Groupware is technology designed to be used by groups of people for sharing information. Groupware applications are becoming more and more popular now.
Groupware is an environment where all users can share their documents. It is a platform where they can perform daily task of communicating, collaborating and coordinating with others. It automates business processes by using workflow management and collaborated computing techniques.
Cloud deployment models: public, private, hybrid, community – Categories of cloud computing: Everything as a service: Infrastructure, platform, software - Pros and Cons of cloud computing – Implementation levels of virtualization – virtualization structure – virtualization of CPU, Memory and I/O devices – virtual clusters and Resource Management – Virtualization for data center automation.
Online auction system is web based application, in which the seller can sell the goods by sitting in his own house ,so the main advantage of this application is that there is no more system compatibility requirement problem. The main advantage of the online auction system is that the user can have the better choices for their investment and also it is time saving , and through this system user can invest in their own selected firm.
Cloud deployment models: public, private, hybrid, community – Categories of cloud computing: Everything as a service: Infrastructure, platform, software - Pros and Cons of cloud computing – Implementation levels of virtualization – virtualization structure – virtualization of CPU, Memory and I/O devices – virtual clusters and Resource Management – Virtualization for data center automation.
Online auction system is web based application, in which the seller can sell the goods by sitting in his own house ,so the main advantage of this application is that there is no more system compatibility requirement problem. The main advantage of the online auction system is that the user can have the better choices for their investment and also it is time saving , and through this system user can invest in their own selected firm.
The systems development life cycle (SDLC), also referred to as the application development life-cycle, is a term used in systems engineering, information systems and software engineering to describe a process for planning, creating, testing, and deploying an information system.
Chapter 11: User support
from
Dix, Finlay, Abowd and Beale (2004).
Human-Computer Interaction, third edition.
Prentice Hall. ISBN 0-13-239864-8.
http://www.hcibook.com/e3/
Cloud computing system models for distributed and cloud computinghrmalik20
System Models for Distributed and Cloud
Computing,Peer-to-peer (P2P) Networks,Computational and Data Grids,Clouds,Advantage of Clouds over Traditional
Distributed Systems,Performance Metrics and Scalability Analysis,System Efficiency,Performance Challenges in Cloud Computing,WHY CLOUD COMPUTING,What is cloud computing and why is it distinctive,CLOUD SERVICE DELIVERY MODELS AND THEIR
PERFORMANCE CHALLENGES,Cloud computing security,What does Cloud Computing Security mean,Cloud Security Landscape,Energy Efficiency of Cloud Computing,How energy-efficient is cloud computing?
Describes the basic activities of software engineering - specification, design and implementation, validation and evolution.
Accompanies video:
https://www.youtube.com/watch?v=Z2no7DxDWRI
Feasibility Study of Hospital Management SystemNeelam Priya
Cost Benefit Analysis and Feasibility study of Hospital Management System is performed in Project management. Alternative solutions to problems of the Hospital Management System is created.
This presentation provides a detailed coverage on Cloud services: Software as a Service, Platform as a Service, Infrastructure as a Service, Database as a Service, Monitoring as a Service, Communication as Services. Service providers- Google, Amazon, Microsoft Azure, IBM, Sales force.
JAD and RAD ~ Joint Application Development and Rapid Application Development ~ are IBM-developed methodologies for improved User acceptance of higher quality business solutions. Together they build on Software Engineering tools and group decision making techniques through the use of a trained JAD Facilitator. The methodologies have proven to be effective beyond software development to course development, product development, project management work breakdown structures and any effort that requires group consensus decisions. Several JAD-like agile software development techniques have evolved such as SCRUM and PRiSM. John Crosby was the IBM curriculum owner for JAD/RAD courses and extended the method adding business process and data modeling.
Service level agreement in cloud computing an overviewDr Neelesh Jain
In the presentation overview of Service Level Agreement in Cloud Computing is discussed. Also introduction to Cloud Computing, and its benefits are too discussed.
The systems development life cycle (SDLC), also referred to as the application development life-cycle, is a term used in systems engineering, information systems and software engineering to describe a process for planning, creating, testing, and deploying an information system.
Chapter 11: User support
from
Dix, Finlay, Abowd and Beale (2004).
Human-Computer Interaction, third edition.
