MIDP 3.0 overview. Copyright 2008 Aplix Corporation. All rights reserved.
|
|
|
- Jesse Alexander
- 10 years ago
- Views:
Transcription
1 MIDP 3.0 overview
2 MIDP 3.0 specification status 2
3 New MIDP 3.0 functionality 3
4 CLDC
5 Mandatory JSR 135 v1.1 compliance 5
6 Concurrency 6
7 Events 7
8 Events MIDlet-Event-Launch-<n> :<Classname>;<AuthorizationMode>;<Launch-Condition> Where: 8
9 Events transaction diagram Event registry MIDlet 1 MIDlet 1: System event A 1: Register for System event A 3: Receive System event A 2: Post App event B MIDlet 2: App event B 1: Register for App event B MIDlet 2 3: Receive App event B 2: Post System event A Legend System Event Platform App-to -app Event 9
10 Events - Tutorial 10
11 Inter-MIDlet Communication (IMC) 11
12 IMC clients 12
13 IMC servers MIDlet-Push-<n>: imc://:<server name>:<version>;<authmode>, <MIDlet UID>, * 13
14 LIBlets/Shared libraries 14
15 LIBlets/Shared libraries - Dependencies MIDlet-Dependency-<n>: <type>; <level>; <name>; <vendor>; <version> LIBlet-Dependency-<n>: <type>; <level>; <name>; <vendor>; <version> MIDlet-Dependency-Jar-SHA1-<n> MIDlet-Dependency-JAD-URL-<n> LIBlet-Dependency-Jar-SHA1-<n> LIBlet-Dependency-JAD-URL-<n> 15
16 LIBlets - Tutorial 16
17 LIBlets - Advantages Decreased application development cost. Decreased application development time. Increased Average Revenue Per Unit. Old MIDlet Model New MIDlet Model w/ LIBlets MIDlet MIDlet Component A Component B Component C LIBlet A LIBlet B LIBlet C 17
18 Auto-Start MIDlets 18
19 Idle Screen 19
20 Idle Screen - Importance ä 20
21 Idle Screen - Existing Implementations 21
22 Idle Screen MIDlets Why in MIDP 3.0? 22
23 Idle Screen MIDlets 23
24 Idle Screen MIDlets MIDlet-<n>-Type: idlescreen 24
25 Notification A 25
26 Notification - Example 26
27 Splash Screen MIDlet-Splash-Screen-Image: /cardgamesplash.png 27
28 Splash Screen 28
29 IPv6 MIDlet-Required-IP-Version 29
30 User Restrictions on MIDlet Suite Lifecycle 30
31 Application Level Access Authorization Application Level Access Authorization allows MIDlet suites to restrict access to its shared resources from other MIDlet Suites Application Level Access Authorization is separate from the protection domain authorization model. Functionality using App Level Access Authorization 1) RMS : RecordStore access 2) IMC : Establishing IMC Connection 3) Events : Posting and Receiving App-to-App Event 31
32 Application Level Access Authorization Access can be restricted based on 1) domain 2) vendor 3) signer Application Level Access Authorization is declared in MANIFEST MIDlet-Access-Auth-Type-<n>: domain=self ANY;vendor=<vendorname> ANY;signer=<certalias> ANY If <certalias> is used, it must match exactly one <alias> in MIDlet-Access-Auth-Cert-<n>:<alias> <base 64 encoded signing cert> A MIDlet Suite B has access to MIDlet Suite A s resources if it satisfies the combined domain/vendor/signer constraint in at least one of MIDlet Suite A s MIDlet-Access-Auth-Type-<n> attributes. 32
33 Application Level Access Authorization Example MIDlet Suite A MANIFEST MIDlet-Access-Auth-Type-1:domain=SELF;vendor=ANY;signer=coolcompanycert MIDlet-Access-Auth-Type-2:domain=ANY;vendor="Cool Company Inc.";signer=ANY A MIDlet suite will be granted access if it EITHER... a) belongs to same domain as MIDlet Suite A AND is signed by (certificate corresponding to) "coolcompanycert, OR b) has MIDlet-Vendor of "Cool Company Inc." 33
34 Permissions Model MIDP 2.X Security Review Based on protection domains Uses named permissions (e.g. "javax.microedition.io.commconnection") MIDlet Suites request permissions using MIDlet-Permissions / MIDlet-Permissions-Opt attributes MIDP 3.0 Security Overview Based on protection domains Adopts class-based permissions from JavaSE MIDlet Suites request permissions using MIDlet-Permission-<n> / MIDlet-Permission-Opt-<n> attributes 34
35 Permissions Model Permission Classes Defined for each API requiring protection Subclassed from java.security.permission May specify the name of a resource to protect and an associated action Checked by implementation during execution of protected function Advantages of new Permissions Model Can specify permissions for property, resource, or function for a particular API MIDP 2.X did not provide that level of granularity; only had boolean permissions Unified permissions definitions Do not need to redefine named permissions for different configurations (CLDC, CDC, SE) 35
