Domino Xpages Web Based Mobile Applications, Xpages Mobile Controls, Domino Designer Created Content, Supports Domino Security Device Features

Total Page:16

File Type:pdf, Size:1020Kb

Domino Xpages Web Based Mobile Applications, Xpages Mobile Controls, Domino Designer Created Content, Supports Domino Security Device Features Agenda 18. Lotus Notes/Domino Stammtisch 16:00 - 16:30 Eintreffen der Teilnehmer Begrüßung gegenseitiges Kennenlernen 16:30 – 17:45 Mobile First! Die Mobility Strategie der IBM "Mobile Mike" Michael Hoffmann IBM Deutschland GmbH 17:45 – 18:15 Erfahrungsaustausch und “Stammsitzen” 18:15 – 19:00 Lotus Notes/Domino Traveler 8.5.4 Andreas Kilgenstein activelink GmbH ab 19:00 Uhr Erfahrungsaustausch und “Stammsitzen” © 2012 IBM Corporation Mobile First 18. Lotus Notes/Domino Stammtisch Michael Hoffmann Senior Technical Professional © 2012 IBM Corporation Mobile First ! Unsere Mobile Landschaft 2012 1992 IBM legt den ersten “Ziegel” IBM schuf 1992 zusammen mit BellSouth mit einem Simon getauften Brocken das erste multifunktionale Mobiltelefon. IBM Simon: Handys + Pagers + PDAs + Faxe schwarz-weiß Touchscreen 1 Megabyte Speicher 899 Dollar 500 Gramm “Backstein” | © 2012 IBM Corporation Mobile Geräte sind ein großer Schritt in der Evolution der Computertechnik Social Mobile Apps Mobil Wireless Business Cloud 73,3Mrd Web mobile Apps wurden 2012 Desktop heruntergeladen, gegenüber 30,1 Mrd. in 20113 Client Server @ Sicherheitsrisiken Host Mainframe 8X Zunahme der Sicherheits- risiken durch die Verbreitung Konsumerisierung der IT mobiler Daten und End- Geräte2 69% BYOD Der Angestellten nutzen Der weltweit verteilten ich privates Endgerät Antwortgeber sagen, dass auch bei der Arbeit³ sie ein Smartphone für 53% Arbeitszwecke nutzen1 Sources: 1. Press release, accessed at http://www.businesswire.com/news/home/20110711006694/en/IDG-Global-Survey-Shows-Smartphone-Growing-Rapidly; 2. IBM X-Force 2011 Trend and Risk Report, March 2011; 3. Source: IDC, Worldwide and U.S. Mobile Application Download and Revenue 2012-2016 Forecast: The Appification of Everything Goes Global, Doc #234684, May 2012 4| © 2012 IBM Corporation Die mobilen Geräte schaffen enorm viele neue Möglichkeiten … Business to Employees Business to Consumer • Höhere Mitarbeiterproduktivität • Verbesserte Kundenzufriedenheit • Kürzere Prozessdurchlaufzeiten • Tiefere Kundenbindung und bessere • Mehr Umsatz bei Vertriebsgesprächen Loyalität • Erweiterung bestehender Anwendungen für • Mehr Umsatz durch besser personalisierte mobile Mitarbeiter und Kunden Angebote • Veringerung der Fahrzeugflottenkosten, u.a • Kundenservice online und jederzeit Benzin • Differenzierung vom Wettbewerb • Schnellere Reaktionszeiten und • Erhöhte Aufmerksamkeit in der Branche Entscheidungsgeschwindigkeiten • Tiefere Einblicke in das Kaufverhalten des • Schnelleres Lösen von internen IT Problemen Kunden und damit zusätzliche • Reduzierung der Personalkosten durch BYOD Umsatzpotenziale (Bring your own Device) • Verbesserte Services selbst in der Filiale 5| © 2012 IBM Corporation … bringen aber auch Herausforderungen mit sich: . Endpunkt und Datenmanagement Sicherheit . Compliance mit Unternehmensrichtlinien . “Konsumerisierung der IT” treibt BYOD* Mobile Plattformen . Entwicklung mobiler Anwendungen auch mit Blick auf sichere Anbindung an das Firmennetz . Der Bedarf für eine klare “Mobility”-Strategie und Roadmap Strategie und . Installation, Konfiguration, Support und fortlaufende Wartung Ressourcen durch erfahrene Ressourcen *BYOD = Bring your own device. Source: The New Workplace CIO Study, IBM Market Insights, October 2011 6| © 2012 IBM Corporation Identifizierte Probleme . Sehr starke Weiterentwicklung der Smartphones, sowie starke Verschiebungen der Marktteilnehmer. Es gibt nicht das sicherste Smartphone bzw. Betriebssystem, jedes hat seine Schwachstelle. Sehr langsames Patchen der Smartphone-Betriebssysteme . Teilweise sehr unausgereifte Sicherheitskonzepte der Betriebssysteme – Manchmal nicht hinreichende Verschlüsselung der Daten auf dem Gerät . iOS und BlackBerry stellten sich als sehr homogene