Prentice Hall. ISBN 0-13-239864-8.
http://www.hcibook.com/e3/
Cloud computing system models for distributed and cloud computinghrmalik20
System Models for Distributed and Cloud
Computing,Peer-to-peer (P2P) Networks,Computational and Data Grids,Clouds,Advantage of Clouds over Traditional
Distributed Systems,Performance Metrics and Scalability Analysis,System Efficiency,Performance Challenges in Cloud Computing,WHY CLOUD COMPUTING,What is cloud computing and why is it distinctive,CLOUD SERVICE DELIVERY MODELS AND THEIR
PERFORMANCE CHALLENGES,Cloud computing security,What does Cloud Computing Security mean,Cloud Security Landscape,Energy Efficiency of Cloud Computing,How energy-efficient is cloud computing?
Describes the basic activities of software engineering - specification, design and implementation, validation and evolution.
Accompanies video:
https://www.youtube.com/watch?v=Z2no7DxDWRI
Feasibility Study of Hospital Management SystemNeelam Priya
Cost Benefit Analysis and Feasibility study of Hospital Management System is performed in Project management. Alternative solutions to problems of the Hospital Management System is created.
This presentation provides a detailed coverage on Cloud services: Software as a Service, Platform as a Service, Infrastructure as a Service, Database as a Service, Monitoring as a Service, Communication as Services. Service providers- Google, Amazon, Microsoft Azure, IBM, Sales force.
JAD and RAD ~ Joint Application Development and Rapid Application Development ~ are IBM-developed methodologies for improved User acceptance of higher quality business solutions. Together they build on Software Engineering tools and group decision making techniques through the use of a trained JAD Facilitator. The methodologies have proven to be effective beyond software development to course development, product development, project management work breakdown structures and any effort that requires group consensus decisions. Several JAD-like agile software development techniques have evolved such as SCRUM and PRiSM. John Crosby was the IBM curriculum owner for JAD/RAD courses and extended the method adding business process and data modeling.
Service level agreement in cloud computing an overviewDr Neelesh Jain
In the presentation overview of Service Level Agreement in Cloud Computing is discussed. Also introduction to Cloud Computing, and its benefits are too discussed.
Whitepaper on the uptake of virtual conferences- essentials for successAfriciaRabare
Like every new trend, there are people who catch on fast, others who dilly dally, and those who prefer to fight newness than to give it a chance to impress them. This whitepaper is for all the three parties- it will give you insight on how the platforms work, guidance on how to select the right virtual tool, and knowledge on the basics of conducting a good virtual conference.
You will gain clarity on the importance of knowing your audience before selecting the virtual tool that resonates with them-because in as much as different platforms do different things, you cannot buy engagement. You have to build engagement (Tara Nicholle Nelson) from assessing your audience.
Do you want your audience to be as intrigued as they would be if it were an in-person conference? you want them to relish this new approach? then check out this whitepaper to learn more.
#KSUGrads
Leveraging social media across the organizationHermes F
In today’s socially driven digital landscape, the enterprise must adapt to leverage the social capitol and knowledge of its employees. Change is not instant and companies will need to deploy various solutions to meet its employees’ businesses needs. The true power of social media lies within unifying the various communication platforms to create and grow their knowledge base.
Leveraging
Mattermost vs riot matrix who is winning as an open-source slack alternative_DundigallaBhavya
While these companies are on three different messaging platforms, with different requirements, they have one thing in common - they all understand the importance of having a virtual workplace where all employees and stakeholders can communicate and collaborate, irrespective of the differences in time zone and location.
Communication is omnipresent in every business. While a lot is said and done about Communication Skills improvement, the area of improving Communication Process or the Communication Systems within an organization remains vastly ignored. There are sustainable benefits that can be achieved by improving the business communication system. Some organizations have already realized impressive benefits such as 100%+ improvement in operational efficiency and 50%+ improvement in sales. We cover the latest happenings, how a company can achieve these benefits and the common mistakes that need to be avoided.
Social software lets employees connect and share in new ways, and can dramatically improve the effectiveness of your organization. But social technologies like microblogging, social networking, automated activity feeds, social spreadsheets, wikis, etc. are new to most organizations, and most IT departments don’t have experience with how to successfully implement them.
