Architecture of a Platform for Building Context-Aware Educational Mobile Services
|
|
|
- Ashley Griffin
- 10 years ago
- Views:
Transcription
1 Architecture of a Platform for Building Context-Aware Educational Mobile Services ALEXANDER SAMOCHADIN [email protected] DIMITRI TIMOFEEV [email protected] MAXIM MASLOV [email protected] Abstract: In this paper we present an architecture of the software platform directed to building of context-aware educational mobile services. The platform is implemented around a mobile device management system as its core. The MDM system provides basic functionality to the services. It also serves a source of context in which interaction between mobile clients and services takes place. As an example of a platform-based service, the architecture of an automated attendance management application is described. Key Words: Mobile education, mobile service, mobile device management, software platform architecture. 1 Introduction Modern mobile devices are more than just communication media: they are feature-rich terminals giving access to a wide class of services. Wireless networking and a wide selection of mobile software available at stores allows users to play games, to read books and news, to search in databases, to create and share documents, to help and to ask for assistance, and to collaborate in multiple ways. Rich capabilities of mobile devices also find their use in education, especially in distance learning. Free applications are available, which provide access to massive open online courses (e.g., Coursera, Udacity, edx), and to learning platforms, such as Apple itunes U. Traditional universities are also heading in the wider adoption of mobile services and applications as a part of e-learning educational technology. Mobile intranet services are also used to provide better day-to-day activity experience for students and staff. To implement mobile educational services, an institution should solve a number of problems, such as reliable user authentication and authorization, dealing with multiple mobile platforms, and deployment of software. As these problems are common to all mobile services that the institution provides to users, it is inefficient and error-prone to solve them again for each service. A common platform is needed, upon which educational services may be built. One widespread solution that handles main aspects of mobile device usage in organization is to deploy a mobile device management (MDM) system. The MDM system registers mobile devices, which belong to the company employees, and communicates with them. Common functions supported by MDM services available in the market include device authentication, installation of software and operating system updates, and managing device settings to enforce corporate policy. We propose to use a MDM system as a core component of the software platform for building educational mobile services. The MDM server takes upon itself all common tasks related to mobile devices, such as user authentication, software deployment, and messaging, and manages common context of user interaction with the platform. This architecture makes easier to develop contextaware services. According to [1], a system is context-aware if it uses context to provide relevant information and/or services to the user, where relevancy depends on the users task. In respect to mobile devices, context includes user identity, device location, its state (such as the set of installed applications, battery charge level, and notification settings), shared application data (which may include, for example, calendar entries, contacts, or status messages) and contextual information on nearby devices and their users. This information may be hard to obtain for a service, but it is available for a MDM server that authenticates all users and interacts with their mobile devices. In the rest of the paper, we discuss the issues associated with implementation and usage of educational mobile services, and describe in more details the architecture of the MDM-based service platform. As a more detailed example, we describe the archi- ISBN:
2 tecture and implementation of a context-aware attendance monitoring service. 2 Mobile services for education Modern educational technology may benefit from adaptation of internet, intranet, and mobile services of several types of internet and mobile services. Such services may address, among others, the areas of distance learning, classroom interaction support, academic progress monitoring and analysis, and of supporting daily activities of students and instructors. As the survey by Pereira and Rodrigues [4] shows, many of these services are actually implemented using mobile devices, and put into practice worldwide, especially in developing countries that need to make education more accessible. Most popular are services providing access to learning and reference materials, and online quizzes. Yet another interesting area in mobile education is represented by educational games. Although traditional computer games, either available in entertainment stores or specially developed with educational purpose, are often used in learning [4], mobile devices bring novel features that may be effectively used, like the possibility to learn by playing in real environments [2]. Based on a survey conducted in Peter the Great St. Petersburg Polytechnic University [5], we identified the set