Building a Smartphone App by Using Service-Oriented. Computing and Social Network APIs for Supporting Check-in. Activities
|
|
|
- Maryann Burns
- 9 years ago
- Views:
Transcription
1 Building a Smartphone App by Using Service-Oriented Computing and Social Network APIs for Supporting Check-in Activities Pin-Fan Lee Institute of Technology Management, National Chung Hsing University g @mail.nchu.edu.tw Shuchih Ernest Chang Institute of Technology Management, National Chung Hsing University [email protected] Fei-Fei Cheng Institute of Technology Management, National Chung Hsing University [email protected] Abstract Along with the progress in communication technology and the rapid growth of mobile device, many software companies and individual developers have started to develop a variety of mobile applications. However, the resource that individual developers can get is far less than a software company. Therefore, it is important for individual developers to utilize the free API resources available on the Internet for harvesting the benefit of the cloud computing. This research explores how developers build a check-in application based on Facebook APIs in service-oriented computing (SOC) environment. The design and implementation of a smartphone application using the proposed approach will be described in this article. Moreover, by comparing with some other smartphone applications which also provide check-in functions, the advantages and potential value of our approach to integrating social network APIs and SOC concept will be discussed. Keywords: Smartphone Application, Mobile Device, Social-Oriented Computing, Check-in, Social Network I. INTRODUCTION Innovation in mobile device has pushed ahead the growth of mobile applications with exceedingly rapid speed. Many companies are heading to the mobile application industry either for providing more services to attract more customers via mobile applications or creating more revenue. However, not only software companies are interested in this market
2 with huge potential value, but more and more independent and freelance developers are getting interested in developing mobile applications (Holzer, and Ondrus 2009). Naver, one of the biggest search portal sites in Korea, is a good example of how an Internet service company shifted to mobile app industry successfully; it s communication application, LINE, has already been downloaded 20 million times by Feb, 2012, according to the download counts of Android Market. LINE provides real-time exchange messages and voice calls service for free, which becomes a great substitute for SMS message. It seems to be easy for such a big company to develop the service and support such a big amount of users. However, for individual developers, it is hard to develop such an interactive and real time mobile application with limit resource, implying that it is difficult for individual developers to compete with big company. Hence, in this competitive environment, it is important for individual developers to leverage as much resources as possible from the Internet to support their applications. The service-oriented computing (SOC) appear to be a good solution for individual developers. SOC is the computing model that utilizes services as fundamentals for developing applications/solutions (Papazoglou 2003). Based on the aforementioned reasons, this work expects to present a simple and flexible way to build a smartphone application which benefits from SOC. In this work, Facebook API was used to build connections between mobile applications and social networks. By querying the Facebook API, developers are able to retrieve user's basic information (Name, , Education, history usage data, friend list, etc.) from Facebook, thus saving them a lot of efforts without building their own services. The proposed approach of this article was implemented on a smartphone application, Che-Check. Che-Check is an informative check-in application that provides check-in service and location-based service (LBS). By querying the Facebook API, Che-Check users do not need to enter any information for registration. Furthermore, users can leave message, check-in, view check-in history, and send message to friends easily. On the other hand, user can retrieve the place information (location, address, phone number, etc.) and see "Where're the cool places nearby," "Where's the hottest place for check in." Consequently, in order to explore the advantages and potential value of the proposed approach which integrates Facebook API and SOC concept, a discussion among Che-Check and two other famous Check-in smartphone applications will be conducted. II. FACEBOOK API Facebook has been an extremely successful social network service (SNS) since it first launched in It has already got 80 million users over the world by Feb, 2012, according to the analysis by checkfacebook.com. Facebook becomes an easiest way for people to find someone they may already know or get to know from the Internet by searching on Facebook. It has been exclusively acknowledged as a resource for locating people (Scale 2008). Facebook has successfully built strong connections between users and third party web sites.
