Kerberos + Android. A Tale of Opportunity. Slide 1 / 39. Copyright 2012 yassl
|
|
- Kimberly O’Neal’
- 8 years ago
- Views:
Transcription
1 Kerberos + Android A Tale of Opportunity Slide 1 / 39
2 Platform Decisions The Statistics Slide 2 / 39
3 Why Go Mobile? 80% of the world's population now has a mobile phone. ( 5 Billion Phones ) Slide 3 / 39
4 Why Go Mobile? 21.6% Of those 80%, 1.08 Billion are smartphones. Slide 4 / 39
5 Why Go Mobile? In the US: 60% 40% the ratio is even higher, with smartphones making up 40% of all mobile phones. Slide 5 / 39
6 OK, well why Android? Slide 6 / 39
7 Android? Reason 1: US Market Dominance iphone 28% U.S. Smartphones (40%) == Android 40% Blackberry 19% Windows Mobile, 7% Windows Phone 7, 1% Other, 5% Slide 7 / 39
8 Android? Reason 2: Consumer Popularity 100 million activated Android devices (now 400,000 / day) 200,000 apps in Android Market (4.5 billion activations to date) 310 devices available to consumers (112 countries) Slide 8 / 39
9 Android? Reason 3: Developer Popularity 450,000 developers building for the platform! Slide 9 / 39
10 Android. Meaning? Opportunity for increased Kerberos visibility Useful for Android and Kerberos developers Fun to see where the community takes it Slide 10 / 39
11 Our Plan What we wanted to do. Slide 11 / 39
12 Goals We wanted to fill a missing gap. 1. Port Kerberos libraries to Android 2. Port some C-based Kerberos client apps to Android kinit klist kvno kdestroy Slide 12 / 39
13 Goals We wanted to spark community involvement. 3. Build a sample Android NDK App (with a simple GUI) 4. Give changes back to community Slide 13 / 39
14 Action! What we did. Slide 14 / 39
15 1. Crypto Implementation Slide 15 / 39
16 Crypto Added new CyaSSL crypto implementation Kerberos crypto options: CyaSSL, OpenSSL, NSS, built-in Slide 16 / 39
17 Crypto Added new CyaSSL crypto implementation CyaSSL is very portable Slide 17 / 39
18 2. Porting Slide 18 / 39
19 Android Port Kerberos Libraries + CyaSSL Android. Cross-compiled libraries for Android Created shell script for easy reproduction by developers Slide 19 / 39
20 3. Android Application Slide 20 / 39
21 Android App Simple sample NDK project Home Screen Single screen Uses JNI Wrapper around native client apps Slide 21 / 39
22 Android App Simple sample NDK project kinit Gets a ticket using specified principal Slide 22 / 39
23 Android App Simple sample NDK project klist Lists our tickets Slide 23 / 39
24 Android App Simple sample NDK project kvno Gets a service ticket for the entered principal Slide 24 / 39
25 Android App Simple sample NDK project klist after kvno Verify that we got a ticket Slide 25 / 39
26 Android App Simple sample NDK project kdestroy Clear our ticket cache Slide 26 / 39
27 Android App Notes Uses a keytab instead of passwords Storage locations have been chosen for convenience Can be easily modified to what the developer needs Currently at /data/local/kerberos Slide 27 / 39
28 Android App License Type Application code will remain under the MIT license Slide 28 / 39
29 4. GSS-API Wrapper Slide 29 / 39
30 GSS-API Java Wrapper Provide Java bindings for developers to use Uses framework Wrapper around native Kerberos GSS-API library (Contains functionality found in gssapi.h) Slide 30 / 39
31 GSS-API Java Wrapper 2 example clients: Android client functionality Stand-alone Java app for desktop use Slide 31 / 39
32 GSS-API Integrated into sample app. Example Client Est. context with example server Send wrapped message, verify returned sig. block (gss_wrap, gss_verify_mic) Repeat #2, but with gss_seal, gss_verify Misc. API tests and exit. Slide 32 / 39
33 GSS-API Integrated into sample app. Example Server Est. context with client Receive and unwrap a message from the client Generate & send signature block for received message Slide 33 / 39
34 The Future What's happening next? Slide 34 / 39
35 The Future Look to the Community. Availability Code will be linked from both MIT and yassl websites Slide 35 / 39
36 The Future Look to the Community. PR Activity / Visibility Blog posts Forum posts Press releases GitHub Mailing lists etc... Slide 36 / 39
37 The Future Other ideas or thoughts? Slide 37 / 39
38 References Statistics percent-are-android/ Google I/O 2011: Project Locations Kerberos: CyaSSL: Android NDK App: GSS-API Java Wrapper: Slide 38 / 39
39 Thanks! Slide 39 / 39
Exchange ActiveSync (EAS)
Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,
More informationHadoop Elephant in Active Directory Forest. Marek Gawiński, Arkadiusz Osiński Allegro Group
Hadoop Elephant in Active Directory Forest Marek Gawiński, Arkadiusz Osiński Allegro Group Agenda Goals and motivations Technology stack Architecture evolution Automation integrating new servers Making
More informationBogDan Vatra and Andy Gryc. Qt on Android: Is it right for you?
