PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION
|
|
- Brent Harris
- 8 years ago
- Views:
Transcription
1 PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION YANG-TING SHEN, TAY-SHENG TENG Information Architecture Lab, Department of Architecture, National Cheng Kung University, Taiwan. Abstract. The objective of the paper is to explore how the personal mobile devices help the user to interact with space and get personal service. We embed the RFID tag in PDA for the sake of identifying the space. The space adapts itself to fit the user s need by reading the data on the electronic tag. And the user uses PDA to interact with the space and record the interactive experience. We establish an interactive scenario between the user and the space to experiment how the system work. 1. Introduction Until recently, personal mobile devices were increasingly used to deal with the personal tasks in daily life. The functions of personal mobile devices include: (i) Cell phone, (ii) Organizing personal information or schedule, (iii) Accessing internet, (iv) Sending or receiving , (v) Remote controll, (vi) Spatial navigation (GPS). The most popular personal mobile device is the cell phone. Cell phones are largely used to support the subtitles of our everyday life. In addition, people use PDA to organize personal data, schedule tasks, and remind meetings. Increasingly, people connect to the internet using personal mobile devices to explore websites or send and receive mails. In addition to these functions, we regard personal mobile devices as personal digital agents. Besides, as it is argued that humans are surrounded with successive artificial skins that continually vary in number and character according to changing needs and circumstances (Mitchell, 2003), we expect the agents to play an important role of a channel helping people to connect with the next skin of space. The skin of space consists of multimedia and ubiquitous computers that vanish into the background. When we use personal mobile devices to interact with space, the space becomes human explicit boundaries. However, there is a problem, that is, how to compute across the boundaries between private and public, implicit and explicit, personal and multi-user, permanent and temporary interactions. In other words, the personal mobile devices should be considered as media that help us to interact with space for personal services. When we access a space, the space can identify our positions and identification by connecting our personal mobile
2 PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION 383 devices such as PDAs. We interact with the space by PDAs that ensure that interaction is personal. Moreover, these daily experiences of interaction can be stored and retrieved by PDA. So our human experience is accumulated and incrementally modified with the interleaving interactions between personal digital devices and interactive spaces. 2. The Scenario In this paper, we regard personal mobile devices as personal digital agents. We use personal mobile devices to extend personal identification in the environment. And the environment can also identify us through the personal mobile devices. So we become unique to the environment. The personal mobile devices become our second skins the digital skins. The second skins not only demonstrate our identification, but store and retrieve our memory and experience. In this paper, we develop a scenario to describe how the personal mobile devices help people to extend their digital skins. This scenario pays attention to the interaction between exhibition spaces and people. 1. The user holds the PDA embedded with an RFID tag. The user imports his personal data in the electronic tag including personal ID, habits, interests, etc. When the user accesses the exhibition space, the exhibition space has an RFID reader to detect the electronic tag embedded in PDA and conveys the data to server PC in the back space. By means of those data, the exhibition identifies the user and modifies its setting to match the user s interest. The operations include projecting welcome messages on the wall, turning on the air conditioner, and showing some hints such as sparking LED lights to attract the user s attention based on the user s interest. These operations occur as soon as the user steps into the exhibition space. 2. At the same time, the user uses PDA to connect with the backend server by Wireless LAN and gets the corresponding information displayed on PDA s screen. The corresponding information supported by the server PC shows some icons and messages to suggest the next step. The user clicks on the icon on the PDA s screen and gets further hints, suggesting his going to the area of sparking LED light. The area of sparking LED light shows some information based on the user s interest which is imported in the RFID tag in advance. The user goes to the area of sparking LED light and visits multimedia exhibitions. During the visit, the user picks up a physical model. As this moment, the projector starts to project a set of 3D animation to introduce information of this model. When the user puts the physical model down, the animation stops and changes to the original setting. In the meanwhile, the server PC remotely delivers the website about the information
