Project Management Methodology for the Development of M-Learning Web Based Applications
|
|
|
- Blaise James Hampton
- 10 years ago
- Views:
Transcription
1 Informatica Economică vol. 14, no. 3/ Project Management Methodology for the Development of M-Learning Web Based Applications Adrian VIŞOIU Academy of Economic Studies, Bucharest, Romania M-learning web based applications are a particular case of web applications designed to be operated from mobile devices. Also, their purpose is to implement learning aspects. Project management of such applications takes into account the identified peculiarities. M-learning web based application characteristics are identified. M-learning functionality covers the needs of an educational process. Development is described taking into account the mobile web and its influences over the analysis, design, construction and testing phases. Activities building up a work breakdown structure for development of m-learning web based applications are presented. Project monitoring and control techniques are proposed. Resources required for projects are discussed. Keywords: Software Project Management, M-Learning Applications, Web Applications, Methodology 1 Introduction M-learning is an educational process based on mobile technologies. M-learning as a concept is practically implemented via m- learning applications. Developing an m- learning application is a complex task. Educational, technological and management elements are taken into account when developing an m-learning application is established as an objective. In higher education institutions there are research centers that deal with research projects, such that organizational infrastructure is fit to a project type approach. A common development approach for m- learning applications is organizing all the activities under the form of a project. The project has as objective delivering a working m- learning application. In the project numerous people are involved. Teachers, students, analysts, designers, developers collaborate in the project team. Numerous types of material resources are involved. A dedicated project management is required for specific elements of this type of software development. Further, mobile application development has many directions. Project management, as well as specific tasks vary with the type of application that is intended to obtain. This paper covers the problem of project management for web based m-learning applications. 2 M-Learning Web Based Applications Characteristics M-learning web based applications are a very particular case found at the intersection of three categories of applications: e-learning applications, mobile applications and web applications. Mobile applications are applications designed to run on mobile devices like smartphones. Compared to applications that run on personal computers, there are differences regarding the development technologies and also important hardware differences. Considering the architecture, there are similar classifications: web based/distributed applications accessible via web browsers; client server applications where certain aspects of the application run natively on the device and other modules are addressed remotely; standalone applications that run entirely on the device. Web applications are applications that are accessed over the Internet or intranet. The common structure of a web application consists of tiers. The presentation tier resides on the client web browser that renders the user interface. The functionality and the application logic reside at the second tier, called business tier, on the web/application server
2 76 Informatica Economică vol. 14, no. 1/2010 running a dynamic content generation engine. The third tier is the storage tier residing on a database server. When interacting with the application at client level, data containing both required information and commands are posted from the web page to the web server. At web server level, queries are run against the database server to retrieve useful information for the user. The retrieved information is processed on the web server using the dynamic technologies like ASP.NET, JSP or PHP. Processing results are stored back into the database or presented to the user via dynamically generated web pages. Advantages of web applications are: they do not require following special installation procedures on client machines; installation and configuration is done on the necessary servers; the client has little performance requirements as all the intensive processing is distributed to the web/application server and database server; any change/patch/upgrade in the product is reflected to all clients instantaneously without effort; they are accessed via a web browser; web browsers implement industry standards, web applications being compatible with all operating systems; users that commonly use web browsers will easily accept such application. Disadvantages of web applications are: the weak link is the connection between the client and the web server and also the connection between the web/application server and the database server; each of these components is placed remotely one from another and an unavailable connection leads to interruptions in work; security problems related to information transport over the networks and user activity tracking; scarce interfaces due to the web limitations; there are ways of improving interfaces look but any complicated approach is subject to compatibility problems as certain features are not implemented the same way on different web browsers. M-learning applications refer to software intended to support learning process using the mobile technologies. If mobile devices like smartphones are taken into account then m-learning applications are likely to become widespread as the number of devices having important processing capabilities rises. Advantages of m-learning applications include: student s contact with new technology; easy carrying everywhere as opposed to a laptop/desktop computer; collaboration between students; m- learning applications encourage students to contribute with content and give feedback on content; they are motivational for students if they have game like approaches; There are also many aspects that have to be overpassed, aspects the come from the device characteristics: device s batteries run out; the devices have small screen for viewing; small storage space compared to a PC; device processing power is small. The intersection between the types of applications that give birth to m-learning web based applications is presented in Figure 1. web applications m-learning web based applications m-learning Fig. 1. The place of m- learning web based applications Developing m-learning applications is where mobile developers and teachers come in contact. Solid mobile development is required to obtain high quality software in this particular