BogDan Vatra and Andy Gryc Qt on Android: Is it right for you? Coffee and Code sessions Free, three-hour, hands-on session that delves into the internals of Qt on Android. Learn how to: set up the Qt development
More informationKerberos on z/os. Active Directory On Windows Server 2008. William Mosley z/os NAS Development. December 2011. Interaction with. wmosley@us.ibm.
Kerberos on z/os Interaction with Active Directory On Windows Server 2008 + William Mosley z/os NAS Development wmosley@us.ibm.com December 2011 Agenda Updates to Windows Server 2008 Setting up Cross-Realm
More informationMOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES
THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 14, Special Issue 2013, pp. 373 377 MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES Adrian FLOAREA
More informationB&SC Office 365 Email
B&SC Office 365 Email Microsoft Office 365 In its continuous efforts to provide the highest quality student experience, Bryant & Stratton College is giving students access to a new tool for accessing email.
More informationGuide to SASL, GSSAPI & Kerberos v.6.0
SYMLABS VIRTUAL DIRECTORY SERVER Guide to SASL, GSSAPI & Kerberos v.6.0 Copyright 2011 www.symlabs.com Chapter 1 Introduction Symlabs has added support for the GSSAPI 1 authentication mechanism, which
More informationKerberos and Active Directory symmetric cryptography in practice COSC412
Kerberos and Active Directory symmetric cryptography in practice COSC412 Learning objectives Understand the function of Kerberos Explain how symmetric cryptography supports the operation of Kerberos Summarise
More informationAdministering Jive Mobile Apps
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native
More informationDisclaimer: The contents in this document are only my personal opinions, do not reflect the opinions of my employer or anyone else.
Disclaimer: The contents in this document are only my personal opinions, do not reflect the opinions of my employer or anyone else. Android overview From a system design perspective Xiao-Feng Li xiaofeng.li@gmail.com
More informationThe following process allows you to configure exacqvision permissions and privileges for accounts that exist on an Active Directory server:
Ubuntu Linux Server & Client and Active Directory 1 Configuration The following process allows you to configure exacqvision permissions and privileges for accounts that exist on an Active Directory server:
More informationTheorie Practical part Outlook. Kerberos. Secure and efficient authentication and key distribution. Johannes Lötzsch and Meike Zehlike
Secure and efficient authentication and key distribution October 27, 2009 Table of content Theorie Why to use SingleSignOn TGT ross-realm-authentication Practical part Setup your own -server kadmin (add
More informationLecture 3 Mobile App Development (Android, ios, BlackBerry, Windows Mobile) <lecturer, date>
Lecture 3 Mobile App Development (Android, ios, BlackBerry, Windows Mobile) Outline Smartphones Developing Mobile Applications Android ios BlackBerry Windows Mobile References Cell phones
More informationMobile App Infrastructure for Cross-Platform Deployment (N11-38)
Mobile App Infrastructure for Cross-Platform Deployment (N11-38) Contents Introduction... 2 Background... 2 Goals and objectives... 3 Technical approaches and frameworks... 4 Key outcomes... 5 Project
More informationAPPLE & ANDROID. User Guide BNC ONLINE BANKING
APPLE & ANDROID User Guide BNC ONLINE BANKING Deposit Checks from your Smartphone! ABOUT ROC KIT ANYWHERE With ROC-KIT Anywhere, you don t have to make trips to the bank to deposit checks. For consumer
More informationCSC E Mail. Mobile Device Configuration Settings and Setup Instructions
CSC E Mail Mobile Device Configuration Settings and Setup Instructions Contents Overview... 3 Android (Droid, Google Android, etc.)... 4 Exchange Settings... 4... 4 RIM Blackberry... 5... 5 Apple iphone
More informationMobile Solutions in ArcGIS. Justin Fan
Mobile Solutions in ArcGIS Justin Fan Agenda Introducing Mobile GIS Esri Mobile GIS solutions Selecting the right Mobile GIS solution Resources Q&A Introducing Mobile GIS What is Mobile GIS? Extends the
More informationConfiguring an Email Client to Connect to CASS Mail Servers
Configuring an Email Client to Connect to CASS Mail Servers Table of Contents Introduction... 2 Webmail... 2 Settings... 2 Forwarding... 2 Email Client Configuration... 3 Outlook 2003... 3 Outlook 2007...
