Německý Jazyk

Total Page:16

File Type:pdf, Size:1020Kb

Německý Jazyk Masarykova univerzita Filozofická fakulta Ústav germanistiky, nordistiky a nederlandistiky Německý jazyk Persvazivní jazykové prostředky v německé a české reklamě na mobilní telefony Disertační práce Autor: Mgr. Zlata Hokrová Školitel: Prof. PhDr. Zdeněk Masařík, DrSc. 2012 Masaryk-Universität Philosophische Fakultät Institut für Germanistik, Nordistik und Nederlandistik Persuasive sprachliche Mittel in der deutschen und tschechischen Werbung für Mobiltelefone Dissertation Autor: Mgr. Zlata Hokrová Betreuer: Prof. PhDr. Zdeněk Masařík, DrSc. 2012 Hiermit versichere ich, dass ich die vorliegende Arbeit selbständig und nur mit den angegebenen Hilfsmitteln angefertigt habe. Sämtliche Stellen, die dem Wortlaut oder dem Sinn nach aus anderen Quellen stammen, sind als solche unter Angabe ihrer Herkunft kenntlich gemacht worden. Datum: 4.9.2012 ……………………................. Unterschrift An dieser Stelle möchte ich mich bei Herrn Prof. PhDr. Zdeněk Masařík, DrSc., vom Institut für Germanistik, Nordistik und Nederlandistik an der Philosophischen Fakultät der Masaryk-Universität für die Betreuung meiner Dissertation herzlich bedanken. Mein besonderer Dank gilt Herrn Mgr. Vlastimil Brom, Ph.D., für seine freundliche Hilfe und Unterstützung beim Verfassen meiner Dissertation sowie Frau Doc. PhDr. Eva Uhrová, CSc., dafür, dass sie meine Arbeit von Anfang an gefördert und befürwortet hat. Mein Dank gebührt ebenfalls Herrn Prof. Dr. Albrecht Greule und Frau Dr. Sandra Reimann aus dem Institut für Germanistik der Universität Regensburg. Inhaltsverzeichnis 1. Einleitung ........................................................................ 8 2. Theoretische Grundlagen ................................................. 9 2.1. Charakteristiken der Handywerbung ........................ 10 2.1.1. Werbeziele.......................................................... 10 2.1.2. Zielgruppen........................................................ 11 2.1.3. Werbemittel und Werbeträger............................. 16 2.1.4. (Handy)Werbung als besondere Form der Kommunikation .................................................. 17 2.2. Erläuterung der Schlüsselbegriffe............................. 29 2.2.1. Werbeanzeige ..................................................... 29 2.2.2. Bestandteile der Anzeigenwerbung ..................... 31 2.2.2.1. Headline ...................................................... 32 2.2.2.2. Fließtext ...................................................... 41 2.2.2.3. Slogan ......................................................... 43 2.2.2.4. Produkt-, Marken- und Firmenname ............ 66 2.2.2.5. Besondere Formen der Textelemente ............ 75 2.2.2.6. Bildelemente ................................................ 79 2.2.3. Persuasion......................................................... 86 2.2.3.1. Persuasion und Manipulation....................... 88 2.2.3.2. Persuasive Strategien und Techniken ........... 91 2.2.3.3. Der persuasive Prozess und seine Funktionen .................................................................. 104 2.2.3.4. Persuasive Mittel........................................ 108 3. Empirischer Teil........................................................... 111 3.1. Fragestellungen und Beschreibung der methodischen Vorgehensweise ....................................................... 111 3.1.1. W-Manager ...................................................... 112 3.2. Hypothesen............................................................ 114 3.3. Aufbau des Korpus................................................. 115 3.4. Resultate der Korpusanalyse .................................. 122 3.4.1. Persuasive Mittel im Bereich der Syntax ........... 123 3.4.1.1. Syntaktisch vollständige Aussagen ............. 124 3.4.1.2. Syntaktisch unvollständige Aussagen ......... 129 3.4.1.3. Syntaktisch vollständige Fragen ................. 139 3.4.1.4. Syntaktisch unvollständige Fragen ............. 143 3.4.1.5. Syntaktisch vollständige Aufforderungen .... 147 3.4.1.6. Syntaktisch unvollständige Aufforderungen 150 3.4.1.7. Syntaktisch vollständige und unvollständige Ausrufe ...................................................... 