A11y Attacks: Exploiting Accessibility in Operating Systems

Total Page:16

File Type:pdf, Size:1020Kb

A11y Attacks: Exploiting Accessibility in Operating Systems A11y Attacks: Exploiting Accessibility in Operating Systems Yeongjin Jang, Chengyu Song, Simon P. Chung, Tielei Wang, and Wenke Lee School of Computer Science, College of Computing Georgia Institute of Technology, Atlanta, GA, USA {yeongjin.jang,csong84,pchung,tielei.wang,wenke}@cc.gatech.edu ABSTRACT Keywords Driven in part by federal law, accessibility (a11y) support for dis- Accessibility; Assistive Technology; Attacks abled users is becoming ubiquitous in commodity OSs. Some assis- tive technologies such as natural language user interfaces in mobile 1 Introduction devices are welcomed by the general user population. Unfortunately, adding new features in modern, complex OSs usually introduces On August 9, 1998, the United States Congress amended the Re- new security vulnerabilities. Accessibility support is no exception. habilitation Act of 1973 to eliminate barriers in electronic and in- Assistive technologies can be defined as computing subsystems formation technology for people with disabilities [32]. Effective that either transform user input into interaction requests for other June 21, 2001, the law is enforced on the development, procure- applications and the underlying OS, or transform application and ment, maintenance, or use of electronic and information technology OS output for display on alternative devices. Inadequate security by the federal government [21]. Driven by this requirement, OS checks on these new I/O paths make it possible to launch attacks vendors [2, 15, 24] have included accessibility features such as from accessibility interfaces. In this paper, we present the first secu- on-screen keyboards, screen magnifiers, voice commands, screen rity evaluation of accessibility support for four of the most popular readers, etc. in their products to comply with federal law. computing platforms: Microsoft Windows, Ubuntu Linux, iOS, and Assistive technologies, especially natural language voice proces- Android. We identify twelve attacks that can bypass state-of-the-art sors, are gaining widespread market acceptance. Since the iPhone defense mechanisms deployed on these OSs, including UAC, the 4S, Apple has included in iOS a voice-based personal assistant, Siri, Yama security module, the iOS sandbox, and the Android sandbox. which can help the user complete a variety of tasks, such as placing Further analysis of the identified vulnerabilities shows that their a call, sending a text, and modifying personal calendars. Google root cause is that the design and implementation of accessibility also added a similar feature, Voice Action, to its Android platform. support involves inevitable trade-offs among compatibility, usability, Furthermore, wearable devices such as Google Glass use voice as security, and (economic) cost. These trade-offs make it difficult to the main interaction interface. secure a system against misuse of accessibility support. Based on In general, adding new features into modern complex OSs usually our findings, we propose a number of recommendations to either introduces new security vulnerabilities. Accessibility support is no make the implementation of all necessary security checks easier exception. For example, in 2007, it was reported that Windows Vista and more intuitive, or to alleviate the impact of missing/incorrect could be compromised through its speech recognition software [28]; checks. We also point out open problems and challenges in auto- in 2013, a flaw was discovered in Siri that allowed the bypass matically analyzing accessibility support and identifying security of an iPhone’s lock screen to access photos and email [11]. As vulnerabilities. accessibility features are being used by more and more people, Categories and Subject Descriptors security issues caused by such vulnerabilities can become more serious. D.4.6 [Operating Systems]: Security and Protection In this paper, we present the first security evaluation of the accessi- General Terms bility support of commodity OSs. Our hypothesis is that alternative I/O subsystems such as assistive technologies bring a common chal- Security lenge to many widely deployed security mechanisms in modern OSs. Modern OSs support restricted execution environments (e.g., sandboxes) and ask for the user’s approval before