Middleware and Applications for Mobile Computers

Size: px
Start display at page:

Download "Middleware and Applications for Mobile Computers"

Transcription

1 Hitachi Review Vol. 48 (1999), No Middleware and Applications for Mobile Computers Taro Saito Yahei Murakata Masatoshi Nakaya Naoko Taniguchi OVERVIEW: In the mobile computing environment for business use, more and more people are declaring that they want to be able to do their jobs the same way when they are outside the office as they do when they are in it. That is to say, there is a strong demand for seamless collaboration between enterprise systems and mobile computers. Mobile computing environments, however, are subject to a number of problems. Users must endure slow data transfer speed, sudden connection failures, expensive connection costs, and other problems related to poor communication infrastructure. The problem of security must also be borne in mind because mobile users use a particular infrastructure like the Internet or a mobile phone system. Hitachi has investigated and analyzed these problems, and done much to solve them by providing special products called Mobile middleware, which are based on new technologies such as agent and security technologies that comply with industry standards and de facto standards. INTRODUCTION IN the hot topic of mobile computing, the main elements are: (1) systems, which are free from the restrictions of time and location, (2) WWW (world wide web) which helps users acquire data on demand, (3) schedule management, (4) word processing, (5) other elements. All of these can be accessed or utilized through various media, such as notebook computers, PDA, PHS (Japan s personal handyphone system), cellular phones, and so on. Of course, mobile computing is also a hot topic in the business world. And business people, being affected by the advances being made in mobile Problems for mobile computer users Solutions with Mobile middleware Personal digital assistants (PDAs) have a lot of valuable data in them, but enterprise systems or LANs provide very little support for them. Mobile middleware solves connectivity problems, security problems, and many other mobile comuting problems. It also saves costs by reducing connection expenses like the phone bill, and ensures secure data transmission. Mobile computing is very convenient but the communication expenses like the phone bill are very expensive. Sudden connection failures happen very often and make us have to repeat work that we have already done. If we send data through the Internet, it might get wiretapped or interpolated. PDA: personal digital assistant Hitachi Mobile middleware Mobile database access Database access middleware used in mobile computing environment Mobile message queue Communication middleware for mobile computing environment. Hitachi mobile message queue provides queue function and asynchronous communication function. Secure communication Automatic data compression function, encryption function, and authentication function when accessing a server machine from a client machine. Groupware Groupware that has functions valuable in a mobile computing environment Fig. 1 Current Situation in Mobile Computing. There are many issues peculiar to mobile computing in business use. Mobile middleware overcomes these by providing appropriate solution for each user.

2 Middleware and Applications for Mobile Computers 22 TABLE 1. Problems That Inhibit the Spread of Mobile Computing (Mobile Media Magazine, April/1998). Target: 2,300 companies : system dept. and sales dept. (total of 430 available answers) Target: Companies which have or are considering purchasing a mobile computing system Question Communication-related expense Valuable computerized data Obscurity of effectiveness User education Difficulty of the security Modification of the existing system Operating time with only battery power Portability and durability of hardware Data transfer speed Abundance of Prompt business processing speed Narrow mobile phone/phs service area System dept. and sales dept. perception Specialist shortage for radio transmission Other reasons Not in operation Under consideration computing, wish to take advantage of them so that they can have the same computing environmnt both in and out of the office. However, there are still cost, quality, and security problems to overcome before this becomes possible. Mobile middleware has been created as a means of addressing these problems. For the most part, however, current business use of mobile computing is restricted to using and the WWW to manage personal data and do relatively simple tasks. These are in widespread use because even simple dvices like PDAs have the functions required for using them. This is only a small part of the overall mobile computing picture, however, and brings only limited benefits to business users. The benefits available to them would greatly expand, however, if they had access to a mobile computing system seamlessly connected to the company s host system or LAN. Such a system would enable them to do their jobs equally well both inside and outside their office. For example, it is very helpful for salespeople working outside the office to be able to get the latest data stored in the company s host system and do order entries immediately if possible. What do you do if you are asked some questions that you can easily answer from your office but not from outside it. And what will happen if you must wait for some time to get the result of a commodity stock check, while your competitor offers the customer nothing but assurances? Yes. I can get all the answers you need just like that. Order stock? No problem, sir. We can draw up the contract right now if you d like. Price lowering? Well, it s beyond my authority, but I can check with my boss on that right now. Things will be even tougher for you if your competitor has an on-demand entry system for reducing delivery time and you don t. Seamless connection to a company s host system or LAN has the potential to provide very important advantages. Presently, though, it finds very limited use because of the problems involved. Table. 1, reproduced from an article in the magazine Mobile Media, shows the problems that have inhibited and are inhibiting the spread of mobile computing for business use in Japan. The main problems are: (1) Poor communication infrastructure, resulting in high costs for communication expenses, e.g. phone bills (mostly on a per-time or data-amount basis in Japan) (2) Hardware device limitations, e.g. operating time using battery power (3) Inferior security, especially in complex security situations (4) Necessity of modifying existing host system or LANs when constructing mobile computing systems To solve these problems, Hitachi has developed a number of special products. It refers to as Mobile middleware. The main features of these products include: (1) Batch processing To save on costs, phone lines are used only when data is transferred. (2) Process continuity Even after a sudden connection failure, processing can be continued from the point at which the problem occurred. (3) Security Secure communication is ensured by the prevention of wiretapping and interpolation. EXAMPLE MOBILE COMPUTING SYSTEM FOR SALESPEOPLE As mentioned previously, it is important for salespeople to be able to access data stored in host systems or LANs from outside the office. At present, however, they have to access the data by phoning their associates at the office and asking them to get it. Cellular or PHS terminals are useful for this purpose, but very limited in efficiency. Voice messaging systems are of little use for such purposes, and in any event such systems enjoy very little popularity among Japanese business people since they normally share one telephone with several

