, RFID and tokens

Mobile Devices and Systems Lesson 04 Smart Systems Labels, RFID and tokens Mobile Devices and Systems Lesson 04 Smart Systems Labels, RFID and tokens Oxford University Press 2007. All rights reserved. 1 Smart systems Smart Labels Smart labels RFID Smart tokens Oxford University

More information

Management Dashboard in a Retail Environment

Management Dashboard in a Retail Environment Management Dashboard in a Retail Environment Gerrit Kahl, Stefan Warwas, Pascal Liedtke, Lübomira Spassova, Boris Brandherm German Research Center for Artificial Intelligence LAMDa 2011, 13. February,

More information

CHAPTER 2: USING THE CAMERA WITH THE APP

CHAPTER 2: USING THE CAMERA WITH THE APP TABLE OF CONTENTS OVERVIEW... 1 Front of your camera... 1 Back of your camera... 2 ACCESSORIES... 3 CHAPTER 1: Navigating the Mobile Application... 4 Device List: How to Use this Page... 4 My Messages:

More information

Ipiphony Phone System. User Manual. 1 P a g e

Ipiphony Phone System. User Manual. 1 P a g e Ipiphony Phone System User Manual 1 P a g e About this Guide This guide explains how to use the basic features of your new Aastra phones. Not all features listed are available by default. Contact your

More information

aloe-project.de White Paper ALOE White Paper - Martin Memmel

aloe-project.de White Paper ALOE White Paper - Martin Memmel aloe-project.de White Paper Contact: Dr. Martin Memmel German Research Center for Artificial Intelligence DFKI GmbH Trippstadter Straße 122 67663 Kaiserslautern fon fax mail web +49-631-20575-1210 +49-631-20575-1030

More information

Systèmes d information diffus avec l environnement SPREAD

Systèmes d information diffus avec l environnement SPREAD Systèmes d information diffus avec l environnement SPREAD Paul Couderc INRIA Rennes / IRISA Ambient Computing and Embedded Systems Project http://www.irisa.fr/aces pcouderc@irisa.fr 2005-03-15 1 Domain

More information

Preparing Log-ic 360 USB Loggers for Use

Preparing Log-ic 360 USB Loggers for Use Preparing Log-ic 360 USB Loggers for Use Preparing Log-ic 360 USB Loggers for Use Step 1) Install the latest version of the Log-ic Software. Step 2) Connect the Desktop Reader or plug in a USB logger.

More information

User Manual GSM Alarm System. www.deltasecurity.cn. All rights reserved by Delta Security Co., Ltd

User Manual GSM Alarm System. www.deltasecurity.cn. All rights reserved by Delta Security Co., Ltd User Manual GSM Alarm System All rights reserved by Delta Security Co., Ltd Dear Clients, Thank you for using our GSM Alarm System. We are committed to giving you the best home security available today

More information

Wearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space

Wearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space Wearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space Michitaka Hirose Research Center for Advanced Science and Technology, The University of Tokyo 4-6-1 Komaba

More information

Service Middleware for Performing and Optimizing On-site Work

Service Middleware for Performing and Optimizing On-site Work Service Middleware for Performing and Optimizing On-site Work V Tsuneo Katsuyama V Youji Kohda (Manuscript received April 20, 2007) The growing importance of services is placing greater emphasis on company

More information

ivms-4200 Client Software Quick Start Guide V1.02

ivms-4200 Client Software Quick Start Guide V1.02 ivms-4200 Client Software Quick Start Guide V1.02 Contents 1 Description... 2 1.1 Running Environment... 2 1.2 Surveillance System Architecture with an Performance of ivms-4200... 3 2 Starting ivms-4200...

More information

DANGER indicates that death or severe personal injury will result if proper precautions are not taken.