applying a security sensitive change to the system (e.g., User Access Control (UAC) on Windows [25] and remote view on iOS [4]). However, accessibil- Permission to make digital or hard copies of all or part of this work for personal or ity support usually offers interfaces to programmatically generate classroom use is granted without fee provided that copies are not made or distributed user inputs, such as keystrokes and mouse clicks, which essentially for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the enables the interface to act as a human being. Consequently, it author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or might be possible to bypass these defense mechanisms and abuse a republish, to post on servers or to redistribute to lists, requires prior specific permission user’s permissions by generating synthesized user inputs. Similarly, and/or a fee. Request permissions from [email protected]. attackers may also be able to steal security sensitive information CCS’14, November 3–7, 2014, Scottsdale, Arizona, USA. displayed on screen through the accessibility interfaces. Copyright is held by the owner/author(s). Publication rights licensed to ACM. ACM 978-1-4503-2957-6/14/11 ...$15.00. To verify our hypothesis, we examined the security of accessibility http://dx.doi.org/10.1145/2660267.2660295. on four commodity OSs: Microsoft Windows 8.1, Ubuntu 13.10, iOS 6, and Android 4.4. We were able to identify twelve1 attacks2 Assistive Technology App that can bypass many state-of-the-art defense mechanisms deployed on these OSs, including UAC, the Yama security module, the iOS Process Process App Input Input Output Ouptut Handler App sandbox, and the Android sandbox. When designing new interfaces that provide access to comput- ing systems, one must ensure that these new features do not break existing security mechanisms. However, current designs and imple- mentations of accessibility support have failed to meet this require- A11y ment. Our analysis shows that current architectures for providing Library accessibility features make it extremely difficult to balance compat- ibility, usability, security, and (economic) cost. In particular, we OS found that security has received less consideration compared to the other factors. Under current architectures, there is not a single OS A11y Input component that has all the information necessary to enforce mean- (Voice) ingful security policy; instead, the security of accessibility features Original I/O path Regular depends on security checks implemented in the assistive technology, A11y Output Screen Input Devices the OS, and the applications. Unfortunately, in our evaluation, we Alt. input through a11y (Speaker) Output found that security checks are either entirely missed or implemented Alt. output through a11y incorrectly (or incompletely) at all levels. Based on our findings, we Figure 1: General architecture for implementing accessibility features. believe a fundamental solution to the problem will involve a new Supporting an accessibility feature creates new paths for I/O on the architecture that is designed with security in mind. Proposing this system (two dotted lines), while original I/O from/to hardware devices new architecture is beyond the scope of our work. Instead, we pro- (e.g., keyboard/mouse and screen) is indicated on the right side. pose several recommendations that work under current architectures to either make the implementation of all necessary security checks 2.1 Accessibility Features easier and more intuitive, or to alleviate the impact of missing/incor- rect checks. We also point out some open problems and challenges In compliance with the amended Rehabilitation Act, software ven- in automatically analyzing a11y support and identifying security dors have incorporated various accessibility features into their sys- vulnerabilities. tems. In this paper, we define computer accessibility (a11y) features In summary, this paper makes the following contributions: as new I/O subsystems that provide alternative ways for users with disabilities to interact with the system. For example, for visually • We performed a security evaluation of accessibility support impaired users, text-to-speech based Narrator (on MS Windows), for four major OSs: Windows, Ubuntu Linux, iOS, and An- VoiceOver (on OS X), and TalkBack (on Android) provide an output droid; subsystem that communicates with the user through