Download and Run the RFB Client Applet

Total Page:16

File Type:pdf, Size:1020Kb

Download and Run the RFB Client Applet City Research Online City, University of London Institutional Repository Citation: Al-Malki, Dana Mohammed (2006). Development of virtual network computing (VNC) environment for networking and enhancing user experience. (Unpublished Doctoral thesis, City University London) This is the draft version of the paper. This version of the publication may differ from the final published version. Permanent repository link: https://openaccess.city.ac.uk/id/eprint/18319/ Link to published version: Copyright: City Research Online aims to make research outputs of City, University of London available to a wider audience. Copyright and Moral Rights remain with the author(s) and/or copyright holders. URLs from City Research Online may be freely distributed and linked to. Reuse: Copies of full items can be used for personal research or study, educational, or not-for-profit purposes without prior permission or charge. Provided that the authors, title and full bibliographic details are credited, a hyperlink and/or URL is given for the original metadata page and the content is not changed in any way. City Research Online: http://openaccess.city.ac.uk/ [email protected] School of Engineering and Mathematical Sciences Development of Virtual Network Computing (VNC) Environment for Networking and Enhancing User Experience Dana Mohammed Al‐Malki Supervisor: Dr S.H.Khan A thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Information Engineering August 2006 i Abstract Abstract Virtual Network Computing (VNC) is a thin client developed by Real VNC Ltd, Formerly of Olivetti Research Ltd/AT&T labs Cambridge and can be used as a collaborative environment, therefore it has been chosen as the basis of this research study. The purpose of this thesis is to investigate and develop a VNC based environment over the network and to improve the users’ Quality of Experience (QoE) of using VNC between networked groups by the incorporation of videoconferencing with VNC and enhancing QoE in Mobile environments where the network status is far from ideal and is prone to disconnection. This thesis investigates the operation of VNC in different environments and scenarios such as wireless environments by investigating user and device mobility and ways to sustain their seamless connection when in motion. As part of the study I also researched all groups that implement VNC like universities, research groups and laboratories and virtual laboratories. In addition to that I identified the successful features and security measures in VNC in order to create a secure environment. This was achieved by pinpointing the points of strength and weakness in VNC as opposed to popular thin clients and remote control applications and analysing VNC according to conforming to several security measures. Furthermore, it is reasonable to say that the success of any scheme that attempts to deliver desirable levels of Quality of Service (QoS) of an effective application for the future Internet must be based, not only on the progress of technology, but on usersʹ requirements. For instance, a collaborative environment has not yet reached the desired expectation of its users since it is not capable of handling any unexpected events which can result from a sudden disconnection of a nomadic user engaged in an ongoing collaborative session; this is consequently associated with breaking the social dynamics of the group collaborating in the session. Therefore, I have concluded that knowing the social dynamics of application’s users as a group and their requirements and expectations of a successful experience can lead an application designer to exploit technology to autonomously support the initiating and maintaining of social interaction. Moreover, I was able to successfully develop a VNC based environment for networked groups that facilitates the administration of different remote VNC sessions. In addition to a prototype that uses videoconferencing in parallel to VNC to provide a better user’s QoE of VNC. The last part of the thesis was concerned with designing a framework to improve and assess QoE of all users in a collaborative environment where it can be especially applied in the presence of nomadic clients with their much frequent disconnections. I have designed a conceptual algorithm called Improved Collaborative Quality of Experience (IC‐QoE), an algorithm that aims to eliminate frustration and improve QoE of users in a collaborative session in the case of disconnections and examined its use and benefits in real world scenarios such as research teams and implemented a prototype to present the concepts of this algorithm. Finally, I have designed a framework to suggest ways to evaluate this algorithm. ii Acknowledgment