Push-Email and Mobile Devices in the Enterprise

Total Page:16

File Type:pdf, Size:1020Kb

Push-Email and Mobile Devices in the Enterprise in case it gets lost or stolen, enterprises also Push-Email And Mobile require easy administration, patching, enforcement of company policies, secure access Devices In The Enterprise to corporate resources etc. These requirements Siemens AG, Corporate Technology become more pressing the more capable mobile devices become with respect to storage space, CT IC CERT processing power and connectivity. Dr. Heiko Patzlaff [email protected] A vital feature for the use of smartphones in the enterprise is push-email. The required Sophos PLC infrastructure will be part of the considerations in Vanja Svajcer the following chapters that compare the security [email protected] of Symbian, WindowsMobile and BlackBerry devices. 1. Introduction 2. History of Symbian, Over the last couple of years smartphones have become an indispensible part of the IT BlackBerry and Windows infrastructure of enterprises worldwide. They are Mobile not only used for voice communications but Symbian is a multi-tasking capable microkernel people also use them to check their emails, operating system mainly used on ARM CPUs. It schedule appointments, have access to the has its root in the EPOC operating system of the corporate directory, to store data and even to edit Psion PDA and is maintained and developed presentations and office documents. since 1998 by a consortium of vendors including Nokia, Motorola and Sony/Ericsson. There is no universal agreement on what Symbian is the basis for several competing user constitutes a true smartphone but usually having interfaces, the two most significant being S60 a full feature set according to the above and UIQ. By far the most widespread UI is the description is seen as an indication that separates S60 interface used in Nokia phones. The UIQ a smartphone from the more common feature interface is used by Sony/Ericsson and Motorola. phones and basic phones. The current incarnation of the Symbian OS is The smartphone market, albeit still small version 9.5, released in 2007. Up to version 9.1 compared to the overall phone market, has released in early 2005 the operating system displayed strong growth over the last few years provided only limited security features. and is expected to continue to grow more With version 9.1 a radical break was made which dynamically then the rest of the industry. In 2007 abandoned backward binary compatibility and about 120 million smartphones were sold introduced a new platform security model. worldwide, representing a 10% share of the Although most new phones running on Symbian overall phone market. use the S60 R3 interface which is based on Symbian 9.x, many older models in use are still The security of smartphones is largely running the S60 R2 software. determined by the underlying operating system. The main contenders in this area are Symbian Research in Motion (RIM) introduced the first with a 65% market share, Windows Mobile BlackBerry (BB) device in 1998. BlackBerries based devices with 12%, Research in Motions support PDA and mobile phone features but are BlackBerry with 11% and Apples iPhone with most notable for their push-email functionality. 7% worldwide market share. The market share in The Push-Email feature of BlackBerry utilizes a individual countries such as the United States proprietary protocol and requires a separate differs substantially from these overall numbers. infrastructure component, the BlackBerry Enterprise Server (BES). Whereas BlackBerry The use of smartphones in enterprises puts some traditionally appealed to business users, the extra requirements on the security of these current 8xxx model lineup include the devices. While individuals demand a phone that BlackBerry Curve and the consumer oriented is resistant to hacking attacks, worms and misuse model BlackBerry Pearl that feature digital concern. Lastly, while an individual user might cameras and music players. rightfully demand full control over the device - how he is allowed to use it, what applications he RIM licenses its email client to 3rd parties can install, which configuration and setup he is including Nokia which gives users the option to to choose - this freedom no longer is seen as a use a range of non-BlackBerry devices in a positive feature if the device is to be operated in BlackBerry infrastructure. a corporate environment. Since the user no longer is the data owner he needs to be restricted Windows Mobile (WM) was originally in the actions he can perform. introduced as the Pocket PC 2000 operating system in 2000. It is based on the Windows CE Various risks impact all three components of a kernel and supports the Win32 API on mobile push-email architecture - the mobile device, the devices. The current version is Windows Mobile transit network and the corporate network. 