110 resultados para Mobile Security, Mobile App Security, App Stores, Android Security, iOS Security


Relevância:

50.00% 50.00%

Publicador:

Resumo:

QDius2 és una aplicació pensada per a persones amb discapacitat visual. Consisteix en realitzar una descripció verbalitzada de l’estat d’un electrodomèstic utilitzant un dispositiu mòbil amb sistema operatiu Android. L’aplicació guiarà verbalment l’usuari perquè pugui enfocar el panell de control de l’electrodomèstic amb la càmera. Es processarà la imatge obtinguda per extreure la seva informació, ja sigui en el mateix mòbil o al núvol, segons les preferències de l’usuari, i es llegirà la informació resultant. Aquest projecte està dividit en vuit memòries, una per a cada integrant del grup.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Aquesta aplicació per a Android permet la reproducció de música sincronitzada al núvol utilitzant un servei d'emmagatzematge, en aquest cas Dropbox.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Aplicació de seguiment d'entrenaments desenvolupada en HTML5 i LungoJS, i intregrada a Android mitjançant PhoneGap.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Creació d'una aplicació Android per a la divulgació d'actes online.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

Este trabajo ha tenido como objetivo la realización de una aplicación para móviles desarrollada en HTML5 llamada ¿Audioguía Turística de El Real Monasterio de San Lorenzo de El Escorial¿.Se han utilizado tecnologías como HTML5, javascript, jQuery Mobile (framework de javascritp), CSS, ThemRoller, y Phonegap (ahora apache Cordoba). También se ha usado Eclipse como IDE para el desarrollo con el pluging de Aptana.Se ha logrado una aplicación instalable en cualquier dispositivo móvil (Smartphone) o Tablet de cualquier tamaño, obteniéndose una app multidispositivo de tipo híbrida que puede usar y disponer de los recursos que posee el teléfono móvil como hacer llamadas, geolocalización, etc. Aparte de todo ello, para alcanzar una app multiplataforma se ha usado Phonegap Build, proporcionándonos con la compilación en la nube varios archivos instalables en distintas plataformas como Android, Windows-Phone, etc. Por tanto, se ha obtenido el desarrollo de una aplicación con HTML5 multidispositivo y multiplataforma.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

App Android para móviles, centraliza todas las competiciones deportivas, como carreras de running, medias maratones, maratones, Cross, duatlones, triatlones, carreras de Bicis,¿ permite a los deportistas estar informados en todo momento de las competiciones(o eventos) disponibles, mostrar información sobre ellas, incluso dar acceso a su web.

Relevância:

50.00% 50.00%

Publicador:

Resumo:

El present projecte consisteix en desenvolupar una aplicació per a dispositius Android que s'utilitzarà per monitoritzar remotament la informació en temps real i històrica dels nodes d'una llista de xarxes.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This paper analyzes the role of traders' priors (proper versus improper) on the implications of market transparency by comparing a pre-trade transparent market with an opaque market in a set-up based on Madhavan (1996). We show that prices may be more informative in the opaque market, regardless of how priors are modelled. In contrast, the comparison of market liquidity and volatility in the two market structures are affected by prior specification. Key words: Market microstructure, Transparency, Prior information

Relevância:

40.00% 40.00%

Publicador:

Resumo:

As a consequence of the terrorist attacks of 9/11 and the US-led war against Iraq, WMD and their proliferation have become a central element of the EU security agenda. In December 2003, the European Council adopted even a EU Strategy against Proliferation of WMD. The approach adopted in this Strategy can be largely described as a ‘cooperative security provider’ approach and is based on effective multilateralism, the promotion of a stable international and regional environment and the cooperation with key partners. The principal objective of this paper is to examine in how far the EU has actually implemented the ‘cooperative security provider’ approach in the area which the Non-proliferation Strategy identifies as one of its priorities – the Mediterranean. Focusing on the concept of security interdependence, the paper analyses first the various WMD dangers with which the EU is confronted in the Mediterranean area. Afterwards, it examines how the EU has responded to these hazards in the framework of the Barcelona process and, in particular, the new European Neighbourhood Policy. It is argued that despite its relatively powerful rhetoric, the EU has largely failed, for a wide range of reasons, to apply effectively its non-proliferation approach in the Mediterranean area and, thus, to become a successful security provider.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