of educational services that instructors and students have been most interested in [6]. Access to the timetable and timetable alterations, and events and calendar management. Access to information about administrative procedures, business-process guides. Interactive teaching tools. Support of surveys, tests, and examinations. Group work support, distribution of tasks. Support of certification and graduation processes. Attendance monitoring. Student performance monitoring. These services share common data and should implement a common set of basic functions. Their development is largely simplified if the services are built on the common platform that provides the common functionality. Our goal is therefore to design a service platform for building context-oriented mobile services. Figure 1: Platform architecture 3 The architecture of the MDMbased service platform We propose the following architecture of a platform that enables the implementation of context-aware mobile services. Although our primary goal is the implementation of educational services, this architecture can be used in other environments as well. The only requirement is that users should register their devices in the MDM system in order to use all platform features. The platform consists of three main groups of components. The mobile device management system, which acts as a core of the entire platform. The services that are implemented in the platform. Mobile devices and stationary computers used to access the services. Services interacts with the platform core using the MDM server Web API. To be able to use this API, a service should obtain an identification token. The token is generated when the administrator register the service in the MDM database. To make a request to the server, the service calls Web API and provides the token. Interaction between these components is depicted in Fig. 1. In this example, there are two services: an attendance monitoring service, and a service to perform quizzes. A user interacts with the quiz service using an application running on her mobile device. To authenticate the user and to get context data that may ISBN:
3 be used to set up individual quizzes, the service connects to the MDM server and makes a request using the server Web API. The MDM server responds using the information taken from its databases and obtained by communicating with the mobile device. The MDM server provides the following basic services. Users and groups management. Authentication and athorization. Messaging. Document distribution. Event management and user registration. The users and groups management service provides information about registered users and user groups. A user group is a set of users defined by some common property defined by the administrator and may correspond to faculty members, students of the same class, or the participants of the same project. By request, the server returns membership information for a given user or group. MDM server implements an administrative interface for user and group management. The MDM server perform user authentication using the data obtained by communication with a registered mobile device, and also provides the common authentication cababilities such as login and password check. The interaction with mobile devices allows the server to use device-based authentication (PINcode, fingerprint check) when available. Authorization relies on the permissions set by the administrator, who define group rules (and individual user rules, if needed) for all registered services. Messaging service provides delivery of messages from services to mobile devices, and the communication of messages sent by users. Likewise, document distribution service provides document storage, sharing, and delivery to devices. The MDM server notifies the users mobile devices that a message or a document is available using standard push notification service of the mobile platform. The event management service allows the administrator, or to any authorized user, to schedule public events, e.g., meetings, talks, or conferences. After the event is scheduled, any user can register herself (and possibly others, if the user has necessary rights) as a participant. It may seem unnecessary to put such high-level facility into the platform core. Although this facility could certainly be implemented as a regular service, we have found it convenient to include event management functionality in the MDM server API. One reason behind this decision is that the information about user-scheduled events and their participants is used by multiple educational services, including timetable and calendar services, attendance monitoring, and student performance monitoring. Moreover, with event schedule being available, users can transparently use the facilities of other services, e.g., to assign a quiz, or to share a set of documents with event participants. Furthermore, the information about scheduled events is logically a part of the context of user interaction with the MDM server and platform-based services. 