This chapter discusses mobile, wireless, and pervasive computing. It covers topics such as mobile computing and commerce, wireless local area networks, mobile applications in areas like financial services and shopping, location-based computing, and pervasive computing. The chapter aims to describe the characteristics, benefits, and uses of these technologies, as well as discuss inhibitors and barriers to their adoption. It is based on a textbook chapter on this subject and is intended to provide an overview and outline of the key concepts and sections covered.
Our infographic “A Fresh Approach to remote IoT Connectivity” has been designed to provide IoT applications developers – particularly those focused on remote, roaming and mission critical applications – with information and advice on connectivity options, device design and future-proofing to prolong the lifespan of the application and avoid costly mistakes.
WiFi Offload Strategy for Telcos-OperatorsGreen Packet
Given the increase in the number of permutations of device and content available out there, a move towards web-based cloud solutions will inevitably form the need for more mobility and efficiency in delivery. This paper will discuss the implications of the emergence of multifunction, multi-radio systems and multiplatform application and services that are driving forward seamless mobility in the pretext of “now” that allows users to transparently access network connections and ensure session persistence across varied connections for consistent experience together.
Our infographic “A Fresh Approach to remote IoT Connectivity” has been designed to provide IoT applications developers – particularly those focused on remote, roaming and mission critical applications – with information and advice on connectivity options, device design and future-proofing to prolong the lifespan of the application and avoid costly mistakes.
WiFi Offload Strategy for Telcos-OperatorsGreen Packet
Given the increase in the number of permutations of device and content available out there, a move towards web-based cloud solutions will inevitably form the need for more mobility and efficiency in delivery. This paper will discuss the implications of the emergence of multifunction, multi-radio systems and multiplatform application and services that are driving forward seamless mobility in the pretext of “now” that allows users to transparently access network connections and ensure session persistence across varied connections for consistent experience together.
A fresh approach to remote IoT connectivity | by Podsystem Kira Ugai
There are a huge number of IoT devices, often roaming across countries and continents, that are located outside urban areas.
This poses significant challenges to both the design and connectivity of the device, the biggest concern being that there is no room for error, as troubleshooting and maintenance of remote and roaming devices is complicated and costly.
As part of the Internet Of Things North America conference in Chicago Illinois (April 13th – 14th 2016), Podsystem Inc. CEO Sam Colley will be presenting ‘A Fresh Approach to Remote IoT Connectivity’ at 11:30 on April 14th.
Sam will address the challenges faced by remote IoT applications developers and discuss ways of overcoming them.
His presentation is centered around an infographic which outlines the main issues involved in developing remote IoT applications and explains how to make the correct choices in terms of device design, connectivity and future proofing to prolong the lifespan of the application and avoid costly mistakes.
How do the 802.11u and HotSpot 2.0 work?Michal Jarski
Detailed description of interworking mechnisms introduced by IEEE 802.11u standard and how they are used by HotSpot 2.0 next generation Wi-Fi access layer.
The mobile internet has grown much faster than the PC based internet and the number of connected devices is growing exponentially. Millennial’s are changing the world, embracing mobile technology through all aspects of life. Location based services, Internet of Things, Virtual Reality and other emerging technologies continue to drive change throughout society, both in work life and personal life. This presentation explores the growth of mobile technologies and the opportunities they drive for business and society.
2012 Carrier Innovation Priorities – Summary slides from TC3 2011Telecom Council
13 global telecom carriers took the stage at TC3 2011: Telecom Council Carrier Connections to draw attention to their innovative sides - what innovations they'd like to see from the startups and vendors and how to best work with them. This presentation includes the summary slides from many of the carriers who presented. These slides include the particular innovations they have a special interest in as well as contact information.
Save the date for TC3 2012 - held September 12-13 on the Juniper campus in Sunnyvale, CA.
Be sure to join our mailing list at www.telecomcouncil.com
I presented at a recent sales conference for a large security / IT solution provider on the evolution of the telco industry and the role security and protection plays in that evolution.
In summary: customer data, trust, security and protection are critical for operators to get right in this emerging environment.
Operators need an integrated security and protection layer, not point solutions for each service as is the case today. Protection from malware across all network services e.g. IP, SMS, MMS, WAP push, widgets, apps, etc. Protection in the network, in devices and in services.
SDP vendors need integrated security solution across network, services and end-points, which means a partnership with security / IT providers is key. Its a rapidly growing problem as its a highly profitable and more importantly safe criminal business compared to drugs smuggling or prostitution; hence a specialist security/protection partner is essential.
What is the GSMA OneAPI Gateway?
A platform allowing application developers to access the SMS, Location and Billing APIs.
- Connects the 3 major Canadian carriers (Rogers, Bell, TELUS) with OneAPI and access to 93% of Canadian mobile subscribers.
