Summer 2015 Planet of the Apps

Total Page:16

File Type:pdf, Size:1020Kb

Summer 2015 Planet of the Apps QUARTERLY VOL. 7 NO. 1 SUMMER 2015 PLANET OF THE APPS Advances in Enterprise Mobile Applications IQT Quarterly is a publication of In-Q-Tel, Inc., the strategic investment firm that serves as a bridge between the U.S. Intelligence Community and venture-backed startup firms on the leading edge of technological innovation. IQT Quarterly advances the situational awareness component of the IQT mission, serving as a platform to debut, discuss, and debate issues of innovation in the areas of overlap between commercial potential and U.S. Intelligence Community needs. For comments or questions regarding IQT or this document, please visit www.iqt.org, write to [email protected], or call 703-248-3000. The views expressed are those of the authors in their personal capacities and do not necessarily reflect the opinion of IQT, their employers, or the Government. ©2015 In-Q-Tel, Inc. This document was prepared by In-Q-Tel, Inc., with Government funding (U.S. Government Contract No. 2014-14031000011). The Government has Government Purpose License Rights in this document. Subject to those rights, the reproduction, display, or distribution of the IQT Quarterly without prior written consent from IQT is prohibited. EDITORIAL IQT Quarterly, published by In-Q-Tel, Inc. Editor-in-Chief: Adam Dove Theme Editor: Isaac Myauo Contributing Editors: Brittany Carambio and Carrie Sessine Design by Lomangino Studio LLC Printed in the United States of America QUARTERLY Identify. Adapt. Deliver. TABLE OF CONTENTS On Our Radar: Mobile Apps are Eating the World 02 By Isaac Myauo A Look Inside: Planet of the Apps 05 How to Secure, Deploy, and Manage Mobile Apps 06 in Highly Secure Settings By Harvey Morrison The Changing Nature of Authentication: 10 Meeting the Needs of Mobile Enterprise Applications By Phillip Dunkelberger Enterprise Mobile Apps: A Promise Unfulfilled 14 By Todd Fryburger Mobility, Operational Tempos, Information Strategies, 20 and the Real-Time Enterprise By Kevin Benedict Situational Awareness and Interoperability Defining 24 Next-Generation Public Safety Mobile Solutions By David Krebs Apps are Now Mission-Critical 29 By Andrew Levy From the Portfolio 33 IQT QUARTERLY SUMMER 2015 Vol. 7 No. 1 01 IQT QUARTERLY ON OUR RADAR Mobile Apps are Eating the World By Isaac Myauo In late 2014, Benedict Evans of Andreessen Horowitz presented “Mobile is Eating the World,” where he provided insights on how mobile technology is redefining the Internet and broader tech industry. Evans cited statistics on how users spend more time using mobile apps than the rest of the Web, how mobile first transforms development and capital requirements, and how mobile technology creates new business opportunities that are the foundation of industry disruption. We saw tremendous growth in mobile in 2014, but the enterprise still faces many challenges. This issue of the IQT Quarterly builds on topics discussed in our summer 2012 edition, “Slide to Unlock: The Challenges of Enterprise Mobility” and focuses on the challenges the enterprise faces after issuing or allowing mobile devices. Mobile technology is a phenomenon that has evolved of complex issues surrounding security, management, over the last few years and is continuously transforming development, time-to-market, cost, performance, and the consumer market. In the enterprise, 2014 saw an user experience that need to be addressed. increased focus on mobility and the importance of apps Security for business. The partnership announced between Apple and IBM to transform enterprise mobility seeks for IT Securing mobile apps is a challenge — breaches and organizations to first easily adopt, use, and support data leaks can be disasters. Bring Your Own Device mobile platforms, and secondly demonstrate the (BYOD) policies elevate this risk for the enterprise. importance of well integrated enterprise apps. Google’s Enterprise mobility management (EMM) solutions announcement and recent release of Android for Work have evolved and are relatively mature in mitigating provides increased management and data separation risks by providing scalable tools to manage the device, for work-approved apps. While corporations have largely force encryption, sandbox apps, and set policies, but IT adopted mobile device management (MDM) solutions