153 3.4.1.8. Wünsche.................................................... 155 3.4.2. Persuasive Mittel im Bereich der Lexik.............. 156 3.4.2.1. Wortarten .................................................. 156 3.4.2.2. Inszenierung von sprachlichen Varietäten... 222 3.4.2.3. Fremdsprachige Elemente .......................... 236 3.4.2.4. Phraseologismen ........................................ 242 3.4.2.5. Schlüsselwörter und Hochwertwörter ......... 250 3.4.3. Persuasive Mittel im Bereich der Rhetorik......... 256 3.4.3.1. Positionsfiguren ......................................... 256 3.4.3.2. Wiederholungsfiguren ................................ 258 3.4.3.3. Erweiterungsfiguren................................... 261 3.4.3.4. Kürzungsfiguren ........................................ 263 3.4.3.5. Appellfiguren ............................................. 264 3.4.3.6. Tropen ....................................................... 266 3.4.3.7. Zweierfigur, Dreierfigur, Testimonium ........ 269 3.4.4. Exkurs: Paraverbale persuasive Mittel .............. 273 3.4.5. Exkurs: Nonverbale persuasive Mittel ............... 278 3.4.6. Exkurs: Standardisiert oder länderspezifisch? .. 281 3.4.7. Entwicklungstendenzen in der Verwendung von verbalen persuasiven Mitteln............................. 287 4. Zusammenfassung und Schlusswort ............................ 294 5. Abbildungsverzeichnis.................................................. 304 6. Verzeichnis der Grafiken .............................................. 305 7. Literaturverzeichnis ..................................................... 306 7.1. Primärliteratur....................................................... 306 7.1.1. Deutsche Werbeanzeigen.................................. 306 7.1.2. Tschechische Werbeanzeigen............................ 313 7.2. Sekundärliteratur .................................................. 318 7.3. Internetquellen....................................................... 324 8. Abstrakt....................................................................... 327 9. Abstract....................................................................... 328 1. Einleitung Das Thema der vorliegenden Dissertation „Persuasive sprachliche Mittel in der deutschen und tschechischen Werbung für Mobiltelefone“ wird im Rahmen der Arbeit auf zwei Ebenen behandelt: Zuerst werden theoretische Ausgangspunkte erläutert und nachfolgend konkrete Resultate der Korpusanalyse vorgestellt. Der theoretische Teil der Arbeit fokussiert einerseits auf die Vorstellung der Spezifika der Werbung für Mobiltelefone und andererseits auf die Erläuterung der Schlüsselbegriffe, die sich hauptsächlich auf die Struktur einer Werbeanzeige sowie auf die Charakteristika des Persuasionsprozesses beziehen. Der empirische Teil stellt Informationen zum Aufbau des Korpus bzw. zu der methodischen Vorgehensweise bereit, die bei der Untersuchung des Korpus verwendet wurde. Die größte Aufmerksamkeit wird jedoch den Resultaten der Korpusanalyse gewidmet, die mit konkreten Beispielen aus beiden Teilen des Korpus umfassend belegt werden. Abschließend werden die anhand der Korpusanalyse feststellbaren Entwicklungstendenzen in der Verwendung von sprachlichen persuasiven Mitteln besprochen. Im Abschlusskapitel werden Ergebnisse der Untersuchung der beiden Teile des Korpus zusammengefasst und verglichen und gleichzeitig werden die früher formulierten Hypothesen verifiziert. - 8 - 2. Theoretische Grundlagen Die theoretischen Grundlagen der Arbeit vermitteln wesentliche Informationen über das untersuchte Thema. Sie gelten als eine Einführung in die Problematik der Persuasion auf dem Gebiet der Werbung für Mobiltelefone. Dementsprechend werden in diesem Teil charakteristische Merkmale der Handywerbung 1 angeführt (und zwar hinsichtlich der Werbeziele, Zielgruppen, Werbemittel und Werbeträger oder in Bezug auf die Kommunikation) sowie einige mit dem Thema der Arbeit zusammenhängende Schlüsselbegriffe erläutert. Im Rahmen der Schlüsselbegriffe wird zuerst die Werbeanzeige als eine der auf dem Gebiet der (Handy)Werbung meist verwendeten Textsorten charakterisiert, nachfolgend werden einzelne in Werbeanzeigen gebrauchte Textteile beschrieben. Schließlich wird der Begriff „Persuasion“ definiert. Im Zusammenhang damit werden auch Spezifika der persuasiven Kommunikation behandelt. Mit Rücksicht auf den interdisziplinären Charakter des Themas der Arbeit sind in den folgenden Passagen einige Exkurse in andere, außerlinguistische Disziplinen wie bspw. in die Marketingtheorie oder Psychologie zu finden, um einen gesamten Überblick über die untersuchte Problematik zu gewähren. 