- A single implementation of your app works across all carriers - better services for less work
A fresh approach to remote IoT connectivity | by Podsystem Kira Ugai
There are a huge number of IoT devices, often roaming across countries and continents, that are located outside urban areas.
This poses significant challenges to both the design and connectivity of the device, the biggest concern being that there is no room for error, as troubleshooting and maintenance of remote and roaming devices is complicated and costly.
As part of the Internet Of Things North America conference in Chicago Illinois (April 13th – 14th 2016), Podsystem Inc. CEO Sam Colley will be presenting ‘A Fresh Approach to Remote IoT Connectivity’ at 11:30 on April 14th.
Sam will address the challenges faced by remote IoT applications developers and discuss ways of overcoming them.
His presentation is centered around an infographic which outlines the main issues involved in developing remote IoT applications and explains how to make the correct choices in terms of device design, connectivity and future proofing to prolong the lifespan of the application and avoid costly mistakes.
How do the 802.11u and HotSpot 2.0 work?Michal Jarski
Detailed description of interworking mechnisms introduced by IEEE 802.11u standard and how they are used by HotSpot 2.0 next generation Wi-Fi access layer.
The mobile internet has grown much faster than the PC based internet and the number of connected devices is growing exponentially. Millennial’s are changing the world, embracing mobile technology through all aspects of life. Location based services, Internet of Things, Virtual Reality and other emerging technologies continue to drive change throughout society, both in work life and personal life. This presentation explores the growth of mobile technologies and the opportunities they drive for business and society.
2012 Carrier Innovation Priorities – Summary slides from TC3 2011Telecom Council
13 global telecom carriers took the stage at TC3 2011: Telecom Council Carrier Connections to draw attention to their innovative sides - what innovations they'd like to see from the startups and vendors and how to best work with them. This presentation includes the summary slides from many of the carriers who presented. These slides include the particular innovations they have a special interest in as well as contact information.
Save the date for TC3 2012 - held September 12-13 on the Juniper campus in Sunnyvale, CA.
Be sure to join our mailing list at www.telecomcouncil.com
I presented at a recent sales conference for a large security / IT solution provider on the evolution of the telco industry and the role security and protection plays in that evolution.
In summary: customer data, trust, security and protection are critical for operators to get right in this emerging environment.
Operators need an integrated security and protection layer, not point solutions for each service as is the case today. Protection from malware across all network services e.g. IP, SMS, MMS, WAP push, widgets, apps, etc. Protection in the network, in devices and in services.
SDP vendors need integrated security solution across network, services and end-points, which means a partnership with security / IT providers is key. Its a rapidly growing problem as its a highly profitable and more importantly safe criminal business compared to drugs smuggling or prostitution; hence a specialist security/protection partner is essential.
What is the GSMA OneAPI Gateway?
A platform allowing application developers to access the SMS, Location and Billing APIs.
- Connects the 3 major Canadian carriers (Rogers, Bell, TELUS) with OneAPI and access to 93% of Canadian mobile subscribers.
- A single implementation of your app works across all carriers - better services for less work
TADSummit, Simfony: Building a Global IoT Service Provider using Programmable...Alan Quayle
Simfony: Building a Global IoT Service Provider using Programmable Telecoms
Stefan Anghel, Product Architect, Simfony Mobile
Where does IoT make sense? Cutting through the hype to real business and real solutions.
Review of the IoT Landscape, understanding the enablers and ecosystem.
Simfony's IoT Platform: an M2M focused MVNO. Delivering solutions to business problems.
The Future of IoT service providers.
A Fresh Approach to Remote IoT ConnectivityPodsystem M2M
Our infographic “A Fresh Approach to remote IoT Connectivity” has been designed to provide IoT applications developers – particularly those focused on remote, roaming and mission critical applications – with information and advice on connectivity options, device design and future-proofing to prolong the lifespan of the application and avoid costly mistakes.
Iot basics & evolution of 3 gpp technolgies for iot connectivityKAILASH CHAUHAN
#IOT BASICS & EVOLUTION OF 3GPP TECHNOLOGIES FOR IOT CONNECTIVITY
#IOT-Internet of Things Handbook
#Cellular NW for Massive IOT
#LTE_Evolution_for_IoT_Connectivity
The series of presentations contains the information about "Management Information System" subject of SEIT for University of Pune.
Subject Teacher: Tushar B Kute (Sandip Institute of Technology and Research Centre, Nashik)
http://www.tusharkute.com
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Pushing the limits of ePRTC: 100ns holdover for 100 days
Ch06
1. Introduction to Information Technology
Turban, Rainer and Potter
John Wiley & Sons, Inc.
Copyright 2005
Chapter 6 1
2. Mobile, Wireless, and
Pervasive Computing
Chapter 6 2
“ Copyright 2005 John Wiley & Sons Inc,”
3. Chapter Outline
Mobile Computing and Commerce : Overview
Benefits, and Drivers.
