Virtual Smartphone over IP
|
|
|
- Duane Maximillian Lang
- 9 years ago
- Views:
Transcription
1 Virtual Smartphone over IP Eric Y. Chen Mistutaka Itoh NTT Information Sharing Platform Laboratories, NTT Corporation Midori-cho, Musashino-shi, Tokyo, , Japan Abstract The number of smartphone users and mobile application offerings are growing rapidly. A smartphone is often expected to offer PC-like functionality. In this paper, we present Virtual Smartphone over IP system that allows users to create virtual smartphone images in the mobile cloud and to customize each image to meet different needs. Users can easily and freely tap into the power of the data center by installing the desired mobile applications remotely in one of these images. Because the mobile applications are controlled remotely, they are not constrained by the limit of processing power, memory and battery life of a physical smartphone. Keywords-Smartphone; Android; virtualization; cloud I. INTRODUCTION The number of smartphone users and mobile application offerings are growing rapidly. Smartphones are often expected to offer PC-like functionality, which requires powerful processors, abundant memory and long-lasting battery life. However, their hardware today is still very limited and application developers are forced to take these limitations into consideration. A number of service providers such Dropbox [1] and Zumodrive [2] provides online storage services to smartphone users in attempt to alleviate the limitations of smartphone storages. However, to the best of our knowledge, there is still no service that offers full computation resources to smartphone users. In this paper, we propose Virtual Smartphone over IP, which provides cloud computing environment specifically tailored for smartphone users. It allows users to create virtual smartphone images in the cloud and to remotely run their mobile applications in these images as they would locally. The motivation is to allow smartphone users to more easily tap into the power of the cloud and to free themselves from the limit of processing power, memory and battery life of a physical smartphone. Using our system, smartphone users can choose to install their mobile applications either locally or in the cloud, as illustrated in Figure 1. Copyright 2010 IEEE. Reprinted from IEEE WoWMoM This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the Android-x86 Project's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it. Running applications remotely in the cloud has a number of advantages, such as avoiding untrusted applications from accessing local data, boosting computing resources, continuing to run applications on the background and opening up new ways to use smartphones. This paper presents the design and implementation of Virtual Smartphone over IP. Section II describes the basic design of our system and Section III describes a proof-ofconcept prototype that we have implemented. Section IV discuss the possible applications of our system and Section V reports the results of our experiments that demonstrate how we can leverage the performance of mobile applications in the cloud. Section VI discusses the related work in the research community and Section VII concludes this paper. Figure 1. Basic concept of our system II. BASIC DESIGN Our Virtual Smartphone over IP system adopts an architecture similar to ones commonly used by server hosting providers. As illustrated in Figure 2, the system is composed of a number of external smartphone clients, a front-end server, a virtual smartphone farm, a management server and a network file system (NFS). Virtual smartphone farm is the most important component of our system. It is a virtualization environment that hosts a collection of virtual smartphone images, each of which is dedicated to a smartphone user. In Section III, we discuss in detail about how we have implemented a virtual smartphone farm. The front-end server admits service requests from smartphone users across the Internet and establishes remote sessions to the appropriate virtual smartphone images. The frond-end server also allows smartphone users to create, configure and destroy virtual
2 smartphone images. Once a remote session is established, the user can install and run mobile applications on one of these images instead of his own physical smartphone. The network file system is used by virtual smartphones for all persistent file storage, in much the same way that an SD card holds data for physical smartphones. Since the NFS is easily scalable, it practically provides each virtual smartphone an unlimited file storage. The management server is used to manage the virtual smartphone farm. Typical operations of a management server include the creation of virtual images in bulk and troubleshooting individual images. Users control their virtual smartphone images through a dedicated client application installed on their smartphones. This client application receives the screen output of a virtual smartphone image and presents the screen locally in the same way as conventional thin-client technology. Since we expect most users to access their virtual smartphone images through an unstable network such as 3G, the image must continue to run on the farm and be in the same state when the user is connected again after the user is disconnected in an unexpected manner. the physical and the virtual smartphones to be on the same platform, this particular setting allows us to more tightly integrate both environments. Our prototype is depicted in Figure 3. We have implemented a pair of VNC-based server and client programs. The server program resides in each Android-x86 image that run on top of VMWARE ESXi while the client program is installed in the physical Android device. The client program enables a user to remotely interact and control Anroid-x86 images. The client program transmits various events from the physical device to the virtual smartphone and receives graphical screen updates from the virtual smartphone. We have also implemented a virtual sensor driver in the Android-x86 image. Most modern smartphones are equipped with various sensor devices such as GPS, accelerometer and thermometers. While VNC itself supports only keyboard and mouse as the primarily input devices, we have extended our client program to transmit sensor readings (accelerometer, orientation, magnetic field and temperature etc) to the virtual sensor driver in the Android-x86 image. The virtual sensor driver is implemented in such a way that the sensor readings