PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION

Size: px
Start display at page:

Download "PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION"

Transcription

1 PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION YANG-TING SHEN, TAY-SHENG TENG Information Architecture Lab, Department of Architecture, National Cheng Kung University, Taiwan. Abstract. The objective of the paper is to explore how the personal mobile devices help the user to interact with space and get personal service. We embed the RFID tag in PDA for the sake of identifying the space. The space adapts itself to fit the user s need by reading the data on the electronic tag. And the user uses PDA to interact with the space and record the interactive experience. We establish an interactive scenario between the user and the space to experiment how the system work. 1. Introduction Until recently, personal mobile devices were increasingly used to deal with the personal tasks in daily life. The functions of personal mobile devices include: (i) Cell phone, (ii) Organizing personal information or schedule, (iii) Accessing internet, (iv) Sending or receiving , (v) Remote controll, (vi) Spatial navigation (GPS). The most popular personal mobile device is the cell phone. Cell phones are largely used to support the subtitles of our everyday life. In addition, people use PDA to organize personal data, schedule tasks, and remind meetings. Increasingly, people connect to the internet using personal mobile devices to explore websites or send and receive mails. In addition to these functions, we regard personal mobile devices as personal digital agents. Besides, as it is argued that humans are surrounded with successive artificial skins that continually vary in number and character according to changing needs and circumstances (Mitchell, 2003), we expect the agents to play an important role of a channel helping people to connect with the next skin of space. The skin of space consists of multimedia and ubiquitous computers that vanish into the background. When we use personal mobile devices to interact with space, the space becomes human explicit boundaries. However, there is a problem, that is, how to compute across the boundaries between private and public, implicit and explicit, personal and multi-user, permanent and temporary interactions. In other words, the personal mobile devices should be considered as media that help us to interact with space for personal services. When we access a space, the space can identify our positions and identification by connecting our personal mobile

2 PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION 383 devices such as PDAs. We interact with the space by PDAs that ensure that interaction is personal. Moreover, these daily experiences of interaction can be stored and retrieved by PDA. So our human experience is accumulated and incrementally modified with the interleaving interactions between personal digital devices and interactive spaces. 2. The Scenario In this paper, we regard personal mobile devices as personal digital agents. We use personal mobile devices to extend personal identification in the environment. And the environment can also identify us through the personal mobile devices. So we become unique to the environment. The personal mobile devices become our second skins the digital skins. The second skins not only demonstrate our identification, but store and retrieve our memory and experience. In this paper, we develop a scenario to describe how the personal mobile devices help people to extend their digital skins. This scenario pays attention to the interaction between exhibition spaces and people. 1. The user holds the PDA embedded with an RFID tag. The user imports his personal data in the electronic tag including personal ID, habits, interests, etc. When the user accesses the exhibition space, the exhibition space has an RFID reader to detect the electronic tag embedded in PDA and conveys the data to server PC in the back space. By means of those data, the exhibition identifies the user and modifies its setting to match the user s interest. The operations include projecting welcome messages on the wall, turning on the air conditioner, and showing some hints such as sparking LED lights to attract the user s attention based on the user s interest. These operations occur as soon as the user steps into the exhibition space. 2. At the same time, the user uses PDA to connect with the backend server by Wireless LAN and gets the corresponding information displayed on PDA s screen. The corresponding information supported by the server PC shows some icons and messages to suggest the next step. The user clicks on the icon on the PDA s screen and gets further hints, suggesting his going to the area of sparking LED light. The area of sparking LED light shows some information based on the user s interest which is imported in the RFID tag in advance. The user goes to the area of sparking LED light and visits multimedia exhibitions. During the visit, the user picks up a physical model. As this moment, the projector starts to project a set of 3D animation to introduce information of this model. When the user puts the physical model down, the animation stops and changes to the original setting. In the meanwhile, the server PC remotely delivers the website about the information

3 384 YANG-TING SHEN, TAY-SHENG TENG of 3D animation and saves it in the user s PDA. After exploring the area, the user may want to visit different information. So the user modifies his personal data in the RFID tag by the RFID writer in the exhibition space. The exhibition space re-detects the modified RFID tag and starts a new pattern of interaction. 3. After exploring the exhibition area, the user moves to another exhibition area. The user interacts with the new exhibition space again through his PDA embedded tag. The user gets new interaction patterns that are different from the previous exhibition space because the personal electronic tag has been modified. 3. Interaction Experience In this scenario, one of the main concepts is provision of personal service. The RFID tag embedded in PDA makes the exhibition space proactively identify the user. And the exhibition space can adapt itself to fit the user s need by reading habits, interests, and records. Different users interact with the exhibition space and have different interaction based on personal data stored in personal RFID tags. The service of space is customized, that is, people act in the same place but get different experiences. Another main concept is adaptive design of personal digital database. In the past, people s daily experiences come from long-term memories in this brains, but the memories aren t supported or augmented by any computational devices. By wearing the RFID tag embedded in PDA, human experience can be recorded, modified, and reused. If the computer detects the changed data, the computer changes the spatial setting to adapt to the new interaction rules. Furthermore, the new rules may trigger new interaction and create new experiences. The personal digital database is correspondingly extended and modified continuously. Besides, the user can take the personal digital database away and reuse it in other places. However, there will be a new mode of interaction because of the modified tag embedded in PDA. 4. Implementation We divide the implementation of the system into three layers: (i) Import (ii) Information processing (ii) Export. This architecture is shown as follows. Figure 1 shows three functional requirements of the personal services including import, information processing, and export function. On Layer 1, there are four devices to receive signals, and import signals into the server database and tag database. When the server database receives the signals from Layer 1, the backend server database analyzes the digital signals and transform the signals into the