3 384 YANG-TING SHEN, TAY-SHENG TENG of 3D animation and saves it in the user s PDA. After exploring the area, the user may want to visit different information. So the user modifies his personal data in the RFID tag by the RFID writer in the exhibition space. The exhibition space re-detects the modified RFID tag and starts a new pattern of interaction. 3. After exploring the exhibition area, the user moves to another exhibition area. The user interacts with the new exhibition space again through his PDA embedded tag. The user gets new interaction patterns that are different from the previous exhibition space because the personal electronic tag has been modified. 3. Interaction Experience In this scenario, one of the main concepts is provision of personal service. The RFID tag embedded in PDA makes the exhibition space proactively identify the user. And the exhibition space can adapt itself to fit the user s need by reading habits, interests, and records. Different users interact with the exhibition space and have different interaction based on personal data stored in personal RFID tags. The service of space is customized, that is, people act in the same place but get different experiences. Another main concept is adaptive design of personal digital database. In the past, people s daily experiences come from long-term memories in this brains, but the memories aren t supported or augmented by any computational devices. By wearing the RFID tag embedded in PDA, human experience can be recorded, modified, and reused. If the computer detects the changed data, the computer changes the spatial setting to adapt to the new interaction rules. Furthermore, the new rules may trigger new interaction and create new experiences. The personal digital database is correspondingly extended and modified continuously. Besides, the user can take the personal digital database away and reuse it in other places. However, there will be a new mode of interaction because of the modified tag embedded in PDA. 4. Implementation We divide the implementation of the system into three layers: (i) Import (ii) Information processing (ii) Export. This architecture is shown as follows. Figure 1 shows three functional requirements of the personal services including import, information processing, and export function. On Layer 1, there are four devices to receive signals, and import signals into the server database and tag database. When the server database receives the signals from Layer 1, the backend server database analyzes the digital signals and transform the signals into the
4 PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION 385 Figure 1. Three parts of implementation. identifiable information. Then the server database exports the identifiable information to Layer 3. So the devices on Layer 3 come up with some responses based on the signals on Layer 1. Figure 2. The system architecture of PDA in ambient media exhibition space. Figure 2 shows that the user holds PAD embedded RFID tag into exhibition space. The RFID tag has imported some personal data. We plan four grids including ID, Habit, Interest, Record (Tag Database of Layer two) to record personal data in
5 386 YANG-TING SHEN, TAY-SHENG TENG the FID tag. First, we transform the personal data into code for the sake of writing into the RFID tag. The other reason is to make the RFID device identify the electronic tag by the code. For example, the user may enjoy a physical environment with air conditioning and yellow lighting. Once the user goes into the exhibition and approache the RFID device, the latter detects the RFID tag and receives the binary codes in this tag. The RFID device delivers those codes to server PC in the backspace of the exhibition space. The backend server database analyzes those codes and transforms the codes into scripts which the server PC can identify. Based on those scripts, the server starts to activate the devices on Layer 3 through the RF device. For example, the projector may project some texts and images to welcome the user. The air conditioning is activated. The yellow light turns on. The LED in the part of the exhibition area sparks to attract the user s attention. This is so because of the codes recorded in the RFID tag s grid. At the same time, the user uses PDA to connect to server PC by Wireless LAN for the sake of synchronous information to get the scenario supported by the server in the exhibition space (synchronous information of Layer 3). The processes of scenario consist of three parts: (i) Receiving and analyzing data (ii) Computing processing program (iii) Visualizing the result of computing. The PDA only needs to synchronize with the server to get the visual result of the scenario. The PDA needs no computing or pre-loads of any programmes. The visual scenario supported by the server shows some hints to the user. By reading those hints, the user knows how to interact with the exhibition space further. In the process of interaction, the visual scenario may suggest to the user to pick up the related model or go through the floor boards for further interaction. There are some sensors embedded for the sake of detecting the user s action. Once those sensors detect the user s action, they convey some signals to the server. After the backend database analysis, the exhibition shows some virtual information like animation corresponding to the user s action. At the same time, the user can request the server to send the website of the virtual information to save in the PDA. When the user finishes the interactive scenario, the user can modify the RFID tag via the RFID Writer device to save his experience (Tag Database of Layer 2 Record). Therefore, the personal experience is recorded and accumulated continuously by PDA. 5. Conclusion This paper describes how the personal mobile devices help the user to extend his digital boundary and get personal service in an interactive space. The interaction occurs between users and spaces. In the future, we attempt to extend the domain to study the connecting of two or more spaces by the personal mobile devices when the user takes the personal mobile devices from one space to others. The personal information should follow the user flowing from one place to another. The spaces
6 PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION 387 work synchronously or asynchronously to exchange users information by interacting with the personal mobile devices. Finally, we could construct a ubiquitous personal database by the personal mobile devices.