3 Hitachi Review Vol. 48 (1999), No group 1 2 X execution direction execution result s acquisition requirement Database access server execution SQL Database Mobile user Execution result SQL : structured query language Execution result Fig. 2 Database Access Operation Flow with Hitachi Mobile Database Access Software. other peeople. Thus business phones with a message recording function are few and far between. Many Japanese are also averse to get phone and call with cellular or PHS terminals because, being designed as a means for emergency communication, they have a very loud, annoying ring. Many customers in Japan would be quite put off if a visiting salesperson s mobile phone started ringing in the midst of their discussion. In response to this situation, Hitchi has developed a number of mobile middleware to assist salespeople. One product provides database access using agent technology. Another is a groupware and system with a remote communicate function. Database Access Using Technology The database system is the most important component in the enterprise information systems used by most companies. Thus it is important for salespeople to be able to use the company s database from outside their office. For this purpose, Hitachi mobile database access and message queue will save them time and money. Hitachi mobile message queue softwae protects users from sudden communication failures which jack up communication expenses. Hitachi mobile database access provides an agent mechanism that reduces the hardware resource requirement and communication expenses. Data access product for mobile computing A database access agent, in short, is a function to make server machines do all data retrieval operations. The function operates as described below. First, a remote or mobile user registers transaction on the server, which registration describes the execution time, access condition to the database, and other details. This transaction unit registered on the server machine is called an agent. Hitachi mobile database access receives the execution requirement and activate the agent. The data transmission between the client machine and the server machine is solely the agent calling and receiving a response. The amount of data transmitted is much less than that transmitted by an SQL transaction in an ODBC(open database connectivity) connection (Fig. 2). Once the agent receives the requirement from the client machine, it can continue its operation without any connection between the two machines. That is to say, the connection time can be reduced. And in Japan, the resultant reduction in communication expenses is very significant because communication fees such as phone bills are very expensive in this country. For this purpose, incidentally, the Hitachi mobile message queue is another indispensable product. The Hitachi database access client system is what helps to register the agent. By using this system, if salespeople register the agent from their desktop machine in their office, they can get the execution result merely by calling the agent from outside the office.

4 Middleware and Applications for Mobile Computers 24 Mobile user Application Mobile API (DLL) WinSock API TCP/IP Hitachi secure communication Receiving Hitachi mobile message queue (Client) PPP Transmitting Easy to use API Hitachi mobile database access (Client) Simple and easy to use API Batch transmission with mechanism and error retry function Secure and reliable message transmission in mobile computing environment Easy to access the database from outside the office Hitachi mobile database access () Mobile API (DLL) Hitachi mobile message queue (Server) application Application for Hitachi OLTP MQI Message queue for OLTP Hitachi OLTP Windows Socket API (*1) Hitachi secure communication TCP/IP PPP Receiving Mainframe Server Transmitting MQI RPC SQL MQI RPC Enterprise database Server IBM message queue Hitachi OLTP and message queue for OLTP Enterprise system GUI : graphical user interface DLL : dynamic linking library TCP/IP : transmission control, protocol/internet protocol PPP : point-to-point protocol MQI : message queuing interface RPC : remote procedure call OLTP: online transaction processing *1: Windows is a registered trademark of Microsoft Corp. in the U.S. and other countries. *2: means the queue of Hitachi message queue for OLTP Fig. 3 Architecture and Features of Hitachi Mobile Message Software. And it is also possible to customize the transaction processing pattern because Hitachi mobile database access softwre provides a special API (Application Programming Interface) for agent control. Communication access for mobile computing environment One problem with mobile computing is poor communication quality which causes sudden communication failures. So it is important for users to have a function which makes it possible to restart the data transmission from the point at which the communication failure occurred. And application like Hitachi mobile database access running under a mobile computing environment also must be able to do communication-related work such as issuing requests to the server machine. Hitachi mobile message queue helps users by providing a function for typical communication methods used in mobile computing, and by reducing transmission time and consequently communication expense. Hitachi mobile message queue is based on asynchronous messaging technology and also on the technology used in Hitachi message queue for OLTP, a high-performance, asynchronous communication that has inter-compatibility with IBM message queue softwre, a de facto standard in the present messaging market. Thus, it is easy for Hitachi mobile message queue to cooperate with existing enterprise computer systems. Its architecture is shown in Fig. 3. Hitachi mobile message queue has a gateway function on the server side that enables it to cooperate with other application programs running on the server. Furthermore, it can even cooperate with core enterprise system. The API of Hitachi mobile message queue, which registers and obtains messages between the transmitting queue and receiving queue, makes it possible for the application to utilize this communication function. Users may access the core enterprise system through the API without even realizing they are using it. Special Groupware and in the Mobile Computing Groupware is that includes functions like , schedule management, document management, workflow and so on. It is currently a popular data sharing mode in companies. Hitachi s groupware product has an function that is superior in many ways to other mobile comput-