speech. For • We found several new vulnerabilities that can be exploited to hearing impaired users, accessibility features like captioning ser- bypass many state-of-the-art defense mechanisms deployed vices turn the system’s audio output into visual output. Similarly, on these systems, including UAC and application sandboxes; some systems can alert the user about the presence of audio output by flashing the screen. For users with motor disabilities, traditional • We analyzed the root cause of these vulnerabilities and pro- mouse/keyboard based input systems are replaced by systems based posed a number of recommendations to improve the security on voice input. In general, we can see these accessibility features as of a11y support; implemented within
Recommended publications
  • Annual Report in This Report
    GNOME FOUNDATION 2018–2019 ANNUAL REPORT IN THIS REPORT 3 Letter from the GNOME Foundation 4 About GNOME 5 Releases 6 Accessibility 6 GNOME Moves to Discourse 7 GitLab Statistics and Activity 8 Hackfests CREDITS 9 Conferences Thank you to everyone involved in the making of this report! We appreciate the authors, editors, and organizers that helped highlight 10 Finances at a Glance all the great work GNOME accomplished in the 2018‑2019 fiscal year. Gaurav Agrawal, Matthias Clasen, Emmanuele Bassi, Molly de Blanc, 12 Outreach Sebastian Dröge, Caroline Henriksen, Juanjo Marin, Neil McGovern, Bartłomiej Piotrowski, Kristi Progri, Oliver Propst, Andrea Veri, 13 Friends of GNOME Britt Yazel, and Rosanna Yuen. 2 2019 was an exciting year for us! We increased the Foundation‘s staff with three new employees—a GTK+ core developer, a Program LETTER FROM Coordinator, and a Strategic Initiatives Manager—expanded our efforts with new projects, and continued making great soware. We had three wildly successful conferences, several hackfests, and a number of newcomer events geared towards helping new contributors get THE GNOME involved in GNOME. We sponsored three amazing Outreachy interns and mentored nine students through Google Summer of Code. There were numerous technical successes: updates to GTK, two new releases of the desktop environment, and numerous infrastructure improvements, including both hardware and soware upgrades. We introduced an Inclusion and Diversity team in order to make the FOUNDATION GNOME community a more welcoming place. We announced the GNOME Community Engagement Challenge. We had speakers and booths at conferences in Asia, Europe, North America, and South America.
    [Show full text]
  • New Jersey Institute of Technology Research
    NEW JERSEY INSTITUTE OF TECHNOLOGY RESEARCH LINKING LABORATORIES TO LIVES 100yearsy NEWARK COLLEGE OF ENGINEERING NEW JERSEY INSTITUTE OF TECHNOLOGY Photo: Oscar Masciandaro Front Cover Photos (left to right): Courtesy of istock/cerber82 Courtesy of istock/Suebsiri Courtesy of istock/dvoevnore Courtesy of istock/enot-poloskun Table of Contents From the Senior Vice Provost for Research 2 Frontiers in Sustainability 4 Engineering Sustainability: Water 6 Engineering Sustainability: Data 8 Engineering Sustainability: Infrastructure 10 Engineering Sustainability: Health and Medicine 12 Voice Technology / Engineering and Art 14 Intelligent Infrastructure 16 NJIT Research Magazine 2019 A Century of Newark College of Engineering 18 Senior Vice Provost for Research Atam P. Dhawan NCE 100: A Timeline 20 Undergraduate Research 26 Office of Strategic Communications Reflections 28 Associate Vice President Denise Anderson Accessibility and Technology 30 Editor Tracey Regan Deep Reinforcement Learning 32 Managing Editor Julie Jacobs Innovative Materials 34 Contributing Writer Jesse Jenkins Data for Decision-Making 36 Art Director/Designer Diane Cuddy NCE 100: Did You Know? 38 Production Manager Babette Hoyle New Faculty 42 Staff Photographer Oscar Masciandaro Faculty Accomplishments 44 From the Senior Vice Provost for Research s we celebrate the 100th anniversary life, to optimize power distribution and create resilient building materials; of Newark College of Engineering this new materials to save teeth, restore heart tissue and develop biosensors that A year, it’s exciting to see how engineers fine-tune selectivity and sensitivity in diagnostic devices; new means to make are now engines of advancement in so many telecommunications networks more energy efficient, to optimize collaboration important endeavors in modern life.