Towards a Transparent Proactive User Interface for a Shopping Assistant
Towards a Transparent Proactive User Interface for a Shopping Assistant Michael Schneider Department of Computer Science, Saarland University, Stuhlsatzenhausweg, Bau 36.1, 66123 Saarbrücken, Germany mschneid@cs.uni-sb.de
More informationNFC Based Equipment Management Inventory System
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 NFC Based Equipment Management Inventory System Rung-Shiang
More informationWhat is the Next Generation of Human-Computer Interaction? CHI 2006 WORKSHOP
What is the Next Generation of Human-Computer Interaction? CHI 2006 WORKSHOP George Fitzmaurice Autodesk 210 King Street East, Toronto, Ontario, Canada fitzmaurice@acm.org To answer what is the next generation
More informationaloe-project.de White Paper ALOE White Paper - Martin Memmel
aloe-project.de White Paper Contact: Dr. Martin Memmel German Research Center for Artificial Intelligence DFKI GmbH Trippstadter Straße 122 67663 Kaiserslautern fon fax mail web +49-631-20575-1210 +49-631-20575-1030
More informationMOBIlearn - A Model For Interoperability
101 Towards Personal, Mobile & Location Based Learning Content Management Fabrizio Cardinali, Giunti Labs November 20 & 21, 2008 Produced by Designing and Managing Mobile Learning An Open Abstract Framework
More informationManagement Dashboard in a Retail Environment
Management Dashboard in a Retail Environment Gerrit Kahl, Stefan Warwas, Pascal Liedtke, Lübomira Spassova, Boris Brandherm German Research Center for Artificial Intelligence LAMDa 2011, 13. February,
More informationTowards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain
Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1,
More informationAlcatel-Lucent Office Communication Solutions
Alcatel-Lucent Office Communication Solutions PIMphony, your personal communication manager Frequently Asked Questions April, 2007 All Rights Reserved Alcatel-Lucent 2007 Alcatel-Lucent Office Communication
More informationSystèmes d information diffus avec l environnement SPREAD
Systèmes d information diffus avec l environnement SPREAD Paul Couderc INRIA Rennes / IRISA Ambient Computing and Embedded Systems Project http://www.irisa.fr/aces pcouderc@irisa.fr 2005-03-15 1 Domain
More informationSOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
More informationremote data capture (rdc)
As Ambitious As You Are Exact Alliance - Remote Data Collection Exact Alliance Remote Data Collection (RDC) allows you to utilize hand held devices (HHD) and other external devices to remotely capture
More informationDANGER indicates that death or severe personal injury will result if proper precautions are not taken.
