Contents Abstract CAPNET Program Briefl y Use Case driven research process Use cases CAPNET innovation process Architecture Architecture Taxonomy

Size: px
Start display at page:

Download "Contents Abstract CAPNET Program Briefl y Use Case driven research process Use cases CAPNET innovation process Architecture Architecture Taxonomy"

Transcription

1

2 2 Contents Abstract CAPNET Program Briefly Use Case driven research process Use cases CAPNET innovation process Architecture Architecture Taxonomy Connectivity Management Service discovery Context Awareness Adaptive Content Techniques Adaptive User Interfaces RFA Model

3 Abstract 2 In recent years, the concept of pervasiveness has gained a great deal of attention from the viewpoints of mobility, networking and services. To extend this, pervasive networking aims to abstract, or hide, the processing and networking infrastructure from the user. Until recently, however, much of this work has not been realized due to the unavailability of key enablers, truly ubiquitous connectivity and suitable content adaptation techniques. Connectivity is becoming a reality with new short-range radio systems, wireless local area networks and packetbased cellular telephone systems. Adaptation provides the main techniques to realize active, user-monitoring and context-aware services. The wide range of properties and a large numbers of nodes in a large-scale pervasive network introduce a number of challenges for inter-operability, such as compatibility and important research issues related to programmability, ad hoc composition, media scaling, security and privacy, to name a few. The ad-hoc nature of these environments, however, renders many of the traditional network service and management techniques used to address these issues ineffective, if not totally unfeasible. Clearly, the pervasive connectivity research needs to consider the overall management, privacy and authentication issues from an entirely new point of view: the fact that services are constructed on-the-fly, the surrounding space is extremely rich, and users dynamically change preferences (according to e.g. time, schedule, location, proximity, space) alone sets these requirements. One of the key goals of the CAPNET research is to address issues related to intelligent, dynamic scaling and interoperability of capabilities in mobile environments, where services are exploited through the mobile telephony-based device, in the present network sub-space, where nodes are able to adapt to context parameters, such as time, location or situation. The problem of modeling these in a way that facilitates smooth processing and delivery of the context information is one of the major challenges of pervasive networking. As many of the nodes in a pervasive network process digital media such as audio or video as their service, media adaptation, compressed domain management and transcoding technologies will be essential. Similarly, the challenges lie in constructing mobile applications, ready for on-the-fly construction. Current application techniques and structures cannot cope with pervasive networking, when requirements are demanding capabilities such as roaming or instant integration, and the device has only a limited capacity to offer, with limited resources to be used as a gateway between environments. Finally, providing the necessary contextual information for the applications brings considerable challenges. The key problems in this area are recognising context from the available information and autonomously discovering how an application should be adapted to context.

4 2 CAPNET Program Briefly CAPNET Context-aware Pervasive Networking program focuses on basic and applied research as well as innovating new business initiative. Collaboratively, this approach creates a solid foundation for technology development, new areas of business and mobile services of next generations. CAPNET program focuses on context-aware mobile technologies for ubiquitous computing. The program consists of four major segments, which are the basis for developing new services. The segments are 1) diversity management in pervasive networking, 2) adaptive software structures, ) adaptive content techniques and ) adaptive user interface techniques. The project focuses on services that are accessible and maintainable using mobile devices and rapidly integrating All-IP hybrid network technologies. This kind of information and communications technology and mobile services together form one of the most promising business fields in the near future. As the end user environment becomes more technical, it brings new challenges for the integration of technologies, as well as for providing intelligent easy-to-use services and adapting them automatically according to the needs of businesses and consumers. This requires special technology, which can be utilised globally for example in the fields of service discovery, contextual service enablers, very light technical architectures, ambient service configuration and adaptive mobile user interfaces. Three research groups from the University of Oulu participate in the research program: MediaTeam and Intelligent Systems from the Department of Electrical and Information Engineering, as well as Human Computer Interaction group from the Department of Information Processing Science. Thus the extensive program includes a multi-disciplinary group of researchers from within the university. Also two foreign research institutes participate in the research: Institute for Advanced Computer Studies at the University of Maryland (USA) and the University of Linköping (Sweden). The CAPNET program includes partnership by prominent domestic and foreign businesses in the field: CCC, Hantro, IBM, Nokia and Sonera. The above-mentioned businesses and research groups in the University of Oulu are part of Mobile Forum, which operates on an open-community basis, with the purpose of creating a top-level international framework for the development of mobile technologies, services, and new forms of business. The first phase of the CAPNET program is launched with funding by the NETS program of the National Technology Agency and business partners. USE CASE #1: Know your whereabouts After one week... I m going to teach my phone my habits. Looks cool! Marie buys a new phone. She is showing it to her friend Susie. The device has learnt where Marie likes to visit and what she does.

5 Use Case Driven Research Process 2 As the ultimate goal of ubiquitous computing is to seamlessly connect our analogue human world with the digital computer world, the starting point of ubiquitous applications and infrastructures should be in actual usage and human behaviour. Computers should be able to learn how humans interact and behave, while humans should be able to be unaware of how the computers operate. In CAPNET, we have adopted a use case driven research approach to ensure that real human needs are the driving force for the technology development. We derive our research problems and technology requirements from actual usage needs and scenarios arising from real human needs. The use case process begins with use case identification. We generate ideas of how everyday life could be supported by the means of ubiquitous computing. The ideas can be derived from observations, trend analysis, or performance-based design methods. The use case idea is then refined into a coherent use case description, for which we have generated a set of document templates and documentation guides. After describing and planning how technology could be used in a ubiquitous manner in the selected use case, we evaluate and analyse the use cases in order to identify the ones, which provide us with the best basis for further research. Finally, based on analysis work, we select some basic use cases. After this, we can use the set of selected use cases as a starting point for deriving requirements and research problems for CAPNET technology creation. Use Cases At the first use case generation round, we generated use case scenarios to form a foundation for our architecture and technology development work. The purpose of these basic scenarios is to focus our research work and provide practical requirements and justification for design decisions. The Know Your Whereabouts use case applies a routine learning approach in teaching a device, e.g. a mobile phone, automatic actions that it could perform on the basis of the context data. The device silently monitors user behaviour, and when it has collected enough material for making reliable predictions about user behaviour, it can ask the user to verify if the rules generated are valid and if they should be used for automatic adaptation of the user interface in the future. Your phone is beeping. Look, it remembers! Marie gives names to positions. Marie leaves to work, surprised that her phone helped her not to be late.