    [Show full text]
  • Guile-GNOME: Atk Version 2.16.2, Updated 9 December 2011
    Guile-GNOME: Atk version 2.16.2, updated 9 December 2011 Bill Haneman Marc Mulcahy Padraig O'Briain This manual is for (gnome atk) (version 2.16.2, updated 9 December 2011) Copyright 2001-2007 Bill Haneman, Marc Mulcahy, Padraig O'Briain Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 or any later version published by the Free Software Foundation. i Short Contents 1 Overview :::::::::::::::::::::::::::::::::::::::::::: 1 2 AtkAction ::::::::::::::::::::::::::::::::::::::::::: 2 3 AtkComponent ::::::::::::::::::::::::::::::::::::::: 4 4 AtkDocument :::::::::::::::::::::::::::::::::::::::: 8 5 AtkEditableText ::::::::::::::::::::::::::::::::::::: 10 6 AtkGObjectAccessible :::::::::::::::::::::::::::::::: 12 7 AtkHyperlinkImpl :::::::::::::::::::::::::::::::::::: 13 8 AtkHyperlink ::::::::::::::::::::::::::::::::::::::: 14 9 AtkHypertext ::::::::::::::::::::::::::::::::::::::: 17 10 AtkImage::::::::::::::::::::::::::::::::::::::::::: 18 11 AtkNoOpObjectFactory ::::::::::::::::::::::::::::::: 20 12 AtkNoOpObject ::::::::::::::::::::::::::::::::::::: 21 13 AtkObjectFactory :::::::::::::::::::::::::::::::::::: 22 14 AtkObject :::::::::::::::::::::::::::::::::::::::::: 23 15 AtkRegistry ::::::::::::::::::::::::::::::::::::::::: 29 16 AtkRelationSet :::::::::::::::::::::::::::::::::::::: 31 17 AtkRelation::::::::::::::::::::::::::::::::::::::::: 33 18 AtkSelection :::::::::::::::::::::::::::::::::::::::: 35 19 AtkStateSet :::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • Learning Disabilities and the Virtual College Campus: a Grounded Theory of Accessibility
    Syracuse University SURFACE Instructional Design, Development and Evaluation - Dissertations School of Education 5-2012 Learning Disabilities and the Virtual College Campus: A Grounded Theory of Accessibility Nancy Lee Hollins Syracuse University Follow this and additional works at: https://surface.syr.edu/idde_etd Part of the Education Commons Recommended Citation Hollins, Nancy Lee, "Learning Disabilities and the Virtual College Campus: A Grounded Theory of Accessibility" (2012). Instructional Design, Development and Evaluation - Dissertations. 55. https://surface.syr.edu/idde_etd/55 This Dissertation is brought to you for free and open access by the School of Education at SURFACE. It has been accepted for inclusion in Instructional Design, Development and Evaluation - Dissertations by an authorized administrator of SURFACE. For more information, please contact [email protected]. Abstract Two trends currently impacting higher education intersect in this study: (1) students with learning disabilities are enrolling in colleges and universities in increasing numbers, and (2) colleges and universities are increasingly relying on the web to provide services to students. This reliance on the “virtual campus” comes without apparent consideration of accessibility issues that may be experienced by students with learning disabilities. This study explored the experiences of 16 college students, self-identified as having learning disabilities, as they interacted with the virtual campus of one college. Consistent with the social model of disability, this study initially focused on the features of the virtual campus that were both helpful and not helpful to the informants as they performed eight tasks considered typical of those expected of a college student. Using a grounded theory methodology, the model that evolved from this data indicated that to understand the informants’ experiences, consideration had to be given also to what the informants brought to the experience, including their active choice and use of helpful strategies.