departments have lost the degree of control in decision- to secure, manage, and control the device, the mobile making they once had regarding device approval. The operating system (OS) industry has also seen a greater fragmentation of mobile platforms and architectures need and push to focus on security and privacy beyond leads to a diverse attack surface for an adversary. the device in response to the challenges within the Enterprise app developers and IT departments, through mobile IT environment. EMM solutions, may enforce best practices for their apps, but by and large the attack surface remains. The rapid adoption of mobile devices and mobile apps Samsung KNOX and Android for Work reduce this attack by consumers has translated to the enterprise. Users surface for many enterprises, but risks still remain within the enterprise now demand a mobile experience and enterprises need to plan, provide remediation, and that is on par with or better than commercial apps. This enable multiple layers of security. presents app developers and IT organizations with a set 02 Vol. 7 No. 1 Identify. Adapt. Deliver. IQT QUARTERLY Users within the enterprise now demand a mobile experience that is on par with or better than commercial apps. This presents app developers and IT organizations with a set of complex issues surrounding security, management, development, time-to- market, cost, performance, and user experience that need to be addressed. Authentication responsive web design (RWD), cross-platform, and app Mobile authentication is difficult; the username and transformation/porting tools are available and have password approach is insecure. This forces IT to increasingly matured over the last few years. However, impose long, complex passwords that hinder the user each tool has its benefits and drawbacks. IQT recently experience. Commercial apps leave security holes conducted a market survey on mobile app development, by leaving the user logged in. Users expect the same which included comparisons of the various mobile app from their enterprise apps — a clunky authentication development tools on the market today. We found that experience or a too heavily locked down app isn’t likely over the past few years, cross-platform tools have to be well adopted by users. The solution is multi-factor improved to provide better performance and better authentication — something you know (e.g., password/ integration with the mobile platform. We believe that PIN), something you have (e.g., tokens), and who you are the enterprise should choose a cross-platform tool that (e.g., biometrics). Above multi-factor is context: policies provides native or native-like performance and the code to choose the right authentication measures based on should be portable. App transformation/porting tools environmental risks and past behaviors. However, both simplify the porting of legacy desktop applications to IT and developers are challenged with understanding run on a mobile device and are best used to provide the complexities and managing the time and cost of a native-like app that follows business-specific how various biometric and token-based authentication workflows. Moreover, this market survey concludes solutions will integrate with the back end and the app. that it is important for the developer and enterprise to Standards that abstract this complexity and enable the understand the apps they need and choose the right tool enterprise to move beyond passwords to more secure for each project. authentication measures have been developed and are User Experience being standardized. Mobility is about experience. Apps that are overly App Development and Mobilization complex, too restrictive, or perform poorly will quickly The job of a mobile app developer has become lose attention and relevance. Mobile app testing tools increasingly complex. There are a spectrum of mobile that are integrated with the development lifecycle for devices and OSes; from smartphones, tablets, and continuous integration allow developers to optimize wearables to Android, iOS, and Windows Mobile. In the in-app experience before release. But these tools addition, developers need to prioritize the devices and can only capture a subset of real world data points OS to target; they also must struggle to decide which to test against. Other apps and services running legacy applications they need to support for