1 Den Begriff „Handywerbung“ verwenden wir im Rahmen der Arbeit ausschließlich im Sinne von „Werbung für Handys“. In der Werbebranche bezeichnet er jedoch auch die populär werdende „Werbung durch bzw. auf Handys“. - 9 - 2.1. Charakteristiken der Handywerbung Die Handywerbung kann mit Rücksicht auf die Klassifikation der Werbeformen von Schweiger und Schrattenecker (Schweiger/Schrattenecker 1995, S. 11) als eine Form der Wirtschaftswerbung definiert werden, die der Förderung des Absatzes der Produkte eines Handyproduzenten dient. Da jedoch verschiedene Strategien anzuwenden sind, um den Absatz der Ware zu fördern, werden auch mehrere Typen der Handywerbung unterschieden. Eine entscheidende Rolle spielen dabei
Recommended publications
  • Инструкция Для Телефона Siemens CX75
    Ba Cover CX75.qxd 04.04.2005 10:51 Uhr Seite 1 ss Siemens Aktiengesellschaft, issued by Communications, Haidenauplatz 1 D-81667 Munich © Siemens AG 2005 All rights reserved. Subject to availability. Rights of modification reserved. Siemens Aktiengesellschaft www.siemens.com/cx75 Designed for life CX75 black LIEBREICH, Medienproduktion right page (1) of CX75 FUG ru, A31008-H7420-A15-1-5619 (11.05.2005, 11:11) Template: X75, Version 2.1; VAR 2.1; Version X75, Template: Содержание 1 Содержание Меры предосторожности ................ 3 Телеф.справ. ................................... 36 Обзор .................................................. 5 Новая запись ................................. 36 Дисплейные символы ..................... 7 Вызовы (поиск записи) ................. 37 Подготовка к работе ......................... 9 Изменение ..................................... 37 Установка SIM-карты и <Другие справ.> ............................ 38 Спис.вызовов .................................. 39 аккумулятора .................................. 9 Установка Время/стоим. ................................... 40 мультимедийной карты ................ 10 Камера ............................................... 41 date: 050128 issue VAR Language: ru; Зарядка аккумулятора .................. 11 Режим фотосъемки ...................... 42 Включение/выключение/ Режим видеосъемки ..................... 42 PIN-код .............................................. 13 Входящие ......................................... 44 g_ru_050511_vz_pk_druck\PHO_IVZ.fm Ввод PIN-кода
    [Show full text]
  • BURY Compatibility List Generator
    Compatibility list CC 9060 Time Updated: 2014-09-03 / v.75 Device software version: Display SW: 141 on No call call key level keys Card SMS Type future Profile Phone strength activation conference SMS / Popup between calls A2DP supported Phone s REDIAL reject waiting call Multiparty call: init / private mode with Activation Bluetooth Phone book entries: Display: GSM-signal Multiparty call: Swap E-mail read Function Messages: Download Call lists: Missed calls connection with device Multiparty call: accept / Work with activeCradle Display: Battery charge Bluetooth connection to used to test/ Comments after ignition is switched Multiparty call: merge to Call lists: Received calls Multiparty call: hold on 1 Messages: Receive new Phone book entries: SIM Display: Service provider this option will be used in the last connected phone OPP: Synch. phone book Call lists: Dialled numbers Bluetooth device / phones Possibility to switch car kit outgoing call during active Version of phone software 1 Apple iPhone ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ 1 ✓ ✓ ✓ ✓ ✓ 3.0 (7a341) 2 Apple iPhone 3GS ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ 1 ✓ ✓ ✓ ✓ ✓ ✓ 6.0 (10a403) 3 Apple iPhone 4 ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ 1 ✓ ✓ ✓ ✓ ✓ ✓ 7.0.2 (11a501) 4 Apple iPhone 4S ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ 1 ✓ ✓ ✓ ✓ ✓ ✓ 7.0.2 (11a501) 5 Apple iPhone 5 ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ 1 ✓ ✓ ✓ ✓ ✓ 7.0.2 (11a501) 6 Apple iPhone 5c ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ 1 ✓ ✓ ✓ ✓ ✓ 7.0.2 (11a501) 7 Apple iPhone 5s ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ 1 ✓ ✓ ✓ ✓ ✓ 7.0.3 (11b511) 8 BlackBerry 7100 ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ 1 ✓ ✓ ✓ v4.0.2.16 (platform 1.8.0.132) ✓ 9 BlackBerry