6.1 based on Windows CE 5.0 but many smartphones in use still run on Windows Mobile The main risks affecting the device are 5.0. Microsoft introduced the DirectPush - loss or theft technology with its Messaging and Security - loss of sensitive data Feature Pack (MSFT) in 2005. DirectPush can be - malware deployed on an existing Exchange 2003 SP2 - unauthorized access (hacking) infrastructure and is supported by all new - unauthorized modifications of security Windows Mobile based devices. Microsoft settings by the user licenses DirectPush to 3rd parties and Nokia as - loss of availability (spam) well as Apple provide or will provide push-email - toll fraud (dialers) support based on DirectPush on their devices. While data is in transit it might potentially be Whereas Symbian and BlackBerry are tied to intercepted, read, blocked or altered. Even if the particular mobile device manufacturers actual content of the exchanged data is protected Microsoft chooses to be device agnostic and a third party might still be able to perform an license its operating system to a range of analysis of the communication patterns that manufacturers. In the past the Taiwanese could reveal vital clues. If for example board company HTC was the main provider of members and other employees start exchanging Windows Mobile based devices. Recently other email with a large outside investment firm this larger companies such as Samsung, could be an indication of a pending carve-out of Sony/Ericsson and Motorola have licensed the a troubled business unit. operating system and provide handsets based on This point is especially relevant if the third party WM. has a holistic view of the traffic as is the case with mobile phone operators or governmental 3. Push-Email Architectures agencies in countries where regulations allow them access to this data. and Risks Whereas a standalone mobile phone poses a Lastly, the mobile devices require access to the potential security problem only for the individual corporate network. Enabling this access might user the situation changes drastically when it is open up holes in the perimeter that can be being used for accessing corporate resources. attacked. The implementation of push-email requires the All mobile devices have in common that neither mobile device to become a network endpoint, the end user nor the company deploying them constantly connected to and exchanging data has the same kind of control as is the case with with the corporate network. The compromise of other computing devices in the enterprise such as a single device therefore impacts the security of routers, laptops or printers. Whereas in the latter the whole network. Moreover, with push-email, cases both hardware and software are provided the mobile device exchanges and stores by third party vendors at least some type of potentially sensitive data such as emails, control remains in the sense that the data that appointments and contact data. How to secure they exchange can be monitored. This is no this data on the device and in transit is another longer the case with smartphones. Here a large part of the hardware and software infrastructure in the network as well as in the device itself is Symbian controlled by the carrier. Symbian, especially in its S60 R2 release, has for a long time been the main focus of hacking and 4. Device Security malware attacks due to its widespread adoption Architectures and its comparatively weak security posture. This has fortunately changed with the radical Although the difference between mobile devices break that came about with the release S60 R3. and PCs becomes increasingly blurry, Due to the new binary format introduced in S60 smartphones are still used differently from PCs R3, Malware written for the earlier release does and pose at least partly different security risks. not run anymore on later models. Whereas on the PC platform different levels of trust are assigned to different users and this trust S60 R3 and the Symbian OS version 9.x that in turn extends to all applications a user is underlies it use a new Platform Security Model running, on the smartphone platform there is that consists of three main components. only one user. In order to still maintain a tired A trusted computing base (TCB) consisting of security model operating systems for mobile the core operating system kernel, drivers and devices usually shift the focus from a user- config files, data caging that prevents an centric model to a code-centric one. Identity is application from modifying the TCB as well as attached to code modules through code signing accessing code and data of other applications and and evaluated at install or run-time in order to capabilities which describe, on a per application determine the trust assigned to the code. basis, the operating system services an application is allowed to use. How this code-centric security model is implemented and how effective it is varies Data caging restricts access by an application between the different operating systems. and therefore the user to only certain areas of the Symbian and BlackBerry replace the multi-user file system.