the mobile alongside your app, as well as network, device, and OS workforce. Time-to-market, cost, user experience, and variability are all events that are not easily testable. app performance all factor into these decisions. Native, However, mobile application performance monitoring IQT QUARTERLY SUMMER 2015 Vol. 7 No. 1 03 IQT QUARTERLY (mAPM) tools that continuously report these events at deployment and usage. This ALM framework runtime are accessible, and provide rich data about should be extensible — allowing the enterprise to app performance, app crashes, and user experience. integrate with EMM and other tools within the These tools enable developers to monitor, prioritize, enterprise IT infrastructure. troubleshoot, and trend mobile app performance to These are a few of the many challenges associated accelerate enterprise mobility and engage their users. with
Recommended publications
  • ONOMATOPEE 170 ENTREPRECARIAT Silvio Lorusso
    ENTREPRECARIAT Silvio Lorusso ONOMATOPEE 170 A COMPELLING AND RELENTLESS J’ACCUSE: DEBUNKING THE SOCIAL AND POLITICAL MYTHS THAT PUSH AN INCREASING NUMBER OF PERSONS TO PERFORM IN THE ENTREPRENEURSHIP CIRCUS — WITH NO SAFETY NETS. Antonio Casilli, author of En attendant les robots, 2019 ENTREPRECARIAT Silvio Lorusso ONOMATOPEE 170 ENTREPRECARIAT Everyone Is an Entrepreneur. Nobody Is Safe. CONTENTS Colophon 4 Acknowledgments 6 Precarious by Design Foreword by Geert Lovink 9 Origin Story 15 I. Core Values I.I Be Like Elon: What is an Entrepreneur? 21 I.II Expectations vs. Reality: Unboxing Precarity 38 I.III Fake It Till You Make It: Entrepreneurial Precariat or Precarious Entrepreneurialism? 64 II. Assets II.I Time: Shouldn’t You Be Working? 79 II.II Space: Squatting the Endless Ofce 101 II.III Mind: Hack Thyself 130 III. Platforms III.I LinkedIn: A CV That Never Sleeps 155 III.II Fiverr: Creative Self-Destruction 176 III.III GoFundMe: The Tragedy of Crowdfunding 209 Exit Strategy 226 The Spirit of the Entreprecariat Afterword by Rafaele Alberto Ventura 235 Bibliography 241 Entreprecariat: Printed by Printon (Tallinn, Estonia) Everyone Is an Entrepreneur. Print run: 1200 Nobody Is Safe. by Silvio Lorusso Made possible by Foreword Cultuur Eindhoven, by Geert Lovink Mondriaan Fund, Afterword Province Noord-Brabant by Rafaele Alberto Ventura and Onomatopee Onomatopee 170 ISBN: 978-94-93148-16-1 2019 Translation from Italian: Isobel Butters Proofreading: Josh Plough Editorial Advice: Freek Lomme Graphic design: Federico Antonini and Alessio D’Ellena (Superness.info) Typeset in: Monument Grotesk by abcdinamo.com ITC Garamond Condensed Italian edition: Krisis Publishing, 2018 Unless otherwise credited, all images reproduced in this book are the property of their respective authors.
    [Show full text]
  • What Can Engineers Learn from the Humanities?
    What can engineers learn from the Humanities? John Naughton 5 May 2015 Introduction Everywhere one looks these days, the Humanities seem to be on the defensive. On both sides of the Atlantic and further afield there is a crisis of morale in humanities departments. Like the citizens of Czechoslovakia under Soviet rule, Humanities scholars console themselves with bitter, resigned humour, mocking the absurdities of their philistinic overlords. Here, for example, is Terry Eagle- ton, who has held chairs in English in an number of elite universities, reflecting on an encounter he had when being shown round a thoroughly modern Korean university by its thoroughly modern President: “As befitted so eminent a personage, he was flanked by twoburly young minders in black suits and shades, who for all I knew were car- rying Kalashnikovs under their jackets. Having waxed lyrical about his gleaming new business school and state-of-the-art institute for management studies, the president paused to permit me a few words of fulsome praise. I remarked instead that there seemed to be no crit- ical studies of any kind on his campus. He looked at me bemusedly, as though I had asked him how many Ph.D.’s in pole dancing they awarded each year, and replied rather stiffly ‘Your comment will be noted.’ He then took a small piece of cutting-edge technology out of his pocket, flicked it open and spoke a few curt words of Korean into it, probably ‘Kill him.’ A limousine the length of a cricket pitch then arrived, into which the president was bundled by his minders and swept away.