3 Informatica Economică vol. 14, no. 3/ environment. The Web content is standardized by markup languages, styles, scripts and multimedia, all these being viewed using web browsers. There are differences between the mobile web and desktop web as presented in [1]: there are markup languages and styles specific for mobile devices; different MIME types; browsers differ in capabilities; network proxies that adapt content. The context of m-learning web based applications is given by: small screen sizes; small resolutions; browser bugs; ignored standards; available languages: XHTML, HTML, XHTML Mobile Profile, CHTML, WML; Javascript and AJAX, not on all the phones; browser plugins; not all browsers support or implement the same way. The web browsers differ in functionality: Internet Explorer (Windows Mobile) markup support: HTML 4.01, XHTML 1.0 and 1.1, XHTML MP, XHTML Basic; style support: CSS 2.1, CSS mobile profile 1.0, Wireless CSS 1.1; scripting support: Jscript 5.6, DOM 1 and partially 2 and 3, AJAX; AJAX is handled via ActiveX object Microsoft.HMLHTTP not JavaScript s XMLHTTPREQUEST; also has ActiveX objects and Flash support; Opera Mini/Mobile (J2ME/platform specific); markup support: XHTML 1.0, HTML 4.01 and partially 5, WML 1.3; style support CSS 2 and 3; scripting support JavaScript, DOM 2, AJAX; Flash plugin; BlackBerry browser; implements mobile web standards: XHTML-MP, WML, Wireless CSS, HTML 4.01, DOM 2, JavaScript, AJAX; Nokia Browser; Based on WebKit browser; supports XHTML, JavaScript AJAX, Flash plugin; Android Browser; based on WebKit browser; supports web standards; Safari for IPhone; WebKit based browser; Generic WebKit browser; open source project implemented on many platforms; supports HTML 4.01, XHTML 1.0, partially HTML 5; styles: CSS 2.1, partially 3; scripting JavaScript, AJAX, DOM M-learning applications are intended to offer functionality both to students and teachers. System forum Online Course Exam content management Student Feedback assess tests, homeworks Trainer Homework Fig. 2. Use case diagram for an m-learning application Figure 2 shows the use case diagram for an m-learning application containing top level
4 78 Informatica Economică vol. 14, no. 1/2010 use cases that reflect general functionality of m-learning applications. The administration of the m-learning applications is achieved via a content management system. The content management system is structured into modules: online courses/lessons; lectures and seminars as study material that has to be accessed by the students; assignments; there are deadlines for assignments; teacher adds notes received assignments giving feedback to students; resubmission is possible; chatting; permits a direct contact between teachers and students; forum; permits offline interaction between the study group; quiz/test; offers testing and functionality; wiki; collaborative environment where everybody contributes with information on relevant subjects. The m-learning web based application is a complex content management system. Modules are developed according to priorities. First the online course/lessons is developed. Assignments and tests follow. These cover the main aspects needed for learning. Then forums and wiki s are developed to round up the image of a complex m-learning application. An important aspect of an m-learning application is security. The application is accessed by many users. Users have different roles. Students may read course information freely. Course information is added only by teachers. The students submit assignments. They must be correctly identified. Also only teachers can see submitted assignments. The notes the teacher adds to assessed assignments can be seen only by the corresponding student. As seen above, the functionality of the application is put in correspondence to user roles such way a certain role has limited access to information. This part covers security authorizations. Further, a proper identification of users must be done in order to ensure that an authenticated user is the person it pretends to be. A classical approach is the use of a username and password. We are not discussing here the problems associated to network traffic security and required encryption. Strictly form usability point of view, this approach is difficult as the screen size is small and available keyboards are difficult to operate even on touch screen devices. Also, a non QWERTY keyboard requires many pressings to obtain a character, leading to high probability of wrong login data to be entered. On some devices, the letter pressed in a password field is shown for a small time reducing input errors but increases the probability of password interception. An improvement for the username password technique is the use of additional questions having personal information required. Personal information is stored securely in the application database or taken from the institution s database and a random question is put. Best practices for web application security suggest: working with no cookies; passing session id in URL; usage of security certificates and HTTPS protocol for authentication. These security elements are placed at mobile browser web server interaction. Further security regards stored information. The database contains sensitive information such as: account information; personal information; students marks; submitted assignments; test and quizzes questions and answers; history of taken tests and exams for each student. Each of these elements may be subject to unauthorized access. Security measures must take care of the following aspects: data integrity; protect the existing data from intentional or accidental corruption; keeping the integrity of submitted assignments is useful as they prove that the student accomplished assigned tasks and received marks or points for the work done; every mark given by a teacher needs a support to be assessed and every student that sent his assignment needs to be sure that submitted information is not lost and will be subject to evaluation; the same procedure applies to exams as well;
5 Informatica Economică vol. 14, no. 3/ protection against unauthorized access; if database is read by unauthorized persons such way that table definitions, table data are visible, sensitive information must not be understandable to such attackers; the solution is to keep sensitive data encrypted; account information such as username and password may be stored as hashes; sensitive personal information is subject to encryption using recommended standards; backup; the database has to be backed up on a regular basis; in case of incidents, database content must be recovered rapidly such way the educational process is not affected. Security measures do not apply only to static aspects of the web application. Security procedures must address complex activities such as exams. When taking exams, the following aspects must be covered: identity of the examinee must be established; access to course information must be blocked; when a student is logged in to the application in exam mode access to study resources is automatically blocked; this is a feature of the m-learning application; further access to other network resources must be limited by the network administrator; if the exam takes place in a classroom, then the wireless router is configured to permit access only to the m- learning application server; this latter feature is not opposable to the application, but is covered at institutional level; ensuring exam consistency; all the examinees must submit a variant of the answers, either intentionally or automatic submit at expiration time; non-repudiation once submitting the answers the examinees cannot negate their actions and answers to the questions. 