Building the Internet of Things Using RFID

Total Page:16

File Type:pdf, Size:1020Kb

Building the Internet of Things Using RFID Editors: Frédéric Thiesse • [email protected] Florian Michahelles • [email protected] Building the Internet of Things Using RFID Internet of Things Track Things of Internet The RFID Ecosystem Experience At the University of Washington, the RFID Ecosystem creates a microcosm for the Internet of Things. The authors developed a suite of Web-based, user-level tools and applications designed to empower users by facilitating their understanding, management, and control of personal RFID data and privacy settings. They deployed these applications in the RFID Ecosystem and conducted a four-week user study to measure trends in adoption and utilization of the tools and applications as well as users’ qualitative reactions. Evan Welbourne, he rapid proliferation of passive cal properties, origin, ownership, and Leilani Battle, Garret Cole, RFID tags in the past decade has sensory context (for example, the tem- Kayla Gould, Kyle Rector, T given rise to various concepts that perature at which a milk carton is being Samuel Raymer, integrate the physical world with the stored). When ubiquitous and available Magdalena Balazinska, virtual one. One of the most popular is in real time, this information can dra- and Gaetano Borriello the Internet of Things (IoT), a vision in matically streamline how we manufac- University of Washington which the Internet extends into our ev- ture, distribute, manage, and recycle eryday lives through a wireless network our goods. It can also transform the of uniquely identifiable objects. Given way we perform everyday activities by numerous predictions that we’ll have giving applications current and detailed hundreds of billions of RFID-tagged ob- knowledge about physical events. This jects at approximately five cents per tag “real-life” context can unlock the door by 2015,1 we’re not only approaching to various business, environmental, such a world, we’re on its doorstep. personal, and social contexts hitherto In this type of RFID system, each inaccessible to Internet applications. physical object is accompanied by a The incredible amount of informa- rich, globally accessible virtual object tion captured by a trillion RFID tags that contains both current and histori- will have a tremendous impact on our cal information on that object’s physi- lives. However, questions remain if we 48 Published by the IEEE Computer Society 1089-7801/09/$25.00 © 2009 IEEE IEEE INTERNET COMPUTING Building the Internet of Things Using RFID are to use RFID in the IoT. How do we transform low-level RFID data into meaningful, high-level information? Can we design and build applica- tions that are truly useful and not just novelties? If so, will their utility outweigh the potential loss of privacy, and how can we help users un- derstand and control their privacy settings? At the University of Washington, we’re exploring these issues first-hand with a building- scale, community-oriented research infrastructure called the RFID Ecosystem (http://rfid.cs.washington.edu). This infrastruc- ture creates a microcosm for the IoT in which we can investigate applications, systems, and social issues that are likely to emerge in a re- alistic, day-to-day setting. We’ve developed a suite of Web-based, user-level tools and appli- cations for the IoT and deployed it in the RFID Ecosystem. We’ve also conducted a four-week user study to investigate patterns of adoption and utilization of our tools and applications as well as users’ subjective reactions. We present Figure 1. The RFID Ecosystem. RFID reader antennas are mounted the results of this study, focusing on tool and on cable trays (upper left) and in custom-built wooden boxes application usage. (lower left). An RFID kiosk (upper right) lets users associate one of three types of tags (lower right) with a personal object. The RFID Ecosystem We built the RFID Ecosystem around an Elec- tronic Product Code (EPC) Class-1 Generation-2 one tag-read event (TRE) per tag per antenna RFID deployment that spans all seven floors of per second, a tuple with the schema (tag ID, our 8,000-square-meter computer science and antenna ID, time). For example, if tag A is engineering building (see Figure 1). The deploy- detected by reader antenna X at time stamp t, ment includes 44 RFID readers (each equipped then the custom reader software will generate with up to four antennas for a total of 161) posi- and send the following TRE to the server: (tag tioned at the building’s entrances, on the stair- A, antenna X, t). Each reader also runs the wells, and throughout the corridors. Readers network time protocol to synchronize its clock run embedded Linux and have wired or wireless with the rest of the system. Gigabit Ethernet over which they report their We store all TRE data in a