36 Permissions Model Protection Domain Each MIDlet Suite is bound to a protection domain when installed. Protection Domain defines set of Permissions that may be granted to a MIDlet Suite. 1) Allowed - granted (applies to requested permissions) 2) User - granted by user (applies to requested permissions) 36
37 Permissions Model Requesting Permissions MIDlet Suites that require access to a protected API MUST request the corresponding permission using MIDlet-Permission-<n>: <classname>, <resource>, <action> Non-critical APIs should be requested using MIDlet-Permission-Opt-<n>: <classname>, <resource>, <action> The <resource> and <action> values should only exist if the associated Permission class constructor has corresponding parameters. MIDlet-Permission-1: javax.microedition.io.httpprotocolpermission MIDlet-Permission-2: javax.microedition.io.socketprotocolpermission socket://:
38 Permissions Model LIBlet Permissions LIBlet is executed inside protection domain of the MIDlet it is bound to. Permission declared with LIBlet-Permission-<n> and LIBlet- Permission-Opt-<n> are informative only. All Permissions MUST still be declared in dependent MIDlet Suite's JAD/Manifest. If LIBlet declared permissions do not exist in dependent MIDlet Suite requested permissions, installation MUST fail. 38
39 Screen Saver MIDlets MIDlet-<n>-Category: screensaver 39
40 Screen saver MIDlets 40
Java ME & NetBeans Mobility. Petr Suchomel Architect, NetBeans Mobility Sun Microsystems
Java ME & NetBeans Mobility Petr Suchomel Architect, NetBeans Mobility Sun Microsystems Agenda Java ME introduction Java ME applications NetBeans Mobility Edition Power of advanced features Demos, demos,
Development of Java ME
Y39PDA Development of Java ME application České vysoké učení technické v Praze Fakulta Elektrotechnická Content What is Java ME Low Level a High Level API What is JSR LBS Java ME app. life-cycle 2/29 Is
Mobile application development J2ME U N I T I I
Mobile application development J2ME U N I T I I Overview J2Me Layered Architecture Small Computing Device requirements Run Time Environment Java Application Descriptor File Java Archive File MIDlet Programming
DESIGNING SHIFT CALENDAR FOR MOBILE PHONE
Bachelor's thesis Degree program Information technology 2010 Maamar zeddek DESIGNING SHIFT CALENDAR FOR MOBILE PHONE BACHELOR S THESIS ABSTRACT TURKU UNIVERSITY OF APPLIED SCIENCES Degree programme Infomation
Mobile Software Application Development. Tutorial. Caesar Ogole. April 2006
Mobile Software Application Development Tutorial By Caesar Ogole April 2006 About the Tutorial: In this tutorial, you will learn how to build a cross-platform mobile software application that runs on the
Android Fundamentals 1
Android Fundamentals 1 What is Android? Android is a lightweight OS aimed at mobile devices. It is essentially a software stack built on top of the Linux kernel. Libraries have been provided to make tasks
Mobile Network Marketing Model (MIDP)
Formal Analysis of Security Models for Mobile Devices, Virtualization Platforms, and Domain Name Systems Gustavo Betarte Instituto de Computación, Facultad de Ingeniería, Universidad de la República, Montevideo,
PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES
M-FILES CORPORATION PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES VERSION 8 24 SEPTEMBER 2014 Page 1 of 8 CONTENTS 1. Overview... 3 2. Encryption of Data in Transit in M-Files... 4 HTTPS... 4 RPC
Tutorial: Development of Interactive Applications for Mobile Devices
Tutorial: Development of Interactive Applications for Mobile Devices 7th International Conference on Human Computer Interaction with Mobile Devices and Services (Mobile HCI 2005) (Media Informatics Group,
Note: This App is under development and available for testing on request. Note: This App is under development and available for testing on request. Note: This App is under development and available for