    [Show full text]
  • Inventory and Analysis of Archaeological Site Occurrence on the Atlantic Outer Continental Shelf
    OCS Study BOEM 2012-008 Inventory and Analysis of Archaeological Site Occurrence on the Atlantic Outer Continental Shelf U.S. Department of the Interior Bureau of Ocean Energy Management Gulf of Mexico OCS Region OCS Study BOEM 2012-008 Inventory and Analysis of Archaeological Site Occurrence on the Atlantic Outer Continental Shelf Author TRC Environmental Corporation Prepared under BOEM Contract M08PD00024 by TRC Environmental Corporation 4155 Shackleford Road Suite 225 Norcross, Georgia 30093 Published by U.S. Department of the Interior Bureau of Ocean Energy Management New Orleans Gulf of Mexico OCS Region May 2012 DISCLAIMER This report was prepared under contract between the Bureau of Ocean Energy Management (BOEM) and TRC Environmental Corporation. This report has been technically reviewed by BOEM, and it has been approved for publication. Approval does not signify that the contents necessarily reflect the views and policies of BOEM, nor does mention of trade names or commercial products constitute endoresements or recommendation for use. It is, however, exempt from review and compliance with BOEM editorial standards. REPORT AVAILABILITY This report is available only in compact disc format from the Bureau of Ocean Energy Management, Gulf of Mexico OCS Region, at a charge of $15.00, by referencing OCS Study BOEM 2012-008. The report may be downloaded from the BOEM website through the Environmental Studies Program Information System (ESPIS). You will be able to obtain this report also from the National Technical Information Service in the near future. Here are the addresses. You may also inspect copies at selected Federal Depository Libraries. U.S. Department of the Interior U.S.
    [Show full text]
  • Tug of Perspectives: Mobile App Users Vs Developers
    Tug of Perspectives: Mobile App Users vs Developers Sandeep Kaur Kuttal #1, Yiting Bai #2, Ezequiel Scott ∗3, Rajesh Sharma ∗4 # Tandy School of Computer Science, University of Tulsa USA 1 [email protected] 2 [email protected] ∗ University of Tartu Estonia 3 [email protected] 4 [email protected] Abstract—Billions of apps are published each year in the expressed in app reviews, and team structures can impact mobile application distribution market. However, a large number app popularity. To fill this gap, we investigated the influence of these apps are unsuccessful due to poor user attention of these factors on the user experience to assist struggling and satisfaction as reflected by low ratings on the distribution markets. Recent studies have investigated the app popularity developers. from users’ perspectives, but none of the studies have compared To analyze and understand software engineering paradigm it from a developer’s perspective. To fill this gap, we analyzed of app development, we collected two types of information the user ratings and reviews with the software characteristics: - users ratings and reviews from the Apple App Store and ratings, issue report contents, number of bugs and enhancements, project related information (e.g. issue reports, developers in- and developers’ team structure. In order to do this, we examined 274 apps on the Apple App Store that also had their source volved) from GitHub. These provided us with a rich and inter- code available on GitHub. We collected 19,655 app reviews related set of data. and 13,193 issue reports from both platforms.
    [Show full text]
  • The Nation Speaks Back!
