Creating Your Own Programs
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Palm Security WP.Qxd
Palm® Mobility Series: Security Smartphone and handheld security for mobile business. Mobile computing: Opportunities and risk By providing professionals with convenient mobile access to email, business applications, customer information and critical corporate data, businesses can become more productive, streamline business processes and enable better decision making. With the new ease of access to information comes a responsibility to protect the organization's data as well as the investment in mobile devices. In many ways, security risks for mobile computing are similar to those for other computing platforms. There are the usual concerns of protecting data, authenticating users, and shielding against viruses and other malicious Contents code. But because of their mobility and compact size, smartphones and handhelds present some additional challenges: Mobile computing: Opportunities and risk...................................................... 1 Know thy enemy: Security risks...................................................................... 2 • Smartphones and handhelds are more easily lost or stolen than Theft and loss ............................................................................................ 2 laptop or desktop computers. Password cracking .................................................................................... 2 Data interception ...................................................................................... 2 • Users often treat smartphones and handhelds as personal devices Malicious code -
Remote Wireless Control of Building Management Systems Automation
Master Thesis Computer Science Thesis no: MCS-2004:23 Remote wireless control of building management systems automation Marcus Gylling Blekinge Institute of Technology Department of Software Engineering and Computer Science Examinator: Rune Gustavsson, Blekinge Institute of Technology Blekinge Institute of Technology Department of Software Engineering and Computer Science Preface This thesis is submitted to the Department of Software Engineering and Computer Science at Blekinge Institute of Technology in partial fulfilment of the requirements for the degree of Master of Science in Computer Science. The thesis is equivalent to 20 weeks of full time studies. The thesis is done in cooperation with Styrprojektering AB. Initiator to the project is Jan-Åke Gylling at Styrprojektering AB. The target group for this thesis is companies that creates installations in the building systems automation business, the users that controls those installations and also the house-owners of the buildings where the installations are made. Contact information Author: Marcus Gylling Email: [email protected] External advisor: Jan-Åke Gylling Styrprojektering AB University advisor: Rune Gustravsson II Remote wireless control of building management systems automation Blekinge Institute of Technology Department of Software Engineering and Computer Science Abstract The controlling unit in building management system automation is a PLC. Every device in an installation is connected to the PLC. When a user wants to interact with a system an operator terminal, which is attached to a cabinet where the PLC is installed, is used. With this solution the user needs to be in front of the cabinet to interact with the system. Alarms do not get the user’s attention until the user checks the operator terminal. -
The Symbian OS Architecture Sourcebook
The Symbian OS Architecture Sourcebook The Symbian OS Architecture Sourcebook Design and Evolution of a Mobile Phone OS By Ben Morris Reviewed by Chris Davies, Warren Day, Martin de Jode, Roy Hayun, Simon Higginson, Mark Jacobs, Andrew Langstaff, David Mery, Matthew O’Donnell, Kal Patel, Dominic Pinkman, Alan Robinson, Matthew Reynolds, Mark Shackman, Jo Stichbury, Jan van Bergen Symbian Press Head of Symbian Press Freddie Gjertsen Managing Editor Satu McNabb Copyright 2007 Symbian Software, Ltd John Wiley & Sons, Ltd The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England Telephone (+44) 1243 779777 Email (for orders and customer service enquiries): [email protected] Visit our Home Page on www.wileyeurope.com or www.wiley.com All Rights Reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except under the terms of the Copyright, Designs and Patents Act 1988 or under the terms of a licence issued by the Copyright Licensing Agency Ltd, 90 Tottenham Court Road, London W1T 4LP, UK, without the permission in writing of the Publisher. Requests to the Publisher should be addressed to the Permissions Department, John Wiley & Sons Ltd, The Atrium, Southern Gate, Chichester, West Sussex PO19 8SQ, England, or emailed to [email protected], or faxed to (+44) 1243 770620. Designations used by companies to distinguish their products are often claimed as trademarks. All brand names and product names used in this book are trade names, service marks, trademarks or registered trademarks of their respective owners. -