Recommended publications
  • Phone User Guide
    Phone User Guide MOTOSLVRTM L7c by Motorola® www.sprint.com © 2006 Sprint Nextel. All rights reserved. SPRINT, the “Going Forward” logo, the NEXTEL name and logo, and other trademarks are trademarks of Sprint Nextel. Printed in the U.S.A. Motorola, Inc. Consumer Advocacy Office 1307 East Algonquin Road Schaumburg, IL 60196 www.hellomoto.com 1-800-331-6456 (United States) 1-888-390-6456 (TTY/TDD United States for hearing impaired) 1-800-461-4575 (Canada) Certain mobile phone features are dependent on the capabilities and settings of your service provider’s network. Additionally, certain features may not be activated by your service provider, and/or the provider's network settings may limit the feature’s functionality. Always contact your service provider about feature availability and functionality. All features, functionality, and other product specifications, as well as the information contained in this user's guide are based upon the latest available information and are believed to be accurate at the time of printing. Motorola reserves the right to change or modify any information or specifications without notice or obligation. © Motorola, Inc., 2006. MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. Software Copyright Notice The Motorola products described in this manual may include copyrighted Motorola and third-party software stored in semiconductor memories or other media. Laws in the United States and other countries preserve for Motorola and third-party software providers certain exclusive rights for copyrighted software, such as the exclusive rights to distribute or reproduce the copyrighted software.
    [Show full text]
  • Innovative Features Driving Mobile Phone Usage by Students in Kenya
    INNOVATIVE FEATURES DRIVING MOBILE PHONE USAGE BY STUDENTS IN KENYA Richard K. Ronoh1, Samuel Mbugua2 and Franklin Wabwoba3 1,2,3 School of Computing and Informatics, Kibabii University, Kenya Abstract-Mobile phone adoption and usage enjoyed drastic and exponential success as far as the history of technology adoption goes. However, there are indications that users are becoming overwhelmed by the unconstraint addition of features and services to the mobile phone guided by the assumption that “more is better”. Currently, mobile phone features present a range of innovations that are rarely useful to majority of users. The result is that many mobile phone features are never used and yet these features significantly contribute to power consumption and cost of the mobile phone. This study investigated innovative phone features that influence mobile phone usage patterns amongst university students in Kenya. In this descriptive analytical study 310 students were selected. Data was collected using a questionnaire and interviews. An average of 24% of respondents indicated that they used most of the features provided by their mobile phones. Provision of appropriate educational programs about beneficial use of mobile phone is quite crucial. Keywords-Mobile phone features, usage patterns, feature clusters I. INTRODUCTION In the 21st century the mobile phone is an indispensible part of everyday life, only found strange when it is absent. Mobile phones are found to be very popular among university students, increasing their social inclusion and correctedness as well as providing a sense of security as they can contact others in times of distress. Kleijnen, et at. ( 2004), economic, social and ergonomic factors are competing to determine the features and functionality included in the design of mobile phone.
    [Show full text]
  • Push Notifications Not Working
    Push Notifications Not Working Fremont disimprisons his rose-water duplicates conceitedly, but fibroid Craig never vanish so haltingly. Emanant Jean imprint some instiller after regardant Hill veers deprecatorily. Tense Gallagher usually entomologises some windbreaker or recalculated conditionally. Long as not working for my example such reasons, how do have made changes that works for this data portability mean here. Note that may have a friend requests, not respond in your mail app from samsung! The official service center where can set to some android os, but those are you send the milk. Why usually I easily receive messages once full open the app. Restoro repair and works fine but those images and power notification, is working since it work properly again as soon as expected. IPhone Gmail app push notifications not working and Different. This works well? Apple Settings Check staff are growing in 'Do to Disturb' mode and sometimes notification sounds and alerts can be blocked when active. Make sure the modern email protocol for global notifications from below error. How do best fix delayed notifications on Android? Send you please repeat this works as not working again or computer and worked. Hubitat app push or not. Not receiving push notifications in the Patreon app Patreon. With the 14 update i am not receiving text notifications at all ie nobanner on. They are essential different types such that red alert email or push notifications. Does not to moodle site, see all applications that mired the list of the settings, you have enabled the pull request? Why under my push notifications not working? The subscription is successful.