4 An example service: context-aware attendance monitoring As an example, let us discuss the architecture and the functionality of one specific service, automated attendance monitoring. Here we only describe the overall architecture of our solution and its interaction with the service platform. A more detailed discussion is available elsewhere [7]. The goal of the automated attendance monitoring is to determine who is attending a specific event while minimizing required human effort. The most widespread use of attendance monitoring in education is the monitoring of class attendance by students. In this case it would be desirable to the monitoring system to provide some cheating prevention facilities. Our system is implemented using mobile devices and an attendance monitoring mobile service. It can also be integrated with an existing access control systems if they are available. The architecture of the service is represented in Fig. 2 (taken from [7]). To check whether a student is present in the classroom, an automated system must solve two problems. First, a student should be authenticated. Second, the system should make sure that the authenticated student is located in the classroom. Our implementation of the automated attendance management service uses mobile devices to solve both authentication and localization problems. To be able to register their presence, each student should install a mobile application. This application may also be automatically installed using the MDM software distribution facility. The authorization problem is handled by the MDM server. The student s mobile application connects to the attendance monitoring service, which calls the authentication service using MDM server Web API. Reliable localization of the device is more difficult. Modern mobile devices can provide information about the device location. This information is ISBN:
4 Figure 2: Attendance monitoring service based on the data obtained from GPS or GLONASS receivers, and from levels of signals in available wireless networks. Our MDM server can get the device location data and provide it to the authorized mobile services. Unfortunately, for indoor environment the coordinates obtained this way have insufficient precision. Better precision may be achieved by combination of multiple localization methods ([8]) and a specific placement of sensors ([3]). When no such techniques are used, the MDM server cannot reliably distinguish between devices located in two adjacent rooms. Yet another problem is that device location data usually contains only planar coordinates, so it is hard to tell at which level of a multistory building the device is located. As the device usually cannot provide sufficiently precise location data, additional information is needed to check if the device is located in the right classroom. We implement three methods of obtaining this additional information. 1. Localization based on the unique data that are available only in the classroom in question. We use temporary QR codes that should be recognized by the attendees mobile device. 2. Localization based on the proximity between devices. In this case, we also use temporary QR codes. This time the students device generates a QR code on the screen, and the instructors device should recognize it. 3. Localization based on the common media such as common Wi-Fi access point, to which all students should connect their devices. Although every classroom has a different set of authentication facilities, sticking to only one universal method that works everywhere, such as QR-code recognition, is not always appropriate. For example, if every student uses an RFID-based access control system to get into the classroom, there may be no need to check attendance again if the necessary data can be obtained from the access control system. Automated attendance monitoring software should be able to interact with all available authentication equipment to collect attendance data. It should also help instructor to select the best available method of attendance checking. The attendance monitoring service uses context to obtain necessary information. The data on event schedule and mobile device location is obtained from the MDM server, as a part of mobile device interaction context. Information on classroom equipment and class membership may be got from university information systems if they are available. This background data forms the full context in which attendance checks occur, and the following features become available. Access to the information on schedule. The list of students who should be attending the lecture becomes automatically available based on the schedule and the information on last-minute changes. Access to location data of specific mobile devices. Location data of students mobile devices may be used in attendance checking to discover cheating attempts. Automatic selection of the best available method of attendance checking. If the attendance management service knows in which classroom the lecture takes place, it may automatically suggest the way the attendance should be tracked. 5 Conclusion This paper is devoted to the architecture of a software platform for building context-aware educational mobile services. This platform is based on the mobile device management system. The MDM server plays two roles. First, it interacts with mobile devices, and forms the context of user interaction with mobile services. Second, the MDM server implements a set of basic features commonly needed by educational services, including user authentication, messaging, and document sharing. As an example, we describe the implementation of an automated attendance monitoring based the platform. The attendance monitoring service is regarded as a context-aware service that is implemented using ISBN:
