Topic Relevant Selected Content from the Highest Rated Entries, Typeset, Printed and Shipped

Total Page:16

File Type:pdf, Size:1020Kb

Topic Relevant Selected Content from the Highest Rated Entries, Typeset, Printed and Shipped Topic relevant selected content from the highest rated entries, typeset, printed and shipped. Combine the advantages of up-to-date and in-depth knowledge with the convenience of printed books. A portion of the proceeds of each book will be donated to the Wikimedia Foundation to support their mission: to empower and engage people around the world to collect and develop educational content under a free license or in the public domain, and to disseminate it effectively and globally. The content within this book was generated collaboratively by volunteers. Please be advised that nothing found here has necessarily been reviewed by people with the expertise required to provide you with complete, accurate or reliable information. Some information in this book maybe misleading or simply wrong. The publisher does not guarantee the validity of the information found here. If you need specific advice (for example, medical, legal, financial, or risk management) please seek a professional who is licensed or knowledgeable in that area. Sources, licenses and contributors of the articles and images are listed in the section entitled “References”. Parts of the books may be licensed under the GNU Free Documentation License. A copy of this license is included in the section entitled “GNU Free Documentation License” All used third-party trademarks belong to their respective owners. Contents Articles Mobile device management 1 Mobile phone 3 Tablet computer 19 Windows Update 32 FOTA (technology) 37 Open Mobile Alliance 39 Cross-platform 41 OMA Device Management 48 Open standard 51 SMS 63 Wandering WiFi 72 Sybase 74 Afaria 79 Good Technology 80 Research In Motion 82 BlackBerry 89 Nokia 100 Intellisync 125 REVIVAL Mobile Management Suite 126 Juniper Networks 128 McAfee 139 MobileIron 145 Symantec 147 The SyncML Initiative 153 Device Management Forum 154 Mobile application development 155 Adaptxt 160 Adobe Flash Cast 162 Allsport GPS 162 Android Market 164 Appcelerator Titanium 171 AviatorCalc 172 Betavine 175 BlackBerry App World 177 Bolt Browser 180 User:Bootcamp66/Odyssey Software (Mobile Device Management) 192 Binary Runtime Environment for Wireless 194 Brightkite 197 Canditv 199 City ID 200 Client–server model 202 User:Colinrbest/DragonRAD 204 Corona (software development kit) 205 Doddle 207 DragonRAD 209 EQO 211 EveryWAN Mobility Manager 213 Exit Games 214 GetJar 216 Handheld video game 217 Hands-On Mobile 220 Illumination Software Creator 224 Imoblife 226 InnoPath Software 229 Internet Explorer Mobile 231 iSilo 235 iSiloX 236 Java Platform, Micro Edition 237 JavaFX 243 JOCA 247 July Systems 248 Kavapoint 251 KD Player 253 Kinoma 256 Lightweight User Interface Toolkit 258 List of digital distribution platforms for mobile devices 259 List of Google products 265 Loopt 281 Lovegetty 284 Lovegety 285 User:Mathiastck/GetJar 285 Mformation 286 MIDlet 287 MiKandi 289 MOAP 291 Mobi4Biz 291 Mobiflock 292 Mobile browser 293 Mobile business intelligence 298 Mobile dialer 303 Mobile e-mail 304 Mobile game 304 Mobile media 308 Mobile software platform 309 Mobile Sorcery 315 Mobile Virtualization 316 Mobile wallpaper 317 Mobile Web Server (Symbian OS) 319 Mobinex 321 Mobiola 323 Mobiquant 325 Motoblur 326 mpowerplayer 327 MXit 328 MyMobileWeb 334 N-Gage (service) 335 Nellymoser 347 Nokia network monitor 349 Nokia Ovi Suite 350 Nokia Point & Find 352 Nokia Sports Tracker 353 Obigo Browser 355 Odyssey Software (Mobile Device Management) 356 On-Device Portal 358 Oruxmaps 361 Ovi (Nokia) 362 Ovi Maps 367 Palm App Catalog 369 Phunware 370 PicDial 371 Pokémate 374 Polaris Browser 376 Polaris Document Master 378 Python for S60 379 Qeep 381 QuickOffice 383 Radio Service Software 384 S60 (software platform) 384 Secure Mobile Architecture (SMA) 391 Sense Networks 392 Series 30 (software platform) 394 Series 40 395 Series 80 (software platform) 397 SHAPE Services 398 User:Sixsteps/Garage Labs 400 Skyfire (web browser) 401 SmartCam 406 Smartface 407 Software Components OTA 409 Sonic Boom, Inc. 410 Sony Ericsson Java Platform 412 Sybase unwired platform 413 SyncShield 414 System Center Mobile Device Manager 416 Tomytronic 3D 417 ToneThis 418 TouchPal 418 Tristit Browser 420 UAProf 421 Ubitexx 423 UDigits 425 Universal Mobile Interface 426 UZard Web 430 Virtual Radio 431 Web Browser for S60 432 WebKit 435 WiDEN 441 WikiPock 442 Windows Marketplace for Mobile 443 Windows Phone Marketplace 445 WIPI 447 WMLScript 448 WorkLight 449 Yahoo! Go 451 Zlango 452 Zozoc 454 References Article Sources and Contributors 455 Image Sources, Licenses and Contributors 465 Article Licenses License 469 Mobile device management 1 Mobile device management Mobile Device Management (MDM) software secures, monitors, manages