5 Hitachi Review Vol. 48 (1999), No (1) messages to salesperson PP : program product Hitachi groupware server Cellular/PHS phone network (2) Salesperson checks the mailbox Intranet Public phone network Hitachi groupware server (Voice mail gateway) (4) Reply/transfer using phone only Fig. 4 Association Between Telephone and with Groupware. Indispensable : Integrated desktop Audio analog digital data conversion board (3) Salesperson hears the messages ing. One example is shown below. is an effective communication method between a mobile office and a company s main office. But it is very troublesome to use because salespeople must carry a hardware device like a PDA with them to access . Hitachi groupware server, however, makes it possible for salespeople to send or receive merely by using a telephone. It even has a function with which replies can be sent via an attached voice file method (Fig.4). check from a portable computer Integrated Desktop, one type of Hitachi groupware client, has an automatic download function which is a new feature available beginning with new version. It can automatically download all messages into a client machine. Hitachi groupware has some functions that POP3-based mail client and server have. Thus, Integrated Desktop can automatically dial the phone number, establish the dial connection to the mail server, send, receive, and download the new messages, and close the connection. Of course, users can read the new mail and send their replies in the off-line mode as well. Reading/writing from the POP3 mail client Hitachi groupware has implemented POP3 (Post Office Protocol Version 3), the standard protocol in the Internet. This means that a user can use Hitachi groupware with leading client that uses the POP3 protocol. Some PDAs also have POP3 mail client now. Accessing the Hitachi groupware server by telephone Hitachi groupware users can access their mailbox without using a notebook computer, any other type of PC, or a PDA. Instead, they can read messages and reply to them merely by using a pay phone, cellular phone, or a PHS phone. SECURITY SYSTEM FOR MOBILE COMPUTING Data wiretapping and interpolation are the key issues in the area of computer system security today. In a mobile computing environment, these issues can be broken down as follows: (1) Wiretapping of transmission data The data is sent through a public place, and thus it can be wiretapped easily. (2) Illegal access to a computer system In a mobile computing environment, many enterprise computer systems have modems for remote or mobile users. These modems are good entrances for crackers. (3) Lost hardware device It is always possible for a user to lose a hardware device, and for a stranger to find and use it. Hitachi has developed to help combat these security problems. Hitachi secure communication prevents security breaches from wiretapping through automatic data encryption. The company s dealing with the illiegal access issue is described in Communication Infrastructure for Secure Mobile Computing, another article in this issue. And Hitachi s portable hardware has an authentication mechanism with ID or password so that lost devices Pseudo- WinSock DLL FTP True WinSock DLL FTP : file transfer protocol telnet WinSock function entry Socket library main body TCP / IP Hitachi groupware Data compression Encryption Key management Fig. 5 Encryption and Compression with the Hooking Mechanism

6 Middleware and Applications for Mobile Computers 26 will not result in security problems. Features of Hitachi Secure Communication Softwre Hitachi secure communication has four principal features for mobile computing. (1) No modification of existing systems is required. Hitachi secure communication hooks the socket function that the application program calls to TCP/IP program, so there is no need to modify the application program. This mechanism is described in Fig. 5. (2) Excellent authentication mechanism based on ISO/ IEC9798 Hitachi secure communication has an ISO/ IEC9798-based authentication mechanism. It is more secure than an ID or password authentication mechanism. (3) Hitachi secure communication encryption mechanism Hitachi secure communication encryption mechanism has a 256-bit key length and a hash code mechanism to check data interpolation. Encryption and compression are done at the same time so that communication time and expense can be reduced. (4) Removable certification data Hitachi secure communication requires certification data stored in a storage device. Thus, if the user uses a floppy disk, no third person can run Hitachi secure communication without it. CONCLUSIONS This article has introduced Hitachi s line-up of Mobile middleware products which provide an efficient, easy-to-use, and highly reliable mobile computing environment by realizing seamless computing. The products and technologies introduced in this article are only some of the many products Hitachi provides. Hitachi will continue to offer valuable Mobile middleware products and technologies that will be key mobile computing components in the 21st century. REFERENCE (1) Omori: Current SFA status in USA and Next generation business strategy researched by Mobile-SFA actual condition survey through listed companies in USA, Mobile Media Magazine 38, (1998) ABOUT THE AUTHORS Taro Saito Joined Hitachi, Ltd. in 1993 and now works at the 3rd Group of the Network Software Dept. of the Software Division. He is currently engaged in the product marketing and design of network related products. Mr. Saito is a member of the Information Processing Society of Japan and can be reached by at saito_t@soft.hitachi.co.jp. Masatoshi Nakaya Joined Hitachi, Ltd. in 1972 and now works at the 8th Group of the 4th Operating System Dept. at the Software Division. He is currently engaged in the product design of a secure communication. Mr. Nakaya is a member of the Information Processing Society of Japan and he can be reached by at nakaya_m@soft.hitchi.co.jp. Yahei Murakata Joined Hitachi, Ltd. in 1977 and now works at the 6th Group of the Data Communications Dept. at the Software Div. He is currently engaged in the product design of enterprise middleware products. Mr. Murakata can be reached by at murak_ya@soft.hitachi.co.jp. Naoko Taniguchi Joined Hitachi, Ltd. in 1989 and now works at the 4th Group of the Application Infrastructure Dept. at the Software Div. She is currently engaged in the product design of middleware for database access. Ms. Taniguchi is a member of the Information Processing Society of Japan and she can be reached by at tanigu_n@soft.hitachi.co.jp.