Mobile Application Development
Mobile Application Development Development Process and Portability Christoph Denzler University of Applied Sciences Northwestern Switzerland Institute for Mobile and Distributed Systems Learning Target
Java Platform, Micro Edition (Java ME) Mokoena F.R. The 7046 Team
Java Platform, Micro Edition (Java ME) Mokoena F.R The 7046 Team 1. Introduction Java Platform, Micro Edition (Java ME) technology is one of the popular mobile application runtime. It provides developers
Security Evaluation of J2ME CLDC Embedded Java Platform
Vol. 5, No. 2, March April 2006 Security Evaluation of J2ME CLDC Embedded Java Platform Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi and Sami Zhioua Computer Security Laboratory Concordia Institute
Copyright 2014, Oracle and/or its affiliates. All rights reserved.
1 Java Micro Edition (ME) 8: Bringing Java to the Internet of Things Robert Clark Senior Software Development Director Safe Harbor Statement The following is intended to outline our general product direction.
Index. Registry Report
2013.1-12 Registry Report 01 02 03 06 19 21 22 23 24 25 26 27 28 29 31 34 35 Index Registry Report 02 Registry Report Registry Report 03 04 Registry Report Registry Report 05 06 Registry Report Registry
At least 2 GCE A Level Passes and credit in Mathematics at Ordinary level. Mature candidates will also be considered on a case-by-case basis.
Diploma in Web & Multimedia Development LC201 1. Objectives This course offers web and multimedia development skills which are focused on internet technologies such as the design and implementation of
Next Steps In Accelerating DNSSEC Deployment
Next Steps In Accelerating DNSSEC Deployment Dan York, CISSP Senior Content Strategist, Internet Society DNSSEC Deployment Workshop, ICANN 45 Toronto, Canada October 17, 2012 Internet Society Deploy360
Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking
Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Agenda BYOD challenges A solution for BYOD Network Protector SDN matched with industry leading service How it works In summary BYOD challenges
Virtualization Reduces the Cost of Supporting Open Industrial Control Systems
Virtualization Reduces the Cost of Supporting Open Industrial Control Systems Virtualization Reduces the Cost of Supporting Open Industrial Control Systems ii Table of Contents Introduction... 1 What is
FlyingDream AAT Driver Quick Guide V1.1
FlyingDream AAT Driver Quick Guide V1.1 1. Introduction: AAT Driver is designed to drive the FlyingDream AAT system. It includes two parts: the TeleFlyLite module and the Driver module. The TeleFlyLite
Java and the Internet of Things
Java and the Internet of Things Henrik Stahl Vice President Java Product Management 1 9 Million+ Java developers worldwide #1 Choice for developers #1 Development platform 5 of Top 5 OEMs ship Java ME
How To Configure Windows Server 2008 as a RADIUS Server with MS-CHAP v2 Authentication
How To Configure Windows Server 2008 as a How To Configure Windows Server 2008 as a RADIUS Server with MS-CHAP v2 Authentication RADIUS Server with MS-CHAP v2 Authentication Applicable Version: 10.00 onwards
DESIGN OF MOBILE APPLICATION FOR SCHEDULING APPOINTMENT WITH BANK PERSONNEL FOR BANKING SERVICES
DESIGN OF MOBILE APPLICATION FOR SCHEDULING APPOINTMENT WITH BANK PERSONNEL FOR BANKING SERVICES INSTITUTE FOR DEVELOPMENT & RESEARCH IN BANKING TECHNOLOGY Hyderabad Submitted by: Karre Anil Computer Science
What's New in Bomgar 13.1
What's New in Bomgar 13.1 TABLE OF CONTENTS Updates for Support Administrators 3 Access to All Jump Clients in the System 4 Appliance Integration with Dell KACE 5 Canned Message Management 6 Embedded Remote
Java ME Clients for XML Web Services
66 Java ME Clients for XML Web Services Paul POCATILU Academy of Economic Studies, Bucharest Using Web services in developing applications has many advantages like the existence of standards, multiple
MIDlet development with J2ME and MIDP
MIDlet development with J2ME and MIDP ibm.com/developerworks Table of Contents If you're viewing this document online, you can click any of the topics below to link directly to that section. 1. Introduction...
