RONUA Roadshow fall 2013 - Mobile medley


Published on

Published in: Mobile, Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • HelloWho samja
  • RONUA Roadshow fall 2013 - Mobile medley

    1. 1. Mobile medley Catalin Gheorghiu I Computer Solutions ROADSHOW 2013
    2. 2. Agenda • Azure Mobile Services • NFC
    3. 3. Azure Mobile Services That simple that will do a demo…
    4. 4. TAP AND DO • A gesture that is a natural interaction between people in close proximity used to trigger doing something together between the devices they are holding. • System: Near Field Proximity (e.g., NFC)
    5. 5. NFC NFC is opening up new possibilities for mobile applications. Applications using this short-range radio technology can greatly simplify how a user gathers data and interacts with their environment. When a phone touches, or is held near an NFC tag or another NFC capable device, the phone can exchange data with that tag or device. This data could be a link to download the menu of a favorite restaurant, the specifications for an electronic gizmo, paring information from a Bluetooth headset or another phone that can be used to exchange objects: the possibilities are endless.
    6. 6. NFC technology basics • Standardized radio technology • Works on short distances (typically up to 4 centimeters) in the 13.56 Mhz spectrum • Works on short distances (typically up to 4 centimeters) in the 13.56 Mhz spectrum • 3 operating modes: Reader/Writer, Peer-2-peer and card emulation working simultaneously
    7. 7. NFC use cases
    8. 8. Tap to share • This use case family is when two NFC enabled devices are held in close proximity with each other and exchange information. The information exchanged may be a photo, vCard, URL or it can be an application specific object (i.e. social profile, game object, ID or other type of data). NFC radio is suitable for exchanging small data objects. If larger quantities of data need to be transferred between devices, NFC can be used to establish a connection using another bearer technology such as Bluetooth or WiFi.
    9. 9. Tap to pair • Due to the short range of the interaction (e.g., tapping) NFC can be used to establish a direct connection between two devices using a secondary bearer technology such as Bluetooth. By using NFC pairing to facilitate connecting two Bluetooth devices, the connection is done by a single tap gesture, which significantly improves the user experience. Nokia has championed this use case by implementing it in its Bluetooth- enabled accessories.
    10. 10. Tap to initiate a service • NFC-enabled devices can gather and transmit information to and from passive NFC tags. NFC tags come in variety of shapes, types and sizes and can be read only or rewriteable. They consist of an antenna and a memory chip and do not require any power. They receive power from the NFC device that comes in close proximity and tries to either write or read data from the tag. Tags can be embedded into various products such as merchandise, inventory, posters (smart posters), business cards, etc. The information stored on NFC tags can be generic and standardized (e.g., URL, vCard, telephone number, or Bluetooth pairing information), or it can be application-specific (e.g., URI, raw data, or mimetype). Use cases range from enabling automated check-ins, auto-starting applications, running marketing campaigns, displaying situation relevant information (e.g. timetables), augmenting products by embedding tags with links to rich content (e.g. museums, merchandise, retail). The possibilities are endless.
    11. 11. Tap to pay/authenticate/redeem • In this case, the NFC mobile device emulates a standard NFC tag or a contactless SmartCard – generally referred to as Card emulation mode. This means the mobile device can be used as a credit/payment card, transit card, access key, coupon, or loyalty card. Typically for this use case, the information from the emulated card (i.e. credit card information, transit ticket, discount voucher) needs to be stored and managed in a secure and tamper-proof way. This is done via the Secure Element, a dedicated chip with restricted and managed access control that is either embedded into the device or connected externally via a SIM card or SD chip. The service provider (bank, transportation authority, retailer, or operator) deploys and manages the card information on the Secure Element using a broker, the Trusted Service Manager (TSM). These types of use cases can be done without an application or using an application or application framework (i.e. Wallet).
    12. 12. SCENARIOS •Connect Devices •Exchange Digital Objects •Acquire Content
    13. 13. New stuff
    14. 14. Demo Enough talk
    15. 15. Thank you! Contact: •My Blog •My Email