Secure System Solution and Security Technology

Secure System Solution and Security Technology Secure System Solution and Security Technology Hitachi Review Vol. 47 (1998), No. 6 245 Chisato Konno, D.Sc. Mitsuhiro Tsunoda Yasushi Kuba Satoru Tezuka OVERVIEW: The and intranet systems are rapidly

More information

Solutions for a New Enterprise Information System Applying Mobile Computing Technology

Solutions for a New Enterprise Information System Applying Mobile Computing Technology Solutions for a New Enterprise Information System Applying Hitachi Mobile Review Computing Vol. 48 (1999), Technology No. 1 8 Solutions for a New Enterprise Information System Applying Mobile Computing

More information

Using email over FleetBroadband

Using email over FleetBroadband Using email over FleetBroadband Version 01 20 October 2007 inmarsat.com/fleetbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure

More information

What really is a Service?

What really is a Service? Internet Services What really is a Service? On internet (network of networks), computers communicate with one another. Users of one computer can access services from another. You can use many methods to

More information

IBM i Version 7.2. Security Service Tools

IBM i Version 7.2. Security Service Tools IBM i Version 7.2 Security Service Tools IBM i Version 7.2 Security Service Tools Note Before using this information and the product it supports, read the information in Notices on page 37. This edition

More information

Microsoft SQL Server Express 2005 Install Guide

Microsoft SQL Server Express 2005 Install Guide Microsoft SQL Server Express 2005 Install Guide Version 1.1 Page 1 of 32 Contents 1.0 Introduction... 3 1.1 Installing Microsoft SQL Server Express 2005 SP4 Edition... 3 1.2 Installing Microsoft SQL Server

More information

Total System Operations and Management for Network Computing Environment

Total System Operations and Management for Network Computing Environment Total System Operations and Management for Network Computing Environment Hitachi Review Vol. 47 (1998), No. 6 291 Satoshi Miyazaki, D. Eng. Toshiaki Hirata Masaaki Ohya Eiji Matsumura OVERVIEW: The architecture

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

Someone may be manipulating information in your organization. - and you may never know about it!

Someone may be manipulating information in your organization. - and you may never know about it! for iseries, version 3.5 Complete Security Suite for iseries (AS/400) TCP/IP and SNA Connectivity Someone may be manipulating information in your organization - and you may never know about it! If your

More information

White Paper UC for Business - Process Automation

White Paper UC for Business - Process Automation UC for Business - Process Automation NEC Australia nec.com.au Table of Contents Introduction...3 Overview...3 UCB s Process Automation Solutions...3 Technology Overview...4 Benefits of UCB s Process Automation

More information

Dependable, Open and Real-time Architecture for Power Systems

Dependable, Open and Real-time Architecture for Power Systems Dependable, Open and Real-time Architecture for Power Systems 48 Dependable, Open and Real-time Architecture for Power Systems DORA-Power Atsuhiko Hirota Masayuki Kikuchi Takashi Owaki Yukiyoshi Tani OVERVIEW:

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

INFORMATION UNIFICATION BE- TWEEN ENTERPRISE RESOURCE PLANNING SYSTEM AND PRODUC- TION CONTROL SYSTEM

INFORMATION UNIFICATION BE- TWEEN ENTERPRISE RESOURCE PLANNING SYSTEM AND PRODUC- TION CONTROL SYSTEM INFORMATION UNIFICATION BE- TWEEN ENTERPRISE RESOURCE PLANNING SYSTEM AND PRODUC- TION CONTROL SYSTEM SEKI Yutaka *1 We have developed a communication software package, LinkforSap, that enables direct

More information

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions

Model 2120 Single Port RS-232 Terminal Server Frequently Asked Questions Applications What are some of the applications for the Model 2120 Single Port Terminal Server? The Patton Single Port RS-232 Terminal Server provides the ability to bring virtually any RS-232 device onto

More information

User Manual. 3CX VOIP client / Soft phone Version 6.0

User Manual. 3CX VOIP client / Soft phone Version 6.0 User Manual 3CX VOIP client / Soft phone Version 6.0 Copyright 2006-2008, 3CX ltd. http:// E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data

More information

Technology/Internet Usage Workshop

Technology/Internet Usage Workshop Technology/Internet Usage Workshop 1) Workshop Goals (1 st Slide) 2) Computers Desk Top (Show examples) Lap-Top Hand-held Wireless Device Introduce Tammy Welsh from Gateway 3) What is the Internet? The

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9236245 Issue 2EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9236245 Issue 2EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300 Configuring connection settings Legal Notice Copyright Nokia 2005. All rights reserved. Reproduction,

More information

Legacy System Integration Technology for Legacy Application Utilization from Distributed Object Environment

Legacy System Integration Technology for Legacy Application Utilization from Distributed Object Environment Legacy System Integration Technology for Legacy Application Utilization from Distributed Object Environment 284 Legacy System Integration Technology for Legacy Application Utilization from Distributed