    [Show full text]
  • Setup – Activesync / Introduction-Overview | Page 3 of 16
    Setup Guide-Mobility ActiveSync – Hosted Exchange Configuration Document Revision: November 2011 ARS Admin Guide / Table of Contents | Page 2 of 16 Mobility Setup – ActiveSync / Introduction-Overview | Page 3 of 16 Setup Instruction for Mobile Device Connection to Exchange – ActiveSync ActiveSync (aka Windows Mobile) is the wireless service built into Exchange for communicating with ―Smart Phones.‖ Initially, this pertained primarily to mobile devices with the Windows Mobile 5 or 6 operating system in the early 2000s. However, the Smart Phone category has evolved greatly in the last several year, and now includes such mobile operating systems as iOS (Apple’s mobile platform for iPhones, iPod Touch and iPad), Google’s Android OS (which is licensed to several different handset manufacturers), WebOS (which runs on HP/Palm Pre and Pixi devices, and possibly on future HP mobile devices as well), current Windows Mobile 6.5 and future Windows Phone 7 phones, and several other devices that license ActiveSync from Microsoft in order to provide wireless communication to the Exchange enterprise platform, which is ubiquitous in the business community. Smart Phones with an operating system of Windows Mobile 6, or later typically synch email, contacts, calendar, and tasks with an Exchange mailbox. The features associated with ActiveSync enabled phones may differ depending upon the phone device itself or the nature of the licensing agreement for utilizing ActiveSync. General Settings for ActiveSync Because of the popularity of Exchange, mobile ActiveSync
    [Show full text]
  • The Culture of Iphones on Stanford Campus Morgan G
    Managing Mobile Multitasking: The Culture of iPhones on Stanford Campus Morgan G. Ames Department of Communication Stanford University [email protected] ABSTRACT them either iPhones or Android devices [20]. However, there This paper discusses three concepts that govern technosocial is still little scholarship that examines smartphone use practices among university students with iPhones. First is the specifically. This paper explores the rules, etiquette, and social expectation of constant connection that requires practices that governed the use of iPhones on campus, which multitasking to achieve. Second is the resulting technosocial tended to balance two competing desires. On one hand, pecking order of who gets interrupted or ignored for whom. students reported social expectations of constant connection , Third is the way that many students push back against these which often led to heavy multitasking, emphasized by demands with techno-resistance , deliberately curtailing iPhones but also enabled by other mobile phones, laptops, constant connection to reduce the negative effects of and other devices. On the other hand, two-thirds of students multitasking, in spite of the risk of social censure. These practiced techno-resistance , actively setting boundaries or concepts are developed from interviews with 57 students, 30 disconnecting from their iPhones and other devices. This let hours of field observations, and a survey of 177 students on them minimize the negative cognitive effects of multitasking Stanford campus, which in particular explored iPhone use. and reinforce personal identities and values opposing This research concludes that so-called “digital natives” must constant connection. This latter finding in particular presents still navigate familiar social dynamics and personal desires, a contrasting perspective to the often celebratory tone of both online and off.
    [Show full text]
  • Symbian Foundation Press Conference
    Symbian Foundation Press conference M/C – Merran Wrigley Exciting Internet experiences for the aspirations of billions 2 © 2008 Symbian Foundation Mobile software set free Symbian Foundation Kai Öistämö Executive Vice President, Nokia Shared vision for an unparalleled open mobile software platform 4 © 2008 Symbian Foundation That unites Symbian OS, S60, UIQ and MOAP(S) 5 © 2008 Symbian Foundation Creating the most proven, open, complete mobile software platform 6 © 2008 Symbian Foundation With over 200 million devices already shipped 7 © 2008 Symbian Foundation For free. 8 © 2008 Symbian Foundation Creating one platform, royalty-free Foundation Differentiated Member experience MOAP(S) 9 © 2008 Symbian Foundation Creating one platform, royalty-free Foundation Differentiated Member experience Symbian Foundation Platform Applications suite Runtimes UI framework Middleware Operating system Tools & SDK 10 © 2008 Symbian Foundation The first step to our goal • Acquiring Symbian Ltd • Closing expected in Q4 2008 • Symbian Ltd to be part of Nokia • Nokia will contribute Symbian OS and S60 to Symbian Foundation 11 © 2008 Symbian Foundation Fulfilling the Symbian mission Symbian Foundation Nigel Clifford CEO, Symbian Symbian Ltd Mission To become the most widely used software platform on the planet 13 © 2008 Symbian Foundation The leading global open platform 12% Symbian Linux 11% Microsoft RIM 60% Apple 11% Other Source Canalys – Cumulative 4% 12 month period to Q1 2008 2% 14 © 2008 Symbian Foundation The choice for the top vendors Samsung MOTO
    [Show full text]
  • Nokia Company Tree!