4 PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION 385 Figure 1. Three parts of implementation. identifiable information. Then the server database exports the identifiable information to Layer 3. So the devices on Layer 3 come up with some responses based on the signals on Layer 1. Figure 2. The system architecture of PDA in ambient media exhibition space. Figure 2 shows that the user holds PAD embedded RFID tag into exhibition space. The RFID tag has imported some personal data. We plan four grids including ID, Habit, Interest, Record (Tag Database of Layer two) to record personal data in

5 386 YANG-TING SHEN, TAY-SHENG TENG the FID tag. First, we transform the personal data into code for the sake of writing into the RFID tag. The other reason is to make the RFID device identify the electronic tag by the code. For example, the user may enjoy a physical environment with air conditioning and yellow lighting. Once the user goes into the exhibition and approache the RFID device, the latter detects the RFID tag and receives the binary codes in this tag. The RFID device delivers those codes to server PC in the backspace of the exhibition space. The backend server database analyzes those codes and transforms the codes into scripts which the server PC can identify. Based on those scripts, the server starts to activate the devices on Layer 3 through the RF device. For example, the projector may project some texts and images to welcome the user. The air conditioning is activated. The yellow light turns on. The LED in the part of the exhibition area sparks to attract the user s attention. This is so because of the codes recorded in the RFID tag s grid. At the same time, the user uses PDA to connect to server PC by Wireless LAN for the sake of synchronous information to get the scenario supported by the server in the exhibition space (synchronous information of Layer 3). The processes of scenario consist of three parts: (i) Receiving and analyzing data (ii) Computing processing program (iii) Visualizing the result of computing. The PDA only needs to synchronize with the server to get the visual result of the scenario. The PDA needs no computing or pre-loads of any programmes. The visual scenario supported by the server shows some hints to the user. By reading those hints, the user knows how to interact with the exhibition space further. In the process of interaction, the visual scenario may suggest to the user to pick up the related model or go through the floor boards for further interaction. There are some sensors embedded for the sake of detecting the user s action. Once those sensors detect the user s action, they convey some signals to the server. After the backend database analysis, the exhibition shows some virtual information like animation corresponding to the user s action. At the same time, the user can request the server to send the website of the virtual information to save in the PDA. When the user finishes the interactive scenario, the user can modify the RFID tag via the RFID Writer device to save his experience (Tag Database of Layer 2 Record). Therefore, the personal experience is recorded and accumulated continuously by PDA. 5. Conclusion This paper describes how the personal mobile devices help the user to extend his digital boundary and get personal service in an interactive space. The interaction occurs between users and spaces. In the future, we attempt to extend the domain to study the connecting of two or more spaces by the personal mobile devices when the user takes the personal mobile devices from one space to others. The personal information should follow the user flowing from one place to another. The spaces

6 PERSONAL MOBILE DEVICE FOR SITUATED INTERACTION 387 work synchronously or asynchronously to exchange users information by interacting with the personal mobile devices. Finally, we could construct a ubiquitous personal database by the personal mobile devices.

Towards a Transparent Proactive User Interface for a Shopping Assistant

Towards a Transparent Proactive User Interface for a Shopping Assistant Towards a Transparent Proactive User Interface for a Shopping Assistant Michael Schneider Department of Computer Science, Saarland University, Stuhlsatzenhausweg, Bau 36.1, 66123 Saarbrücken, Germany mschneid@cs.uni-sb.de

More information

NFC Based Equipment Management Inventory System

NFC Based Equipment Management Inventory System Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 NFC Based Equipment Management Inventory System Rung-Shiang

More information

What is the Next Generation of Human-Computer Interaction? CHI 2006 WORKSHOP

What is the Next Generation of Human-Computer Interaction? CHI 2006 WORKSHOP What is the Next Generation of Human-Computer Interaction? CHI 2006 WORKSHOP George Fitzmaurice Autodesk 210 King Street East, Toronto, Ontario, Canada fitzmaurice@acm.org To answer what is the next generation

