Presentation on issues with network optimization of mobile apps given at Over the Air 2011, presented by Dr. Kamran Kordi, Deutsche Telekom AG, Group Technology.
SFMobile: Founder Labs Mobile Edition 01/09/11Jim Porter
This document summarizes the first week of the Founder Labs Mobile Edition program from January 8, 2011. It provides an overview of the mobile ecosystem and business models, including some history on mobile devices and companies like General Magic. It also discusses the evolution of the mobile device stack from hardware-focused to more software-driven. Finally, it notes how value in mobile is shifting up the stack to services and content, and fueling growth in mobile app stores.
This deck was prepared for a lecture for week 1 of Founder Labs Mobile Edition.
The audience was a mix of developers, UI/UX designers and hardware engineers. The goal was to provide a baseline ecosystem overview and talk about technology drivers and business models in mobile.
Most of the slides in the deck are derived from work with my clients at Accenture.
With the arriving of Over-The-Top
players, Mobile Network Operators
are being called “dumb pipes”.
If marketing and innovation are the
only variables that create value, the
path to success is only one: to
generate innovative value.
Telecom and employability skills for indiaRishi Kapal
Indian Telecom Sector needs infusion of fresh minds but the employability skills need to be honed in the classrooms for a proper corporate transition.
visit www.mindactiv.co.in
This document provides an overview of wireless technology and mobile application development. It discusses the history and evolution of smartphones and operating systems. It also covers considerations for mobile app development such as memory, power, mobility, performance, cross-platform development, and managing upgrade cycles. The document is presented by Impressico Business Solutions and copyrighted in 2013.
Orbitz mobile & travel industry - for distributionMobileAnthem
Mobile has exploded on to the scene this year. Not surprising since there are 284 million phones for 310 million people in the U.S. Add to that 17 million tablets were sold in 2010. But what do people really want from these portable devices? How do we create an experience that delights them enough to gain brand loyalty in the competitive travel industry? Hugh Jedwill, CEO of Mobile Anthem, uses his background in brand marketing to describe mobile behaviors and discuss how to use them to create a compelling product that will create loyalty and drive business.
SFMobile: Founder Labs Mobile Edition 01/09/11Jim Porter
This document summarizes the first week of the Founder Labs Mobile Edition program from January 8, 2011. It provides an overview of the mobile ecosystem and business models, including some history on mobile devices and companies like General Magic. It also discusses the evolution of the mobile device stack from hardware-focused to more software-driven. Finally, it notes how value in mobile is shifting up the stack to services and content, and fueling growth in mobile app stores.
This deck was prepared for a lecture for week 1 of Founder Labs Mobile Edition.
The audience was a mix of developers, UI/UX designers and hardware engineers. The goal was to provide a baseline ecosystem overview and talk about technology drivers and business models in mobile.
Most of the slides in the deck are derived from work with my clients at Accenture.
With the arriving of Over-The-Top
players, Mobile Network Operators
are being called “dumb pipes”.
If marketing and innovation are the
only variables that create value, the
path to success is only one: to
generate innovative value.
Telecom and employability skills for indiaRishi Kapal
Indian Telecom Sector needs infusion of fresh minds but the employability skills need to be honed in the classrooms for a proper corporate transition.
visit www.mindactiv.co.in
This document provides an overview of wireless technology and mobile application development. It discusses the history and evolution of smartphones and operating systems. It also covers considerations for mobile app development such as memory, power, mobility, performance, cross-platform development, and managing upgrade cycles. The document is presented by Impressico Business Solutions and copyrighted in 2013.
Orbitz mobile & travel industry - for distributionMobileAnthem
Mobile has exploded on to the scene this year. Not surprising since there are 284 million phones for 310 million people in the U.S. Add to that 17 million tablets were sold in 2010. But what do people really want from these portable devices? How do we create an experience that delights them enough to gain brand loyalty in the competitive travel industry? Hugh Jedwill, CEO of Mobile Anthem, uses his background in brand marketing to describe mobile behaviors and discuss how to use them to create a compelling product that will create loyalty and drive business.
This document provides an overview of mobile computing and wireless technology. It begins with an introduction to mobile computing and its evolution. It then discusses wireless transmission media and devices, cellular network standards, and standards for mobile web access. The document outlines key applications of mobile technology including location-based services, m-commerce, wireless networks, and their use in industries like healthcare. It concludes by discussing management opportunities and challenges presented by wireless technologies.
This document summarizes a webinar about optimizing emails for mobile devices. It discusses trends showing the rise of mobile email and importance of optimization. Tips included using single column layouts, inline styles over style sheets, and testing links and images across different devices. Speakers emphasized the need to design for a small screen and avoid wasting users' time. Rendering tools and testing emails on multiple platforms before sending were presented as important for ensuring proper display.