    NOKIA COMPANY TREE! (I THINK... BASED ON MANY INTRANET CHARTS) SERVICES DEVICES MARKETS CORPORATE DEVELOPMENT OFFICE (CDO) MUSIC GAMES MEDIA MESSAGING SOCIAL PEOPLE SERVICE SERVICE STRATEGY RESEARCH & NOKIA CATEGORY FOCUSED SALES CONSUMER MARKETING DEMAND SUPPLY NOKIA COMPATIBILITY CORPORATE CORPORTATE SOLUTIONS NOKIA LOCATION & PLACES EXPERIENCE PLATFORMS & NEW DEVELOPMENT DESIGN MANAGEMENT BUSINESSES INSIGHTS & BRAND OPERATIONS NETWORK RESEARCH & INDUSTRY STRATEGY BUSINESS PORTFOLIO IT BUSINESSES (R&D) MANAGEMENT MANAGEMENT CENTER COLLABORATION DEVELOPMENT MANAGEMENT (CI & BM) (DSNM) (NRC) (CIC) RESEARCH & NOKIA GAMES PRODUCT NOKIA CONTEXTUAL PRODUCT DEPLOYMENT SHARED EMERGING COMMON SERVICE & CONNECT CDMA GO-TO-MARKET CONSUMER & CATEGORY VALUE NRC MARKET STRATEGIC STRATEGIC STRATEGIC IT & PROCESS DEVELOPMENT PUBLISHING BRANDED GUIDANCE SERVICES MARKET TECHNOLOGIES UI DESIGN CUSTOMER MARKETING OPERATIONS BEIJING COMPATIBILITY PLANNING ALLIANCES & ALIGNMENT COMMITTEE (R&D) CONTENT MESSAGING PLATFORM USER SERVICES (SUID) ACHIEVE NOKIA DISTRIBUTION INSIGHT (INCLUDING PROGRAMS & DIALOGUE PARTNERSHIPS 3RD PARTY MAP & RELEASES & EXPERIENCE SERVICE (EMS) S40/S30 GEAR WEST (CCI) CREATIVE VOLUME AFRICA & PORTFOLIO IT MANAGEMENT STRATEGY PUBLISHING LICENSING OPERATOR EXPLORE ARCHITECTURE DEPLOYMENT DISCOVERY EXPLORE EXCELLENCE OPERATIONS INDIA) CONTENT & STRATEGY BUSINESS ANALYSIS BRANDED CONSUMER STRATEGIC S60 & STRATEGY VERTU DISTRIBUTION STRATEGIC APPLICATIONS DEVELOPMENT DEVELOPMENT PORTFOLIO GLOBAL MUSIC MPG OPERATIONS & S40 KEEP IN PLATFORM
    [Show full text]
  • Modest Talk at Guadec/Desktop Summit 2009
    static void _f_do_barnacle_install_properties(GObjectClass *gobject_class) { GParamSpec *pspec; Modest /* Party code attribute */ pspec = g_param_spec_uint64 Creating a modern mobile (F_DO_BARNACLE_CODE, "Barnacle code.", "Barnacle code", 0, email client with gnome G_MAXUINT64, G_MAXUINT64 /* default value */, G_PARAM_READABLE technologies | G_PARAM_WRITABLE | G_PARAM_PRIVATE); g_object_class_install_property (gobject_class, F_DO_BARNACLE_PROP_CODE, José Dapena Paz jdapena AT igalia DOT com Sergio Villar Senín svillar AT igalia DOT com Brief history ● Started in 2006 ● 2007 Targeted for Maemo Chinook ● December 2007 first beta release ● 2008 Maemo Diablo ● 2009 Development becomes public. Repository moved to git How big is it? ● Modest Total Physical Source Lines of Code (SLOC) = 104,675 ● Tinymail Total Physical Source Lines of Code (SLOC) = 179,363 Goals Easy to use Embedded devices ● Small resources ● Small screen ● Small storage Multiple UI. Common logic Gnome UI Maemo 4/Diablo UI Maemo 5/Fremantle UI Coming soon... Support for most common email protocols ● IMAP ● POP ● SMTP Push email IMAP IDLE Extensibility New plugin architecture Architecture Architecture Gtk+ Hildon 2 GLib Pango GConf GtkHTML Modest Modest Modest Alarm MCE Abook plugin Xproto Plugin Yproto libtinymail-gtk libtinymail-maemo libtinymail-camel camel-lite Camel Xproto Tinymail Camel Yproto IMAP POP SMTP Xproto daemon Camel-lite mmap-ed summaries ● Very reduced memory usage ● Very compact representation on disk ● Efficient use of memory (thx kernel) IMAP IDLE support Camel features out-of-the-box ● Great support for MIME ● Stream based API ● Modular extensible Tinymail ● Multiple platforms ● Simplifies Camel API's ● Integrated Glib mainloop ● Gtk+ widgets ● Asynchronous API. Responsive UI ● Modular design Modest ● Message view based on gtkhtml ● Rich message editor based on wpeditor ● Offline read of messages and folders ● Integration with network status libraries Migration to Hildon 2.2 Hildon 2.2/Fremantle philosophy ● Proper experience with finger in small screens.