A Formal Specification of the MIDP 2.0 Security Model
A Formal Specification of the MIDP 2.0 Security Model Santiago Zanella Béguelin 1, Gustavo Betarte 2, and Carlos Luna 2 1 FCEIA, Universidad Nacional de Rosario, Argentina [email protected] 2 InCo,
Extreme Java G22.3033-006. Session 3 Main Theme Java Core Technologies (Part I) Dr. Jean-Claude Franchitti
Extreme Java G22.3033-006 Session 3 Main Theme Java Core Technologies (Part I) Dr. Jean-Claude Franchitti New York University Computer Science Department Courant Institute of Mathematical Sciences Agenda
Global Image Management System For epad-vision. User Manual Version 1.10
Global Image Management System For epad-vision User Manual Version 1.10 May 27, 2015 Global Image Management System www.epadlink.com 1 Contents 1. Introduction 3 2. Initial Setup Requirements 3 3. GIMS-Server
Plesk Control Panel Adding email accounts
Introduction This tutorial covers the procedure for setting up email accounts within your Plesk control panel. Every ProserveUK hosting account has a set limit for email accounts; you can create as many
A Perspective on the Evolution of Mobile Platform Security Architectures
A Perspective on the Evolution of Mobile Platform Security Architectures N. Asokan Nokia Research Center Joint work with Kari Kostiainen, Jan-Erik Ekberg, Elena Reshetova (Intel) Padova, July 2012 1 Introduction
Mobile Development Discovery Document
Mobile Development Discovery Document Prepared By: Abdul Wadood, Atifa Nadeem, Naima Khan and Haris Khan All Rights Reserved No part of this publication may be reproduced, reformatted or transmitted in
Ping Device Driver Help. 2009 Schneider Electric
2009 Schneider Electric 1 Table of Contents 1 Getting Started... 2 Help Contents... 2 Overview... 2 2 Device Setup... 2 Device Setup... 2 3 Automatic Tag... Database Generation 2 Automatic Tag... Database
Introduction to the DANE Protocol
Introduction to the DANE Protocol ICANN 47 July 17, 2013 Internet Society Deploy360 Programme Providing real-world deployment info for IPv6, DNSSEC, routing and other Internet technologies: Case Studies
Eclipse 4 RCP application Development COURSE OUTLINE
Description The Eclipse 4 RCP application development course will help you understand how to implement your own application based on the Eclipse 4 platform. The Eclipse 4 release significantly changes
Use Host Information in Policy Enforcement
Use Host Information in Policy Enforcement Although you may have stringent security at your corporate network border, your network is really only as secure as the end devices that are accessing it. With
Improved Credential and SSL Configuration for EE 7
Improved Credential and SSL Configuration for EE 7 1. Introduction: SSL, trust stores, keystores and credential repositories are generally difficult areas to configure for Java EE environments. The configuration
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at http://www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2009 Vol. 8, No. 5, July-August 2009 The Application of Design Patterns to Develop
Lecture 17: Mobile Computing Platforms: Android. Mythili Vutukuru CS 653 Spring 2014 March 24, Monday
Lecture 17: Mobile Computing Platforms: Android Mythili Vutukuru CS 653 Spring 2014 March 24, Monday Mobile applications vs. traditional applications Traditional model of computing: an OS (Linux / Windows),
Oracle WebLogic Server 11g Administration
Oracle WebLogic Server 11g Administration This course is designed to provide instruction and hands-on practice in installing and configuring Oracle WebLogic Server 11g. These tasks include starting and
Managing CA-Signed Certificates
Managing CA-Signed Certificates T.Rob Wyatt, IoPT Consulting [email protected] Managing CA Certificates for MQ - Intermediate So you want to enable SSL on your MQ channels using a commercial Certificate
Design Document. Offline Charging Server (Offline CS ) Version 1.0. - i -
Design Document Offline Charging Server (Offline CS ) Version 1.0 - i - Document Scope Objective The information provided in this document specifies the design details of Operations of Offline Charging
Meeting Rooms User Manual
Meeting Rooms User Manual Document Identifier: iqmrum Document Statu\Version: Draft\0.0.3 Document Publication Date: 2015.05.12 Template Identifier\Version: iquest Document Template T-1\2.0.0 Table of
Location-Based Information Systems
Location-Based Information Systems Developing Real-Time Tracking Applications Miguel A Labrador Alfredo J Perez Pedro M Wightman CRC Press Taylor & Francis Group Boca Raton London New York CRC Press Is
This article describes a detailed configuration example that demonstrates how to configure Cyberoam to provide the access of internal resources.