More informationWriting standalone Qt & Python applications for Android
Writing standalone Qt & Python applications for Android Martin Kolman Red Hat & Faculty of Informatics, Masaryk University http://www.modrana.org/om2013 martin.kolman@gmail.com 1 Overview Writing Android
More informationSmartWatch Eco/Eco Compact
SmartWatch Eco/Eco Compact Digital Video Recorders SmartWatch Eco SmartWatch Eco Compact Mobile Application Installation & Operation Manual Table of Contents Introduction...3 Installation and Operation
More informationBuilding native mobile apps for Digital Factory
DIGITAL FACTORY 7.0 Building native mobile apps for Digital Factory Rooted in Open Source CMS, Jahia s Digital Industrialization paradigm is about streamlining Enterprise digital projects across channels
More informationEstablishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks
More informationHello. If you have any questions that aren t addressed here, feel free to contact our support staff at mailchimp.com/support.
Hello. In early 2011, smartphones outsold PCs. In the fourth quarter of 2011, more iphones were sold than babies born. It s perhaps unsurprising, then, that email consumption on mobile devices is also
More informationConnecting Web and Kerberos Single Sign On
Connecting Web and Kerberos Single Sign On Rok Papež ARNES aaa-podpora@arnes.si Terena networking conference Malaga, Spain, 10.6.2009 Kerberos Authentication protocol (No) authorization Single Sign On
More informationEstablishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA
More informationBuilding Mobile Applications Creating ios applications with jquery Mobile, PhoneGap, and Drupal 7
Building Mobile Applications Creating ios applications with jquery Mobile, PhoneGap, and Drupal 7 Jeff Linwood 1st Chapter, Early Release Introduction... 3 Prerequisites... 3 Introduction to Mobile Apps...
More informationPractical Essbase Web Services
Practical Essbase Web Services For Fun and Profit Jason Jones Jason Jones l Essbase l Programming l Mobile development l ODI l Blogging l Open source Agenda l Web services in a nutshell l Essbase connectivity
More informationPRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS
www.openi-ict.eu Open-Source, Web-Based, Framework for Integrating Applications with Social Media Services and Personal Cloudlets PRIVACY AWARE ACCESS CONTROL FOR CLOUD-BASED DATA PLATFORMS Open-Source,
More informationIBM Endpoint Manager for Mobile Devices
IBM Endpoint Manager for Mobile Devices A unified platform for managing mobile devices together with your traditional endpoints Highlights Address business and technology issues of security, complexity
More informationDevelop native android apps And port to other platforms
Develop native android apps And port to other platforms Robin Puthli, 24 October 2013 Droidcon UK 1 Me Mobile developer 2001 - present Run a 11 strong development shop Netherlands based 2 Itude Mobile
More informationFollow these steps to setup your Exchange ActiveSync account to your ios device:
For iphone Follow these steps to setup your Exchange ActiveSync account to your ios device: 1. Tap Settings > Mail, Contacts, Calendars > Add Account > Microsoft Exchange. 2. Enter the information in the
More informationRHEL Clients to AD Integrating RHEL clients to Active Directory
RHEL Clients to AD Integrating RHEL clients to Active Directory Presenter Dave Sullivan Sr. TAM, Red Hat 2013-09-03 Agenda Review Dmitri Pal and Simo Sorce Preso Legacy RHEL hook to AD RHEL Direct--->sssd--->AD
More informationGuidelines to setup mobile devices to a UOITnet account Google Apps for Education. Information Technology Services
Guidelines to setup mobile devices to a UOITnet account Google Apps for Education Information Technology Services Contents Support for UOITnet email set up on a Mobile Device... 2 Generate Google Token...