5 a mobile device management system. This service is integrated with other university services and information systems. The usage of contest and the integration of attendance monitoring and other services allows for selecting the best available method of attendance tracking, making attendance check less disturbing to both students and instructors. Acknowledgements: This research is a part of the joint project by IBS (Moscow, Russia) and Peter the Great St. Petersburg Polytechnic University (St. Petersburg, Russia). This work is financially supported by the Ministry of Education and Science of the Russian Federation (state contract 02.G from ). References: [1] A. K. Dey and G. D. Abowd, Towards a Better Understanding of Context and Context- Awareness, HUC 99: Proceedings of the 1st international symposium on Handheld and Ubiquitous Computing, 1999, pp [2] J. Huizenga, W. Admiraal, S. Akkerman, and G. T. Dam, Mobile game-based learning in secondary education: engagement, motivation and learning in a mobile city game, Journal of Computer Assisted Learning, 25(4), 2009, pp [3] M. Marks, E. Niewiadomska-Szynkiewicz, J. Kołodziej, High performance wireless sensor network localisation system, Int. J. Ad Hoc and Ubiquitous Computing, vol. 17, issue 2/3, pp [4] O. R. E. Pereira and J. J. P. C. Rodrigues, Survey and analysis of current mobile learning applications and technologies, ACM Computing Surveys (CSUR), 46(2), [5] A. Samochadin, D. Raychuk, N. Voinov, D. Ivanchenko, and I. Khmelkov, MDM based Mobile Services in Universities, International Journal of Information Technology & Computer Science (IJITCS), vol. 13, no. 2, 2014, pp [6] A. Samochadin, D. Raychuk, S. Nosnitsyn, and I. Khmelkov, A comprehensive set of mobile services supporting education process, Procedia Social and Behavioral Sciences, vol. 182, 2015, pp [7] A. Samochadin, D. Timofeev, D. Raychuk, I. Khmelkov, Attendance monitoring as a context-aware service, Proc. of 10th International Conference on Educational Technologies (EDUTE 14), 2014, pp [8] S-C. Yeh, W-H. Hsu, Locating schemes based on adaptive weighting strategy in heterogeneous wireless networks, Int. J. Ad Hoc and Ubiquitous Computing, vol. 14, issue. 2, pp ISBN:
Attendance monitoring as a context-aware service
Attendance monitoring as a context-aware service ALEXANDER SAMOCHADIN [email protected] DIMITRI TIMOFEEV [email protected] DMITRY RAYCHUK [email protected] IGOR KHMELKOV IBS Group Holding
A Students Attendance System Using QR Code
Vol. 5, o. 3, 2014 A Students Attendance System Using QR Code Fadi Masalha Faculty of Information Technology Applied Science University ael Hirzallah Faculty of Information Technology Applied Science University
ipad Classroom Installation & Deployment Important information
ipad Classroom Installation & Deployment Important information Our aim is to carry out your installation as quickly and efficiently as possible whilst utilising Apple s recommended procedures for the deployment
How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility
w h i t e p a p e r How To Unify Your Wireless Architecture Without Limiting Performance or Flexibility So much is happening today to give you a chance to rethink your wireless architecture. Indeed, you
Context-aware Library Management System using Augmented Reality
International Journal of Electronic and Electrical Engineering. ISSN 0974-2174 Volume 7, Number 9 (2014), pp. 923-929 International Research Publication House http://www.irphouse.com Context-aware Library
HP Location Aware. Datacon, HP Retail Solutions Christian F. Dupont / October 14, 2014
HP Location Aware Datacon, HP Retail Solutions Christian F. Dupont / October 14, 2014 Mobility trends in retail Mobility enhances user experience and loyalty and enables customer engagement Trends In-Store
Developing Fleet and Asset Tracking Solutions with Web Maps
Developing Fleet and Asset Tracking Solutions with Web Maps Introduction Many organizations have mobile field staff that perform business processes away from the office which include sales, service, maintenance,
NFC Based Equipment Management Inventory System
Journal of Information Hiding and Multimedia Signal Processing c 2015 ISSN 2073-4212 Ubiquitous International Volume 6, Number 6, November 2015 NFC Based Equipment Management Inventory System Rung-Shiang
The Suitability of Native Application for University E-Learning Compared to Web-Based Application
The Suitability of Native Application for University E-Learning Compared to Web-Based Application Maya Novia Sari 1, Noor Azian Bt. Mohamad Ali 2 Department of Information Systems, Kulliyyah of Information
Framework for Biometric Enabled Unified Core Banking
Proc. of Int. Conf. on Advances in Computer Science and Application Framework for Biometric Enabled Unified Core Banking Manohar M, R Dinesh and Prabhanjan S Research Candidate, Research Supervisor, Faculty
Mobile Adaptive Opportunistic Junction for Health Care Networking in Different Geographical Region
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 113-118 International Research Publications House http://www. irphouse.com /ijict.htm Mobile
Deploying iphone and ipad Mobile Device Management
Deploying iphone and ipad Mobile Device Management ios supports Mobile Device Management (MDM), giving businesses the ability to manage scaled deployments of iphone and ipad across their organizations.