Plattform da, bei der unterschiedliche Geräte der Plattform einfach zu managen sind. Android ist ein sehr schwer zu managendes Betriebssystem, da es aufgrund seiner Offenheit und jeweiligen Anpassungen sehr heterogen ist. – Erste Android Geräte von Samsung (Galaxy) sind soweit angepasst worden, dass das Sicherheitsniveau deutlich über dem normaler Android Geräte liegt. – Die Plattform ist jedoch aufgrund der Flexibilität und Anpassbarkeit interessant, es möglich ist, Funktionen nachzurüsten, siehe Samsung, oder Funktionen die als Sicherheitskritisch angesehen werden zu entfernen. Wenn ein Unternehmen „BYOD“ unterstützt, hat das Unternehmen keine vollständige Kontrolle über das Gerät. Es findet oft eine Mischung der privaten und geschäftlichen Daten auf Smartphones statt. 7| © 2012 IBM Corporation | © 2012 IBM Corporation 2011 ist 'Bring Your Own Device' (BYOD) in den meisten Firmen bereits akzeptiert. Forrester Research, Inc., The State Of Workforce Technology Adoption: US Benchmark 2011, September 2011 9| © 2012 IBM Corporation Der eigentliche Wert von mobilen Geräten entsteht durch die Anwendungen Welche Vorteile, falls überhaupt, konnte ihr Unternehmen durch die Einführung mobiler Geräte erzielen? Increased worker productivity 70% Increased employee responsiveness and decision making 57% Faster internal IT issue resolution 49% Improved customer satisfaction 44% Faster customer issue resolution 38% Competitive differentiation 20% Reduced personnel costs 18% Reduced fuel, gas, or fleet maintenance cost 16% Improved brand perception 15% Increased sales revenue 14% Reduced sales cycle time 10% It’s too soon to tell or don’t know 8% Reduced inventory costs 7% None; we haven’t seen any benefits 3% Other 1% Source: Forrester Research, Inc., “Forrsights Networks and Telecoms Survey,” Q1 2011 10 | © 2012 IBM Corporation Mobil schafft neue Möglichkeiten für alle Branchen Banken Versicherungen Healthcare Telecom EinzelhandelÖffentl Dienst Andere Bestehende Unternehmensanwendungs- und Infrastruktur-Plattform Workforce Produkt- und Kundenbetruung Mobility Services von Optimization Service-Innovationen und Insights Drittanbietern Social Nutzer- Standort- Mobile Social Mobile Collaboration Benachrichtigungen Services Payments Commerce Erweitern des Verbessern der Geschäftsmodells auf Sich von Wettbewerbern Neue Services und neue operationalen Effizienz mobile Kunden und unterscheiden Geschäftsansätze und Kostenreduktionen Mitarbeiter Messbare Ergebnisse 11 | © 2012 IBM Corporation Ein erfolgreicher Start in die Nutzung der mobilen Welt Entwickeln einer Strategie Unternehmens-E-Mail, zur nutzung mobiler Geräte Kontakte und Kalender 1 mit entsprechenden Regeln 4 verfügbar machen Die Infrastruktur für mobile Geräte aufsetzen Anwendungsstrategie 2 5 („Apps“) erstellen Anwendungen Mobile Geräte sichern ausrollen und 3 6 managen 12 | © 2012 IBM Corporation IBM Collaboration Solutions – Umfassende Lösungen für mobile Geräte ■ Die umfassende Lösung mit aktuellen, coolen mobilen Apps ■ Verfügbar auf allen führenden Smartphone Plattformen – Zugriff über die spezifischen App-Stores ■ Unterstützt durch Entwicklungswerkzeuge, um Kunden und Partnern die Möglichkeit zu geben ihre Anwendungen auch mobil verfügbar zu machen. ■ Vervollständigt durch Sicherheits- und Management-Funktionen für Apps und mobile Services aus dem eigenen Rechenzentrum, gehostet oder aus der Cloud, die den Anforderungen von Unternehmen gerecht werden13 | © 2012 IBM Corporation IBM strategy addresses client mobile initiatives Use & Extend Build & Connect Manage & Secure | © 2012 IBM Corporation Mobile Architecture use – build – secure Manage mobile devices and Manage & Secure applications Secure mobile business and data IBM Sametime ●Mail Calendar Contacts ● Use & Employees Chat Messaging IBM Connections Customers Partners ●Telephony Integration Extend ●UC² ● Social Collaboration Other Use the ● existing mobile Files / Document Backends share solutions ●Activity Stream Extend existing ●Std Web Apps systems to Domino Traveler mobile devices xPages Build & IBM Worklight Connect ● Custom Apps Build