3 Social graph is the core concept that Facebook uses to connect different identities, communities, and conversation in the Facebook at first. However, in order to include third party web sites and pages that people liked throughout the web, the open graph concept was then introduced in Combining the idea of social graph and open graph, not only the strong connections between people and communities are built, but almost every web site on the Internet can be linked to this huge social network in one simple click of "Share" or "Like." Facebook released Facebook application programming interface (API) in Since Facebook has huge user base, it has become a good resource for third party developers (Kourtellis, Finnis, Anderson, Blackburn, Borcea, and Iamnitchi 2010). Many third party developers have approached to connect their applications and Facebook API in order to get user's information quickly in a single call. They are allowed to use API methods/functions to retrieve a variety of information about users, such as full user profiles, list of friends, networks, groups, and events that users are attending (Pietiläinen, Oliver, LeBrun, Varghese, and Diot 2009; Ko, Cheek, Shehab, and Sandhu 2010). 2.1 FQL (Facebook Query Language) There are two methods that developers can use to query Facebook API, and these two methods are Graph API and FQL (Facebook Query Language). The Graph API provides a consistent and simple view of the Facebook social graph, evenly representing objects in the graph, while FQL enables developers to query data via SQL-style interface. In this research, FQL is applied because FQL provides advanced features which are not provided by Graph API. For instance, developers are able to do multiple queries in just one FQL call, thus allowing developers to fetch data from the first query and use it in the second query and so on. User profile information that developers can access by using FQL is shown in Table 1. Other tables (such as user's comment, check-in, friends, family, photo, stream, etc.) that can be queried by FQL are listed on Facebook developer page. Table 1. Elements of the user profile table that can be accessed by Facebook API. Name Type Description uid int The user ID of the user being queried. username string The username of the user being queried. first_name string The first name of the user being queried. middle_name string The middle name of the user being queried. last_name string The last name of the user being queried. sex string The gender of the user being queried. string A string containing the user's address education array A list of user's education history languages array The user's languages. 2.2 Permission Social network users always have their personal information (including information related to contact information, user identification number, address, and wall posting)
4 on social network websites (Lewis, Kaufman, Gonzalez, Wimmer, and Christakis 2008). Although there are privacy policies to protect personal information, attackers might still be able to break this barrier by controlling other compromised account (Rabkin 2008). In order to enhance the security protection, whenever a user logs on to an application at the first time, the user will go through an authentication process that asks whether the user wants to grant specific permission requested by the application (shown in Figure 1). The amount of user information available to the application depends on the permissions granted by users. Figure1. Dialog for granting permissions by a user to an application. III. ARCHITECTURE AND DESIGN Facebook API provides an always up-to-date data pool for application developers. This huge data pool is available for web application developers and mobile application developers, and the way to fetch data is getting easier. Obviously, it becomes a good choice for developers who have only limited resource. In most cases, application developers use Facebook API in order to fetch user's basic information, such as profile, contact information, and photos. However, there is still a lot of valuable information that developers can get from this big data pool, and there are more potential applications that are worthy to discover. In this work, taking the advantages of SOC, our architecture design aims to utilize Facebook API more efficiently and more comprehensively, consequently providing individual developers a simple and flexible way to build an informative smartphone application without building needed local supporting utilities. As shown in Figure 2, the client application is able to get a variety of information by sending FQL request to Facebook API. After receiving queries from client side, the API will then fetch the specific table that is described in the received query message and send response back to client. Therefore, application developers do not need to build up a database for storing all the information about users. Developers can choose to query FQL and fetch the "user" table in Facebook database whenever they need to get specific user's information such as or Name. Moreover, to query the user's data
5 whenever the client needs it keeps the received information always up-to-date. There is no need to check whether the user's data stored in his/her own database is out of date or not. However, some developers may like to store extra information about users or the client application, such as user register date, preference, and credit earned. Developers just need to create one or a few tables in their own database for storing such extra information, and the number of table stored in the database varies based on different purposes of developers. Compared with the large amount of tables stored in Facebook database, only one or a few tables is needed in developer's database. As shown in Table 2, Facebook API provides more than 60 tables which are available to developers. In addition, developers do not need to maintain huge database, saving plenty of time, money, network traffic, and effort for them. Figure 2. Architecture design with service-oriented computing (SOC) concept. Table 2. Comparison of tables stored in developer database and Facebook database. Name Developer's database Facebook API database Number of Tables in database one or a few (Alterable) 63 (Unalterable) Updatedness low high (always up-to-date) Maintenance need maintenance no maintenance needed Query Language SQL FQL Permission no need need IV. IMPLEMENTATION OF CHE-CHECK In this section, the process of implementing the proposed approach on the mobile application, Che-Check, will be illustrated in detail. The first step is to build the connection between Che-Check and Facebook by using Facebook API. After the connection is made, then start to develop Che-Check application based on the Facebook mobile application SDK. There are two versions (ios and Android) of Facebook SDK released on the Facebook Developer page. The official Android version of Facebook SDK is used in this research.
6 4.1 Connect mobile application with Facebook Before being able to connect to Facebook API, a Facebook application, named NCHU Che-Check in this case, must be created on the Facebook developer page. NCHU Che-Check will be used to integrate with the Che-Check smartphone application. NCHU Che-Check is the bridge application between Facebook and Che-Check, it will be used to record the basic information and identification of the Che-Check. Figure 3 shows the information need to be entered in Facebook application page. Figure 3. The information required in Facebook application page. In the Facebook application page, the APP ID represent the Facebook application created on Facebook, this APP ID is needed when integrating Facebook Android SDK into the code. In this case, it specifies the bridge application, NCHU Che-Check. On the other hand, in order to enhance the security of mobile application, Facebook requires developers to fill in the Android Key Hash, which is the signature used to sign the mobile application. Android Key Hash can be generated by running the keytool which comes with the Java JDK. 4.2 Authentication process After the connection setting is done, Che-Check users will be able to log in with Facebook account in an official Facebook login page. After Che-Check users login with Facebook account, users will be protected under the security policies of Facebook. The authentication process for first time users is needed. In the Che-Check application, whenever a new user logs in, a list of permissions needs to be specified by the user in an authentication