More informationTwo-Factor Authentication (2FA) Registration Instructions Symantec VIP Access
Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access To strengthen KBR information security and safeguard company data, Information Technology will implement two-factor authentication
More informationStudy of SAP ERP Connection System Driven in Smartphone
Study of SAP ERP Connection System Driven in Smartphone 1 Jong Youel Park, 2 Dea-Woo Park 1, First Author Hoseo Graduate School of Venture, park4567@daum.net *2,Corresponding Author Hoseo Graduate School
More informationSSSD and OpenSSH Integration
FreeIPA Training Series SSSD and OpenSSH Integration Jan Cholasta 01-04-2013 Introduction to OpenSSH OpenSSH is an implementation of the SSH protocol Provides both server (sshd) and client (ssh) SSH allows
More informationIIT MOBILEPRINT. Mobileprint Workflow
IIT MOBILEPRINT Mobileprint integrates with existing OTS printing system to enable user to print documents, images and email messages using email client or a web capable devices. This include smartphones,
More informationThis is our best... YOUR best... Online Banking yet!
INTERNATIONAL FINANCE BANK CUSTOMER USER GUIDE MAKING BANKING A BREEZE! This is our best... YOUR best... Online Banking yet! Member FDIC New & Improved Online Banking Experience > IFB is proud to introduce
More informationSSO Case Study: The USPS Gives SSO Its Stamp of Approval. May 10, 2005. Wayne Grimes, Manager, Customer Care Operations, USPS
SSO Case Study: The USPS Gives SSO Its Stamp of Approval Wayne Grimes, Manager, Customer Care Operations, USPS May 10, 2005 Today s topics An overview of the USPS USPS SSO efforts Lessons we learned along
More informationEnter Here -> Directory Submitter Software For One > Visit Here <
How to add a url to trusted sites in ie, google seo directory submission, word web directory free download. Enter Here -> Directory Submitter Software For One > Visit Here < Buy cheap new instant directory
More informationGoogle Apps for Education at UTK
Google Apps for Education at UTK 1. Change your NetID Password Getting Started Visit directory.utk.edu/change to change your password online 1. Login using your current NetID password 2. Create a new password
More informationSmart and Innovative Web Solutions. Just One Click Away
Smart and Innovative Web Solutions Just One Click Away Company Profile Zara Web solutions is a Digital Marketing Service Provider which was started with an intention to offer quality based web based solutions
More informationCommack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices
Commack UFSD Remote Access for Microsoft Windows Vista, 7 and 8 Apple Macs, ipads, iphones And Android devices This allows district staff and students to access the Commack UFSD network from home or anywhere
More informationSingle sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization
Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization Michael Heldebrant Solutions Architect, Red Hat Outline Authentication overview Basic LDAP
More informationDasharatham Bitla (Dash) dash@bitlasoft.com http://mobilog.bitlasoft.com www.bitlasoft.com
Building Mobile (Smartphone) Apps with Ruby & HTML An introduction to Rhodes Dasharatham Bitla (Dash) dash@bitlasoft.com http://mobilog.bitlasoft.com www.bitlasoft.com Smartphones Market Smartphones sales
More informationKERBEROS ROAD MAP SAM HARTMAN MIT KERBEROS CONSORTIUM APRIL 7, 2008
KERBEROS ROAD MAP SAM HARTMAN MIT KERBEROS CONSORTIUM APRIL 7, 2008 1 GOALS OF ROAD MAP Priority discussions so far have focused on meeting short or medium term needs. We also need to establish a road
More informationCentrify Server Suite 2015.1 For MapR 4.1 Hadoop With Multiple Clusters in Active Directory
Centrify Server Suite 2015.1 For MapR 4.1 Hadoop With Multiple Clusters in Active Directory v1.1 2015 CENTRIFY CORPORATION. ALL RIGHTS RESERVED. 1 Contents General Information 3 Centrify Server Suite for
More informationMobile development with Apache OFBiz. Ean Schuessler, co-founder @ Brainfood
Mobile development with Apache OFBiz Ean Schuessler, co-founder @ Brainfood Mobile development For the purposes of this talk mobile development means mobile web development The languages and APIs for native
More informationKerberos and Windows SSO Guide Jahia EE v6.1
Documentation Kerberos and Windows SSO Guide Jahia EE v6.1 Jahia delivers the first Web Content Integration Software by combining Enterprise Web Content Management with Document and Portal Management features.