More information

aloe-project.de White Paper ALOE White Paper - Martin Memmel

aloe-project.de White Paper ALOE White Paper - Martin Memmel aloe-project.de White Paper Contact: Dr. Martin Memmel German Research Center for Artificial Intelligence DFKI GmbH Trippstadter Straße 122 67663 Kaiserslautern fon fax mail web +49-631-20575-1210 +49-631-20575-1030

More information

MOBIlearn - A Model For Interoperability

MOBIlearn - A Model For Interoperability 101 Towards Personal, Mobile & Location Based Learning Content Management Fabrizio Cardinali, Giunti Labs November 20 & 21, 2008 Produced by Designing and Managing Mobile Learning An Open Abstract Framework

More information

Management Dashboard in a Retail Environment

Management Dashboard in a Retail Environment Management Dashboard in a Retail Environment Gerrit Kahl, Stefan Warwas, Pascal Liedtke, Lübomira Spassova, Boris Brandherm German Research Center for Artificial Intelligence LAMDa 2011, 13. February,

More information

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain

Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Towards Distributed Service Platform for Extending Enterprise Applications to Mobile Computing Domain Pakkala D., Sihvonen M., and Latvakoski J. VTT Technical Research Centre of Finland, Kaitoväylä 1,

More information

Alcatel-Lucent Office Communication Solutions

Alcatel-Lucent Office Communication Solutions Alcatel-Lucent Office Communication Solutions PIMphony, your personal communication manager Frequently Asked Questions April, 2007 All Rights Reserved Alcatel-Lucent 2007 Alcatel-Lucent Office Communication

More information

Systèmes d information diffus avec l environnement SPREAD

Systèmes d information diffus avec l environnement SPREAD Systèmes d information diffus avec l environnement SPREAD Paul Couderc INRIA Rennes / IRISA Ambient Computing and Embedded Systems Project http://www.irisa.fr/aces pcouderc@irisa.fr 2005-03-15 1 Domain

More information

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,

More information

remote data capture (rdc)

remote data capture (rdc) As Ambitious As You Are Exact Alliance - Remote Data Collection Exact Alliance Remote Data Collection (RDC) allows you to utilize hand held devices (HHD) and other external devices to remotely capture

More information

DANGER indicates that death or severe personal injury will result if proper precautions are not taken.

DANGER indicates that death or severe personal injury will result if proper precautions are not taken. Multi-User Systems 1 ArchiveServer 2 SIMATIC HMI WinCC V7.0 SP1 File Server 3 WinCC ServiceMode 4 Redundant Systems 5 System Manual Print of the Online Help 11/2008 Legal information Warning notice system

More information

Cellular and 802.11 Networks Application and Data Usage

Cellular and 802.11 Networks Application and Data Usage Cellular and 802.11 Networks Application and Data Usage Wireless connectivity has become a necessity for application usage and productivity workflows. Network connectivity changes as users move from indoors

More information

Do Handheld Devices Facilitate Face-to-Face Collaboration? Handheld Devices with Large Shared Display Groupware

Do Handheld Devices Facilitate Face-to-Face Collaboration? Handheld Devices with Large Shared Display Groupware Do Handheld Devices Facilitate Face-to-Face Collaboration? Handheld Devices with Large Shared Display Groupware Chen-Chung Liu Assistant Professor Graduate Institute of Network Learning Technology National

More information

Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server

Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server Functions of NOS Overview of NOS Characteristics Differences Between PC and a NOS Multiuser, Multitasking, and Multiprocessor Systems NOS Server Hardware Windows Windows NT 4.0 Linux Server Software and

More information

The preliminary design of a wearable computer for supporting Construction Progress Monitoring

The preliminary design of a wearable computer for supporting Construction Progress Monitoring The preliminary design of a wearable computer for supporting Construction Progress Monitoring 1 Introduction Jan Reinhardt, TU - Dresden Prof. James H. Garrett,Jr., Carnegie Mellon University Prof. Raimar

More information

Quick Start Guide. www.uptrendsinfra.com

Quick Start Guide. www.uptrendsinfra.com Quick Start Guide Uptrends Infra is a cloud service that monitors your on-premise hardware and software infrastructure. This Quick Start Guide contains the instructions to get you up to speed with your

More information

EXPERIMENTAL INVESTIGATION OF THE INTEGRATION OF VIRTUAL MODELS AND THE PHYSICAL CONSTRUCTION

EXPERIMENTAL INVESTIGATION OF THE INTEGRATION OF VIRTUAL MODELS AND THE PHYSICAL CONSTRUCTION EXPERIMENTAL INVESTIGATION OF THE INTEGRATION OF VIRTUAL MODELS AND THE PHYSICAL CONSTRUCTION Abiola A. Akanmu 1, Chimay J. Anumba 2, John I. Messner 2, Sanghoon Lee 2, and Deepa Kundur 3 abiola.akanmu@wmich.edu,

More information

Ipiphony Phone System. User Manual. 1 P a g e

Ipiphony Phone System. User Manual. 1 P a g e Ipiphony Phone System User Manual 1 P a g e About this Guide This guide explains how to use the basic features of your new Aastra phones. Not all features listed are available by default. Contact your

More information

EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT

EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT EFFECTIVE QUERY RETRIEVAL SYSTEM IN MOBILE BUSINESS ENVIRONMENT 1 R.Sivaraman, 2 RM.Chandrasekaran 1 Dy.Director, Center for Convergence of Technologies (CCT), Anna University Tiruchirappalli, Tiruchirappalli,

More information

Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation.

Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. NETWORK OPERATING SYSTEM Introduction Network operating systems typically are used to run computers that act as servers. They provide the capabilities required for network operation. Network operating

More information

Assets Location Management Solution Based on the Combination of SmartLocator and RFID

Assets Location Management Solution Based on the Combination of SmartLocator and RFID Assets Location Management Solution Based on the Combination of SmartLocator and RFID HASHIMOTO Naohisa, ISSHIKI Naoki, IGUCHI Masao, MORISAKI Mitsunori, ISHII Ken'ichi Abstract This paper introduces the

More information

Call Answer/Message Manager with Aliant Voicemail Online

Call Answer/Message Manager with Aliant Voicemail Online Call Answer/Message Manager with Aliant Voicemail Online Call Answer/Message Manager automatically takes a message when you re away, on the telephone or on Dial up Internet. You ll enjoy the convenience

More information

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion

Cisco Context-Aware Mobility Solution: Put Your Assets in Motion Cisco Context-Aware Mobility Solution: Put Your Assets in Motion How Contextual Information Can Drastically Change Your Business Mobility and Allow You to Achieve Unprecedented Efficiency What You Will

More information

Step-by-Step Setup Guide Wireless File Transmitter

Step-by-Step Setup Guide Wireless File Transmitter EOS Step-by-Step Setup Guide Wireless File Transmitter Server Mode Infrastructure & Ad Hoc Networks Macintosh OS X 10.5-10.6 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part

More information

Vodafone Email Plus. User Guide for Windows Mobile

Vodafone Email Plus. User Guide for Windows Mobile Vodafone Email Plus User Guide for Windows Mobile 1 Table of Contents 1 INTRODUCTION... 4 2 INSTALLING VODAFONE EMAIL PLUS... 4 2.1 SETUP BY USING THE VODAFONE EMAIL PLUS ICON...5 2.2 SETUP BY DOWNLOADING

More information

Evolving Bar Codes. Y398 Internship. William Holmes

Evolving Bar Codes. Y398 Internship. William Holmes Evolving Bar Codes Y398 Internship By William Holmes Table of contents Introduction: What is RFID? Types of Tags: Advantages of Tags: RFID applications Conclusion: Introduction: Bar codes have evolved

More information

An ESRI White Paper May 2007 Mobile GIS for Homeland Security

An ESRI White Paper May 2007 Mobile GIS for Homeland Security An ESRI White Paper May 2007 Mobile GIS for Homeland Security ESRI 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL info@esri.com WEB www.esri.com Copyright 2007 ESRI

More information

MIDAS. Event Log Viewer User s Guide. Part Number MN/MID-EVLOG.IOM Revision 0

MIDAS. Event Log Viewer User s Guide. Part Number MN/MID-EVLOG.IOM Revision 0 MIDAS Event Log Viewer User s Guide Part Number MN/MID-EVLOG.IOM Revision 0 Table Of Contents: OVERVIEW... 3 STARTING THE EVENT LOG VIEWER... 4 HOW THE VIEWER IS ORGANIZED... 7 DATA VIEW SELECTOR... 7

More information

Remote E-mail Access with Outlook 2003 Using RPC over HTTPS

Remote E-mail Access with Outlook 2003 Using RPC over HTTPS Remote E-mail Access with Outlook 2003 Using RPC over HTTPS Information Services now offers full remote access to your Exchange e-mail, calendar, contacts, etc. via the Outlook client without having to

More information

TechTips. Connecting Xcelsius Dashboards to External Data Sources using: Web Services (Dynamic Web Query)

TechTips. Connecting Xcelsius Dashboards to External Data Sources using: Web Services (Dynamic Web Query) TechTips Connecting Xcelsius Dashboards to External Data Sources using: Web Services (Dynamic Web Query) A step-by-step guide to connecting Xcelsius Enterprise XE dashboards to company databases using

More information

v.5 Use Shelby to Communicate Electronically

v.5 Use Shelby to Communicate Electronically v.5 Use Shelby to Communicate Electronically Presented by: Mark Fisher, Shelby Consultant 2013 Shelby Systems, Inc. Other brand and product names are trademarks or registered trademarks of the respective

More information

Discovering Computers 2008. Chapter 3 Application Software

Discovering Computers 2008. Chapter 3 Application Software Discovering Computers 2008 Chapter 3 Application Software Chapter 3 Objectives Identify the categories of application software Explain ways software is distributed Explain how to work with application