    [Show full text]
  • WIKI on ACCESSIBILITY Completion Report March 2010
    WIKI ON ACCESSIBILITY Completion report March 2010 By Nirmita Narasimhan Programme Manager Centre for Internet and Society Project Title: Wiki on “Accessibility, Disability and the Internet in India” Page | 1 REPORT Accessibility wiki: accessibility.cis-india.org The wiki project was envisaged and funded by the National Internet Exchange of India (www.nixi.in) and has been executed by the Centre for Internet and Society (www.cis-india.org), Bangalore. Project Start date: May 2009 End date: February 2010. Background India has a large percentage of disabled persons in its population— estimated to be over seven per cent as per the Census of 2001. Even this figure is believed to be a gross under representation of the total number of disabled persons residing in this large and diverse country. Taken in figures, this amounts to roughly 70-100 million persons with disabilities in the territory of India. Out of this number, a mere two per cent residing in urban areas have access to information and assistive technologies which enable them to function in society and enhance their performance. There are several reasons for this, one of them being that there is a deplorable lack of awareness which exists on the kinds of disabilities and about ways in which one can provide information and services to disabled persons. Parents, teachers, government authorities and society at large are all equally unaware about the options which exist in technology today to enable persons with disabilities to carry on independent and productive lives. Barring a few exceptions, India is still trapped in an era where a white cane and a Braille slate symbolises the future for blind people, while the world has progressed to newer forms of enabling technology such as screen readers, daisy players, the Kindle and so on.
    [Show full text]
  • A Game Engine for the Blind
    Bachelor in Computer Science and Engineering 2016/2017 Bachelor Thesis Designing User Experiences: a Game Engine for the Blind Álvaro Cáceres Muñoz Tutor/s: Teresa Onorati Thesis defense date: July 3rd, 2017 This work is subject to the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License. Abstract Video games experience an ever-increasing interest by society since their incep- tion on the 70’s. This form of computer entertainment may let the player have a great time with family and friends, or it may as well provide immersion into a story full of details and emotional content. Prior to the end user playing a video game, a huge effort is performed in lots of disciplines: screenwriting, scenery design, graphical design, programming, opti- mization or marketing are but a few examples. This work is done by game studios, where teams of professionals from different backgrounds join forces in the inception of the video game. From the perspective of Human-Computer Interaction, which studies how people interact with computers to complete tasks [9], a game developer can be regarded as a user whose task is to create the logic of a video game using a computer. One of the main foundations of HCI1. is that an in-depth understanding of the user’s needs and preferences is vital for creating a usable piece of technology. This point is important as a single piece of technology (in this case, the set of tools used by a game developer) may – and should have been designed to – be used on the same team by users with different knowledge, abilities and capabilities.
    [Show full text]
  • Computing Interfaces for Everyone Abdullah Almurayh, Member, IAENG, and Sudhanshu Semwal, Member, IAENG
    Proceedings of the World Congress on Engineering and Computer Science 2014 Vol I WCECS 2014, 22-24 October, 2014, San Francisco, USA Computing Interfaces for Everyone Abdullah Almurayh, Member, IAENG, and Sudhanshu Semwal, Member, IAENG Abstract—Companies, businesses and agencies rely on com- a large degree of impairment may limit the person to perform puting technology, taking advantage of its trends and ben- a major life activities [8]. efits. Some categories of users – people with disabilities – A disability could affect a person’s employment status, have faced considerable challenges accessing the cloud to the point that they have become excluded. Many of the existing which can cause job loss [9]. Most employers have shifted to systems and companies still rely on assistive tools that are computer-based services and the Internet cloud; therefore, re- expensive, incompatible with some applications, and challenging quiring knowledge of cloud computing skills [10]. This may to use by people with disabilities. The goal of this paper require physical skills1 and soft skills such as personal skills, is to encourage the inclusion of a person with a disability relationships, and communications [10]. Employees with in computing technologies and the opportunities that these technologies afford. Our research finds that the lack of usability disabilities, on the other hand, may not be able to achieve limits the use of these tools and restricts achievement of users these requirements because of health reasons. Section 508 with disabilities. Usually, there is a reasonable and realistic considerations, as discussed earlier, will definitely increase effort of research to include accessibility or usability, or both.