Acknowledgement To begin with, I would like to offer my thanks and gratitude to Dr S H Khan, who has supervised, guided, advised and had faith in me and who has been a good mentor, counsellor and friend throughout the past years. I would also like to thank my parents and siblings who encouraged, motivated and had faith in me, my mother for offering me encouragement and not giving up on me, my father for tolerating, with all the support he has, my long absence to pursuit my studies, my brother and sisters who were my solid rock. I would like to add special thanks to my sister Amal for always being there and for her continued patience and understanding through the years where with her support things got easier to handle. I also would like to mention Dr Veselin Rakocevic for his valuable guidance in the last year of the thesis and his helpful comments and suggestions. I would like to thank the cultural attaché of Qatar, and especially His highness Mr Nasser Al‐Khalifa, who was Qatar’s ambassador in London through most of the period of my studies and is currently Qatar’s ambassador in Washington, for believing in my capabilities and giving me the chance to prove them. Finally, I would like to thank the RealVNC mailing list for their help. iii Declaration Declaration I grant powers of discretion to the University Librarian to allow this thesis to be copied in whole or in part without further reference to the author. This permission covers only single copies made for study purposes, subject to normal conditions of acknowledgements iv Abbreviations Abbreviations 2G: Second Generation Wireless 3G: Third Generation Wireless AMPS: Advanced Mobile Phone System ASP: Application Service Provision ATM: Asynchronous Transfer Mode AWT: Java Abstract Windowing Toolkit BER: Bit Error Rate BS: Base Station CAD: Computer Aided Design CC: Cellular Communication CDMA: Code division multiple access CDPD: Cellular Digital Packet Data CE: Collaborative environment CN: Correspondent Node CoA: Care‐of‐Address CSCW: Computer Supported Cooperative Work DTP: Digital Publishing DUPACK: Duplicate Acknowledgments FA: Foreign Agent FEC: Forward Error Correction GNOME: GNU Object Model Environment GUI: Graphical User Interface GSM: Global System for Mobile Communications GPRS: General Packet Radio Service HA: Home Agent HCI: Human‐Computer Interaction v Abbreviations HTML: Hypertext Mark‐up Language HTTP: Hypertext Transfer Protocol IC‐QoE: Improved Collaborative Environment IP: Internet Protocol ISDN: Integrated Services Digital Network IWF: Interworking Function KDE: K Desktop Environment LCD: liquid crystal display LDAP: Lightweight Directory Access Protocol LLC: Logical Link Control MAC: Media Access Control MAHO: Mobile‐assisted Handover MDAC: Microsoft Data Access Components MN: Mobile Node MSC: Mobile Switching centre MTSO: Mobile Telephone Switching Office NACK: Negative Acknowledgment NCHO: Network‐controlled Handover NDS: Novell Directory Services PCS: Personal Communication Services PDA: Personal Digital Assistant PPP: Point‐to‐Point Protocol QoS: Quality of Service QoE: Quality of Experience QoT: Quality of Transmission RDP: Remote Desktop Protocol RFB: Remote Frame Buffer RLP: Radio Link Protocol RSSHT: Relative Signal Strength Hysteresis and Threshold vi Abbreviations RTO: Retransmission Timeout RTT: Round trip time SACK: Selective Acknowledgment SLIP: Serial Line Internet Protocol SNR: Signal‐to‐Noise Ratio TCO: Total Cost of Ownership TDMA: Time division multiple access TCP/IP: Transmission Control Protocol/Internet Protocol UMTS: Universal Mobile Telecommunications System VNC: Virtual Network Computing W‐LAN: Wireless Local Area Network W‐WAN: Wireless Wide Area Network WYSIWIS: What You See Is What I See ZWA: Zero Window Advertisement ZWP: Zero Window Probe vii List of Figures List of Figures Figure 2.1 TCP/IP Protocol Suite........................................................................................... 12 Figure 2.2 TCP Packet Header................................................................................................ 16 Figure 2.3 Client/server application process actions and TCP [3]..................................... 19 Figure 2.4 Client/server application, using connection‐oriented transport services [7] 20 Figure 2.5 Routing for mobile hosts ...................................................................................... 27 Figure 2.6 Decision points during layer 2 handoff process................................................ 32 Figure 2.7 Connectivity between CC systems and the Internet [30]................................. 39 Figure 2.8 TCP solutions for wireless networks [37]........................................................... 43 Figure 3.1 X window system block diagram [50] ..............................................................