central SQL RFID data to a central server. Volunteers carry Server database (www.microsoft.com/SQL). This RFID tags as badges and attach tags to personal database also contains metadata about the de- objects. Because most everyday objects aren’t ployment, including each antenna’s latitude yet manufactured with tags embedded, and be- and longitude and a symbolic antenna name cause manufacturer-assigned metadata might (for example, “front entrance,” “4th floor stair- not be personally meaningful, we create the well,” or “Room CSE 405”). We wrote software tag-object association manually. For this pur- to transmit data between the readers and the pose, we created a special kiosk where users can database in Java using Apache’s Multipurpose select an RFID tag, physically attach it to an Infrastructure for Network Applications library object, and create a corresponding association for efficient, secure networking. This software between the tag and that object. implements various privacy policies2,3 and runs All readers in our deployment run custom the Cascadia system4 to support application de- software that processes new RFID data before velopment and execution. Finally, our tools and streaming it to the central server. This soft- applications are entirely Web-based, imple- ware continuously polls the reader hardware mented with the Google Web Toolkit (http:// for newly detected RFID tags and generates code.google.com/webtoolkit/), and hosted with MAY/JUNE 2009 49 Internet of Things Track presents a highly interactive set of menus, ta- bles, and Web forms for creating and managing metadata on a user’s tags and personal objects. The Tag Manager interfaces with the RFID ki- osk so that when users are at the kiosk, they can associate one or more physical tags with an object. For example, a new user can use the Tag Manager at the kiosk to register several per- sonal tags. Later, the same user can access the Creates object: keys Creates place: database laboratory (a) (b) Tag Manager from his laptop to delete objects and review or edit object metadata (such as name, type, image URL, or where the object’s tags were last seen). A second tool, the Place Manager, supports creating and editing high-level location in- formation items, called places.5 A place in the RFID Ecosystem is a set of one or more RFID (c) Creates event: “Evan enters database laboratory with keys” antennas with a label. For example, the two an- tennas in the corridor on either side of a user’s Figure 2. Metadata management tools. (a) The Tag Manager office door might be grouped and labeled “my creates and manages virtual objects to which tags can be bound; office.” The Place Manager displays each RFID (b) the Place Manager groups antennas into places; and (c) Scenic antenna’s location as an icon in a Google Map uses objects and places to specify how to transform a user’s tag- mashup of the RFID Ecosystem deployment. Us- read events (TREs) into higher-level events. ers can create or edit a place by clicking on an- tenna icons to select or deselect antennas and by entering the place label in a text box (see Apache and Tomcat (www.apache.org) on a sep- Figures 2a and 2b). arate server. Once the Tag and Place Managers define metadata that binds tags to objects and anten- User-Level Tools nas to places, respectively, applications and The RFID data our deployment supplies offer other system components can use that data to low-level location information in terms of tags generate higher-level information that’s person- and antennas. TREs — such as (tag A, an- alized and more directly meaningful to users. tenna X, t) or (tag B, antenna Y, t + An additional third tool, Scenic, lets users spec- 1) — are helpful to IoT users only if a middle- ify what higher-level events they would like ware can transform them into more meaning- to have extracted from their TREs (see Figure ful, high-level information about events that 2c). Scenic uses an iconic visual language and applications and users can directly consume a storyboard metaphor to describe how people (for example, Ana is leaving the office with her and objects enact an event through a sequence purse). Furthermore, because such high-level of movements between places. Specifically, the events are personal and potentially sensitive, Scenic interface lets users drag and drop icons users must be able to precisely control all in- representing people, objects, places, and basic formation disclosure to avoid privacy breaches. relationships (such as inside, outside, near, or As such, we’ve developed several secure, Web- far) onto one or more panels, or “scenes,” in a based tools that let users directly control how storyboard to specify a movement sequence their RFID data is transformed and disclosed in corresponding to an event. Thus, to specify an the RFID Ecosystem. event, users simply “tell the event’s story,” scene by scene.