and supports mobile devices deployed across an enterprise. Enterprise-grade MDM functionality typically includes over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc. The intent of MDM is to optimize the functionality and security of a mobile communications network while minimizing cost and downtime. [1] [2] [3] This applies to both company-owned and employee-owned devices across the enterprise. Implementation Typically solutions include a server component, which sends out the management commands to the mobile devices, and a client command, which runs on the handset and receives and implements the management commands. In some cases, a single vendor may provide both the client and the server, in others client and server will come from different sources. The management of mobile devices has evolved over time. At first it was necessary to either connect to the handset or install a SIM in order to make changes and updates; scalability was a problem. One of the next steps was to allow a client initiated update, similar to when a user requests a Windows Update. Central remote management, using commands sent over the air, is the next step. An administrator at the mobile operator, an enterprise IT data center or a handset OEM can use an administrative console to update or configure any one handset, group or groups of handsets. This obviously provides scalability benefits particularly useful when the fleet of managed devices is large in size. [4] [5] Central functionality includes: • FOTA - Firmware over the air updates • Diagnostics • Remote Configuration and Provisioning • Security • Backup/Restore • Network Usage and Support • Server Deployment • Mobile Asset Tracking and Management • Remote Lock and Wipe • Device Provisioning • Software Installation • Troubleshooting and Diagnostic Tools • Policy Application • Logging and Reporting • Remote Control and Administration • GPS Tracking and 'Breadcrumb' Mapping Mobile device management 2 Device Management specifications The Open Mobile Alliance (OMA) specified a platform-independent device management protocol called OMA Device Management. The specification meets the common definitions of an open standard, meaning the specification is freely available and implementable. It is supported by several mobile devices, such as PDAs and mobile phones.. Over the air Over-the-Air (OTA) capabilities are considered a main component of mobile network operator and enterprise-grade Mobile Device Management software. These capabilities include the ability to remotely configure a single mobile device, an entire fleet of mobile devices or any IT-defined set of mobile devices; send software and OS updates; remotely lock and wipe a device, which protects the data stored on the device when it is lost or stolen; and remote troubleshooting. OTA commands are sent as a binary SMS message. Binary SMS is a message including binary [6] data. Mobile Device Management software enables corporate IT departments to proactively and systematically manage the growing universe of mobile devices used across the enterprise; subsequently, over-the-air capabilities are in high demand. Enterprises using OTA SMS as part of their MDM infrastructure demand high quality in the sending of OTA messages, what imposes on SMS gateway providers to offer a high level of quality and reliability. Vendors offering MDM solutions • AirWatch [7] • Amtelnet (MDM) [8] • Alepo's OMA-DM Server Product [9] • BoxTone Inc. • Sybase (Afaria product) [10] • FAMOC • Good Technology • RIM (BlackBerry) • Nokia (Intellisync product) • The Institution - (REVIVAL Mobile Management Suite product) • Juniper Networks (Junos Pulse Mobile Security Suite product) • McAfee Enterprise Mobility Management • Mobile Active Defense MECS • MobileIron • Odyssey Software inc. (Athena product) • Symantec Mobile Security Suite • Tangoe Mobile Device Manager • Zenprise (MobileManager 6.0 product) [11] • Ibelem PushManager [12] • MFormation Technologies [13] • MaaS360 by Fiberlink Mobile device management 3 References [1] What is mobile device management? - a definition from Whatis.com (http:/ / searchmobilecomputing. techtarget. com/ sDefinition/ 0,290660,sid40_gci1196634,00. html) [2] Mobile device management overview (http:/ / www. mobiledevicemanagement. org/ mobile-device-management-overview) [3] A comprehensive article on mobile device management (http:/ / www. devicemanagement. org/ content/ view/ 20754/ 152/ ) [4] IDC - Document at a Glance (http:/ / www. idc. com/ getdoc. jsp?containerId=207276) [5] Windows Mobile Device Management and Security Solutions (http:/ / download. microsoft. com/ download/ d/ 7/ 8/ d786eeac-3014-4172-8ce7-6b9888a9d5e0/
Recommended publications
  • Open 1-Matthewdering-Thesis.Pdf