Cloud e seus impactos nos testes de softwareCezar Taurion
This document discusses cloud computing and its impacts on software development, testing, use and commercialization. It covers how cloud computing represents the third generation of computing platforms and the third phase of the internet. It also discusses how mobile devices are exploding and driving new forms of interaction like touchscreens and voice commands. New applications will need to be developed specifically for mobile. Cloud computing will impact all business processes and require new application solutions.
Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...Kenji Hara
In this session we will talk about how we built a log analysis system for marketing using Hadoop, which explore the internet users' interests or feedback about specified products or themes from access log, query/click log and CGM data. Our system provides three features, which are 1) sentiment analysis, 2) co-occuring keyword extraction, and 3) user interests estimation. For large scale analysis, we use Hadoop with customized functions, which push down the shuffle size by amplifying map-side processing. We also show the features of our Hadoop cluster.
Facebook of Things - The importance of End Users within M2M SystemsPeter Decker
The document discusses the future of machine-to-machine (M2M) systems and the importance of end users. It suggests that social networking concepts could be applied to connect end users and their devices, creating a "Facebook of Things." Examples are given of how home automation and vehicle integration could provide personalized services and user propositions. The talk outlines a roadmap toward more socialized M2M that actively engages end users by 2030.
Facebook Ad Targeting for Mobile MarketersStephen Cater
Facebook now offer 9 global Ad Targeting Clusters for Mobile Marketers. Mobile Marketers using these Mobile Targeting Clusters have seen on average 30-45% lower cost per gross ads (CPGA) compared to standard demographic targeting.
This is from Facebook's weekly update, as of 3rd July 2012. All details from the update can be found here: http://www.stephencater.com/search?q=facebook
Gemius presentation from the Internet Hungary 2011 conference entitled ‘Smart, intelligent, mobile: The time is now’ provides an insight into the internet mobile market and gives answers on such questions as: What is the mobile internet? How big is it? What are the preferences of mobile internet users and how and when they use it?
The document summarizes Nokia's vision of increased mobility across different domains including the enterprise domain. It discusses key aspects of the enterprise domain such as services, usage scenarios, management, and trends driving adoption of mobility. Extending mobility into the enterprise domain can provide more cost-effective communication solutions and improve productivity through increased accessibility of information and collaboration tools.
Future of mobile media @ Future Ideas by h.kienhuis (sanoma)Herman Kienhuis
Mobile media is dominating consumer habits. Smartphones and tablets are driving explosive growth in mobile internet usage and time spent on apps. Hardware is becoming software as the app ecosystem fuels new mobile experiences and daily activities. Publishers are shifting content to snackable formats optimized for mobile, and monetization will increasingly involve transactions and targeted ads within apps. The future of media is personal, touch-based, and linked to physical behaviors and locations through mobile devices.
Touch&Travel is a project that uses near-field communication (NFC)-enabled mobile phones as tickets for public transportation. It allows passengers to check-in on their phone when starting a trip and check-out when ending to pay automatically based on the travel. The system is being tested in Germany with goals of providing simple, flexible transportation access across multiple operators and modes of transit without needing to purchase tickets in advance. It aims to lower infrastructure costs by using existing mobile networks for communication instead of requiring connection points to power or backend systems.
ConnectM is a leading global M2M technology solutions and services company with over 80 man-years of M2M expertise. It has managed over 60,000 assets through its M2M platform, including 30,000 telecom towers and 25,000 buildings. ConnectM has 30+ customers that are mostly large multinational corporations. It has won several awards and has a patent-pending technology with ready-to-use M2M frameworks and components.
1. The document discusses how cellular networks can track user location using cell IDs and how this location data can be accessed through APIs and used by applications. However, network location has inaccuracies related to cell size and location technology used.
2. It also covers different location technologies available on smartphones like GPS, cellular, and WiFi and how location APIs allow applications to request and receive location data. Examples of location-based applications and services are given.
3. Emerging trends in location technologies and applications are predicted, including the growing use of augmented reality, indoor location services, and virtual worlds on mobile devices.
General Mobile Technology Company was founded in 2011 and focuses on mobile platforms and internet services. Headquartered in Taipei with offices in Shanghai and Shenzhen, it provides clients with total solutions for mobile platforms and internet services globally, with an emphasis on Southeast Asia, Africa, India, and South America. The company's vision is to build the largest mobile internet service platform and provide superior services to clients.
An overview of BUG, by Bug Labs, discussing the BUG product architecture and usage scenarios, in addition to some pretty charts and graphs that prove the immense power of open source.