    [Show full text]
  • A Fugitive Success That Finland Is Quickly Becoming a Victim of Its Own Success
    Professor Charles Sabel from Columbia Law School and Professor AnnaLee Saxenian from UC Berkeley argue in their book A Fugitive Success that Finland is quickly becoming a victim of its own success. In recent decades Finnish firms in the forest products and telecommunications industries have become world leaders. But the kind of discipline that made this success possible, and the public policies that furthered it, is unlikely to secure it in the future. Efficiency improvements and incremental A Fugitive Success innovations along the current business trajectory will gradually lead these industries into a dead-end unless they use innovation as a vehicle for transforming themselves into new higher value businesses. Saxenian and Sabel raise some serious concerns about the readiness of these industries, and the Finnish innovation system as a whole, for the needed transformation. A Fugitive Success is required reading for A Fugitive Success those involved in the development of the Finnish innovation environment and Finland’s Economic Future implementing the new national innovation strategy. Charles Sabel and AnnaLee Saxenian Sitra Reports 80 Sitra Reports the Finnish Innovation Fund ISBN 978-951-563-639-3 Itämerentori 2, P.O. Box 160, FI-00181 Helsinki, Finland, www.sitra.fi/en ISSN 1457-5728 80 Telephone +358 9 618 991, fax +358 9 645 072 URL: http://www.sitra.fi A Fugitive Success Finland’s Economic Future Sitra Reports 80 A Fugitive Success Finland’s Economic Future Charles Sabel AnnaLee Saxenian Sitra • HelSinki 3 Sitra Reports 80 Layout: Sisko Honkala Cover picture: Shutterstock © Sabel, Saxenian and Sitra ISBN 978-951-563-638-6 (paperback) ISSN 1457-571X (paperback) ISBN 978-951-563-639-3 (URL:http://www.sitra.fi) ISSN 1457-5728 (URL:http://www.sitra.fi) The publications can be ordered from Sitra, tel.
    [Show full text]
  • Anssi Cebit Final
    Nokia Mobile Phones – The next phase Nokia Investor seminar CeBIT 2002 Anssi Vanjoki Executive Vice President Nokia Mobile Phones 1 © NOKIA 2000 Outline • Nokia’s new product launches • Nokia 3410 • Nokia 3510 • Nokia 6310i • Nokia 9210i • Nokia 7210 • Mobile Device technology evolution • Convergence in Mobility • Summary 2 © NOKIA 2000 New Product Launches 3 © NOKIA 2000 • RealOne Player for streaming video • Flash Player allowing playback of Macromedia flash content • Considerably faster data processing • New web browser for JavaScripts support and HTML 4.01 compatibility • Enhanced security with Nokia VPN Client • Nokia GPS module for route assistance 4 © NOKIA 2000 Nokia and RealNetworks alliance • RealOne player to be included in Nokia’s Symbian based handsets • RealOne player to be licensed in Nokia Series 60 platform • RealSystem Streaming Server Software included in Nokia’s infrastructure solutions for mobile operators 5 © NOKIA 2000 • JavaTM 2 Micro Edition (J2ME TM) • Picture editor • 3D graphics engine • WAP 1.1 with push funtionality • 5 games: Link5, Space impact, Bantumi, Snake II, Bumper 6 © NOKIA 2000 • GPRS • Polyphonic (MIDI) sounds • Value added services (VAS) over Multimedia messaging (MMS) receive • Fun gaming concept • sounds, multiple keypress, vibra 7 © NOKIA 2000 FUNctional Accessory Covers 8 © NOKIA 2000 FILENAMEs.PPT/ DATE / NN • Tri-band GSM, GPRS, HSCSD • Multimedia messaging (MMS) • Java 2 Micro Edition (J2ME) • Series 40 user interface • High quality color display • Polyphonic (MIDI) sounds • Stereo FM radio • Integrated handsfree speaker Lord of the Clouds: Sumea ® 9 © NOKIA 2000 • Tri-band GSM, GPRS, HSCSD • Multimedia messaging (MMS) • Java 2 Micro Edition (J2ME) • Series 40 user interface • High quality color display • Polyphonic (MIDI) sounds • Stereo FM radio • Integrated handsfree speaker 10 © NOKIA 2000 • Tri-band GSM, GPRS, HSCSD • Java 2 Micro Edition (J2ME) • Bluetooth, infrared, cable • Wallet with WIM 11 © NOKIA 2000 Leadership in Product Portfolio 22 mobile phones announced in 2001.