More information

Brother Automatic E-Mail Printing OPERATION MANUAL

Brother Automatic E-Mail Printing OPERATION MANUAL Brother Automatic E-Mail Printing OPERATION MANUAL Copyright Brother 1999 No part of this publication may be reproduced in any form or by any means without permission in writing from the publisher. The

More information

Communication/Internet Operation Manual

Communication/Internet Operation Manual Communication/Internet Operation Manual To ensure correct use of your camera, read this manual carefully before use. Keep the manual handy for future use. Introduction Thank you for purchasing a Ricoh

More information

Unisys INFOIMAGE FOLDER ON WINDOWS NT. Connector for Microsoft Exchange. Getting Started Guide

Unisys INFOIMAGE FOLDER ON WINDOWS NT. Connector for Microsoft Exchange. Getting Started Guide INFOIMAGE FOLDER ON WINDOWS NT Connector for Microsoft Exchange Unisys Getting Started Guide Copyright 1999 Unisys Corporation. All rights reserved. Unisys is a registered trademark of Unisys Corporation.

More information

Internet and Services

Internet and Services 3 Internet and Services 3.1 INTRODUCTION The Internet began way back in 1969 when it was called ARPANet (Advanced Research Project Agency Network) and was used exclusively for military purposes. It soon

More information

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access MCTS Guide to Microsoft Windows 7 Chapter 14 Remote Access Objectives Understand remote access and remote control features in Windows 7 Understand virtual private networking features in Windows 7 Describe

More information

Higher National Unit Specification. General information for centres. Unit title: Enhancing Network Security and Configuring Remote Access Methods

Higher National Unit Specification. General information for centres. Unit title: Enhancing Network Security and Configuring Remote Access Methods Higher National Unit Specification General information for centres Unit code: D7JV 35 Unit purpose: This Unit is designed to enable candidates to increase network security through authentication, encryption

More information

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Outline How do you protect your critical confidential data?

More information

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia E70 Configuring connection settings Nokia E70 Configuring connection settings Legal Notice Copyright Nokia 2006. All

More information

Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Chapter 3 Internetwork E-Business Electronic Business

Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Chapter 3 Internetwork E-Business Electronic Business Community Development and Training Centre Semester 2 2006 IT 245 Management Information Systems Chapter 3 Internetwork E-Business Electronic Business Applications. Internetworked E-business enterprises

More information

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

Exhibit B5b South Dakota. Vendor Questions COTS Software Set Appendix C Vendor Questions Anything t Applicable should be marked NA. Vendor Questions COTS Software Set Infrastructure 1. Typically the State of South Dakota prefers to host all systems. In the event

More information

WEB CONFIGURATION. Configuring and monitoring your VIP-101T from web browser. PLANET VIP-101T Web Configuration Guide

WEB CONFIGURATION. Configuring and monitoring your VIP-101T from web browser. PLANET VIP-101T Web Configuration Guide WEB CONFIGURATION Configuring and monitoring your VIP-101T from web browser The VIP-101T integrates a web-based graphical user interface that can cover most configurations and machine status monitoring.

More information

Internet Services. Sadiq M. Sait, Ph.D

Internet Services. Sadiq M. Sait, Ph.D Internet Services Sadiq M. Sait, Ph.D sadiq@ccse.kfupm.edu.sa Department of Computer Engineering King Fahd University of Petroleum and Minerals Dhahran, Saudi Arabia Internet Short Course 1-1 What really

More information

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows:

The OSI model has seven layers. The principles that were applied to arrive at the seven layers can be briefly summarized as follows: 1.4 Reference Models Now that we have discussed layered networks in the abstract, it is time to look at some examples. In the next two sections we will discuss two important network architectures, the

More information

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system

Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system Dear Student Here is the list of chapter sections that we will be covering for this semester. For each chapter listed in pages below: Any Bold text is required (with all the details in that sections) Any

More information

Best practice for SwiftBroadband

Best practice for SwiftBroadband Best practice for SwiftBroadband Version 01 30.01.08 inmarsat.com/swiftbroadband Whilst the information has been prepared by Inmarsat in good faith, and all reasonable efforts have been made to ensure

More information

NetSupport DNA Configuration of Microsoft SQL Server Express

NetSupport DNA Configuration of Microsoft SQL Server Express NetSupport DNA Configuration of Microsoft SQL Server Express Copyright 2016 NetSupport Ltd All rights reserved Configuration of Microsoft SQL Server Express and NetSupport DNA Installation Requirements

More information

redcoal EmailSMS for MS Outlook and Lotus Notes

redcoal EmailSMS for MS Outlook and Lotus Notes redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: support@redcoal.com Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal

More information

FacetPhone IP-PBX. IP From the Ground Up

FacetPhone IP-PBX. IP From the Ground Up FacetPhone IP-PBX IP From the Ground Up FacetPhone: FacetPhone is a completely new phone system designed for small to medium size businesses. Facet- Phone is an IP-PBX that completely integrates the company

More information

Network Technologies

Network Technologies Network Technologies Telephone Networks IP Networks ATM Networks Three Network Technologies Telephone Network The largest worldwide computer network, specialized for voice ing technique: Circuit-switching

More information

Siemens HiPath ProCenter Multimedia

Siemens HiPath ProCenter Multimedia Siemens HiPath ProCenter Multimedia Today s business climate is tougher than ever, and chances are your competitors are no longer just a local concern. All this means finding ways of improving customer