7 dialog (shown in Figure 4). After the first time authentication process, the Che-Check application will be able to access the user s data using query through Facebook API. The permissions needed and used by Che-Check are listed in Table 3. Figure 4. Authentication requested at the first time login. Table 3. Permissions required and used in the Che-Check application. Name Description user_checkins Permission to get user's check-in history friends_checkins Permission to get friend's check-in history user_location Permission to get user's current location publish_checkins Permission to publish check-in on Facebook photo_upload Permission to upload photo on Facebook 4.3 Sending FQL query from mobile application To send a query from Che-Check to Facebook API, the query messages need to be placed in the code in advance. When the related application function is triggered, the query message will be placed in the URL format and sent to the Facebook API as an URL call. The format of FQL query is similar to SQL language, so that the SQL style interface can be used to query Facebook API. For instance, one of the functions in Che-Check is to query the user's check-in history, including the check-in place and check-in date. The specific queries look like: Query1= SELECT name FROM page WHERE page_id IN (SELECT page_id FROM checkin WHERE author_uid= me()) Query2=SELECT timestamp FROM checkin WHERE author_uid= me()
8 However, in some cases, sending a single query at a time is not enough, the application has to send out a series of queries in the multi-query format in order to get more precise or complicated result. For instance, one of the functions in Che-Check is to query the friend's check-in history, including the check-in place, check-in date, and the person who published the check-in information. The specific queries look like: Query1= SELECT author_uid, page_id, timestamp FROM checkin WHERE author_uid IN (SELECT uid2 FROM friend WHERE uid1 = me()) Query2= SELECT name, uid, pic_square FROM user WHERE uid IN (SELECT author_uid FROM #query1) Query3= SELECT name FROM page WHERE page_id IN (SELECT page_id FROM #query1)" Three of these queries were casted to a JSON object and sent to the Facebook API. Query 1 is processed at first, and then the result of query 1 is used in Query 2 and Query 3. This multi-query feature enables clients to make a series of queries in a single call. After these queries were sent to Facebook API, a corresponding response will be sent back as a JSON object. The JSON object looks like: [{"uid": ,"current_location":{"id": ,"country":"taiwan","city":"taichung"}, "name":"aaron Lee"}] 4.4 Storing extra information in developer's database As mentioned in previous section, with the SOC concept, most services of Che-Check come from the Facebook API. The only reason to build database is to store the extra information about Che-Check users. Therefore, a simple database is built using MySQL for storing the user's information such as date register, credit earned, and user preference. In addition, PHP is used to connect the smartphone applications with My SQL database. V. APPLICATION OF CHE-CHECK The main applications of Che-Check are described in this section. Che-Check is an informative Check-in application. By fetching a variety of up-to-date data from Facebook API, such as users' check-in, friends' check-in, and location-based information, Che-Check is able to collect a large amount of data valuable to users. Moreover, combining the idea of LBS, Che-Check is designed to organize these data to meet users' need based on users' current locations. On the other hand, a website is built to recruit vendors who are interested in providing check-in discount. Vendors can join this website and place the latest promotions or discount for free. Users can not only can get useful information, but also view the check-in discount provided by vendors geologically nearby. Some valuable functions are listed below:
9 œ œ œ œ œ œ œ User's check-in history, which shows the user's check-in history in a list, including check-in place and check-in date. Friends check-in history, which shows friend's check-in history in a list, including friend's picture, check-in place, and check-in date. The hottest spot nearby, which shows the check-in places nearby, sorting by the check-in counts of those places (Figure 5). Friend's check-in spots (on map), that show friends' check-in locations on the map according to the coordinate information of their check-ins (Figure 6). Latest check-in discount, which shows the latest discount information provided by vendors nearby. Message left for friends, for leaving messages on friends' Facebook walls or recommending something friends might be interested in (Figure 7). Check in function, for publishing check-in information via Che-Check and displaying information on the user's Facebook wall (Figure 8). In addition, users can enjoy these functions in a game-like environment. For example, whenever a user publishes check-in via Che-Check, the user earns 10 credits in Chec-Check. Users can use those credits to open some bonus functions or to get a special title on his/her profile. Figure 5. The hottest spot nearby. Figure 6. Friend's Check-ins on the map.
10 Figure 7. Leave messages to Friends. Figure 8. Publish Check-ins. VI. DISCUSSION With the rapid growth of social network service (SNS), the need of enabling SNS services on mobile devices is increasing (Kim and Kim 2011; Wu, Ho, and Chen 2011). The implementation of combining SNS and mobile applications has been emerging in many application domains. Many popular smartphone applications supporting the check-in function also let users register by connecting to Facebook, such as Foursquare (Figure 9) and Jiepang (Figure 10). However, different mobile applications apply social network API differently. Typically, those applications API connections are built for fetching the basic information which is used in the user registration process. In order to provide location-based service, those applications still need to build their own services and databases due to the fact that LBS applications usually need to handle huge volumes of data efficiently (Pelekis, Frentzos, Giatrakos, and Theodoridis 2008). In contrast, in our proposed SOC based approach, most of the services needed in Che-Check come from Facebook API. Without building local services and huge database, only a table is needed in our local MySQL database. A comparison among Foursquare, Jiepang, and Che-Check is conducted in our research by observing the data fetched in applications and the permissions requested to users (shown in Table 4). For example, compared with Che-Check, Foursquare and Jiepang do not request for users permission which allows them to fetch friends' check-in data. As a matter of fact, Che-Check utilizes Facebook API for supporting in more functions than Foursquare and Jiepang (i.e., Che-Check applies Facebook API more efficiently and more widely than others).