    [Show full text]
  • Teaching Chemistry to Students with Disabilities a Manual for High Schools, Colleges, and Graduate Programs Edition 4.1
    Teaching Chemistry to Students with Disabilities A Manual For High Schools, Colleges, and Graduate Programs Edition 4.1 Teaching Chemistry to Students with Disabilities: A Manual for High Schools, Colleges, and Graduate Programs Edition 4.1 Todd Pagano & Annemarie Ross, and members of the ACS Committee on Chemists with Disabilities Copyright 2015, American Chemical Society’s Committee on Chemists with Disabilities ISBN 978-1-4951-5532-1 4th Edition Dorothy L Miner, Ron Nieman, Anne B. Swanson, Kelley Carpenter, and Michael Woods, Editors American Chemical Society Committee on Chemists with Disabilities Copyright 2001, American Chemical Society’s Committee on Chemists with Disabilities Statements in this publication are those of the contributors and do not necessarily reflect the views of the American Chemical Society, the National Science Foundation, or the contributors’ employers. The use of brand names is informational only and does not imply endorsement of any product. Cover images © Rochester Institute of Technology. All rights reserved. Preface Ever since it was first published, Teaching Chemistry to Students with Disabilities: A Manual for High Schools, Colleges, and Graduate Programs has served as a vital resource in the chemistry classroom and laboratory to students with disabilities as well as their parents, teachers, guidance counselors, and administrators. The comprehensive 4th edition was last updated in 2001, so the American Chemical Society’s (ACS) Committee on Chemists with Disabilities (CWD) thought it prudent to update such a valuable text at this time. In a changing time of technology, rapid access to information, accessibility tools for individuals with disabilities, and publishing, Edition 4.1 is being published digitally/online as an Open Access text.
    [Show full text]
  • DOCUMENT RESUME Computer Accessibility Technology Packet
    DOCUMENT RESUME ED 419 355 EC 306 444 TITLE Computer Accessibility Technology Packet. INSTITUTION Department of Education, Washington, DC. PUB DATE 1997-10-10 NOTE 51p. AVAILABLE FROM Office of Special Education and Rehabilitative Services, Department of Education, Mary E. Switzer Building, 330 C Street, S.W., Washington, DC 20202; telephone: 202-205-5465; World Wide Web: http://www.ed.gov/offices/OSBRS/teckpack.html (Copies of this packet are available in braille, audiotape, large print or computer disk, for individuals with disabilities). PUB TYPE Guides Non-Classroom (055) EDRS PRICE MF01/PC03 Plus Postage. DESCRIPTORS *Accessibility (for Disabled); *Appropriate Technology; *Assistive Devices (for Disabled); *Disabilities; *Educational Technology; Elementary Secondary Education; Federal Legislation; LegalResponsibility; *School Responsibility IDENTIFIERS *Technology Related Assistance Individ Disabil Act ABSTRACT This technology information packet includes information about the technical aspects of access to technology, legal obligations concerning technology and individuals with disabilities, and a list of resources for further information and assistance. A question and answer section addresses: barriers to educational technology for students with disabilities; how product access for students with disabilities can be delivered; the benefits of access features for typical students; a school's legal responsibilities to provide accessible technology for students with disabilities; a school's legal responsibility to provide accessible
    [Show full text]
  • Guideline for Designing Accessible Systems to Users with Visual Impairment: Experience with Users and Accessibility Evaluation Tools
    Guideline for Designing Accessible Systems to Users with Visual Impairment: Experience with Users and Accessibility Evaluation Tools Caroline Guterres Silva, Vinicius Coelho and Marcos Alexandre Rose Silva Colégio Politécnico, Federal University of Santa Maria. Avenida Roraima, nº1000, Santa Maria, RS, Brazil Keywords: Accessibility, Guidelines, Visual Impairment. Abstract: Nowadays, society uses computer systems in diverse day to day activities, such as shopping, social interaction, study, research, etc.; however, a considerable number of the population, who has some kind of special necessity, faces difficulties in using those systems for various reasons, for example, there are codes not written in a way that allows screen readers to identify the menus, contents, etc., to make the correct reading for users. In that context, this paper contains the description of a research done to identify guidelines and/or techniques that address a code document to facilitate interaction between the visually impaired and computer. By applying those guidelines to a prototype and then submitting it to testing with visually disabled users, it was observed that the source code was more legible for screen readers and user interaction was facilitated; however, during user testings, improvements that could be applied to the existing guidelines were observed. Beside user testings, this paper reports a research on automated validators and their criteria on source code's accessibility. It is noted that this automated verification does not exclude tests involving users, because both tests are important in the process of accessibility assurance. 1 INTRODUCTION There are different types of disability, such as: vision, hearing, motor, advanced age, dyslexia, The World Health Organization (WHO) (2015), cognitive or neurological, among others.