6 2 The Lunch Assistant use case scenario uses context data to provide the user with information about services available. For example, the device knows the location of the user and the time of day, and uses this information for providing the user lunch menus from nearby restaurants at lunchtime. The user can then select where he or she would like to have lunch and what he or she would like to have, and make an order. When the user arrives at the restaurant, the lunch and a free seat are waiting for him or her. The Shopping use case scenario helps the user to keep track of information about items, for example when he or she considers buying something. The user can store prices, material information and other details when visiting shops, and compare different products afterwards, for example at home. Some of this data can be stored as a Wish List, i.e. a list for purchases to be made in the future. The user can also access wish lists composed by other persons, and use those for buying for example a wedding present. The Wellbeing use case is related to monitoring the physical activities of the user. The application can use the sensor information collected by various sensors, such as heart rate monitor, blood pressure monitor or accelerator sensor, and use this data to monitor the user s physical activity and condition. The application can use this information for making suggestions about a training programme, or send the information to a personal trainer or doctor for further processing. USE CASE #2: Lunch assistant The HotStone use case provides the user with means for transmitting emotional messages through a mobile device. HotStone can be configured for warming itself up, when your partner thinks about you and squeezes his or her HotStone for indicating that to you. The HotStone can alternatively be configured to warm up context-sensitively, for example if you are using a dating service and a matching date is walking nearby. The Machine to Machine use case deals with ad-hoc networking of devices. The user could access services near by only by accessing the space where the services are available. This could be used, for example, in meeting room for the meeting participants to swap files with each others, or to show slide show material through a projector. The environment would take care of networking the devices with each others, and would not require any manual configurations from the users. Brad will join me. Let s see what they have today... Joe is registered customer at two of his favourite restaurants near the office. Near noon, lunch menus are delivered to Joe s mobile device. The list includes today s special offers and free table available.

7 CAPNET Innovation Process what is it? why is it possible? is it doable? use case ideas use case drafts use case analysis use case acceptance 2 use case review review in technology expert group list of desired features dream functionality classify features according to CAPNET architecture map selected features to technology candidates perform E2E check and technology consistency review in steering group review classifications of features accept features to CAPNET architecture framework perform research to find optimum solution review in scientific forums select UBI-enabling features? chart architecture impacts? technologies needed? Fifteen minutes later... Sounds delicious... I hope you like my special offer of today. From his office, Joe browses information from the two restaurants and chooses one of them. He makes an order and reserves a table there at convenient time. Joe enters the restaurant with Brad. Lunch is nearly ready for them to enjoy.

8 2 Architecture The CAPNET architecture forms the basis for implementing context-aware and pervasive systems and their components. It will be utilized in the CAPNET program in integrating research results into applications. The application area considered in CAPNET sets demanding requirements for the architecture. The application has to be decomposed between the networked devices and the user s terminal. The part of the application running in the terminal has to be light. Furthermore, the architecture has to be platform-independent and support the existing technologies. Finally, the architecture needs to support dynamic application partitioning. The CAPNET architecture is decomposed into CAPNET Runtime Environments (CREs). Each device contains a CRE. The minimum hardware and software requirements for the runtime environment are kept modest. Each CRE contains a number of engines. Engines are the basic entities of a CAPNET system, each being specialized in producing a certain type of facility: service discovery, user interface, context recognition, media processing, connectivity management, component management, database access, etc. The function of an engine is decomposed further into components. An application is composed of application logic and engines producing the required function. The engines are located in the mobile terminal and the networked devices. A simple application consists of application logic and a single engine, both in the mobile terminal. At the other end of the continuum, engines in the terminal and the network form a hierarchy, the application requesting services from some engines, which in turn request services from other engines. USE CASE #: Wishlist Now we have taken all the pictures of the things we wish to have. Let s send them to the Bridal registry. Jack and Jill are going to get married. They are window-shopping. Mobile phone takes the barcode out of the picture, sends it to server at shop using short range radio connectivity.

9 Architecture Taxonomy 2 1. Direct Engine-Application Connection Local / Mobile Environment 2. Local Domain of Networked Engines Local / Mobile Environment. Hybrid Domains of Networked Engines Local Hosted Environment Local / Mobile Environment Local Hosted Environment Remote Hosted Environment Let s check that they all are there. Look how nice things they wish to have for a present! All information is in the stores server. Kate and John are thinking of what they could buy for a wedding gift.

10 2 Connectivity Management Connectivity is becoming a reality with new short-range radio systems, wireless local area networks and packetbased cellular telephone systems. However, effective management of these diverse connection resources within a fully integrated environment is far from maturity. Pervasive wireless networks are characterized by a variety of wireless overlay access networks of different technologies. Network connectivity with varying quality of service must be offered anytime and anywhere in pervasive space. The various wireless access networks in pervasive environment introduce a number of challenges for mobility management. Connectivity management focuses primarily on mobility techniques needed to access services offered through pervasive smart spaces, where spatial proximity, available computing and processing power, storages, sensors, locators and other resources are constantly changing. Connectivity management technology optimises adaptive networking of diverse wireless connectivity in ubiquitous environment. The main emphasis is on pervasive networking enabled by the adaptibility of multiple connectivity, and its various wireless network resources include harmonious coexistence, seamless interconnection, and efficient interoperation. Connectivity management facilitates the administration of multiple network connections so that diverse communication resources available in the zoning smart space can form wireless connections in a simultaneous, collaborative, or complementary fashion. Various network interfaces in a mobile device can be dynamically selected and corporately utilized, to realize the goal of pervasive access to various network resources and applications. The paradigm of pervasive networking based on multi-connectivity requires new models and methods both at architecture level and in several layers of the conventional protocol stack. Key research problems, e.g. mobile ad hoc connectivity, smart environment construction, protocol adaptability, seamless roaming, and connectivity adaptation, are to be addressed for realizing the visions of pervasive networking. USE CASE #: Shopping These are not good quality. These are good... Tom is looking for a new pair of pants for his son Mark. He is not sure that these are the right pants. He takes a photo of them. The photo goes to phones memory, and the phone sends photo and barcode to server.