DANGER indicates that death or severe personal injury will result if proper precautions are not taken. Multi-User Systems 1 ArchiveServer 2 SIMATIC HMI WinCC V7.0 SP1 File Server 3 WinCC ServiceMode 4 Redundant Systems 5 System Manual Print of the Online Help 11/2008 Legal information Warning notice system

More information

Alcatel-Lucent Office Communication Solutions

Alcatel-Lucent Office Communication Solutions Alcatel-Lucent Office Communication Solutions PIMphony, your personal communication manager Frequently Asked Questions April, 2007 All Rights Reserved Alcatel-Lucent 2007 Alcatel-Lucent Office Communication

More information

HCI & web usability testing

HCI & web usability testing Four main threads in the program Ethical, legal, social issues in computing IS Application areas: information architecture human-computer interaction CS Application areas: Usability Testing artificial

More information

Cellular and 802.11 Networks Application and Data Usage

Cellular and 802.11 Networks Application and Data Usage Cellular and 802.11 Networks Application and Data Usage Wireless connectivity has become a necessity for application usage and productivity workflows. Network connectivity changes as users move from indoors

More information

Virtual Private Network (VPN)

Virtual Private Network (VPN) Virtual Private Network (VPN) Creating a Virtual Private Network (VPN) environment and using it to connect machines to each other is another way of accessing Roll Call remotely. A VPN establishes a secure

More information

Instruction Manual FLIR Cloud Services Client

Instruction Manual FLIR Cloud Services Client Instruction Manual FLIR Cloud Services Client Instruction Manual FLIR Cloud Services Client #LX400018; r. 2.0/14567/14568; en-us iii Table of contents 1 Setting up FLIR Cloud Client for PC or Mac...1

More information

EasyAccess User s Manual

EasyAccess User s Manual EasyAccess 1. EasyAccess Introduction...2 Overview...2 What Can EasyAccess Do?...2 When to Use EasyAccess and Improve Convenience for Users?...2 Differences from VNC...2 System Requirements...2 How to

More information

An ESRI White Paper May 2007 Mobile GIS for Homeland Security

An ESRI White Paper May 2007 Mobile GIS for Homeland Security An ESRI White Paper May 2007 Mobile GIS for Homeland Security ESRI 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB www.esri.com Copyright 2007 ESRI

More information

General Product Questions... 3. Q. What is the Bell Personal Vault Vault?...4. Q. What is Bell Personal Vault Backup Manager?...4

General Product Questions... 3. Q. What is the Bell Personal Vault Vault?...4. Q. What is Bell Personal Vault Backup Manager?...4 Frequently Asked Questions to be posted at: /faqs/ Table of Contents General Product Questions... 3 Q. What is the Bell Personal Vault Vault?...4 Q. What is Bell Personal Vault Backup Manager?...4 Q. What

More information

EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT

EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT 1 R.Sivaraman, 2 RM.Chandrasekaran 1 Dy.Director, Center for Convergence of Technologies (CCT), Anna University Tiruchirappalli, Tiruchirappalli,

More information

GROUPWARE. Ifeoluwa Idowu

GROUPWARE. Ifeoluwa Idowu GROUPWARE Ifeoluwa Idowu GROUPWARE What is Groupware? Definitions of Groupware Computer-based systems that support groups of people engaged in a common task (or goal) and that provide an interface to a

More information

remote data capture (rdc)

remote data capture (rdc) As Ambitious As You Are Exact Alliance - Remote Data Collection Exact Alliance Remote Data Collection (RDC) allows you to utilize hand held devices (HHD) and other external devices to remotely capture

More information

Allworx Installation Course

Allworx Installation Course VPN Hello and welcome. In the VPN section we will cover the steps for enabling the VPN feature on the Allworx server and how to set up a VPN connection to the Allworx System from your PC. Page 1 VPN The

More information

Assets Location Management Solution Based on the Combination of SmartLocator and RFID

Assets Location Management Solution Based on the Combination of SmartLocator and RFID Assets Location Management Solution Based on the Combination of SmartLocator and RFID HASHIMOTO Naohisa, ISSHIKI Naoki, IGUCHI Masao, MORISAKI Mitsunori, ISHII Ken'ichi Abstract This paper introduces the

More information

DSG SoftPhone & USB Phone Series User Guide

DSG SoftPhone & USB Phone Series User Guide DSG SoftPhone & USB Phone Series User Guide Table of Contents Overview Before You Start Installation Step 1. Installing DSG SoftPhone Step 2. Installing USB Phone Step 3. System Check First Time Use Step

More information

Ubiquitous Memories: Wearable Interface for Computational Augmentation of Human Memory based on Real World Objects

Ubiquitous Memories: Wearable Interface for Computational Augmentation of Human Memory based on Real World Objects Ubiquitous Memories: Wearable Interface for Computational Augmentation of Human Memory based on Real World Objects Tatsuyuki Kawamura Graduate School of Information Science, Nara Institute of Science and