    Formats TBIvision.com October/November 2016 It’s time to listen to the people... The nation speaks back! FormatspOFC OctNov16.indd 1 04/10/2016 19:58 THE iconic new game show Coming to screens in the UK and the Netherlands FormatspIFC-01 Talpa dps OctNov16.indd 2 03/10/2016 20:21 THE iconic new game show Coming to screens in the UK and the Netherlands FormatspIFC-01 Talpa dps OctNov16.indd 3 03/10/2016 20:21 Logic will get you from A to B. Imagination will take you everywhere. Pop-Science format now in its fifth season. Over 50 episodes of smart entertainment. One of the highest-rated series of all time on National Geographic. MIPCOM stand C16.C fngcontentdistribution.com 03041Formatsp02-03 - FOX MipCom Fox OctNov16.indd Ad BRAIN GAMES 2 V1.indd 1 28/09/2016 10:27 26/09/2016 21:08 Logic will get you from A to B. Imagination will take you everywhere. Pop-Science format now in its fifth season. Over 50 episodes of smart entertainment. One of the highest-rated series of all time on National Geographic. MIPCOM stand C16.C fngcontentdistribution.com 03041 - FOX MipCom Ad BRAIN GAMES V1.indd 1 Formatsp02-03 Fox OctNov16.indd 3 28/09/201626/09/2016 21:0810:27 8 x 60’ SERIES + FORMAT CHALLENGING FASHION CHANGING LIVES MASSIVE SOCIAL MEDIA PRESENCE: 4 MILLION An engaging and entertaining UNIQUE VISITORS TO Hosted by new competitive series, creating a new thefashionhero.com BROOKE HOGAN reality in the world of fashion. VISIT US AT MIPCOM, BOOTH P-1.B85 Created by or contact Nha-Uyen Chau, Looking Glass International: [email protected] CAROLINE BERNIER or Nathalie Bourdon Beauty World Search: [email protected] Beauty World Search Formatsp04 Beauty World OctNov16.indd 1 26/09/2016 18:03 J9758_FASHION_HERO_TBI_FP_MIPCOM_ISSUE_FORMATS_ADVERT_AW.indd 1 26/09/2016 17:47 CONTENTS INSIDE THIS ISSUE 6 This issue 12 6 TBI Interview: Ben Silverman and Howard T.
    [Show full text]
  • The Screen Evolution
    the screen evolution: how video-on-demand boosts asia’s economies and generates value for viewers, business and society Important Notice on Contents – Estimations and Reporting This report has been prepared by AlphaBeta for Netflix. All information in this report is derived or estimated by AlphaBeta analysis using both proprietary and publicly available information. Netflix has not supplied any additional data, nor does it endorse any estimates made in the report. Where information has been obtained from third party sources and proprietary research, this is clearly referenced in the footnotes. AlphaBeta is a strategy and economic advisory business serving clients across Australia and Asia from offices in Singapore and Sydney. SINGAPORE SYDNEY Level 4, 1 Upper Circular Road Level 7, 4 Martin Place Singapore, 058400 Sydney, NSW, 2000, Australia Tel: +65 6443 6480 Tel: +61 2 9221 5612 [email protected] [email protected] contents 05 GLOSSARY 08 EXECUTIVE SUMMARY 15 Focus and structure of this paper 16 GOOD INTENTIONS, UNINTENDED OUTCOMES 18 Asia is poised for strong growth in the VOD industry 20 Some governments are keen to regulate video-on-demand more heavily 22 THREE FACTS ABOUT THE NASCENT VOD INDUSTRY 24 Fact One: Video is a distinct OTT segment, with the strongest growth opportunities 26 Fact Two: VOD revenue models go well beyond advertising and user-generated content 28 Fact Three: VOD does not require spectrum to operate and licenses to allocate them 30 VOD BENEFITS FOR VIEWERS, BUSINESSES & SOCIETY 34 Consumer Benefits 40 Business Benefits 44 Societal Benefits 48 DIRECTIONS FOR SOUND POLICY REFORM 51 Conclusions from the analysis 53 Lessons from regional regulatory best practice: Three pillars of success 58 APPENDIX: DATA AND METHODOLOGY GLOSSARY 5 GLOSSARY The following terms have been used at various stages in this report.