Developing Applications for Pocket PC and GPRS/EDGE Devcentral White Paper
Developing Applications for Pocket PC and GPRS/EDGE devCentral White Paper Document Number 12588 Revision 2.0 Revision Date 10/15/03 AT&T Wireless Developer Program © 2003 AT&T Wireless. All rights reserved. Legal Disclaimer This document and the information contained herein (collectively, the "Information") is provided to you (both the individual receiving this document and any legal entity on behalf of which such individual is acting) ("You" and "Your") by AT&T Wireless Services, Inc. ("AWS") for informational purposes only. AWS is providing the Information to You because AWS believes the Information may be useful to You. The Information is provided to You solely on the basis that You will be responsible for making Your own assessments of the Information and are advised to verify all representations, statements and information before using or relying upon any of the Information. Although AWS has exercised reasonable care in providing the Information to You, AWS does not warrant the accuracy of the Information and is not responsible for any damages arising from Your use of or reliance upon the Information. You further understand and agree that AWS in no way represents, and You in no way rely on a belief, that AWS is providing the Information in accordance with any standard or service (routine, customary or otherwise) related to the consulting, services, hardware or software industries. AWS DOES NOT WARRANT THAT THE INFORMATION IS ERROR-FREE. AWS IS PROVIDING THE INFORMATION TO YOU "AS IS" AND "WITH ALL FAULTS." AWS DOES NOT WARRANT, -
SQL Server CE Database Development with the .NET Compact Framework Copyright ©2003 by Rob Tiffany Originally Published by Apress in 2003
SQL Server CE Database Development- with the .NET Compact Framework ROB TIFFANY APress Media, LLC SQL Server CE Database Development with the .NET Compact Framework Copyright ©2003 by Rob Tiffany Originally published by Apress in 2003 All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. ISBN 978-1-59059-119-2 ISBN 978-1-4302-0785-6 (eBook) DOI 10.1007/978-1-4302-0785-6 Trademarked names may appear in this book. Rather than use a trademark symbol with every occurrence of a trademarked name, we use the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. Technical Reviewer: Darren Flatt Editorial Board: Dan Appleman, Craig Berry, Gary Cornell, Tony Davis, Steven Rycroft, Julian Skinner, Martin Streicher, Jim Sumser, Karen Watterson, Gavin Wray, John Zukowski Assistant Publisher: Grace Wong Project Manager: Nate McFadden Copy Editor: Ami Knox Production Manager: Kari Brooks Production Editor: Lori Bring Proofreader: Lori Bring Compositor: Argosy Publishing Indexer: Ron Strauss Cover Designer: Kurt Krames Manufacturing Manager: Tom Debolski The information in this book is distributed on an "as is" basis, without warranty. Although every precaution has been taken in the preparation of this work, neither the author(s) nor Apress shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in this work. -
Symbian Phone Security
Symbian phone Security Job de Haas ITSX Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Overview • Symbian OS. • Security Risks and Features. • Taking it apart. • Conclusions. Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian History • Psion owner of EPOC OS, originally from 1989, released EPOC32 in 1996 • EPOC32 was designed with OO in C++ • 1998: Symbian Ltd. formed by Ericsson, Nokia, Motorola and Psion. • EPOC renamed to Symbian OS • Currently ~30 phones with Symbian and 15 licensees. Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian Organization • Symbian licenses the main OS • Two GUI’s on top of Symbian: – Series 60, led by Nokia – UIQ, subsidiary of Symbian • Ownership: – Nokia 47.5% Panasonic 10.5% – Ericsson 15.6% Siemens 8.4% – SonyEricsson 13.1% Samsung 4.5% Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian Versions • EPOC32 • EPOC R5 • Symbian v6.0 • Symbian v7.0 • Symbian v8.0 • Symbian v9.0 announced for Q3 ‘05 Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Series60 versions • 1st edition • 2nd edition • 3rd edition, announced feb. 2005 Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 UIQ versions • UIQ 1.0 • UIQ 2.1 • UIQ 3.0 released feb 2005 Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian OS Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian OS • Multitasking, preemptive kernel. • MMU protection of kernel and process spaces. • Strong Client – Server architecture • Plug-in patterns • Filesystem in ROM, Flash, RAM and on SD-card Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian development • Symbian v6 and v7 are compiled with a modified GCC. -
Using Codewarrior for Macintosh