More information

IT@DUSON. IT Service Desk

IT@DUSON. IT Service Desk IT@DUSON Technology plays a key role in the learning process for nursing students at Duke. This is your guide to the technology used at the Duke School of Nursing and how to request assistance for all

More information

Step-by-Step Setup Guide Wireless File Transmitter

Step-by-Step Setup Guide Wireless File Transmitter EOS Step-by-Step Setup Guide Wireless File Transmitter Server Mode Infrastructure & Ad Hoc Networks for Apple ios Devices 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without

More information

Download and Install the Citrix Receiver for Mac/Linux

Download and Install the Citrix Receiver for Mac/Linux Download and Install the Citrix Receiver for Mac/Linux NOTE: WOW can only be used with Internet Explorer for Windows. To accommodate WOW customers using Mac or Linux computers, a Citrix solution was developed

More information

www.webndata.com TeleMagic Enterprise White Paper 24499 Albert Lane Phone 216-595-9357 Beachwood, Ohio 44122

www.webndata.com TeleMagic Enterprise White Paper 24499 Albert Lane Phone 216-595-9357 Beachwood, Ohio 44122 www.webndata.com TeleMagic Enterprise White Paper E-mail: alana@webndata.com 24499 Albert Lane Phone 216-595-9357 Beachwood, Ohio 44122 TeleMagic Enterprise White Paper Introduction TeleMagic Enterprise

More information

Slide.Show Quick Start Guide

Slide.Show Quick Start Guide Slide.Show Quick Start Guide Vertigo Software December 2007 Contents Introduction... 1 Your first slideshow with Slide.Show... 1 Step 1: Embed the control... 2 Step 2: Configure the control... 3 Step 3:

More information

End User Configuration

End User Configuration CHAPTER114 The window in Cisco Unified Communications Manager Administration allows the administrator to add, search, display, and maintain information about Cisco Unified Communications Manager end users.

More information

User Manual. IP Camera Recorder. www.allthings.com.au

User Manual. IP Camera Recorder. www.allthings.com.au User Manual IP Camera Recorder I. Preface IP Camera Recorder is a 36 Channel Camera recording software which supports IP Camera, and Camera Server. Users use this software to monitor real-time Camera,

More information

Step-by-Step Setup Guide Wireless File Transmitter

Step-by-Step Setup Guide Wireless File Transmitter EOS Step-by-Step Setup Guide Wireless File Transmitter Server Mode Infrastructure & Ad Hoc Networks Macintosh OS X 10.5-10.6 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part

More information

Research on Supply Chain Simulation System Based on Internet of Things

Research on Supply Chain Simulation System Based on Internet of Things Advances in Internet of Things, 2015, 5, 1-6 Published Online January 2015 in SciRes. http://www.scirp.org/journal/ait http://dx.doi.org/10.4236/ait.2015.51001 Research on Supply Chain Simulation System

More information

Windows MultiPoint Server 2011 Deployment Guide. Document Version 1.0 March 2011

Windows MultiPoint Server 2011 Deployment Guide. Document Version 1.0 March 2011 Windows MultiPoint Server 2011 Deployment Guide Document Version 1.0 March 2011 Copyright Notice This document is provided as-is. Information and views expressed in this document, including URL and other

More information

User guide. Push to Talk

User guide. Push to Talk User guide Push to Talk User guide Push to Talk Content About Push to Talk Online Contact Management...3 Accessing Push to Talk Online Contact Management...4 Managing Push to Talk contacts...4 Deleting

More information

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...

More information

Cooperteam's DESKTOP MANAGER 2.7 FAQs

Cooperteam's DESKTOP MANAGER 2.7 FAQs Cooperteam's DESKTOP MANAGER 2.7 FAQs Q. What is Desktop Manager 2.7? A. Desktop Manager 2.7, with full support of Notes 8.5.1 Clients and Sametime Preferences, is the core platform of Cooperteam s Desktop

More information

E-Blocks Easy RFID Bundle

E-Blocks Easy RFID Bundle Page 1 Cover Page Page 2 Flowcode Installing Flowcode Instruction for installing Flowcode can be found inside the installation booklet located inside the Flowcode DVD case. Before starting with the course

More information

The Design and Implementation of Multimedia Conference Terminal System on 3G Mobile Phone

The Design and Implementation of Multimedia Conference Terminal System on 3G Mobile Phone 2010 International Conference on E-Business and E-Government The Design and Implementation of Multimedia Conference Terminal System on 3G Mobile Phone Li Shangmeng, Shang Yanlei, Ha Jingjing, Chen Junliang