More information

Basic Network Design

Basic Network Design Frequency Reuse and Planning Cellular Technology enables mobile communication because they use of a complex two-way radio system between the mobile unit and the wireless network. It uses radio frequencies

More information

DSG SoftPhone & USB Phone Series User Guide

DSG SoftPhone & USB Phone Series User Guide DSG SoftPhone & USB Phone Series User Guide Table of Contents Overview Before You Start Installation Step 1. Installing DSG SoftPhone Step 2. Installing USB Phone Step 3. System Check First Time Use Step

More information

User Manual GSM Alarm System. www.deltasecurity.cn. All rights reserved by Delta Security Co., Ltd

User Manual GSM Alarm System. www.deltasecurity.cn. All rights reserved by Delta Security Co., Ltd User Manual GSM Alarm System All rights reserved by Delta Security Co., Ltd Dear Clients, Thank you for using our GSM Alarm System. We are committed to giving you the best home security available today

More information

CHAPTER 2: USING THE CAMERA WITH THE APP

CHAPTER 2: USING THE CAMERA WITH THE APP TABLE OF CONTENTS OVERVIEW... 1 Front of your camera... 1 Back of your camera... 2 ACCESSORIES... 3 CHAPTER 1: Navigating the Mobile Application... 4 Device List: How to Use this Page... 4 My Messages:

More information

How To Set Up Dataprotect

How To Set Up Dataprotect How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact

More information

XpoLog Center Suite Data Sheet

XpoLog Center Suite Data Sheet XpoLog Center Suite Data Sheet General XpoLog is a data analysis and management platform for Applications IT data. Business applications rely on a dynamic heterogeneous applications infrastructure, such

More information

Preparing Log-ic 360 USB Loggers for Use

Preparing Log-ic 360 USB Loggers for Use Preparing Log-ic 360 USB Loggers for Use Preparing Log-ic 360 USB Loggers for Use Step 1) Install the latest version of the Log-ic Software. Step 2) Connect the Desktop Reader or plug in a USB logger.

More information

Open source integrated remote systems and network management with OpenRSM. M. Kalochristianakis E. Varvarigos

Open source integrated remote systems and network management with OpenRSM. M. Kalochristianakis E. Varvarigos Open source integrated remote systems and network management with OpenRSM M. Kalochristianakis E. Varvarigos Contents Systems and network management o Aims, technologies o State of the art and open source

More information

UNICORN 7.0. Administration and Technical Manual

UNICORN 7.0. Administration and Technical Manual UNICORN 7.0 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...

More information

Ubiquitous Memories: Wearable Interface for Computational Augmentation of Human Memory based on Real World Objects

Ubiquitous Memories: Wearable Interface for Computational Augmentation of Human Memory based on Real World Objects Ubiquitous Memories: Wearable Interface for Computational Augmentation of Human Memory based on Real World Objects Tatsuyuki Kawamura Graduate School of Information Science, Nara Institute of Science and

More information

Managed File Transfer

Managed File Transfer Managed File Transfer How do most organizations move files today? FTP Typically File Transfer Protocol (FTP) is combined with writing and maintaining homegrown code to address its limitations Limited Reliability

More information

AxxonSoft Inc. Axxon Smart. Quick Start Guide. AxxonSoft. The. Axxon Smart. Software Package. Quick Start Guide. Version 1.0

AxxonSoft Inc. Axxon Smart. Quick Start Guide. AxxonSoft. The. Axxon Smart. Software Package. Quick Start Guide. Version 1.0 AxxonSoft The Axxon Smart Software Package Quick Start Guide Version 1.0 Moscow 2010 1 Contents CONTENTS... 2 1 INTRODUCTION... 3 1.1 Document purpose... 3 1.2 Purpose of the Axxon Smart software package...

More information

End User Configuration

End User Configuration CHAPTER114 The window in Cisco Unified Communications Manager Administration allows the administrator to add, search, display, and maintain information about Cisco Unified Communications Manager end users.

More information

VPAT Summary. VPAT Details. Section 1194.22 Web-based Internet information and applications - Detail

VPAT Summary. VPAT Details. Section 1194.22 Web-based Internet information and applications - Detail Date: October 8, 2014 Name of Product: System x3755 M3 VPAT Summary Criteria Status Remarks and Explanations Section 1194.21 Software Applications and Operating Systems Section 1194.22 Web-based Internet

More information

Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation

Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation Layer 2 / Layer 3 switches and multi-ssid multi-vlan network with traffic separation This document describes the steps to undertake in configuring a Layer 2/Layer 3 switch (in this document a FMS7382S

More information

Wearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space

Wearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space Wearable Finger-Braille Interface for Navigation of Deaf-Blind in Ubiquitous Barrier-Free Space Michitaka Hirose Research Center for Advanced Science and Technology, The University of Tokyo 4-6-1 Komaba