    [Show full text]
  • BURY Compatibility List Generator
    Compatibility list CC 9050 Updated: 2010-12-21 / v.51 Device software version: APP:04.03.02/ DSW:01.02.0f/ BTS:01.47.12 (CC 9051M V06b) on No key keys Card Type tags) Profile activation service provider Phone s REDIAL A2DP from phone A2DP from device / private mode with Battery charge level Activation Bluetooth GSM-signal strength Call lists Missed calls A2DP supported start A2DP supported start connection with device Call lists Received calls Bluetooth connection to used to test/ Comments after ignition is switched Access to mobile phone Phone book entries SIM voice-dial function (voice the last connected phone Call lists Dialled numbers Phone book entries Bluetooth device / phones Possibility to switch car kit Version of phone software 1 Nokia 2323 classic hf ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ v 06.46 2 Nokia 2330 classic hf ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ v 06.46 3 Nokia 2700 classic hf ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ v 07.15 4 Nokia 2730 classic hf ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ v 10.40 5 Nokia 3109c hf ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ v07.21 6 Nokia 3110c hf ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ vp sk4.80 7 Nokia 3120 classic hf ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ v 10.00 8 Nokia 3230 hf ✓ ✓ ✓ ✓ ✓ ✓ ** ✓ ** v 04.14 9 Nokia 3250 hf ✓ ✓ ✓ ✓ ✓ v 03.24 10 Nokia 3650 hf ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ v 4.17 11 Nokia 3710 fold hf ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ v 03.80 12 Nokia 3720 classic hf ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ v 3.92 13 Nokia 5200 hf ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ v 3.92 14 Nokia 5230 hf ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ** v 12.0.089 15 Nokia 5300 hf ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ v 03.92 16 Nokia 5310 XpressMusic
    [Show full text]
  • Cell Phones and Pdas
    eCycle Group - Check Prices Page 1 of 19 Track Your Shipment *** Introductory Print Cartridge Version Not Accepted February 4, 2010, 2:18 pm Print Check List *** We pay .10 cents for all cell phones NOT on the list *** To receive the most for your phones, they must include the battery and back cover. Model Price Apple Apple iPhone (16GB) $50.00 Apple iPhone (16GB) 3G $75.00 Apple iPhone (32GB) 3G $75.00 Apple iPhone (4GB) $20.00 Apple iPhone (8GB) $40.00 Apple iPhone (8GB) 3G $75.00 Audiovox Audiovox CDM-8930 $2.00 Audiovox PPC-6600KIT $1.00 Audiovox PPC-6601 $1.00 Audiovox PPC-6601KIT $1.00 Audiovox PPC-6700 $2.00 Audiovox PPC-XV6700 $5.00 Audiovox SMT-5500 $1.00 Audiovox SMT-5600 $1.00 Audiovox XV-6600WOC $2.00 Audiovox XV-6700 $3.00 Blackberry Blackberry 5790 $1.00 Blackberry 7100G $1.00 Blackberry 7100T $1.00 Blackberry 7105T $1.00 Blackberry 7130C $2.00 http://www.ecyclegroup.com/checkprices.php?content=cell 2/4/2010 eCycle Group - Check Prices Page 2 of 19 Search for Pricing Blackberry 7130G $2.50 Blackberry 7290 $3.00 Blackberry 8100 $19.00 Blackberry 8110 $18.00 Blackberry 8120 $19.00 Blackberry 8130 $2.50 Blackberry 8130C $6.00 Blackberry 8220 $22.00 Blackberry 8230 $15.00 Blackberry 8300 $23.00 Blackberry 8310 $23.00 Blackberry 8320 $28.00 Blackberry 8330 $5.00 Blackberry 8350 $20.00 Blackberry 8350i $45.00 Blackberry 8520 $35.00 Blackberry 8700C $6.50 Blackberry 8700G $8.50 Blackberry 8700R $7.50 Blackberry 8700V $6.00 Blackberry 8703 $1.00 Blackberry 8703E $1.50 Blackberry 8705G $1.00 Blackberry 8707G $5.00 Blackberry 8707V