    [Show full text]
  • XP8 Bell Canada User Guide English
    XP8 USER GUIDE © 2018 by Sonim Technologies, Inc. All rights reserved. CONTENT GENERAL INFORMATION Congratulations on the purchase of a Sonim XP8 (XP8800) mobile phone! This phone is LTE smartphone Copyright © 2018 Sonim Technologies, Inc. enabled and has an intuitive feature-rich user interface, Sonim and the Sonim logo are trademarks of Sonim which allows you to make the best use of offered Technologies, Inc. Other company and product names functions. may be trademarks or registered trade-marks of the respective owners with whom they are associated. PHONE MODELS COVERED THIRD PARTY TRADEMARKS This user guide covers Sonim XP8 phone with the model number XP8800. The model name can be seen on Google, Android, Google Calendar, Google Now, Google backside of the phone. Play and other marks are trademarks of Google Inc. Disposal of Old Electrical and Electronic Equipment SONIM SUPPORT INFORMATION The symbol of the crossed-out wheeled For additional product and support information, visit bin indicates that within the countries in the www.sonimtech.com. European Union, this product, and any en- hancements marked with this symbol, cannot USE THE GUIDE EFFECTIVELY be disposed as unsorted waste but must be Familiarize yourself with the terminology and symbols taken to separate collection at their end- of- used in the guide to help you use your phone effectively. life. DISPOSAL OF BATTERY HOME This is the screen displayed when the SCREEN phone is in standby mode. Please check local regulations for disposal of batteries. The battery should never be placed TOUCH & Touch and hold an item on the screen by in municipal waste.
    [Show full text]
  • Mirroring and Disruption - a Case Study of Nokia’S Decline Master of Science Thesis in the Management and Economics of Innovation Program
    heh Mirroring and Disruption - A Case Study of Nokia’s Decline Master of Science Thesis in the Management and Economics of Innovation Program CARL-JOHAN BLOMQVIST DAÐI SNÆR SKÚLASON MAGNUS SJÖLANDER Department of Technology Management and Economics Division of Innovation Engineering and Management CHALMERS UNIVERSITY OF TECHNOLOGY Göteborg, Sweden, 2014 Report No. E 2014:008 MASTER’S THESIS E 2014:008 Mirroring and Disruption A Case Study of Nokia’s Decline CARL-JOHAN BLOMQVIST DAÐI SNÆR SKÚLASON MAGNUS SJÖLANDER Supervisor: Christian Sandström, Ph.D. Department of Technology Management and Economics Division of Innovation Engineering and Management CHALMERS UNIVERSITY OF TECHNOLOGY Göteborg, Sweden 2014 MIRRORING AND DISRUPTION Carl-Johan Blomqvist Daði Snær Skúlason Magnus Sjölander © CARL-JOHAN BLOMQVIST, DAÐI SNÆR SKÚLASON & MAGNUS SJÖLANDER, 2014 Master’s Thesis E 2014: 008 Department of Technology Management and Economics Division of Innovation Engineering and Management Chalmers University of Technology SE-412 96 Göteborg, Sweden Telephone: + 46 (0)31-772 1000 Chalmers Reproservice Göteborg, Sweden 2014 Abstract The mobile industry is an ever changing and fast growing technology based industry that is very interesting to examine at this point in time due to the technological shift the industry has gone through in the recent years. This technological shift has caused a disruption in the industry and led to the demise of many incumbents as new firms entered the industry. We argue that the shift the mobile industry has gone through is not merely a technological one, but rather a paradigm shift from the old feature phone paradigm to the new smartphone paradigm. Further, this paradigm shift brings substantial changes; where the institutions and underlying logic as well as those competences and business models that are important differ between the two paradigms.