mobile ● Portal Access WebSphere Portal applications ●Domino Apps ●Mobile Entry Point Connect to, and ●HTML5 run backend ●Hybrid SAP systems in support of mobile Other Backends 15 | © 2012 IBM Corporation IBM mobile Software for Apple iPhone and iPad Web URL: www.ibm.com/software/lotus/category/ mobile-wireless/apple/ 16 | © 2012 IBM Corporation IBM Notes Traveler – What's new in 2012 8.5.3 UP1 (Available now) ■ High Availability 8.5.3 UP2 (coming soon) ■ Android ■ To Do's for Android and ─ Tablet support iOS ─ Monthly calendar view ─ Enhanced Security - App password ■ General Enhancements ─ Improved Handling of Notes Documents ─ Sent Folder Save ─ Attachments for Draft Mail ■ Web Based Administration UI Traveler Companion for iOS (Available now) ─ View only attachment control ─ Password entry timeout period 17 | © 2012 IBM Corporation IBM plans are subject to change Use and Extend IBM Lotus Traveler Traveler Cluster Administration Web Domino Servers Direct UI connect or through proxy Domino Mail servers Reverse Proxy / Round Robin Recommended in DMZ https Notes RPC ● iOS Android WinMobile Nokia ● remote wipe ● business data only wipe (BYOD) ● security policy enforcement ● data encryption central DB ● Traveler services will application level password (Android) perform smart load ● included with Domino balance Recommend pool is behind corporate firewall Recommend18 | Highly © 2012 IBM Corporation Available DB configuration IBM Connections Mobile ● Mobile access to enterprise social collaboration ● Access social network, profiles, communities, status updates, files, photos, videos, activities, blogs, wikis, forums, bookmarks, ideation voting ● Connections mobile apps
Recommended publications
  • Professional Skills in Computer Science Lecture 3: Historical Aspects of Computing
    Professional Skills in Computer Science Lecture 3: Historical Aspects of Computing Ullrich Hustadt Department of Computer Science School of Electrical Engineering, Electronics, and Computer Science University of Liverpool Ullrich Hustadt COMP110 Professional Skills in Computer Science L3 { 1 Further milestones The Future Contents 1 Further milestones 2 The Future Fundamental questions Model-View-Controller Relevant learning outcome: 1 Ability to describe and discuss economic, historic, organisational, research, and social aspects of computing as a discipline and computing in practice; Ullrich Hustadt COMP110 Professional Skills in Computer Science L3 { 2 Further milestones The Future What have computers been used for? (Summary) • 1600 { now: Calculation Manipulation of numbers • 1960 { now: Information Processing Manipulation of numbers, text, images, audio, video • 1960 { now: Cognition (Reasoning) Manipulation of knowledge via reasoning / inference • 1970 { now: Interaction Allowing people to communicate, cooperate, compete • 1970 { now: Automation Computer-controlled machines and robots Hypotheses: • The wave of innovation in the 60s and 70s is due to the increased availability of computing resources to more and more researchers • Leadership is mostly due to early exposure to state-of-the-art systems and due to hard work Ullrich Hustadt COMP110 Professional Skills in Computer Science L3 { 3 Further milestones The Future What have computers been used for? What important milestones in the development and use of computers were not covered
    [Show full text]
  • Introduction to Smartphones Beginners Guide TOPIC INTRODUCTION to SMARTPHONES
    Tech Savvy Seniors Introduction to Smartphones Beginners Guide TOPIC INTRODUCTION TO SMARTPHONES OVERVIEW Phones used to be all about making calls, but now your mobile can do so much more. The range of new touchscreen smartphones allows you to access the internet, use social media, get live news updates, play music and video, and much more. They almost universally use touchscreens for control, however, which can be a challenge for people new to the technology. WHO IS THIS Maybe you’ve never owned a mobile and are curious WORKSHOP FOR? about why you’d choose a smartphone. Perhaps you want a mobile phone that does more than your current