Recommended publications
  • Software Catalog for Patch Management and Software Deployment 
    Software Catalog for Patch Management and Software Deployment Find all supported 3rd party applications that can be patched and deployed in Monitoring & Asset Management below. Click on a software to get a more detailed view of the respective versions. (Last Update: 2021/03/23) Vendors # Citrix 4 7-Zip 4 Code4ward.net 5 A CoreFTP 5 Acro 4 Corel 5 Adobe 4 CrowdStrike, Inc 5 AdoptOpenJDK 4 D AIMP Dev Team 4 dotPDN LLC 5 Amazon Services LLC 4 Dropbox 5 Apache Software Foundation 4 E Apple 4 Evernote Corporation 5 Atlassian 4 F Audacity 4 FileZilla 5 Azul Systems, Inc 4 Foxit Corporation 5 B G Bandicam Company 4 GIT 5 Barco, Inc 4 GIMP.org 5 BlueJeans Network, Inc. 4 Glavsoft 5 Botkind, Inc. 4 Google 5 Box.com 4 Gretech Corp 5 C Inkscape 5 CDBurnerXP 4 IrfanView 5 Cisco 4 Software Catalog for Patch Management and Software Deployment J P Jabra 5 PeaZip 10 JAM Software 5 Pidgin 10 Juraj Simlovic 5 Piriform 11 K Plantronics, Inc. 11 KeePass 5 Plex, Inc 11 L Prezi Inc 11 LibreOffice 5 Programmer‘s Notepad 11 Lightning UK 5 PSPad 11 LogMeIn, Inc. 5 Q M QSR International 11 Malwarebytes Corporation 5 Quest Software, Inc 11 Microsoft 6 R MIT 10 R Foundation 11 Morphisec 10 RarLab 11 Mozilla Foundation 10 Real 11 N RealVNC 11 Neevia Technology 10 RingCentral, Inc. 11 NextCloud GmbH 10 S Nitro Software, Inc. 10 Scooter Software, Inc 11 Nmap Project 10 Siber Systems 11 Node.js Foundation 10 Simon Tatham 11 Notepad++ 10 Skype Technologies S.A.
    [Show full text]
  • Realvnc @ LC August 2018 LC User Meeting
    RealVNC @ LC August 2018 LC User Meeting Cameron Harr Title (optional) Aug. 21, 2018 LLNL-PRES-XXXXXX This work was performed under the auspices of the U.S. Department of Energy by Lawrence Livermore National Laboratory under contract DE-AC52-07NA27344. Lawrence Livermore National Security, LLC RealVNC @ LC § What is RealVNC? § What did we have? § What do we have now? § What’s coming in the future? § How do you use it? 2 LLNL-PRES-xxxxxx Cloud versus direct with VNC Connect VNC Connect is unique among remote access software in its ability to offer both cloud and direct connectivity methods within a single product. At first glance, knowing whether to connect directly or via our cloud service can seem confusing. However, there are clear benefits to each connection method. The trick is knowing how to maximize these benefits. This brief product guide provides an overview of the differences between cloud and direct connectivity, and offers some advice on how each method can be used to your greatest advantage. Key terminology Throughout this guide, we refer to certain RealVNC-specific terminology. VNC Connect is comprised of two separate apps: VNC Server and VNC Viewer. You must install and license VNC Server on the computer you want to control. This is known as your VNC Server computer. You must then install VNC Viewer on the computer or device you want to take control from, which is known as your VNC Viewer device. You do not need to license this device, meaning you can freely connect to your VNC Server computer from as many devices as you wish.
    [Show full text]
  • VNC Connect Security Whitepaper
    VNC Connect security whitepaper VNC Connect security whitepaper Version 1.3 Contents Contents .................................................................................................................................................................... 2 Introduction ............................................................................................................................................................... 3 Security architecture ................................................................................................................................................. 4 Cloud infrastructure ................................................................................................................................................... 7 Client security ........................................................................................................................................................... 9 Development procedures ........................................................................................................................................ 12 Summary ................................................................................................................................................................. 13 VNC Connect security whitepaper Introduction Customer security is of paramount importance to RealVNC. As such, our security strategy is ingrained in all aspects of our VNC Connect software. We have invested extensively in our security, and take great pride in our successful
    [Show full text]
  • Netsupport Manager 12.50
    NetSupport Manager 12.50 Getting Started Guide Copyright© 2017 NetSupport Ltd All rights reserved Contents DEFINITIONS............................................................... 4 Installation .................................................................. 4 System Prerequisites ........................................................ 4 Planning an Installation .................................................... 6 Starting the Installation .................................................... 7 NetSupport Licence Agreement .......................................... 8 Licence Information ......................................................... 8 Select Setup Type ............................................................ 8 Custom Setup ................................................................. 9 Ready to Install ............................................................. 11 Installation Complete ..................................................... 12 Existing Installation Detected .......................................... 12 Uninstalling NetSupport Manager ..................................... 13 Evaluation Kit ................................................................ 13 Advanced Installation ................................................ 15 Creating an administrative (network) installation ............... 15 Silent/Unattended Installations ........................................ 16 Install Configuration Options dialog ............................. 17 NetSupport Manager Deploy – NetSupport Manager’s Remote
