The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Mobile devices have become the most loved and hated devices that employees cannot work and live without. For their primary usage as communication vehicles, mobile devices have surpassed any other mediums. But mobile devices come with a high price — interruptions anywhere, anytime. Due to untimely interruptions, employees experience negative emotions, leading to a loss of productivity. With the emergence...
For notification distribution, we have designed and implemented a mobile device management system called Meta XA. Meta XA is based on an event-driven architecture combined with the complex event processing technology. In this paper, we propose an approach to bringing Meta XA into the cloud computing domain, without having to change its architecture.
Initially, MetaXA (Metadata-processing XMPP-based Architecture) was targeted towards notification distribution and device theft detection. However, since MetaXA is extensible, it can be adapted to many other usage scenarios in the mobile computing domain. For example, in this paper, we demonstrate how to use MetaXA for mobile application management (MAM), without exhausting the battery power of mobile...
Notification distribution is a great feature to have as: (1) it lets employees receive notifications directly on their mobile devices in near real-time; and (2) it reduces the effort required by IT administrators to manage a diverse fleet of mobile devices and platforms. However, it should take into account the fact that the battery lives of mobile devices have been decreasing a lot over the last...
While mobile devices (such as smartphones, tablets and laptops) allow for more flexible and convenient business operations, they are susceptible of thefts. Surprisingly, mobile devices commonly go stolen at offices. When a mobile device is in the theft's hands, it can compromise the data on the device itself or even the data on corporate servers and networks, which can be accessed using that device...
Complex event processing (CEP) has been an area of intensive research in recent years. Similarly, mobile devices such as smartphones, tablets and laptops are widespread nowadays. Consequently, the integration of CEP into mobile computing is a natural idea. In this paper, we present MetaXA, an event-driven architecture (EDA) with CEP specifically designed for mobile devices, along with its application...
This paper is about the current state of security in cloud computing. It shows some of the key benefits and the major drawbacks that come around with swapping out services and infrastructure to a public cloud. Based on these benefits and drawbacks, K.O. (knock-out) criteria will be identified, which can be seen as the minimum basis for secure cloud environment. Then a final conclusion about security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.