11 Table 4. Comparison among Three Mobile Applications. Function Application Foursquare Jiepang Che-Check Register with FB account (Fetch user's data) Publish check-in to FB Load user's Friend list (Fetch user's friend data) Publish on FB friend's wall View friend's Check-in data (Fetch friend's check-in data) View the hottest check-in place nearby, LBS ( Fetch place data) : Fetch data not from Facebook API : Fetch data from Facebook API Figure 9. Login page of Foursquare. Figure 10. Login page of Jiepang. VII. CONCLUSION In this work, a simple and flexible way of building a check-in application is presented. Therefore, individual developers who have limited resources are able to build an informative mobile application without building local services by applying our proposed approach which
12 benefits from the social network API and SOC. Furthermore, this paper has discovered the potential values of the proposed approach by conducting a comparison with relevant discussions. In addition to fetching only the basic information of users, more data stored in Facebook is fetched and turned into useful information. It is expectable that an increasing number of individual developers will benefit from our research findings and implications by utilizing free social network APIs in building mobile applications as demonstrated in this article. VIII. LIMITATION AND ONGOING WORK Although it is convenient to get a variety of information from the huge data pool of Facebook API, not all of the tables and information are available. Whenever a query goes through the Facebook API, the server first checks whether the client user has granted permissions to make related information available to client applications. If not, the query will not be able to get the expected result. Therefore, the actual amount of tables in Facebook API that are available to client applications will depend on the permission agreements between the applications and the user. On the other hand, there are still some limitations on the FQL version of Facebook API. For example, the amount of data that a client is able to fetch at a time is limited. Therefore, some of the functions are limited as well. In this paper, only the Facbook API was used in the proposed architecture. Nevertheless, in order to enhance the concept of SOC, there are still many other free APIs (such as APIs of Twitter, YouTube, Google Maps, and Flickr) available on the Internet that can be utilized in building service-based mobile applications. There are other potential and valuable applications which can be created by adding more free APIs into our proposed approach and architecture. In particular, people would like to use the applications which mash up several services they are already familiar with, such as Google maps and YouTube. In the future, we would attempt to add more free APIs into our proposed approach, consequently making the proposed service-based mobile application architecture more complete. ACKNOWLEDGEMENTS This work was supported by the National Science Council, Taiwan, under contract number NSC E MY3. REFERENCE 1. Android Developer. Facebook Query Language (FQL), March 8, 2012 (available online at docs/reference/fql/). 2. Android Market. March 6, 2012 (available online at 3. CheckFacebook.com. Global Audience of Facebook, March 6, 2012 (available online at
13 4. Wu, C.-J., Ho, J.-M., and Chen, M.-S. A Scalable Server Architecture for Mobile Presence Services in Social Network Applications, IEEE Transactions on Mobile Computing, online version available on Dec. 8, Adrian Holzer and Jan Ondrus, Trends in Mobile Application Development, Proc. Mobile Wireless Middleware, Operating Systems, and Applications Workshops, Oct., 2009, pp Lewis, K., Kaufman, J., Gonzalez, M., Wimmer, A., and Christakis, N. Tastes, Ties, and Time: A New Social Network Dataset Using Facebook.com, Social Networks (30:4) 2008, pp: Paul Kim and Sangwook Kim, A Model of Close-Relationship among Mobile Users on Mobile Social Network, 2011 Proc. Ninth IEEE International Conference on Dependable, Autonomic and Secure Computing, Dec., 2011, pp Ko, M.N., Cheek, G.P., Shehab, M., and Sandhu, R. Social-Networks Connect Services, Computer (43:8) 2010, pp: Nicolas Kourtellis, Joshua Finnis, Paul Anderson, Jeremy Blackburn, Cristian Borcea, and Adriana Iamnitchi, Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications, Proc. ACM/IFIP/USENIX 11th International Conference on Middleware, Nov., 2010, pp Mike P. Papazoglou, Service-Oriented Computing: Concepts, Characteristics and Directions, Proc. Fourth International Conference on Web Information Systems Engineering, Dec., 2003, pp Nikos Pelekis, Elias Frentzos, Nikos Giatrakos, and Yannis Theodoridis, HERMES: Aggregative LBS via a Trajectory DB Engine, Proc ACM SIGMOD International Conference on Management of Data, Jun., 2008, pp Anna-Kaisa Pietilainen, Earl Oliver, Jason LeBrun, George Varghese, and Christophe Diot, MobiClique: Middleware for Mobile Social Networking, Proc. 2nd Workshop on Online Social Networks, Aug., 2009, pp Rabkin, A. Personal Knowledge Questions for Fallback Authentication: Security Questions in the Era of Facebook, Proc. 4th Symposium on Usable Privacy and Security, Jul., 2008, pp Scale, M.S. Facebook as a Social Search Engine and the Implications for Libraries in the Twenty-First Century, Library Hi Tech (26:4) 2008, pp:
14 利 用 社 群 網 路 API 及 服 務 導 向 運 算 概 念 建 置 打 卡 型 智 慧 型 手 機 應 用 軟 體 李 品 範 Pin-Fan Lee 國 立 中 興 大 學 科 技 管 理 研 究 所 張 樹 之 Shuchih Ernest Chang 國 立 中 興 大 學 科 技 管 理 研 究 所 鄭 菲 菲 Fei-Fei Cheng 國 立 中 興 大 學 科 技 管 理 研 究 所 摘 要 隨 著 智 慧 型 手 機 以 及 行 動 裝 置 的 普 遍 程 度 提 高, 許 多 軟 體 公 司 以 及 電 腦 遊 戲 場 商 紛 紛 投 入 開 發 行 動 裝 置 應 用 軟 體 的 行 列 然 而 現 今 開 發 具 互 動 性 及 即 時 通 訊 性 之 行 動 應 用 軟 體 對 於 一 般 開 發 者 具 有 相 當 的 進 入 門 檻, 因 此, 如 何 善 用 網 路 上 免 費 的 API 資 源 是 開 發 者 需 要 思 考 的 議 題 ; 本 研 究 將 以 打 卡 功 能 之 手 機 應 用 軟 體 為 例, 探 討 如 何 利 用 Facebook 所 提 供 的 API 資 源 結 合 服 務 導 向 運 算 之 概 念, 以 降 低 開 發 的 門 檻 另 外, 本 研 究 將 以 上 述 的 概 念 實 作 開 發 手 機 應 用 軟 體 - Che-Check, 並 藉 由 討 論 其 與 其 他 知 名 的 打 卡 型 手 機 應 用 軟 體 使 用 Facebook API 程 度 上 之 不 同, 以 探 討 本 設 計 架 構 潛 在 的 應 用 價 值 關 鍵 字 : 智 慧 型 手 機 行 動 裝 置 服 務 導 向 運 算 打 卡 社 群 網 路
Smart Home Security System Based on Microcontroller Using Internet and Android Smartphone
International Conference on Materials, Electronics & Information Engineering, ICMEIE-205 05-06 June, 205, Faculty of Engineering, University of Rajshahi, Bangladesh www.ru.ac.bd/icmeie205/proceedings/
Building the next generation of Mobile Apps with Facebook. Bo Zhang Head of Platform Partner Engineering, APAC
Building the next generation of Mobile Apps with Facebook Bo Zhang Head of Platform Partner Engineering, APAC MOBILE IS EATING THE WORLD 170 Minutes spent daily on Mobile 79% Of people 18-44 have their
AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING
I J I T E ISSN: 2229-7367 3(1-2), 2012, pp. 63-68 AN INFORMATION AGENT SYSTEM FOR CLOUD COMPUTING BASED LOCATION TRACKING ANWAR BASHA H. 1, SAMUEL GEOFFREY LAWRENCE 2 AND INDUMATHI, K. 3 1 Department of
ONLINE BACKUP AND RECOVERY USING AMAZON S3
ONLINE BACKUP AND RECOVERY USING AMAZON S3 Ameya Kanitkar 1, Shreyas Joshi 2, Sumit Chitnis 3, Mayur Gite 4 1 Student, Information Technology Department, MMCOE, Maharashtra, India 2 Student, Information
ITP 140 Mobile Technologies. Mobile Topics
ITP 140 Mobile Technologies Mobile Topics Topics Analytics APIs RESTful Facebook Twitter Google Cloud Web Hosting 2 Reach We need users! The number of users who try our apps Retention The number of users
Integration of Learning Management Systems with Social Networking Platforms
Integration of Learning Management Systems with Social Networking Platforms E-learning in a Facebook supported environment Jernej Rožac 1, Matevž Pogačnik 2, Andrej Kos 3 Faculty of Electrical engineering
SAP Cloud Identity Service Document Version: 1.0 2014-09-01. SAP Cloud Identity Service
Document Version: 1.0 2014-09-01 Content 1....4 1.1 Release s....4 1.2 Product Overview....8 Product Details.... 9 Supported Browser Versions....10 Supported Languages....12 1.3 Getting Started....13 1.4
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
Enterprise Mobility Space
MBaaS How MBaaS is Shaping up the Enterprise Mobility Space A RapidValue Solutions Whitepaper Contents Executive Summary... What is Mobile Backend as a Service (MBaaS)?... Primary Building Blocks of MBaaS...
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Store & Share Quick Start
Store & Share Quick Start What is Store & Share? Store & Share is a service that allows you to upload all of your content (documents, music, video, executable files) into a centralized cloud storage. You
CLOUD MESSAGING FOR ANDROID IS A PUSH NOTIFICATION SERVICE
CLOUD MESSAGING FOR ANDROID IS A PUSH NOTIFICATION SERVICE B.Dhivya 1 G.Lakshmiprabha 2 P.Nivethitha 3, K.Kala 4 123 UG Scholar, 4Assistant Professor 1234 Department of Computer Science and Engineering
A new Design Approach for Developing Electronic Health Record Application on Android
A new Design Approach for Developing Electronic Health Record Application on Android H. Sarojadevi 1,, Pallavi Munihanumaiah 2,B.A.Mohan 1,S.Ramya 1 and M. Sushma 1 1 Department of CSE, Nitte Meenakshi
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Ryu HyunKi, Moon ChangSoo, Yeo ChangSub, and Lee HaengSuk Abstract In this paper,
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.
Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...
NEXT Analytics User Guide for Facebook
NEXT Analytics User Guide for Facebook This document describes the capabilities of NEXT Analytics to retrieve data from Facebook Insights directly into your spreadsheet file. Table of Contents Table of
Security in an Increasingly Threatened World. SMS: A better way of doing Two Factor Authentication (2FA)
Security in an Increasingly Threatened World SMS: A better way of doing Two Factor Authentication (2FA) January 2015 The Proliferation of The App World The revolution of the smart phone forever affected
Android Mobile App Building Tutorial
Android Mobile App Building Tutorial Seidenberg-CSIS, Pace University This mobile app building tutorial is for high school and college students to participate in Mobile App Development Contest Workshop.