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012Juniper Networks
Juniper Networks presented at Mobile World Congress on February 28, 2012. They discussed innovations in their networking platforms, software, and security products across different network domains including access & aggregation, edge, core, data center, WAN, campus & branch, and consumer & business devices. Juniper aims to provide consistent functionality and security across their portfolio with their common Junos operating system.
The document discusses the importance of integrating mobile into marketing strategies. It notes that mobile internet usage is growing rapidly and will soon surpass desktop usage. Marketers need to design websites for mobile, optimize campaigns for mobile, and harness new opportunities from understanding shifting mobile behaviors. The key is having a comprehensive mobile strategy that makes the consumer experience seamless across platforms and devices. Data and innovation should also be part of the strategy to create value for audiences.
Comarch Technology Review, in Focus: Mobile TechnologiesComarch
Published twice a year, Comarch Technology Review (Telecom Edition) provides expert commentary and analysis on current trends shaping the telecommunications market, as well as insight on how to solve problems most commonly faced by telecom operators.
Lotusphere 2012 - Harnessing the Power of Enterprise Mobility Robert Sutor
It's hard not to talk to an enterprise customer these days without getting into a discussion about Mobile. By 2012, the shipment of smartphones and tablets is expected to exceed that of traditional personal computers, including laptops. Enterprise CIOs want to use these personal mobile devices to give better access to their internal data and processes for employees, as well as enabling better purchasing and support services for their customers. Complicating this is the variety of devices used, employees who wish to use their own devices at work, application level and device management, cost controls, and security concerns. In this session, Bob Sutor will discuss his views on the foundational needs of enterprises for a mobile application platform, mobile device management, and security.
1) 3G is the third generation of cellular technology that focuses on digital data in addition to voice. It uses technologies like WCDMA and CDMA2000 1x EV-DO.
2) 3G aims to provide high-speed mobile data services like video calling through personal communicators, connecting people to express identities, optimizing traffic, and enabling social learning through community connections.
3) For 3G to succeed, cellular operators need to separate into network providers and service providers while content providers learn the technologies and needs to deliver customized services across different user groups.
1) The document discusses strategies for SK Telecom to enter the mobile location-based services (LBS) market in China.
2) It recommends launching a location-based social network called Ulink to attract subscribers and providing location-based advertising as a value-added service.
3) It also suggests partnering with mobile terminal manufacturers and network operators in China to help SK Telecom enter the 3G mobile phone market and provide terminals with GPS functionality.
This document provides an overview of mobile computing and wireless technology. It begins with an introduction to mobile computing and its evolution. It then discusses wireless transmission media and devices, cellular network standards, and standards for mobile web access. The document outlines key applications of mobile technology including location-based services, m-commerce, wireless networks, and their use in industries like healthcare. It concludes by discussing management opportunities and challenges presented by wireless technologies.
This document summarizes a webinar about optimizing emails for mobile devices. It discusses trends showing the rise of mobile email and importance of optimization. Tips included using single column layouts, inline styles over style sheets, and testing links and images across different devices. Speakers emphasized the need to design for a small screen and avoid wasting users' time. Rendering tools and testing emails on multiple platforms before sending were presented as important for ensuring proper display.
Cloud e seus impactos nos testes de softwareCezar Taurion
This document discusses cloud computing and its impacts on software development, testing, use and commercialization. It covers how cloud computing represents the third generation of computing platforms and the third phase of the internet. It also discusses how mobile devices are exploding and driving new forms of interaction like touchscreens and voice commands. New applications will need to be developed specifically for mobile. Cloud computing will impact all business processes and require new application solutions.
Hadoop World 2011: Large Scale Log Data Analysis for Marketing in NTT Communi...Kenji Hara
In this session we will talk about how we built a log analysis system for marketing using Hadoop, which explore the internet users' interests or feedback about specified products or themes from access log, query/click log and CGM data. Our system provides three features, which are 1) sentiment analysis, 2) co-occuring keyword extraction, and 3) user interests estimation. For large scale analysis, we use Hadoop with customized functions, which push down the shuffle size by amplifying map-side processing. We also show the features of our Hadoop cluster.
Facebook of Things - The importance of End Users within M2M SystemsPeter Decker
The document discusses the future of machine-to-machine (M2M) systems and the importance of end users. It suggests that social networking concepts could be applied to connect end users and their devices, creating a "Facebook of Things." Examples are given of how home automation and vehicle integration could provide personalized services and user propositions. The talk outlines a roadmap toward more socialized M2M that actively engages end users by 2030.
Facebook Ad Targeting for Mobile MarketersStephen Cater
Facebook now offer 9 global Ad Targeting Clusters for Mobile Marketers. Mobile Marketers using these Mobile Targeting Clusters have seen on average 30-45% lower cost per gross ads (CPGA) compared to standard demographic targeting.