keypad-style handset, or are looking to learn more about the smartphone you already own. This workshop has something to satisfy each of you. WHAT YOU’LL An internet-connected smartphone; either your NEED own or supplied by the workshop organisers. You may need to share a smartphone with others in the workshop. An existing Apple account (or Apple ID), for downloading apps to an iPhone smartphone. An existing Google account (or Google ID), for downloading apps to an Android smartphone. WHAT YOU’LL In this workshop, you will learn the basics of how LEARN to navigate your way around a smartphone with a touchscreen. You will learn how to turn the phone on and off, make and receive calls, add a contact and look up a contact, and change the volume on the phone. You will also learn briefly about apps, what they are, how to download them, and the costs associated with them.
    [Show full text]
  • The Ways Young Adults Access Digital Information Cydney Lauren Palmer Louisiana State University and Agricultural and Mechanical College, [email protected]
    Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2011 There's an app for that: the ways young adults access digital information Cydney Lauren Palmer Louisiana State University and Agricultural and Mechanical College, [email protected] Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_theses Part of the Mass Communication Commons Recommended Citation Palmer, Cydney Lauren, "There's an app for that: the ways young adults access digital information" (2011). LSU Master's Theses. 711. https://digitalcommons.lsu.edu/gradschool_theses/711 This Thesis is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Master's Theses by an authorized graduate school editor of LSU Digital Commons. For more information, please contact [email protected]. THERE’S AN APP FOR THAT: THE WAYS YOUNG ADULTS ACCESS DIGITAL INFORMATION A Thesis Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Master in Mass Communication in The Manship School of Mass Communication by Cydney Lauren Palmer B.A., Louisiana State University, 2008 December 2011 ACKOWLEDGMENTS First, I would like to thank my parents, Allan and Karin Palmer, for their support and encouragement while pursuing my master’s degree. I would also like to thank Dr. Yongick Jeong for his continuous guidance and support throughout the tedious development of this academic research project. Finally, I would like to thank my additional thesis committee members, Dr. Lance Porter and Dr.
    [Show full text]
  • Running IBM Websphere Application Server on System P and AIX: Optimization and Best Practices
    Front cover Running IBM WebSphere Application Server on System p and AIX: Optimization and Best Practices System p and AIX configuration strategies for WebSphere Application Server How JVM runtime and WebSphere Application Server interact with AIX Implementation scenarios Lutz Werner Denefleh Anderson de Sousa Ribeiro Dias Simon Kapadia Monty Poppe Colin Renouf Kwan-Ming Wan ibm.com/redbooks International Technical Support Organization Running IBM WebSphere Application Server on System p and AIX: Optimizaton and Best Practices September 2008 SG24-7347-00 Note: Before using this information and the product it supports, read the information in “Notices” on page ix. First Edition September 2008 This edition applies to IBM WebSphere Application Server Version 6.1, IBM AIX Version 5.3, and IBM AIX Version 6.1. © Copyright International Business Machines Corporation 2008. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . ix Trademarks . x Preface . xi The team that wrote this book . xi Acknowledgements . xiii Become a published author . xiii Comments welcome. xiv Chapter 1. Introduction to running WebSphere Application Server on System p and AIX . 1 1.1 The whole system view: WebSphere, JVM, AIX, and System p . 2 1.1.1 Points of view . 2 1.1.2 A holistic system approach . 3 1.2 System layers and points of view . 3 1.2.1 Points of view and terminology . 4 1.3 The remainder of this book . 5 Chapter 2. WebSphere on System p and AIX 5 strategies . 7 2.1 Scalability considerations .