Wireless Local Area Networks, Wi-Fi, and Voice
Portals.
Mobile Personal Service Applications
Mobile Applications in Financial Services.
Mobile Shopping, Advertising, and Customer Service
Mobile Intrabusiness Applications.
Location- Based Computing.
Inhibitors and Barriers of Mobile Computing.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 3
4. Learning Objectives
Discuss the characteristic, attributes, and drivers of mobile
computing and m-commerce .
Describe personal service application of m-commerce.
Describe the emergence of Wi-Fi and voice portals.
Discuss m-commerce application in financial service.
Describe m-commerce applications in shopping, advertising, and
customer service.
Describe the use of mobile computing in enterprise and supply
chain applications.
Describe location- based commerce (l-commerce).
Discuss the key characteristics and current uses of pervasive
computing.
Describe the major inhibitors and barriers of mobile computing and
m-commerce.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 4
5. 6.1 Mobile Computing and Commerce: Overview,
Benefits, and Drivers
Mobile computing. A computing model
designed for workers who travel outside the
boundaries of their organizations or homes.
Mobile Devices. Portable computers such as
PDAs and other handhelds.
Wireless mobile computing. The combination
of mobile devices used in a wireless
environment.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 5
6. Mobile commerce ( m-commerce)
Any e-commerce done in wireless environment, especially via the
Internet.
Personal Digital Assistant (PDA): A handheld wireless computer.
Short Messaging Service (SMS): Technology that allows for
sending of short text message on some cell phone.
Global Positioning System (GPS): A satellite- based tracking
system that enables the determination of GPS device’s location.
Bluetooth: Chip technology that enables temporary, short- range
connection ( data and voice) between wireless devices.
Wireless Application Protocol ( WAP): A set of communication
protocols designed to enable different kinds of wireless devices
to talk to a server installed on a mobile network, so users can
access the Internet.
Smartphone: Internet- enabled cell phone that can support
mobile application
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 6
7. The Attributes of M-computing and M-commerce
Mobility implies portability: user can carry a
mobile device with them
Broad reach: people can be reached at any
time.
These two characteristics create five value-added
attributes that break the barriers of
geography and time, ubiquity, convenience,
instant connectivity, personalization , and
localization of products and services.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 7
8. The Attributes of M-computing cont…
Ubiquity: fill the need for real- time information and
communication , independent of the user’s location.
Convenience and instant connectivity: easy and
fast access the web, intranets, and other mobile
devices without booting up a PC or placing a call via
a modem.
Customization: Information can be customized and
sent to individual consumers as an SMS.
Localization: knowing where a user is physically at
any particular moment is key to offering relevant
products and services.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 8
9. Drivers of M-computing and M-commerce
Widespread availability of mobile devices.
No Need for a PC.
The “ Cell Phone Culture”.
Vendor Marketing.
Declining Prices and Increasing.
Functionalities.
Improvement of Bandwidth.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 9
10. The landscape of mobile computing
and commerce
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 10
11. 6.2 Wireless Local Area Networks, WI-FI,
and Voice Portals
Wireless LAN(WLAN): A local area network (LAN)
without the cables; used to transmit and receive data
over the airwaves.
Wireless access point: An antenna connecting a mobile
device ( Laptop or PDA) to a wired local area network.
Hotspot: A small geographical perimeter within which a
wireless access point provides service to a number of
users.
802.11b: Technical standard developed by the IEEE, on
which most of today’s WLANs run; WLANs employing
this standard have communication speed of 11 mbps.
(Wi-Fi): wireless fidelity. Another name for the 802.11b
standard on which most WLANs run.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 11
12. 6.3 Mobile Personal Service
Applications
Hotel Services Go Wireless
Wireless Telemedicine
Mobile Portals
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 12
13. 6.4 Mobile Application in Financial
Service
Mobile Banking
Wireless Electronic Payment Systems
Micropayments
Mobile (Wireless) Wallets
Wireless Bill Payment
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 13
14. 6.5 M-shopping, Advertising, and
Customer Service
Shopping from Wireless Devices
Location-Based Advertising
Mobile Support of Consumers
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 14
15. 6.6 Mobile Intrabusiness Applications
Support of mobile workers with wearable
devices such as: Screen, Camera, Touch-panel
display, Keyboard, and Speech
Translator
Job Dispatch
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 15
16. Intrabusiness Workflow Application
Before Wireless With Wireless
Work orders are manually assigned by
multiple supervisors and dispatchers
Work orders are automatically assigned and
routed within minutes for maximum efficiency..
Field service technician commute to
dispatch center to pick up paper work
orders
Home-based filed services technicians receive
first work order via mobile terminal and proceed
directly to first assignment.