from the physical Android device would appear to come from the Anroid-x86 image itself. This is an important feature as it allows Android applications in an Android-x86 image to obtain sensor readings from the physical smartphone without any modification. Physical Smartphone Virtual Smartphone Farm Internet Virtual Smartphone Farm Virtual Smartphone Virtual Smartphone Virtual Smartphone Smartphones Front-end server App Client 4. images App App Management server Application Framework NFS 1. sensor readings 2. sensor readings Android OS (ARM) Application Server Framework 3. sensor readings Android OS(x86) Figure 2. Overall system architecture Sensor driver Virtual sensor driver III. IMPLEMENTATION We have implemented a proof-of-concept prototype using Android [3], an open-source mobile OS initiated by Google. The main reason behind our choice is that Android OS is not only designed for smartphone devices with an ARM processor, but also is being ported to the x86 platform [4]. Although Android-x86 is originally intended for netbooks, it gives us an opportunity to create a virtual image of Android using a baremetal hypervisor. This allows each virtual Android-x86 image to tap into the power of server hardware in a data center. The fact that we do not need a CPU emulator (i.e. x86-to-arm) to run the virtual image is very important since such emulator always introduces enormous overhead and may neutralize any performance advantage offered by a data center. We have also chosen to implement our client application on an Android smartphone. Although our system does not require ARM CPU Hypervisor Intel x86 CPU Figure 3. Prototype implementation Our prototype allows applications running in the cloud to appear like local applications on the physical device, with functions such as copy-and-paste between local and remote applications. Our prototype also features remote shortcuts to remote applications in the virtual smartphone that minimize the number of steps required for users to launch remote applications, as illustrated in Figure 4. Furthermore, each short-cut can point to a different virtual Android-x86 image, and thus allowing users instant access to remote applications residing in multiple Android-x86 images in one single menu.
3 Figure 5 is a photo of our prototype in action. The user in the photo is accessing an Android-x86 image hosted in our data center. freedom. Using our system, these program do not even reside in the physical device at all and thus further minimize the risks of malware breaking out of the sandbox. This concept is illustrated in Figure 6. Such remote sandbox is particularly useful for Android users who would like to install the lesstrusted applications obtained outside the Android Market. If an image is infected, the user can easily revert the image to its previous clean state. Figure 4. Shortcuts to remote apps Figure 6. Remote sandbox Figure 5. Our prototype in action IV. APPLICATIONS Our system allows users to customize each image to meet different needs. To create a new smartphone image in the cloud, the user can simply select from a number of preconfigured image templates to get up and running immediately. The following are some examples of how our system can be used. A. Remote Sandbox As smartphones begins to replace laptop PCs in some occasions, they will slowly become attractive targets for attackers. Security threats that were once considered PC issues are slowly crossing the line and becoming serious concerns for mobile users [5][6][7][8]. In particular, [9] further studied Android as a potential target because of Android's design philosophy on openness. The authors created a proof-ofconcept malware using undocumented Java functions and demonstrated the possibility to bypass the Android permission system using native applications. Users of our system can execute mobile applications from unverified third-parties on a virtual smartphone image that has only access to a tightly-controlled set of resources. This usage is conventionally called "sandbox", in the sense that untrusted programs are contained in a confined space with very little B. Data leakage prevention A recent study commissioned by Cisco indicated that loss of portable devices is one of the top 10 reasons for enterprise data leakage. Our system can also be used as a viable solution against data leakage if the data is stored in the data center and accessible only through one of the virtual smartphone image, as illustrated in Figure 7. Since only the graphic pixels of screen images are delivered to user's mobile phone, the actual data never leaves the secure data center. This allows employees to work with the data without the privilege to retain or copy the data in their local device. This practically gives enterprise more control over confidential and valuable corporate data. We can further configure an image template in such a way that prohibits data from leaving the image. Figure 7. Data leakage prevention C. Performance leverage The fact that Android uses the same Java application framework on both x86 and ARM processors provides seamless application portability on these platforms. We can boost the performance of Android applications by running them on x86 platforms with the vast resources of cloud computing. In Section V, we present comparative benchmark results to provide some idea of the potential performance leverage one can gain by executing the same applications in the cloud. The user in Figure 5 was using his Android smartphone to remotely control a PDF viewer application run on a virtual Android-x86 image in the data center. While the ARM-based