3 Project Management Cycle The project management of m-learning web based applications takes into account the peculiarities of such applications. In order to create a work breakdown structure for m-learning web based applications, an inventory of the work packages or tasks from the literature is done. in [2] there are presented: research, scriptwriting, implementation, validation, project management, testing, closing, lessons learned; in [3] there are presented: planning, design, construction, testing, documentation, deployment; in [4] there are presented: project management and implementation, planning and concept, design, construction, testing, implementation and closing. As seen above, there are common work packages with other software projects. The differences come into light when looking at the specific tasks for each work package. Project management work package is a main component of the WBS. This work package consists of tasks that cover the whole duration of the project. These tasks are the following, as presented in [5]: project initiation; project planning; project execution; project monitoring; project closing. Other work packages and tasks cover aspects both of the m-learning field and web development. Documentation is a work package containing the activities needed to obtain the content that later fills the application. The tasks for documentation are: researching relevant bibliographic sources; the outcome is the list of identified relevant sources; elaboration of study materials: includes courses, seminar support, homework; the outcome is the electronic content with the mentioned elements; elaboration of tests; includes questions and answers, thresholds, reward points. Documentation obtains all the materials needed to run the discipline and later to be introduced in the application. Analysis is a work package grouping tasks related to obtaining a clear description of what has to be done. The tasks are: business model; this describes how the
6 80 Informatica Economică vol. 14, no. 1/2010 learning activity takes place; requirements specification; what are the requirements for the application; the requirements include functional requirements regarding the logic of the application and non-functional requirements related to: technical restrictions, security requirements, interface requirements, product quality characteristics. Results of the analysis are reports containing the best and recommended approaches. Design is a work package grouping tasks related to the definite way the application will be built. Related tasks are: website design; includes the structure as a sitemap; interface design; each page is designed in terms of areas and controls; design fulfill mobile web standards and address mobile restrictions that represent a peculiar feature of these applications; also design must be in concordance with specified quality characteristics of usability and readability as defined in requirements; database design is a task which is independent from the type of application; detailed use cases; each functionality is detailed to highlight the algorithms that lead to obtaining significant results for users; further those algorithms will be translated into code in the next phases; storyboard; a nonfunctional prototype is built to create an actual representation of the product. For designing the site structure, some elements are taken into account: users that access the site; the context of accessing teaching, exam, homework; target devices; is the institution endowed with mobile devices all of a kind for certain classes or the application is meant to run on personal mobile devices which have different characteristics; tests must be done using XHTML to obtain the look and feel of the final product. At design time there are established: technologies used; programming languages; multimedia elements; database systems; devices needed; hosting requirements. The result of finishing the design work package is a structure ready to be implemented. After everything is known in detail, acquisitions are made. Acquisition work package deals with obtaining the material support to run the project. Tasks include: hosting acquisition; if it is decided that the application is hosted on external servers, then a hosting plan must be bought; materials acquisition; the necessary materials needed to implement the application are: mobile devices, if the objective is to built a class based on m-learning, then devices must be available to all students; network elements, such as, routers, cables and other materials identified as necessary for implementation; licenses acquisition; if in the design phase it is decided to use proprietary software, licenses must be acquired. Construction is a work package containing tasks related to the actual translation of the design into a real working product. Tasks for construction are: database creation; the design model is implemented on a database server; application development: includes interface development, server side development; database populating; the content developed in documentation stage is inserted into the database; Construction gives a working application. Testing is a work package containing tasks related to checking that the product is in conformity with the specifications and works correctly. Tasks are: detail testing; as the modules are developed they are tested for correctness in a standalone manner; ensemble testing; the application is tested as a whole, in lab conditions, on phones or phone emulators; user testing; the application is tested by the actual categories of users that come in contact with it: small groups of students and teachers; this testing must cover as
7 Informatica Economică vol. 14, no. 3/ many mobile devices as possible such way to reduce the probability of encountering devices that are not compatible with the application. In testing both device emulators and actual devices are used. Emulator testing and development has both advantages and disadvantages: development environments are easily integrated with device emulators; emulators cover the major functionality of a real device; this includes operating system, built-in applications; third-party applications; phone functionality is covered via instruments that simulate a telephony network and allow fake phone calls, messages; emulators are easily configured for internet/intranet access; testing critical applications is harmless as any destructive change to the emulator can be undone via hard reset; some functionality is unavailable on emulators; for example, on some platforms Bluetooth development cannot be done on emulators as Bluetooth functionality is not supported; the respective vendors encourage development on real devices; the crucial debug-on-device feature is available both on emulators and real devices for the main development platforms; emulators are operated via computer inputs which differs from real life usage; complex interface and sensor support cannot be reproduced on emulators on development PC; multi-touch screens, multitouch gestures, accelerometer gestures, continuously changing GPS position are elements difficult to implement or test on an emulator; not in the last place, emulators are mainly free as devices with high capabilities are very expensive. Implementation and closing is a work package related to transferring the working application in the real environment. Tasks include: application deployment; the application is published from the production server to the public server; settings are changed accordingly; database deployment; the database is published on the public server; training; teachers and students are trained to use the application; if quality requirements are specified according to mobile world restrictions with emphasis on usability, readability, simplicity training is easy as the application is accepted by the users; closing; if all phases ended successfully the project is terminated with positive review. All these work packages are gathered in a general work breakdown structure for m- learning web based application projects as presented in Figure 3. Further, each of these identified tasks is divided in subtasks. This level of granularity is specific to each project as some activities have different priorities given different requirements.