Multi-User Systems 1 ArchiveServer 2 SIMATIC HMI WinCC V7.0 SP1 File Server 3 WinCC ServiceMode 4 Redundant Systems 5 System Manual Print of the Online Help 11/2008 Legal information Warning notice system
More informationCellular and 802.11 Networks Application and Data Usage
Cellular and 802.11 Networks Application and Data Usage Wireless connectivity has become a necessity for application usage and productivity workflows. Network connectivity changes as users move from indoors
More informationDo Handheld Devices Facilitate Face-to-Face Collaboration? Handheld Devices with Large Shared Display Groupware
Do Handheld Devices Facilitate Face-to-Face Collaboration? Handheld Devices with Large Shared Display Groupware Chen-Chung Liu Assistant Professor Graduate Institute of Network Learning Technology National
More informationFunctions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server
Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server Hardware Windows Windows NT 4.0 Linux Server Software and
More informationThe preliminary design of a wearable computer for supporting Construction Progress Monitoring
The preliminary design of a wearable computer for supporting Construction Progress Monitoring 1 Introduction Jan Reinhardt, TU - Dresden Prof. James H. Garrett,Jr., Carnegie Mellon University Prof. Raimar
More informationQuick Start Guide. www.uptrendsinfra.com
Quick Start Guide Uptrends Infra is a cloud service that monitors your on-premise hardware and software infrastructure. This Quick Start Guide contains the instructions to get you up to speed with your
More informationEXPERIMENTAL INVESTIGATION OF THE INTEGRATION OF VIRTUAL MODELS AND THE PHYSICAL CONSTRUCTION
EXPERIMENTAL INVESTIGATION OF THE INTEGRATION OF VIRTUAL MODELS AND THE PHYSICAL CONSTRUCTION Abiola A. Akanmu 1, Chimay J. Anumba 2, John I. Messner 2, Sanghoon Lee 2, and Deepa Kundur 3 abiola.akanmu@wmich.edu,
More informationIpiphony Phone System. User Manual. 1 P a g e
Ipiphony Phone System User Manual 1 P a g e About this Guide This guide explains how to use the basic features of your new Aastra phones. Not all features listed are available by default. Contact your
More informationEFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT
EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT 1 R.Sivaraman, 2 RM.Chandrasekaran 1 Dy.Director, Center for Convergence of Technologies (CCT), Anna University Tiruchirappalli, Tiruchirappalli,
More informationNetwork operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation.
NETWORK OPERATING SYSTEM Introduction Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. Network operating
More informationAssets Location Management Solution Based on the Combination of SmartLocator and RFID
Assets Location Management Solution Based on the Combination of SmartLocator and RFID HASHIMOTO Naohisa, ISSHIKI Naoki, IGUCHI Masao, MORISAKI Mitsunori, ISHII Ken'ichi Abstract This paper introduces the
More informationCall Answer/Message Manager with Aliant Voicemail Online
Call Answer/Message Manager with Aliant Voicemail Online Call Answer/Message Manager automatically takes a message when you re away, on the telephone or on Dial up Internet. You ll enjoy the convenience
More informationCisco Context-Aware Mobility Solution: Put Your Assets in Motion
Cisco Context-Aware Mobility Solution: Put Your Assets in Motion How Contextual Information Can Drastically Change Your Business Mobility and Allow You to Achieve Unprecedented Efficiency What You Will
More informationStep-by-Step Setup Guide Wireless File Transmitter
EOS Step-by-Step Setup Guide Wireless File Transmitter Server Mode Infrastructure & Ad Hoc Networks Macintosh OS X 10.5-10.6 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part
More informationVodafone Email Plus. User Guide for Windows Mobile
Vodafone Email Plus User Guide for Windows Mobile 1 Table of Contents 1 INTRODUCTION... 4 2 INSTALLING VODAFONE EMAIL PLUS... 4 2.1 SETUP BY USING THE VODAFONE EMAIL PLUS ICON...5 2.2 SETUP BY DOWNLOADING
More informationEvolving Bar Codes. Y398 Internship. William Holmes
Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved
More informationAn ESRI White Paper May 2007 Mobile GIS for Homeland Security
An ESRI White Paper May 2007 Mobile GIS for Homeland Security ESRI 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB www.esri.com Copyright 2007 ESRI
More informationMIDAS. Event Log Viewer User s Guide. Part Number MN/MID-EVLOG.IOM Revision 0