More informationInsights into the Mobile App. Chris Chandler, Head of Mobile Services, OSG Southeast Asia, Microsoft Corporation
Insights into the Mobile App Marketplace Chris Chandler, Head of Mobile Services, OSG Southeast Asia, Microsoft Corporation The age of the Smartphone Converged Devices Shipped in Q4 2008 Linux 19,365 Symbian
More informationBlackBerry Enterprise Service 10 version 10.2 preinstallation and preupgrade checklist
BlackBerry Enterprise Service version.2 preinstallation and preupgrade checklist Verify that the following requirements are met before you install or upgrade to BlackBerry Enterprise Service version.2.
More informationGUI/Custom GUI, SIP Stack, Telephony, DB, Sockets, Bluetooth, QT.
OVERVIEW FOR SYNERGY ISG: Mobile development ScienceSoft in quick facts 250 full-time IT experts and a network of 100+ developers 200+ successfully completed large outsourcing projects Experience in software
More informationGetting Started with VMware Horizon View (Remote Desktop Access)
Getting Started with VMware Horizon View (Remote Desktop Access) Use The Links Below To Navigate This Document Using VMware Horizon View with Tablet and Smartphone APP or Mobile Web Browser Walk Through
More informationCharles Firth charles@firthconsulting.com. Managing Macs in a Windows World
Charles Firth charles@firthconsulting.com Managing Macs in a Windows World Prerequisites Familiarity with Windows Active Directory networks Interest in Macintosh OSX integration and support Basic understanding
More informationDiskBoss. File & Disk Manager. Version 2.0. Dec 2011. Flexense Ltd. www.flexense.com info@flexense.com. File Integrity Monitor
DiskBoss File & Disk Manager File Integrity Monitor Version 2.0 Dec 2011 www.flexense.com info@flexense.com 1 Product Overview DiskBoss is an automated, rule-based file and disk manager allowing one to
More informationAllJoyn Android Environment Setup Guide
80-BA001-2 Rev. A June 21, 2011 Submit technical questions at: http:///forums The information contained in this document is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License;
More informationMonitoring and control of users in open environments on the Android platform
Monitoring and control of users in open environments on the Android platform DEGREE IN COMMUNICATIONS SYSTEMS ENGINEERING AUTHOR: TUTOR: Eric Bella Pulgarín Raúl Sánchez Reillo DIRECTOR: Aitor Mendaza
More informationKonyOne Server Prerequisites _ MS SQL Server
KonyOne Server Prerequisites _ MS SQL Server KonyOne Platform Release 5.0 Copyright 2012-2013 Kony Solutions, Inc. All Rights Reserved. Page 1 of 13 Copyright 2012-2013 by Kony Solutions, Inc. All rights
More informationUsing OpenSSH in a Single Sign-On Corporate Environment with z/os, Windows and Linux
Using OpenSSH in a Single Sign-On Corporate Environment with z/os, Windows and Linux Dovetailed Technologies February 2016 Edition 2.0.0 For the latest version of this document, see http://dovetail.com/docs/ssh/kerberos_sso.pdf
More informationThe Decaffeinated Robot
Developing on without Java Texas Linux Fest 2 April 2011 Overview for Why? architecture Decaffeinating for Why? architecture Decaffeinating for Why choose? Why? architecture Decaffeinating for Why choose?
More informationHow to access UCSD Restricted Library Journals off campus, including from Rady Children's hospital.
How to access UCSD Restricted Library Journals off campus, including from Rady Children's hospital. Most library e-journals & databases are restricted to use on campus, or use off-campus only by current
More informationA Beginners Guide To Responsive, Mobile & Native Websites 2013 Enhance.ie.All Rights Reserved.