Remote Android Assistant with Global Positioning System Tracking
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. III (Mar-Apr. 2014), PP 95-99 Remote Android Assistant with Global Positioning System Tracking
Final Year Project Interim Report
2013 Final Year Project Interim Report FYP12016 AirCrypt The Secure File Sharing Platform for Everyone Supervisors: Dr. L.C.K. Hui Dr. H.Y. Chung Students: Fong Chun Sing (2010170994) Leung Sui Lun (2010580058)
Budget Event Management Design Document
Budget Event Management Design Document Team 4 Yifan Yin(TL), Jiangnan Shangguan, Yuan Xia, Di Xu, Xuan Xu, Long Zhen 1 Purpose Summary List of Functional Requirements General Priorities Usability Accessibility
VOL. 2, NO. 1, January 2012 ISSN 2225-7217 ARPN Journal of Science and Technology 2010-2012 ARPN Journals. All rights reserved
Mobile Application for News and Interactive Services L. Ashwin Kumar Department of Information Technology, JNTU, Hyderabad, India [email protected] ABSTRACT In this paper, we describe the design and
How To Understand Cloud Usability
Published in proceedings of HCI International 2015 Framework for Cloud Usability Brian Stanton 1, Mary Theofanos 1, Karuna P Joshi 2 1 National Institute of Standards and Technology, Gaithersburg, MD,
Cloud Powered Mobile Apps with Azure
Cloud Powered Mobile Apps with Azure Malte Lantin Technical Evanglist Microsoft Azure Agenda Mobile Services Features and Demos Advanced Features Scaling and Pricing 2 What is Mobile Services? Storage
1 Overview 1 1.1 Configuration on MACH Web Portal 1
API Guide Version 2 Table of Content 1 Overview 1 1.1 Configuration on MACH Web Portal 1 1.2 Other Pre-requisites 1 1.2.1 Apple Push SSL Certificate 1 1.2.2 Android GCM Key 2 1.2.3 Enabling Push Notification
My Stuff Everywhere Your Content On Any Screen
Technical Brief Bob Lund, Distinguished Technologist, CableLabs September, 2014 My Stuff Everywhere Your Content On Any Screen The My Stuff Everywhere Concept The My Stuff Everywhere (MSE) concept is simple
A framework for Itinerary Personalization in Cultural Tourism of Smart Cities
A framework for Itinerary Personalization in Cultural Tourism of Smart Cities Gianpaolo D Amico, Simone Ercoli, and Alberto Del Bimbo University of Florence, Media Integration and Communication Center
User Management Tool 1.6
User Management Tool 1.6 2014-12-08 23:32:48 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.6... 3 ShareFile User Management
Keywords Distributed database system, Database security, Single sign-on, Web Services, Facebook Connect services
Volume 4, Issue 3, March 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Implementation
SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
Guide to Social Marketing for Tourist Destinations & Travel Agents Introduction
Guide to Social Marketing for Tourist Destinations & Travel Agents Introduction There has been a dramatic increase in the number of people who are becoming self-reliant travelers; using online communities,
PHP Language Binding Guide For The Connection Cloud Web Services
PHP Language Binding Guide For The Connection Cloud Web Services Table Of Contents Overview... 3 Intended Audience... 3 Prerequisites... 3 Term Definitions... 3 Introduction... 4 What s Required... 5 Language
Safewhere*Identify 3.4. Release Notes
Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.
SendGrid. Email Delivery. Simplified.
Email Delivery. Simplified. is a cloud-based email service that delivers email on behalf of companies to increase deliverability and improve customer communications. Integration with new or existing email
A Log Analysis System with REST Web Services for Desktop Grids and its Application to Resource Group-based Task Scheduling
Journal of Information Processing Systems, Vol.7, No.4, December 2011 http://dx.doi.org/10.3745/jips.2011.7.4.707 A Log Analysis System with REST Web Services for Desktop Grids and its Application to Resource
Skynax. Mobility Management System. System Manual
Skynax Mobility Management System System Manual Intermec by Honeywell 6001 36th Ave. W. Everett, WA 98203 U.S.A. www.intermec.com The information contained herein is provided solely for the purpose of
Guide to building a secure and trusted BYOID environment
e-healthcare e-gaming e-insurance e-commerce e-banking e-government Guide to building a secure and trusted BYOID environment Bring-Your-Own-Identity is not new. People have been using their social media
Challenges in Android Application Development: A Case Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.294
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
OAuth. Network Security. Online Services and Private Data. A real-life example. Material and Credits. OAuth. OAuth
Network Security Dr. Ing. Simone Cirani Parma, May 28th, 2013 Online Services and Private Data The evolution of online services, such as social networks, has had a huge impact on the amount of data and
Using Cloud Services for Building Next Generation Mobile Apps
Using Cloud Services for Building Next Generation Mobile Apps appcelerator.com Executive Summary Enterprises are in the midst of a major transformation as it relates to their interaction with customers,
Getting Started Guide for Developing tibbr Apps
Getting Started Guide for Developing tibbr Apps TABLE OF CONTENTS Understanding the tibbr Marketplace... 2 Integrating Apps With tibbr... 2 Developing Apps for tibbr... 2 First Steps... 3 Tutorial 1: Registering
Performance Analysis of Web-browsing Speed in Smart Mobile Devices
Performance Analysis of Web-browsing Speed in Smart Mobile Devices Yu-Doo Kim and Il-Young Moon Korea University of Technology and Education, [email protected] Abstract The rapid growth of telecommunication
White Paper. Social Strategies for the Media Industry. Ravi Peravali Abhishek Singh. Tavant Technologies PEOPLE. PASSION. EXCELLENCE.