MIDAS Event Log Viewer User s Guide Part Number MN/MID-EVLOG.IOM Revision 0 Table Of Contents: OVERVIEW... 3 STARTING THE EVENT LOG VIEWER... 4 HOW THE VIEWER IS ORGANIZED... 7 DATA VIEW SELECTOR... 7
More informationRemote E-mail Access with Outlook 2003 Using RPC over HTTPS
Remote E-mail Access with Outlook 2003 Using RPC over HTTPS Information Services now offers full remote access to your Exchange e-mail, calendar, contacts, etc. via the Outlook client without having to
More informationTechTips. Connecting Xcelsius Dashboards to External Data Sources using: Web Services (Dynamic Web Query)
TechTips Connecting Xcelsius Dashboards to External Data Sources using: Web Services (Dynamic Web Query) A step-by-step guide to connecting Xcelsius Enterprise XE dashboards to company databases using
More informationv.5 Use Shelby to Communicate Electronically
v.5 Use Shelby to Communicate Electronically Presented by: Mark Fisher, Shelby Consultant 2013 Shelby Systems, Inc. Other brand and product names are trademarks or registered trademarks of the respective
More informationDiscovering Computers 2008. Chapter 3 Application Software
Discovering Computers 2008 Chapter 3 Application Software Chapter 3 Objectives Identify the categories of application software Explain ways software is distributed Explain how to work with application
More informationBasic Network Design
Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies
More informationDSG SoftPhone & USB Phone Series User Guide
DSG SoftPhone & USB Phone Series User Guide Table of Contents Overview Before You Start Installation Step 1. Installing DSG SoftPhone Step 2. Installing USB Phone Step 3. System Check First Time Use Step
More informationUser Manual GSM Alarm System. www.deltasecurity.cn. All rights reserved by Delta Security Co., Ltd
User Manual GSM Alarm System All rights reserved by Delta Security Co., Ltd Dear Clients, Thank you for using our GSM Alarm System. We are committed to giving you the best home security available today
More informationCHAPTER 2: USING THE CAMERA WITH THE APP
TABLE OF CONTENTS OVERVIEW... 1 Front of your camera... 1 Back of your camera... 2 ACCESSORIES... 3 CHAPTER 1: Navigating the Mobile Application... 4 Device List: How to Use this Page... 4 My Messages:
More informationHow To Set Up Dataprotect
How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact
More informationXpoLog Center Suite Data Sheet
XpoLog Center Suite Data Sheet General XpoLog is a data analysis and management platform for Applications IT data. Business applications rely on a dynamic heterogeneous applications infrastructure, such
More informationPreparing Log-ic 360 USB Loggers for Use
Preparing Log-ic 360 USB Loggers for Use Preparing Log-ic 360 USB Loggers for Use Step 1) Install the latest version of the Log-ic Software. Step 2) Connect the Desktop Reader or plug in a USB logger.
More informationOpen source integrated remote systems and network management with OpenRSM. M. Kalochristianakis E. Varvarigos
Open source integrated remote systems and network management with OpenRSM M. Kalochristianakis E. Varvarigos Contents Systems and network management o Aims, technologies o State of the art and open source
More informationUNICORN 7.0. Administration and Technical Manual
UNICORN 7.0 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...
More informationUbiquitous Memories: Wearable Interface for Computational Augmentation of Human Memory based on Real World Objects
Ubiquitous Memories: Wearable Interface for Computational Augmentation of Human Memory based on Real World Objects Tatsuyuki Kawamura Graduate School of Information Science, Nara Institute of Science and
More informationManaged File Transfer
Managed File Transfer How do most organizations move files today? FTP Typically File Transfer Protocol (FTP) is combined with writing and maintaining homegrown code to address its limitations Limited Reliability
More informationAxxonSoft Inc. Axxon Smart. Quick Start Guide. AxxonSoft. The. Axxon Smart. Software Package. Quick Start Guide. Version 1.0
AxxonSoft The Axxon Smart Software Package Quick Start Guide Version 1.0 Moscow 2010 1 Contents CONTENTS... 2 1 INTRODUCTION... 3 1.1 Document purpose... 3 1.2 Purpose of the Axxon Smart software package...
More informationEnd User Configuration
CHAPTER114 The window in Cisco Unified Communications Manager Administration allows the administrator to add, search, display, and maintain information about Cisco Unified Communications Manager end users.
