Capstone Project Vista Game Logs Sponsor: Jerald Block John Van Drasek Tony Kautz Priya Pitla Desiree Mijares Ryan Hieber.

Slides:



Advertisements
Similar presentations
WEB AND WIRELESS AUTOMATION connecting people and processes InduSoft Web Solution Welcome.
Advertisements

Microsoft ® Official Course First Look Clinic Overview of Windows 8 By Ragowo Riantory, S.Kom, MCP.
OVERVIEW TEAM5 SOFTWARE The TEAM5 software manages personnel and test data for personal ESD grounding devices. Test and personnel data may be viewed/reported.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Interpret Application Specifications
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Chapter 11 ASP.NET JavaScript, Third Edition. 2 Objectives Learn about client/server architecture Study server-side scripting Create ASP.NET applications.
Maintaining and Updating Windows Server 2008
Guide to MCSE , Enhanced 1 Activity 10-1: Restarting Windows Server 2003 Objective: to restart Windows Server 2003 Start  Shut Down  Restart Configure.
Course 6421A Module 7: Installing, Configuring, and Troubleshooting the Network Policy Server Role Service Presentation: 60 minutes Lab: 60 minutes Module.
Client/Server Architectures
Team - CA CSCI 5234 Web Security.  Collect and document information of ecommerce security mechanisms.  Using: wiki engine for collaboration.
Purpose Intended Audience and Presenter Contents Proposed Presentation Length Intended audience is all distributor partners and VARs Content may be customized.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
SmartLog X 3 TEAM Basic SmartLog X 3 TEAM Basic DescoEMIT.com USER STATUS USER EDIT TEST LOG ADMIN TEST MACHINE SCHEDULE INSTALL System Requirements:
Portal and AQAS-Philadelphia University 21-22/6/2011 AVCI Platform in PU Dr. Abdel-Rahman Al-Qawasmi Philadelphia University Director of Computer Center.
INTRODUCTION TO WEB DATABASE PROGRAMMING
IGEL UMS Product Marketing Manager October 2011 Florian Spatz Universal Management Suite.
Introduction to HP LoadRunner Getting Familiar with LoadRunner >>>>>>>>>>>>>>>>>>>>>>
A Scalable Application Architecture for composing News Portals on the Internet Serpil TOK, Zeki BAYRAM. Eastern MediterraneanUniversity Famagusta Famagusta.
FINAL DEMO Apollo Crew, group 3 T SW Development Project.
Crystal Hoyer Program Manager IIS Team Preview of features that will be announced at MIX09 Please do not blog, take pictures or video of session.
Beyond DHTML So far we have seen and used: CGI programs (using Perl ) and SSI on server side Java Script, VB Script, CSS and DOM on client side. For some.
Module 8: Managing Client Configuration and Connectivity.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Obsydian OLE Automation Ranjit Sahota Chief Architect Obsydian Development Ranjit Sahota Chief Architect Obsydian Development.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
CSI-E Computer Security Investigator – Enterprise.
Microsoft ® Official Course Module XA Using Windows PowerShell ®
HTML+JavaScript M2M Applications Viewbiquity Public hybrid cloud platform for automating and visualizing everything.
ASP.NET Web Application and Development Digital Media Department Unit Credit Value : 4 Essential Learning time : 120 hours Digital.
Module 14: Configuring Server Security Compliance
Section 1: Introducing Group Policy What Is Group Policy? Group Policy Scenarios New Group Policy Features Introduced with Windows Server 2008 and Windows.
Module 7: Fundamentals of Administering Windows Server 2008.
Capstone Project Vista Game Logs Sponsor: Jerald Block John Van Drasek Tony Kautz Priya Pitla Desiree Mijares Ryan Hieber.
Tutorial 121 Creating a New Web Forms Page You will find that creating Web Forms is similar to creating traditional Windows applications in Visual Basic.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
1 © 2004, Cisco Systems, Inc. All rights reserved. CISCO CONFIDENTIAL Using Internet Explorer 7.0 to Access Cisco Unity 5.0(1) Web Interfaces Unity 5.0(1)
Immunization Data Exchange (BYIM v 2.0*1) Transporting the Message to the IIS Nathan Bunker & John Parker Updated 08/05/2011.
Enjoy Remote Support WinVNC Introduction A&SIT Ben Wu 11/04/08.
Computer Emergency Notification System (CENS)
Module 6: Configuring User Environments Using Group Policy.
Project Dragon Small Business Website Content Management System.
Module 1: Configuring Windows Server Module Overview Describe Windows Server 2008 roles Describe Windows Server 2008 features Describe Windows Server.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
Troubleshooting Security Issues Lesson 6. Skills Matrix Technology SkillObjective Domain SkillDomain # Monitoring and Troubleshooting with Event Viewer.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Module 8 : Configuration II Jong S. Bok
«Fly Carrier» agent software Optimization of data transmission over IP satellite networks.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Faculty Coach: Professor Martinez  Justin Mahar  Chris Baum  Greg Schmitz  Adam Abdelhamed.
Module 7: Implementing Security Using Group Policy.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Module 10: Windows Firewall and Caching Fundamentals.
Module 9 Planning and Implementing Monitoring and Maintenance.
Performance Testing Test Complete. Performance testing and its sub categories Performance testing is performed, to determine how fast some aspect of a.
Understand Windows Services Software Development Fundamentals LESSON 5.3.
Module 6: Configuring User Environments Using Group Policies.
Module 14: Advanced Topics and Troubleshooting. Microsoft ® Windows ® Small Business Server (SBS) 2008 Management Console (Advanced Mode) Managing Windows.
Integrating and Extending Workflow 8 AA301 Carl Sykes Ed Heaney.
Maintaining and Updating Windows Server 2008 Lesson 8.
EduGeek Logon Tracker Next generation user tracking.
Project Dragon Small Business Website Content Management System.
Monitoring Windows Server 2012
Web Development Web Servers.
Windows Operating Systems (Cont.)
Printer Admin Print Job Manager
ASP.NET 4.0 State Management Improvements – Deep Dive
Week 1 (May 14 – May 21, 2018) Accomplishments: Problem & Solutions
Presentation transcript:

Capstone Project Vista Game Logs Sponsor: Jerald Block John Van Drasek Tony Kautz Priya Pitla Desiree Mijares Ryan Hieber

Overview Dr. Jerald Block The study of compulsive computer use. Vista creates logs of game use. Our program –Collects this log information. –Sends it to the researcher. –Puts the information into a database.

Background Current research data gathered is inaccurate. Currently data is gathered by: –Recall –Self Diary Our software increases data accuracy. It is: – Automatic – Accurate to the second

Game Log Information Information we gather: –Game start and end times –Game ESRB rating –Game Name –System startup and shutdown times –Screen saver start and duration

Vista Game Logging Features –Game Logs – New Windows Parental Control(WPC) features in Vista –Upload Game Logs – Send log file to researcher server –IIS – Web server –ASP.NET – Server side scripting –SSL – Security –Upload.aspx – Server side script –MS Access – Database, UI, Reports

The Architecture of the System Researcher Application Participant Application SSL Access Database Upload.as px SSL IIS ASP.NET Internet Researcher Participant

File Edit View Settings Participant Application Game Logs –WPC crimson channel –WPC event system logs –Events. GameStartEvent()... WPC Crimson Channel WPC Event System Log Event Viewer GameStartEvent(): Game started at 11:00pm

Participant Application Upload Game Logs –Upload file to server without user interaction/confirmation –WebClient object supports HTTPS –UploadFile(uri,”POST”,logFile)

Researcher Application Internet Information Server(IIS) –Allows remote users ability to POST files –Firewall settings configured to allow SSL traffic on port 443 How to get it to work: –Default IIS installation and configuration

Researcher Application ASP.NET : –Allows remote users ability to execute server side scripts Server side file input and output Database operations open, update, etc. How to get it to work: –Register IIS as program to use ASP.NET –Register the aspnet_isapi.dll

Researcher Application SSL –Allows the ability for data to be sent over a secure channel. How to get it to work: –Generate CSR from IIS –Submit CSR to certificate provider to get a.cer file –Configure IIS to use the certificate

Researcher Application upload.aspx script –Archive incoming log file to server file system –Load data from log file into database How to get it to work: –Put script in web folder on server

Researcher Application MS Access –Database –User Interface –Report Generation

Database Create a new study project. Add/remove new families and family member for studies. Schema

schema

Generate reports Subject categories for the statistic: Criteria: age (high/low), sex, start date, end date, period of time, and game hours, Compute Average and variance for the following Variables: 1.Computer Start up time (daily) 2.Computer shut down / hibernation time (daily) 3.First game start up time (daily) 4.Last game shut down time (daily) 5.Total time gaming (daily)* 6.Total game launches (daily)* Cutoff time and metric time

Product Demo Now we are going to Demonstrate the Application

Sponsor Feedback Generally happy with the resulting application and its functionality –While we were unable to add all the hoped features many of the features (easy install) were implemented Could have used him as a source earlier in the process –As we ran into difficulty, consulted him and used his influence to unblock barriers

Development Process Create The Two Core Solutions –Build the sln file for the researcher and participant applications –Create stubs for planned functionality Begin Building Applications –Create Access Database 120 hours –Implement communication 60 hours –Update participant application with features 60 hours –Gather WPC information to populate database 60 hours Estimated hours of effort –120 hours for the database –60 hours for communication –60 hours to complete participant application –60 hours to prepare data for transmission to researcher Actual effort –120 hours for database –90 hours for communication –90 hours to complete participant application –120 hours for data

Future Features Automate the uninstall process of the application –One of the few alternate features time did not allow to be implemented Encode/Encrypt Data on Client Machines –Plain text data may allow undesired functionality that might disrupt the study

Project Load Divided Priya Pitla –Build Database/Schema –Create Reports Desiree Mijares –Build Database/Schema –Create Reports Ryan Hieber –Database propagation script John Van Drasek –Communication –Client Installers Tony Kautz –Researcher Installers –Report Compilation

Lessons Learned The use of a source control –Thought we would not need one –Helped to better organize our information Difficulty of seemingly easy tasks –Enough work-hours or personnel on particular parts Assume information/tools available work without verifying –Verify tools meet our needs early in the development

End Thank You