    [Show full text]
  • Investigaciòn Sobre Automatizaciòn De Fuerza De Ventas Móvil
    INVESTIGACIÒN SOBRE AUTOMATIZACIÒN DE FUERZA DE VENTAS MÓVIL MILENA ANDREA CASTILLO RUANO UNIVERSIDAD AUTÓNOMA DE OCCIDENTE FACULTAD DE INGENIERIAS DEPARTAMENTO DE AUTOMATICA Y ELECTRÓNICA PROGRAMA DE INGENIERÍA ELECTRONICA SANTIAGO DE CALI 2007 INVESTIGACIÓN SOBRE AUTOMATIZACIÓN DE FUERZA DE VENTAS MOVIL MILENA ANDREA CASTILLO RUANO Pasantía para optar el título de Ingeniera Electrónica Director Académico HÉCTOR JOSÉ GÓMEZ GONZÁLES Ingeniero Electrónico UNIVERSIDAD AUTÓNOMA DE OCCIDENTE FACULTAD DE INGENIERIAS DEPARTAMENTO DE AUTOMATICA Y ELECTRÓNICA PROGRAMA DE INGENIERÍA ELECTRONICA SANTIAGO DE CALI 2007 Nota de aceptación: Aprobado por el comité de grado en cumplimiento de los requisitos exigidos por la Universidad Autónoma de Occidente para optar al titulo de ingeniera electrónica. Ing. JUANA MARIA CAMPO Jurado Ing. ROBERTO DE JESÚS VEGA Jurado Santiago de Cali, febrero 8 de 2007 CONTENIDO Pág. GLOSARIO 10 RESUMEN 14 INTRODUCCIÓN 15 1. PLANTEAMIENTO DEL PROBLEMA 16 2. OBJETIVOS 17 2.1 OBJETIVO GENERAL 17 2.2 OBJETIVOS ESPECÍFICOS 17 3. JUSTIFICACIÓN 18 4. AUTOMATIZACION DE FUERZA DE VENTAS 19 4.1 DESCRIPCION DE LA IMPLEMENTACIÓN 19 4.1.1 DESCRIPCIÓN DE LA PLATAFORMA EMPLEADA 19 4.1.2 DESCRIPCIÓN DEL USUARIO 20 4.2 ARQUITECTURA DE LA APLICACIÓN 22 4.2.1 CORRIENDO EL PROYECTO 22 4.2 ESTABLECIMIENTO DE BENEFICIOS QUE SE DESEAN LOGRAR 30 4.3 CALIDAD DEL SERVICIO 30 5. INTRODUCCION A J2ME 31 5.1 ARQUITECTURA 31 5.1.1 SISTEMA OPERATIVO 31 5.1.2 JAVA VIRTUAL MACHINE (JVM) 31 5.1.3 CONFIGURACIÓN 32 5.1.4 PERFIL (PROFILE) 34 5.2 MIDP 34 5.2.1
    [Show full text]
  • Listado Liberaciones 9 Sept 2011
    TODO EN ACCESORIOS TARIFA LIBERACIÓN TELÉFONOS MÓVILES ALCATEL PVD PVP PVD PVP PVD PVP Alcatel 153 3 9 Alcatel E221 3 9 Alcatel OT-565 3 9 Alcatel 155 3 9 Alcatel E227 3 9 Alcatel OT-600 3 9 Alcatel 156 3 9 Alcatel E230 3 9 Alcatel OT-606 3 9 Alcatel 303 3 9 Alcatel E252 3 9 Alcatel OT-660 3 9 Alcatel 311 3 9 Alcatel E256 3 9 Alcatel OT-708 3 9 Alcatel 320 3 9 Alcatel E257 3 9 Alcatel OT-710 3 9 Alcatel 331 3 9 Alcatel E259 3 9 Alcatel OT-799 3 9 Alcatel 332 3 9 Alcatel E260 3 9 Alcatel OT-800 3 9 Alcatel 355 3 9 Alcatel E265 3 9 Alcatel OT-802 3 9 Alcatel 363 3 9 Alcatel E801 3 9 Alcatel OT-806 3 9 Alcatel 50X 3 9 Alcatel Easy 3 9 Alcatel OT-808 3 9 Alcatel 511 3 9 Alcatel ELLE 3 9 Alcatel OT-809 3 9 Alcatel 512 3 9 Alcatel Mandarina 3 9 Alcatel OT-810 3 9 Alcatel 525 3 9 Alcatel Max db 3 9 Alcatel OT-811 3 9 Alcatel 526 3 9 Alcatel Misssixty 3 9 Alcatel OT-812 3 9 Alcatel 531 3 9 Alcatel OT-090 3 9 Alcatel OT-813 3 9 Alcatel 535 3 9 Alcatel OT-103 3 9 Alcatel OT-814 3 9 Alcatel 556 3 9 Alcatel OT-104 3 9 Alcatel OT-880 3 9 Alcatel 565 3 9 Alcatel OT-105 3 9 Alcatel OT-B331 3 9 Alcatel 70X 3 9 Alcatel OT-108 3 9 Alcatel OT-BIC 3 9 Alcatel 715 3 9 Alcatel OT-109 3 9 Alcatel OT-C700 3 9 Alcatel 715 3 9 Alcatel OT-111 3 9 Alcatel OT-C701 3 9 Alcatel 735 3 9 Alcatel OT-1650 3 9 Alcatel OT-F331 3 9 Alcatel 756 3 9 Alcatel OT-203 3 9 Alcatel OT-S319 3 9 Alcatel 757 3 9 Alcatel OT-204 3 9 Alcatel OT-S320 3 9 Alcatel 835 3 9 Alcatel OT-206 3 9 Alcatel OT-S321 3 9 Alcatel C550 3 9 Alcatel OT-208 3 9 Alcatel OT-S520 3 9 Alcatel C551 3 9 Alcatel
    [Show full text]
