Android Things* -High Level Introduction Open Iot Summit, Feb ‘17 Anisha Kulkarni Geeta Krishna Agenda
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
EPIC Google FTC Complaint
Before the Federal Trade Commission Washington, DC 20580 In the Matter of ) ) Google, Inc. and ) Cloud Computing Services ) ________________________________ ) Complaint and Request for Injunction, Request for Investigation and for Other Relief SUMMARY OF COMPLAINT 1. This complaint concerns privacy and security risks associated with the provision of “Cloud Computing Services” by Google, Inc. to American consumers, businesses, and federal agencies of the United States government. Recent reports indicate that Google does not adequately safeguard the confidential information that it obtains. Given the previous opinions of the Federal Trade Commission regarding the obligation of service providers to ensure security, EPIC hereby petitions the Federal Trade Commission to open an investigation into Google’s Cloud Computing Services, to determine the adequacy of the privacy and security safeguards, to assess the representations made by the firm regarding these services, to determine whether the firm has engaged in unfair and/or deceptive trade practices, and to take any such measures as are necessary, including to enjoin Google from offering such services until safeguards are verifiably established. Such action by the Commission is necessary to ensure the safety and security of information submitted to Google by American consumers, American businesses, and American federal agencies. PARTIES 1. The Electronic Privacy Information Center (“EPIC”) is a public interest research organization incorporated in Washington, DC. EPIC’s activities include the review of government and private sector policies and practices to determine their impact on the privacy interests of the American public. Among its other activities, EPIC initiated the complaint to the FTC regarding Microsoft Passport in which the Commission subsequently required Microsoft to implement a comprehensive information security program for 1 Passport and similar services.1 EPIC also filed the complaint with the Commission regarding databroker ChoicePoint, Inc. -
Xbook: Redesigning Privacy Control in Social Networking Platforms
xBook: Redesigning Privacy Control in Social Networking Platforms Kapil Singh∗ Sumeer Bhola∗ Wenke Lee SchoolofComputerScience Google SchoolofComputerScience Georgia Institute of Technology [email protected] Georgia Institute of Technology [email protected] [email protected] Abstract in social networks. Social networking websites have recently evolved from With the advent of Web 2.0 technologies, web appli- being service providers to platforms for running third cation development has become much more distributed party applications. Users have typically trusted the so- with a growing number of users acting as developers and cial networking sites with personal data, and assume that source of online content. This trend has also influenced their privacy preferences are correctly enforced. However, social networks that now act as platforms allowing de- they are now being asked to trust each third-party applica- velopers to run third-party content on top of their frame- tion they use in a similar manner. This has left the users’ work. Facebook opened up for third-party application private information vulnerable to accidental or malicious development by releasing its development APIs in May leaks by these applications. 2007 [22]. Since the release of the Facebook platform, In this work, we present a novel framework for build- several other sites have joined the trend by supporting ing privacy-preservingsocial networking applications that Google’s OpenSocial [10], a cross-site social network de- retains the functionality offered by the current social net- velopment platform. works. We use information flow models to control what These third-party applications further escalate the pri- untrusted applications can do with the information they vacy concerns as user data is shared with these applica- receive. -
How to Generate P12 Key
Lepide Active Directory Self Service Generate P12 Key This document explains the steps to successfully install SSL security. Lepide Active Directory Self Service Generate P12 Key How to generate P12 key Lepide Active Directory Self Service allows Password Synchronization of Google Apps and IBM accounts. In order to enable Google Apps Password synchronization, you need to generate a P12 key by making certain settings in your Google service account. Follow the below mentioned steps to generate the P12 key for Google App Service Account. 1. Open Google Developer Console Project for Google Cloud Platform - https://console.developers.google.com/project in Web browser, preferably Google Chrome. 2. Enter the email address of your Google Service Account and click "Next". © Lepide Software Pvt. Ltd. Page 2 Lepide Active Directory Self Service Generate P12 Key 3. Enter the password of your Google Service Account and click "Sign In". It takes you to the Google Service Projects page. 4. Click "Create Project" to access "New Project" pop-up. © Lepide Software Pvt. Ltd. Page 3 Lepide Active Directory Self Service Generate P12 Key 5. The Project ID is assigned as per the project name. If you want to provide a manual project ID, click "Edit" link. You can also click "Show advanced options..." to access the advanced options. 6. Enter the Project Name, Project ID, and select the advanced option. Click "Create" to create the project. © Lepide Software Pvt. Ltd. Page 4 Lepide Active Directory Self Service Generate P12 Key 7. Once created, the dashboard comes up. Click "Enable and Manage APIs" in "Use Google APIs" section. -