How To Configure Port Forwarding using Virtual Host to access devices on Internal network Applicable to versions 9.5.3 build 14 or above This article describes a detailed configuration example that demonstrates
A Survey of Electronic Signature Development in Mobile Devices
A Survey of Electronic Signature Development in Devices 1, 2, 3 and 4 1 University of Murcia, Department of Information and Communications Engineering, [email protected] 2 University of Murcia, Department
OSGi Service Platform in Integrated Management Environments Telefonica I+D, DIT-UPM, Telvent. copyright 2004 by OSGi Alliance All rights reserved.
OSGi Service Platform in Integrated Management Environments Telefonica I+D, DIT-UPM, Telvent copyright 2004 by OSGi Alliance All rights reserved. Today Management Environments Network Management. Monitors
CA Nimsoft Unified Management Portal
CA Nimsoft Unified Management Portal HTTPS Implementation Guide 7.6 Document Revision History Document Version Date Changes 1.0 June 2014 Initial version for UMP 7.6. CA Nimsoft Monitor Copyright Notice
IP Phone Services Configuration
CHAPTER 96 Using Cisco Unified Communications Manager Administration, you define and maintain the list of IP phone services to which users can subscribe at their site. IP phone services comprise XML applications
Resource Containers: A new facility for resource management in server systems
CS 5204 Operating Systems Resource Containers: A new facility for resource management in server systems G. Banga, P. Druschel, Rice Univ. J. C. Mogul, Compaq OSDI 1999 Outline Background Previous Approaches
MS 20247C Configuring and Deploying a Private Cloud
MS 20247C Configuring and Deploying a Private Cloud Description: Days: 5 Prerequisites: This course equips students with the skills they require to configure and deploy a cloud using Microsoft System Center
SETUP SSL IN SHAREPOINT 2013 (USING SELF-SIGNED CERTIFICATE)
12/15/2012 WALISYSTEMSINC.COM SETUP SSL IN SHAREPOINT 2013 (USING SELF-SIGNED CERTIFICATE) Setup SSL in SharePoint 2013 In the last article (link below), you learned how to setup SSL in SharePoint 2013
jfqbi= = eqji=qççäâáí= = = aéîéäçééêûë=dìáçé=== oéäé~ëé=oko=
jfqbi= = eqji=qççäâáí= = = aéîéäçééêûë=dìáçé=== oéäé~ëé=oko= NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel Networks Corporation
Gluster Filesystem 3.3 Beta 2 Hadoop Compatible Storage
Gluster Filesystem 3.3 Beta 2 Hadoop Compatible Storage Release: August 2011 Copyright Copyright 2011 Gluster, Inc. This is a preliminary document and may be changed substantially prior to final commercial
Software Architecture Document
Software Architecture Document Natural Language Processing Cell Version 1.0 Natural Language Processing Cell Software Architecture Document Version 1.0 1 1. Table of Contents 1. Table of Contents... 2
Write. Once. Deploy. Anywhere. Anatole Wilson. Writing Applications for mobile devices and reducing device fragmentation with NetBeans Mobility Pack
Write Once Deploy nywhere Writing pplications for mobile devices and reducing device fragmentation with NetBeans Mobility Pack natole Wilson Write Once, Deploy nywhere Take a look around you in just about
Beginning BlackBerry 7
Beginning BlackBerry 7 Development Robert Kao Dante Sarigumba With Anthony Rizk and Kevin Michaluk Apress* Contents Contents at a Glance About the Authors About the Technical Reviewer Acknowledgments iv
The release notes provide details of enhancements and features in Cloudera ODBC Driver for Impala 2.5.30, as well as the version history.