White Paper Social Strategies for the Media Industry Ravi Peravali Abhishek Singh Tavant Technologies PEOPLE. PASSION. EXCELLENCE. Executive Summary The Social Media landscape is constantly changing and
A QR Code Based Processing for Dynamic and Transparent Seat Allocation
International Journal of Scientific and Research Publications, Volume 3, Issue 10, October 2013 1 A QR Code Based Processing for Dynamic and Transparent Seat Allocation Mehul Yadav *, Sumedh Kurundkar
Big Data Collection Study for Providing Efficient Information
, pp. 41-50 http://dx.doi.org/10.14257/ijseia.2015.9.12.03 Big Data Collection Study for Providing Efficient Information Jun-soo Yun, Jin-tae Park, Hyun-seo Hwang and Il-young Moon Computer Science and
LIBRARY ACCESS SYSTEM SMARTPHONE APPLICATION USING ANDROID
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
Power Tools for Pivotal Tracker
Power Tools for Pivotal Tracker Pivotal Labs Dezmon Fernandez Victoria Kay Eric Dattore June 16th, 2015 Power Tools for Pivotal Tracker 1 Client Description Pivotal Labs is an agile software development
Use Cases for Argonaut Project. Version 1.1
Page 1 Use Cases for Argonaut Project Version 1.1 July 31, 2015 Page 2 Revision History Date Version Number Summary of Changes 7/31/15 V 1.1 Modifications to use case 5, responsive to needs for clarification
Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment
International Journal of Computational Engineering Research Vol, 03 Issue, 11 Cloud Information Accountability Framework for Auditing the Data Usage in Cloud Environment D.Dhivya 1, S.CHINNADURAI 2 1,M.E.(Cse),
Using Social Networking Sites as a Platform for E-Learning
Using Social Networking Sites as a Platform for E-Learning Mohammed Al-Zoube and Samir Abou El-Seoud Princess Sumaya University for Technology Key words: Social networks, Web-based learning, OpenSocial,
[Sudhagar*, 5(5): May, 2016] ISSN: 2277-9655 Impact Factor: 3.785
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY AVOID DATA MINING BASED ATTACKS IN RAIN-CLOUD D.Sudhagar * * Assistant Professor, Department of Information Technology, Jerusalem
ITP 342 Mobile App Development. APIs
ITP 342 Mobile App Development APIs API Application Programming Interface (API) A specification intended to be used as an interface by software components to communicate with each other An API is usually
Mobile Cloud Computing for Data-Intensive Applications
Mobile Cloud Computing for Data-Intensive Applications Senior Thesis Final Report Vincent Teo, [email protected] Advisor: Professor Priya Narasimhan, [email protected] Abstract The computational and storage
Mobile Application GPS-Based
3 Mobile Application GPS-Based Berta Buttarazzi University of Tor Vergata, Rome, Italy 1. Introduction Most of navigators for mobile devices have a big failure; they do not notify the user of road condition
STABLE & SECURE BANK lab writeup. Page 1 of 21
STABLE & SECURE BANK lab writeup 1 of 21 Penetrating an imaginary bank through real present-date security vulnerabilities PENTESTIT, a Russian Information Security company has launched its new, eighth
HTML5. Turn this page to see Quick Guide of CTTC
Programming SharePoint 2013 Development Courses ASP.NET SQL TECHNOLGY TRAINING GUIDE Visual Studio PHP Programming Android App Programming HTML5 Jquery Your Training Partner in Cutting Edge Technologies
Social Media Get Beyond the Hype and Find Out the True Business Value
Social Media Get Beyond the Hype and Find Out the True Business Value Feb. 28, 2012 Social Media Get Beyond the Hype and Find Out the True Business Value Feb. 28, 2012 1 Webinar Audio Options Mic & Speakers
EasyTracker: An Android application for capturing mobility behavior
EasyTracker: An Android application for capturing mobility behavior Alexandros Doulamis Dept. of Informatics University of Piraeus Piraeus, Greece [email protected] Nikos Pelekis Dept. of Statistics
Digital marketing strategy
Digital marketing strategy You don t need a digital strategy, you need a business strategy for the digital age Judy Goldberg, Sony Pictures #HRVision14 Branding goes Digital Understand your brand before
Social Media Single Sign-On: Could You Be Sharing More than Your Password?