11 Service discovery 2 Service discovery is a crucial part of applications working in pervasive environment. The aim is to enable the connecting and integrating diverse networked equipment and applications to form a seamless unity. The use of services and devices that are distributed to the environment and network should be simplified by allowing them to be discovered, configured and used by other devices and services with a minimum of manual effort. Common agreements have to be defined in terms of application level discovery and access protocols. Moreover, the protocols must function reliably in adhoc style wireless networked environments. Also, the methods for selecting appropriate services according to user s profile and context are emphasised when dealing with pervasive environment with numerous services, especially as the set of available services will change according to spatial and temporal location. The amount of protocols for service discovery is ever increasing. Some rely on centralised information servers and registers while others use a distributed approach with pull or push methodology. One of the problems with pervasive services is how to deal with the diversity of service discovery protocols. Moreover, if several protocols and methods are supported, the information that is accessed via them has to be merged and handled somehow. There are plenty of different kinds of situations when service discovery is needed. One of the most apparent cases is the need to find services that are currently available and nearby. For example when a user arrives at a meeting room he may want to use a printer, data projector, and other devices located in the room with his or her mobile device. The ad hoc discovery of these devices and connections to them may be managed through methods such as Bluetooth or WLAN. Another service discovery case occurs when there is a need to find services that are currently available, but not necessarily in the proximity. Examples include the need to find services that are near a hotel where the user is going to stay while travelling in the future, or the need to find information about stock quotes. So-called semantic web technologies address the problem of finding appropriate services through WWW. One demanding research problem on service discovery is how automatic machine-to-machine service discovery is managed. Software components may need to locate other available software components and services through the networked environment. Combining service discovery with dynamic software environment and context awareness will pose a challenging research issue. One week later... Nice, these are exactly the pants Mark wanted. Look, now the pants are on sale! Tom gets an on-sale notification later on. Tom pays them with his mobile phone and picks them later on.

12 2 Context Awareness Pervasive software needs to gain intelligence in terms of understanding its immediate environment, associated entities and occurring events. Furthermore, in order to manage unexpected, temporal or entirely new tasks within its present eco-system, the software and its services must possess certain properties to be autonomously configurable and adapt to the changes in the immediate environment. To be able to configure itself autonomously and to adapt to the situation at hand, the pervasive software needs methods for recognising the context and methods for learning regularities in the user s behaviour. With these methods, the software can obtain the necessary contextual information, recognise the important contexts, adapt the user s profile and even learn rules for adapting the application to context (i.e. rules for context-aware personalization). Instead of functioning in predefined, deterministic ways, the ad hoc software can use information of the current situational context. This information is exploited for example in guiding the construction of an application from software components in an on-the-fly manner. Services appear more intelligent, and can carry out more profiled, focused tasks that are of immediate interest to the present user and environment. Novel software techniques and models must be developed to exploit the paradigm of context-aware computing. In context-aware computing, research problems are related to e.g. contextual information gathering and context recognition, presentation of contextual information and context criteria, routine learning, quality of service of context information, managing context information database and diverse exploitation of situational awareness. USE CASE #: Wellbeing Now I can really start extreming... Tom downloads an exercise planning program written in Java. The application automatically finds and recognizes the various health monitoring gadgets which Tom is wearing.

13 Adaptive Content Techniques 2 Pervasive computing aims to give users the perception of being immersed in an environment where they have seamless access to a potentially endless array of services. The users operate within these environments and communicate with a smart space via wireless devices that operate quickly, efficiently, securely and effortlessly to exchange information and access services. In order to enrich interaction between users and their environment, current scenarios involve the ability to deliver multimedia in response to an information need. Advertisements, descriptions of products and guided tours etc. can be streamed directly to the user. In addition, there is a category of ubiquitous services that would benefit greatly from the ability for the user to provide visual input as supplemental. Images and video can be captured by the users and shared with others, for example as part of a shopping application where users want to get feedback on purchases from others. The environment can even use arrays of sensors for detection, recognition and monitoring to provide customized services. For such services, the requirements for real-time performance, adaptation and intelligent management of multimedia information services and the network required to deliver such services are clear. In CAPNET, we are developing a set of advanced media services that will allow users and their applications to make use of multimedia content. We will provide critical technologies for emerging personal pervasiveness in traditional environments including the ability to obtain, process and deliver visual information (images and video), from traditional environments to services that require them, and the ability to deliver visual content back to the user in response to an information need. Providing such services will facilitate the development of applications that enhance the core goal of enriching the users environment. While Tom is climbing, the application monitors the details of Tom s condition. The application automatically develops a near-term fitness plan appropriate for Tom given his current physical condition.

14 2 Adaptive User Interfaces Adaptive user interfaces provide us with means for giving the application the possibility to learn how its user behaves, instead of the traditional approach, where the user needs to learn how the application operates. The same service or application should be available for children who have not yet learned how to read, people speaking different languages, old people who have problems in hearing, etc. The ubiquitous environments need to be designed so that the same services are available for people using different kinds and types of devices in environments, which provide different levels of capabilities (e.g. networks or sensors). As the amount of information provided for us by the smart networked devices will increase, adaptive user interfaces can act as filters between information and the user, saving us from information overload. The smart interface can provide the user with the needed information in a proper situation and context. It can also modify its own operation according to the needs of the user. However, the limits of adaptive systems have not yet been clearly defined. An application with an adaptive user interface does not necessarily give us a more satisfied user. The user might as well feel confused, unsure, and even distressed, if he or she cannot understand why the application changed its appearance and behaviour. If the application makes false assumptions, thus adapting to a wrong situation, the user very easily loses his or her trust for the system. Therefore, in addition to developing more accurate and precise adaptation techniques, we also need to study where the adaptation will result in higher user satisfaction and better efficiency of the user interface. In CAPNET, we will concentrate on smart adaptability, i.e. how the user interface adapts itself according to the use context. Additionally, we will try to define situations where this type of adaptability is most efficient. USE CASE #: The HotStone I wish Brandi and I had more time together. Brandi is home alone, preparing her lecture for tomorrow. Her husband, Tom, is working late again. Tom feels lonely, he presses his HotStone.