8 82 Informatica Economică vol. 14, no. 1/2010 Fig. 3. General WBS structure for m-learning web based application development Dependencies are identified between tasks. The activities are considered nodes in a graph associated to the project. Taking into account planned start and end dates, critical paths and time reserves are to be found. The critical path gives the manager the axe of activities where to pay attention as any delay leads to falling behind scheduling for the whole project. Time reserves show the manager what activities may be delayed such way the end date of the project is not affected. 4 Progress Measures Measuring the project progress is a continuous task. The project plan establishes tasks, durations, resources, costs and performance criteria for the work done. When running the project certain deviations from the plan appear. The project manager has to take corrective actions to avoid losses in terms of money, resources or time. Monitoring and controlling the project consists of: assessing current project status comparing planned with actual values; Results of monitoring are: rescheduling the project; when some tasks are behind schedule; re-budgeting; re-assignment of staff and resources. Objective measures are recommended for a successful project monitoring and control. Such a method is the Earned Value Management. To implement the method there are necessary: a project plan, a valuation of planned work and quantification of accomplished work. Consider the tasks A 1, A 2,, A n, building up project P, the earned value, the planned value of the project, at a moment t is: PPV(t) = i PV(A i ), planned_end(a i )<t, where PPV the planned value of the project; PV(A i ) the planned value of task A i ; planned_end(a i ) function returning the planned end time of A i task. The earned value of the project at moment t is PEV(t) = i where PV(A i ), actual_end(a i )<t,
9 Informatica Economică vol. 14, no. 3/ PEV the planned value of the project; PV(A i ) the planned value of task A i ; actual_end(a i ) function returning the actual end time of A i task. Also, another indicator comes in to enlarge the analysis area, the actual cost: PAC(t) = i AV(A i ), actual_end(a i )<t, where PAC the actual cost of the project up to moment t; AV actual value to complete task A i ; actual_end(a i ) function returning the actual end time of A i task. Based on these indicators, other measures are derived to interpret project status. The project scheduled variance PSV is computed as: PSV = PEV-PPV. The project cost variance is computed as: PCV = PEV- PAC. If PSV is positive then the project is ahead schedule. If PCV is positive then costs were under budget. Also another set of indicators is derived. The Schedule Performance Index, SPI is SPI = PEV/PPV. The cost performance index is CPI = PEV/PAC. Positive interpretations arise when SPI>1 and CPI>1. Monitoring these indicators at certain moments of time the project manager may tell whether the project fell behind schedule or not, whether the project was under budgeted or not. Beside the financial point of view there are indicators showing progress of individual tasks. For development stage progress may be assessed by indicators taking the form of: DI = DM/TM, where DI application s degree of implementation; DM number of developed modules; TM total number of modules. The DI indicator shows what fraction of the implementation activity is finished. In a similar manner, in testing phase, when dealing with applications designed to run on various platforms, the degree of portability testing, DP, has the form: DP = NTP/TNP, where DP degree of testing for portability; NTP number of tested platforms; TNP total number of platforms. Accordingly, indicators are built for each phase or work package. Indicators must be built such way that: they reflect correctly the aspects undergoing analysis; they are easy to interpret; data collection is straightforward, without burdening the project work; the mathematical expressions are simple. Project monitoring and control is efficient only if the manager not only looks at performance indicators but also if corrective actions and decisions are taken to lead to accomplishments of established objectives. 5 Resource Allocation, Costs and Risks Many resources are necessary to complete an m-learning project. Regarding human resources, the project manager has to build a team where roles are well defined. The common roles in a team, taking into account the peculiarities of the m- learning web application project management are: chief writer: the person who decides what the content must contain; it the higher education can be the chief of the discipline the application is developed for; technical writer: the person who has the responsibility of creating content for the m-learning application according to the indications of the chief writer; both professors and best students may be involved in this activity; analyst: analyses the requirements of the m-learning application; database designer: designs a database according to necessary data for the application; software designer: designs the architecture of the application; programmer: translates into code the design specifications; tester: verifies application behavior according to test cases;
10 84 Informatica Economică vol. 14, no. 1/2010 database administrator: manages the database server; server administrator: manages the web server; Material resources are used by people to execute the tasks they have been assigned to. Material resources relevant to web based m- learning application development include: PC stations with office applications and internet access; they are used for writing documentation; development stations; computers with software development tools, used by analysts and programmers; development server; necessary to host the web application under development; after the application is completed it is further deployed to a production if server; the production server is not a resource as it is a deliverable of acquisition phase; if the production is external to the company/university then in acquisition a hosting plan is acquired; if it is internal to the university, then the device is bought also in acquisition phase; network devices: routers, access points, cables; if the application is meant to be accessed via the university network, then the classroom must be equipped with wireless access devices such as routers; printers, paper, cartridges; the elaboration of management documents, the reports of analysis and design phases, the didactic materials require printed versions; CD/DVD, external hdd or other storage