4 Android on a HT-03A takes 14 seconds on average to open a 10 MB file, the Android-x86 image hosted in our data center takes less than 1 second. An image template configured with vast memory and CPU resources can be provided to assist users for this purpose. D. End-to-middle security In [10], we proposed an end-to-middle security model to defend against rogue wireless access point that appears to be legitimate, but is set up for the purpose of intercepting traffic between mobile users and the web. We pointed out that while end-to-end security is the most effective countermeasure, in practice it requires continuous diligence from users to ensure that such security does take place as expected. It is even more difficult for users to verify if a mobile application that interacts with a web service does indeed encrypt its data traffic to prevent man-in-the-middle (MITM) attacks, which is most likely to happen at an untrusted wireless access point. The basic idea of end-to-middle security is to have a trusted middle point somewhere on the Internet. As soon as being associated with an access point, a mobile user establishes a secure channel with this middle point first, which then relay all traffic from the user to the Internet. Although the traffic may not be encrypted from the middle point outward, this approach effectively prevents any MITM attack attempted by a rogue access point. V. EVALUATION We have evaluated our prototype from a number of different aspects, each of which are described in the following. A. Computing power Through this paper we have argued that the performance of mobile applications can be drastically leveraged by executing them in a virtual smartphone image hosted in the cloud. To confirm this argument, we conducted a series tests to compare the performance of the same application executed on an Android smartphone and on a virtual Android image hosted in a PC. In our test, we used Android Dev Phone 1 that comes with a Qualcomm MHz processor and 192MB of RAM. We hosted the virtual Android image in a Dell Precision M6300 workstation that comes with an Intel Core2 Extreme X GHz processor and 4GB of RAM. We installed "SmartphoneBench v1.5" [11], a benchmark application for Android, on both sides to evaluate their speed to draw strings, points, lines, polygons, PNGs and transparent PNGs in terms of frames per second (FPS). Figure 8. Achieving end-to-middle security Our system can be used to implement end-to-middle security as illustrated in Figure 8. Assuming that the physical smartphone establishes a secure channel with its virtual smartphone, a rouge access point cannot intercept the traffic between any mobile application installed in the virtual smartphone and the web even if the application is not encrypted. E. Other possibilities There are also many other ways to utilize our system. For example, Our system can be used to archive the less frequently used applications and free up the storage space on the physical smartphones. Our system can help users prevent their local device from accumulating unwanted residual files from trial applications. Android applications, for example, sometimes leave residual files even after they are uninstalled by the user. Developers may also take the advantage of the fact that virtual smartphones are consistently online and come up with server mobile applications that would be difficult to deploy on physical mobile smartphones. Figure 9. Comparative benchmark results The result is summarized in Figure 9. We denote the result obtained from the smartphone as "Android(ARM)" and that from the virtual image as "Android(x86)". As shown in the result, the virtual image installed on our PC constantly outperforms Android Dev Phone 1 in a drastic manner. The virtual image is at least 14 times faster when drawing lines and at most 60 times faster when drawing strings. These results suggest that our system is particular suitable for computation-intensive applications that are executed remotely on virtual smartphones, in which only the graphical results are transmitted to the physical device. B. Battery consumption We are also interested in how much battery usage we can conserve by running computation-intensive applications in a remote virtual image instead of the local physical smartphone. For the purpose of our experiment, we use a smartphone to resize a JPEG image from 800x600 to 640x480 and then adjust the sharpness of the image. We let our smartphone perform this operation continuously until the battery drains out.
5 In the first set of the experiment, we performed this operation using the local computing resources in an Android Dev Phone 1. Since the operation was performed locally, no network traffic was generated. In the second set of the experiment, we performed this operation on a remote Androidx86 image hosted in the same PC we used in the previous experiment. While computation was performed remotely, we use the client application on an Android Dev Phone 1 to continuously monitor the process over a 3G network. Since the display of the Android-x86 image frequently updates itself, a large volume of network traffic was generated and therefore consumes the battery of the Android Dev Phone. The primary objective of this experiment therefore is to compare the battery consumption of local computation with that of network access. Battery Consumption 160 Figure 11. Comparison of screen output Number of operations (x100) Remaining battery (%) Figure 10. Comparison of battery consumption Local remote Figure 11 depicts the results of our experiments. The average and maximum traffic rate generated by Windows XP with a screen size of 1024x768 is 1.1Mbps and 5.9 Mbps respectively. The average and maximum traffic rate generated by Windows XP with a screen size of 800x600 is 699 kbps and 2.4 Mbps respectively. Lastly, the average and maximum traffic rate generated by the Android-x86 image is only 148 kbps and 391 kbps respectively. The result asuggests that our system is particular suitable for wireless network such as 3G that has limited bandwidth. The result is summarized in Figure 10. The data obtained is denoted as "local" for the first set of experiment and "remote" for the second set. The x-axis represents the remaining battery while y-axis represents the number of operations performed in hundreds. When we perform the operation 100 times locally, the battery reduces from 100% to 88%. With the same amount of battery consumption, we can perform the operation 2,700 times despite the continuous network usage. We carry out this experiment until the remaining battery is only 11%, at which point we can perform this operation 600 times locally but 13,800 times remotely. The result suggests that our system may be helpful in conserving device batteries by moving computation-intensive applications to the cloud. C. Traffic rate One of the advantages of allowing users to use a remote virtual smartphone image is its small screen output size. The smaller the screen size, the smaller the amount of data traffic involved in transmitting the graphic pixels of display images across the network. To confirm this argument, we conducted experiments to measure the actual amount of traffic involved to transmit the display output of an Android-x86 image with screen size of 320x480. For comparison purposes, we also conducted experiments on Windows XP with screen size of 1024x768 and 800x600. Although it is possible to