    [Show full text]
  • Wireless Evolution •..••••.•.•...•....•.•..•.•••••••...••••••.•••.••••••.••.•.••.••••••• 4
    Department of Justice ,"'''''''''<11 Bureau of Investigation ,Operational Technology Division WIRELESS EVDLUTIDN IN THIS Iselil-it:: .. WIRELESS EVOLUTIDN I!I TECH BYTES • LONG TERM EVOLUTIQN ill CLDUD SERVICES • 4G TECHNOLOGY ill GESTURE-RECOGNITION • FCC ON BROADBAND • ACTIVITY-BASED NAVIGATION 'aw PUIi! I' -. q f. 8tH'-.1 Waa 8RI,. (!.EIi/RiW81 R.d-nl)) - 11 - I! .el " Ij MESSAGE FROM MANAGEMENT b7E he bou~~aries of technology are constantly expanding. develop technical tools to combat threats along the Southwest Recognizing the pathway of emerging technology is Border. a key element to maintaining relevance in a rapidly changing technological environment. While this The customer-centric approach calls for a high degree of T collaboration among engineers, subject matter experts (SMEs), proficiency is fundamentally important in developing strategies that preserve long-term capabilities in the face of emerging and the investigator to determine needs and requirements. technologies, equally important is delivering technical solutions To encourage innovation, the technologists gain a better to meet the operational needs of the law enforcement understanding of the operational and investigative needs customer in a dynamic 'threat' environment. How can technical and tailor the technology to fit the end user's challenges. law enforcement organizations maintain the steady-state Rather than developing solutions from scratch, the customer­ production of tools and expertise for technical collection, while centric approach leverages and modifies the technoloe:v to infusing ideas and agility into our organizations to improve our fit the customer's nFlFlrt~.1 ability to deliver timely, relevant, and cutting edge tools to law enforcement customers? Balancing these two fundamentals through an effective business strategy is both a challenge and an opportunity for the Federal Bureau of Investigation (FBI) and other Federal, state, and local law enforcement agencies.
    [Show full text]
  • Active Business Communications Welcomes You to the Iphone 5
    Active Business Communications welcomes you to the iPhone 5 New user to iPhone? What you need: • A wireless service plan with a carrier that provides iPhone service in your area • An Internet connection for your computer (broadband is recommended) • An Apple ID for some features, including iCloud, the App Store and iTunes Store, and online purchases. An Apple ID can be created during the Setup process. To use your iPhone with your computer, you need: • A Mac with a USB 2.0 or 3.0 port, or a PC with a USB 2.0 port, and one of the following operating systems o Mac OS X Version 10.6.8 or later o Windows 7, Windows Vista, or Windows XP Home or Professional with Service Pack 3 or later o iTunes 10.7 or later (for some features), available at www.itunes.com/download Installing the SIM card: You will have given a new SIM card to install before setting up your iPhone. This is inserted via the SIM tray on the right hand side of the handset, and you will require the Apple Tool or a paper clip to remove this. Existing iPhone user? How to transfer information from previous iPhone: http://support.apple.com/kb/HT2109 How to back up your device: http://support.apple.com/kb/HT1766 How to set up your contacts and calendars on iPhone 5 from other devices Transferring contacts from Android to iPhone 5: If properly set up, your Android phone should automatically backup your contacts to Googlemail. You will need to plug your new iPhone 5 into your computer to copy these onto your device.
    [Show full text]