More information

Evaluation for Cargo Tracking Systems in Railroad Transportation

Evaluation for Cargo Tracking Systems in Railroad Transportation INTERNATIONAL FORUM ON SHIPPING PORTS AND AIRPORTS Evaluation for Cargo Tracking Systems in Railroad Transportation N.K.Park Tongmyung Univ CONTENTS INTRODUTION BASIC RESEARCH REVIEW THE RAILWAY TRACKING

More information

E-Blocks Easy RFID Bundle

E-Blocks Easy RFID Bundle Page 1 Cover Page Page 2 Flowcode Installing Flowcode Instruction for installing Flowcode can be found inside the installation booklet located inside the Flowcode DVD case. Before starting with the course

More information

SuperNav for Heavy Equipment

SuperNav for Heavy Equipment SuperNav for Heavy Equipment Supervised Navigation System for Heavy Equipment Supervised Navigation (SuperNav) is an option for Raveon Technology s RavTrack GPS tracking system. RavTrack SuperNav is a

More information

Online Monitoring User Guide

Online Monitoring User Guide High Resolution Temperature Sensing Strip Online Monitoring User Guide 888.637.3282 www.nerdata.com Page 1 of 26 Contents The Aurora Online Monitoring System... 3 1. Creating an Account on the Aurora Online

More information

Gatekeeper Systems. NaviGate USA (Underground Service Alert) Software Product Description. Product Summary. Product Description.

Gatekeeper Systems. NaviGate USA (Underground Service Alert) Software Product Description. Product Summary. Product Description. NaviGate USA (Underground Service Alert) Software Product Description Product Summary The NaviGate USA (Underground Service Alert) Module provides interfaces to Call-Before-You-Dig call centers so that

More information

Step-by-Step Setup Guide Wireless File Transmitter

Step-by-Step Setup Guide Wireless File Transmitter EOS Step-by-Step Setup Guide Wireless File Transmitter Server Mode Infrastructure & Ad Hoc Networks for Apple ios Devices 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without

More information

ivms-4200 Client Software Quick Start Guide V1.02

ivms-4200 Client Software Quick Start Guide V1.02 ivms-4200 Client Software Quick Start Guide V1.02 Contents 1 Description... 2 1.1 Running Environment... 2 1.2 Surveillance System Architecture with an Performance of ivms-4200... 3 2 Starting ivms-4200...

More information

A Study on Integrated Security Service Control Solution Development about CRETA Security

A Study on Integrated Security Service Control Solution Development about CRETA Security A Study on Integrated Security Service Control Solution Development about CRETA Security Yongwon (Conrad) Cho 1, Jinwon (Frank) Choi 2 1 Director Research Engineer, Virtual Builders Co., Ltd. 2 CEO & Co-Founder,

More information

Phone System Guide Handout

Phone System Guide Handout Phone System Guide Handout Union Institute & University September 2012 Rev 1 9/6/2012 1 Contents Union Institute & University... 1 Introduction... 4 Section 1 Phone System Voicemail:... 5 Section 2 Phone

More information

Introduction to Computer Networks and Data Communications

Introduction to Computer Networks and Data Communications Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the

More information

Enabling the secure use of RFID

Enabling the secure use of RFID Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises

More information

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration

User Guide. DocAve Lotus Notes Migrator for Microsoft Exchange 1.1. Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration User Guide DocAve Lotus Notes Migrator for Microsoft Exchange 1.1 Using the DocAve Notes Migrator for Exchange to Perform a Basic Migration This document is intended for anyone wishing to familiarize themselves

More information

Exchange 2003 Mailboxes

Exchange 2003 Mailboxes Exchange 2003 Mailboxes Microsoft will stop supporting Exchange 2003 mailboxes in 2014 as it comes to the end of it s life. To maintain our levels of support and performance of all our customers, we will

More information

PVNMS Brochure. 2013 All rights reserved. Proxim Wireless Corporation. 1

PVNMS Brochure. 2013 All rights reserved. Proxim Wireless Corporation. 1 2013 All rights reserved. Proxim Wireless Corporation. 1 Manage Your Wireless Network Via The Cloud Engineered with a revolutionary new design, the next generation ProximVision Network Management System

More information

User guide. Push to Talk

User guide. Push to Talk User guide Push to Talk User guide Push to Talk Content About Push to Talk Online Contact Management...3 Accessing Push to Talk Online Contact Management...4 Managing Push to Talk contacts...4 Deleting

More information

Chapter 1 Basic Introduction to Computers. Discovering Computers 2012. Your Interactive Guide to the Digital World

Chapter 1 Basic Introduction to Computers. Discovering Computers 2012. Your Interactive Guide to the Digital World Chapter 1 Basic Introduction to Computers Discovering Computers 2012 Your Interactive Guide to the Digital World Objectives Overview Explain why computer literacy is vital to success in today s world Define

More information

IPRO Viewer. Installation

IPRO Viewer. Installation IPRO Viewer Attention: This guide is intended to help those who are authorized to install content onto their computers with the installation of IPRO Premium Viewer software. Please contact your IT personnel