More informationVPAT Summary. VPAT Details. Section 1194.22 Web-based Internet information and applications - Detail
Date: October 8, 2014 Name of Product: System x3755 M3 VPAT Summary Criteria Status Remarks and Explanations Section 1194.21 Software Applications and Operating Systems Section 1194.22 Web-based Internet
More informationLayer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation
Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation This document describes the steps to undertake in configuring a Layer 2/Layer 3 switch (in this document a FMS7382S
More informationWearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space
Wearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space Michitaka Hirose Research Center for Advanced Science and Technology, The University of Tokyo 4-6-1 Komaba
More informationEvaluation for Cargo Tracking Systems in Railroad Transportation
INTERNATIONAL FORUM ON SHIPPING PORTS AND AIRPORTS Evaluation for Cargo Tracking Systems in Railroad Transportation N.K.Park Tongmyung Univ CONTENTS INTRODUTION BASIC RESEARCH REVIEW THE RAILWAY TRACKING
More informationE-Blocks Easy RFID Bundle
Page 1 Cover Page Page 2 Flowcode Installing Flowcode Instruction for installing Flowcode can be found inside the installation booklet located inside the Flowcode DVD case. Before starting with the course
More informationSuperNav for Heavy Equipment
SuperNav for Heavy Equipment Supervised Navigation System for Heavy Equipment Supervised Navigation (SuperNav) is an option for Raveon Technology s RavTrack GPS tracking system. RavTrack SuperNav is a
More informationOnline Monitoring User Guide
High Resolution Temperature Sensing Strip Online Monitoring User Guide 888.637.3282 www.nerdata.com Page 1 of 26 Contents The Aurora Online Monitoring System... 3 1. Creating an Account on the Aurora Online
More informationGatekeeper Systems. NaviGate USA (Underground Service Alert) Software Product Description. Product Summary. Product Description.
NaviGate USA (Underground Service Alert) Software Product Description Product Summary The NaviGate USA (Underground Service Alert) Module provides interfaces to Call-Before-You-Dig call centers so that
More informationStep-by-Step Setup Guide Wireless File Transmitter
EOS Step-by-Step Setup Guide Wireless File Transmitter Server Mode Infrastructure & Ad Hoc Networks for Apple ios Devices 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without
More informationivms-4200 Client Software Quick Start Guide V1.02
ivms-4200 Client Software Quick Start Guide V1.02 Contents 1 Description... 2 1.1 Running Environment... 2 1.2 Surveillance System Architecture with an Performance of ivms-4200... 3 2 Starting ivms-4200...
More informationA Study on Integrated Security Service Control Solution Development about CRETA Security
A Study on Integrated Security Service Control Solution Development about CRETA Security Yongwon (Conrad) Cho 1, Jinwon (Frank) Choi 2 1 Director Research Engineer, Virtual Builders Co., Ltd. 2 CEO & Co-Founder,
More informationPhone System Guide Handout
Phone System Guide Handout Union Institute & University September 2012 Rev 1 9/6/2012 1 Contents Union Institute & University... 1 Introduction... 4 Section 1 Phone System Voicemail:... 5 Section 2 Phone
More informationIntroduction to Computer Networks and Data Communications
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
More informationEnabling the secure use of RFID
Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises
More informationUser Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration
User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves
More informationExchange 2003 Mailboxes
Exchange 2003 Mailboxes Microsoft will stop supporting Exchange 2003 mailboxes in 2014 as it comes to the end of it s life. To maintain our levels of support and performance of all our customers, we will
More informationPVNMS Brochure. 2013 All rights reserved. Proxim Wireless Corporation. 1
2013 All rights reserved. Proxim Wireless Corporation. 1 Manage Your Wireless Network Via The Cloud Engineered with a revolutionary new design, the next generation ProximVision Network Management System
More informationUser guide. Push to Talk
User guide Push to Talk User guide Push to Talk Content About Push to Talk Online Contact Management...3 Accessing Push to Talk Online Contact Management...4 Managing Push to Talk contacts...4 Deleting