More information

Omniquad Exchange Archiving

Omniquad Exchange Archiving Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith

More information

Architecture and Technologies for HGW

Architecture and Technologies for HGW Architecture and Technologies for HGW Authors: Masahide Nishikawa* and Shunsuke Nishio* Home information and communication technology (ICT) service systems, where household appliances and devices are linked

More information

MANUFACTURER RamSoft Incorporated 243 College St, Suite 100 Toronto, ON M5T 1R5 CANADA

MANUFACTURER RamSoft Incorporated 243 College St, Suite 100 Toronto, ON M5T 1R5 CANADA All Information provided in this document and in the accompanying software is subject to change without notice and does not represent a commitment on the part of RamSoft. RamSoft assumes no responsibility

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

AS/400 System Overview

AS/400 System Overview Chapter 1 AS/400 System Overview 1.1 Major Characteristics of AS/400 1.1.1 High Level of Integration 1.1.2 Object Orientation 1.1.3 Relational and Integrated Database 1.1.4 Data and Program Independence

More information

Beginners Guide to Mobile Technology

Beginners Guide to Mobile Technology Beginners Guide to Mobile Technology A Transformyx Whitepaper I. MOBILE TECHNOLOGY Mobile computing allows people to use IT without being tied to a single location. Any business with staff that work away

More information

Achieving a Personal Cloud Environment

Achieving a Personal Cloud Environment KAMBA Tomonari, ENDO Yukio Abstract This paper introduces NEC s challenging achievement Personal Cloud, which is a strategic vision of BIGLOBE. We are promoting the development of Cloud Device that integrates

More information

9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9243060 Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9243060 Issue 1 EN Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation Nokia 9300i Configuring connection settings Nokia 9300i Configuring connection settings Legal Notice

More information

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06 SafeNet Authentication Service Configuration Guide 1.06 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

COMP5426 Parallel and Distributed Computing. Distributed Systems: Client/Server and Clusters

COMP5426 Parallel and Distributed Computing. Distributed Systems: Client/Server and Clusters COMP5426 Parallel and Distributed Computing Distributed Systems: Client/Server and Clusters Client/Server Computing Client Client machines are generally single-user workstations providing a user-friendly

More information

Email Electronic Mail

Email Electronic Mail Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing

More information

Support for the HIPAA Security Rule

Support for the HIPAA Security Rule WHITE PAPER Support for the HIPAA Security Rule PowerScribe 360 Reporting v2.0 HEALTHCARE 2 SUMMARY This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe

More information

Using hp OpenView Omniback II GUI Via Slow Remote Connections

Using hp OpenView Omniback II GUI Via Slow Remote Connections hp OpenView Omniback II technical whitepaper Using hp OpenView Omniback II GUI Via Slow Remote Connections Using Omniback II GUI via slow remote connections Technical Whitepaper Table of Contents 1. Introduction...

More information

myfax V.34 Network Fax Server Main Functions:

myfax V.34 Network Fax Server Main Functions: The myfax is a complete, highly economical, easy-to-use network fax server. It was designed to meet the needs of small to mid-sized businesses or workgroups, and comes with all the necessary hardware and

More information

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data

User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data User Authentication Job Tracking Fax Transmission via RightFax Server Secure Printing Functions HDD/Memory Security Fax to Ethernet Connection Data Security Kit Outline How do you protect your critical

More information

StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2003

StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2003 StarWind iscsi SAN Software: Using StarWind with MS Cluster on Windows Server 2003 www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved.

More information

Alert on LAN 2. Information Brief. Worth remembering. Overview. Proactive asset protection

Alert on LAN 2. Information Brief. Worth remembering. Overview. Proactive asset protection Proactive asset protection Alert on LAN 2 Information Brief Worth remembering Alert on LAN 2 extends the system administrator s capabilities to take corrective action on alert-generation technology introduced

More information

Controlling Remote Access to IBM i

Controlling Remote Access to IBM i Controlling Remote Access to IBM i White Paper from Safestone Technologies Contents IBM i and Remote Access...2 An Historical Perspective...2 So, what is an Exit Point?...2 Hands on with Exit Points...3

More information

How to Secure a Groove Manager Web Site

How to Secure a Groove Manager Web Site How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,

More information

USB Print Server User Manual (GPSU01)

USB Print Server User Manual (GPSU01) USB Print Server User Manual (GPSU01) Welcome Thank you for purchasing this 1-port USB Print Server that allows any networked computer to share a USB printer. It complies with USB 1.1 specifications,

More information

Lync for Mac 2011 Deployment Guide

Lync for Mac 2011 Deployment Guide 2011 Deployment Guide Getting Started Information in this document, including URL and other Internet Web site references, is subject to change without notice. Content in this document represents the current

More information

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION

CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two

More information

DIRECT INTERNET DATA. User s Guide

DIRECT INTERNET DATA. User s Guide DIRECT INTERNET DATA User s Guide Iridium Satellite LLC Rev. 2; June 15, 2001 DIRECT INTERNET DATA ------------------------------------------------------------------------------------- TABLE OF CONTENTS

More information

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu

VPN. Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu VPN Date: 4/15/2004 By: Heena Patel Email:hpatel4@stevens-tech.edu What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining

More information

AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries.

AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries. CRM Glossary Guide AA Automated Attendant is a device connected to voice mail systems that answers and may route incoming calls or inquiries. ABANDON RATE Abandon Rate refers to the percentage of phone

More information

Go Wireless. Open up new possibilities for work and play

Go Wireless. Open up new possibilities for work and play Go Wireless Open up new possibilities for work and play Start with 3 pieces A typical home or small-office wireless LAN requires only 3 pieces of hardware. With these 3 pieces, you re ready to get started!

More information

TELSTRA BUSINESS MAIL QUICK REFERENCE GUIDE

TELSTRA BUSINESS MAIL QUICK REFERENCE GUIDE 1.1 Introduction 01 1.2 The Checklist 02 1.3 Business Mail Requirements 03 1.4 Downloading & Installing Outlook 2003 04 BEFORE YOU START 1.1 INTRODUCTION 1.1.1 Who this Guide is For 1.1.2 What s in this

More information

Installation Notes for Outpost Network Security (ONS) version 3.2

Installation Notes for Outpost Network Security (ONS) version 3.2 Outpost Network Security Installation Notes version 3.2 Page 1 Installation Notes for Outpost Network Security (ONS) version 3.2 Contents Installation Notes for Outpost Network Security (ONS) version 3.2...

More information

Configuring connection settings

Configuring connection settings Configuring connection settings Nokia E90 Communicator Configuring connection settings Nokia E90 Communicator Configuring connection settings Legal Notice Nokia, Nokia Connecting People, Eseries and E90

More information

Security Service tools user IDs and passwords

Security Service tools user IDs and passwords System i Security Service tools user IDs and passwords Version 5 Release 4 System i Security Service tools user IDs and passwords Version 5 Release 4 Note Before using this information and the product

More information

Integrating F5 Application Delivery Solutions with VMware View 4.5

Integrating F5 Application Delivery Solutions with VMware View 4.5 APPLICATION READY SOLUTION GUIDE What s inside: 2 Improving user experience 2 Enhancing security and access control 3 Application Performance and Availability 4 F5 and global configuration diagram 5 More

More information

Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES

Product Brief. DC-Protect. Content based backup and recovery solution. By DATACENTERTECHNOLOGIES Product Brief DC-Protect Content based backup and recovery solution By DATACENTERTECHNOLOGIES 2002 DATACENTERTECHNOLOGIES N.V. All rights reserved. This document contains information proprietary and confidential

More information

VPN SERVICE CUSTOMER CARE

VPN SERVICE CUSTOMER CARE 3 AT&T 2 VPN SERVICE CUSTOMER CARE 4The Role of AT&T Customer Care AT&T VPN Service Customer Care will provide full support to your Company Point of Contact (CPOC) within the defined Service Demarcation

More information

Content Protection in Silverlight. Microsoft Corporation

Content Protection in Silverlight. Microsoft Corporation Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting

More information

Bluetooth CompactFlash Card User Manual (GBC201)

Bluetooth CompactFlash Card User Manual (GBC201) Bluetooth CompactFlash Card User Manual (GBC201) Thank you for purchasing IOGEAR Bluetooth CompactFlash card for PDAs! The IOGEAR Bluetooth Compact Flash Card for PDAs fits into both Type I and Type II

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

FortiVoice. Version 7.00 User Guide

FortiVoice. Version 7.00 User Guide FortiVoice Version 7.00 User Guide FortiVoice Version 7.00 User Guide Revision 2 28 October 2011 Copyright 2011 Fortinet, Inc. All rights reserved. Contents and terms are subject to change by Fortinet

More information

< Introduction > This technical note explains how to connect New SVR Series to DSL Modem or DSL Router. Samsung Techwin Co., Ltd.

< Introduction > This technical note explains how to connect New SVR Series to DSL Modem or DSL Router. Samsung Techwin Co., Ltd. < Introduction > This technical note explains how to connect New to DSL Modem or DSL Router. Samsung Techwin Co., Ltd. 1 Contents 1. General... 4 1.1. DSL (xdsl)... 4 1.2. Modem... 5 1.2.1. Modem... 5

More information

Windows Server 2003 default services

Windows Server 2003 default services Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.

More information

PANO MANAGER CONNECTOR FOR SCVMM& HYPER-V

PANO MANAGER CONNECTOR FOR SCVMM& HYPER-V PANO MANAGER CONNECTOR FOR SCVMM& HYPER-V Version 6.0.8 Published: DEC-2013 Updated: 24 MAR 2014 2005-2014 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

PRIVATE TEXTUAL NETWORK USING GSM ARCHITECTURE

PRIVATE TEXTUAL NETWORK USING GSM ARCHITECTURE PRIVATE TEXTUAL NETWORK USING GSM ARCHITECTURE * Qurban A. Memon, **Zubair Shaikh and ***Ghulam Muhammad * Associate Professor; **Associate Professor, ***Senior Year Student Karachi Institute of Information

More information

IBM Application Hosting EDI Services Expedite software adds Secure Sockets Layer TCP/IP support

IBM Application Hosting EDI Services Expedite software adds Secure Sockets Layer TCP/IP support Software Announcement June 1, 2004 Services Expedite software adds Secure Sockets Layer TCP/IP support Overview Services Expedite software for Microsoft Windows, AIX, and OS/400 is being enhanced to support