15 I ime. RFA Model 2 The CAPNET program is the first occasion for application of the so-called RFA (Research Focus Area) model. Programs applying the model focus on strictly defined areas of technology, with the purpose of developing promising future applications in close cooperation with research groups and institutes, as well as related businesses and financiers. Application of the model signifies particular concentration on basic research, on the basis of which applied research and demonstrations are created. The RFA model is flexible, allowing new projects and partners to be added to programs even after their launch. The programs usually last from to years. The goal with the RFA model is to reduce the amount of administrative work involved with research projects until now, and to leave enough time for the research itself. The more and the longer it is possible to concentrate on a certain research area, the better is the quality of the results. A precisely defined research area and a sufficiently long duration of the program create good possibilities for networking between the different parties. This is not only a question of making contacts, but also an opportunity to deepen the cooperation as necessary. A close cooperation may lead to the possibility of launching new projects swiftly and easily within a program. The RFA organisation is divided into four groups: in addition to the traditional management and research groups, the model contains the groups of technology experts and application and business experts. The technology experts group closely supervises the progress of research. Application and business experts ensure that research results are quickly and effectively transferred to the use of both information and telecommunications industry and the companies utilising technology. The RFA model offers three different levels of partnership. Now also small companies and businesses that utilise the technology being developed have better opportunities to participate in research program faster and more inexpensively than before. The model is meant to provide continuity, of which all parties can benefit. Another aim is to commit different players to the goals of the program. How sweet. I ll give him a call. Brandi feels her own HotStone warming up......she knows that Tom is thinking about her.

16 Contacts Marika Leskelä Program Manager + 2 Jaakko Sauvola Program Director jaakko.sauvola@ee.oulu.fi

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION Arto Hämäläinen and Jari Porras Lappeenranta University of Technology Laboratory of Communications Engineering P.O. Box 20 53851

More information

Masters in Human Computer Interaction

Masters in Human Computer Interaction Masters in Human Computer Interaction Programme Requirements Taught Element, and PG Diploma in Human Computer Interaction: 120 credits: IS5101 CS5001 CS5040 CS5041 CS5042 or CS5044 up to 30 credits from

More information

Masters in Advanced Computer Science

Masters in Advanced Computer Science Masters in Advanced Computer Science Programme Requirements Taught Element, and PG Diploma in Advanced Computer Science: 120 credits: IS5101 CS5001 up to 30 credits from CS4100 - CS4450, subject to appropriate

More information

Masters in Artificial Intelligence

Masters in Artificial Intelligence Masters in Artificial Intelligence Programme Requirements Taught Element, and PG Diploma in Artificial Intelligence: 120 credits: IS5101 CS5001 CS5010 CS5011 CS4402 or CS5012 in total, up to 30 credits

More information

Masters in Information Technology

Masters in Information Technology Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101

More information

Eliminating the Communication Black Spots in Future Disaster Recovery Networks

Eliminating the Communication Black Spots in Future Disaster Recovery Networks Eliminating the Communication Black Spots in Future Disaster Recovery Networks Eliane Bodanese 1, Liljana Gavrilovska 2, Veselin Rakocevic 3, Robert Stewart 4 1 Electronic Engineering Department, Queen

More information

The Ubiquitous Web, UPnP and Smart Homes

The Ubiquitous Web, UPnP and Smart Homes The Ubiquitous Web, UPnP and Smart Homes Franklin Reynolds Nokia Research Center, Cambridge franklin.reynolds@nokia.com 1 NOKIA PCG.PPT / 15 6 2004 / Franklin Reynolds Our Vision "The essence of this vision

More information

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion Cisco Context-Aware Mobility Solution: Put Your Assets in Motion How Contextual Information Can Drastically Change Your Business Mobility and Allow You to Achieve Unprecedented Efficiency What You Will

More information

Masters in Networks and Distributed Systems

Masters in Networks and Distributed Systems Masters in Networks and Distributed Systems Programme Requirements Taught Element, and PG Diploma in Networks and Distributed Systems: 120 credits: IS5101 CS5001 CS5021 CS4103 or CS5023 in total, up to

More information

Efficient evolution to all-ip

Efficient evolution to all-ip Press information June 2006 Efficient evolution to all-ip The competitive landscape for operators and service providers is constantly changing. New technologies and network capabilities enable new players

More information

Service management evolution

Service management evolution management evolution Vilho Räisänen 1, Wolfgang Kellerer 2, Pertti Hölttä 3, Olavi Karasti 4 and Seppo Heikkinen 4 Abstract This paper presents an outline for the evolution of service management. The outline

More information

Masters in Computing and Information Technology

Masters in Computing and Information Technology Masters in Computing and Information Technology Programme Requirements Taught Element, and PG Diploma in Computing and Information Technology: 120 credits: IS5101 CS5001 or CS5002 CS5003 up to 30 credits

More information

When Computers really become Personal

When Computers really become Personal When Computers really become Personal What is Consumerization of IT? The Consumerization of IT and what it means The term "consumerization" was first popularized in 20011 as a description for how innovation

More information

Seminar: Security Metrics in Cloud Computing (20-00-0577-se)

Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Technische Universität Darmstadt Dependable, Embedded Systems and Software Group (DEEDS) Hochschulstr. 10 64289 Darmstadt Seminar: Security Metrics in Cloud Computing (20-00-0577-se) Topics Descriptions

More information

How To Develop Software

How To Develop Software Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which

More information

Introduction to Service Oriented Architectures (SOA)

Introduction to Service Oriented Architectures (SOA) Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction

More information

Introduction to Computer Networks and Data Communications

Introduction to Computer Networks and Data Communications Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the

More information

STMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU!

STMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU! SENSational STMicroelectronics is pleased to present the SENSational Seminar Attend a FREE One-Day Technical Seminar Near YOU! Seminar Sensors and the Internet of Things are changing the way we interact

More information

Smarter wireless networks

Smarter wireless networks IBM Software Telecommunications Thought Leadership White Paper Smarter wireless networks Add intelligence to the mobile network edge 2 Smarter wireless networks Contents 2 Introduction 3 Intelligent base

More information

An Open Platform for Digitizing Real World through Sentient Artefact Model. Fahim Kawsar Waseda University, Japan

An Open Platform for Digitizing Real World through Sentient Artefact Model. Fahim Kawsar Waseda University, Japan An Open Platform for Digitizing Real World through Sentient Artefact Model Fahim Kawsar Waseda University, Japan 1 Talk Outline Motivation Scenario Sentient Artefact Design Principle Sentient Artefact

More information

White Paper. Requirements of Network Virtualization

White Paper. Requirements of Network Virtualization White Paper on Requirements of Network Virtualization INDEX 1. Introduction 2. Architecture of Network Virtualization 3. Requirements for Network virtualization 3.1. Isolation 3.2. Network abstraction

More information

The changing face of global data network traffic

The changing face of global data network traffic The changing face of global data network traffic Around the turn of the 21st century, MPLS very rapidly became the networking protocol of choice for large national and international institutions. This

More information

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein INNOVATORS START HERE. EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly growing data

More information

The Connected Enterprise: Transformation through Mobility

The Connected Enterprise: Transformation through Mobility The Connected Enterprise: Transformation through Mobility Introduction The last 24 months have seen a lasting shift in human behaviour across the world. This is the shift to a connected society - communicative

More information

A survey of mobile social networking

A survey of mobile social networking A survey of mobile social networking Laura Marcia Villalba Monné Helsinki University of Technology lvillalb@cc.hut.fi Abstract When the rapid evolution of mobile devices, the massive adoption of cell phones

More information

The Personal Medical Unit A Ubiquitous Computing Infrastructure for Personal Pervasive Healthcare

The Personal Medical Unit A Ubiquitous Computing Infrastructure for Personal Pervasive Healthcare The Personal Medical Unit A Ubiquitous Computing Infrastructure for Personal Pervasive Healthcare Jakob E. Bardram Centre for Pervasive Healthcare Department of Computer Science, University of Aarhus Aabogade

More information

RFID based Bill Generation and Payment through Mobile

RFID based Bill Generation and Payment through Mobile RFID based Bill Generation and Payment through Mobile 1 Swati R.Zope, 2 Prof. Maruti Limkar 1 EXTC Department, Mumbai University Terna college of Engineering,India Abstract Emerging electronic commerce

More information

Towards a Transparent Proactive User Interface for a Shopping Assistant

Towards a Transparent Proactive User Interface for a Shopping Assistant Towards a Transparent Proactive User Interface for a Shopping Assistant Michael Schneider Department of Computer Science, Saarland University, Stuhlsatzenhausweg, Bau 36.1, 66123 Saarbrücken, Germany mschneid@cs.uni-sb.de

More information

Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network

Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Participatory Cloud Computing and the Privacy and Security of Medical Information Applied to A Wireless Smart Board Network Lutando Ngqakaza ngqlut003@myuct.ac.za UCT Department of Computer Science Abstract:

More information

Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA)

Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) Data Driven Success Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) In business, data is everything. Regardless of the products or services you sell or the systems you support,

More information

< IMPACT > START ACCELERATE IMPACT

< IMPACT > START ACCELERATE IMPACT START ACCELERATE IMPACT IMPACT project has received funding from the European Union Seventh Framework Programme (FP7/2007-2013) under grant agreement n 632828 START ACCELERATE IMPACT WEBINAR #2 Technology

More information

Integrate VoIP with your existing network

Integrate VoIP with your existing network Integrate VoIP with your existing network As organisations increasingly recognise and require the benefits voice over Internet Protocol (VoIP) offers, they stop asking "Why?" and start asking "How?". A

More information

Topics: Cloud middleware, Datacentre services, Cloud model evolution and Cloud service market orientation

Topics: Cloud middleware, Datacentre services, Cloud model evolution and Cloud service market orientation Recommendations for the Workprogramme H2020-ICT-2018-2019 Topics: Cloud middleware, Datacentre services, Cloud model evolution and Cloud service market orientation Editor: Dana Petcu, West University of

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 244 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

Virtual Device Management and Its Components

Virtual Device Management and Its Components Dynamic PAN-Based Virtual Device Tore Jønvik, Paal Engelstad and Do van Thanh Telenor R&D {Tore-erling,jonvik, paal.engelstad, thanh-van.do}@telenor.com Snaroyveien 30 1331 Fornebu Norway Abstract In this

More information

School of Computer Science

School of Computer Science School of Computer Science Computer Science - Honours Level - 2014/15 October 2014 General degree students wishing to enter 3000- level modules and non- graduating students wishing to enter 3000- level

More information

Remote Monitoring and Controlling System Based on ZigBee Networks

Remote Monitoring and Controlling System Based on ZigBee Networks Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr

More information

PROCESSING & MANAGEMENT OF INBOUND TRANSACTIONAL CONTENT

PROCESSING & MANAGEMENT OF INBOUND TRANSACTIONAL CONTENT PROCESSING & MANAGEMENT OF INBOUND TRANSACTIONAL CONTENT IN THE GLOBAL ENTERPRISE A BancTec White Paper SUMMARY Reducing the cost of processing transactions, while meeting clients expectations, protecting

More information

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1,

More information

Overview to the Cisco Mobility Services Architecture

Overview to the Cisco Mobility Services Architecture Overview to the Cisco Mobility Services Architecture Introduction Business has gone mobile. The number of employees that expect access to network resources to improve productivity has increased significantly

More information

GLOSSARY OF TERMS Beacon Management App API (Application Programming Interface) CMS (Content Management System) App

GLOSSARY OF TERMS Beacon Management App API (Application Programming Interface) CMS (Content Management System) App beaconsense.co.uk GLOSSARY OF TERMS Beacon A small, low-cost, low-powered Bluetooth transmitter Management App Ability to programme and assign beacon a function API (Application Programming Interface)