Success with social software involves a lot more than simply finding the product that best fits your needs. It involves framing the problem appropriately in the first place, defining your business goals, and choosing a rollout methodology designed to meet those goals. It involves selling your CFO, changing behavior across your organization, and more.
This paper is designed to help you learn from the mistakes of others before you, so you can avoid the common pitfalls of social software, and get fast business value.
Simple whitepaper about all the new social capabilities of IBM Sametime 9. Read it and share it. New design, many updates for Social, Mobile and HD Video
Similar to Groupware Technology Project Report (20)
PL/SQL is a combination of SQL along with the procedural features of programming languages.
It provides specific syntax for this purpose and supports exactly the same datatypes as SQL.
Extending Grids with Cloud Resource Management for Scientific ComputingBharat Kalia
Grid computing gained high popularity in the field of scientific computing through the idea of distributed resource sharing among institutions and scientists. Scientific computing is traditionally a high-utilization workload, with production Grids often running at over 80% utilization (generating high and often unpredictable latencies), and with smaller national Grids offering a rather limited amount of high-performance resources. Running large-scale simulations in such overloaded Grid environments often becomes latency bound or suffers from well-known Grid reliability problems. Today, a new research direction coined by the term Cloud computing proposes an alternative attractive to scientific computing scientists primarily because of four main advantages.
Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities.
OLAP Basics and Fundamentals by Bharat Kalia Bharat Kalia
OLAP is a category of software technology that enables analysts, managers, and executives to gain insight into the data through fast, consistent, interactive, access in a wide variety of possible views of information that has been transformed from raw data to reflect the real dimensionality of the enterprise as understood by the user.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Fundamentals of Electric Drives and its applications.pptx
Groupware Technology Project Report
1. Groupware Technology
1. INTRODUCTION
Groupware is technology designed to be used by groups of people for
sharing information. Groupware applications are becoming more and
more popular now.
Groupware is an environment where all users can share their documents.
It is a platform where they can perform daily task of communicating,
collaborating and coordinating with others. It automates business
processes by using workflow management and collaborated computing
techniques.
Groupware applications like e-mail, workflow systems, group calendars,
chat systems, decision support system are easy but very powerful.
As Groupware is advantageous over single user system, it has high
demand and many companies are specializing in developing Groupware
based applications.
By : Bharat Kalia 1
2. Groupware Technology
2. WHAT IS GROUPWARE?
Groupware is technology designed to facilitate the work of
groups. This technology may be used to communicate, cooperate, coordinate,
solve problems, compete, or negotiate. While traditional technologies like the
telephone qualify as groupware, the term is ordinarily used to refer to a specific
class of technologies relying on modern computer networks, such as email,
newsgroups, videophones, or chat.
Groupware technologies are typically categorized along two primary
dimensions:
1. Whether users of the groupware are working together at the same time
("realtime" or "synchronous" groupware) or different times
("asynchronous" groupware), and
2. Whether users are working together in the same place ("colocated" or
"face-to-face") or in different places ("non-colocated" or "distance").
Same time
“Synchronous”
Different time
“Asynchronous”
Same Place
“Colocated”
Voting,
presentation
support
Shared
computers
Different Place
“Distance”
Videophones,
chat
Email,
workflow
By : Bharat Kalia 2
3. Groupware Technology
3. LOTUS MODEL OF GROUPWARE
Let us consider the Lotus model of Groupware
The figure 1 shows three intersecting circles. Communication, Collaboration
and Coordination.
When you work in an organization, you are actually working in a
number of groups. So you can consider yourself as a member and part
of the groups.
When you talk to the sales representative you are actually
communicating. When you put up a proposal for new accounting
software and request others to give their opinions, you are
collaborating. When you ask the manager to sign a statement, you are
coordinating.
By : Bharat Kalia 3
4. Groupware Technology
4. GROUPWARE: APPLICATIONS
i) Asynchronous Groupware Applications
Email is by far the most common groupware application (besides of course,
the traditional telephone). While the basic technology is designed to pass
simple messages between 2 people, even relatively basic email systems
today typically include interesting features for forwarding messages, filing
messages, creating mailing groups, and attaching files with a message.
Other features that have been explored include: automatic sorting and
processing of messages, automatic routing, and structured communication
(messages requiring certain information).