More information

Nokia E61i Configuring connection settings

Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Nokia E61i Configuring connection settings Legal Notice Copyright Nokia 2007. All rights reserved. Reproduction, transfer, distribution or storage of part or

More information

The Shift to Wireless Data Communication

The Shift to Wireless Data Communication The Shift to Wireless Data Communication Choosing a Cellular Solution for Connecting Devices to a WWAN Dana Lee, Senior Product Manager dana.lee@moxa.com Recent developments in the wireless and industrial

More information

Electronic Service Agent TM. Network and Transmission Security And Information Privacy

Electronic Service Agent TM. Network and Transmission Security And Information Privacy Electronic Service Agent TM and Transmission Security And Information Privacy Electronic Services January 2006 Introduction IBM Electronic Service Agent TM is a software application responsible for collecting

More information

Highly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution

Highly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution Highly Available Unified Communication Services with Microsoft Lync Server 2013 and Radware s Application Delivery Solution The Challenge Businesses that rely on Microsoft Lync Server must guarantee uninterrupted

More information

Iridium Extreme TM Satellite Phone. Data Services Manual

Iridium Extreme TM Satellite Phone. Data Services Manual Iridium Extreme TM Satellite Phone Data Services Manual Table of Contents 1 OVERVIEW... 1 2 HOW IT WORKS... 1 3 BEFORE INSTALLING... 2 4 USB DRIVER INSTALLATION... 3 5 MODEM INSTALLATION AND CONFIGURATION...

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

Small Business Server Part 2

Small Business Server Part 2 Small Business Server Part 2 Presented by : Robert Crane BE MBA MCP director@ciaops.com Computer Information Agency http://www.ciaops.com Agenda Week 1 What is SBS / Setup Week 2 Using & configuring SBS

More information

Dialing Into Dartmouth With Windows 95/98

Dialing Into Dartmouth With Windows 95/98 Dialing Into Dartmouth With Windows 95/98 Who needs this document? Any member of the Dartmouth community who wants to gain access to Dartmouth s network resources, such as electronic mail and the Internet,

More information

Your Technical Point of Contact s Role

Your Technical Point of Contact s Role 3 Your Technical Point of Contact s Role The TPOC will be the overall central point of contact for all issues related to AT&T Managed Internet Service with VoIP (MIS with VoIP) at your company. At a minimum,

More information

Nortel Symposium Call Center Server Symposium, M1/Succession 1000, and Voice Processing Guide

Nortel Symposium Call Center Server Symposium, M1/Succession 1000, and Voice Processing Guide 297-2183-909 Nortel Symposium Call Center Server Symposium, M1/Succession 1000, and Voice Processing Guide Product release 5.0 Standard 2.0 February 2007 Nortel Symposium Call Center Server Symposium,

More information

Nokia Call Connect v1.1 for Cisco User s Guide. Part Number: N450000431 Rev 003 Issue 1

Nokia Call Connect v1.1 for Cisco User s Guide. Part Number: N450000431 Rev 003 Issue 1 Nokia Call Connect v1.1 for Cisco User s Guide Part Number: N450000431 Rev 003 Issue 1 Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without

More information

CSE 3461 / 5461: Computer Networking & Internet Technologies

CSE 3461 / 5461: Computer Networking & Internet Technologies Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2

More information

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET)

2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) 2- Electronic Mail (SMTP), File Transfer (FTP), & Remote Logging (TELNET) There are three popular applications for exchanging information. Electronic mail exchanges information between people and file

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook

More information

Palomar College Dial-up Remote Access

Palomar College Dial-up Remote Access Palomar College Dial-up Remote Access Instructions for Windows 95/98 and Windows 2000 Following are instructions to implement dialup access to the Palomar College network, email and Internet. The minimum

More information

Citrix Online, div. of Citrix Systems Inc. GoToAssist TM. Product Category: Knowledge Management/eSupport Validation Date: 2/22/2005

Citrix Online, div. of Citrix Systems Inc. GoToAssist TM. Product Category: Knowledge Management/eSupport Validation Date: 2/22/2005 , div. of Citrix Systems Inc. GoToAssist TM Product Category: Knowledge Management/eSupport Validation Date: 2/22/2005 Product Abstract GoToAssist enables businesses to securely interact in real time with

More information

Remote Logging. Tanveer Brohi(14cs28)

Remote Logging. Tanveer Brohi(14cs28) Remote Logging Tanveer Brohi(14cs28) 1 Contents Introduction TELNET SSH Advantages and Disadvantages Conclusion References 2 Introduction What is remote logging? Remote logging is the capability to access

More information

NetSupport DNA Configuration of Microsoft SQL Server Express

NetSupport DNA Configuration of Microsoft SQL Server Express NetSupport DNA Configuration of Microsoft SQL Server Express Configuration of Microsoft SQL Server Express and NetSupport DNA Installation Requirements If installing Microsoft SQL Server Express on Windows

More information

Development of HITPHAMS Version 2.0: Powerful New Manufacturing Execution System for the Pharmaceutical Industry

Development of HITPHAMS Version 2.0: Powerful New Manufacturing Execution System for the Pharmaceutical Industry Development of HITPHAMS Version 2.0: Powerful New Manufacturing Execution System for the Pharmaceutical Industry 88 Development of HITPHAMS Version 2.0: Powerful New Manufacturing Execution System for

More information