devices; the work performed is kept electronically; backups are required for written code and database information; mobile devices for development; they are required to develop/test the application in a real environment; must not be confused with the devices from acquisition phase which are deliverables and will supply the classroom; the development devices are assigned to programmers; many features have to be tested on real devices as there are still many differences between real devices and emulators; The resources that are not enough, are scheduled the manager having the role of assigning resources. Costs that the project manager has to pay attention to are: software licenses; some software products have per computer license; in order to keep legal aspects of software development licenses must be acquired; hosting plans; service maintenance: devices are subject to failures; salaries; the amount of work a person does is multiplied with hourly wage; the amount of work for a person is obtained from the duration of the tasks that person has been assigned to; costs of materials; the manager inventories the necessary materials for the project and estimates costs; Many cost categories are subject to restrictions. The manager has to pay attention to maximum or minimum thresholds imposed by law or by higher level management. Risks must be taken into account for a successful project management. Risks are inventoried by the project manager. They are described, the probability of appearance is assessed and predefined actions to reduce the impact are established. There are risks common with other types of projects and specific risks for the particular type of the project. Common risks with software projects include: schedule risks; wrong estimations of task durations; budget risks; wrong estimations or unexpected cost overruns; operational risks; related to the implementation of working processes; technical risks; specific problems to software development. Particular risks for software development of m-learning applications are: changing requirements; requirement stage is an early step in development; if changes to requirements occur when development is in late stages such as construction and testing, the induced modifications propagate through all stages causing additional work to be performed;
11 Informatica Economică vol. 14, no. 3/ incompatibilities between platforms is a major risk; it may occur inclusively when deploying the application from the development server to the production server; inconsistent rendering content; the same content is rendered differently on separate devices of different platforms; application is rejected by the users; accessibility and usability must play an important role in the design of the application. 6 Conclusions M-learning web based applications have certain particularities among mobile and web applications. These particularities lead to specific project management approaches. These peculiarities are found in: mobile technology as built-in; functionality of m-learning application; project management cycle; resources used; costs; risks; project team; software development. Each m-learning web based project is unique. The project manager has to evaluate the situation and based on the proposed structure has to identify the needed elements to define the project accordingly in terms of objectives, tasks, resources, budgets, risks. Acknowledgements This work was supported by CNCSIS UEFISCSU, project number PNII IDEI 2637/2008, project title: Project management methodologies for the development of mobile applications in the educational system. References [1] G.R. Frederick and R. Lal, Beginning Smartphone Web Development. Apress Publishing, 2009, pp [2] European Air Traffic Management, Best Practices for E-Learning Developers in ATM. [Online]. Available: y/content/public/docs/ DELIVERABLES/E_learning_Practices_ V1_Aug07_REP_HUM.pdf [3] D. Brandon, Project management for modern information systems. Idea Group, 2006, pp [4] work-breakdown-structure.aspx [5] P. Pocatilu, Using cloud computing for E-learning systems, in Proc. 8th WSEAS international conference on Data networks, communications, computers, Baltimore MD USA, 2009, pp [6] M. Firtman, Programming the Mobile Web. Sebastopol: O Reilly Media, 2010, pp [7] N. Mehta, Mobile Web Development. Birmingham: Packt Publishing, 2008, pp [8] T. Shelford and G. Remillard, Real Web Project Management. Addison-Wesley, 2003, pp Adrian VIŞOIU graduated the Bucharest Academy of Economic Studies, the Faculty of Cybernetics, Statistics and Economic Informatics. He has a master degree in Project Management. He holds a PhD in the field of Economic Informatics. He is an assistant lecturer in the Economic Informatics Department of the Bucharest Academy of Economic Studies. He published 16 articles alone or in collaboration and he is co-author of three books. His interests include: object oriented programming, data structures, multimedia programming, software quality management, software metrics refinement.
How To Create A Secure Mobile Application For Business Intelligence On A Windows Phone 7 (For Android)
Informatica Economică vol. 15, no. 2/2011 119 A Windows Phone 7 Oriented Secure Architecture for Business Intelligence Mobile Applications Silvia TRIF 1, Adrian VIŞOIU 2 1 Academy of Economic Studies,
The Bucharest Academy of Economic Studies, Romania E-mail: [email protected] E-mail: [email protected]
Paul Pocatilu 1 and Ctlin Boja 2 1) 2) The Bucharest Academy of Economic Studies, Romania E-mail: [email protected] E-mail: [email protected] Abstract The educational process is a complex service which
Mobile Learning Applications Audit
Informatica Economică vol. 14, no. 1/2010 137 Mobile Learning Applications Audit Paul POCATILU 1, Adrian POCOVNICU 2 1 Academy of Economic Studies, Bucharest, Romania 2 ISA Consulting, New York, USA [email protected],
DigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and
Beginning Smartphone Web Development
Beginning Smartphone Web Development I3. jl!c;llirici JavaScript C;SS, f HTML and A-, p p I i с at i о n s f о r«p ri о n e,, А л ei ro i ci, P a! ei P re, Eli ас к I Windows Мкаане, and inotaa S60 Gail
Web Testing. Main Concepts of Web Testing. Software Quality Assurance Telerik Software Academy http://academy.telerik.com
Web Testing Main Concepts of Web Testing Software Quality Assurance Telerik Software Academy http://academy.telerik.com The Lectors Snejina Lazarova Product Manager Business Services Team Dimo Mitev QA
This document is for informational purposes only. PowerMapper Software makes no warranties, express or implied in this document.