Workflow systems allow documents to be routed through organizations
through a relatively-fixed process. A simple example of a workflow
application is an expense report in an organization: an employee enters an
expense report and submits it, a copy is archived then routed to the
employee's manager for approval, the manager receives the document,
electronically approves it and sends it on and the expense is registered to
the group's account and forwarded to the accounting department for
payment. Workflow systems may provide features such as routing,
development of forms, and support for differing roles and privileges.
Group calendars allow scheduling, project management, and coordination
among many people, and may provide support for scheduling equipment as
well. Typical features detect when schedules conflict or find meeting times
By : Bharat Kalia 4
5. Groupware Technology
that will work for everyone. Group calendars also help to locate people.
Typical concerns are privacy (users may feel that certain activities are not
public matters), completeness and accuracy (users may feel that the time it
takes to enter schedule information is not justified by the benefits of the
calendar).
ii) Synchronous or Realtime Groupware Applications
Shared whiteboards allow two or more people to view and draw on a
shared drawing surface even from different locations. This can be used, for
instance, during a phone call, where each person can jot down notes (e.g. a
name, phone number, or map) or to work collaboratively on a visual
problem. Most shared whiteboards are designed for informal conversation,
but they may also serve structured communications or more sophisticated
drawing tasks, such as collaborative graphic design, publishing, or
engineering applications. Shared whiteboards can indicate where each
person is drawing or pointing by showing telepointers, which are color-coded
or labeled to identify each person.
Chat systems permit many people to write messages in realtime in a public
space. As each person submits a message, it appears at the bottom of a
scrolling screen. Chat groups are usually formed by having listing chat
rooms by name, location, number of people, topic of discussion, etc.
Many systems allow for rooms with controlled access or with
moderators to lead the discussions, but most of the topics of interest to
By : Bharat Kalia 5
6. Groupware Technology
researchers involve issues related to unmoderated realtime communication
including: anonymity, following the stream of conversation, scalability with
number of users, and abusive users.
While chat-like systems are possible using non-text media, the
text version of chat has the rather interesting aspect of having a direct
transcript of the conversation, which not only has long-term value, but
allows for backward reference during conversation making it easier for
people to drop into a conversation and still pick up on the ongoing
discussion.
Decision support systems are designed to facilitate groups in decision-making.
They provide tools for brainstorming, critiquing ideas, putting
weights and probabilities on events and alternatives, and voting. Such
systems enable presumably more rational and even-handed decisions.
Primarily designed to facilitate meetings, they encourage equal participation
by, for instance, providing anonymity or enforcing turn-taking.
By : Bharat Kalia 6
7. Groupware Technology
5. GROUPWARE: DESIGN
As with all user interface design, the method used for designing a
groupware system is more significant than specific design suggestions. This
introduction thus begins with the groupware design process. The remaining
sections address some of the most common issues that face groupware
designers.
i) The Groupware Design Process
It's best to start by gaining a solid understanding of your
prospective users, what their goals are, and how they go about their work. For
broadly-targeted groupware applications, such as videophones or email,
understanding users can boil down to understanding how human beings
communicate in the first place. A design is also best informed by conducting
user studies on system prototypes. In these cases user testing is often
significantly more difficult than with single-user systems for the following
reasons:
Organizing and scheduling for groups is more difficult than for individuals.
Pre-established groups vary in interaction style, and the length of time
they've been a group affects their communication patterns.
New groups change quickly during the group formation process.
Groups are dynamic; roles change.
Many studies need to be long-term, especially when studying asynchronous
groupware.
By : Bharat Kalia 7
8. Groupware Technology
Modifying prototypes can be technically difficult because of the added
complexity of groupware over single-user software.
When designing groupware, it is often best to begin with field
studies. The goal is to understand a particular type of group or organization that
will be using the groupware system. A number of different studies can be
conducted: interviews, surveys, analysis of artifacts used in the work process,
examination of processes and workflows, etc. In all cases, the object is to
identify the users' tasks and goals, understand how the group communicates
and determine the power structures and roles.
ii) Interoperability
In the early 90s, AT&T and MCI both introduced videophones
commercially, but their two systems couldn't communicate with each other.