    [Show full text]
  • Die Meilensteine Der Computer-, Elek
    Das Poster der digitalen Evolution – Die Meilensteine der Computer-, Elektronik- und Telekommunikations-Geschichte bis 1977 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 und ... Von den Anfängen bis zu den Geburtswehen des PCs PC-Geburt Evolution einer neuen Industrie Business-Start PC-Etablierungsphase Benutzerfreundlichkeit wird gross geschrieben Durchbruch in der Geschäftswelt Das Zeitalter der Fensterdarstellung Online-Zeitalter Internet-Hype Wireless-Zeitalter Web 2.0/Start Cloud Computing Start des Tablet-Zeitalters AI (CC, Deep- und Machine-Learning), Internet der Dinge (IoT) und Augmented Reality (AR) Zukunftsvisionen Phasen aber A. Bowyer Cloud Wichtig Zählhilfsmittel der Frühzeit Logarithmische Rechenhilfsmittel Einzelanfertigungen von Rechenmaschinen Start der EDV Die 2. Computergeneration setzte ab 1955 auf die revolutionäre Transistor-Technik Der PC kommt Jobs mel- All-in-One- NAS-Konzept OLPC-Projekt: Dass Computer und Bausteine immer kleiner, det sich Konzepte Start der entwickelt Computing für die AI- schneller, billiger und energieoptimierter werden, Hardware Hände und Finger sind die ersten Wichtige "PC-Vorläufer" finden wir mit dem werden Massenpro- den ersten Akzeptanz: ist bekannt. Bei diesen Visionen geht es um die Symbole für die Mengendarstel- schon sehr früh bei Lernsystemen. iMac und inter- duktion des Open Source Unterstüt- möglichen zukünftigen Anwendungen, die mit 3D-Drucker zung und lung. Ägyptische Illustration des Beispiele sind: Berkley Enterprice mit neuem essant: XO-1-Laptops: neuen Technologien und Konzepte ermöglicht Veriton RepRap nicht Ersatz werden.
    [Show full text]
  • A Study of the Growth and Evolution of Personal Computer Devices Throughout the Pc Age
    A STUDY OF THE GROWTH AND EVOLUTION OF PERSONAL COMPUTER DEVICES THROUGHOUT THE PC AGE A dissertation submitted in partial fulfilment of the requirements for the degree of Bachelor of Science (Honours) in Software Engineering Ryan Abbott ST20074068 Supervisor: Paul Angel Department of Computing & Information Systems Cardiff School of Management Cardiff Metropolitan University April 2017 Declaration I hereby declare that this dissertation entitled A Study of the Growth and Evolution of Personal Computer Devices Throughout the PC Age is entirely my own work, and it has never been submitted nor is it currently being submitted for any other degree. Candidate: Ryan Abbott Signature: Date: 14/04/2017 Supervisor: Paul Angel Signature: Date: 2 Table of Contents Declaration .................................................................................................................................. 2 List of Figures ............................................................................................................................... 4 1. ABSTRACT ............................................................................................................................ 5 2. INTRODUCTION .................................................................................................................... 6 3. METHODOLOGY.................................................................................................................... 8 4. LITERATURE REVIEW ............................................................................................................
