6,933 research outputs found

    Uniform: The Form Validation Language

    Get PDF
    Digital forms are becoming increasingly more prevalent but the ease of creation is not. Web Forms are difficult to produce and validate. This design project seeks to simplify this process. This project is comprised of two parts: a logical programming language (Uniform) and a web application. Uniform is a language that allows its users to define logical relationships between web elements and apply simple rules to individual inputs to both validate the form and manipulate its components depending on user input. Uniform provides an extra layer of abstraction to complex coding. The web app implements Uniform to provide business-level programmers with an interface to build and manage forms. Users will create form templates, manage form instances, and cooperatively complete forms through the web app. Uniform’s development is ongoing, it will receive continued support and is available as open-source. The web application is software owned and maintained by HP Inc. which will be developed further before going to market

    Pervasive computing at tableside : a wireless web-based ordering system

    Full text link
    Purpose &ndash; The purpose of this paper is to introduce a wireless web-based ordering system called iMenu in the restaurant industry. Design/methodology/approach &ndash; By using wireless devices such as personal digital assistants and WebPads, this system realizes the paradigm of pervasive computing at tableside. Detailed system requirements, design, implementation and evaluation of iMenu are presented.Findings &ndash; The evaluation of iMenu shows it explicitly increases productivity of restaurant staff. It also has other desirable features such as integration, interoperation and scalability. Compared to traditional restaurant ordering process, by using this system customers get faster and better services, restaurant staff cooperate more efficiently with less working mistakes, and enterprise owners thus receive more business profits. Originality/value &ndash; While many researchers have explored using wireless web-based information systems in different industries, this paper presents a system that employs wireless multi-tiered web-based architecture to build pervasive computing systems. Instead of discussing theoretical issues on pervasive computing, we focus on practical issues of developing a real system, such as choosing of web-based architecture, design of input methods in small screens, and response time in wireless web-based systems.<br /

    Building Robust E-learning Software Systems Using Web Technologies

    Get PDF
    Building a robust e-learning software platform represents a major challenge for both the project manager and the development team. Since functionalities of these software systems improves and grows by the day, several aspects must be taken into consideration – e.g. workflows, use-casesor alternative scenarios – in order to create a well standardized and fully functional integrated learning management system. The paper will focus on a model of implementation for an e-learning software system, analyzing its features, its functional mechanisms as well as exemplifying an implementation algorithm. A list of some of the mostly used web technologies (both server-side and client-side) will be analyzed and a discussion over major security leaks of web applicationswill also be put in discussion.E-learning, E-testing, Web Technology, Software System, Web Platform

    A basic web-based distance education model

    Get PDF
    Thesis (Master)--Izmir Institute of Technology, Computer Engineering, Izmir, 2005Includes bibliographical references (leaves: 147)Text in English; Abstract: Turkish and Englishxv, 201 leavesDuring the recent years, the rapid growth of the Web and multimedia technologies urged a shift of Computer-Based Educational Technology towards the Web. In the leading universities of the developed countries, studies on Web-Based Education have started and in an increasing manner are going strong. In the last few years, the leading universities of Turkey are also greatly interested in Web-Based Education and have started their re-structuring accordingly.The goal of this study is to design a basic model to be utilized by a university aiming to offer web-based distance education. In achieving this; by the use of system approach, a model comprising of three subsystems, namely system analysis, system design and evaluation&control, working in coordination with each other, has been tried to be proposed. There may be only one missing point of this study, that is; since preparing a lesson or program according to this model was not foreseen in this thesis, the effectiveness evaluations suggested in the evaluation&control subsystem could not be realized. It is recommended to realize such an evaluation in a further study to make it possible to reveal the effectiveness of web-based education by preparing a lesson or program according to this model.On the other hand, a survey has been conducted in Turkey in some of the universities either offering web-based education or are interested in studies in this field.The aim of this survey is to analyze from system design point of view the studies carried out in our universities on this matter and to get a picture of the existing situation.The directed questions aiming this were prepared by taking into consideration of the three stages of system design subsystem, i.e. administrative design, educational design, and technological design. It is intended for the result of this survey to shed light to the new-coming institutions in this field. As a matter of fact, each stage of this subsystem is a survey item itself and should be researched one by one in other studies.Furthermore, for individuals interested in distance education and web-based distance education and for people newly involved in this matter, this thesis is intended to be a reference material and to serve this purpose the sections are prepared containing the basic information accordingly. Nevertheless, since most of the information regarding system design are prepared without taking into consideration the disabled people, the relevant information are not complete. In another study, the offering of the web-based education to the disabled people, especially for deaf, hard of hearing or speech impaired, and blind students, has to be investigated.Finally, in this thesis the proposed model for the Web-Based Distance Education, as being a basic and conceptual model, has a flexible structure; i.e., suitable for all the institutions and establishments intending to offer the web-based education.What is important here, is to exploit the potential sources within the institution that will display the required systematic approach