    [Show full text]
  • ENGR110/210 Perspectives in Assistive Technology
    February 9, 2021 Assistive Tableware for Persons with Cognitive Impairments ENGR110/210 Perspectives in Assistive Technology David L. Jaffe, MS Instructor 15 Years Questions, Comments, Suggestions, or Concerns? Please notify me of your comments, suggestions, and concerns so I can explain / address / correct them. Apology Sharing on the Mid-term Presentation Signup Sheet More time to discuss “Ethical Dilemmas” Attendance Attendance Sheet has been discontinued Zoom analytics lists attendees and duration of their participation Let me know if you are unable to arrive on time or must leave early Watch Zoom video of missed portion of the class session Make up missed class sessions Upcoming class sessions The Design and Control of Exoskeletons for Rehabilitation – Katherine Strausser, PhD - Thu, Feb 11th Mid-term Student Project Presentations – Tue, Feb 16th Students working on projects Expected Activities for Fabrication Projects ► Connect with project partner ► “Understand the Problem” ► Brainstorming ► Select Design Concept(s) ► Meet with me ► Sketches, low resolution prototypes ► Preparing for Mid-Term presentation and Report ► Reimbursement for materials ~ $50 ► 3D printing Students working on projects Mid-term Presentations Update Mid-term presentations will be 3 minutes, no slides, no screen sharing, informal, not graded – but be professional “Elevator Pitch” & Update the Boss Include feeling & emotion All students working on the same project will present together Async students can submit a 3 minute video Presentation tips on course website Signup Sheet has been posted for presentation order Students working on projects Mid-term Report Update Mid-term report - 10 pages maximum - of narrative submitted collectively by all students working on the same project Suggested format different for fabrication vs non-fabrication projects Include sketches and photos Goal: short, concise, well-written, and highly readable report with few grammatical and spelling errors.
    [Show full text]
  • Open Source Used in Tesla Series Switches 2.5.0.X 2.5.0.X
    Open Source Used In 250, 350, 350X, and 550X Series Switches 2.5.0.x Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. Text Part Number: 78EE117C99-190526882 Open Source Used In 250, 350, 350X, and 550X Series Switches 2.5.0.x 1 This document contains licenses and notices for open source software used in this product. With respect to the free/open source software listed in this document, if you have any questions or wish to receive a copy of any source code to which you may be entitled under the applicable free/open source license(s) (such as the GNU Lesser/General Public License), please contact us at [email protected]. In your requests please include the following reference number 78EE117C99-190526882 En ce qui a trait au logiciel gratuit ou à exploitation libre figurant dans ce document, si vous avez des questions ou souhaitez recevoir une copie du code source, auquel vous avez droit en vertu des licences gratuites ou d'exploitation libre applicables (telles que licences GNU Lesser/General Public), veuillez communiquer avec nous à l'adresse external- [email protected]. Dans vos demandes, veuillez inclure le numéro de référence 78EE117C99-190526882 Contents 1.1 Angular Bootstrap 0.12.0 1.1.1 Available under license 1.2 Angular UI Sortable 1.1.1 1.2.1 Available under license 1.3 angular-chart.js 0.7.2 1.3.1 Available under license 1.4 Angular-dashboard-frmework 0.8.0 1.4.1
    [Show full text]