More informationChapter 1 Basic Introduction to Computers. Discovering Computers 2012. Your Interactive Guide to the Digital World
Chapter 1 Basic Introduction to Computers Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Explain why computer literacy is vital to success in today s world Define
More informationIPRO Viewer. Installation
IPRO Viewer Attention: This guide is intended to help those who are authorized to install content onto their computers with the installation of IPRO Premium Viewer software. Please contact your IT personnel
More informationCreating your own service profile for SJphone
SJ Labs, Inc. 2005 All rights reserved SJphone is a registered trademark. No part of this document may be copied, altered, or transferred to, any other media without written, explicit consent from SJ Labs
More informationA Study of the Design of Wireless Medical Sensor Network based u- Healthcare System
, pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133
More informationFAQ for ipad (ios 5.x)
FAQ for ipad (ios 5.x) Content: 1. Connecting to CityU Wireless Local Area Network (CityU WLAN) 2. Setting up the Microsoft Exchange account (for staff only) 3. Setting up the Office365 Exchange online
More informationTukwila School District #406. Technology Department 4205 South 142nd Street Tukwila, WA 98168 (206) 901-8080. Computer and Phone Support Handbook
Tukwila School District #406 Technology Department 4205 South 142nd Street Tukwila, WA 98168 (206) 901-8080 Computer and Phone Support Handbook Revised: July 2009 Table of Contents Network Systems Department
More informationEnterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
More informationMobile Commerce and Ubiquitous Computing. Chapter 6
Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure
More informationEnterprise Content Management System Monitor 5.1 Agent Debugging Guide Revision 1.3. 2014-11-05 CENIT AG Author: Stefan Bettighofer
Enterprise Content Management System Monitor 5.1 Agent Debugging Guide Revision 1.3 2014-11-05 CENIT AG Author: Stefan Bettighofer 1 Table of Contents 1 Table of Contents... 2 2 Overview... 3 3 Definitions...
More informationLocation-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 anudeepnike@gmail.com,
More informationWelcome to ebeam Meeting Sharing
Welcome to ebeam Meeting Sharing Mac/PC: Broadcast your whiteboard across the Internet to up to 25 participants using our free ebeam Meeting Server PC: Host a meeting using your own PC as a server for
More informationSophos Mobile Control User guide for Windows Phone 8. Product version: 3.5
Sophos Mobile Control User guide for Windows Phone 8 Product version: 3.5 Document date: July 2013 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5
More informationWireless Multimedia Technologies for Assisted Living
Second LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2004) Challenges and Opportunities for Engineering Education, Research and Development 2-4 June
More informationMOBILE GEOGRAPHIC INFORMATION SYSTEMS: A CASE STUDY ON MANSOURA UNIVERSITY, EGYPT
MOBILE GEOGRAPHIC INFORMATION SYSTEMS: A CASE STUDY ON MANSOURA UNIVERSITY, EGYPT Asmaa Ahmed Hussein 1, Elkhedr Hassan Eibrahim 2, Aziza Asem 1 1 Faculty of Computer Sciences and information systems,
More informationD-Link Central WiFiManager Configuration Guide
Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install
More informationACCESSING WEB ARCHIVES
ACCESSING WEB ARCHIVES There are two collections of archived websites available via Explore the British Library: The Legal Deposit UK Web Archive, archived through legal deposit regulations introduced
More informationENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION
ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION Arto Hämäläinen and Jari Porras Lappeenranta University of Technology Laboratory of Communications Engineering P.O. Box 20 53851
More informationIntegrated Wire-Free Solution for Monitoring Power and Environment with RF Code and Sentry Power Manager (SPM)
Integrated Wire-Free Solution for Monitoring Power and Environment with RF Code and Sentry Power Manager (SPM) Purpose This technical note describes the components and process of the new power and environmental
More informationDesign and Implementation of an Integrated Contextual Data Management Platform for Context-Aware Applications
