Usage Documentation.  Room Scheduling  Retrieve Room Schedules  Schedule Ad-Hoc Meetings  E-Lock Access  Use your phone to unlock a room  Request.

Slides:



Advertisements
Similar presentations
Login Page Using this page students can login in DAMS SISOnline. Enter your User Name(Roll No.) and Password to login into it.
Advertisements

Overview Network security involves protecting a host (or a group of hosts) connected to a network Many of the same problems as with stand-alone computer.
Creating and Entering Additional Pay 1 To enter an Additional Pay Request, you need to be prepared with University specific Payroll codes, compensation.
Getting Started. Intro Must Haves and Best Practices Demo Q&A Agenda.
6218 Mobile Devices- Are They Secure Enough for our Patient's Data? Presented By Aaron Hendriks, CISSP Other: Employee of University Health Network, Toronto,
Medical University of South Carolina Office of the CIO – Information Services Endpoint Security Team Mobile Device Management March 8, 2012.
Help Desk Training Public Relations Help Tickets.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. BPIA – User OATH Token.
Mobile Marketing… 1 What Is SMS? 2 Short Services Messaging Need To Know More?... Google reports that 90% of internet connections.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
School Management Software
SMART Agency Tipsheet Staff List This document focuses on setting up and maintaining program staff. Total Pages: 14 Staff Profile Staff Address Staff Assignment.
System Architecture.  Windows Phone 7  Mobile Phone Application  User – End Perspective  Google App Engine  Administration Console  Handles authentication,
DHCH IT Orientation Introduction to DHCH Computer and Information Systems.
HOW-TO guide This tutorial has sound.
Joe Frischman – Network Administrator Larry Workman – Technology Technician
Mobile to Mobile Data Transfer  ESO’s Mobile-to-Mobile Transfer feature is designed to move data from one mobile computer to another so that receiving.
Microsoft Exchange POC Evaluation Results and Recommendations.
St. Agnes School Technology for Teachers Acceptable Protocol.
National Workshop on ANSN Capacity Building IT modules OAP, Thailand 25 th – 27 th June 2013 KUNJEER Sameer B Exercise on “How to register to centralized.
Kerberos Named after a mythological three-headed dog that guards the underworld of Hades, Kerberos is a network authentication protocol that was designed.
Pinnacle training sep2008 Step 1: Select Department Portal Pinnacle On-line training.
OPEN ACCESS IN INTER-STATE TRANSMISSION (e-Bidding)
Welcome Utree Phone Manual. Intro Thankyou for purchasing our Utree mobile This user-guide has been specially designed to help you get to know the functions.
2014 Defense Health Information Technology Symposium – Meeting Mobile App 1. Download the DHA Events App to your device. This can be found in the AppStore.
SMS Experiment Work as a Group Do not modify the password Send sms to your group mates and yourself 1.Type the phone numbers in the box 2.Use csv or xls.
TO CALCULATE MEAN AND MEDIAN MARIA FATIMA BS-CS-1.
Your Guide. Table of Contents Welcome to MyChart…………………………….…..3 How to Sign Up………………………………… MyChart Homepage (navigating through MyChart)……...
JMN Resident Download The Application Download The Application Download the application from Google Play Store for Android phones and Apple Store for.
How Your Customers Will Pay Online & by Phone
SAP Account Administration Account Administration.
A user guide to accessing, reviewing and contributing to the Online Registry System.
Applicant sends request for username and password to; Applicant sends request for username and password.
This is an introduction to Soft Assess – an assessment software solution for FET colleges, and schools.
Cosc 4735 Primer: Marshmallow Changes and new APIs in android 6.0 (api 23)
Lindsey Velez, Director of Instructional Technology Single Sign-On One Click.
MICROSOFT OFFICE 365 DEPLOYMENT TOM MARCAIS WASHINGTON AND LEE UNIVERSITY.
Office 2016 and Windows 10: Essential Concepts and Skills
IT Department Introduction
Welcome to KTH and KTH IT-Support
Using dial-in conferencing
 Gmail is a free webmail service, developed by Google.  Gmail also supports advertising.  Users can access Gmail on the desktop, laptop or through.
Tracking System (Android)
INTERCEPTION APPLICATION
Creating and Using Your FSA ID: An Overview
Using Jabber in Global Offices
Two-factor authentication
SMS MARKETING.
What this activity will show you
A research project data capture tool
Tks.studentfolder.co.uk At its core, StudentFolder® is a student planner and organiser. Students and parents have instant access via the web or mobile.
Intro to UB Information Technology (UBIT)
Union County Auditor’s Office Budgetary Staff
P1: Smart Phone Interaction Workaround
How to register and use ODMAP for Fire/EMS and other partners
Multifactor Authentication & First Time Login
Before Creating Additional Pay or Transforming Pre-work
First, use our API Builder at www. apilinkbuilder
Using dial-in conferencing
BPIA – User OATH Token Activation Instructions
Students will be required to register with DUO according to the following schedule: Students with last names beginning with A - F: 9am on 10/24/2018 G.
Networked Door Locking System
EBCAP Managers Payroll Training
OnCourse Connect is simple to use and can be accessed from any online computer, smartphone or tablet device. This secure website will allow you real-time.
AzMERIT Training.
Creating new GobiAlerts
Multi-Factor Authentication
HR Portal: What’s New? What’s Next?
2019 Created By Angela Eaton
Download the My Learning App
Presentation transcript:

Usage Documentation

 Room Scheduling  Retrieve Room Schedules  Schedule Ad-Hoc Meetings  E-Lock Access  Use your phone to unlock a room  Request access to rooms

 A student walks up to a room door that is locked.  A QR Code is seen on the door of the room  The mobile phone application is able to interact with the lock by using the QR Code

 The phone is first registered to the system and associated with the user.  User enters a personal password associated when using that device

 The student first needs to request access to the room.  Once the request is made the administrator grants access to the user.

 The phone camera is used to take a picture of the QR Code containing an encrypted message  Scheduling service asks if you want to schedule an ad-hoc meeting in the room

 Once approved the phone receives a reply containing a passcode that is associated with the room, along with a randomly generated number.

 This opens up a time ticket on the room resources that allows the user to access the resources of that room, such as a desktop computer using a combination of the passcode and personal identifier.

 User is now scheduled into the room  Other Room schedules are also accessible using the scheduling feature.

 Faculty Directory  Departmental Calendars