CS106B Handout #5M Winter 04-05 January 7, 2005 Using CodeWarrior for Macintosh In CS106, you have the option of writing your programs on the Mac or PC. For the Macintosh environment, you will write your programs using the C++ compiler by Metrowerks called CodeWarrior Professional. The current version of CodeWarrior, Pro 8, has been site-licensed to Stanford and can be downloaded from the Software page on the course web site. CodeWarrior provides a very nice editing environment and debugger, and it is the state-of-the-art C++ compiler for the Mac. One of the consequences of using a state-of-the-art compiler is that the system requirements for CodeWarrior Pro 8 are somewhat high – it requires Mac OS 9.2.2 or later, 700MB of hard drive space, and at least 64 MB of RAM. You also have to have CarbonLib 1.5, since Pro 8 is written for Mac OS X as well. If you have OS X, then you need 128MB of RAM to run CodeWarrior Pro 8, and you don’t need CarbonLib as this is already part of OS X. You can download CarbonLib from Apple—more on this later. Using CodeWarrior at a cluster CodeWarrior is available for use in the Lair (the Tresidder Macintosh cluster), on the Macs in Meyer library, and in the residential computer clusters. Often it will already be in the Applications folder on the machine’s hard disk. If there is a folder there named something like Metrowerks CodeWarrior 8, then the application can be found within that folder. -
This Introduction to the Metrowerks Codewarrior Software Development Tools
Tutorial Introduction PURPOSE: - Provides an overview of the Metrowerks CodeWarrior toolset and explains how the toolset is organized and operates OBJECTIVES - Describe the CodeWarrior integrated development environment (IDE) - Identify the components of the CodeWarrior build system. - Identify the hosts on which the IDE executes. - Define a target. CONTENT: - 14 pages - 3 questions LEARNING TIME: - 20 minutes Welcome to this introduction to the Metrowerks CodeWarrior software development tools. This tutorial explains how CodeWarrior combines the programs required to write software into one seamless, integrated work environment. CodeWarrior tools run on several different platforms and can generate machine code for a variety of desktop and embedded systems. Upon completion of this tutorial, you’ll be able to describe the components of the CodeWarrior build system and the general organization of the software package. You’ll also be able to define a target and describe the operating systems that will host the software. 1 What is an IDE? • The IDE consists of tools that are used throughout the software development process. Project Manager Compiler Editor Assembler Search engine Linker Source code browser Debugger GUI designer • The tools are integrated fully and seamlessly. • A single environment is provided for software development. -- consistent operation -- move among all the tools freely -- a non-modal design In the CodeWarrior toolset, the Editor, Compiler, Linker, Debugger, and other software modules operate within an Integrated Development Environment, or IDE. The IDE oversees the control and execution of the tools. It provides an interface to the tools that is consistent and predictable. The operation of the development tools is seamless. -
Nathan Miller (Final)
Nathan Miller 5300 Parkview Drive #2062 Lake Oswego, OR 97035 541.954.0531 [email protected] SKILLS Overview I have extensive experience in all stages of the application development process, including requirement gathering and translation, functional specification compilation, technology evaluation, architecture\design, implementation, and maintenance\quality assurance. Languages\Frameworks • 8 years C\C++, designing and implementing all manner of desktop and network- communicating applications on Windows-based desktops (Windows SDK, MFC, ATL servers, COM objects and NT Services); handhelds (MS Embedded Visual C++ for Windows CE\Smartphone OS devices); and the embedded architecture found on Palm OS-based handheld devices. I also have experience designing and implementing cross platform ANSI-C compliant architectures • 8 years designing and implementing all manner of desktop applications in C#\ .NET Framework (versions 1.1\2.0\3.0) including interop via COM and InteropServices • 4 years Java, primarily made of modifying and enhancing the user interface of 3D vertebrate-modeling and animation software • Experience leveraging and modifying open source technologies to suit specific application needs. I have integrated third-party and open source technologies such as the OpenSSL encrypted network communication library, the log4NET logging framework, and the Xerces-c++ xml parsing framework, as well as modified the expat C++ xml parsing library to run on the memory- and processing performance-constrained embedded micro-architectures found -
Manipulating Files CHAPTER 3