Design and Implementation of an Integrated Contextual Data Management Platform for Context-Aware Applications Udana Bandara 1,2 Masateru Minami 1,3 Mikio Hasegawa 1 Masugi Inoue 1 Hiroyuki Morikawa 1,2
More informationPervasive Computing. (A Very Short Introduction)
Pervasive Computing (A Very Short Introduction) Nicola Dragoni Embedded Systems Engineering Section DTU Informatics Technical University of Denmark These slides have been found on the Web and adapted for
More informationStep-by-Step Setup Guide Wireless File Transmitter FTP Mode
EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure & Ad Hoc Networks Mac OS X 10.5-10.6 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without
More informationwww.webndata.com TeleMagic Enterprise White Paper 24499 Albert Lane Phone 216-595-9357 Beachwood, Ohio 44122
www.webndata.com TeleMagic Enterprise White Paper E-mail: alana@webndata.com 24499 Albert Lane Phone 216-595-9357 Beachwood, Ohio 44122 TeleMagic Enterprise White Paper Introduction TeleMagic Enterprise
More informationAllworx Installation Course
VPN Hello and welcome. In the VPN section we will cover the steps for enabling the VPN feature on the Allworx server and how to set up a VPN connection to the Allworx System from your PC. Page 1 VPN The
More informationXpoLog Center Suite Log Management & Analysis platform
XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -
More informationThe Design and Implementation of Multimedia Conference Terminal System on 3G Mobile Phone
2010 International Conference on E-Business and E-Government The Design and Implementation of Multimedia Conference Terminal System on 3G Mobile Phone Li Shangmeng, Shang Yanlei, Ha Jingjing, Chen Junliang
More informationGeneral Product Questions... 3. Q. What is the Bell Personal Vault Vault?...4. Q. What is Bell Personal Vault Backup Manager?...4
Frequently Asked Questions to be posted at: /faqs/ Table of Contents General Product Questions... 3 Q. What is the Bell Personal Vault Vault?...4 Q. What is Bell Personal Vault Backup Manager?...4 Q. What
More informationWireless LAN 802.11g USB Adapter
Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by
More informationBusiness Internet Email service from Bell User Guide
Business Internet Email service from Bell User Guide Table Of Contents (click a page number to access that page) Getting Started 3 Access your email remotely using Webmail 3 Basic Features 4 Out Of Office
More informationCompute Cluster Server Lab 3: Debugging the parallel MPI programs in Microsoft Visual Studio 2005
Compute Cluster Server Lab 3: Debugging the parallel MPI programs in Microsoft Visual Studio 2005 Compute Cluster Server Lab 3: Debugging the parallel MPI programs in Microsoft Visual Studio 2005... 1
More informationTechnical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
More informationCre-X-Mice Database. User guide
Cre-X-Mice Database User guide Table of Contents Table of Figure... ii Introduction... 1 Searching the Database... 1 Quick Search Mode... 1 Advanced Search... 1 Viewing Search Results... 2 Registration...
More informationSCADA/HMI MOVICON TRAINING COURSE PROGRAM
SCADA/HMI MOVICON TRAINING COURSE PROGRAM The Movicon training program includes the following courses: Basic Training Course: 1 day course at Progea head offices or authorized center. On location at client
More informationDiscovering Computers 2008. Chapter 9 Communications and Networks
Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices
More informationRFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY
RFID Radio Frequency IDentification: Concepts, Application Domains and Implementation Dominique Guinard, Patrik Fuhrer and Olivier Liechti University of Fribourg, Switzerland Submission ID: 863 2 Agenda
More informationGetting Started. Install the Omni Mobile Client
Getting Started This Quick Start Guide is for Windows Mobile Smart Phones (no touch-screen support) devices. There is a separate Quick Start Guide for Pocket PC and Windows Mobile touch-screen PDA and
More informationDeployment Best Practices for Citrix XenApp over Galaxy Managed Network Services
Enterprise Networks that Deliver Deployment Best Practices for Citrix XenApp over Galaxy Managed Network Services Developed by Hughes Network Systems Enterprise Networks that Deliver Galaxy Broadband Communications
More information