This lack of interoperability/compatibility meant that anyone who wanted to
buy a videophone had to make sure that everyone they wanted to talk to would
buy the same system. Compatibility issues lead to general wariness among
customers, who want to wait until a clear standard has emerged.
iii) Perceived Benefit
Even when everyone in the group may benefit, if the choice is
made by individuals, the system may not succeed. An example is with office
calendar systems: if everyone enters all of their appointments, then everyone
has the benefit of being able to safely schedule around other people's
appointments. However, if it's not easy to enter your appointments, then it may
By : Bharat Kalia 8
9. Groupware Technology
be perceived by users as more beneficial to leave their own appointments off,
while viewing other people's appointments.
iv) Session Control
A session is a situation where a group of people are in a
conversation together at a given time, such as a group of people together in a
chat room or people talking together over the telephone. Metaphorically,
session control is like a person standing at the door of a room checking IDs and
deciding who gets to go in.
Session control issues include finding out what rooms are
available, determining who can enter and exit the room, and when and how.
Here are some suggested policies for session control:
Decide what limits there are to who can join a session. Are there limits to
the number of people or to who is qualified to enter?
Allow people to join and leave at any time. Provide a "polite" protocol for
doing so. Let people comfortably enter and leave conversations through
continuous degrees of commitment and intrusion.
Provide a means for preventing interruptions.
Facilitate people getting together. Provide mechanisms for identifying
appropriate conversational partners.
Provide a means for setting up side conferences.
By : Bharat Kalia 9
10. Groupware Technology
v) Floor Control
Once people have joined a conversational session, it must be
decided what kind of access each person has to shared artifacts, or
conversational props. For instance, when using a shared whiteboard, can
everyone draw on it at the same time (simultaneous access), can only one
person access it at a time (by passing a token, or baton), is there a moderator
who controls access, and is there a time limit for each person?
Of course, some intermediate solutions are also possible. For
instance, in the shared whiteboard example, there can be multiple whiteboards.
Some may be personal and others shared. Personal whiteboards may be visible
to other users but non-editable by other users. This allows everyone to work
simultaneously without interfering with the work of others.
vi) Privacy
Privacy, Security, and Anonymity
Whenever using groupware, some information needs to be
shared, and there is a concern that all other information remain private, and that
critical information be secure even against aggressive attempts to obtain the
information. In many situations, users choose to be anonymous or use a
consistent pseudonym. Anonymity can be crucial in encouraging fair
participation in discussions and is useful for providing protection from
harassment.
By : Bharat Kalia 10
11. Groupware Technology
Sharing Information, Identification, and Accountability
On the other hand, there is continuing pressure to share more
information. The more information gets shared, the more easily common
ground can be achieved. Sharing information about yourself enables many
systems to provide more useful customization and matching to your interests.
Furthermore, while anonymity can protect an individual, there are also quite
legitimate reasons for identifying people for accountability, especially where
security and the risk of abusive behavior are involved.
Control and Reciprocity
To resolve these conflicting needs, it's important to give users as
much control as possible over what information gets shared and what remains
private. Let users decide how much information to share, and use that to
determine what kinds of information they can access. One example of privacy
policy is the principle of reciprocity: if a user wants information about another
user, then they must provide the equivalent information about themselves.
Reciprocity isn't always the right policy, but serves as a useful starting point.
By : Bharat Kalia 11
12. Groupware Technology
6. ADVANTAGES OF GROUPWARE
Groupware offers significant advantages over single-user
systems. These are some of the most common reasons people want to use
groupware:
to facilitate communication: make it faster, clearer, more persuasive
to enable communication where it wouldn't otherwise be possible
to enable telecommuting
to cut down on travel costs
to bring together multiple perspectives and expertise
to save time and cost in coordinating group work
to facilitate group problem-solving
In addition to the benefits of groupware, another good reason to
study usability and design issues in groupware is to avoid a failed design.
By : Bharat Kalia 12
13. Groupware Technology
7. CONCLUSION
This is what Groupware is all about. Thus we have seen the
utilities and the advantages of groupware in organizations.
Hence Groupware is the best solution to provide faster
communication, to form groups with common interest where it wouldn’t be
possible to gather a sufficient number of people face to face, to solve group
problems easily.
That’s why more and more people are realizing its utility and are
shifting to Groupware. This is today’s stage. This stage lays solid foundation
for tomorrow.
By : Bharat Kalia 13