More information

Managed File Transfer

Managed File Transfer Managed File Transfer How do most organizations move files today? FTP Typically File Transfer Protocol (FTP) is combined with writing and maintaining homegrown code to address its limitations Limited Reliability

More information

Solution Requirements and Process Flow

Solution Requirements and Process Flow CHAPTER 2 Scope The Cisco Virtual Expert Management solution is a powerful, flexible communication solution that addresses a variety of technical, business, and associated service preferences. Deployment

More information

ATVCLOUD. User just input Auto id. This iphone monitoring software can be applied on

ATVCLOUD. User just input Auto id. This iphone monitoring software can be applied on iphone Monitoring Software Operational Manual Welcome to use iphone monitoring software. This software can be searched from ATVCLOUD. User just input Auto id. This iphone monitoring software can be applied

More information

Intelligent Fleet Management Platform User Manual (V1.2)

Intelligent Fleet Management Platform User Manual (V1.2) Intelligent Fleet Management Platform User Manual (V1.2) 2015-01-28 1 / 54 Catolog I Introduction... 3 II Login Interface... 4 III Monitor... 5 IV Track... 8 V Report... 9 5.1 Trip Fuel Report by Car...

More information

A Study on Integrated Security Service Control Solution Development about CRETA Security

A Study on Integrated Security Service Control Solution Development about CRETA Security A Study on Integrated Security Service Control Solution Development about CRETA Security Yongwon (Conrad) Cho 1, Jinwon (Frank) Choi 2 1 Director Research Engineer, Virtual Builders Co., Ltd. 2 CEO & Co-Founder,

More information

Shaw Business Hosted PBX user guide

Shaw Business Hosted PBX user guide Shaw Business Hosted PBX user guide Contents 4 Welcome 5 AASTRA Hosted IP Phone 7 Handling Calls 9 Voicemail / Greetings 11 Voicemail / Playback Features 12 Additional Voicemail Features 13 Call Forward

More information

Trace Desktop Workforce / Fleet Management System

Trace Desktop Workforce / Fleet Management System Trace Desktop Workforce / Fleet Management System Introduction TRACE is an extension of SD s Geographical Information System (SPACE) which incorporates a range of GPS tracking devices that enable users

More information

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5 Sophos Mobile Control User guide for Windows Phone 8 Product version: 3.5 Document date: July 2013 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5

More information

Your Mobile Phone as a Ticket (NFC)

Your Mobile Phone as a Ticket (NFC) Your Mobile Phone as a Ticket (NFC) Francisco Maria van Uden Chaves IST - Technical University of Lisbon Av. Prof. Cavaco Silva Tagus Park 2780-990 Porto Salvo, Portugal francisco.chaves@ist.utl.pt Abstract.

More information

Avaya Learning Companion Guide

Avaya Learning Companion Guide Avaya Learning Companion Guide for the Knowledge Access: Avaya Aura Contact Center Orchestration Designer Scripting (5C00080E) Version 0.1 March 23, 2014 Page 1 Table of Contents Welcome... 3 The Learning

More information

Store & Share Quick Start

Store & Share Quick Start Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You

More information

MIDAS. Event Log Viewer User s Guide. Part Number MN/MID-EVLOG.IOM Revision 0

MIDAS. Event Log Viewer User s Guide. Part Number MN/MID-EVLOG.IOM Revision 0 MIDAS Event Log Viewer User s Guide Part Number MN/MID-EVLOG.IOM Revision 0 Table Of Contents: OVERVIEW... 3 STARTING THE EVENT LOG VIEWER... 4 HOW THE VIEWER IS ORGANIZED... 7 DATA VIEW SELECTOR... 7

More information

DISTRIBUTED MULTIMEDIA SYSTEMS

DISTRIBUTED MULTIMEDIA SYSTEMS Components of distributed multimedia system DISTRIBUTED MULTIMEDIA SYSTEMS Application software Container object store Image and still video store Audio and component store Object directory service agent

More information

TechTips. Connecting Xcelsius Dashboards to External Data Sources using: Web Services (Dynamic Web Query)

TechTips. Connecting Xcelsius Dashboards to External Data Sources using: Web Services (Dynamic Web Query) TechTips Connecting Xcelsius Dashboards to External Data Sources using: Web Services (Dynamic Web Query) A step-by-step guide to connecting Xcelsius Enterprise XE dashboards to company databases using