    [Show full text]
  • Itherm 2021 Virtual June 1 – July 6, 2021
    Final ConfIThermere 2021n Virtualce Program June 1 – July 6, 2021 The 20th Inte rsociety Conference on Thermal a nd Thermomechanical Phenomen a in Electronic Systems 1 Live Virtual Events June 1 – 4, 2021 ITherm 2021 Virtual June 1 – July 6, 2021 Sponsored by the IEEE's Electronics Packaging Society (EPS), ITherm 2021 is the leading international conference for the scientific and engineering exploration of thermal, thermomechanical, and emerging technology issues associated with electronic devices, packages, and systems. In addition to on-demand paper presentations made available until July 6, 2021, ITherm 2021 Virtual has live keynote presentations by prominent speakers, the Richard Chu ITherm award presentation, panel discussions, invited tech talks, student poster and networking, student heat sink, and student overclocking competitions. Registered attendees will be able to join live each day of the conference for one- time plenary events with options to interact with the presenters starting at 10:30 AM Eastern Daylight Time (EDT). An Exhibitor forum will allow participants to interact and to learn about the latest in thermal and thermal-mechanical technologies. LIVE VIRTUAL EVENTS (JUNE 1 – 4, 2021) • 3 Keynote Talks covering the areas of computing and the environment, 5G and new challenges for our communication networks, and engineering lessons for the future • Richard Chu ITherm Award and Seminar • 3 Technology-Talks providing deep dive talks on high profile topics • 4 Panels discussing the latest industry challenges and trends •
    [Show full text]
  • Delivering Value. 20 Years and Counting
    delivering value. 20 years and counting. annual report 2012–13 PDF processed with CutePDF evaluation edition www.CutePDF.com contents page the start 2 the emergence 4 the expansion 6 the transformation 8 celebrating 20 years 10 message to shareholders 12 five years at a glance 14 corporate information 16 directors’ report 17 report on corporate governance 25 management discussion and analysis 39 standalone financial statements auditors’ report 47 balance sheet 50 statement of profit and loss 51 cash flow statement 52 notes to financial statements 53 consolidated financial statements auditors’ report 75 “A mile from shore a fishing boat chummed the water, balance sheet 76 and the word for Breakfast Flock flashed through the air till a crowd of thousand seagulls came to dodge statement of profit and loss 77 and fight for bits of food. It was another busy day cash flow statement 78 beginning. But way off alone, out by himself beyond notes to financial statements 79 boat and shore, Jonathan Livingston Seagull was practicing. A hundred feet in the sky, he lowered his statement under section 212(8) of the Companies Act, 1956 relating to subsidiary companies 101 webbed feet, lifted his beak, and strained to hold notice 102 a painful hard twisting curve through his wings, The curve meant that he would fly slowly, and now he slowed until the wind was a whisper in his face, until the ocean stood still beneath him. He narrowed his eyes in fierce concentration, held his breath, forced one… single…more…inch…of…curve…” - Richard Bach Like the allegoric Jonathan Livingston Seagull, who dreamt of greatness and success by following a different course, Redington has made it its business to dream differently in order to venture beyond; to think differently and make its own rules, to open up a world of infinite possibilities.
    [Show full text]
  • Performance Ritual and the Design of Mobile Devices
    Performance ritual and the design of mobile devices Submitted by Kym R. Campbell th 30 May 2016 Thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy at the University of Canberra, Australian Capital Territory, Australia Abstract This thesis argues that concepts of secular ritual, drawn from the work of Erving Goffman and James Carey, can provide a useful way of understanding the relationship between the production and design of mobile devices and their use, and hence provides further insights into the broader relationship between mobile technologies and society. This argument is developed by reviewing scholarship on the relationship between technologies and society, before engaging with ritual as a secular concept and a way of understanding human relations with technology. James Carey's work on ritual and communication is key to linking technology with ritual, while Erving Goffman's work on ritual and performance provides a way to develop a framework for further analysis. The ritual performance-oriented framework is described here as the theatre of design, and acts as a metaphor for describing the dynamic between society and the mobile device. In essence, this approach argues that we can understand our relationship with mobile devices as a performance in which the device can be a prop, users can be thought of as actors, and designers take on the role of director. To develop this framework further, the device is examined through a sociocultural lens. Du Gay et al’s circuit of culture is utilised to illustrate how meaning comes to associate with the technology.