further reduce the screen size of Windows XP, most applications on Windows are designed under the assumption that the display size is at least 800x600. During each experiment, we manipulated the remote environment in such a way that the entire screen continues to update itself. VI. RELATED WORK Satyanarayanan et al. [12] outlined their vision of letting mobile users seamlessly utilize nearby computers to obtain the resources of cloud computing by instantiates a "cloudlet" that rapidly synthesizes virtual machines on nearby infrastructure that can be access through WLAN. Baratto et al presented MobiDesk [13], a virtual desktop computing hosting infrastructure that provides full featured PC desktop environment to mobile users. Potter et al presented an extension of this infrastructure they call DeskPod [14], which focuses on reliability issues. Although these literatures related to our work in terms of allowing mobile users to remotely access virtual machine images, our objective of leveraging the performance of mobile applications is different from theirs since they focus on delivering PC applications to mobile users. Our work is most closely related to Chun et al. [15] as we share similar objective and focus on mobile applications. Chun recognized five categories of augmented execution to speed up mobile applications, namely Primary, Background, Mainline, Hardware and Multiplicity and presented a research agenda to bring the vision into reality. At the time of this writing, it is not clear whether they have progressed and implemented any prototype. Their project homepage can be found in [16]. Our Virtual Smartphone over IP system can be seen as a specific implementation of the Hardware augmentation. In Section IV, we discussed the possibility of using our system as a remote sandbox to test untrusted programs. An increasing number of literatures propose to address the same security issue by detecting malware in much the same way adopted by PC users. These proposals can be categorized into
6 anomaly-based [17][18][19][20], access-control-based [21] and signature-based [22] approaches. Due to the limitations of hardware capacity, we argue that these approaches derived from the world of PC cannot be easily deployed on smartphones today. The overhead incurred by these detection programs may hamper the user experience by lagging the overall system responsiveness and consuming battery at a much faster pace. However, these approaches can be deployed on our virtual smartphone images to help users test untrusted programs. If malware is detected in an image, its user can easily revert the image to its previous clean state. VII. CONLUSION In this paper, we presented Virtual Smartphone over IP system that allows smartphone users to create virtual images of smartphones in the cloud and access these images remotely from their physical smartphone. The prototype we implemented integrates the remote environment with the local environment and allows users to run remote applications as they would locally. Through our prototype, mobile applications installed in the cloud can access sensor readings on the physical smartphone. Our prototype also boosts the performance of mobile applications by providing virtually unlimited computing resources at user s fingertips, without draining the device battery. VIII. REFERENCES [1] Dropbox - Home - Online backup, file sync and sharing made easy., [2] ZumoDrive - Enjoy your media and documents from every device, [3] Android Developers, [4] Android-x86 Project - Run Android on Your PC (Android-x86 - Porting Android to x86 ), [5] S. Töyssy and M. Helenius, About malicious software in smartphones, Journal in Computer Virology, vol. 2, Nov. 2006, pp [6] C. Fleizach, M. Liljenstam, P. Johansson, G.M. Voelker, and A. Mehes, Can you infect me now?: malware propagation in mobile phone networks, Proceedings of the 2007 ACM workshop on Recurring malcode, Alexandria, Virginia, USA: ACM, 2007, pp [7] A. Schmidt and S. Albayrak, Malicious software for smartphones, Technische Universit\ät Berlin, DAI- Labor, Tech. Rep. TUB-DAI, vol. 2, 2008, pp [8] M. Becher, F.C. Freiling, and B. Leider, On the Effort to Create Smartphone Worms in Windows Mobile, Information Assurance and Security Workshop, IAW '07. IEEE SMC, 2007, pp [9] A.-. Schmidt, H.-. Schmidt, L. Batyuk, J.H. Clausen, S.A. Camtepe, S. Albayrak, and C. Yildizli, Smartphone malware evolution revisited: Android next target?, Malicious and Unwanted Software (MALWARE), th International Conference on, 2009, pp [10] E.Y. Chen and M. Ito, Using end-to-middle security to protect against evil twin access points, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops, Kos, Greece: 2009, pp [11] SmartphoneBench 1.5 (for Android), [12] M. Satyanarayanan, V. Bahl, R. Caceres, and N. Davies, The Case for VM-based Cloudlets in Mobile Computing, IEEE Pervasive Computing, [13] R.A. Baratto, S. Potter, G. Su, and J. Nieh, MobiDesk: mobile virtual desktop computing, Proceedings of the 10th annual international conference on Mobile computing and networking, Philadelphia, PA, USA: ACM, 2004, pp [14] S. Potter and J. Nieh, Highly Reliable Mobile Desktop Computing in Your Pocket, Computer Software and Applications Conference, COMPSAC '06. 30th Annual International, 2006, pp [15] B.G. Chun and P. Maniatis, Augmented Smartphone Applications Through Clone Cloud Execution. [16] CloneCloud Project at Intel Research, [17] A. Bose, X. Hu, K.G. Shin, and T. Park, Behavioral detection of malware on mobile handsets, Proceeding of the 6th international conference on Mobile systems, applications, and services, Breckenridge, CO, USA: ACM, 2008, pp [18] H. Kim, J. Smith, and K.G. Shin, Detecting energygreedy anomalies and mobile malware variants, Proceeding of the 6th international conference on Mobile systems, applications, and services, Breckenridge, CO, USA: ACM, 2008, pp [19] A.-. Schmidt, J.H. Clausen, A. Camtepe, and S. Albayrak, Detecting Symbian OS malware through static function call analysis, Malicious and Unwanted Software (MALWARE), th International Conference on, 2009, pp [20] A. Schmidt, F. Peters, F. Lamour, C. Scheel, S.A. Çamtepe, and S. Albayrak, Monitoring smartphones for anomaly detection, Mob. Netw. Appl., vol. 14, 2009, pp [21] L. Xie, X. Zhang, A. Chaugule, T. Jaeger, and S. Zhu, Designing System-Level Defenses against Cellphone Malware, Reliable Distributed Systems, SRDS '09. 28th IEEE International Symposium on, 2009, pp [22] Z. Cheng, Mobile Malware: Threats and Prevention, McAfee Avert.