More information

Phone System Guide Handout

Phone System Guide Handout Phone System Guide Handout Union Institute & University September 2012 Rev 1 9/6/2012 1 Contents Union Institute & University... 1 Introduction... 4 Section 1 Phone System Voicemail:... 5 Section 2 Phone

More information

Enterprise Content Management System Monitor 5.1 Agent Debugging Guide Revision 1.3. 2014-11-05 CENIT AG Author: Stefan Bettighofer

Enterprise Content Management System Monitor 5.1 Agent Debugging Guide Revision 1.3. 2014-11-05 CENIT AG Author: Stefan Bettighofer Enterprise Content Management System Monitor 5.1 Agent Debugging Guide Revision 1.3 2014-11-05 CENIT AG Author: Stefan Bettighofer 1 Table of Contents 1 Table of Contents... 2 2 Overview... 3 3 Definitions...

More information

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves

More information

FAQ for ipad (ios 5.x)

FAQ for ipad (ios 5.x) FAQ for ipad (ios 5.x) Content: 1. Connecting to CityU Wireless Local Area Network (CityU WLAN) 2. Setting up the Microsoft Exchange account (for staff only) 3. Setting up the Office365 Exchange online

More information

Introduction to Computer Networks and Data Communications

Introduction to Computer Networks and Data Communications Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the

More information

EasyMP Multi PC Projection Operation Guide

EasyMP Multi PC Projection Operation Guide EasyMP Multi PC Projection Operation Guide Contents Introduction to EasyMP Multi PC Projection... 7 EasyMP Multi PC Projection Features... 7 Connection to Various Devices... 7 Four-Panel Display... 8

More information

Basic Network Design

Basic Network Design Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies

More information

IMPLEMENTATION OF RELIABLE ATTENDENCE SYSTEM USING ANDROID AND NEAR FIELD COMMUNICATION TECHNOLOGY VIJAY KAKANI

IMPLEMENTATION OF RELIABLE ATTENDENCE SYSTEM USING ANDROID AND NEAR FIELD COMMUNICATION TECHNOLOGY VIJAY KAKANI IMPLEMENTATION OF RELIABLE ATTENDENCE SYSTEM USING ANDROID AND NEAR FIELD COMMUNICATION TECHNOLOGY VIJAY KAKANI Department of Electronic and Computer Engineering, University of Limerick, Ireland Abstract

More information

Tukwila School District #406. Technology Department 4205 South 142nd Street Tukwila, WA 98168 (206) 901-8080. Computer and Phone Support Handbook

Tukwila School District #406. Technology Department 4205 South 142nd Street Tukwila, WA 98168 (206) 901-8080. Computer and Phone Support Handbook Tukwila School District #406 Technology Department 4205 South 142nd Street Tukwila, WA 98168 (206) 901-8080 Computer and Phone Support Handbook Revised: July 2009 Table of Contents Network Systems Department

More information

End User Guide The guide for email/ftp account owner

End User Guide The guide for email/ftp account owner End User Guide The guide for email/ftp account owner ServerDirector Version 3.7 Table Of Contents Introduction...1 Logging In...1 Logging Out...3 Installing SSL License...3 System Requirements...4 Navigating...4

More information

PVNMS Brochure. 2013 All rights reserved. Proxim Wireless Corporation. 1

PVNMS Brochure. 2013 All rights reserved. Proxim Wireless Corporation. 1 2013 All rights reserved. Proxim Wireless Corporation. 1 Manage Your Wireless Network Via The Cloud Engineered with a revolutionary new design, the next generation ProximVision Network Management System

More information

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion Cisco Context-Aware Mobility Solution: Put Your Assets in Motion How Contextual Information Can Drastically Change Your Business Mobility and Allow You to Achieve Unprecedented Efficiency What You Will

More information

v.5 Use Shelby to Communicate Electronically

v.5 Use Shelby to Communicate Electronically v.5 Use Shelby to Communicate Electronically Presented by: Mark Fisher, Shelby Consultant 2013 Shelby Systems, Inc. Other brand and product names are trademarks or registered trademarks of the respective

More information

Allworx Call Assistant 2.4 Quick Reference Guide

Allworx Call Assistant 2.4 Quick Reference Guide Allworx Call Assistant 2.4 Quick Reference Guide No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,

More information

Dell Business Phone for Android

Dell Business Phone for Android Dell Powered by Vonage Business Solutions Table of Contents Overview... 1 Capabilities... 1 Features... 1 Initial Setup... 2 Network Connections... 2 Provisioning... 3 Application Settings After Provisioning...