    [Show full text]
  • Data-Driven Modeling of Pedestrian Crowds
    Data-Driven Modeling of Pedestrian Crowds Doctoral Thesis submitted for the degree Dr.-Ing. by Anders Fredrik Johansson Born: 26 April, 1981 Faculty of Traffic Sciences ,,Friedrich List" Technische Universit¨atDresden Referees Prof. Dr. rer. nat. habil. Dirk Helbing H. E. Dr.-Ing. Habib Z. Al-Abideen Prof. Dr. sc. pol. habil. Knut Haase Submitted 20 October, 2008 Defended 3 June, 2009 Contents 1 Introduction 5 2 Video Analysis 8 2.1 Introduction . .8 2.1.1 State-of-the Art . 11 2.2 Microscopic Approach . 13 2.3 Macroscopic Approach . 17 2.3.1 Introduction . 17 2.3.2 Hough Transform . 17 2.3.3 Artificial Neural Network . 20 2.3.4 Principal Components Analysis . 26 2.3.5 Making Use of the Temporal Information in Videos . 28 2.3.6 Parameter Calibration . 29 2.3.7 Evaluation of Accuracy . 30 3 Self-Organization Phenomena 38 3.1 Introduction . 38 3.2 Lane Formation . 38 3.3 Stripe Formation . 39 3.4 Pedestrian Trail Formation . 39 3.5 Bottlenecks . 39 3.5.1 Uni-Directional Bottleneck Flows . 39 3.5.2 Bi-Directional Bottleneck Flows . 41 3.6 Stop-and-Go Waves . 41 3.7 Crowd Turbulence . 42 4 Flow-Density Diagram 47 4.1 Introduction . 47 4.2 Measurement of Local Densities, Speeds and Flows . 49 i 4.2.1 Data Evaluation Method . 50 4.3 Empirical Findings . 53 4.3.1 Dealing with Umbrellas . 53 4.3.2 Relationships between Densities, Velocities and Flows . 58 4.4 Fundamental-Diagram Model . 61 5 Modeling and Simulation 67 5.1 Introduction .
    [Show full text]
  • Trends Report 2017 Mid-Year Update
    TRENDS REPORT 2017 MID-YEAR UPDATE JULY 2017 INTRODUCTION IN ITS 2017 TRENDS REPORT PUBLISHED LAST FEBRUARY, THE CANADA MEDIA FUND INVESTIGATED THE OPPORTUNITIES THAT LIE AHEAD TO CREATE VALUE IN THE WAKE OF THE RESTRUCTURING OF THE GLOBAL AUDIOVISUAL INDUSTRY. The report analyzes the current digital environment and the power One thing is clear from the entire report: there can no longer be any struggles that various industry players are waging with respect to the issues doubt that a handful of giants dominate the globalized environment. summarized in the following graph: Large corporations like Google, Facebook and Amazon control at once the technological infrastructure, user attention and content discoverability. These major players possess enormous material and financial resources to compete against the traditional media players. Although certain corporations in Asia such as Tencent, Wanda and Alibaba have today become serious competitors, their respective global market shares still remain far from those of the American giants. For example, in ATTENTION RETENTION May 2017, Google controlled 92% of the global search engine market, all platforms taken together, way ahead of its competitors in China (Baidu: > Discoverability > Content offer 1.39%) and Russia (Yandex RU: 0.35%). > Data (IA) > Service offer In the United States, Netflix has just surpassed all cable channels in terms of its number of subscribers (50.85 million vs. 48.1 million). Within a few years, Netflix will have surpassed what the media empires took 45 years to build. That is the type of domination that is at play here. It’s a domination REACH INFLUENCE that can hardly be ignored or reversed.