MOBILE APPLICATION WITH CLOUD COMPUTING
International Journal of Scientific and Research Publications, Volume 2, Issue 4, April 2012 1 MOBILE APPLICATION WITH CLOUD COMPUTING V.L.DIVYA M.E, COMPUTER SCIENCE AND ENGINEERING ANAND INSTITUTE OF
Mobile Cloud Computing for Data-Intensive Applications
Mobile Cloud Computing for Data-Intensive Applications Senior Thesis Final Report Vincent Teo, [email protected] Advisor: Professor Priya Narasimhan, [email protected] Abstract The computational and storage
Desktop Virtualization. The back-end
Desktop Virtualization The back-end Will desktop virtualization really fit every user? Cost? Scalability? User Experience? Beyond VDI with FlexCast Mobile users Guest workers Office workers Remote workers
Desktop Virtualization Technologies and Implementation
ISSN : 2250-3021 Desktop Virtualization Technologies and Implementation Pranit Patil 1, Shakti Shekar 2 1 ( Mumbai, India) 2 (Mumbai, India) ABSTRACT Desktop virtualization is new desktop delivery method
Mobile Virtual Network Computing System
Mobile Virtual Network Computing System Vidhi S. Patel, Darshi R. Somaiya Student, Dept. of I.T., K.J. Somaiya College of Engineering and Information Technology, Mumbai, India ABSTRACT: we are planning
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Cascade Collaboration Solutions 5 Aug 2014
Cascade Collaboration Solutions 5 Aug 2014 5530001600 Rev 03 Contents 1. Solution Overview... 3 2. Collaboration End Points... 5 3. Collaboration Cloud Server... 7 4. Technical Specifications... 8 4.1.
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
User Manual Version 0.9.9.p BETA III December 23rd, 2015
User Manual Version 0.9.9.p BETA III December 23rd, 2015 Disclaimer: This document is provided as-is. Information and views expressed in this document, including URL and other Internet website references,
Chapter 12: Windows XP, Vista, and 7
Chapter 12: Windows XP, Vista, and 7 Complete CompTIA A+ Guide to PCs, 6e To distinguish between the Windows XP, Vista, and 7 operating systems To install, configure, and troubleshoot Windows XP, Vista,
VMware Server 2.0 Essentials. Virtualization Deployment and Management
VMware Server 2.0 Essentials Virtualization Deployment and Management . This PDF is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved.
Application Compatibility Best Practices for Remote Desktop Services
Application Compatibility Best Practices for Remote Desktop Services Introduction Remote Desktop Services in Windows Server 2008 R2 allows Windows Server to be accessed by multiple users concurrently to
Design a Scalable Virtual Desktop Infrastructure
Design a Scalable Virtual Desktop Infrastructure Ranganath GK, Technology Consultant, VCP VMware India. 6 th November 2008 Basics of Virtual Desktop Infrastructure (VDI) Ease of provisioning Migration
Endpoint protection for physical and virtual desktops
datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become
Here is a demonstration of the Aqua Accelerated Protocol (AAP) software see the Aqua Connect YouTube Channel
OS X Terminal Server The Marriott Library, Computer & Media Services has a OS X Terminal Server running software from Aqua Connect, see web site http://www.aquaconnect.net/. This enables the OS X operating
Propalms TSE Deployment Guide
Propalms TSE Deployment Guide Version 7.0 Propalms Ltd. Published October 2013 Overview This guide provides instructions for deploying Propalms TSE in a production environment running Windows Server 2003,
Hypervisor Software and Virtual Machines. Professor Howard Burpee SMCC Computer Technology Dept.