This is from Facebook's weekly update, as of 3rd July 2012. All details from the update can be found here: http://www.stephencater.com/search?q=facebook
Gemius presentation from the Internet Hungary 2011 conference entitled ‘Smart, intelligent, mobile: The time is now’ provides an insight into the internet mobile market and gives answers on such questions as: What is the mobile internet? How big is it? What are the preferences of mobile internet users and how and when they use it?
The document summarizes Nokia's vision of increased mobility across different domains including the enterprise domain. It discusses key aspects of the enterprise domain such as services, usage scenarios, management, and trends driving adoption of mobility. Extending mobility into the enterprise domain can provide more cost-effective communication solutions and improve productivity through increased accessibility of information and collaboration tools.
Future of mobile media @ Future Ideas by h.kienhuis (sanoma)Herman Kienhuis
Mobile media is dominating consumer habits. Smartphones and tablets are driving explosive growth in mobile internet usage and time spent on apps. Hardware is becoming software as the app ecosystem fuels new mobile experiences and daily activities. Publishers are shifting content to snackable formats optimized for mobile, and monetization will increasingly involve transactions and targeted ads within apps. The future of media is personal, touch-based, and linked to physical behaviors and locations through mobile devices.
Touch&Travel is a project that uses near-field communication (NFC)-enabled mobile phones as tickets for public transportation. It allows passengers to check-in on their phone when starting a trip and check-out when ending to pay automatically based on the travel. The system is being tested in Germany with goals of providing simple, flexible transportation access across multiple operators and modes of transit without needing to purchase tickets in advance. It aims to lower infrastructure costs by using existing mobile networks for communication instead of requiring connection points to power or backend systems.
ConnectM is a leading global M2M technology solutions and services company with over 80 man-years of M2M expertise. It has managed over 60,000 assets through its M2M platform, including 30,000 telecom towers and 25,000 buildings. ConnectM has 30+ customers that are mostly large multinational corporations. It has won several awards and has a patent-pending technology with ready-to-use M2M frameworks and components.
1. The document discusses how cellular networks can track user location using cell IDs and how this location data can be accessed through APIs and used by applications. However, network location has inaccuracies related to cell size and location technology used.
2. It also covers different location technologies available on smartphones like GPS, cellular, and WiFi and how location APIs allow applications to request and receive location data. Examples of location-based applications and services are given.
3. Emerging trends in location technologies and applications are predicted, including the growing use of augmented reality, indoor location services, and virtual worlds on mobile devices.
General Mobile Technology Company was founded in 2011 and focuses on mobile platforms and internet services. Headquartered in Taipei with offices in Shanghai and Shenzhen, it provides clients with total solutions for mobile platforms and internet services globally, with an emphasis on Southeast Asia, Africa, India, and South America. The company's vision is to build the largest mobile internet service platform and provide superior services to clients.
An overview of BUG, by Bug Labs, discussing the BUG product architecture and usage scenarios, in addition to some pretty charts and graphs that prove the immense power of open source.
Juniper Networks IR Investor and Analyst Update - Mobile World Congress 2012Juniper Networks
Juniper Networks presented at Mobile World Congress on February 28, 2012. They discussed innovations in their networking platforms, software, and security products across different network domains including access & aggregation, edge, core, data center, WAN, campus & branch, and consumer & business devices. Juniper aims to provide consistent functionality and security across their portfolio with their common Junos operating system.
The document discusses the importance of integrating mobile into marketing strategies. It notes that mobile internet usage is growing rapidly and will soon surpass desktop usage. Marketers need to design websites for mobile, optimize campaigns for mobile, and harness new opportunities from understanding shifting mobile behaviors. The key is having a comprehensive mobile strategy that makes the consumer experience seamless across platforms and devices. Data and innovation should also be part of the strategy to create value for audiences.
Comarch Technology Review, in Focus: Mobile TechnologiesComarch
Published twice a year, Comarch Technology Review (Telecom Edition) provides expert commentary and analysis on current trends shaping the telecommunications market, as well as insight on how to solve problems most commonly faced by telecom operators.
Lotusphere 2012 - Harnessing the Power of Enterprise Mobility Robert Sutor
It's hard not to talk to an enterprise customer these days without getting into a discussion about Mobile. By 2012, the shipment of smartphones and tablets is expected to exceed that of traditional personal computers, including laptops. Enterprise CIOs want to use these personal mobile devices to give better access to their internal data and processes for employees, as well as enabling better purchasing and support services for their customers. Complicating this is the variety of devices used, employees who wish to use their own devices at work, application level and device management, cost controls, and security concerns. In this session, Bob Sutor will discuss his views on the foundational needs of enterprises for a mobile application platform, mobile device management, and security.