04 2773 Ch03 10/19/01 12:24 PM Page 33 Manipulating Files CHAPTER 3 IN THIS CHAPTER • The FileSystem and File Controls 35 • The Windows CE TreeView Control 36 • Creating the PocketExplorer Utility 37 04 2773 Ch03 10/19/01 12:24 PM Page 34 eMbedded Visual Basic: Windows CE and Pocket PC Mobile Applications 34 Most Visual Basic programmers today access files through the familiar Win32 File System Object (commonly called the fso). The fso provides an easy-to-use and quick-to-develop-with object model that works for most text file applications. When it comes to binary or random access, the fso falters, and VB developers then turn to what’s often called free filing—probably named as such due to using the FreeFile() method to get an available file number. Free filing is an older, procedural-based method of access files that’s valid for any file access, but isn’t quite as easy to use as the object-oriented fso. Although the eVB’s FileSystem and File controls don’t have the extensive object model that the fso has, they provide just about everything developers could want or need for accessing any type of file-binary or text, sequential or random. In fact, I find that using these controls has distinct advantages over file programming in Win32 because they wrap the functionality of both free filing and the fso in a nice, compact set of methods and properties. Whether accessing small text configuration files or large binary data files, the FileSystem and File controls are all you’ll need. -
Mobile Operating Systems, the New Generation V1.01 FINAL
Executive Summary Much has changed from the world of open operating Contents systems of 2003. The mobile software market has Chapter A: Mobile Software Today: Open OSs, Linux grown into a landscape of 100s of vendors where and other Misperceptions understanding the roles, functionality, lines of A.1. The New Generation of Operating Systems partnership and competition across software products A.2. Linux: Myth and Reality is a complex endeavour, even for a seasoned industry A.3. Java: A False Start, But Efforts Continue observer. This paper aims to help change that. A.4. Nokia against Symbian A.5. Conclusions and Market Trends The paper firstly presents the key software layers for mobile phones today and explains the importance of Chapter B: Making Sense of Operating Systems, UI application execution environments and UI frameworks. Frameworks and Application Environments Section A then examines common misperceptions in Chapter C: Product reviews the software market of 2006; the flexible OS genre as In-Depth reviews of A la Mobile, Access Linux the successor to the open OSs, the myth and reality Platform, Adobe Flash Lite, GTK+, MiniGUI, Mizi behind Linux for mobile phones, and the false start but Prizm, Montavista Mobilinux, Nokia S60, Obigo, continued efforts around J2ME. Chapter B compares Openwave Midas, Qualcomm Brew, SavaJe, several software platforms for product functionality, Symbian OS, Trolltech Qtopia, UIQ And Windows licensees and speed of market penetration. Mobile. A reference section follows, consisting of 2-page Chapter D: Trends in the Mobile Software Market reviews of 16 key software products, covering historical Open OSes are out; Flexible OSs are in product background, positioning, technology, strategy, Commoditisation of the core OS technology and including the author’s critical viewpoint. -
Downloaded in Jan 2004; "How Smartphones Work" Symbian Press and Wiley (2006); "Digerati Gliterati" John Wiley and Sons (2001)
HOW OPEN SHOULD AN OPEN SYSTEM BE? Essays on Mobile Computing by Kevin J. Boudreau B.A.Sc., University of Waterloo M.A. Economics, University of Toronto Submitted to the Sloan School of Management in partial fulfillment of the requirements for the degree of MASSACHUBMMIBE OF TECHNOLOGY Doctor of Philosophy at the AUG 2 5 2006 MASSACHUSETTS INSTITUTE OF TECHNOLOGY LIBRARIES June 2006 @ 2006 Massachusetts Institute of Technology. All Rights Reserved. The author hereby grn Institute of Technology permission to and to distribute olo whole or in part. 1 Signature ot Author.. Sloan School of Management 3 May 2006 Certified by. .............................. ............................................ Rebecca Henderson Eastman Kodak LFM Professor of Management Thesis Supervisor Certified by ............. ................ .V . .-.. ' . ................ .... ...... Michael Cusumano Sloan Management Review Professor of Management Thesis Supervisor Certified by ................ Marc Rysman Assistant Professor of Economics, Boston University Thesis Supervisor A ccepted by ........................................... •: °/ Birger Wernerfelt J. C. Penney Professor of Management Science and Chair of PhD Committee ARCHIVES HOW OPEN SHOULD AN OPEN SYSTEM BE? Essays on Mobile Computing by Kevin J. Boudreau Submitted to the Sloan School of Management on 3 May 2006, in partial fulfillment of the requirements for the degree of Doctor of Philosophy Abstract "Systems" goods-such as computers, telecom networks, and automobiles-are made up of mul- tiple components. This dissertation comprises three esssays that study the decisions of system innovators in mobile computing to "open" development of their systems to outside suppliers and the implications of doing so. The first essay considers this issue from the perspective of which components are retained under the control of the original innovator to act as a "platform" in the system.