A Beginners Guide To Responsive, Mobile & Native Websites 2013 Enhance.ie.All Rights Reserved. 1 The Mobile Web refers to access to the world wide web, i.e. the use of browser-based Internet services,
More informationConnections Mobile 4.0 Update Open Mic October 23, 2012
Connections Mobile 4.0 Update Open Mic October 23, 2012 Mark Benge BlackBerry app Developer Nathan Baker Mobile Developer Gautam Singh Mobile Developer Rusty Godwin ios app Developer IBM Collaboration
More informationHow To Use The Gss-Api And Sspi For A Security Reason On A Microsoft Microsoft Server (Or A Microsplatte)
Best Practices for Integrating Kerberos into Your Application This paper describes best practices for application developers who wish to add support for the Kerberos Network Authentication System to their
More informationConfigure SLC Email to Smartphone/ Tablet
Configure SLC Email to Smartphone/ Tablet This is a manual that contains pertinent information about configuring your SLC Email to your smartphone/tablet. About Set up your email account on your smartphone/tablet
More informationRockets Email Smartphone Configuration. Spring 2012 Edition
Rockets Email Smartphone Configuration Spring 2012 Edition 2/20/2012 Contents Android Rockets Email Configuration... 2 Apple iphone/ipod Touch/iPad Rockets Email Configuration... 3 Blackberry (BBOS 5 or
More informationMobile Device Support Model
[Type here] Mobile Device Support Model This document defines the level of support the university offers for mobile devices. Mobile devices are defined as portable handheld devices such as smartphones
More informationA "Day in the Life" Exceptional Work Experience Joe Baxter IBM Collaboration Solutions. Twitter: joebaxter
A "Day in the Life" Exceptional Work Experience Joe Baxter IBM Collaboration Solutions Twitter: joebaxter Collaboration at IBM & Future of Work - 2015 380K? Employees 80K Contractors 170 Countries 2K Locations
More informationBooth Gmail Configuration
Student email is accessed via a Booth branded Gmail service. Student mailboxes will be accessed via Gmail. Configure Gmail Settings Before you connect Gmail to send and receive Booth Gmail on your mobile
More informationNative mobile apps: The wrong choice for business?
Native mobile apps: The wrong choice for business? Why businesses should think twice before building native mobile applications A white paper from Introduction Native mobile applications are popular with
More informationMobile Security. Policies, Standards, Frameworks, Guidelines
Mobile Security Policies, Standards, Frameworks, Guidelines Guidelines for Managing and Securing Mobile Devices in the Enterprise (SP 800-124 Rev. 1) http://csrc.nist.gov/publications/drafts/800-124r1/draft_sp800-124-rev1.pdf
More informationMicrosoft Outlook Phone Set Up
Microsoft Outlook Phone Set Up 2013 Information Technology Services 2013 Microsoft Corporation. All rights reserved Contents Set up Microsoft Exchange email on an Android... 3 Set up Exchange email on
More informationEvaluating Cross-Platform Development Approaches (WORA Tools ) for Mobile Applications
Evaluating Cross-Platform Development Approaches (WORA Tools ) for Mobile Applications Prof. Vijaya Jadhav Asst. Professor, ASM s IBMR, E-mail : vijayajadhav@asmedu.org Prof. Haridini Bhagwat Asst. Professor,
More informationQ. I use a MAC How do I change my password so I can send and receive my email?
Password Change FAQ Q. I use a MAC How do I change my password so I can send and receive my email? A. First point a browser to http://www.redlands.edu/passwordmanager and change your password. Afterward,
More informationMobile Application Development
Web Engineering Mobile Application Development Copyright 2015 Slides from Federico M. Facca (2010), Nelia Lasierra (updates) 1 2 Where we are? # Date Title 1 5 th March Web Engineering Introduction and
More informationSetting Up groov Mobile Apps. Introduction. Setting Up groov Mobile Apps. Using the ios Mobile App
Introduction Using the ios Mobile App Opto 22 s free groov View apps for ios and Android allow you to use View for one or more groovs on your smartphone or tablet in full-screen mode without the address
More informationSymantec Mobile Management Suite
Symantec Mobile Management Suite One Solution For All Enterprise Mobility Needs Data Sheet: Mobile Security and Management Introduction Most enterprises have multiple mobile initiatives spread across the
More informationI am an SE at a large storage system vendor
Neil Waybright Presented to UUASC 12/4/2008 I am an SE at a large storage system vendor In a recent previous life I managed the UNIX team at a Ventura County company that is the largest biotech company
More informationConfiguring Single Sign-on for SAP HANA
Configuring Single Sign-on for SAP HANA Applies to: SAP BusinessObjects Business Intelligence platform 4.0 Feature Pack 3. For more information, visit the Business Objects homepage. Summary This document
More informationTitle: Appium Automation for Mac OS X. Created By: Prithivirajan M. Abstract. Introduction