    [Show full text]
  • The New Jewish Voice October 2016
    Non-profit Organization U.S. POSTAGE PAID Permit # 184 Watertown, NY october 2016/elul-tishrei 5776-5777 a publication of United jewish federation of Volume 18, Number 8 Greater Stamford, New Canaan and Darien Coping with Our World Celebrating Tapestry at 13 Today UJF Honors Founders at Annual Evening of Learning Ambassador Kurtzer to Deliver Keynote On Saturday ages and denom- evening, No- inations. Tapes- at Kuriansky Conference vember 19, the try was created By Rebecca Isenstein beginning with a sit-down Stamford Jewish in 2004 through This fall, the Center for dinner at 5 pm and followed community will the professional/ Judaic and Middle Eastern by a keynote lecture by Am- gather at the Jew- lay partnership Studies at UConn-Stamford bassador Dr. Daniel Kurtzer ish Community of then-UJF Ed- th will celebrate its 36 anniver- at 7 pm, titled “Our World Center at 7 pm for ucation Director sary (in Hebrew double chai, Today: Coping with Terror- what has become Ilana De Laney, twice “life”) in conjunction ism, Humanitarian Crisis, and an annual ritual. the JCC and a with the 2016 Louis J. Kurian- State Collapse.” This year marks Ilana De Laney Meryl Gordon committee led by sky Annual Conference. The Since its inception, the the 13th season of UJF Adult Educa- celebration will take place Center has had a dual mis- Tapestry, an evening of adult Jewish tion Chair Meryl Gordon. The first year, See “Coping” on page 2 on Wednesday, October 26, Dr. Daniel Kurtzer learning that brings together Jews of all See “Tapestry” on page 4 Covering Israel
    [Show full text]
  • Insight Manufacturers, Publishers and Suppliers by Product Category
    Manufacturers, Publishers and Suppliers by Product Category 2/15/2021 10/100 Hubs & Switch ASANTE TECHNOLOGIES CHECKPOINT SYSTEMS, INC. DYNEX PRODUCTS HAWKING TECHNOLOGY MILESTONE SYSTEMS A/S ASUS CIENA EATON HEWLETT PACKARD ENTERPRISE 1VISION SOFTWARE ATEN TECHNOLOGY CISCO PRESS EDGECORE HIKVISION DIGITAL TECHNOLOGY CO. LT 3COM ATLAS SOUND CISCO SYSTEMS EDGEWATER NETWORKS INC Hirschmann 4XEM CORP. ATLONA CITRIX EDIMAX HITACHI AB DISTRIBUTING AUDIOCODES, INC. CLEAR CUBE EKTRON HITACHI DATA SYSTEMS ABLENET INC AUDIOVOX CNET TECHNOLOGY EMTEC HOWARD MEDICAL ACCELL AUTOMAP CODE GREEN NETWORKS ENDACE USA HP ACCELLION AUTOMATION INTEGRATED LLC CODI INC ENET COMPONENTS HP INC ACTI CORPORATION AVAGOTECH TECHNOLOGIES COMMAND COMMUNICATIONS ENET SOLUTIONS INC HYPERCOM ADAPTEC AVAYA COMMUNICATION DEVICES INC. ENGENIUS IBM ADC TELECOMMUNICATIONS AVOCENT‐EMERSON COMNET ENTERASYS NETWORKS IMC NETWORKS ADDERTECHNOLOGY AXIOM MEMORY COMPREHENSIVE CABLE EQUINOX SYSTEMS IMS‐DELL ADDON NETWORKS AXIS COMMUNICATIONS COMPU‐CALL, INC ETHERWAN INFOCUS ADDON STORE AZIO CORPORATION COMPUTER EXCHANGE LTD EVGA.COM INGRAM BOOKS ADESSO B & B ELECTRONICS COMPUTERLINKS EXABLAZE INGRAM MICRO ADTRAN B&H PHOTO‐VIDEO COMTROL EXACQ TECHNOLOGIES INC INNOVATIVE ELECTRONIC DESIGNS ADVANTECH AUTOMATION CORP. BASF CONNECTGEAR EXTREME NETWORKS INOGENI ADVANTECH CO LTD BELDEN CONNECTPRO EXTRON INSIGHT AEROHIVE NETWORKS BELKIN COMPONENTS COOLGEAR F5 NETWORKS INSIGNIA ALCATEL BEMATECH CP TECHNOLOGIES FIRESCOPE INTEL ALCATEL LUCENT BENFEI CRADLEPOINT, INC. FORCE10 NETWORKS, INC INTELIX