Hypervisor Software and Virtual Machines Learning Objectives Understand the common features of today s desktop virtualization products Select and implement a desktop virtualization option on a Linux, Mac,
Hardware and Software Requirements. Release 7.5.x PowerSchool Student Information System
Release 7.5.x PowerSchool Student Information System Released October 2012 Document Owner: Documentation Services This edition applies to Release 7.5.x of the PowerSchool software and to all subsequent
AdminToys Suite. Installation & Setup Guide
AdminToys Suite Installation & Setup Guide Copyright 2008-2009 Lovelysoft. All Rights Reserved. Information in this document is subject to change without prior notice. Certain names of program products
Terminal Server Software and Hardware Requirements. Terminal Server. Software and Hardware Requirements. Datacolor Match Pigment Datacolor Tools
Terminal Server Software and Hardware Requirements Datacolor Match Pigment Datacolor Tools January 21, 2011 Page 1 of 8 Introduction This document will provide preliminary information about the both the
WHITE PAPER. AirGap. The Technology That Makes Isla a Powerful Web Malware Isolation System
AirGap The Technology That Makes Isla a Powerful Web Malware Isolation System Introduction Web browsers have become a primary target for cyber attacks on the enterprise. If you think about it, it makes
Server Based Desktop Virtualization with Mobile Thin Clients
Server Based Desktop Virtualization with Mobile Thin Clients Prof. Sangita Chaudhari Email: [email protected] Amod N. Narvekar Abhishek V. Potnis Pratik J. Patil Email: [email protected]
Mobile Image Offloading Using Cloud Computing
Mobile Image Offloading Using Cloud Computing Chintan Shah, Aruna Gawade Student, Dept. of Computer., D.J.Sanghvi College of Engineering, Mumbai University, Mumbai, India Assistant Professor, Dept. of
Evading Android Emulator
Evading Android Emulator Thanasis Petsas [email protected] [email protected] - www.syssec-project.eu 1 What is a Virtual Machine? A software based computer that functions like a physical machine A
Remote PC Guide Series - Volume 1
Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
CELLS A Virtual Mobile Smartphone Architecture
CELLS A Virtual Mobile Smartphone Architecture Jeremy Andrus, Christoffer Dall, Alexander Van t Hof, Oren Laadan, Jason Nieh Columbia University 23rd ACM Symposium on Operating Systems Principles, Cascais,
IOS110. Virtualization 5/27/2014 1
IOS110 Virtualization 5/27/2014 1 Agenda What is Virtualization? Types of Virtualization. Advantages and Disadvantages. Virtualization software Hyper V What is Virtualization? Virtualization Refers to
Parallels Virtuozzo Containers
Parallels Virtuozzo Containers White Paper Virtual Desktop Infrastructure www.parallels.com Version 1.0 Table of Contents Table of Contents... 2 Enterprise Desktop Computing Challenges... 3 What is Virtual
Systems Manager Cloud Based Mobile Device Management
Datasheet Systems Manager Systems Manager Cloud Based Mobile Device Management Overview Meraki Systems Manager provides cloud-based over-the-air centralized management, diagnostics, and monitoring of the
Mobile Cloud Computing: Critical Analysis of Application Deployment in Virtual Machines
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Mobile Cloud Computing: Critical Analysis of Application Deployment
Keywords Mobile Cloud Operating System (MCOS), Distributed Cloud Operating System, Garbage mobile phone, Cloud Operating System
Volume 5, Issue 5, May 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com A Futuristic Approach:
Remote Desktop on Mobile
Remote Desktop on Mobile SonamGavhane RasikaPhanse Monica Sadafule B.W.Balkhande Abstract In This paper we will see how the remote Desktop with static IP can be accessed using Android based mobile phones,to
Guideline on Safe BYOD Management
CMSGu2014-01 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Safe BYOD Management National Computer Board Mauritius Version
Accelerating Microsoft Windows 7 migrations with Citrix XenApp
Citrix XenApp and Microsoft Windows 7 White Paper Accelerating Microsoft Windows 7 migrations with Citrix XenApp XenApp will accelerate your Windows 7 migration, save money and resources, minimize disruption
OpenScape Web Collaboration
OpenScape Web Collaboration Give your teams a better way to meet Enabling the Bring-Your-Device-to-Work era OpenScape Web Collaboration is a scalable, reliable, and highly secure web conferencing solution
Information. OpenScape Web Collaboration V7
Information OpenScape Web Collaboration V7 OpenScape Web Collaboration V7 is a scalable, reliable, and highly secure web conferencing solution for enterprises of all sizes. It provides a cost-effective
DCPS STUDENT OPTION HOME USE PROGRAM SIGN UP INSTRUCTIONS
DCPS STUDENT OPTION HOME USE PROGRAM SIGN UP INSTRUCTIONS Step-by-Step Abstract The Enrollment for Education Solutions agreement between Microsoft and Duval County Public Schools provides a student option
Cisco IP Communicator (Softphone) Compatibility
Cisco IP Communicator (Softphone) Compatibility Cisco IP Communicator is Windows based and works on both XP and Vista The minimum PC requirements for use with Microsoft Windows XP are: Microsoft Windows
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All
Symantec Endpoint Protection 12.1.5 Datasheet
Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that
Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
An Esri White Paper June 2010 Tracking Server 10
An Esri White Paper June 2010 Tracking Server 10 Esri 380 New York St., Redlands, CA 92373-8100 USA TEL 909-793-2853 FAX 909-793-5953 E-MAIL [email protected] WEB www.esri.com Copyright 2010 Esri All rights
Empowering Developers to Estimate App Energy Consumption. Radhika Mittal, UC Berkeley Aman Kansal & Ranveer Chandra, Microsoft Research
Empowering Developers to Estimate App Energy Consumption Radhika Mittal, UC Berkeley Aman Kansal & Ranveer Chandra, Microsoft Research Phone s battery life is critical performance and user experience metric
Technical Brief. Userful Multiplatform Desktop Virtualization Software
Technical Brief Userful Multiplatform Desktop Virtualization Software 11.04.2014 SUMMARY: This Technical Brief will summarize the installation and set up of Userful Multiplatform desktop virtualization
LanSchool 7.7. Classroom Management Software Installation Guide for the Teacher s Assistant on the ipad, iphone, ipod
LanSchool 7.7 Classroom Management Software Installation Guide for the Teacher s Assistant on the ipad, iphone, ipod Page 1 Table of Contents Table of Contents 2 About LanSchool v7.7 for the ipad 3 Supported
LASTLINE WHITEPAPER. In-Depth Analysis of Malware
LASTLINE WHITEPAPER In-Depth Analysis of Malware Abstract Malware analysis is the process of determining the purpose and functionality of a given malware sample (such as a virus, worm, or Trojan horse).
