Time filter

Source Type

Herndon, VA, United States

Network Solutions, LLC is an American technology company founded in 1979. The domain name registration business has become the most important division of the company. As of January 2009, Network Solutions managed more than 6.6 million domain names. Wikipedia.

Agency: NSF | Branch: Standard Grant | Program: | Phase: SMALL BUSINESS PHASE I | Award Amount: 225.00K | Year: 2016

This SBIR Phase I project will develop a cloud-based E-Learning platform providing hands-on labs and personalized learning support for science, technology, engineering, and math (STEM) education. Hands-on labs have become an indispensable part of curriculum components for STEM education. There is a high demand for students to practice real-world problems through hands-on labs; moreover, hands-on labs should provide adaptive and personalized learning capability for students to adjust their learning paths and contents to achieve desired study outcomes more effectively. However, the main issues of providing hands-on labs are in two-fold: (1) high lab management overhead for instructors; and (2) lack of user-behavior learning models that can be used for personalized learning in an experimental setup. In this SBIR Phase I project, we will develop a platform providing a cloud-based virtual laboratory solution that minimizes the lab management overhead, and tracks users hands-on learning behavior to provide personalized learning support in order to improve students learning outcomes. The presented solution will have great impacts for a broader population from K-12 to higher education.

The novelty of the proposed research lies in the technology innovations by conducting research in the following areas: (1) a Software Defined Networking (SDN)-based approach to support Private Network and Network Security as a Service (PNaaS and NSaaS) model for cloud resource provisioning in a highly dynamic virtualized learning environment; (2) a pure web-based service model to guide students lab experiments based on cybersecurity knowledge bases and concept maps; (3) learning behavior tracking and modeling to collect and represent students diverse learning activities for cybersecurity learning based on ICAP (Interactive, Constructive, Active and Passive) features which describe student?s cognitive engagement to discern different levels of engagement as overt behaviors; and (4) build-in self-assessment services to measure users learning outcomes. The research goal of this SBIR I project will address the challenges on how to create a scalable E-Learning environment to provide resources (computing, storage, networking, education contents, and personalized learning guidance) to a large number of learners and educators who have different system resources and learning setup requirements.

Network Solutions | Date: 2015-03-22

A method and a system for automatically collecting inspection records are provided. The method includes connecting to a chip installed on at least one location by wire through a mobile device to provide a power to the chip. The method also includes changing a variable value recorded in a memory unit of the chip when the chip receives the power, encapsulating the variable value, a serial number of the chip, and inspection relevant information corresponding to the at least one location into a token, and transmitting the token to the mobile device. The method further includes transmitting a signal including the serial number, the variable value, and the inspection relevant information to a management terminal according to the token when the mobile device receives the token and recording an inspection record corresponding to the at least one location according to the signal by the management terminal.

Network Solutions | Date: 2014-03-24

A method for purchasing a domain name registration. A user conducts a search to determine if a domain name is available. If it is already registered, the user can make an anonymous offer through a third party to the present registrant to purchase the domain name registration. The offer is certified by the third party by verifying that a financial instrument provided by the user has available funds that are at least sufficient to pay the offer amount for the domain name.

Network Solutions | Date: 2015-03-23

When a one or more identifiers and a plurality of data request types is received, a first data request from the one or more identifiers and from a first data request type can be generated and performed. When at least one first result from the first data request can be received, a second data request from the one or more identifiers and from a second data request type can be generated and performed at any time after receiving the one or more identifiers and the plurality of data request types, and then the at least one second result from the second data request can be retrieved either one of a before, during, and after the at least one first result from the first data request is presented. The correspondence between identifiers and request types may be one-to-one, one-to-many, many-to-one, or many-to-many relationship. A response type may employ a plurality of response methods to access multiple network resources corresponding to any generated and/or selected identifiers and/or request types.

When a request having a keyword is received, a domain name having the keyword can be generated and a network resource corresponding to the domain name can be requested wherein the network resource is adapted to extract the keyword from the domain name. In turn, when a request having a first domain name is received, a second domain name having the first domain name can be generated and a network resource corresponding to the second domain name can be requested wherein the network resource is adapted to extract the first domain name from the second domain name.

Discover hidden collaborations