Monitoring Google Cloud Platform
Monitoring Google Cloud Platform Google Cloud Platform *BETA* PowerPack version 100 Table of Contents Introduction 3 What is Google Cloud Platform? 3 What Does the Google Cloud Platform *BETA* PowerPack Monitor? 4 What are GCP Regions and Zones? 4 Installing the Google Cloud Platform *BETA* PowerPack 5 Configuring Google Cloud Platform for Monitoring 7 Creating a Google Cloud Platform Service Account 7 Enabling Google Cloud Platform APIs 9 Creating an SSH/Key Credential for Google Cloud Platform 10 Creating a Google Cloud Platform Virtual Device 12 Aligning the Google Cloud Platform Dynamic Applications 13 Discovering Google Cloud Platform Component Devices 13 Viewing Google Cloud Platform Component Devices 15 Relationships Between Component Devices 17 Chapter 1 1 Introduction Overview This manual describes how to monitor Google Cloud Platform (GCP) resources in the ScienceLogic platform using the Google Cloud Platform *BETA* PowerPack. The following sections provide an overview of GCP and the Google Cloud Platform *BETA* PowerPack: What is Google Cloud Platform? 3 What Does the Google Cloud Platform *BETA* PowerPack Monitor? 4 What are GCP Regions and Zones? 4 Installing the Google Cloud Platform *BETA* PowerPack 5 NOTE: ScienceLogic provides this documentation for the convenience of ScienceLogic customers. Some of the configuration information contained herein pertains to third-party vendor software that is subject to change without notice to ScienceLogic. ScienceLogic makes every attempt to maintain accurate technical information and cannot be held responsible for defects or changes in third-party vendor software. There is no written or implied guarantee that information contained herein will work for all third-party variants. -
IBM Security Maas360 with Watson Consolidated Device Use Cases
IBM Security MaaS360 with Watson A deep dive into how MaaS360 supports any device and any operating system Introduction Apple iOS, macOS, & iPadOS Google Android & Chrome OS Microsoft Windows Ruggedized & IoT Request a demo The basics This is your primer on IBM Security MaaS360 with Watson, IBM’s industry-leading unified endpoint management (UEM) solution. Before we dive in, let’s make clear that, of course, any enrolled device can be locked to the passcode screen, pinged for its last known location, wiped remotely, have a passcode configured, have WiFi networks and VPN profiles distributed, and all of the other basic functions expected from bare bones mobile device management (MDM). But in this era of instant connectivity, an increasingly mobile workforce, and the expansion of non-traditional wearable, ruggedized, and virtualized endpoints, we wanted to make sure you get a little bit more out of the content you download. That said, if you’re still curious what else IBM Security MaaS360 can do once you’ve finished thumbing through here, take it for a spin with a free trial or connect with an IBMer for a demo. IBM Security MaaS360 with Watson 2 Introduction Apple iOS, macOS, & iPadOS Google Android & Chrome OS Microsoft Windows Ruggedized & IoT Request a demo Contents Apple iOS, macOS, & iPadOS Google Android & Chrome OS Microsoft Windows Ruggedized & IoT Apple Business Manager (ABM) Android Enterprise enrollment OOBE, Bulk Enrollment, Windows 10 Autopilot Device compliance & security and Over-the-Air (OTA) enrollment Apple device policy -
Jeffrey Scudder Google Inc. March 28, 2007 Google Spreadsheets Automation Using Web Services
Jeffrey Scudder Google Inc. March 28, 2007 Google Spreadsheets Automation using Web Services Jeffrey Scudder Google Inc. March 28, 2007 2 Overview What is Google Spreadsheets? • Short Demo What is the Google Spreadsheets Data API? • Motivations (Why an API?) • Protocol design • Atom Publishing Protocols • GData • List feed deconstructed How do I use the Google Spreadsheets Data API? • Authentication • Longer Demo Questions 3 What is Google Spreadsheets? Let’s take a look 4 What is Google Spreadsheets? Why not ask why • Spreadsheets fits well with our mission… – “Organize My Information… and… – Make it Accessible and Useful… – With whomever I choose (and nobody else, thanks)” • In other words…. – Do-it-yourself Content Creation – Accepted/Familiar Interface of Spreadsheets and Documents – Accessibility from anywhere (…connected) – Easy-to-use Collaboration – Do-it-yourself Community Creation 5 What is the Google Spreadsheets Data API? Motivations • Foster development of specific-use apps • Allow users to create new UIs • To extend features offered • To integrate with 3rd party products • To offer new vertical applications 6 What is the Google Spreadsheets Data API? Protocol design based on existing open standards • Deciding on design principles – Use a RESTful approach – Reuse open standards – Reuse design from other Google APIs • The end result – REST web service based on GData – Data is in Atom XML and protocol based on the Atom Publishing Protocol (APP) – GData is based on Atom and APP and adds authentication, query semantics, and more -