Cloudera ODBC Driver for Impala 2.5.30 The release notes provide details of enhancements and features in Cloudera ODBC Driver for Impala 2.5.30, as well as the version history. The following are highlights
Configuration Guide. Installation and. BlackBerry Enterprise Server for Microsoft Exchange. Version: 5.0 Service Pack: 4
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Installation and Configuration Guide Published: 2014-01-14 SWD-20140114180405595 Contents 1 Overview: BlackBerry Enterprise
Power Management in the Cisco Unified Computing System: An Integrated Approach
Power Management in the Cisco Unified Computing System: An Integrated Approach What You Will Learn During the past decade, power and cooling have gone from being afterthoughts to core concerns in data
Modern Application Architecture for the Enterprise
Modern Application Architecture for the Enterprise Delivering agility, portability and control with Docker Containers as a Service (CaaS) Executive Summary Developers don t adopt locked down platforms.
Diploma/BSc (Hons) Web & Multimedia Development
LIFELONG LEARNING CLUSTER Virtual Centre for Innovative Learning Technologies Diploma/BSc (Hons) Web & Multimedia Development 1. Objectives This course offers web and multimedia development skills which
XML Based Customizable Screen. Rev 1.1
XML Based Customizable Screen Rev 1.1 August 10, 2006 1. Introduction Starting from release version 1.0.2.X, GXP-2000 supports the idle screen customization. The designs of the displayed information and
OSGi Remote Management
OSGi Remote Management INCREASE OUR Date 20-11-2006 Miguel García Longarón - [email protected] Present situation OSGi is being applied in several domains Each domain has own solution for remote management Home
Generate Android App with Protection and Licensing
Generate Android App with Protection and Licensing The Generate Android App paper covers the entire process of generating an Android app without programming. That paper shows how DocProtect outputs the
CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS
CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS Java EE Components Java EE Vendor Specifications Containers Java EE Blueprint Services JDBC Data Sources Java Naming and Directory Interface Java Message
5. More on app development
5. More on app development Some other mobile development systems MIDP Java Maemo Android iphone Windows Mobile OpenMoko Commonly used implementation techniques Summary Mobile Java (MIDP in particular)
Information Models, Data Models, and YANG. IETF 86, Orlando, 2013-03-14
Information Models, Data Models, and YANG Jürgen Schönwälder IETF 86, Orlando, 2013-03-14 1 / 12 Information Models (RFC 3444) Information Models are used to model managed objects at a conceptual level,
Energistics WITSML Product Certification Program Server Test Suite #1 Testing Procedure
Energistics WITSML Product Certification Program Server Test Suite #1 Testing Procedure Introduction This document details the process by which WITSML server vendors can put their products forward for
Jordan Jozwiak November 13, 2011
Jordan Jozwiak November 13, 2011 Agenda Why Android? Application framework Getting started UI and widgets Application distribution External libraries Demo Why Android? Why Android? Open source That means
Best Practices. Understanding BeyondTrust Patch Management
Best Practices Understanding BeyondTrust Patch Management February 2014 Contents Overview... 3 1 - Configure Retina CS... 4 2 - Enable Patch Management for Smart Groups... 6 3 Identify and Approve Patches...