  • Mobile Connection Explorer for Windows Introduction and Features
    Mobile Connection Explorer 15 May 2013 for Windows Version 21 Introduction and Features Public version Gemfor s.r.o. Tyršovo nám. 600 252 63 Roztoky Czech Republic Gemfor s.r.o. Tyršovo nám. 600 252 63 Roztoky Czech Republic e-mail: [email protected] Contents Contents ...................................................................................................................... 2 History ......................................................................................................................... 3 1. Scope ..................................................................................................................... 3 2. Abbreviations ......................................................................................................... 4 3. Solution .................................................................................................................. 5 4. Specification ........................................................................................................... 5 5. Product description ................................................................................................. 9 5.1 Supported operating systems ....................................................................... 9 5.2 Hardware device connections ....................................................................... 9 5.3 Network connection types ............................................................................. 9 5.4 Customizable graphical skin ......................................................................
    [Show full text]
  • Dreambox - Siemens
    GSM-Support ul. Bitschana 2/38, 31-420 Kraków, Poland mobile +48 608107455, NIP PL9451852164 REGON: 120203925 www.gsm-support.net DreamBox - Siemens DreamBox is a service software device for servicing and repairing Siemens phone models. It can unlock and flash C65, C66, C6C, C6V, C72, C75, CF75, CX65, CX70, CX75, CX7I, M65, M75, ME75, M6C S65, SK65, SK6R, SL65 without disassembling the phone, as well as many other phone models. Writes full flash/language at very high speed, automatic boot selection, partial flashing of ALL blocks, reports phone diagnostic codes, supports original Siemens flash file format (Winswup), works with custom settings. - unlock all locks and phone code - allow SP-Lock to any network - read/write EEPROM, firmware, flash - fast read/write language packs/T9 packs - repair all dead phones - repair IMEI - soft works at all known SW versions - works on all Windows systems (win95, win98, win ME, win2000, winXP etc.) - can flash and communicate with phones on high speeds (921600 bps ) on every PC - many boxes can be connected to one PC - fast flashing, stable work on every PC -remote UPDATE function (box firmware and software can be updgraded remotely) - from one side DreamBox is connected to PC through USB interface. From another, device has 2 inputs for connection with a phone. - can use other flash formats. DreamBox Service Software is an interface used with DreamBox to read/write flash, unlock/relock, restore/change imei, repair, read/write settings of the phone and other functions. Functional Operations Reading Phone Information This function allows you to gather important information about the phone (IMEI, flash model, SW version etc.) Reading full flash memory Use this chapter for reading and saving phone full flash.