SortSite 5 User Manual SortSite 5 User Manual... 1 Overview... 2 Introduction to SortSite... 2 How SortSite Works... 2 Checkpoints... 3 Errors... 3 Spell Checker... 3 Accessibility... 3 Browser Compatibility...
Developing Mobile Learning Applications for Android using Web Services
106 Informatica Economică vol. 14, no. 3/2010 Developing Mobile Learning Applications for Android using Web Services Paul POCATILU Economic Informatics Department Academy of Economic Studies, Bucharest,
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality,
Mobile Testing Mobile application testing is a process by which application software developed for hand held mobile devices is tested for its functionality, usability and consistency. A mobile application
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
Project management for cloud computing development
Page 16 Oeconomics of Knowledge, Volume 2, Issue 2, 2Q 2010 Project management for cloud computing development Paul POCATILU, PhD, Associate Professor Department of Economic Informatics Academy of Economic
Lee Barnes, CTO Utopia Solutions. Utopia Solutions
Mobile Technology Testing Are You Ready? Lee Barnes, CTO Utopia Solutions Agenda 1. Mobile Testing Challenges 2. Mobile Testing Practices 3. Mobile Test Automation 4. Summary and Q & A Mobile Testing Challenges
PROJECT MANAGEMENT SYSTEM
Requirement Analysis Document v.2 14.12.2009 CENG-401 SOFTWARE ENGINEER PROJECT MANAGEMENT SYSTEM (Project Manager) Ahmet Edip SEÇKİN 07010555 (Developer) Erhan ŞEN 07010507 (Developer) Semih Serdar CENGİZOĞLU
Mobile Learning Application Based On Hybrid Mobile Application Technology Running On Android Smartphone and Blackberry
Mobile Learning Application Based On Hybrid Mobile Application Technology Running On Android Smartphone and Blackberry Djoni Haryadi Setiabudi, Lady Joanne Tjahyana,Winsen Informatics Department Petra
Sophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
OIT 307/ OIT 218: Web Programming
OIT 307/ OIT 218: Web Programming 1.0 INTRODUCTION Many applications nowadays work really well as a web application. Web programming is the practice of writing applications that run on a web server and
A Tool for Evaluation and Optimization of Web Application Performance
A Tool for Evaluation and Optimization of Web Application Performance Tomáš Černý 1 [email protected] Michael J. Donahoo 2 [email protected] Abstract: One of the main goals of web application
Software Requirements Specification
CSL740 Software Engineering Course, IIT Delhi Software Requirements Specification Submitted By Abhishek Srivastava (2011EEY7511) Anil Kumar (2009CS10180) Jagjeet Singh Dhaliwal (2008CS50212) Ierum Shanaya
A Grid Architecture for Manufacturing Database System
Database Systems Journal vol. II, no. 2/2011 23 A Grid Architecture for Manufacturing Database System Laurentiu CIOVICĂ, Constantin Daniel AVRAM Economic Informatics Department, Academy of Economic Studies
CAREER OPPORTUNITIES
CAREER OPPORTUNITIES After the graduation, students can select three different paths. Students should have at least GPA 2.7 to get into the first two types of job. To apply for academic positions in the
The Suitability of Native Application for University E-Learning Compared to Web-Based Application
The Suitability of Native Application for University E-Learning Compared to Web-Based Application Maya Novia Sari 1, Noor Azian Bt. Mohamad Ali 2 Department of Information Systems, Kulliyyah of Information
Cloud Web-Based Operating System (Cloud Web Os)
Cloud Web-Based Operating System (Cloud Web Os) Hesham Abusaimeh Department of Computer Science, Faculty of Information Technology, Applied Science University, Amman, 11931 Jordan. ABSTRACT The cloud computing
International Journal of Engineering Technology, Management and Applied Sciences. www.ijetmas.com November 2014, Volume 2 Issue 6, ISSN 2349-4476
ERP SYSYTEM Nitika Jain 1 Niriksha 2 1 Student, RKGITW 2 Student, RKGITW Uttar Pradesh Tech. University Uttar Pradesh Tech. University Ghaziabad, U.P., India Ghaziabad, U.P., India ABSTRACT Student ERP
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
EPSS Helpdesk - workdays from 08:00 to 20:00 - Phone: +32 2 23 33 760 E-mail: [email protected]
EPSS Frequently Asked Questions (FAQ) For support please contact: EPSS Helpdesk - workdays from 08:00 to 20:00 - Phone: +32 2 23 33 760 E-mail: [email protected] A. General Questions: N.B.: For PIC-related
Multifunctional Barcode Inventory System for Retailing. Are You Ready for It?
Multifunctional Barcode Inventory System for Retailing. Are You Ready for It? Ling Shi Cai, Leau Yu Beng, Charlie Albert Lasuin, Tan Soo Fun, Chin Pei Yee Abstract This paper explains the development of
Addressing Mobile Load Testing Challenges. A Neotys White Paper
Addressing Mobile Load Testing Challenges A Neotys White Paper Contents Introduction... 3 Mobile load testing basics... 3 Recording mobile load testing scenarios... 4 Recording tests for native apps...