    The Pennsylvania State University The Graduate School ANDROID MARKET: LARGE SCALE RECONSTRUCTION AND ANALYSIS A Thesis in Computer Science and Engineering by Matthew Dering c 2014 Matthew Dering Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science May 2014 The thesis of Matthew Dering was reviewed and approved∗ by the following: Patrick McDaniel Professor of Computer Science and Engineering Thesis Advisor Sencun Zhu Associate Professor of Computer Science and Engineering Raj Acharya Professor of Computer Science and Engineering Department Chair ∗Signatures are on file in the Graduate School. Abstract Smartphones have experienced a boom over the last 10 years. Currently a user is left to trust their device manufacturer when installing applications. In this paper we outline our suite of applications that are designed to provide us and users information about applications leveraging a reversed API for the Google Play market, working in concert with several analysis tools, some of our own design. In order to gather as complete of a picture of the market as possible, we propose a method for recreating the market in its entirety. Using this procured data, we present an overview of how two popular Android features are used in the real world: Permissions and Libraries. We find that there is a large correlation between library use and Permission use, which represents a security concern. iii Table of Contents List of Figures vi List of Tables vii Acknowledgments viii Chapter 1 Introduction 1 1.1 Introduction . 1 1.2 Google Play Market . 2 1.3 Privileges . 4 1.4 Design .
    [Show full text]
  • Chapter # 1 Introduction
    Chapter # 1 Introduction Mobile applications (apps) have been gaining rising popularity dueto the advances in mobile technologies and the large increase in the number of mobile users. Consequently, several app distribution platforms, which provide a new way for developing, downloading, and updating software applications in modern mobile devices, have recently emerged. To better understand the download patterns, popularity trends, and development strategies in this rapidly evolving mobile app ecosystem, we systematically monitored and analyzed four popular third-party Android app marketplaces. Our study focuses on measuring, analyzing, and modeling the app popularity distribution, and explores how pricing and revenue strategies affect app popularity and developers’ income. Our results indicate that unlike web and peer-to-peer file sharing workloads, the app popularity distribution deviates from commonly observed Zipf-like models. We verify that these deviations can be mainly attributed to a new download pattern, to which we refer as the clustering effect. We validate the existence of this effect by revealing a strong temporal affinity of user downloads to app categories. Based on these observations, we propose a new formal clustering model for the distribution of app downloads, and demonstrate that it closely fits measured data. Moreover, we observe that paid apps follow a different popularity distribution than free apps, and show how free apps with an ad-based revenue strategy may result in higher financial benefits than paid apps. We believe that this study can be useful to appstore designers for improving content delivery and recommendation systems, as well as to app developers for selecting proper pricing policies to increase their income.
    [Show full text]
  • Japan's Smartphone Market
    Executive Insights Volume XVIII, Issue 37 Japan’s Smartphone Surge and Its Impact on the Mobile Marketplace After years of trailing the world’s major markets, Understanding Japan’s mobile evolution smartphone penetration in Japan has taken off Japan was among the earliest adopters of handheld technology, bringing to market some of the first camera phones, mobile TVs — and significantly so, rising from just 15% of the and devices with remote email capability during the early part of population in 2011 to more than 75% today, the millennium. The country also launched its own high-speed according to the Communications and Information cellular data service well before other regions, albeit utilizing a set of standards that were different from those used in the rest of the world. Network Association of Japan (see Figure 1). The surge in handheld devices has paved the way for an explosion Figure 1 in mobile application development in recent years, profoundly Smartphone penetration in Japan, 2011-2016 impacting a number of native industries. For example, news PPTΔ (2011-2016)* aggregation apps are expected to surpass traditional news outlets 100 75 in the years ahead, becoming a touchpoint for a broader array of 90 services, including e-commerce, shopping, promotions/coupons 80 84 and more in the process. Additionally, mobile gaming will gradually 70 77 replace home video systems as the preferred gaming platform, 60 leading to increased revenues from in-app gaming purchases. 50 60 40 Not surprisingly, this growth in Japan’s mobile-device market has 30 39 piqued the interest of foreign businesses eager to capitalize on the 20 region’s newfound application fixation.