Social Media Single Sign-On: Could You Be Sharing More than Your Password? SESSION ID: HUM-W03B 2/26/14 (Wednesday) 11:20 AM - West 3005 Tom R. Smith VP, Business Dev & Strategy, CloudEntr www.cloudentr.com
Design for Success: Designing for the Internet of Things with TiWiConnect
Design for Success: Designing for the Internet of Things with TiWiConnect Today s presenters Scott Lederer Senior Software Architect Dave Burleton Vice President of Marketing LSR.com Today s Agenda Why
Centrify Mobile Authentication Services
Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject
Ø Teaching Evaluations. q Open March 3 through 16. Ø Final Exam. q Thursday, March 19, 4-7PM. Ø 2 flavors: q Public Cloud, available to public
Announcements TIM 50 Teaching Evaluations Open March 3 through 16 Final Exam Thursday, March 19, 4-7PM Lecture 19 20 March 12, 2015 Cloud Computing Cloud Computing: refers to both applications delivered
The GIJP Tech team can offer assistance setting up and implementing any of the services mentioned in this document.
TWITTER Twitter (www.twitter.com) allows users to answer the question, What are you doing in 140 characters or less. Users post about their activities, links of interest, and even ask questions on Twitter.
The mobile opportunity: How to capture upwards of 200% in lost traffic
June 2014 BrightEdge Mobile Share Report The mobile opportunity: How to capture upwards of 200% in lost traffic You ve likely heard that mobile website optimization is the next frontier, and you ve probably
A Measurement Study of Google Play
A Measurement Study of Google Play Nicolas Viennot Edward Garcia Jason Nieh Columbia University! Android is increasingly popular Android Dominates the Market Google Play Uploading Content to Google Play
Team 23 Design Document. Customer Loyalty Program for Small Businesses
Team 23 Design Document Customer Loyalty Program for Small Businesses Clients - Jay Namboor Adviser - Dr. Govindarasu Members: Christopher Waters Van Nguyen William Tran 1 Loyalty Program Contents System
Cloud Web-Based Operating System (Cloud Web Os)
Cloud Web-Based Operating System (Cloud Web Os) Hesham Abusaimeh Department of Computer Science, Faculty of Information Technology, Applied Science University, Amman, 11931 Jordan. ABSTRACT The cloud computing
Above the fold: It refers to the section of a web page that is visible to a visitor without the need to scroll down.
Above the fold: It refers to the section of a web page that is visible to a visitor without the need to scroll down. Access: It is the ability to see what you are trying to view (e.g. you can see a friend
On Database for Mobile Phones Ownership
On Database for Mobile Phones Ownership Dmitry Namiot Lomonosov Moscow State University Moscow, Russia [email protected] Manfred Sneps-Sneppe ZNIIS Moscow, Russia [email protected] Abstract This
http://ubiqmobile.com
Mobile Development Made Easy! http://ubiqmobile.com Ubiq Mobile Serves Businesses, Developers and Wireless Service Providers Businesses Be among the first to enter the mobile market! - Low development
An elearning platform for distanced collaborative programming
An elearning platform for distanced collaborative programming Final report by Low Hau Sum Team Member: Chow Tsz Wun, Low Hau Sum, Mok Ka Hei Supervisor: Dr Chui C K FYP14006 2 Table of Contents 1 Introduction...
6 Strategies Lawyers Can Use to Streamline Digital Marketing Work
6 Strategies Lawyers Can Use to Streamline Digital Marketing Work By James Druman Online marketing opens up some fantastic opportunities for attorneys to increase exposure, generate new leads, and grow
This article presents an overview of these four applications. 2. DOCOMO Phone Book
DOCOMO Cloud Android Application Android Application Development in DOCOMO Cloud At NTT DOCOMO, we aim to provide our users with unique, innovative services that combine smartphones with the DOCOMO Cloud.
Pipeline Orchestration for Test Automation using Extended Buildbot Architecture
Pipeline Orchestration for Test Automation using Extended Buildbot Architecture Sushant G.Gaikwad Department of Computer Science and engineering, Walchand College of Engineering, Sangli, India. M.A.Shah
A Practical Approach to Process Streaming Data using Graph Database
A Practical Approach to Process Streaming Data using Graph Database Mukul Sharma Research Scholar Department of Computer Science & Engineering SBCET, Jaipur, Rajasthan, India ABSTRACT In today s information
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions
Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas
MENDIX FOR MOBILE APP DEVELOPMENT WHITE PAPER
MENDIX FOR MOBILE APP DEVELOPMENT WHITE PAPER TABLE OF CONTENTS Market Demand for Enterprise Mobile Mobile App Development Approaches Native Apps Mobile Web Apps Hybrid Apps Mendix Vision for Mobile App
Chapter-1 : Introduction 1 CHAPTER - 1. Introduction
Chapter-1 : Introduction 1 CHAPTER - 1 Introduction This thesis presents design of a new Model of the Meta-Search Engine for getting optimized search results. The focus is on new dimension of internet
Jordan Jozwiak November 13, 2011
Jordan Jozwiak November 13, 2011 Agenda Why Android? Application framework Getting started UI and widgets Application distribution External libraries Demo Why Android? Why Android? Open source That means
ESET Secure Authentication Java SDK
ESET Secure Authentication Java SDK Getting Started Guide Document Version 1.0 ESET Secure Authentication Java SDK 2 Introduction This document details what is required to add a second authentication factor
TARGETPROCESS HELP DESK PORTAL
TARGETPROCESS HELP DESK PORTAL v.2.17 User Guide This document describes TargetProcess Help Desk Portal functionality and provides information about TargetProcess Help Desk Portal usage. 1 HELP DESK PORTAL...2