    [Show full text]
  • Superhero League of Hoboken
    Special "Orbs ft Stuff" lssuc Not sold in Hoboken Superhero League of Hoboken rom the incorrigibly twisted he plants to make the Jersey City what Meretzky will do with the idea. mind of madcap Steve Meretzky; Marketplace uninhabitable. A com­ Instead of facing Dragons and Super Hero League of Hoboken puter named Matilda lisFs several Wizards in combat, you'll fight F missions Albino marks his first foray into the realm of role-playing. This hybrid combines thatimust Winos, elements of the animated adventure be fulfilled Lawyers system used in such games as in various and Tricky Meretzky's Sorcerer's University with parts of Dick RPG-style combat sequences, which America's mutants. In also makes it a first for Legend north east­ one battle, Entertainment. ern sector. a lawyer Taking place 200 years in the After you issued an future, Hoboken is set in a world finish all injunction populated by mutants. Radiation, the level against toxic waste and a plethora of 0.]. one mis­ Tropical Simpson jokes have plunged the s10ns, a Oil Man­ world in a new Dark Age, and it's up new set of who retali­ to you to save America. As the harder ones miiiiliiltiil~;;;: ated by Crimson Tape, you lead the Hoboken are posted. 1ssumg a chapter of the Super Hero League - The slick "point and quest" inter­ stream of saliva at the lawyer. The and appropriately so, for your prima­ face of previous Legend games is even lawyer's dying words were: "I think ry superpower is the ability to Create slicker in this incarnation.
    [Show full text]
  • Free Open Source Vnc
    Free open source vnc click here to download TightVNC - VNC-Compatible Remote Control / Remote Desktop Software. free for both personal and commercial usage, with full source code available. TightVNC - VNC-Compatible Remote Control / Remote Desktop Software. It's completely free but it does not allow integration with closed-source products. UltraVNC: Remote desktop support software - Remote PC access - remote desktop connection software - VNC Compatibility - FileTransfer - Encryption plugins - Text chat - MS authentication. This leading-edge, cloud-based program offers Remote Monitoring & Management, Remote Access &. Popular open source Alternatives to VNC Connect for Linux, Windows, Mac, Self- Hosted, BSD and Free Open Source Mac Windows Linux Android iPhone. Download the original open source version of VNC® remote access technology. Undeniably, TeamViewer is the best VNC in the market. Without further ado, here are 8 free and some are open source VNC client/server. VNC remote access software, support server and viewer software for on demand remote computer support. Remote desktop support software for remote PC control. Free. All VNCs Start from the one piece of source (See History of VNC), and. TigerVNC is a high- performance, platform-neutral implementation of VNC (Virtual Network Computing), Besides the source code we also provide self-contained binaries for bit and bit Linux, installers for Current list of open bounties. VNC (Virtual Network Computing) software makes it possible to view and fully- interact with one computer from any other computer or mobile. Find other free open source alternatives for VNC. Open source is free to download and remember that open source is also a shareware and freeware alternative.
    [Show full text]
  • List of NMAP Scripts Use with the Nmap –Script Option
    List of NMAP Scripts Use with the nmap –script option Retrieves information from a listening acarsd daemon. Acarsd decodes ACARS (Aircraft Communication Addressing and Reporting System) data in real time. The information retrieved acarsd-info by this script includes the daemon version, API version, administrator e-mail address and listening frequency. Shows extra information about IPv6 addresses, such as address-info embedded MAC or IPv4 addresses when available. Performs password guessing against Apple Filing Protocol afp-brute (AFP). Attempts to get useful information about files from AFP afp-ls volumes. The output is intended to resemble the output of ls. Detects the Mac OS X AFP directory traversal vulnerability, afp-path-vuln CVE-2010-0533. Shows AFP server information. This information includes the server's hostname, IPv4 and IPv6 addresses, and hardware type afp-serverinfo (for example Macmini or MacBookPro). Shows AFP shares and ACLs. afp-showmount Retrieves the authentication scheme and realm of an AJP service ajp-auth (Apache JServ Protocol) that requires authentication. Performs brute force passwords auditing against the Apache JServ protocol. The Apache JServ Protocol is commonly used by ajp-brute web servers to communicate with back-end Java application server containers. Performs a HEAD or GET request against either the root directory or any optional directory of an Apache JServ Protocol ajp-headers server and returns the server response headers. Discovers which options are supported by the AJP (Apache JServ Protocol) server by sending an OPTIONS request and lists ajp-methods potentially risky methods. ajp-request Requests a URI over the Apache JServ Protocol and displays the result (or stores it in a file).