    [Show full text]
  • Exploring Mobile News Reading Interactions for News App
    Exploring mobile news reading interactions for news app personalisation Marios Constantinides1, John Dowell1, David Johnson1, Sylvain Malacria1, 2 1 University College London, 2 Inria Lille London, United Kingdom Lille, France {m.constantinides, j.dowell}@cs.ucl.ac.uk [email protected] [email protected] ABSTRACT Mobile news access perfectly complements the As news is increasingly accessed on smartphones and continuously updating, 24-hour nature of digital news tablets, the need for personalising news app interactions is services. But if users are now never out of range of the apparent. We report a series of three studies addressing key news, they need more than ever for that access to be issues in the development of adaptive news app interfaces. adaptive and personalised. Personalised news services are We first surveyed users’ news reading preferences and already able to help people find news that is relevant to behaviours; analysis revealed three primary types of reader. them, to recommend the right news to the right users, and to We then implemented and deployed an Android news app help users keep abreast of news by aggregation over that logs users’ interactions with the app. We used the logs multiple sources. This adaptivity is achieved through to train a classifier and showed that it is able to reliably several methods [5] including: news content personalisation recognise a user according to their reader type. Finally we by pushing filtered articles predicted to match the user’s evaluated alternative, adaptive user interfaces for each interests; adaptive news browsing by changing the order of reader type.
    [Show full text]
  • Peer-To-Peer Protocol and Application Detection Support
    Peer-to-Peer Protocol and Application Detection Support This appendix lists all the protocols and applications currently supported by Cisco ASR 5500 ADC. • Supported Protocols and Applications, page 1 Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols, and the applications using these protocols. Important Please note that various client versions are supported for the protocols. The client versions listed in the table below are the latest supported version(s). Important Please note that the release version in the Supported from Release column has changed for protocols/applications that are new since the ADC plugin release in August 2015. This will now be the ADC Plugin Build number in the x.xxx.xxx format. The previous releases were versioned as 1.1 (ADC plugin release for December 2012 ), 1.2 (ADC plugin release for April 2013), and so on for consecutive releases. New in this Release This section lists the supported P2P protocols, sub-protocols and applications introduced in the ADC Plugin release for December 1, 2017. ADC Administration Guide, StarOS Release 21.6 1 Peer-to-Peer Protocol and Application Detection Support New in this Release Protocol / Client Client Version Group Classification Supported from Application Release 6play 6play (Android) 4.4.1 Streaming Streaming-video ADC Plugin 2.19.895 Unclassified 6play (iOS) 4.4.1 6play — (Windows) BFM TV BFM TV 3.0.9 Streaming Streaming-video ADC Plugin 2.19.895 (Android) Unclassified BFM TV (iOS) 5.0.7 BFM — TV(Windows) Clash Royale
    [Show full text]
  • Meteor: Seeding a Security-Enhancing Infrastructure for Multi-Market Application Ecosystems
    Meteor: Seeding a Security-Enhancing Infrastructure for Multi-market Application Ecosystems David Barrera William Enck Paul C. van Oorschot School of Computer Science Department of Computer Science School of Computer Science Carleton University North Carolina State University Carleton University Abstract—Application markets providing one-click software in- Bouncer [16]).1 Second, it provides a means to remotely stallation have become common to smartphones and are emerging uninstall distributed apps later identified as malicious. These on desktop platforms. Until recently, each platform has had only remote uninstalls (or “kill switches” [6], [5]) provide faster one market; however, social and economic pressures have resulted in multiple-market ecosystems. Multi-market environments limit, clean-up than traditional antivirus software, as they push and in some cases eliminate, valuable security characteristics actions to devices and do not require definition updates or provided by the market model, including kill switches and resource intensive scanning. Finally, search results display developer name consistency. We outline a novel approach to consistent developer names for applications. Once a developer retaining single-market security semantics while enabling the has registered with the market, controls exist such that no flexibility and independence of a multi-market environment. We propose Meteor as a security-enhancing application installation other developer can easily distribute applications under that framework that leverages information (e.g., app statistics, expert developer name. Hence, consumers have some assurance that ratings, developer history) from a configurable set of security all applications provided by “John Smith” are provided by the information sources. We build a proof-of-concept Android ap- same John Smith.