More information

EUROPASS DIPLOMA SUPPLEMENT

EUROPASS DIPLOMA SUPPLEMENT EUROPASS DIPLOMA SUPPLEMENT TITLE OF THE DIPLOMA (ES) Técnico Superior en Sistemas de Telecomunicaciones e Informáticos TRANSLATED TITLE OF THE DIPLOMA (EN) (1) Higher Technician in Telecommunications

More information

Functional Requirements for Digital Asset Management Project version 3.0 11/30/2006

Functional Requirements for Digital Asset Management Project version 3.0 11/30/2006 /30/2006 2 3 4 5 6 7 8 9 0 2 3 4 5 6 7 8 9 20 2 22 23 24 25 26 27 28 29 30 3 32 33 34 35 36 37 38 39 = required; 2 = optional; 3 = not required functional requirements Discovery tools available to end-users:

More information

Process Automation Tools For Small Business

Process Automation Tools For Small Business December 3, 2013 Tom Bellinson Process Automation from Scratch Over the course of 2013 I have written about a number of canned off the shelf (COTS) products that can be used to automate processes with

More information

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems

Vortex White Paper. Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Vortex White Paper Simplifying Real-time Information Integration in Industrial Internet of Things (IIoT) Control Systems Version 1.0 February 2015 Andrew Foster, Product Marketing Manager, PrismTech Vortex

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

Towards Trusted Semantic Service Computing

Towards Trusted Semantic Service Computing Towards Trusted Semantic Service Computing Michel Deriaz University of Geneva, Switzerland Abstract. This paper describes a new prototype of a semantic Service Oriented Architecture (SOA) called Spec Services.

More information

QF01/0407-1.0 الخطة الدراسية كلية العلوم وتكنولوجيا المعلومات- برنامج الماجستير/ الوصف المختصر

QF01/0407-1.0 الخطة الدراسية كلية العلوم وتكنولوجيا المعلومات- برنامج الماجستير/ الوصف المختصر Algorithms analysis and design(0102721). The course introduces students to a variety of computer problems and methods of their solutions. It enables students to assess the complexity of problems and algorithms.

More information

PORTrockIT. Spectrum Protect : faster WAN replication and backups with PORTrockIT

PORTrockIT. Spectrum Protect : faster WAN replication and backups with PORTrockIT 1 PORTrockIT 2 Executive summary IBM Spectrum Protect, previously known as IBM Tivoli Storage Manager or TSM, is the cornerstone of many large companies data protection strategies, offering a wide range

More information

COPYRIGHTED MATERIAL. Chapter 1: Introduction

COPYRIGHTED MATERIAL. Chapter 1: Introduction Chapter 1: Introduction 1 Chapter 1: Introduction A major industry trend is evident in the deployment of Web services technology to enhance existing services and to create new and innovative services.

More information

Summer projects for Dept. of IT students in the summer 2015

Summer projects for Dept. of IT students in the summer 2015 Summer projects for Dept. of IT students in the summer 2015 Here are 7 possible summer project topics for students. If you are interested in any of them, contact the person associated with the project

More information

BEYOND LIMITATIONS CONNECTING POSSIBILITIES

BEYOND LIMITATIONS CONNECTING POSSIBILITIES BEYOND LIMITATIONS CONNECTING POSSIBILITIES Huawei Enterprise BYOD Solution CONNECTING BUSINESS OPPORTUNITIES IN Trend 470 million 1.2 billion 35% In 2011, intelligent mobile terminals surpassed PCs in

More information

Intelligent Systems for Health Solutions

Intelligent Systems for Health Solutions Bringing People, Systems, and Information Together Today s health organizations are increasingly challenged to accomplish what we call the triple aim of effective healthcare: deliver higher quality care

More information

Curl Building RIA Beyond AJAX

Curl Building RIA Beyond AJAX Rich Internet Applications for the Enterprise The Web has brought about an unprecedented level of connectivity and has put more data at our fingertips than ever before, transforming how we access information

More information

Bluetooth One: One-Click Access to Bluetooth. Markus Grupp Interaction Designer Markus.Grupp@ververoom.com

Bluetooth One: One-Click Access to Bluetooth. Markus Grupp Interaction Designer Markus.Grupp@ververoom.com Bluetooth One: One-Click Access to Bluetooth Markus Grupp Interaction Designer Markus.Grupp@ververoom.com The Bluetooth User Experience At a time when Bluetooth is becoming extremely prevalent, in headsets,

More information

How To Make Sense Of Data With Altilia

How To Make Sense Of Data With Altilia HOW TO MAKE SENSE OF BIG DATA TO BETTER DRIVE BUSINESS PROCESSES, IMPROVE DECISION-MAKING, AND SUCCESSFULLY COMPETE IN TODAY S MARKETS. ALTILIA turns Big Data into Smart Data and enables businesses to

More information

MOBILE ARCHITECTURE FOR DYNAMIC GENERATION AND SCALABLE DISTRIBUTION OF SENSOR-BASED APPLICATIONS

MOBILE ARCHITECTURE FOR DYNAMIC GENERATION AND SCALABLE DISTRIBUTION OF SENSOR-BASED APPLICATIONS MOBILE ARCHITECTURE FOR DYNAMIC GENERATION AND SCALABLE DISTRIBUTION OF SENSOR-BASED APPLICATIONS Marco Picone, Marco Muro, Vincenzo Micelli, Michele Amoretti, Francesco Zanichelli Distributed Systems

More information

Towards the Web of Things

Towards the Web of Things Ubiquitous Web Applications Towards the Web of Things Dave Raggett, W3C & JustSystems Mobile Web 2.0, Seoul, 5 March 2008 Contact: dsr@w3.org 1 Web of Things Barcodes as a way to connect physical objects

More information

Regulated Documents. A concept solution for SharePoint that enables FDA 21CFR part 11 compliance when working with digital documents

Regulated Documents. A concept solution for SharePoint that enables FDA 21CFR part 11 compliance when working with digital documents Regulated Documents A concept solution for SharePoint that enables FDA 21CFR part 11 compliance when working with digital documents Contents Life science industry challenges Regulated Documents our service

More information

Whitepaper Continuous Availability Suite: Neverfail Solution Architecture

Whitepaper Continuous Availability Suite: Neverfail Solution Architecture Continuous Availability Suite: Neverfail s Continuous Availability Suite is at the core of every Neverfail solution. It provides a comprehensive software solution for High Availability (HA) and Disaster