    [Show full text]
  • Unpermitted Resources
    Process Check and Unpermitted Resources Common and Important Virtual Machines Parallels VMware VirtualBox CVMCompiler Windows Virtual PC Other Python Citrix Screen/File Sharing/Saving .exe File Name VNC, VPN, RFS, P2P and SSH Virtual Drives ● Dropbox.exe ● Dropbox ● OneDrive.exe ● OneDrive ● <name>.exe ● Google Drive ● etc. ● iCloud ● etc. Evernote / One Note ● Evernote_---.exe ● onenote.exe Go To Meeting ● gotomeeting launcher.exe / gotomeeting.exe TeamViewer ● TeamViewer.exe Chrome Remote ● remoting_host.exe www.ProctorU.com ● [email protected] ● 888­355­3043 ​ ​ ​ ​ ​ ​ ​ Messaging / Video (IM, IRC) / .exe File Name Audio Bonjour Google Hangouts (chrome.exe - shown as a tab) (Screen Sharing) Skype SkypeC2CPNRSvc.exe Music Streaming ● Spotify.exe (Spotify, Pandora, etc.) ● PandoraService.exe Steam Steam.exe ALL Processes Screen / File Sharing / Messaging / Video (IM, Virtual Machines (VM) Other Saving IRC) / Audio Virtual Box Splashtop Bonjour ● iChat ● iTunes ● iPhoto ● TiVo ● SubEthaEdit ● Contactizer, ● Things ● OmniFocuse phpVirtualBox TeamViewer MobileMe Parallels Sticky Notes Team Speak VMware One Note Ventrilo Windows Virtual PC Dropbox Sandboxd QEM (Linux only) Chrome Remote iStumbler HYPERBOX SkyDrive MSN Chat Boot Camp (dual boot) OneDrive Blackboard Chat CVMCompiler Google Drive Yahoo Messenger Office (Word, Excel, Skype etc.) www.ProctorU.com ● [email protected] ● 888­355­3043 ​ ​ ​ ​ ​ ​ ​ 2X Software Notepad Steam AerooAdmin Paint Origin AetherPal Go To Meeting Spotify Ammyy Admin Jing Facebook Messenger AnyDesk
    [Show full text]
  • Chapter 3 Composite Default Screen Blind Folio 3:61
    Color profile: GenericORACLE CMYK printerTips & Techniques profile 8 / Oracle9i for Windows 2000 Tips & Techniques / Jesse, Sale, Hart / 9462-6 / Chapter 3 Composite Default screen Blind Folio 3:61 CHAPTER 3 Configuring Windows 2000 P:\010Comp\OracTip8\462-6\ch03.vp Wednesday, November 14, 2001 3:20:31 PM Color profile: GenericORACLE CMYK printerTips & Techniques profile 8 / Oracle9i for Windows 2000 Tips & Techniques / Jesse, Sale, Hart / 9462-6 / Chapter 3 Composite Default screen Blind Folio 3:62 62 Oracle9i for Windows 2000 Tips & Techniques here are three basic configurations of Oracle on Windows 2000: as T a management platform, as an Oracle client, and as a database server. The first configuration is the platform from which you will manage Oracle installations across various machines on various operating systems. Most system and database administrators are given a desktop PC to perform day-to-day tasks that are not DBA specific (such as reading e-mail). From this desktop, you can also manage Oracle components installed on other operating systems (for example, Solaris, Linux, and HP-UX). Even so, you will want to configure Windows 2000 to make your system and database administrative tasks quick and easy. The Oracle client software configuration is used in more configurations than you might first suspect: ■ Web applications that connect to an Oracle database: ■ IIS 5 ASPs that use ADO to connect to an Oracle database ■ Perl DBI application running on Apache that connects to an Oracle database ■ Any J2EE application server that uses the thick JDBC driver ■ Client/server applications: ■ Desktop Visual Basic application that uses OLEDB or ODBC to connect to an Oracle Database ■ Desktop Java application that uses the thick JDBC to connect to Oracle In any of these configurations, at least an Oracle client installation is required.