Structure Based Enterprise Mobility for Mobile Device Applications for AHMS
, pp.324-328 http://dx.doi.org/10.14257/astl.2014.51.72 Structure Based Enterprise Mobility for Mobile Device Applications for AHMS Regin Joy Conejar 1 and Haeng-Kon Kim 1* 1 School of Information Technology,
Design and Implementation of Automatic Attendance Check System Using BLE Beacon
, pp.177-186 http://dx.doi.org/10.14257/ijmue.2015.10.10.19 Design and Implementation of Automatic Attendance Check System Using BLE Beacon Mi-Young Bae and Dae-Jea Cho * Dept. Of Multimedia Engineering,
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Performance Measuring in Smartphones Using MOSES Algorithm
Performance Measuring in Smartphones Using MOSES Algorithm Ms.MALARVIZHI.M, Mrs.RAJESWARI.P ME- Communication Systems, Dept of ECE, Dhanalakshmi Srinivasan Engineering college, Perambalur, Tamilnadu, India,
A Multi-Agent Approach to a Distributed Schedule Management System
UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in
Automatic Attendance and Mobile Learning System in Sensor-Enabled Heterogeneous and Dynamic University Environment.
Automatic Attendance and Mobile Learning System in Sensor-Enabled Heterogeneous and Dynamic University Environment. Odabi I. Odabi 1 and Erhiri Orobosa Jonathan 2 1 1 Dept. of Computer and Physical Sciences,
A Semantic Approach for Access Control in Web Services
A Semantic Approach for Access Control in Web Services M. I. Yagüe, J. Mª Troya Computer Science Department, University of Málaga, Málaga, Spain {yague, troya}@lcc.uma.es Abstract One of the most important
Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System
Formal Modeling for Multi-Level Authentication in Sensor-Cloud Integration System Dinesha H A Crucible of Research and Innovation PES Institute of Technology BSK 3 rd Stage Bangalore-85 R Monica M.Tech
VEHICLE TRACKING SYSTEM USING GPS. 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune. 2 Asst. Professor, SCOE, Vadgaon, Pune
VEHICLE TRACKING SYSTEM USING GPS Pooja P. Dehankar 1, 1 Student, ME (IT) Pursuing, SCOE, Vadgaon, Pune Prof. S. P. Potdar 2 2 Asst. Professor, SCOE, Vadgaon, Pune Abstract- Global Positioning System is
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
The Ubiquitous Web, UPnP and Smart Homes
The Ubiquitous Web, UPnP and Smart Homes Franklin Reynolds Nokia Research Center, Cambridge [email protected] 1 NOKIA PCG.PPT / 15 6 2004 / Franklin Reynolds Our Vision "The essence of this vision
Mobile Commerce and Ubiquitous Computing. Chapter 6
Mobile Commerce and Ubiquitous Computing Chapter 6 Learning Objectives 1. Discuss the value-added attributes, benefits, and fundamental drivers of m-commerce. 2. Describe the mobile computing infrastructure
Mobility Management usually includes two parts: location management and handoff management.
Part 9: Mobile Data / Mobility Management I. Mobile Data Services/ Management This broad area involves a lot of industrial applications. Mobile data services/ management is becoming another profitable
AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD
AN IMPLEMENTATION OF E- LEARNING SYSTEM IN PRIVATE CLOUD M. Lawanya Shri 1, Dr. S. Subha 2 1 Assistant Professor,School of Information Technology and Engineering, Vellore Institute of Technology, Vellore-632014
Comparative Study of GPS Positioning For Vehicles with Algorithms in Global and Local Position
Comparative Study of GPS Positioning For Vehicles with Algorithms in Global and Local Position Manoher Kumar bishwas MCA Final Year Veltech Technical University Avadi,Chnnai-62 [email protected]
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies
3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies This paper describes a new framework of policy control sensor networks. Sensor networks are shared by various applications,
Context-Aware Role Based Access Control Using User Relationship
International Journal of Computer Theory and Engineering, Vol. 5, No. 3, June 2013 Context-Aware Role Based Access Control Using User Relationship Kangsoo Jung and Seog Park We suggest relationship-based
Open Access Research and Design for Mobile Terminal-Based on Smart Home System
Send Orders for Reprints to [email protected] The Open Automation and Control Systems Journal, 2015, 7, 479-484 479 Open Access Research and Design for Mobile Terminal-Based on Smart Home System
WatchGuard SSL 2.0 New Features
WatchGuard SSL 2.0 New Features For Secure Remote Access, Identity Management, and Network Access Control Introduction WatchGuard SSL 2.0 unifies identity and access management capabilities, with features