Manual record keeping of time, work
completed, and billing information.
Automated productivity tracking, record keeping
and building updates
Field service technicians call for new
assignments and often wait because of
radio traffic or unavailable dispatcher.
Electronic transmittal of additional work orders
with no waiting time
Completed work orders are dropped off at
the dispatch center at the end of the day
for manual entry into the billing tracking
system. Uncompleted orders are manually
distributed to available technicians.
Overtime changes often result.
Technicians close completed work orders from the
mobile terminals as they are completed . At the
end of shift. The technicians sign off and go
home.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 16
17. 6.7 Mobile Enterprise and
Supply Chain Applications
Support of customers and business partners
Supply chain applications
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 17
18. 6.8 Location-Based Commerce
Location based commerce (l. commerce):M-commerce
transactions targeted to
individuals in specific locations, at specific
times.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 18
19. L-commerce Technologies
Providing location- based services requires the following
technologies.
Position- determining equipment (PDE): This equipment
identifies the location of the mobile device.
Mobile positioning center (MPC): The MPC is a server that
manages the location information sent from the PDE
Location-based technology: The technology consist of groups
of servers that combine the position information with
geographic- and location- specific content to provide an l-commerce
service
Geographic content: Geographic content consists of streets,
road map, addresses, routes, landmarks, land usage , Zip
codes and the like.
Location-specific content: Location-specific content is used in
conjunction with the geographic content to provide he
location of particular services.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 19
20. GPS and GIS
Global Positioning Systems (GPS). A wireless
system that uses satellites to enable users to
determine their position anywhere on the
earth
Geographical Information System (GIS).
System that integrate GSP data onto
digitized map displays.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 20
21. Telemetry Applications
Telemetry is the science that measures
physical remoteness by means of wireless
transmission from a remote source (such as a
vehicle) to a receiving station.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 21
22. Barriers to L-commerce
Accuracy
The cost- benefit justification
The bandwidth of GSM networks
Invasion of privacy
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 22
23. 6.9 Pervasive Computing
The term pervasive computing also goes by
the names ubiquitous computing, embedded
computing or augmented computing.
Pervasive computing: invisible, everywhere
computing that is embedded in the objects
around us.
(RFID) radio frequency identification. Generic
term for technologies that use radio waves to
automatically identify individual items.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 23
24. Contextual Computing and
Context Awareness
Context awareness. Capturing a broad rang
of contextual attributes to better understand
what the consumer needs and what products
or service might be interest.
Contextual computing. Active adaptation of
the contextual environment for each user, at
each point of computing.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 24
25. Applications of Pervasive Computing
Smart homes
Smart applications
Smart cars
Smart “Things”
Large Scale Pervasive Systems
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 25
26. 6.10 Inhibitors and
barriers of mobile computing
The usability and other technical problems
Ethical and legal issues
Failures in mobile computing and M-Commerce
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 26
27. Technical and other limitations of
mobile computing
Limitation Description
Insufficient bandwidth Sufficient bandwidth is necessary for widespread use and it must be inexpensive. It will take a
few years until 3G is in many places .Wi-FI solves some of the problem.
Security standards Universal standards were not available in 2003 . It may take 3 or more years to have them .
Power consumption Batteries with long life are needed for mobile computing . Color screens and Wi-FI consume
more electricity , but new chips are solving some of the power-consumption problems.
Transmission interferences Weather and terrain problems as well as distance-limited connection exist with some
technologies . Reception in tunnel and some building is poor
GPS accuracy GSP may be accurate in a city with tall buildings
WAP limitations According to mofileinfo.com, in 2002 there were only about 50,000 WAP sites (compared to
millions of Web sites) . WAP still is a cumbersome process to work with.
Potential health hazards
Potential health damage from cellular radio frequency emission is not known yet . However,
more car accidents are related to drivers who were talking (some places bar the use of cell
phones while you drive ) also, cell phones may interfere with sensitive medical devices.
Legal issues Potential legal issues against manufactures of cell phones and against service provides exist,
due to the potential health problems
Human interface with device Screen and keyboards are too small and uncomfortable and tedious for many people to use
Complexity Too many optional add-ons are available (e.g., battery chargers, external keyboards,
headset, microphone, cradles) . Storing and using the optional add-ons can be a problem
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 27
28. All rights reserved. Reproduction or translation of this
work beyond that permitted in section 117 of the United
States Copyright Act without express permission of the
copyright owner is unlawful. Request for information
should be addressed to the permission department, John
Wiley & Sons, Inc. The purchaser may make back-up
copies for his/her own use only and not for distribution or
resale. The publisher assumes no responsibility for error,
omissions, or damages caused by the use of these
programs or from the use of the information herein.
“ Copyright 2005 John Wiley & Sons Inc.” Chapter 6 28