More information

Creating your own service profile for SJphone

Creating your own service profile for SJphone SJ Labs, Inc. 2005 All rights reserved SJphone is a registered trademark. No part of this document may be copied, altered, or transferred to, any other media without written, explicit consent from SJ Labs

More information

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System , pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133

More information

FAQ for ipad (ios 5.x)

FAQ for ipad (ios 5.x) FAQ for ipad (ios 5.x) Content: 1. Connecting to CityU Wireless Local Area Network (CityU WLAN) 2. Setting up the Microsoft Exchange account (for staff only) 3. Setting up the Office365 Exchange online

More information

Tukwila School District #406. Technology Department 4205 South 142nd Street Tukwila, WA 98168 (206) 901-8080. Computer and Phone Support Handbook

Tukwila School District #406. Technology Department 4205 South 142nd Street Tukwila, WA 98168 (206) 901-8080. Computer and Phone Support Handbook Tukwila School District #406 Technology Department 4205 South 142nd Street Tukwila, WA 98168 (206) 901-8080 Computer and Phone Support Handbook Revised: July 2009 Table of Contents Network Systems Department

More information

Enterprise Remote Control 5.6 Manual

Enterprise Remote Control 5.6 Manual Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote

More information

Mobile Commerce and Ubiquitous Computing. Chapter 6

Mobile Commerce and Ubiquitous Computing. Chapter 6 Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure

More information

Enterprise Content Management System Monitor 5.1 Agent Debugging Guide Revision 1.3. 2014-11-05 CENIT AG Author: Stefan Bettighofer

Enterprise Content Management System Monitor 5.1 Agent Debugging Guide Revision 1.3. 2014-11-05 CENIT AG Author: Stefan Bettighofer Enterprise Content Management System Monitor 5.1 Agent Debugging Guide Revision 1.3 2014-11-05 CENIT AG Author: Stefan Bettighofer 1 Table of Contents 1 Table of Contents... 2 2 Overview... 3 3 Definitions...

More information

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy

Location-Aware and Safer Cards: Enhancing RFID Security and Privacy Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 anudeepnike@gmail.com,

More information

Welcome to ebeam Meeting Sharing

Welcome to ebeam Meeting Sharing Welcome to ebeam Meeting Sharing Mac/PC: Broadcast your whiteboard across the Internet to up to 25 participants using our free ebeam Meeting Server PC: Host a meeting using your own PC as a server for

More information

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5

Sophos Mobile Control User guide for Windows Phone 8. Product version: 3.5 Sophos Mobile Control User guide for Windows Phone 8 Product version: 3.5 Document date: July 2013 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5

More information

Wireless Multimedia Technologies for Assisted Living

Wireless Multimedia Technologies for Assisted Living Second LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2004) Challenges and Opportunities for Engineering Education, Research and Development 2-4 June

More information

MOBILE GEOGRAPHIC INFORMATION SYSTEMS: A CASE STUDY ON MANSOURA UNIVERSITY, EGYPT

MOBILE GEOGRAPHIC INFORMATION SYSTEMS: A CASE STUDY ON MANSOURA UNIVERSITY, EGYPT MOBILE GEOGRAPHIC INFORMATION SYSTEMS: A CASE STUDY ON MANSOURA UNIVERSITY, EGYPT Asmaa Ahmed Hussein 1, Elkhedr Hassan Eibrahim 2, Aziza Asem 1 1 Faculty of Computer Sciences and information systems,

More information

D-Link Central WiFiManager Configuration Guide

D-Link Central WiFiManager Configuration Guide Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install

More information

ACCESSING WEB ARCHIVES

ACCESSING WEB ARCHIVES ACCESSING WEB ARCHIVES There are two collections of archived websites available via Explore the British Library: The Legal Deposit UK Web Archive, archived through legal deposit regulations introduced

More information

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION

ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION ENHANCING MOBILE PEER-TO-PEER ENVIRONMENT WITH NEIGHBORHOOD INFORMATION Arto Hämäläinen and Jari Porras Lappeenranta University of Technology Laboratory of Communications Engineering P.O. Box 20 53851

More information

Integrated Wire-Free Solution for Monitoring Power and Environment with RF Code and Sentry Power Manager (SPM)

Integrated Wire-Free Solution for Monitoring Power and Environment with RF Code and Sentry Power Manager (SPM) Integrated Wire-Free Solution for Monitoring Power and Environment with RF Code and Sentry Power Manager (SPM) Purpose This technical note describes the components and process of the new power and environmental

More information

Design and Implementation of an Integrated Contextual Data Management Platform for Context-Aware Applications

Design and Implementation of an Integrated Contextual Data Management Platform for Context-Aware Applications Design and Implementation of an Integrated Contextual Data Management Platform for Context-Aware Applications Udana Bandara 1,2 Masateru Minami 1,3 Mikio Hasegawa 1 Masugi Inoue 1 Hiroyuki Morikawa 1,2