1) 3G is the third generation of cellular technology that focuses on digital data in addition to voice. It uses technologies like WCDMA and CDMA2000 1x EV-DO.
2) 3G aims to provide high-speed mobile data services like video calling through personal communicators, connecting people to express identities, optimizing traffic, and enabling social learning through community connections.
3) For 3G to succeed, cellular operators need to separate into network providers and service providers while content providers learn the technologies and needs to deliver customized services across different user groups.
1) The document discusses strategies for SK Telecom to enter the mobile location-based services (LBS) market in China.
2) It recommends launching a location-based social network called Ulink to attract subscribers and providing location-based advertising as a value-added service.
3) It also suggests partnering with mobile terminal manufacturers and network operators in China to help SK Telecom enter the 3G mobile phone market and provide terminals with GPS functionality.
Sip vo ip-ims-convergence-d2-10 at kishoreAT Kishore
This document discusses emerging trends toward convergence in communications markets and focuses on how SIP profiles can benefit from convergence. It recommends the following action plan for service providers to successfully adopt a convergence model: (1) Start working now with Alcatel-Lucent on defining SIP profiles and services to support convergence; (2) Begin product development and trials of convergence services now to be ready for commercial launch in 2008; (3) Leverage existing prototype applications and services to trial convergence concepts with major operators. The goal is to get started immediately to be prepared for long-term success in converged markets.
Smartphone Challenge: Guidelines for development of network friendly applicat...Daniel Appelquist
This document provides guidelines for developing mobile applications that are friendly to mobile networks. It discusses constraints of mobile networks like limited bandwidth, variable connectivity, and impact on battery life. It emphasizes the need for applications to have asynchronous network requests so they can handle delays and failures gracefully without blocking the user interface. Applications should also cache data for offline use, compress content, and manage foreground and background states efficiently. The document provides platform-specific recommendations for iOS, Android and Windows Phone to help developers address these issues and create responsive applications that perform well on mobile networks.
handling-of-signaling-storms-in-mobile-networks-augustDaniel Mateos P
The document discusses the increasing challenges mobile network operators face due to exponential growth in signaling from smartphones, applications, and devices. Existing network protection is insufficient to handle signaling storms caused by events that trigger escalating signaling traffic from reconnection attempts. A new end-to-end strategy across network layers is needed to contain overload surges and maximize user service, including mechanisms at the radio network edge, signaling distributors, and user data management systems. The paper focuses on the role of Ericsson's user data management system and mechanisms beyond standards that help networks efficiently handle this scenario and ensure quick, safe recovery.
IRJET- Smart Home Automated Control and Automatic Doorbell Alert using Androi...IRJET Journal
This document describes a smart home automation system that allows users to control home appliances and receive alerts using voice commands through an Android app and an Arduino board. The system uses Google Assistant for voice recognition and processes voice inputs to control devices connected to the Arduino. It also includes sensors to detect intruders entering the home and notify the user by email. The system aims to provide convenience for elderly or disabled people to control their home remotely. It discusses the existing limitations of prior systems and the objectives and components of the proposed system.
A Mobile Centric View of Silicon Valley - January 2011Lars Kamp
A presentation held at Opinno in San Francisco to a delegration from PromoMadrid. Goal was to provide a quick overview of major trends in mobile in 30 min.
Semantic Service Creation for Mobile UsersJosef Noll
The document discusses semantic service creation for mobile users. It covers several key topics:
- The elements needed for service delivery to "Beyond 3G" users and whether current technologies can address the challenges.
- How semantic technologies like ontologies can help by describing services semantically and enabling dynamic service composition.
- Examples of how semantics can support personalization and context awareness to better link user preferences to available services.
Secured Way Of Offloading Mobile Cloud Process For Smart PhoneIRJET Journal
This document proposes a secured way of offloading mobile cloud processes to reduce computation power usage on smartphones. It introduces a ternary decision making (TDM) framework that determines whether a task should be performed on the smartphone or offloaded to the cloud based on estimated execution time and energy consumption. The tasks are offloaded to the cloud for remote execution using an encryption technique for security. This results in reduced computation power usage and battery consumption on smartphones by utilizing cloud resources instead.
This document provides an overview of third generation (3G) mobile communication systems. It discusses the motivation for 3G, including increasing demand for high-speed wireless data and multimedia services. Key aspects of 3G systems covered include the vision of supporting a wide range of new services with data rates up to 2 Mbps, the evolution from 2G systems, spectrum allocation, and potential applications. The document also summarizes wireless data service usage trends and the network architectures of different 3G technologies such as UMTS, CDMA2000, and GPRS.