FileMaker Server 10. Getting Started Guide
FileMaker Server 10 Getting Started Guide 2007-2009 FileMaker, Inc. All rights reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker, the file folder logo, Bento and
Enterprise-class desktop virtualization with NComputing. Clear the hurdles that block you from getting ahead. Whitepaper
Enterprise-class desktop virtualization with NComputing Clear the hurdles that block you from getting ahead Whitepaper Introduction Enterprise IT departments are realizing virtualization is not just for
Mobile Hybrid Cloud Computing Issues and Solutions
, pp.341-345 http://dx.doi.org/10.14257/astl.2013.29.72 Mobile Hybrid Cloud Computing Issues and Solutions Yvette E. Gelogo *1 and Haeng-Kon Kim 1 1 School of Information Technology, Catholic University
Lexia Network Installation Instructions
Lexia Network Installation Instructions For Lexia Early Reading 3.x, Primary Reading 1.x, Foundation Reading 1.x, Strategies for Older Students 4.x, Cross-Trainer 1.x and Quick Reading Test 2.x (NOT for
Handling Multimedia Under Desktop Virtualization for Knowledge Workers
Handling Multimedia Under Desktop Virtualization for Knowledge Workers Wyse TCX Multimedia capabilities deliver the applications and performance required, for less A white paper by Wyse Technology Inc.
Modeling the Mobile Application Development Lifecycle
, March 12-14, 2014, Hong Kong Modeling the Mobile Application Development Lifecycle Tejas Vithani, Member, IAENG and Anand Kumar Abstract Software Development Lifecycle is crucial in Desktop or web application
5 Steps to Advanced Threat Protection
5 Steps to Advanced Threat Protection Agenda Endpoint Protection Gap Profile of Advanced Threats Consensus Audit Guidelines 5 Steps to Advanced Threat Protection Resources 20 Years of Chasing Malicious
Anti-Virus Power Consumption Trial
Anti-Virus Power Consumption Trial Executive Summary Open Market Place (OMP) ISSUE 1.0 2014 Lockheed Martin UK Integrated Systems & Solutions Limited. All rights reserved. No part of this publication may
CA Anti-Virus r8.1. Benefits. Overview. CA Advantage
PRODUCT BRIEF: CA ANTI-VIRUS CA Anti-Virus r8.1 CA ANTI-VIRUS IS THE NEXT GENERATION IN COMPREHENSIVE ANTI-VIRUS SECURITY FOR BUSINESS PCS, SERVERS AND PDAS. IT COMBINES PROACTIVE PROTECTION AGAINST MALWARE
IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications
Open System Laboratory of University of Illinois at Urbana Champaign presents: Outline: IMCM: A Flexible Fine-Grained Adaptive Framework for Parallel Mobile Hybrid Cloud Applications A Fine-Grained Adaptive
SeeTec ExpansionPackage
SeeTec ExpansionPackage Contents Contents 1 SeeTec WebClient...1 1.1 System requirements... 2 1.1.1 Server requirements for Apache HTTP Server, SeeTec TranscodingEngine (STE) and SeeTec ApplicationGateway
Dragon NaturallySpeaking and citrix. A White Paper from Nuance Communications March 2009
Dragon NaturallySpeaking and citrix A White Paper from Nuance Communications March 2009 Introduction As the number of deployed enterprise applications increases, organizations are seeking solutions that
VMware/Hyper-V Backup Plug-in User Guide
VMware/Hyper-V Backup Plug-in User Guide COPYRIGHT No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying,
Symantec Backup Exec.cloud
Automatic, continuous, and secure protection that backs up data to the cloud, or via a hybrid approach combining on-premise and cloud-based backup. Data Sheet: Symantec.cloud Only 21 percent of SMBs are
Simplify VDI and RDS Private Clouds for SMBs
PRODUCT BRIEF Simplify VDI and RDS Private Clouds for SMBs VDI Private Cloud Konect Elite is an application and virtual desktop delivery software that offers the ability to dynamically sync, create, configure,
7 Things You Need to Know about Virtual Mobile Infrastructure
7 Things You Need to Know about Virtual Mobile Infrastructure Executive Summary Employees are bringing their phones and tablets to work in droves. This tidal wave of unmanaged devices has forced IT departments
A+ Practical Applications Solution Key
A+ Practical Applications Solution Key Module 1 Assignment: Introducing Microsoft Windows - answer the following questions: 1. What attributes are available in the NTFS file system that are not available
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Mobile Operating Systems. Week I
Mobile Operating Systems Week I Overview Introduction Mobile Operating System Structure Mobile Operating System Platforms Java ME Platform Palm OS Symbian OS Linux OS Windows Mobile OS BlackBerry OS iphone
Comparison of Open Source Cloud System for Small and Medium Sized Enterprises
, pp.276-282 http://dx.doi.org/10.14257/astl.2014.51.63 Comparison of Open Source Cloud System for Small and Medium Sized Enterprises Yasuo Uchida 1, Seigo Matsuno 1, Makoto Sakamoto 2 1 Ube National College