More information

Pervasive Computing. (A Very Short Introduction)

Pervasive Computing. (A Very Short Introduction) Pervasive Computing (A Very Short Introduction) Nicola Dragoni Embedded Systems Engineering Section DTU Informatics Technical University of Denmark These slides have been found on the Web and adapted for

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure & Ad Hoc Networks Mac OS X 10.5-10.6 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without

More information

www.webndata.com TeleMagic Enterprise White Paper 24499 Albert Lane Phone 216-595-9357 Beachwood, Ohio 44122

www.webndata.com TeleMagic Enterprise White Paper 24499 Albert Lane Phone 216-595-9357 Beachwood, Ohio 44122 www.webndata.com TeleMagic Enterprise White Paper E-mail: alana@webndata.com 24499 Albert Lane Phone 216-595-9357 Beachwood, Ohio 44122 TeleMagic Enterprise White Paper Introduction TeleMagic Enterprise

More information

Allworx Installation Course

Allworx Installation Course VPN Hello and welcome. In the VPN section we will cover the steps for enabling the VPN feature on the Allworx server and how to set up a VPN connection to the Allworx System from your PC. Page 1 VPN The

More information

XpoLog Center Suite Log Management & Analysis platform

XpoLog Center Suite Log Management & Analysis platform XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -

More information

The Design and Implementation of Multimedia Conference Terminal System on 3G Mobile Phone

The Design and Implementation of Multimedia Conference Terminal System on 3G Mobile Phone 2010 International Conference on E-Business and E-Government The Design and Implementation of Multimedia Conference Terminal System on 3G Mobile Phone Li Shangmeng, Shang Yanlei, Ha Jingjing, Chen Junliang

More information

General Product Questions... 3. Q. What is the Bell Personal Vault Vault?...4. Q. What is Bell Personal Vault Backup Manager?...4

General Product Questions... 3. Q. What is the Bell Personal Vault Vault?...4. Q. What is Bell Personal Vault Backup Manager?...4 Frequently Asked Questions to be posted at: /faqs/ Table of Contents General Product Questions... 3 Q. What is the Bell Personal Vault Vault?...4 Q. What is Bell Personal Vault Backup Manager?...4 Q. What

More information

Wireless LAN 802.11g USB Adapter

Wireless LAN 802.11g USB Adapter Wireless LAN 802.11g USB Adapter User s Guide Version 1.0 User s Guide 0 Copyright statement No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by

More information

Business Internet Email service from Bell User Guide

Business Internet Email service from Bell User Guide Business Internet Email service from Bell User Guide Table Of Contents (click a page number to access that page) Getting Started 3 Access your email remotely using Webmail 3 Basic Features 4 Out Of Office

More information

Compute Cluster Server Lab 3: Debugging the parallel MPI programs in Microsoft Visual Studio 2005

Compute Cluster Server Lab 3: Debugging the parallel MPI programs in Microsoft Visual Studio 2005 Compute Cluster Server Lab 3: Debugging the parallel MPI programs in Microsoft Visual Studio 2005 Compute Cluster Server Lab 3: Debugging the parallel MPI programs in Microsoft Visual Studio 2005... 1

More information

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate

Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field

More information

Cre-X-Mice Database. User guide

Cre-X-Mice Database. User guide Cre-X-Mice Database User guide Table of Contents Table of Figure... ii Introduction... 1 Searching the Database... 1 Quick Search Mode... 1 Advanced Search... 1 Viewing Search Results... 2 Registration...

More information

SCADA/HMI MOVICON TRAINING COURSE PROGRAM

SCADA/HMI MOVICON TRAINING COURSE PROGRAM SCADA/HMI MOVICON TRAINING COURSE PROGRAM The Movicon training program includes the following courses: Basic Training Course: 1 day course at Progea head offices or authorized center. On location at client

More information

Discovering Computers 2008. Chapter 9 Communications and Networks

Discovering Computers 2008. Chapter 9 Communications and Networks Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices

More information

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY RFID Radio Frequency IDentification: Concepts, Application Domains and Implementation Dominique Guinard, Patrik Fuhrer and Olivier Liechti University of Fribourg, Switzerland Submission ID: 863 2 Agenda

More information

Getting Started. Install the Omni Mobile Client

Getting Started. Install the Omni Mobile Client Getting Started This Quick Start Guide is for Windows Mobile Smart Phones (no touch-screen support) devices. There is a separate Quick Start Guide for Pocket PC and Windows Mobile touch-screen PDA and

More information

Deployment Best Practices for Citrix XenApp over Galaxy Managed Network Services

Deployment Best Practices for Citrix XenApp over Galaxy Managed Network Services Enterprise Networks that Deliver Deployment Best Practices for Citrix XenApp over Galaxy Managed Network Services Developed by Hughes Network Systems Enterprise Networks that Deliver Galaxy Broadband Communications

More information