Mohamed Said is an Egyptian telecommunications engineer seeking a challenging position utilizing his qualifications and ambitions. He has over 9 years of experience in fields including revenue assurance, fraud management, and OSS/BSS. He is proficient in technologies such as GSM, GPRS, SS7, CDMA2000, UMTS, VOIP, and NGN networks. Mohamed has a bachelor's degree in electrical engineering from Alexandria University and is pursuing a master's degree in electronics.
Third generation (3G) mobile networks allow for improved voice quality, higher data speeds, and additional services compared to previous generations. The document discusses the evolution of wireless technologies from 1G to 4G networks and how each generation offers improved performance and capabilities over the prior generation. 3G introduced the ability to access the internet, send multimedia messages, and use location-based services from mobile devices. [/SUMMARY]
IRJET - Dual Verification ATM for Blind PeopleIRJET Journal
This document proposes a dual verification system for ATMs that allows blind people to conduct transactions securely. The system uses both face recognition and speaker identification technologies. It captures a user's face using a Raspberry Pi camera and verifies the user's identity by matching their face to a database. It then prompts the user to speak and matches their voice to the identified face for additional security. If both the face and voice match, the user can conduct transactions by giving voice commands. This dual verification system provides secure access and transactions for visually impaired users of ATMs.
This document discusses 4G wireless networks and some of the key challenges in developing them. It provides background on the evolution of wireless networks from 1G to 3G. The main limitations of 3G that necessitate 4G are difficulty providing high data rates, limited spectrum allocation, and inability to seamlessly roam between different services. Desired features of 4G include high usability, global roaming, multimedia support, personalization, security, and fault tolerance. Main challenges for 4G include developing multimode terminals, wireless system discovery and selection, handling vertical and horizontal handoffs, personalized mobility, improved security, fault tolerance, and dynamic billing systems.
This document describes a MEMS-based car control robot that uses an Android phone. It discusses using MEMS (micro-electromechanical systems) technology to build very small mechanical and electrical devices, including the components of the robot. The robot control system will integrate an Android mobile phone for control, utilizing the phone's processing power, sensors, and communication capabilities. The robot hardware will include MEMS components sized 1-100 micrometers, along with a microcontroller, motor driver, battery, and Bluetooth module for communication between the phone and robot. Software will allow controlling the robot through an Android app, either through button commands or voice commands. The goal is to create a low-cost robotic platform that can be programmed and controlled
Saiful Hidayat Trend Teknologi Digital Dan Dalam Pendidikan Bagimu Guru Kuper...Saiful Hidayat
Materi Sharring Konwlegde Corporate Social Responsibility (CSR) TELKOM - REPUBLIKA, Bagimu Guru Kupersembahkan Tahap III Angkatan 7 yang diadakan di Magelang
1) Scandinavian open access networks have had 5 years of success with over 800,000 active FTTH users in Sweden, more than 50% using city networks.
2) The open access model separates the network infrastructure owner, active network operator, and retail service providers allowing each to focus on their core competencies.
3) Lessons from Scandinavian open access networks include building flexibility into the network design to adapt to changes, educating end-users, and involving municipalities which aids rural development.
Similaire à Application Development Guidelines: Developing fit-for-purpose applications (20)
This document discusses the need for a more ethical web and outlines principles for building ethically, including:
- Prioritizing open standards, accessibility, privacy/security, sustainability and inclusion.
- Avoiding harm through features like filter bubbles, fake news, addictive behaviors and lack of transparency.
- Giving users control over their data and ability to verify information.
- Respecting privacy, freedom of expression, and building with marginalized groups in mind.
You're Doing it Wrong – How App Developers Can Leverage the Web (June 2015 fo...Daniel Appelquist
This is an updated and expanded version of a talk I gave at last year's Forum Oxford. It's aimed at App developers and emphasizes the ways in which they can and should take advantage of the open web for discovery, “sharability” and linkability, as well as encouraging the development of functional web applications where possible.
"The Web - You're Doing it Wrong" for Forum Oxford May 2014Daniel Appelquist
Some mobile web antipatterns to avoid, an update on some exciting new mobile webapo technologies and some latest info on Firefox OS. Presented at Forum Oxford in Oxford UK on 2 May 2014.
The W3C TAG is working on a set of best practices for capability URLs. What's a capability URL? Glad you asked. This presentation (give at "London Web Standards" on 20 Jan 2014) attempts to explain what a capability URL is and why Web developers should take care when using them. (NB: the first few slides are just speaker introduction.)
This document summarizes recent developments in web standards. Key points include: the rise of mobile and JavaScript, new real-time communication technologies like WebRTC, debates around DRM extensions, advances in offline capabilities and push notifications, evolving system application APIs, and work on payments, HTTP 2.0, and securing the web. It also discusses upcoming elections for the W3C Technical Architecture Group and encourages getting involved in W3C working groups.