Recommended publications
  • EPIC Google FTC Complaint
    Before the Federal Trade Commission Washington, DC 20580 In the Matter of ) ) Google, Inc. and ) Cloud Computing Services ) ________________________________ ) Complaint and Request for Injunction, Request for Investigation and for Other Relief SUMMARY OF COMPLAINT 1. This complaint concerns privacy and security risks associated with the provision of “Cloud Computing Services” by Google, Inc. to American consumers, businesses, and federal agencies of the United States government. Recent reports indicate that Google does not adequately safeguard the confidential information that it obtains. Given the previous opinions of the Federal Trade Commission regarding the obligation of service providers to ensure security, EPIC hereby petitions the Federal Trade Commission to open an investigation into Google’s Cloud Computing Services, to determine the adequacy of the privacy and security safeguards, to assess the representations made by the firm regarding these services, to determine whether the firm has engaged in unfair and/or deceptive trade practices, and to take any such measures as are necessary, including to enjoin Google from offering such services until safeguards are verifiably established. Such action by the Commission is necessary to ensure the safety and security of information submitted to Google by American consumers, American businesses, and American federal agencies. PARTIES 1. The Electronic Privacy Information Center (“EPIC”) is a public interest research organization incorporated in Washington, DC. EPIC’s activities include the review of government and private sector policies and practices to determine their impact on the privacy interests of the American public. Among its other activities, EPIC initiated the complaint to the FTC regarding Microsoft Passport in which the Commission subsequently required Microsoft to implement a comprehensive information security program for 1 Passport and similar services.1 EPIC also filed the complaint with the Commission regarding databroker ChoicePoint, Inc.
    [Show full text]
  • Overtaking Google Desktop Leveraging XSS to Raise Havoc
    Overtaking Google Desktop Leveraging XSS to Raise Havoc Yair Amit Senior Security Researcher, Watchfire [email protected] 6th OWASP +972-9-9586077 ext 4039 AppSec Conference Copyright © 2007 - The OWASP Foundation Milan - May 2007 Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike 2.5 License. To view this license, visit http://creativecommons.org/licenses/by-sa/2.5/ The OWASP Foundation http://www.owasp.org / Presentation Outline Background Google Desktop Overview Overtaking Google Desktop – Step by Step Impact What harm can a malicious attacker do? Attack characteristics Lessons learned Q&A 6th OWASP AppSec Conference – Milan – May 2007 2 Background XSS The most widespread web-application vulnerability WASC Web Application Security Statistics Project (http://www.webappsec.org/projects/statistics/ ) Used to be perceived as an identity theft attack XSS has so much more to offer. It has teeth! Change settings and steal data from attacked victim account Web worms (Samy) What we are about to see… Stealth attack Sensitive information theft from the local computer Command execution 6th OWASP AppSec Conference – Milan – May 2007 3 Google Desktop - Overview Purpose: provide an easily to use and powerful search capability on local and other personal content Some traits: Runs a local web-server for interaction (port 4664) Google.com like interface Uses a service to run the indexing User interface is almost purely web Preferences control what to index, and indexing can be broad Office documents, media files, web history cache, chat sessions, etc. Easily extendible Special integration with Google.com 6th OWASP AppSec Conference – Milan – May 2007 4 Google Desktop Security Mechanisms Web server only accessible from localhost Not available from network 6th OWASP AppSec Conference – Milan – May 2007 5 Google Desktop Protection Mechanism (cont.) The main threats are XSS and XSRF attacks.