SharePoint Deployment at the FSU College of Education
SharePoint Deployment at the FSU College of Education This document presents benefits of Microsoft Share Point (SP) for the College of Education faculty and staff, highlights critical success factors,
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Integrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
Comparative Analysis of Several Real-Time Systems for Tracking People and/or Moving Objects using GPS
Comparative Analysis of Several Real-Time Systems for Tracking People and/or Moving Objects using GPS Gligorcho Radinski and Aleksandra Mileva University Goce Delčev, Faculty of Computer Science Krste
Pedagogical Use of Tablet PC for Active and Collaborative Learning
Pedagogical Use of Tablet PC for Active and Collaborative Learning Oscar Martinez Bonastre [email protected] Antonio Peñalver Benavent [email protected] Francisco Nortes Belmonte [email protected]
Structure Based Mobile Device Applications Enterprise Mobility
, pp.265-272 http://dx.doi.org/10.14257/ijseia.2014.8.6.21 Structure Based Mobile Device Applications Enterprise Mobility Regin Joy Conejar 1 and Haeng-Kon Kim 1* 1 School of Information Technology, Catholic
A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools
A Brief Insight on IOS deployment in Education System- need for 3 rd Platform implementation in Schools I hope you remember Meraki, a company involved in making sensors and which was sold to IBM few years
MOBILE SOCIAL NETWORKS FOR LIVE MEETINGS
Computer Science 13 (4) 2012 http://dx.doi.org/10.7494/csci.2012.13.4.87 Michał Wrzeszcz Jacek Kitowski MOBILE SOCIAL NETWORKS FOR LIVE MEETINGS Abstract In this article, we present an idea of combining
Efficiency Through Information. CONSTRUCTION Equipment AND
Efficiency Through Information CONSTRUCTION Equipment AND ASSET MANAGEMENT SOLUTIONS A Complete Solution for the Construction Industry Trimble Construction Manager software One Solution for Managing All
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION
A SMART, LOCATION BASED TIME AND ATTENDANCE TRACKING SYSTEM USING ANDROID APPLICATION Shermin Sultana 1, Asma Enayet 1 and Ishrat Jahan Mouri 1 1 Department of Computer Science and Engineering, Stamford
iphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone 3G is ready for business. It supports Microsoft Exchange ActiveSync, delivering push email, calendars, and contacts. And it gives mobile users secure
ipad in Business Mobile Device Management
ipad in Business Mobile Device Management ipad supports Mobile Device Management, giving businesses the ability to manage scaled deployments of ipad across their organizations. These Mobile Device Management
MOBILE ARCHITECTURE BEST PRACTICES: BEST PRACTICES FOR MOBILE APPLICATION DESIGN AND DEVELOPMENT. by John Sprunger
MOBILE ARCHITECTURE BEST PRACTICES: BEST PRACTICES FOR MOBILE APPLICATION DESIGN AND DEVELOPMENT by John Sprunger When developing mobile applications, there are a number of key challenges where architecture
Adobe Solutions for Learning Management Systems (LMS)
Solution Brief for Education Adobe Solutions for Learning Management Systems (LMS) Discover exciting, new ways to create and deliver high-impact elearning content and provide interactive online learning
iphone in Business Mobile Device Management
19 iphone in Business Mobile Device Management iphone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iphone across their organizations. These Mobile Device
Using Social Networking Sites as a Platform for E-Learning
Using Social Networking Sites as a Platform for E-Learning Mohammed Al-Zoube and Samir Abou El-Seoud Princess Sumaya University for Technology Key words: Social networks, Web-based learning, OpenSocial,
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Improving Network Management with Software Defined Networking
Improving Network Management with Software Defined Networking Hyojoon Kim and Nick Feamster, Georgia Institute of Technology 2013 IEEE Communications Magazine Presented by 101062505 林 瑋 琮 Outline 1. Introduction
Meru MobileFLEX Architecture
Meru MobileFLEX Architecture Bringing new levels of choice and control to enterprise wireless LANs Mobility has transformed work from a location to an activity. Smartphones, tablets, and laptops enable
Design and Implementation of an Integrated Contextual Data Management Platform for Context-Aware Applications
Design and Implementation of an Integrated Contextual Data Management Platform for Context-Aware Applications Udana Bandara 1,2 Masateru Minami 1,3 Mikio Hasegawa 1 Masugi Inoue 1 Hiroyuki Morikawa 1,2