Building Research Tools with Google for Dummies (2005).Pdf
01_57809x ffirs.qxd 3/3/05 12:46 PM Page i Building Research Tools with Google™ FOR DUMmIES‰ by Harold Davis TEAM LinG - Live, Informative, Non-cost and Genuine ! 01_57809x ffirs.qxd 3/3/05 12:46 PM Page ii Building Research Tools with Google™ For Dummies® Published by Wiley Publishing, Inc. 111 River Street Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2005 by Wiley Publishing, Inc., Indianapolis, Indiana Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permis- sion of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www. wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States and other countries, and may not be used without written permission. -
Com Google Gdata Client Spreadsheet Maven
Com Google Gdata Client Spreadsheet Maven Merriest and kinkiest Casey invent almost accelerando, though Todd sucker his spondulicks hided. Stupefied and microbiological Ethan readies while insecticidal Stephen shanghais her lichee horribly and airts cherubically. Quietist and frostbitten Waiter never nest antichristianly when Stinky shook his seizin. 09-Jun-2020 116 24400 google-http-java-client-findbugs-1220-lp1521. It just gives me like a permutation code coverage information plotted together to complete output panel making mrn is com google gdata client spreadsheet maven? Chrony System EnvironmentDaemons 211-1el7centos An NTP client. Richard Huang contact-listgdata. Gdata-mavenmaven-metadataxmlmd5 at master eburtsev. SpreadsheetServiceVersionsclass comgooglegdataclientspreadsheet. Index of sitesdownloadeclipseorgeclipseMirroroomph. Acid transactions with maven coordinates genomic sequences are required js code coverage sequencing kits and client library for com google gdata client spreadsheet maven project setup and table of users as. Issues filed for googlegdata-java-client Record data Found. Uncategorized Majecek's Weblog. API using Spring any Spring Data JPA Maven and embedded H2 database. GData Spreadsheet1 usages comgooglegdataclientspreadsheet gdata-spreadsheet GData Spreadsheet Last feather on Feb 19 2010. Maven dependency for Google Spreadsheet Stack Overflow. Httpmavenotavanopistofi7070nexuscontentrepositoriessnapshots false. Gdata-spreadsheet-30jar Fri Feb 19 105942 GMT 2010 51623. I'm intern to use db2triples for the first time fan is a java maven project. It tries to approve your hours of columns throughout the free software testing late to work. Maven Com Google Gdata Client Spreadsheet Google Sites. Airhacksfm podcast with adam bien Apple. Unable to build ODK Aggregate locally Development ODK. Bmkdep bmon bnd-maven-plugin BNFC bodr bogofilter boinc-client bomber bomns bonnie boo books bookworm boomaga boost1710-gnu-mpich-hpc. -
Sakai and GWT.Pdf
Sakai and GW T Toward Improved UX and Easy Web 2.0 D evelopment all in Java Claude Coulombe Sacha Leprêtre Université de Montréal CRIM & Sakai Québec OpenSyllabus: O ld fashioned web - Click and wait! W eb 2.0 : User Experience (UX ) W eb 2.0 : User Experience (UX ) • Perceived 2nd generation of web sites and services • Improved UX is what W eb 2.0 is all about • Students ask for responsive and dynamic web interfaces and web interface similar to desktop interface • Sakai must evolve toward W eb 2 and deliver a better UX • Improving UX more complex GUI more work for developers • How to keep happy users & developers? • But, great technology doesn't give great UX … • The real magicians are the UI designers O penSyllabus - Short D emo • W hat we have done with O penSyllabus… AJAX – A breakthrough! AJAXAJAX The first use of the term in public was by Jesse James Garrett in February 2005 AJAX – A breakthrough! • Ajax eliminates painful page loading! • Ajax stands for Asynchronous JavaScript and X ML • X MLHttpRequest JavaScript O bject allows asynchronous requests for data to the server and updates the web page without doing a full page reload • Invented by Microsoft • W ithout Ajax we were still stuck with click and wait interface • The result is more responsive and dynamic W ebapps • But, Ajax is based on Client-side JavaScript Looking for a silver bullet… • Hundreds of JavaScript Libraries and Ajax Frameworks • W hich one will be the good one? • Survey of Sakai’s Ajax and alternative technologies: - UX Richness of the libraries - Easy dev, quick learning curve - Easy integration with Sakai - O pen Source License - D ocumentation - Endorsement - Cross browsing compatibility - Java based - D ev tools / ID E (eclipse) - D ebugging/Test Problems with JavaScript… So, he didn't know JavaScript well enough.. -
Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling
Cross-App Interference Threats in Smart Homes: Categorization, Detection and Handling Haotian Chi∗, Qiang Zengy, Xiaojiang Du∗, Jiaping Yu∗ ∗Department of Computer and Information Sciences, Temple University, Philadelphia, PA 19122, USA yDepartment of Computer Science and Engineering, University of South Carolina, Columbia, SC 29208, USA Email: fhtchi, dux, [email protected], [email protected] Abstract—A number of Internet of Things (IoTs) platforms a smart door lock via an IoT app to break into homes, which have emerged to enable various IoT apps developed by third- is impossible in non-appified IoT systems. party developers to automate smart homes. Prior research mostly Fernandes et al. [22] discover design flaws such as the concerns the overprivilege problem in the permission model. Our work, however, reveals that even IoT apps that follow overprivilege problem in Samsung’s SmartThings, one of the the principle of least privilege, when they interplay, can cause most mature smart home platforms; they demonstrate that unique types of threats, named Cross-App Interference (CAI) malicious apps can be constructed to expose smart homes to threats. We describe and categorize the new threats, showing severe attacks that exploit the overprivilege problem. Thus, that unexpected automation, security and privacy issues may be some systems are proposed to handle the problem. ContexIoT caused by such threats, which cannot be handled by existing IoT security mechanisms. To address this problem, we present [29] proposes a context-based permission system to involve HOMEGUARD, a system for appified IoT platforms to detect users into making decisions on whether a security-critical and cope with CAI threats. -
Ray Cromwell
Building Applications with Google APIs Ray Cromwell Monday, June 1, 2009 “There’s an API for that” • code.google.com shows 60+ APIs • full spectrum (client, server, mobile, cloud) • application oriented (android, opensocial) • Does Google have a Platform? Monday, June 1, 2009 Application Ecosystem Client REST/JSON, GWT, Server ProtocolBuffers Earth PHP Java O3D App Services Media Docs Python Ruby Utility Blogger Spreadsheets Maps/Geo JPA/JDO/Other Translate Base Datastore GViz Social MySQL Search OpenSocial Auth FriendConnect $$$ ... GData Contacts AdSense Checkout Monday, June 1, 2009 Timefire • Store and Index large # of time series data • Scalable Charting Engine • Social Collaboration • Story Telling + Video/Audio sync • Like “Google Maps” but for “Time” Monday, June 1, 2009 Android Version 98% Shared Code with Web version Monday, June 1, 2009 Android • Full API stack • Tight integration with WebKit browser • Local database, 2D and 3D APIs • External XML UI/Layout system • Makes separating presentation from logic easier, benefits code sharing Monday, June 1, 2009 How was this done? • Google Web Toolkit is the Foundation • Target GWT JRE as LCD • Use Guice Dependency Injection for platform-specific APIs • Leverage GWT 1.6 event system Monday, June 1, 2009 Example App Code Device/Service JRE interfaces Guice Android Browser Impl Impl Android GWT Specific Specific Monday, June 1, 2009 Shared Widget Events interface HasClickHandler interface HasClickHandler addClickHandler(injectedHandler) addClickHandler(injectedHandler) Gin binds GwtHandlerImpl -
Architecture, Development and Testing Environment for a Visual Analytics-Based Criminal Intelligence Analysis System
U N C L A S S I F I E D P U B L I C VALCRI WHITE PAPER SERIES VALCRI-WP-2017-001 1 January 2017 Edited by B.L. William Wong Architecture, Development and Testing Environment for a Visual Analytics-Based Criminal Intelligence Analysis System Rani Pinchuk1, Nick Evers1, Christophe Vandenberghe1. Patrick Aichroth2, Rudolf Schreiner3, and B.L. William Wong4 1Space Applications Services NV/SA Leuvensesteenweg, 325, 1932 Zaventem, BELGIUM 2Fraunhofer Institute for Digital Media Technology Ehrenbergstraße 31 98693 Ilmenau GERMANY 3Object Security, Ltd St John’s Innovation Centre Cowley Road Cambridge CB4 0WS UNITED KINGDOM 4Middlesex University London The Burroughs, Hendon London NW4 4BT UNITED KINGDOM Project Coordinator Middlesex University London Professor B.L. William Wong The Burroughs, Hendon Head, Interaction Design Centre London NW4 4BT Faculty of Science and Technology United Kingdom. Email: [email protected] Copyright © 2016 The Authors and Project VALCRI. All rights reserved. U N C L A S S I F I E D P U B L I C ABSTRACT The VALCRI architecture is built from different Docker containers that speak with each other using mostly REST interfaces. The architecture is designed to incorporating Security, Ethics, Privacy and Legal (SEPL) solutions. The data stores – the Unstructured Database (UDB) and the Structured database (SDB) – used are controlled by SEPL Enforcement components and a Template Engine manages the previously checked and accepted query templates that can be sent to the data stores. The Advanced User Interface (AUI) server is also designed with SEPL in mind: a Jetty (Java HTTP server and Java Servlet container) in- stance is created per user by a Jetty Lifecycle Management component.