    BUSINESS STRATEGY IN THE WIRED WORLD: COMPETING FOR MARKET LEADERSHIP AND MIND SHARE

    Get PDF
    This paper examines how firms use the Internet and the emerging "global infostructure" to improve key processes and competitive capabilities. It proposes the widespread diffusion of the emerging "infostructure" will dramatically reduce transaction costs, leading to growth in electronic commerce and productivity while reducing the profit opportunities of inefficient firms. In this wired world characterized by low transaction costs and noisy environments, firms will have to re-focus their strategies to achieve market leadership and capture mind share for competitive advantage. To achieve market leadership firms must seek advantage from economies of scale, scope, or externalities. Alternatively they must differentiate themselves through unique merchandise and innovation or develop specialized customer relations. To capture mind share firms must develop integrated cross media marketing programs. These programs will push products through various online or related promotions or develop strong brand identities for products. Thus this paper identifies competitive issues in a wired world and outlines various foci for strategic responses to the above challenges.Information Systems Working Papers Serie

    Analysis of deployment techniques for webbased applications in SMEs

    Get PDF
    The Internet is no longer just a source for accessing information; it has become a valuable medium for social networking and software services. Web-browsers can now access entire software systems available online to provide the user with a range of services. The concept of software as a service(SAAS) was born out of this. The number of development techniques and frameworks for such web-applications has grown rapidly and much research and development has been carried out on advancing the capability of web scripting languages and web browsers. However a key part of the life-cycle of web-applications that has not received adequate attention is deployment. The deployment techniques chosen to deploy a web application can have a serious affect on the cost of maintenance and the quality of service for the end user. A SAAS modelled web application attempts to emulate a desktop software package experience. If a deployment process affects the availability and quality of service of a web-application then the core concept of this model is broken. This dissertation identifies approaches to designing a deployment process and the aspects that influence the quality of a deployment technique. A survey was circulated to a number of Irish small to medium sized enterprises (SME) that develop web-based software. The survey shows an overview of multiple deployment processes used by these SMEs. Using this information, along with a review of the available literature and a detailed case study of a typical SME deploying SAAS based products, the dissertation provides a critical analysis and evaluation of the current deployment techniques being used

    Protection Models for Web Applications

    Get PDF
    Early web applications were a set of static web pages connected to one another. In contrast, modern applications are full-featured programs that are nearly equivalent to desktop applications in functionality. However, web servers and web browsers, which were initially designed for static web pages, have not updated their protection models to deal with the security consequences of these full-featured programs. This mismatch has been the source of several security problems in web applications. This dissertation proposes new protection models for web applications. The design and implementation of prototypes of these protection models in a web server and a web browser are also described. Experiments are used to demonstrate the improvements in security and performance from using these protection models. Finally, this dissertation also describes systematic design methods to support the security of web applications

    Building a Secure Intranet

    Get PDF
    This thesis will explain the vulnerabilities of computers in a networking environment and demonstrate proper procedures for building a secure Intranet. The Internet is built around the concept of open communication. Data is shared around the globe just as easily as it is from one office or cubical to the next. Corporations are skeptical about putting company data on such a public transport mechanism as the Internet, but the tools used on the Internet are exciting and everyone wants to use them. Out of a desire for the best of both worlds, the Intranet was born. An intranet that has no connection to the Internet can safely make a significant amount of company data available to employees, but when hosts are connected to the Internet, things change. Each application on the Internet comes with a threat to a company\u27s data. More office managers would probably install and use an Intranet if they understood them better and trusted them more. The purpose of his paper is to educate the non-technical manager in the subject of Internet applications and security mechanisms so that he or she can make an informed decision about installing an Intranet. There is so much software available for building and securing a Web site that many feel overwhelmed at the prospect of getting started. The goal will be to define the terms and acronyms used in this technology, and to evaluate the services and software available for building a secure Intranet. Securing a Web site requires some knowledge of TCP/IP, routers, firewalls and data encryption. These subjects will be covered at an introductory level with the goal of enabling the reader to understand the issues involved. The work will terminate in a project that builds an Intranet that shares data with a selective audience while securing it from others. The hardware and software configuration will be documented as a sample that can be duplicated in any office environment. The Web site will be built using some HTML coding to demonstrate the complexity of the language and some high-level software that demonstrates the value of these new tools. Two security specialists evaluated the project. They agreed that an Intranet built with the specifications in the project would be functional and secure

    CPA\u27s guide to the Internet

    Get PDF
    https://egrove.olemiss.edu/aicpa_guides/1967/thumbnail.jp
    corecore