    [Show full text]
  • In the Common Pleas Court Delaware County, Ohio Civil Division
    IN THE COMMON PLEAS COURT DELAWARE COUNTY, OHIO CIVIL DIVISION STATE OF OHIO ex rel. DAVE YOST, OHIO ATTORNEY GENERAL, Case No. 21 CV H________________ 30 East Broad St. Columbus, OH 43215 Plaintiff, JUDGE ___________________ v. GOOGLE LLC 1600 Amphitheatre Parkway COMPLAINT FOR Mountain View, CA 94043 DECLARATORY JUDGMENT AND INJUNCTIVE RELIEF Also Serve: Google LLC c/o Corporation Service Co. 50 W. Broad St., Ste. 1330 Columbus OH 43215 Defendant. Plaintiff, the State of Ohio, by and through its Attorney General, Dave Yost, (hereinafter “Ohio” or “the State”), upon personal knowledge as to its own acts and beliefs, and upon information and belief as to all matters based upon the investigation by counsel, brings this action seeking declaratory and injunctive relief against Google LLC (“Google” or “Defendant”), alleges as follows: I. INTRODUCTION The vast majority of Ohioans use the internet. And nearly all of those who do use Google Search. Google is so ubiquitous that its name has become a verb. A person does not have to sign a contract, buy a specific device, or pay a fee to use Good Search. Google provides its CLERK OF COURTS - DELAWARE COUNTY, OH - COMMON PLEAS COURT 21 CV H 06 0274 - SCHUCK, JAMES P. FILED: 06/08/2021 09:05 AM search services indiscriminately to the public. To use Google Search, all you have to do is type, click and wait. Primarily, users seek “organic search results”, which, per Google’s website, “[a] free listing in Google Search that appears because it's relevant to someone’s search terms.” In lieu of charging a fee, Google collects user data, which it monetizes in various ways—primarily via selling targeted advertisements.
    [Show full text]
  • Paper #5: Google Mobile
    Yale University Thurmantap Arnold Project Digital Platform Theories of Harm Paper Series: 5 Google’s Anticompetitive Practices in Mobile: Creating Monopolies to Sustain a Monopoly May 2020 David Bassali Adam Kinkley Katie Ning Jackson Skeen Table of Contents I. Introduction 3 II. The Vicious Circle: Google’s Creation and Maintenance of its Android Monopoly 5 A. The Relationship Between Android and Google Search 7 B. Contractual Restrictions to Android Usage 8 1. Anti-Fragmentation Agreements 8 2. Mobile Application Distribution Agreements 9 C. Google’s AFAs and MADAs Stifle Competition by Foreclosing Rivals 12 1. Tying Google Apps to GMS Android 14 2. Tying GMS Android and Google Apps to Google Search 18 3. Tying GMS Apps Together 20 III. Google Further Entrenches its Mobile Search Monopoly Through Exclusive Dealing22 A. Google’s Exclusive Dealing is Anticompetitive 25 IV. Google’s Acquisition of Waze Further Forecloses Competition 26 A. Google’s Acquisition of Waze is Anticompetitive 29 V. Google’s Anticompetitive Actions Harm Consumers 31 VI. Google’s Counterarguments are Inadequate 37 A. Google Android 37 B. Google’s Exclusive Contracts 39 C. Google’s Acquisition of Waze 40 VII. Legal Analysis 41 A. Google Android 41 1. Possession of Monopoly Power in a Relevant Market 42 2. Willful Acquisition or Maintenance of Monopoly Power 43 a) Tying 44 b) Bundling 46 B. Google’s Exclusive Dealing 46 1. Market Definition 47 2. Foreclosure of Competition 48 3. Duration and Terminability of the Agreement 49 4. Evidence of Anticompetitive Intent 50 5. Offsetting Procompetitive Justifications 51 C. Google’s Acquisition of Waze 52 1.
