Problem:
An Phone Sliencing App that will silence your smartphone will
automatically detect your current location and render your device
in silent mode when you are in an office, meeting or a conference,
etc.
1. A proposed solution to the issue
2. Application requirements
3. Patent(s) related to this app
4. 3 Solutions for open source software or API that will be used
for this app
5. A subsystem designed for this application
First of all I am assuming that you are developing an
application for android. I found another application ("Mute By
Location") in play store which seems to be similar with your
idea.
If you are planning to use map apis, you can either use google map
api (which is not exactly free). You can get more information
here:
https://developers.google.com/maps/documentation/android-sdk/start
There are some alternatives for google maps. You can find that
here:
https://stackoverflow.com/questions/10230502/alternativeto-google-maps-open-source-map-api-that-provides-a-database-of-node
Your idea seems to be similar with geofencing, So checkout this
link:
https://developer.android.com/training/location/geofencing
My solution would be to use the above gefence api and use
AUdioManger as the solution:
Link to Audio Manager:
https://www.tutorialspoint.com/android/android_audiomanager.htm
Hope this was useful
Problem: An Phone Sliencing App that will silence your smartphone will automatically detect your current location...
Case Study 1: Apple Merging Technology, Business, and Entertainment Why are data, information, business intelligence, and knowledge important to Apple? Give an example of each type in relation to the iPad. (1 Mark) Explain how Apple achieved business success through the use of information, information technology, and people. (1 Mark) Evaluate how Apple can gain business intelligence through the implementation of a customer relationship management system. (1 Mark) Case Study 1: Apple Merging Technology, Business, and Entertainment This might sound...
Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...
First, read the article on "The Delphi Method for Graduate Research." ------ Article is posted below Include each of the following in your answer (if applicable – explain in a paragraph) Research problem: what do you want to solve using Delphi? Sample: who will participate and why? (answer in 5 -10 sentences) Round one questionnaire: include 5 hypothetical questions you would like to ask Discuss: what are possible outcomes of the findings from your study? Hint: this is the conclusion....