Rise of Mobile and Web Runtimes - for Standards-NextDaniel Appelquist
Presentation slides for Standards.next event (http://standards-next.org) on June 12, 2010. These slides cover a number of topics related to Web standards on mobile, including widgets, device APIs, HTML5, and geolocation.
SXSW 2010 Future15 : Rise of Mobile, APIs and Web RuntimesDaniel Appelquist
The document discusses the rise of mobile web usage and how web technologies are evolving to better support mobile devices. It notes that 28.6% of mobile subscribers now use mobile browsers and HTML5 is growing in popularity over native apps. However, current mobile web experiences have limitations like lack of access to device features and poor usability. The document outlines emerging standards like W3C widgets that aim to address these issues by allowing web apps to be installed and run like native apps while accessing device APIs. It also discusses privacy concerns around using new features like location data and APIs being developed for additional device integration like contacts and calendar.
Emerging Widgets Ecosystem - for Vodacom Widget Developer CampDaniel Appelquist
This document discusses the emerging ecosystem of widgets for mobile devices. It describes how widgets extend the mobile web by allowing web applications to be packaged and run on devices. The document outlines standards being developed by the W3C for widget packaging, configuration, signing, and APIs. It provides examples of early widgets like Twiggy and discusses how widgets will enable new social and location-based mobile applications. Standards are needed to ensure cross-platform compatibility and security as the widget ecosystem develops.
Yahoo Blueprint for Mobile Widget Aamp Austin (Markus Spiering)Daniel Appelquist
Yahoo! introduced its Blueprint platform for developing mobile widgets that can run across different phone operating systems and models. The platform provides a common language and development process to create widgets that are portable. During the MobileWidgetsCamp, Yahoo! demonstrated how Blueprint allows widgets to be developed in a way that accounts for variations in phones' capabilities like memory, screen resolution, and operating system, addressing a need not met by existing platforms. Developers received a tutorial on using the Blueprint language.
Within 5 years, the majority of web usage will be on mobile devices as mobile application developers increasingly choose the web as a platform. As "Mobile 2.0" evolves, technologies like SMS, MMS, operator portals, and Java games will transform into services like instant messaging, media sharing, content search/discovery, location-aware apps, and mobile stored value accounts. This mobile Ajax future will drive connected content consumption on the go.
Daniel Appelquist discussed how mobile technologies can learn from the successes of Web 2.0 by harnessing collective intelligence through user participation, continuous improvement based on user feedback, and providing rich experiences through open platforms and APIs. Key Web 2.0 technologies that could be applied to mobile include Ajax and REST APIs, semantic markup, syndication of data through RSS/Atom feeds, microformats, folksonomies like tags, mashups of content from different sources, and blogging tools.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
2. 1 million GSM subscribers
over 100 million GSM subscribers 1 billion GSM subscribers
1979 1981 1991 1994 1995 1999 2000 2002 2003 2007 2008
Google
Market,
AppStore OVI, ...
Apps and gadgets
Device vendors
Blackberry
smartphone iPhone
i-mode
WAP
Network operators
Communication
First GSM call 1st video call GPRS EDGE
NTT NMT data/fax bearer service MMS
1G networks GSM 3G
2 2
3. Why a developer guidelines document? What is it not?!
Developer Guidelines (Dev Guide) is meant to
Encourage best practices in developing native mobile applications
Identify key principles in designing applications using limited resources
Highlight peculiarities of each target terminal platform
Create in-depth awareness amongst novice developers for mobile terminals
Dev Guide does not teach software development
3
4. Network friendly user experience
It is the end-to-end user experience
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
4
5. User Experience
Latency Asynchrony Non-modal user interface Connection loss
and error handling
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
5
6. User experience
Users expect to see results immediately
Different factors contribute to latency as a user experience
Manage impact of latency by using:
Local data or cache instead of the network
Efficient network connectivity
Use the network when necessary
Select efficient data formats
Optimise user interface in the context!