    [Show full text]
  • Decentralized Failure-Tolerant Optimization of Electric Vehicle Charging
    LLNL-JRNL-813257 Decentralized Failure-Tolerant Optimization of Electric Vehicle Charging I. Aravena, S. Chapin, C. Ponce August 3, 2020 IEEE Transactions on Smart Grid Disclaimer This document was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor Lawrence Livermore National Security, LLC, nor any of their employees makes any warranty, expressed or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States government or Lawrence Livermore National Security, LLC. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States government or Lawrence Livermore National Security, LLC, and shall not be used for advertising or product endorsement purposes. IEEE TRANSACTIONS ON SMART GRID, VOL. XX, NO. XX, XX 2020 1 Decentralized Failure-Tolerant Optimization of Electric Vehicle Charging Ignacio Aravena, Member, IEEE, Steve Chapin, and Colin Ponce Abstract—We present a decentralized failure-tolerant algo- of the grid, even in the presence of intermittent resources. rithm for optimizing electric vehicle (EV) charging, using charg- However, harnessing EVs’ flexibility is not straightforward ing stations as computing agents. The algorithm is based on the because of the large number of devices that would need to alternating direction method of multipliers (ADMM) and it has the following features: (i) It handles capacity, peak demand, and be managed simultaneously in near real-time.
    [Show full text]
  • North Carolina Department of Public Safety Division of Adult Correction and Juvenile Justice Community Corrections Policy & Procedures
    North Carolina Department of Public Safety Division of Adult Correction and Juvenile Justice Community Corrections Policy & Procedures DPS Policy Manual Personnel Policy Manual Prisons Policy Manual April 2019 Table of Contents Chapter A Administration – Fiscal and Personnel Section .0100 General Provisions .0101 PURPOSE .0102 ORGANIZATION Section .0200 Definitions .0201 DEFINITIONS OF TERMS Section .0300 Facilities Management .0301 GENERAL PROVISIONS .0302 LEASE MANAGEMENT .0303 FACILITY ACCESS FOR THE DISABLED .0304 BUILDING CONTENT AND OCCUPANCY UPDATES .0305 REQUIRED FACILITY POSTINGS Section .0400 State Owned Vehicles .0401 GENERAL PROVISIONS .0402 PARKING AND STORAGE OF VEHICLES .0403 DEFINITIONS .0404 RESTRICTIONS .0405 OFF-DUTY STATE-OWNED VEHICLES .0406 MAINTENANCE .0407 OPERATOR LICENSE .0408 MOTOR VEHICLE VIOLATIONS .0409 ACCIDENTS/DAMAGE/VANDALISM .0410 MOTOR VEHICLE MILEAGE DOCUMENTATION .0411 USE OF TOLL ROADS .0412 VEHICLE PURSUIT .0413 VEHICLE INSPECTION Section .0500 State Telecommunications .0501 GENERAL PROVISIONS .0502 STATE TELECOMMUNICATION SERVICES .0503 USE AND RECORD KEEPING .0504 COLLECT TELEPHONE CALLS .0505 SCANNERS, FACSIMILE MACHINES and WEB CAMERAS .0506 COMMUNITY CORRECTIONS COMPUTER/LAPTOP, TABLET AND INTERNET ACCESS-ACCEPTABLE USE .0507 COMPUTER RELATED INVESTIGATIONS .0508 RADIO COMMUNICATION Section .0600 Cash Transactions .0601 GENERAL PROVISIONS .0602 PROHIBITED CASH TRANSACTIONS .0603 ALLOWABLE CASH TRANSACTIONS i Section .0700 Budget and Fiscal Record Retention Schedule .0701 GENERAL PROVISIONS
    [Show full text]