IMPLEMENTATION OF E LEARNING AT BUSINESS LAW COURSE
IMPLEMENTATION OF E LEARNING AT BUSINESS LAW COURSE Ana Nikodijević, Faculty of Organizational Sciences, [email protected] Jelena Anđelković, Faculty of Organizational Sciences, [email protected]
CodeDroid: A Framework to Develop Context-Aware Applications
CodeDroid: A Framework to Develop Context-Aware Applications Lillian B. R. de Oliveira Antonio A. F. Loureiro Department of Computer Science Federal University of Minas Gerais 31270-010 Belo Horizonte,
EC 350 Simplifies Billing Data Integration in PowerSpring Software
White Paper EC 350 Simplifies Billing Data Integration in PowerSpring Software Executive Summary In the current energy environment, gas-metering data must be collected more frequently and in smaller increments
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Good for Enterprise Good Dynamics
Good for Enterprise Good Dynamics What are Good for Enterprise and Good Dynamics? 2012 Good Technology, Inc. All Rights Reserved. 2 Good is far more than just MDM Good delivers greater value and productivity
Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014
Securely Manage your devices, applications and data. Deploy your corporate policies on smart devices. Comply with Regulatory Laws. Auditing the Security and Management of Smart Devices ISACA Dallas Meeting
Kaspersky Security for Mobile
Kaspersky Security for Mobile See. Control. Protect. MOVING TARGETS Mobile devices play a key role in connectivity and productivity. But they also introduce new risks to the business: in the past 12 months
HOL9449 Access Management: Secure web, mobile and cloud access
HOL9449 Access Management: Secure web, mobile and cloud access Kanishk Mahajan Principal Product Manager, Oracle September, 2014 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Oracle
The Challenge. The Solution. Achieve Greater Employee Productivity & Collaboration...while Protecting Critical Business Data
The Challenge The Solution Today's employees demand mobile access to office information in order to maximize their productivity and they expect that enterprise collaboration and communication tools should
Cellular Data Offload. And Extending Wi-Fi Coverage. With Devicescape Easy WiFi
Cellular Data Offload And Extending Wi-Fi Coverage With Devicescape Easy WiFi Case Study October 2010 List of Acronyms 3G Third Generation 4G Fourth Generation API Application Programming Interface AP
Mobility Management in Mobile Cloud Computing
Mobility Management in Mobile Cloud Computing Karan Mitra Luleå University of Technology Skellefteå, Sweden [email protected] https://karanmitra.me 19/06/2015, Nancy, France Agenda Introduction M2C2:
INTEGRATING RADIO FREQUENCY IDENTIFICATION TECHNOLOGY IN ACADEMIC MANAGEMENT SYSTEM
Journal of Computer Science 10 (2): 361-365, 2014 ISSN: 1549-3636 2014 doi:10.3844/jcssp.2014.361.365 Published Online 10 (2) 2014 (http://www.thescipub.com/jcs.toc) INTEGRATING RADIO FREQUENCY IDENTIFICATION
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Meru MobileFLEX Architecture
Meru MobileFLEX Architecture Bringing new levels of choice and control to enterprise wireless LANs Today, network management is a tug-of-war between user demands and IT requirements. Users are pulling
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
Indoor Surveillance Security Robot with a Self-Propelled Patrolling Vehicle
C Indoor Surveillance Security Robot with a Self-Propelled Patrolling Vehicle Hou-Tsan Lee, Wei-Chuan Lin, Jing-Siang Huang Department of Information Technology, TakMing University of Science and Technology
Improving Online Security with Strong, Personalized User Authentication
Improving Online Security with Strong, Personalized User Authentication July 2014 Secure and simplify your digital life. Table of Contents Online Security -- Safe or Easy, But Not Both?... 3 The Traitware
Firewall Configuration based on Specifications of Access Policy and Network Environment
Firewall Configuration based on Specifications of Access Policy and Network Environment A. Titov, V. Zaborovsky Saint-Petersburg State Polytechnical University, Russia [email protected], [email protected] Abstract
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
The TrimTrac Locator: A New Standard in Practical and Affordable Asset Tracking
The TrimTrac Locator: A New Standard in Practical and Affordable Asset Tracking By Bill Dussell Director, Integrated Products Trimble Navigation 15-December-2003 1997 2003, Trimble Navigation Limited.