Latency Asynchrony Non-modal user interface Connection loss
and error handling
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
6
7. User experience
Mobile networks are relatively slow
Synchronous requests News feed Image 1
Image 1 Image 2 Image 3
Asynchronous requests News feed
e s eed
(ideal) Image 1
Image 2
Image 3
Asynchronous requests e s eed
News feed
(real mobile network) Image 1
Image 2
Image 3 (no response) X
Latency Asynchrony Non-modal user interface Connection loss
and error handling
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
7
8. User experience
User interface should not be blocking
Network activities should be visible to the end user
Latency Asynchrony Non-modal user interface Connection loss
and error handling
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
8
9. User experience
Mobile networks are not always reliable
Response to a request can be delayed or undelivered
Connection error should be handled based on use case scenarios:
User initiated or non-user initiated requests
Primary or secondary requests
Resume and retry strategy
Error notifications
Latency Asynchrony Non-modal user interface Connection loss
and error handling
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
9
10. Optimising requests to the network
Local cache Media transcoding Application scaling
reduce number of requests → signalling reducing traffic → latency reducing load on network
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
10
11. Network efficiency
Fast Dormancy Compression HTTP Cache Data formats
awareness of network specifics reducing traffic → latency reducing traffic → latency reducing traffic → latency
Security
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
11
12. Network efficiency
Awareness of how networks work to save battery and reduce signalling
Data transfer
Data transfer
Power
Power
Time Time
Fast Dormancy Compression HTTP Cache Data formats
awareness of network specifics reducing traffic → latency reducing traffic → latency reducing traffic → latency
Security
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
12
13. Network efficiency
HTTP supports compression at a protocol level 80% less
Most web servers use HTTP compression volume
Suitable for text data
On average saves about 80% of traffic
Reduced amount of data results in reduced latency
Fast Dormancy Compression HTTP Cache Data formats
awareness of network specifics reducing traffic → latency reducing traffic → latency reducing traffic → latency
Security
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
13
14. Network efficiency
HTTP protocol can reduce risk of showing out-of-date cached data
By verifying client’s and server’s versions of content
Using HTTP cache and conditional requests has beneficial impact on:
Always up-to-date information
Content is delivered if there is new data
otherwise old version of the local cache is used
Reduced traffic improves user experience (latency)
Fast Dormancy Compression HTTP Cache Data formats
awareness of network specifics reducing traffic → latency reducing traffic → latency reducing traffic → latency
Security
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
14
15. Network efficiency
Efficiency of data format is defined by ratio of the actual data to transmitted data
Ideally, should be 100%, but there is always overhead
Compression reduces format differences for text information (JSON vs XML)
Difference between Web Service and parsing full Web Page will still be significant
For example HTML vs JSON/XML
Media transcoding (using appropriate media quality/bit-rate) is critical
Media files can not be further compressed beyond standard formats
Fast Dormancy Compression HTTP Cache Data formats
awareness of network specifics reducing traffic → latency reducing traffic → latency reducing traffic → latency
Security
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
15
16. Network efficiency
Mobile devices can be connected to public Wi-Fi hotspots at any time
Applications should take care of user’s data security
As a minimum, standard techniques should be used when necessary:
User Authentication
Authentication of servers
Secure data exchange (SSL)
Secure data storage
Fast Dormancy Compression HTTP Cache Data formats
awareness of network specifics reducing traffic → latency reducing traffic → latency reducing traffic → latency
Security
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
16
17. Detailed recommendations: A brief summary
Platform constraints
Highlight visible gaps in the platforms
Solutions to produce network-friendly applications
Best practices of using APIs
Third-party frameworks and platforms
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
17
18. iOS impressions
Apple defines the level of quality for user interface and user experience
It supports developers to produce network efficient applications (WWDC)
APIs are close to ideal:
Asynchronous design by default
Secure storage for credentials
Compression is supported by default
Background mode is optimised to improve performance/battery/network efficiency
Gaps:
Default local cache does not support on-disk storage
HTTP cache is limited – does not support conditional requests automatically
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
18
19. Android impressions
It is mostly up to the developers to deliver good user experience
Gaps:
Push notifications came very late (2.2); developers had to poll data instead
Fragmentation is an issue: Google Dashboard indicates 36% of devices < 2.2
Caching is not supported by default
HTTP Compression is not enabled by default
Unrestricted background mode
May lead to inefficient use of on-device resources
Significant effort for developers to create optimal applications
No strong guidelines from Google on how to build network friendly apps
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
19
20. Windows Phone impressions
Asynchronous design by default
Silverlight UI has its own asynchronous download manager
Push Notification Framework
Supported by default
Priority notification is supported
It improves aggregation and application scaling
Gaps:
Caching is not supported by default
Does not support background services at all
Compression is not supported by default
No structured local storage (database) makes it difficult to handle local data
Resuming of applications (tombstoning) usually causes additional traffic on
resuming applications
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
20
21. Next steps
The draft document is under discussion in GSMA
The draft version has already been reviewed by a number of companies
There is a strong backing in the GSMA for this initiative
Deutsche Telekom leads the activity in GSMA
Different companies (both MNOs and Vendors) will contribute actively
We are seeking active contribution from the developers community
To make the document more relevant and complete in content
Please email me your contributions for consideration
All views would be considered with an open mind
Kamran.kordi@telekom.com
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
21
22. Thank you
for not sleeping!
Kamran Kordi
kamran.kordi@telekom.com
Deutsche Telekom AG, Group Technology – PD1 Smartphone Challenge
22