The European Neighbourhood Policy’s birth has taken place in parallel with the renewed momentum of the European Security and Defence Policy, which has launched 14 operations since 2003. Both policies’ instruments have converged in the neighbouring area covered by ENP: Georgia, in the East and the Palestinian Territories in the South. In both cases, the Security Sector Reform strategies have been the main focus for ESDP and an important objective for ENP. In this paper, two objectives are pursued: first, to assess the EU’s involvement in both cases in SSR terms; and second, to analyse whether the convergence of ESDP operations with a broader EU neighbourhood policy implies that the former has become an instrument for the a EU external action.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Este proyecto nace de la necesidad de dar más seguridad a nuestros datos cuando navegamos por Internet. Se ha implementado un plug-in para el navegador Firefox de Mozilla, que detecta un formulario de login/password conocido y rellena el campo de la contraseña automáticamente. La contraseña estará en nuestro dispositivo móvil y la comunicación entre el navegador y el dispositivo se hará mediante la tecnología Bluetooth.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

In this paper, we study how access pricing affects network competition when subscription demand is elastic and each network uses non-linear prices and can apply termination-based price discrimination. In the case of a fixed per minute termination charge, we find that a reduction of the termination charge below cost has two opposing effects: it softens competition but helps to internalize network externalities. The former reduces mobile penetration while the latter boosts it. We find that firms always prefer termination charge below cost for either motive while the regulator prefers termination below cost only when this boosts penetration. Next, we consider the retail benchmarking approach (Jeon and Hurkens, 2008) that determines termination charges as a function of retail prices and show that this approach allows the regulator to increase penetration without distorting call volumes.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

We re-examine the literature on mobile termination in the presence of network externalities. Externalities arise when firms discriminate between on- and off-net calls or when subscription demand is elastic. This literature predicts that profit decreases and consumer surplus increases in termination charge in a neighborhood of termination cost. This creates a puzzle since in reality we see regulators worldwide pushing termination rates down while being opposed by network operators. We show that this puzzle is resolved when consumers' expectations are assumed passive but required to be fulfilled in equilibrium (as defined by Katz and Shapiro, AER 1985), instead of being rationally responsive to non-equilibrium prices, as assumed until now.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

This article addresses the normative dilemma located within the application of `securitization,’ as a method of understanding the social construction of threats and security policies. Securitization as a theoretical and practical undertaking is being increasingly used by scholars and practitioners. This scholarly endeavour wishes to provide those wishing to engage with securitization with an alternative application of this theory; one which is sensitive to and self-reflective of the possible normative consequences of its employment. This article argues that discussing and analyzing securitization processes have normative implications, which is understood here to be the negative securitization of a referent. The negative securitization of a referent is asserted to be carried out through the unchallenged analysis of securitization processes which have emerged through relations of exclusion and power. It then offers a critical understanding and application of securitization studies as a way of overcoming the identified normative dilemma. First, it examines how the Copenhagen School’s formation of securitization theory gives rise to a normative dilemma, which is situated in the performative and symbolic power of security as a political invocation and theoretical concept. Second, it evaluates previous attempts to overcome the normative dilemma of securitization studies, outlining the obstacles that each individual proposal faces. Third, this article argues that the normative dilemma of applying securitization can be avoided by firstly, deconstructing the institutional power of security actors and dominant security subjectivities and secondly, by addressing countering or alternative approaches to security and incorporating different security subjectivities. Examples of the securitization of international terrorism and immigration are prominent throughout.