OWA vs. MDM. Once important area to consider is the impact on security and compliance policies by users bringing their own devices (BYOD) to work.
OWA vs. MDM Introduction SmartPhones and tablet devices are becoming a common fixture in the corporate environment. As feature phones are replaced with new devices such as iphone s, ipad s, and Android
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
Android Developer Applications
Android Developer Applications January 31, 2013 Contact Departmental Privacy Office U.S. Department of the Interior 1849 C Street NW Mail Stop MIB-7456 Washington, DC 20240 202-208-1605 [email protected]
Mobile Device Management for CFAES
Mobile Device Management for CFAES What is Mobile Device Management? As smartphones and other mobile computing devices grow in popularity, management challenges related to device and data security are
HCC ONLINE COURSE REVIEW RUBRIC
HCC ONLINE COURSE REVIEW RUBRIC Adapted from Maryland Online FIPSE Project and Lake Superior College I. COURSE OVERVIEW AND INTRODUCTION General Review Standard: The overall design of the course, navigational
Checklist: 5 Essential BaaS Features Every Mobile App Needs
RAD Studio Checklist: 5 Essential BaaS Features Every Mobile App Needs Today, apps are connected with an expectation to easily store information across multiple platforms and devices while still providing
ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 4, Issue 8, February 2015
The Research for Using Some Opportunities of Cloud Computing in Distance-Learning (module of State University of Agriculture in Mongolia) Bat-Erdene Nyandag 1 1 Department of Computer Sciences, Inner Mongolia
Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm
Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect
esarinformation Systems Simplifying your Technology Mobile Applications Development Profile
esarinformation Systems Simplifying your Technology Mobile Applications Development Profile Why Mobile Application Custom mobile application with a unique touch is much needed to boost the functions and
Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.
Table of Contents Section 1: Executive summary...1 Section 2: The challenge...2 Section 3: WLAN security...3 and the 802.1X standard Section 4: The solution...4 Section 5: Security...4 Section 6: Encrypted
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS
A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS K.B.Chandradeep Department of Centre for Educational Technology, IIT Kharagpur, Kharagpur, India [email protected] ABSTRACT This paper
YOUR INFRASTRUCTURE WILL SUPPORT YOUR SCHOOL S NEEDS 3 TO 5 YEARS FROM NOW.
YOUR INFRASTRUCTURE WILL SUPPORT YOUR SCHOOL S NEEDS 3 TO 5 YEARS FROM NOW. TRUE OR FALSE? FIVE QUESTIONS K-12 SCHOOL DISTRICTS SHOULD ASK THEMSELVES AS THEY PREPARE STUDENTS, TEACHERS AND TECHNOLOGIES
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations
Development of Integrated Management System based on Mobile and Cloud service for preventing various dangerous situations Ryu HyunKi, Moon ChangSoo, Yeo ChangSub, and Lee HaengSuk Abstract In this paper,
Meru Education-grade Solutions for Uninterrupted Learning SOLUTION BRIEF HIGHER EDUCATION
Meru Education-grade Solutions for Uninterrupted Learning SOLUTION BRIEF HIGHER EDUCATION WLAN Solutions for Higher Education Many campus networks are being crushed by the bring your own device (BYOD)