    [Show full text]
  • Multimedia Messaging Service : an Engineering Approach To
    Multimedia Messaging Service Multimedia Messaging Service An Engineering Approach to MMS Gwenael¨ Le Bodic Alcatel, France Copyright 2003 John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England Telephone (+44) 1243 779777 Email (for orders and customer service enquiries): [email protected] Visit our Home Page on www.wileyeurope.com or www.wiley.com All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London W1T 4LP, UK, without the permission in writing of the Publisher. Requests to the Publisher should be addressed to the Permissions Department, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England, or emailed to [email protected], or faxed to (+44) 1243 770620. This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold on the understanding that the Publisher is not engaged in rendering professional services. If professional advice or other expert assistance is required, the services of a competent professional should be sought. Other Wiley Editorial Offices John Wiley & Sons Inc., 111 River Street, Hoboken, NJ 07030, USA Jossey-Bass, 989 Market Street, San Francisco, CA 94103-1741, USA Wiley-VCH Verlag GmbH, Boschstr. 12, D-69469 Weinheim, Germany John Wiley & Sons Australia Ltd, 33 Park Road, Milton, Queensland 4064, Australia John Wiley & Sons (Asia) Pte Ltd, 2 Clementi Loop #02-01, Jin Xing Distripark, Singapore 129809 John Wiley & Sons Canada Ltd, 22 Worcester Road, Etobicoke, Ontario, Canada M9W 1L1 Wiley also publishes its books in a variety of electronic formats.
    [Show full text]
  • CTIA Spectrum Efficiency
    Smarter and More Efficient: How America’s Wireless Industry Maximizes Its Spectrum 1 Executive Summary The wireless industry is always looking for more spectrum As 5G is deployed, the demands on wireless networks are to meet the growing demand for mobile data, power the only going to increase. 5G will enable a massive increase connectivity that creates jobs and grows the economy, in the number of wirelessly-connected devices, and and sustain the networks that hundreds of millions of the significant increase in 5G network speeds will drive Americans rely upon every day. further increases in data across wireless networks. But as the industry works with policymakers and federal Facing this explosion in mobile data traffic, wireless agencies to find new spectrum to bring to market, wireless providers have taken aggressive efforts to maximize providers are also investing heavily to make more efficient their limited spectrum resources. As Verizon CEO Hans use of the spectrum holdings they have today. Vestberg said, “[T]here are billions of dollars going into spectrum efficiency every day.”2 The reason is simple: Spectral efficiency is not an academic exercise for U.S. efficient use of industry’s spectrum resources is critical wireless providers. It’s essential. Facing a hockey stick to consumers’ mobile experience. increase of mobile data growth, wireless providers must look at all strategies to increase network capacity— Spectrum efficiency has also been a hallmark of the U.S. incorporating new, more efficient wireless technologies focus on flexible, exclusive-use licensing—a framework into their networks and deploying densified infrastructure. that has driven America’s wireless leadership.
    [Show full text]
  • Management Enablement(OMA)
    ONEM2M TECHNICAL SPECIFICATION Document Number TS-0005-V3.5.1 Document Name: Management Enablement (OMA) Date: 2019-04-18 Abstract: Specifies the usage of OMA DM and OMA LwM2M resources and the corresponding message flows including normal cases as well as error cases to fulfill the oneM2M management requirements. • Mapping between the oneM2M management related resources and the resources from OMA. • Protocol translation between the oneM2M service layer and OMA. The Mca reference point, ms interface and la interface are possibly involved in this protocol translation. • Resource definitions in OMA to fulfill the oneM2M management requirements. This Specification is provided for future development work within oneM2M only. The Partners accept no liability for any use of this Specification. The present document has not been subject to any approval process by the oneM2M Partners Type 1. Published oneM2M specifications and reports for implementation should be obtained via the oneM2M Partners' Publications Offices. © oneM2M Partners Type 1 (ARIB, ATIS, CCSA, ETSI, TIA, TSDSI, TTA, TTC) Page 1 of 92 This is a draft oneM2M document and should not be relied upon; the final version, if any, will be made available by oneM2M Partners Type 1. About oneM2M The purpose and goal of oneM2M is to develop technical specifications which address the need for a common M2M Service Layer that can be readily embedded within various hardware and software, and relied upon to connect the myriad of devices in the field with M2M application servers worldwide. More information about oneM2M may be found at: http//www.oneM2M.org Copyright Notification No part of this document may be reproduced, in an electronic retrieval system or otherwise, except as authorized by written permission.