    [Show full text]
  • Youtube Com Request Desktop Site
    Youtube Com Request Desktop Site Lorenzo vent his performers blemishes favorably, but bidirectional Matthieu never invigilate so mutationally. transilluminateGunner remains some guileful schiller after or Hasheem rambling happen traverse. first-class or desulphurize any quickies. Phasic Jay usually To follow and boost which finds the request desktop site layout It off and request the youtube videos would otherwise approved by this is a means for inserting your own. Firefox mobile won't play youtube video on background. Besides that desktop site view under the request a desktop version since we will. Get started playing. If desktop site uses cookies. It with youtube desktop site you. When the youtube desktop site option to do you load the page and creators get it starts playing in the video plays. How can request desktop site can render everything. Live stream key new replies are not spam you request desktop sites. Create a desktop sites too long before the request desktop site view on almost any way down the app, but we can access desktop version of? Next time we and trying new module in requesting a smaller since been expanded to? You will now, and play youtube channel. Despite enabling the desktop sites are disabled. Thanks for desktop site, the youtube title and enable desktop screen experience will lead to fully load the facebook app to fix the amount of? You request desktop site starts loading, family or meeting. You are a user profile icon and that tablets, perform regular http. Get things done within a solution is a domain you want to watch history, while you find yourself wondering how to use it works a little.
    [Show full text]
  • Chrome Request Desktop Site Not Working
    Chrome Request Desktop Site Not Working Is Allan always androdioecious and furzy when patronages some tidies very lifelessly and octagonally? Unanalyzable Patrik relives, his emulsoid knee anthropomorphising alee. Wilt often fine-tunes Malaprop when effluvial Ed bushwhacks head-on and disembarrass her fornicators. The website is caught in the google chrome firefox and android phone. There remain many different browser apps in Android market. After every relevant binary is executed, Google Update uploads statistics on the actions that were performed. How change request desktop version of a Web site in Chrome for Android. When compared to site not chrome working or storage and. It has fixed all sorts of problems with Chrome. You can enable desktop view but you are still getting a mobile version. URL in extra background. Hope that works for you! Opening a site not work actually works. If you sync your browsing history bring a sync passphrase, this forecast also contains a temporary authentication token tied to your Google account shall provide better protections to some users whose face may be one attack. Please extract a smaller file and iron again. How To Load on desktop websites permanently in Chrome. Using the Zoom Chrome Extension Zoom Help Center. However, entity can see more of the widow without some being concealed by other cards. How do these enable desktop running on Google Chrome? Note that integral mode having not protect you use example, how the computer you are using is infected by a keylogger that records what character type. Just not work for desktop site requests to chrome works on android phone is.
    [Show full text]
  • Google Apps for Desktop Download How to Add a Google Shortcut on Your Desktop
    google apps for desktop download How to Add a Google Shortcut on Your Desktop. This article was written by Jack Lloyd. Jack Lloyd is a Technology Writer and Editor for wikiHow. He has over two years of experience writing and editing technology-related articles. He is technology enthusiast and an English teacher. The wikiHow Tech Team also followed the article's instructions and verified that they work. This article has been viewed 80,695 times. This wikiHow teaches you how to create a desktop shortcut to Google's search page in the Chrome, Firefox, Internet Explorer, and Safari web browsers. You cannot create a desktop shortcut while using Microsoft Edge. Google retires Chrome App Launcher for Windows, here’s how to launch Google apps from Desktop. Google announced that it discontinued its Chrome App Launcher for Windows Desktop. The program will also be discontinued from Mac, but it will remain as a standard feature of Google’s own Chrome OS. Google’s precise reason for retiring the Chrome App Launcher from Windows and Mac has to do with users opening apps directly from the browser: “We’ve found that users on Windows, Mac, and Linux prefer to launch their apps from within Chrome,” Chrome engineering director Marc Pawliger explains in [a new post to the Chromium blog](Marc Pawliger). “With Chrome’s continued emphasis on simplicity and streamlining browser features, the launcher will be removed from those platforms. It will remain unchanged on Chrome OS.” As Thurrott points out, it is possible that most users are not even aware of the fact that they’re able to run their Google apps directly from the desktop.
    [Show full text]
  • Google: the World's First Information Utility?