More information

ANALYTICS BUILT FOR INTERNET OF THINGS

ANALYTICS BUILT FOR INTERNET OF THINGS ANALYTICS BUILT FOR INTERNET OF THINGS Big Data Reporting is Out, Actionable Insights are In In recent years, it has become clear that data in itself has little relevance, it is the analysis of it that

More information

Making a Case for Including WAN Optimization in your Global SharePoint Deployment

Making a Case for Including WAN Optimization in your Global SharePoint Deployment Making a Case for Including WAN Optimization in your Global SharePoint Deployment Written by: Mauro Cardarelli Mauro Cardarelli is co-author of "Essential SharePoint 2007 -Delivering High Impact Collaboration"

More information

SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year 2015-2016 and thereafter)

SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year 2015-2016 and thereafter) MSc(CompSc)-1 (SUBJECT TO UNIVERSITY S APPROVAL) SYLLABUSES FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (applicable to students admitted in the academic year 2015-2016 and thereafter) The curriculum

More information

Understanding the impact of the connected revolution. Vodafone Power to you

Understanding the impact of the connected revolution. Vodafone Power to you Understanding the impact of the connected revolution Vodafone Power to you 02 Introduction With competitive pressures intensifying and the pace of innovation accelerating, recognising key trends, understanding

More information

Domus, the connected home

Domus, the connected home Domus, the connected home Amazouz Ali, Bar Alexandre, Benoist Hugues, Gwinner Charles, Hamidi Nassim, Mahboub Mohamed, Mounsif Badr, Plane Benjamin {aamazouz, abar, hbenoist, cgwinner, nhamidi, mmahboub,

More information

A Comparison of Protocols for Device Management and Software Updates

A Comparison of Protocols for Device Management and Software Updates B L A C K B E R R Y M 2 M S O L U T I O N S A Comparison of Protocols for Device Management and Software Updates In the last two decades, the number of connected computing devices has grown at a staggering

More information

Developing and Integrating Java Based SIP Client at Srce

Developing and Integrating Java Based SIP Client at Srce Developing and Integrating Java Based SIP Client at Srce Davor Jovanovi and Danijel Matek University Computing Centre, Zagreb, Croatia Davor.Jovanovic@srce.hr, Danijel.Matek@srce.hr Abstract. In order

More information

The Autonomic Management of Ubiquitous Systems meets the Semantic Web

The Autonomic Management of Ubiquitous Systems meets the Semantic Web The Autonomic Management of Ubiquitous Systems meets the Semantic Web Steven Heeps 1, Naranker Dulay 2, Alberto Egon Schaeffer Filho 2, Emil Lupu 2, Morris Sloman 2, Stephen Strowes 1, Joe Sventek 1 1

More information

Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems

Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems Brian McCarson Sr. Principal Engineer & Sr. System Architect, Internet of Things Group, Intel Corp Mac Devine

More information

Huawei Technologies ERC Position Statement: Towards a Future Internet Public Private Partnership

Huawei Technologies ERC Position Statement: Towards a Future Internet Public Private Partnership Huawei Technologies ERC Position Statement: Towards a Future Internet Public Private Partnership Kostas Pentikousis, Mirko Schramm, and Cornel Pampu Huawei Technologies European Research Centre Carnotstrasse

More information

MDM and Telco Service Development OMA Device Management and Platforms

MDM and Telco Service Development OMA Device Management and Platforms MDM and Telco Service Development OMA Device Management and Platforms Berlin, 21 September 2010 Friedhelm Rodermund, Vice-Chair, Device Management Working Group, OMA www.openmobilealliance.org Agenda Overview

More information

IBM Global Business Services Microsoft Dynamics CRM solutions from IBM

IBM Global Business Services Microsoft Dynamics CRM solutions from IBM IBM Global Business Services Microsoft Dynamics CRM solutions from IBM Power your productivity 2 Microsoft Dynamics CRM solutions from IBM Highlights Win more deals by spending more time on selling and

More information

Systèmes d information diffus avec l environnement SPREAD

Systèmes d information diffus avec l environnement SPREAD Systèmes d information diffus avec l environnement SPREAD Paul Couderc INRIA Rennes / IRISA Ambient Computing and Embedded Systems Project http://www.irisa.fr/aces pcouderc@irisa.fr 2005-03-15 1 Domain

More information

The 5G Infrastructure Public-Private Partnership

The 5G Infrastructure Public-Private Partnership The 5G Infrastructure Public-Private Partnership NetFutures 2015 5G PPP Vision 25/03/2015 19/06/2015 1 5G new service capabilities User experience continuity in challenging situations such as high mobility

More information

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol

Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Peer to Peer Search Engine and Collaboration Platform Based on JXTA Protocol Andraž Jere, Marko Meža, Boštjan Marušič, Štefan Dobravec, Tomaž Finkšt, Jurij F. Tasič Faculty of Electrical Engineering Tržaška

More information

A business view for NGN service usage

A business view for NGN service usage A business view for NGN service usage Emmanuel Bertin 1, Idir Fodil 1, Noel Crespi 2 1 France Telecom, R&D division 2 Institut National des Télécommunications (GET-INT) Abstract. Next Generation Networks

More information

Mobile Commerce and Ubiquitous Computing. Chapter 6

Mobile Commerce and Ubiquitous Computing. Chapter 6 Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure

More information

Communications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey)

Communications Management. 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey) Communications Management 3ICT12 (with thanks to Prof. George Pavlou, University of Surrey) 1 Communications Management Network Management Overview What is Network Management? Manager Agent Model OSI Management:

More information

School of Computer Science

School of Computer Science School of Computer Science Head of School Professor S Linton Taught Programmes M.Sc. Advanced Computer Science Artificial Intelligence Computing and Information Technology Information Technology Human

More information

1. Talecom from BT. Talecom from BT. Service Definition

1. Talecom from BT. Talecom from BT. Service Definition 1. BT is working with Talecom to provide a field force automation solution comprising of a number of core components which are combined to deliver specific mobile solutions across the organisation. These