2014 Teradici Corporation.
VDI Client Comparison Thick, Thin, and PCoIP Zero Clients Agenda > Thick, Thin, and PCoIP Zero Clients > Repurposed PCs to Thin Clients > Thin Clients > PCoIP Zero Clients > Total Cost of Ownership Review
IST STREP Project. Deliverable D3.3.1u Middleware User s Guide Multi-Radio Device Management Layer. http://www.ist-plastic.org
IST STREP Project Deliverable D3.3.1u Middleware User s Guide Multi-Radio Device Management Layer http://www.ist-plastic.org Project Number : IST-26955 Project Title : PLASTIC Deliverable Type : Report
Mobile Cloud Computing: Survey & Discussion. Jianting Yue Sep 27, 2013
Mobile Cloud Computing: Survey & Discussion Jianting Yue Sep 27, 2013 1 Outline Lead-in Definition Main Functions Architecture Computation Offloading: an example Challenges Potential Ideas Summary 2 3
Windows Server Virtualization & The Windows Hypervisor
Windows Server Virtualization & The Windows Hypervisor Brandon Baker Lead Security Engineer Windows Kernel Team Microsoft Corporation Agenda - Windows Server Virtualization (WSV) Why a hypervisor? Quick
Chapter 14 Virtual Machines
Operating Systems: Internals and Design Principles Chapter 14 Virtual Machines Eighth Edition By William Stallings Virtual Machines (VM) Virtualization technology enables a single PC or server to simultaneously
Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows
Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Business Systems, Inc. 2645 Townsgate Road, Suite 200 Westlake Village, CA 91361 2013 Compulink
Chapter 19 Cloud Computing for Multimedia Services
Chapter 19 Cloud Computing for Multimedia Services 19.1 Cloud Computing Overview 19.2 Multimedia Cloud Computing 19.3 Cloud-Assisted Media Sharing 19.4 Computation Offloading for Multimedia Services 19.5
Core Protection for Virtual Machines 1
Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform
Benchmarking the Performance of XenDesktop Virtual DeskTop Infrastructure (VDI) Platform Shie-Yuan Wang Department of Computer Science National Chiao Tung University, Taiwan Email: [email protected]
Technical White Paper BlackBerry Enterprise Server
Technical White Paper BlackBerry Enterprise Server BlackBerry Enterprise Edition for Microsoft Exchange For GPRS Networks Research In Motion 1999-2001, Research In Motion Limited. All Rights Reserved Table
SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX
White Paper SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX Abstract This white paper explains the benefits to the extended enterprise of the on-
VIA CONNECT PRO Deployment Guide
VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...
Mobile Cloud Computing: A Comparison of Application Models
Volume 1, Issue 1 ISSN: 2320-5288 International Journal of Engineering Technology & Management Research Journal homepage: www.ijetmr.org Mobile Cloud Computing: A Comparison of Application Models Nidhi
EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices
EXECUTIVE SUMMARY Cloud Backup for Endpoint Devices According to Gartner, by 2015 more than 60% of enterprises will have suffered material loss of sensitive corporate data via mobile devices. Armed with
Merge CADstream. For IT Professionals. Merge CADstream,
Merge CADstream For IT Professionals Merge CADstream, the standard in CAD, automates the analysis of MRI studies and improves interpretation, reporting and interventional planning workflow. It s available
A Practical Analysis of Smartphone Security*
A Practical Analysis of Smartphone Security* Woongryul Jeon 1, Jeeyeon Kim 1, Youngsook Lee 2, and Dongho Won 1,** 1 School of Information and Communication Engineering, Sungkyunkwan University, Korea
Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite
WHITE PAPER Mobile Device Security in the Enterprise Deploy secure, corporate access for mobile device users with the Junos Pulse Mobile Security Suite Copyright 2010, Juniper Networks, Inc. Table of Contents
Compulink Advantage Online TM
Compulink Advantage Online TM COMPULINK ADVANTAGE ONLINE TM INSTALLATION, CONFIGURATION AND PERFORMANCE GUIDE FOR WINDOWS (Revised 07/08/2011) 2011 Compulink Business Systems, Inc. All rights reserved
Cloud Backup and Recovery for Endpoint Devices
Cloud Backup and Recovery for Endpoint Devices Executive Summary Armed with their own devices and faster wireless speeds, your employees are looking to access corporate data on the move. They are creating,