    [Show full text]
  • Netsupport Manager 12.7 On-Premises Remote Support Perfection, with a Wealth of Valuable Features at Business-Friendly Prices
    NetSupport Manager 12.7 On-premises remote support perfection, with a wealth of valuable features at business-friendly prices SCORE usinesses looking for the best on- premises remote support solution clients running these operating money can by will love NetSupport systems, as well as Linux and B Chrome OS Systems. Manager (NSM). Now entering it's third decade, NSM has long been a favourite The installation process isn't the same applications, processes and services. thanks to it's remarkable range of on all platforms, though. After loading the If you have a diverse population of suite on a Windows host, it took just a few support features and it's convenient computers to support, another thing you'll moments to scan our network and push control software, which can be hosted on appreciate is the Control console's dynamic the client out to our Windows 10 test a Windows or Mac desktop of your sorting function, which automatically systems. Alas, Mac deployment was less choice. groups clients into categories based on It's also great for supporting remote slick: we had to download the software their OS, hardware class (such as tower or offices: NetSupport's free Gateway manually, copy it onto each MacBook and rack) and geographical location. Selecting a run the installer by hand. component easily links sites together, with group brings up all members in the Still, once your clients are set up, four encryption options to choose from opposite pane, and you can even watch support staff will be bowled over by the including 256-bit AES.
    [Show full text]
  • Product Data Sheet
    Product Data Sheet Section I – Product and Company Information Product: Lithium ion and Lithium ion polymer batteries Manufacturer: Models: See Microsoft Product Battery Information Table, Section 14 Microsoft Corporation Effective Date: November 28, 2017 One Microsoft Way Version: 2017A - Phones Redmond, WA 98052-6399 Tel 425 882 8080 Section II – Composition Information Not chemically dangerous during normal use in accordance with Microsoft recommendations as stated in the user manuals or other similar documentation. Exposure to hazardous chemicals is not expected with normal handling and use. In particular, the cell or battery should not be opened or burned. Section III – Hazards Identification Emergency Overview: Do not open or disassemble cells or batteries or expose them to fire or open flame. Do not puncture or deform. Cells and batteries present a hazard only if mishandled in a way that causes damage to the cell or battery or compromises their integrity. Primary Routes of Exposure: Risk of exposure to hazardous materials will only occur if the cell or battery is physically, thermally or electrically abused to the extent that the integrity of the cell or battery is compromised. In this case, exposure to the electrolyte can occur through ingestion, inhalation, eye contact and skin contact. Potential Health Effects: If the battery or cell has been damaged or ruptured, the electrolyte solution, which is corrosive, could be released and cause burns to the eyes, skin or respiratory tract. Ingestion of the electrolyte can cause serious burns of the gastrointestinal tract. Section IV – First Aid Measures If you get electrolyte in your eyes, flush with water for 15 minutes without rubbing and immediately contact a physician.
    [Show full text]
  • Netsupport Servicedesk 5 and Netsupport Notify 3); Solutions That Are Proving Increasingly Popular Across the Government, Business and Education Sectors
    DECEMBER 2014 Celebrating 25 years of software WINTER EDITION DECEMBER 2014 WE ARE CELEBRATING 25 YEARS OF SOFTWARE INNOVATION As I welcome you to the Winter instalment of NetSupport News, I can’t help reflecting on how fast 2014 seems to have flown by – but as you’ll read on the following pages, this is surely a sign that it has been another busy year of exciting developments in the NetSupport range! Of course, 2014 saw us kick off our 25th anniversary celebrations and we have enjoyed sharing this milestone with you in many different ways over the past few months. Our social media channels have proved their versatility in enabling us to launch some very special birthday competitions and promotions. The Facebook age gives us the perfect medium to engage and interact instantly with our wonderful customers and partners, and we’ve received some great feedback in response to our competitions this year. Stay tuned for more chances to win in coming months! Visitors to our YouTube page and websites will have also noticed our new entertaining and informative product videos; these have been getting plenty of hits. On the product development front, while our flagship remote control (NetSupport Manager) and classroom management solutions (NetSupport School) continue to raise the bar in their specific genres, it was two more of our complementary offerings that took centre stage in the Autumn (with the launch of NetSupport ServiceDesk 5 and NetSupport Notify 3); solutions that are proving increasingly popular across the government, business and education sectors. I hope you enjoy reading more about the past six months’ activities and I would like to wish you all a Happy Christmas and a peaceful New Year.
    [Show full text]