Getting Started with Android Programming (5 days) with Android 4.3 Jelly Bean
Getting Started with Android Programming (5 days) with Android 4.3 Jelly Bean Course Description Getting Started with Android Programming is designed to give students a strong foundation to develop apps
Configuring and Deploying a Private Cloud. Day(s): 5. Overview
Configuring and Deploying a Private Cloud Day(s): 5 Course Code: M20247 Overview This course equips students with the skills they require to configure and deploy a cloud using Microsoft System Center 2012
WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks
WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on
Configure your firewall for administrative access via RADIUS authentication
Configure your firewall for administrative access via RADIUS authentication Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] Configure your Palo Alto firewall for RADIUS Authentication This guide
Cloud Services Catalog with Epsilon
Cloud Services Catalog with Epsilon Modern IT enterprises face several challenges while building a service catalog for their data center. Provisioning with a cloud management platform solves some of these
UNIVERSITÉ DE NANTES LABORATOIRE D INFORMATIQUE DE NANTES ATLANTIQUE. Yann Busnel. Master 2 MIAGE. Yann Busnel ESB - Concept et techniques 1
Yann Busnel Master 2 MIAGE Yann Busnel ESB - Concept et techniques 1 ESB = Enterprise Service Bus Different modes of service exposition Functionnalities and roles of a bus Topology of ESB JBI environnement
IT Exam Training online / Bootcamp
DumpCollection IT Exam Training online / Bootcamp http://www.dumpcollection.com PDF and Testing Engine, study and practice Exam : 70-534 Title : Architecting Microsoft Azure Solutions Vendor : Microsoft
Instrumentation for Linux Event Log Analysis
Instrumentation for Linux Event Log Analysis Rajarshi Das Linux Technology Center IBM India Software Lab [email protected] Hien Q Nguyen Linux Technology Center IBM Beaverton [email protected] Abstract
Security challenges for internet technologies on mobile devices
Security challenges for internet technologies on mobile devices - Geir Olsen [[email protected]], Senior Program Manager for Security Windows Mobile, Microsoft Corp. - Anil Dhawan [[email protected]],
Step- by- Step guide to extend Credential Sync between IBM WebSphere Portal 8.5 credential vault and Active Directory 2012 using Security Directory
Step- by- Step guide to extend Credential Sync between IBM WebSphere Portal 8.5 credential vault and Active Directory 2012 using Security Directory Integrator (ex TDI) on Red- Hat (part 3) Summary STEP-
Java Application Developer Certificate Program Competencies
Java Application Developer Certificate Program Competencies After completing the following units, you will be able to: Basic Programming Logic Explain the steps involved in the program development cycle
Mobility Solutions in IBM
Mobility Solutions in IBM Cecelia Yu [email protected] Mobile Collaboration, CDL, IBM 2007 IBM Corporation Agenda 1. Introduction 2. Mobility Strategy 2.1 Connectivity 2.2 E-Mail 2.3 Social Network 2.4 Instant
Introduction to Mobile Phone. Programming in Java Me
Introduction to Mobile Phone Programming in Java Me (prepared for CS/ECE 707, UW-Madison) Author: Leszek Wiland and Suman Banerjee 1 Content 1. Introduction 2. Setting up programming environment 3. Hello
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES
DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES Saiprasad Dhumal * Prof. K.K. Joshi Prof Sowmiya Raksha VJTI, Mumbai. VJTI, Mumbai VJTI, Mumbai. Abstract piracy of digital content is a one of the
Attachment to Data Center Services Multisourcing Service Integrator Master Services Agreement
Attachment to Data Center Services Multisourcing Service Integrator Master Services Agreement DIR Contract No. DIR-DCS-MSI-MSA-001 Between The State of Texas, acting by and through the Texas Department
Mobile Operating Systems. Week I
Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone
Demystifying Java Platform Security Architecture
Demystifying Java Platform Security Architecture Ramesh Nagappan, CISSP [email protected] Overall Presentation Goal Learn how to get started on using Java Platform and its core Security Mechanisms.
Netwrix Auditor for Exchange
Netwrix Auditor for Exchange Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix
An introduction to creating JSF applications in Rational Application Developer Version 8.0
An introduction to creating JSF applications in Rational Application Developer Version 8.0 September 2010 Copyright IBM Corporation 2010. 1 Overview Although you can use several Web technologies to create
Symantec NetBackup OpenStorage Solutions Guide for Disk
Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a
SCUt ils SmartAssign Guide Solution for Microsoft System Center 2012 Service Manager
SCUt ils SmartAssign Guide Solution for Microsoft System Center 2012 Service Manager Published: 06 th March 2015 Version: 1.1 Authors: Marat Kuanyshev Feedback: [email protected] Contents 1. Getting