    [Show full text]
  • Dope Wars Crack House Iphone 4 >>>
    Dope Wars Crack House Iphone 4 >>> http://shurll.com/78zhf 1 / 6 2 / 6 dr fone wondershare crack mac minecraft server soulcraft cracked wheat crack password protected rar file linux command finite element analysis of slant edge crack by abaqus user pc security 6 4 94fbr serial number fire emblem awakening support grinding the crack archicad 14 free download with crack and keygen vegas pro 10 keygen only crack tomb raider 3 pc ita full paint tool sai english full free version battlefield bad company 2 vietnam crack only download social booth software crack website hide my ip crack 6.0 comar vr cinema pro cracked heels sothink logo maker professional keygen crack transmac 10 4 keygen torrent lady do nhl 09 crack frc labview serial number 2014 bmw 135i cobb v3 serial number sik trix bmx full version game free download panda antivirus 2012 full version with key muse cc 2015 crack mac os celemony melodyne mac keygen torrent solaris 11 parallels 8 serial number gastr del sol crookt crack or fly blogspot radio hawx 2 dlc keygen free happy wheels 2 full version game download microsoft office 2013 activation keygen download ek number star pravah serial are vedya asoftech photo recovery crack download crack activacion windows 7 ultimate 64 apple iphone 6 home button crack how to justify text in indesign cs2 crack crack shot guns minecraft mod adobe acrobat xi pro serial number crack programs animar en after effects cs6 serial number google earth image downloader crack world of tanks generals download crack aqua mail pro cracked lips avs video editor
    [Show full text]
  • Context Sensitive Netbooks INF5261
    UNIVERSITY OF OSLO Department of Informatics Context sensitive netbooks INF5261 Adriana Alexandri, Morten Frellumstad, Brendan Johan Lee Spring 2009 Contents 1 Introduction 3 2 Netbooks 4 2.1 History, emerging trends and the future . .4 2.2 Android to refocus netbooks? . .5 2.3 Are netbooks going away? . .6 3 Context awareness 7 3.1 Mobility . .9 3.2 Device proximity . 10 3.3 Dual use . 10 4 Ethics 11 4.1 Our issues . 13 4.2 Possible solutions . 15 4.3 The mind . 16 4.4 Conclusion . 16 5 Survey 16 5.1 Methods . 16 5.2 Results . 17 5.3 Conclusions . 18 6 Creating a context aware framework 18 6.1 Software of interest . 18 6.1.1 Mobiola Headset for Skype . 18 6.1.2 JoikuSpot . 18 6.1.3 Blueproximity and pyacceleremoter . 19 6.1.4 Anyremote, Psiloc Wireless Presenter, Salling clicker and Bluetooth remote . 19 6.2 How could we build a context aware system at UiO? . 20 6.3 Our suggested framework . 22 7 Conclusion 23 7.1 Future work . 24 7.1.1 An experiment at Blindern . 25 References 26 A Descriptive Statistics 30 B Descriptive Statistics: U1; U2; U3; U4; U5; U6; U7; U8 30 1 C Descriptive Statistics: S1; S2; S3; S4; S5; S6; S7; S8; ... 31 D Subset bring to UiO often Descriptive Statistics: U1; U2; U3; U4; U5; U6; U7; U8 32 E Existing and non-existing services 34 E.1 Non existing service (to our knowledge) . 34 E.2 Existing services . 34 2 1 Introduction Netbook is a collective term, most likely coined by Psion in 1999[1], repre- senting relatively inexpensive small notebooks designed for wireless commu- nication and Internet access.
    [Show full text]
  • Wang Lin.Pdf 791KB Dec 05 2013 05:23:33 PM
    University of Florida Department of Electrical and Computer Engineering EEL 4665/5666 Intelligent Machines Design Laboratory Written Report Student Name: Lin Wang Robot Name: Sh ake Shake Shake E-Mail: [email protected] Instructors: Dr. A. Antonio Arroyo Dr. Eric M. Schwartz TAs: Ryan Chilton Josh Weaver Table of Contents Abstract .......................................................................................................................... 4 Executive Summary ....................................................................................................... 4 Introduction .................................................................................................................... 5 Integrated system ........................................................................................................... 6 Mobile platform ............................................................................................................. 8 Actuation ........................................................................................................................ 9 Sensors ........................................................................................................................... 9 Behaviors ..................................................................................................................... 11 Experimental layout and results ................................................................................... 12 Conclusion ..................................................................................................................
    [Show full text]