More information

Vehicle Tracking System,

Vehicle Tracking System, Vehicle Tracking System, The Complete Solution What is GPS? Product Review. Complete system. Contact Us. What is GPS? GPS, which stands for Global Positioning System, is the only system today able to show

More information

Digital Asset Management A DAM System for TYPO3

Digital Asset Management A DAM System for TYPO3 Digital Asset Management A DAM System for TYPO3 Published under the GNU General Public License Copyright 2005 René Fritz, Daniel Hinderink 1 What is Digital Asset Management A DAM system is a tool to handle

More information

A survey of mobile social networking

A survey of mobile social networking A survey of mobile social networking Laura Marcia Villalba Monné Helsinki University of Technology lvillalb@cc.hut.fi Abstract When the rapid evolution of mobile devices, the massive adoption of cell phones

More information

User s Manual. Management Software for ATS

User s Manual. Management Software for ATS ATS Monitor User s Manual Management Software for ATS Table of Contents 1. ATS Monitor Overview... 2 2. ATS Monitor Install and Uninstall... 2 2.1. System Requirement... 2 2.2. Software Install... 2 2.3.

More information

Cre-X-Mice Database. User guide

Cre-X-Mice Database. User guide Cre-X-Mice Database User guide Table of Contents Table of Figure... ii Introduction... 1 Searching the Database... 1 Quick Search Mode... 1 Advanced Search... 1 Viewing Search Results... 2 Registration...

More information

Mobile Commerce and Ubiquitous Computing. Chapter 6

Mobile Commerce and Ubiquitous Computing. Chapter 6 Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure

More information

Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server

Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server Hardware Windows Windows NT 4.0 Linux Server Software and

More information

Central Management Software CV3-M1024

Central Management Software CV3-M1024 Table of Contents Chapter 1. User Interface Overview...5 Chapter 2. Installation...6 2.1 Beginning Installation...6 2.2 Starting the CMS software...10 2.3 Starting it from the Start menu...10 2.4 Starting

More information

Integrated Wire-Free Solution for Monitoring Power and Environment with RF Code and Sentry Power Manager (SPM)

Integrated Wire-Free Solution for Monitoring Power and Environment with RF Code and Sentry Power Manager (SPM) Integrated Wire-Free Solution for Monitoring Power and Environment with RF Code and Sentry Power Manager (SPM) Purpose This technical note describes the components and process of the new power and environmental

More information

WebEx Meeting Center User's Guide

WebEx Meeting Center User's Guide WebEx Meeting Center User's Guide Table of Contents Accessing WebEx... 3 Choosing the scheduler that works for you... 6 About the Quick Scheduler Page... 6 About the Advanced Scheduler... 8 Editing a scheduled

More information

PARTNER Advanced Communications System (ACS)

PARTNER Advanced Communications System (ACS) PARTNER Advanced Communications System (ACS) Over 1 million systems sold IP Telephony Contact Centers Unified Communication Services Get the powerful communications capabilities your growing business needs

More information

Discovering Computers 2008. Chapter 3 Application Software

Discovering Computers 2008. Chapter 3 Application Software Discovering Computers 2008 Chapter 3 Application Software Chapter 3 Objectives Identify the categories of application software Explain ways software is distributed Explain how to work with application

More information

Cisco TrustSec How-To Guide: Guest Services

Cisco TrustSec How-To Guide: Guest Services Cisco TrustSec How-To Guide: Guest Services For Comments, please email: howtoguides@external.cisco.com Current Document Version: 3.0 August 27, 2012 Table of Contents Table of Contents... 2 Introduction...

More information

Evaluation for Cargo Tracking Systems in Railroad Transportation

Evaluation for Cargo Tracking Systems in Railroad Transportation INTERNATIONAL FORUM ON SHIPPING PORTS AND AIRPORTS Evaluation for Cargo Tracking Systems in Railroad Transportation N.K.Park Tongmyung Univ CONTENTS INTRODUTION BASIC RESEARCH REVIEW THE RAILWAY TRACKING

More information

Enterprise Remote Control 5.6 Manual

Enterprise Remote Control 5.6 Manual Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure & Ad Hoc Networks Mac OS X 10.5-10.6 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without

More information