    BISE – STATE OF THE ART Google: The World’s First Information Utility? The idea of information utilities came to naught in the 70s and 80s, but the world wide web, the Internet, mobile access, and a plethora of access devices have now made information utilities within reach. Google’s business model, IT infrastructure, and innovation strategies have created the capabilities needed for Google to become the world’s first global information utility. But, the difficulty of monetizing utility services and concerns about privacy, which could bring government regulation, might stymie Google’s growth plans. DOI 10.1007/s12599-008-0011-6 a national scale (Sackmann and Nie 1970; the number of users to the point where it The Authors Sackman and Boehm 1972). Not to be left is the dominant search player in both the out, the idea was also promoted by the U.S. and the world. This IT-based strategy Rex Chen Computer Usage Development Institute has allowed Google to reach more than Prof. Kenneth L. Kraemer, PhD in Japan, the British Post Office in the UK, $16 billion in annual revenue, a stock price Prakul Sharma and Bell Canada and the Telecommunica- over $600 per share and a market capital- University of California, Irvine tions Board in Canada (Press 1974). ization of nearly $200 billion. Center for Research on Information The idea was so revolutionary at the Over the next decade, Google plans to Technology and Organization (CRITO) time that at least one critic called for a extend its existing services to the wire- 5251 California Ave., Ste.
    [Show full text]
  • A Scalable Search Engine for Mass Storage Smart Objects
    A Scalable Search Engine for Mass Storage Smart Objects Nicolas Anciaux 1,2 Saliha Lallali 1,2 Iulian Sandu Popa1,2 Philippe Pucheral1,2 1INRIA Rocquencourt 2Université de Versailles Saint-Quentin-en-Yvelines 78153 Le Chesnay Cedex, France 78035 Versailles Cedex, France [email protected] [email protected] ABSTRACT built by querying these data. So far, all these data end up on This paper presents a new embedded search engine designed for centralized servers where they are analyzed and queried. This smart objects. Such devices are generally equipped with centralized model however has two main drawbacks. First, the extremely low RAM and large Flash storage capacity. To tackle ever increasing amount of data transferred from their source (the these conflicting hardware constraints, conventional search smart objects) to their destination (the servers) has a dramatic engines privilege either insertion or query scalability but cannot negative impact on environmental sustainability (i.e., energy meet both requirements at the same time. Moreover, very few waste) and costs (i.e., data transfer). Hence, significant energy solutions support document deletions and updates in this context. and bandwidth savings can be obtained by storing data locally in In this paper, we introduce three design principles, namely Write- smart objects, especially when dealing with large data and seldom Once Partitioning, Linear Pipelining and Background Linear used records [8, 19]. Second, centralizing data sensed about Merging, and show how they can be combined to produce an individuals introduces an unprecedented threat on data privacy embedded search engine reconciling high insert/delete/update rate (e.g., at 1Hz granularity, an electricity smart meter can reveal the and query scalability.
    [Show full text]
  • Google's Rap Sheet Consolidated 6-14-13.Xlsx
    6/14/2013 GOOGLE'S CONSOLIDATED RAP SHEET Precursor LLC PROFILE PAGE NAME: Google Inc. ‐‐ HQ in Mountain View California; offices in 40 countries; $54b annual revenues; 55% gross profit margin; ~54,000 employees AKA: Youtube, Android, Google+, DoubleClick, Chrome, AdWords, AdSense LEADERS: Larry Page, CEO & Co‐founder; Eric Schmidt, Executive Chairman; Sergey Brin Co‐founder; David Drummond, Chief Legal Officer TURF: 83% global searches (Netmarketshare); 93% US mobile advertising (emarketer); ~50% of global online advertising revenues (ZenithOptimedia) CONSUMERS AT RISK: U.S.: Search: 175m; YouTube: 160m; Android: 135m; Chrome 110m; Social Media: 90m; Gmail: 60m Global: Search: 1.2b; YouTube: 1b; Android: 900m; Chrome: 750m; social media: 600m; Gmail: 425m CORE PROBLEM: America's worst scofflaw runs the world's largest and dominant information marketplace for finding and monetizing online content MODUS OPERANDI BUSINESS M.O. "Ask for forgiveness, not permission;" "launch first, fix later; "think big & inspire a culture of yes;" "minimal accountability controls" Assume ISP safe harbor indemnifies for willful blindness; Google need only react, not act proactively to address well‐known criminal activity on Google Assume minimal responsibility for Google‐hosted content; put responsibility on others to crowdsource detect, & report wrongdoing on Google Argues: laws don't apply to Google/Internet (except for safe harbor); laws are outdated or anti‐innovation; Google's use of others' copyrights is fair use Deny any conflicts of interest; bait with free products to gain dominance then switch to payment model; play innovation as get‐out‐of‐jail‐free card Assume everything digital is public, fair game and sharable; urge everyone to be transparent to Google, while Google remains exceptionally secretive LEGAL M.O.