TestNav 8 User Guide for PARCC
TestNav 8 User Guide for PARCC Copyright 2014, Pearson Education, Inc. Published March 6, 2014 TestNav 8 User Guide for PARCC 1 TestNav 8 User Guide for PARCC Revision History What is TestNav? Technical
Computer Science Course Descriptions Page 1
CS 101 Intro to Computer Science An introduction to computer science concepts and the role of computers in society. Topics include the history of computing, computer hardware, operating systems, the Internet,
COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC)
COMPUTER SCIENCE/ COMPUTER NETWORKING AND TECHNOLOGIES (COSC) Computer Science (COSC) courses are offered by the School of Information Arts and Technologies within the Yale Gordon College of Liberal Arts.
Image Area. White Paper. Best Practices in Mobile Application Testing. - Mohan Kumar, Manish Chauhan. www.infosys.com
Image Area White Paper Best Practices in Mobile Application Testing - Mohan Kumar, Manish Chauhan www.infosys.com Contents Introduction 3 QA Challenges in Mobile Application Testing 3 Device Variation
Introduction to BlackBerry Smartphone Web Development Widgets
Introduction to BlackBerry Smartphone Web Development Widgets Trainer name Date 2009 Research In Motion Limited V1.00 are stand-alone BlackBerry applications that consist of standard web components, including
MEGA Web Application Architecture Overview MEGA 2009 SP4
Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.
Chapter 6 Essentials of Design and the Design Activities
Systems Analysis and Design in a Changing World, sixth edition 6-1 Chapter 6 Essentials of Design and the Design Activities Chapter Overview There are two major themes in this chapter. The first major
Information Technology Career Field Pathways and Course Structure
Information Technology Career Field Pathways and Course Structure Courses in Information Support and Services (N0) Computer Hardware 2 145025 Computer Software 145030 Networking 2 145035 Network Operating
Mobile App Testing Guide. Basics of Mobile App Testing
2015 Mobile App Testing Guide Basics of Mobile App Testing Introduction Technology is on peek, where each and every day we set a new benchmark. Those days are gone when computers were just a machine and
Developing ASP.NET MVC 4 Web Applications MOC 20486
Developing ASP.NET MVC 4 Web Applications MOC 20486 Course Outline Module 1: Exploring ASP.NET MVC 4 The goal of this module is to outline to the students the components of the Microsoft Web Technologies
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
An Electronic Journal Management System
An Electronic Journal Management System Hrvoje Bogunović, Edgar Pek, Sven Lončarić and Vedran Mornar Faculty of Electrical Engineering and Computing, University of Zagreb Unska 3, 0000 Zagreb, Croatia
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Building Reliable, Scalable AR System Solutions. High-Availability. White Paper
Building Reliable, Scalable Solutions High-Availability White Paper Introduction This paper will discuss the products, tools and strategies available for building reliable and scalable Action Request System
Please Note: Temporary Graduate 485 skills assessments applicants should only apply for ANZSCO codes listed in the Skilled Occupation List above.
ANZSCO Descriptions This ANZSCO description document has been created to assist applicants in nominating an occupation for an ICT skill assessment application. The document lists all the ANZSCO codes that
Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence
Web Development Owen Sacco ICS2205/ICS2230 Web Intelligence Brief Course Overview An introduction to Web development Server-side Scripting Web Servers PHP Client-side Scripting HTML & CSS JavaScript &
Challenges in Android Application Development: A Case Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.294
5.0 Secure Meeting Error Messages
Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089 USA 408 745 2000 or 888 JUNIPER www.juniper.net Contents 5.0 Secure Meeting Error Messages...1 Contacting Juniper...1 Administrator
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Social Network Website to Monitor Behavior Change Design Document
Social Network Website to Monitor Behavior Change Design Document Client: Yolanda Coil Advisor: Simanta Mitra Team #11: Gavin Monroe Nicholas Schramm Davendra Jayasingam Table of Contents PROJECT TEAM
Responsive, resilient, elastic and message driven system
Responsive, resilient, elastic and message driven system solving scalability problems of course registrations Janina Mincer-Daszkiewicz, University of Warsaw [email protected] Dundee, 2015-06-14 Agenda
White Paper Using PHP Site Assistant to create sites for mobile devices
White Paper Using PHP Site Assistant to create sites for mobile devices Overview In the last few years, a major shift has occurred in the number and capabilities of mobile devices. Improvements in processor
Course overview. CompTIA A+ Certification (Exam 220 902) Official Study Guide (G188eng verdraft)
Overview This 5-day course is intended for those wishing to qualify with. A+ is a foundation-level certification designed for IT professionals with around 1 year's experience whose job role is focused
RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER
RaySafe S1 SECURITY WHITEPAPER Contents 1. INTRODUCTION 2 ARCHITECTURE OVERVIEW 2.1 Structure 3 SECURITY ASPECTS 3.1 Security Aspects for RaySafe S1 Data Collector 3.2 Security Aspects for RaySafe S1 cloud-based
Developing ASP.NET MVC 4 Web Applications
Course M20486 5 Day(s) 30:00 Hours Developing ASP.NET MVC 4 Web Applications Introduction In this course, students will learn to develop advanced ASP.NET MVC applications using.net Framework 4.5 tools
Remote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