Title: Appium Automation for Mac OS X Created By: Prithivirajan M Abstract This document aims at providing the necessary information required for setting up mobile testing environment in Mac OS X for testing
More informationMobile Device Access Simple Application Guide
Mobile Device Access Simple Application Guide Users can add/manage requests, retrieve passwords, and review password releases/sessions via their mobile device. This manual should be used to help you navigate
More informationSeeTec ExpansionPackage
SeeTec ExpansionPackage Contents Contents 1 SeeTec WebClient...1 1.1 System requirements... 2 1.1.1 Server requirements for Apache HTTP Server, SeeTec TranscodingEngine (STE) and SeeTec ApplicationGateway
More informationBlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
More informationEstablishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA Celestix
More informationTesting Mobile Application using Device Cloud
Testing Mobile Application using Device Cloud Device Cloud and Benefits CSC has partnerships with mobile device cloud services such as DeviceAnywhere Device cloud platform provides an end-to-end solution
More informationAthena Mobile Device Management from Symantec
Athena Mobile Device Management from Symantec Scalable, Secure, and Integrated Device Management for ios and Android Data Sheet: Endpoint Management and Mobility Overview The rapid proliferation of mobile
More informationUNIVERSITY EMAIL - APPLE MACINTOSH
UNIVERSITY EMAIL - APPLE MACINTOSH How to... Access your University email on your Apple Macintosh Introduction The University of South Wales offers all enrolled students the use of a free personal e-mail
More informationUsing Agile to Develop Mobile Apps
Using Agile to Develop Mobile Apps Xelaration IBM Rational Seminar May 29, 2013 1 Agenda Agile From waterfall to agile Agile properties Traditional versus agile Agile for mobile apps, why not! Mobile apps
More informationNovell Filr. Mobile Client
Novell Filr Mobile Client 0 Table of Contents Quick Start 3 Supported Mobile Devices 3 Supported Languages 4 File Viewing Support 4 FILES THAT CANNOT BE VIEWED IN THE FILR APP 4 FILES THAT GIVE A WARNING
More informationCALIFORNIA STATE UNIVERSITY, NORTHRIDGE
CALIFORNIA STATE UNIVERSITY, NORTHRIDGE The Design and Implementation of Web Based Expense Tracking Application By Bao Vu A project submitted in partial fulfillment of the requirements For the degree of
More informationStatement of Direction
Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...
More informationSpring Security 3. rpafktl Pen source. intruders with this easy to follow practical guide. Secure your web applications against malicious
Spring Security 3 Secure your web applications against malicious intruders with this easy to follow practical guide Peter Mularien rpafktl Pen source cfb II nv.iv I I community experience distilled
More informationIntegrating Mac OS X 10.6 with Active Directory. 1 April 2010
Integrating Mac OS X 10.6 with Active Directory 1 April 2010 Introduction Apple Macintosh Computers running Mac OS X 10.6 can be integrated with the Boston University Active Directory to allow use of Active
More informationAdministrative Systems
Administrative Systems Administrative Systems PCI Infrastructure Services Reference Compliance with the Payment Card Industry s Data Security Standard (PCI DSS) is critical for all merchants who accept
More informationTablets in Data Acquisition
Tablets in Data Acquisition Introduction In the drive to smaller and smaller data acquisition systems, tablet computers bring a great appeal. Desktop personal computers gave engineers the power to create
More informationMobile applications security Android OS (case study) Maciej Olewiński. Cryptographic Seminar 16.05.2012r.
Mobile applications security Android OS (case study) Maciej Olewiński Cryptographic Seminar 16.05.2012r. Presentation s schedule Mobile devices market Smartphone s domination is coming Android basics Main
More informationSetting up Single Sign-On (SSO) with SAP HANA and SAP BusinessObjects XI 4.0
Setting up Single Sign-On (SSO) with SAP HANA and SAP BusinessObjects XI 4.0 February 8, 2013 Version 1.0 Vishal Dhir Customer Solution Adoption (CSA) www.sap.com TABLE OF CONTENTS INTRODUCTION... 3 What
More informationChallenges in Android Application Development: A Case Study
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.294
More informationLee Barnes, CTO Utopia Solutions. Utopia Solutions
Mobile Technology Testing Are You Ready? Lee Barnes, CTO Utopia Solutions Agenda 1. Mobile Testing Challenges 2. Mobile Testing Practices 3. Mobile Test Automation 4. Summary and Q & A Mobile Testing Challenges
More informationYou will need your District Google Mail username (e.g. john.doe@palmbeachschools.org) and password to complete the activation process.
As a courtesy to the Palm Beach County School District employees, the Division of IT is now providing District Google Mail access for personal mobile devices. Although we do not have the staffing to accept
More information