    [Show full text]
  • ICB Presentationfinal.Pptx
    CONTINUOUS AUTHENTICATION OF MOBILE USERS: FUSION OF FACE AND INERTIAL MEASUREMENT UNIT DATA David Crouse1, Hu Han1, Deepak Chandra2, Brandon Barbello2, and Anil K. Jain1 1Michigan State University 2Google, Inc. Outline Device Locked • Background Log in to Device • Proposed approach Update • Face uprightness correction Enrollment • COTS and component based face matching Wait • Confidence function Capture Images • Prototype system on Android Apply Uprightness Correction • Experimental results • Summary Match Faces Above Below Threshold Update and Threshold Check Confidence Background 1973 - Motorola DynaTAC Prototype 1992 – Motorola 3200 1993 –IBM Simon 1999 – Kyocera VP-210 2007 – Apple iPhone First mobile phone First mobile digital phone First smartphone First camera phone First iOS phone 2008 – HTC Dream 2011 – Samsung Galaxy Nexus 2013 – LG Nexus 5 2013 – iPhone 5S 2014 – iPhone 6 First Android phone Introduced Face Unlock Used for data collection TouchID Apple Pay www.businessinsider.com/complete-visual-history-of-cell-phones-2011-5?op=1 wikipedia.com Background • Security concerns • Mobile devices contain personal information, such as e-mail, photos & videos, and financial information • 67% of users do not password protect their devices [1] • Many users are using too simple passwords, such as ‘1234’, ‘0000’, ‘2580’, ‘1111’, etc. [2] Users believe it is too complicated to enter a password/PIN! [1] http://sophos.com [2] http://techland.time.com/2011/06/13/the-10-most-popular-iphone-passwords-starring-1234/ Background • Computer passwords
    [Show full text]
  • History of Computing Lecture 27 – COMPSCI111/111G SS 2018 Today’S Lecture
    History of Computing Lecture 27 – COMPSCI111/111G SS 2018 Today’s lecture The history of computing, focusing on the personal computer (PC) The first computers Computers in WWII 1950s - 1980s: from the room to the desk 1980s – 2000s: the computer becomes personal Future of the PC Why bother?! Knowing the history of computing gives us: A better understanding of how computers work An appreciation how quickly computing technology has developed Insights into the future of computing Computer Science timeline Helpful resources “The Universal Machine” by Assoc Prof Ian Watson Helpful resources Computer Science Department’s Computing History displays Website explaining the displays: https://www.cs.auckland.ac.nz/historydisplays/ The first computers People were the first computers, performing calculations by hand to produce tables of mathematical results (eg. ordinance tables) Devices were developed to assist calculations, some of which are still used today. Ultimate goal was to have a machine do the calculations. 2 advantages: • Speed • Accuracy Analytical Engine In 1832, Charles Babbage designed the Analytical Engine • a mechanical general purpose programmable computer • Programs and data on punch cards. • A store (i.e. memory) for holding 1000 numbers of 40 decimal digits • The arithmetical unit called the “mill” would be able to perform all four arithmetic operations, comparisons and square roots Cost, construction challenges and the Engine’s size meant it was never built The first computers It took clerks 8 years to manually
    [Show full text]
  • A Smartphone Is a Mobile Phone Built on a Mobile Computing Platform
    A smartphone is a mobile phone built on a mobile computing platform, with more advanced computing ability and connectivity than a feature phone.[1][2][3] The first smartphones were devices that mainly combined the functions of a personal digital assistant (PDA) and a mobile phone or camera phone. Today's models also serve to combine the functions of portable media players, low-end compact digital cameras, pocket video cameras, and GPS navigation units. Modern smartphones typically also include high-resolution touchscreens, web browsers that can access and properly display standard web pages rather than just mobile-optimized sites, Flash compatibility, and high-speed data access via Wi-Fi and mobile broadband. The most common mobile operating systems (OS) used by modern smartphones include Apple's iOS, Google's Android, Microsoft's Windows Phone, Nokia's Symbian, RIM's BlackBerry OS, and embedded Linux distributions such as Maemo and MeeGo. Such operating systems can be installed on many different phone models, and typically each device can receive multiple OS software updates over its lifetime. The distinction between smartphones and feature phones can be vague and there is no official definition for what constitutes the difference between them. One of the most significant differences is that the advanced application programming interfaces (APIs) on smartphones for running third-party applications[4] can allow those applications to have better integration with the phone's OS and hardware than is typical with feature phones. In comparison, feature phones more commonly run on proprietary firmware, with third-party software support through platforms such as Java ME or BREW.[1] An additional complication in distinguishing between smartphones and feature phones is that over time the capabilities of new models of feature phones can increase to exceed those of phones that had been promoted as smartphones in the past.
    [Show full text]