Glossary of terms used in the survey
Glossary of terms used in the survey 5 October 2015 Term or abbreviation Audio / video capture Refers to the recording of audio and/or video. API Application programming interface, how a computer program
WISE-4000 Series. WISE IoT Wireless I/O Modules
WISE-4000 Series WISE IoT Wireless I/O Modules Bring Everything into World of the IoT WISE IoT Ethernet I/O Architecture Public Cloud App Big Data New WISE DNA Data Center Smart Configure File-based Cloud
Clientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
Evaluation of Nagios for Real-time Cloud Virtual Machine Monitoring
University of Victoria Faculty of Engineering Fall 2009 Work Term Report Evaluation of Nagios for Real-time Cloud Virtual Machine Monitoring Department of Physics University of Victoria Victoria, BC Michael
1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications
1. Introduction 2. Web Application 3. Components 4. Common Vulnerabilities 5. Improving security in Web applications 2 What does World Wide Web security mean? Webmasters=> confidence that their site won
Load testing with. WAPT Cloud. Quick Start Guide
Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica
SECURITY EVALUATION IN COLLABORATIVE M-LEARNING SYSTEMS
SECURITY EVALUATION IN COLLABORATIVE M-LEARNING SYSTEMS Paul POCATILU 2 PhD, Economic Informatics Department, University of Economics, Bucharest, Romania E-mail: [email protected] Cristian CIUREA 3 PhD Candidate,
Nokia E90 Communicator Using WLAN
Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia
Inmagic Content Server v9 Standard Configuration Technical Guidelines
Inmagic Content Server v9.0 Standard Configuration Technical Guidelines 5/2006 Page 1 of 15 Inmagic Content Server v9 Standard Configuration Technical Guidelines Last Updated: May, 2006 Inmagic, Inc. All
MySQL databases as part of the Online Business, using a platform based on Linux
Database Systems Journal vol. II, no. 3/2011 3 MySQL databases as part of the Online Business, using a platform based on Linux Ion-Sorin STROE Romanian Academy of Economic Studies Romana Sq, no 6, 1 st
PROJECT-BASES RISK MANAGEMENT
PROJECT-BASES RISK MANAGEMENT Andrei Sandu 1 Abstract The project-bases concept is presented. There are defined operations on project-bases. The software developed for project-bases management is analyzed
Instructions for use the VPN at the Warsaw School of Economics
Instructions for use the VPN at the Warsaw School of Economics Dariusz Jaruga. ver. 1.1 (19-01-2011) Introduction VPN is the abbreviation for Virtual Personal Network which allows you to connect your computer
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
VPN Web Portal Usage Guide
VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET
Cloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
Chapter 8 Router and Network Management
Chapter 8 Router and Network Management This chapter describes how to use the network management features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. These features can be found by
Online Test Administrator Quick Reference Guide Updated 08/02/2012 v.2.0
Online Test Administrator Quick Reference Guide Updated 08/02/2012 v.2.0 M e s s a g e T e s t N a v ( W h a t D o e s T h i s M e a n? ) Login Screen The student will type in the Login ID and Test Code
Smarter Balanced Assessment Consortium. Recommendation
Smarter Balanced Assessment Consortium Recommendation Smarter Balanced Quality Assurance Approach Recommendation for the Smarter Balanced Assessment Consortium 20 July 2012 Summary When this document was
Syllabus INFO-UB-3322. Design and Development of Web and Mobile Applications (Especially for Start Ups)
Syllabus INFO-UB-3322 Design and Development of Web and Mobile Applications (Especially for Start Ups) Fall 2014 Stern School of Business Norman White, KMEC 8-88 Email: [email protected] Phone: 212-998
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
Windows BitLocker Drive Encryption Step-by-Step Guide
Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft
Application Code Development Standards
Application Code Development Standards Overview This document is intended to provide guidance to campus system owners and software developers regarding secure software engineering practices. These standards
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11
Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes
TERMS OF REFERENCE. Revamping of GSS Website. GSS Information Technology Directorate Application and Database Section
TERMS OF REFERENCE Revamping of GSS Website GSS Information Technology Directorate Application and Database Section Tel: Accra 0302 682656 Cables: GHANASTATS In case of reply the number and date of this
Enterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Installation and Setup Guide
Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.
Comparison of SNMP. Versions 1, 2 and 3
Comparison of SNMP 1 Comparison of SNMP Versions 1, 2 and 3 Eddie Bibbs Brandon Matt ICTN 4600-001 Xin Tang April 17, 2006 Comparison of SNMP 2 During its development history, the communities of researchers,
Internet Banking Two-Factor Authentication using Smartphones
Internet Banking Two-Factor Authentication using Smartphones Costin Andrei SOARE IT&C Security Master Department of Economic Informatics and Cybernetics Bucharest University of Economic Studies, Romania
Bitrix Site Manager ASP.NET. Installation Guide
Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary
An introduction to creating Web 2.0 applications in Rational Application Developer Version 8.0
An introduction to creating Web 2.0 applications in Rational Application Developer Version 8.0 September 2010 Copyright IBM Corporation 2010. 1 Overview Rational Application Developer, Version 8.0, contains