More information

Jini. Kurzfassung als Kapitel für die Vorlesung Verteilte Systeme. (unter Nutzung von Teilen von Andreas Zeidler und Roger Kehr)

Jini. Kurzfassung als Kapitel für die Vorlesung Verteilte Systeme. (unter Nutzung von Teilen von Andreas Zeidler und Roger Kehr) Jini Kurzfassung als Kapitel für die Vorlesung Verteilte Systeme Friedemann Mattern (unter Nutzung von Teilen von Andreas Zeidler und Roger Kehr) Jini Infrastructure ( middleware ) for dynamic, cooperative,

More information

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET-

INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- ABSTRACT INTERNET FOR VANET NETWORK COMMUNICATIONS -FLEETNET- Bahidja Boukenadil¹ ¹Department Of Telecommunication, Tlemcen University, Tlemcen,Algeria Now in the world, the exchange of information between

More information

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network

Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network White paper Intelligent Content Delivery Network (CDN) The New Generation of High-Quality Network July 2001 Executive Summary Rich media content like audio and video streaming over the Internet is becoming

More information

Software Engineering II

Software Engineering II Software Engineering II Dr. Rami Bahsoon School of Computer Science University of Birmingham r.bahsoon@cs.bham.ac.uk Software Engineering II - Dr R Bahsoon Introduction to Cloud and SOA 1 Service-oriented

More information

GCE APPLIED ICT A2 COURSEWORK TIPS

GCE APPLIED ICT A2 COURSEWORK TIPS GCE APPLIED ICT A2 COURSEWORK TIPS COURSEWORK TIPS A2 GCE APPLIED ICT If you are studying for the six-unit GCE Single Award or the twelve-unit Double Award, then you may study some of the following coursework

More information

Whitepaper Mobile Enterprise. The path to the Mobile Enterprise

Whitepaper Mobile Enterprise. The path to the Mobile Enterprise Whitepaper Mobile Enterprise The path to the Mobile Enterprise 1 Executive summary At Ericsson, we are in a unique position to help enterprises achieve a truly mobile way of working. This involves providing

More information

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc])

REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) 305 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations) Any publication based on work approved for a higher degree should contain a reference

More information

Logicalis Unified Communications and Collaboration. Collaborate anytime, anywhere, on any device

Logicalis Unified Communications and Collaboration. Collaborate anytime, anywhere, on any device Logicalis Unified Communications and Collaboration Collaborate anytime, anywhere, on any device Logicalis Unified Communications and Collaboration Solutions & Services Are you struggling to support today

More information

ASCOM IP-DECT SYSTEM PROVEN TECHNOLOGY IN AN INNOVATIVE PACKAGE

ASCOM IP-DECT SYSTEM PROVEN TECHNOLOGY IN AN INNOVATIVE PACKAGE SYSTEM PROVEN TECHNOLOGY IN AN INNOVATIVE PACKAGE 2 3 Ascom has achieved global leadership within traditional DECT technology. Our solutions are known for their modularity, reliability and robust design.

More information

Mobile Access by Axis. Wireless Access Points

Mobile Access by Axis. Wireless Access Points Mobile Access by Axis Wireless Access Points Mobile Internet: Unleashing the Power of Bluetooth Bluetooth Access Point: Going Beyond Cables There s a revolution taking shape today that s fundamentally

More information

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung

Gaming as a Service. Prof. Victor C.M. Leung. The University of British Columbia, Canada www.ece.ubc.ca/~vleung Gaming as a Service Prof. Victor C.M. Leung The University of British Columbia, Canada www.ece.ubc.ca/~vleung International Conference on Computing, Networking and Communications 4 February, 2014 Outline

More information

combining innovative business IT services and consumer technology to inspire the new digital economy The Atos Samsung Alliance

combining innovative business IT services and consumer technology to inspire the new digital economy The Atos Samsung Alliance The Atos Samsung Alliance combining innovative business IT services and consumer technology to inspire the new digital economy Your business technologists. Powering progress The Atos and Samsung alliance

More information

Virtual World technologies to manage a grid a look at some realities, concepts and maybe even the future

Virtual World technologies to manage a grid a look at some realities, concepts and maybe even the future Virtual World technologies to manage a grid a look at some realities, concepts and maybe even the future Rick Reesen Metaversiast rick_reesen@nl.ibm.com Abstract: Consolidation and virtualization of the

More information

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad

Cloud Computing: Computing as a Service. Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Cloud Computing: Computing as a Service Prof. Daivashala Deshmukh Maharashtra Institute of Technology, Aurangabad Abstract: Computing as a utility. is a dream that dates from the beginning from the computer

More information

Connect for new business opportunities

Connect for new business opportunities Connect for new business opportunities The world of connected objects How do we monitor the carbon footprint of a vehicle? How can we track and trace cargo on the move? How do we know when a vending machine

More information

Captivate Your Mobile Customers

Captivate Your Mobile Customers Why Partner with Smith Micro? A 30-year track record in robust software development and reliable commercial deployments: Engaging Customers in Context Mobile devices have become engrained in our daily

More information

( ETSI Ad Hoc Group on Fixed/Mobile Convergence - Final Report - 11 March 1998) (1) Telecom Italia, V. di Valcannuta 250, Rome (Italy)

( ETSI Ad Hoc Group on Fixed/Mobile Convergence - Final Report - 11 March 1998) (1) Telecom Italia, V. di Valcannuta 250, Rome (Italy) (1) Telecom Italia, V. di Valcannuta 250, Rome (Italy) (2) Telecom Italia, V. di Valcannuta 250, Rome (Italy (3) CSELT, V. R. Romoli, 274 Turin (Italy) The term convergence is more and more associated

More information

White Paper. The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks.

White Paper. The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks. White Paper The Assurance Checklist for Branch Networks A pragmatic guide for building high performance branch office networks. - 1 - Executive Summary The era of mobility and consumerization has fundamentally

More information

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT

Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT An Overview Of Future Impact Of Cloud Computing Shiva Chaudhry COMPUTER SCIENCE DEPARTMENT IFTM UNIVERSITY MORADABAD Abstraction: The concept of cloud computing has broadcast quickly by the information

More information