    [Show full text]
  • MOBILE GAMING: a Framework for Evaluating the Industry 2000-2005 JUSSI-PEKKA PARTANEN Copyright (C) 2001 Gaptime Century, Ltd
    MOBILE GAMING: A Framework for Evaluating the Industry 2000-2005 JUSSI-PEKKA PARTANEN Copyright (C) 2001 Gaptime Century, Ltd. MOBILE GAMING: A FRAMEWORK FOR EVALUATING THE INDUSTRY 2000-2005 Abstract (English) Author: Jussi-Pekka Partanen, Gaptime Century Ltd. Report title: Mobile Gaming:A Framework for Evaluating the Industry 2000-2005 Date: 15.06.2001 Pages: 110 A mobile game is a commercial product that is distributed to the customer using mobile operator’s network. The game is an interactive product; many kinds of entertainment services are not covered by this report, such as joke or comics services or the popular ring tone and logo services. What distinguishes mobile games from other kinds of entertainment services is that the interactivity creates so-called stickiness for the service. The games may be addictive and offer something more than “disposable” fun, as operator logos do. The target of this study is to give an introduction to the mobile gaming industry and build a framework for analysing the success of mobile game products and companies. Currently the mobile gaming industry is in the introduction phase. Many start-up companies are developing different games and technologies and believe that they will be the winners when the market moves from introduction to the growth stage. At this point the company must have the critical mass in order to flourish, otherwise the companies with bigger better partnering networks and marketing and sales forces are eating the smaller one. The framework depends on the following methods: the industry and mobile game life cycle model, value distribution in the value delivery network and external company analysis.
    [Show full text]
  • Catastrophic Cyber-Physical Malware∗
    Catastrophic Cyber-Physical Malware∗ Suresh Kothari1, 2, Ganesh Ram Santhanam1, Payas Awadhutkar1, Benjamin Holland1, Jon Mathews2, and Ahmed Tamrawi2 1Department of Electrical and Computer Engineering, Iowa State University, Ames, IA 50011 2EnSoft Corp., 2625 N Loop Dr Suite 2580, Ames, IA 50010 Abstract With the advent of highly sophisticated cyber-physical malware (CPM) such as Industroyer, a cyber- attack could be as destructive as the terrorist attack on 9/11, and it would virtually paralyze the nation. We discuss as the major risks the vulnerability of: telecommunication infrastructure, industrial control systems (ICS), and mission-critical software. In differentiating CPM from traditional malware, the difference really comes from the open-ended possibilities for malware triggers resulting from the wide spectrum of sensor inputs, and the almost limitless application-specific possibilities for designing malicious payloads. Fundamentally, the challenges of detecting sophisticated CPM stem from the complexities inherent in the software at the heart of cyber-physical systems. We discuss three fundamental challenges: explosion of execution behaviors, computational intractability of checking feasible behaviors, and difficult-to-analyze programming constructs. In detecting novel CPM, the tasks are: developing plausible hypotheses for malware trigger and mali- cious payload, analyzing software to gather evidence based on CPM hypotheses, and verifying software to prove or refute a hypothesis based on the gathered evidence. We discuss research directions for effective automation to support these tasks. 1 Introduction The imminent danger of cyber-physical malware (CPM) is evident from attacks such as the power outage in Ukraine [122] or the hijacking of a Jeep Cherokee [83]. The net-centricity of modern systems offers an adversary affordable attack vectors through cyberspace against critical missions.
    [Show full text]