    [Show full text]
  • Copyrighted Material
    Chapter 1: Introduction to Google Gadgets In This Chapter ✓ Taking a look at the available Google Gadgets ✓ Assembling the gadgets into your own personal creation ✓ Making gadgets work for you ✓ Putting Google on your desktop oogle’s capability to supply and configure information is what makes it Gthe dominant force on the Internet that it is. In addition to the search functions and applications Google provides, it offers the ability to custom- ize and tweak that information and these services into exactly what the user wants. This information isn’t just available on Google’s standard home page, though. Google offers information and functionality through a series of small programs called gadgets, which users can discover, modify, and embed in their own home pages and elsewhere. Better still, these users can create their own gadgets and spread them to the home pages of other users. Exploring the Gadget Directory Whether you’re using an individual account or a Google Apps domain start page, you havehttp://www.pbookshop.com an impressive selection of Google Gadgets available to you. These gadgets can be installed anywhere on your page just by dragging and dropping, and you can arrange them into different tabs as you want. First, though, let’s take a look at what’s available in the main directory. The GadgetCOPYRIGHTED directory may look a little different, MATERIAL depending on whether you access it through iGoogle or Google Apps. Still, the same gadgets are avail- able to either view. Click the Add Stuff link on the homepage of either ser- vice to see the screens shown in Figures 1-1 and 1-2.
    [Show full text]
  • Google Search & Personalized News
    Google Search & Personalized News Chris Fitzgerald Walsh Ambassador of Digital Learning, WestEd [email protected] > Get “Even More” Out of Google > 5 Things You Need to Do Right Now 1) Google Advanced Search - www.google.com (Advanced Search) Quickly narrow your results by the order of words, file type, domain, etc. 2) Google “Special” Web Searches - www.google.com/help/features.html Ex. “Population of China”, “weather 92262”, “3(12*7)/6”, “movie: san diego”, “define: love”, “beatles”, “Bill Clinton age” 3) Google Simple Messaging System (SMS) - www.google.com/sms Ex. Send a text message to “466453“ with a simple text search like “starbucks 94598”, “oakland ca to san jose ca” 4) Google News – news.google.com Customize your own newspaper from sources all over the world. Create RSS news feeds based on keywords. 5) Google Alerts - www.google.com/alerts Have Google find the news and information you want and deliver it to you via email. > 5 Things to Play with Soon 1) Google Search Preferences - www.google.com (Preferences) Set the language, number of results, and safe search levels for your individual computer. 2) iGoogle - www.google.com/ig Add content and rearrange it anywhere on your personal start page. Add Google Gadgets in a click. 3) Google Desktop & Gadgets - desktop.google.com Index the files and your personal web history on your computer. Add Gadgets to your desktop. 4) Google Language Tools - www.google.com (Language Tools) Search pages in a specific language. Instantly translate pages on the Web. 5) Google Custom Search Engines – www.google.com/coop/cse Create your own safe, personalized search engine.
    [Show full text]