Open Source for You

Total Page:16

File Type:pdf, Size:1020Kb

Open Source for You YOUSAID IT More content for non-IT readers ED: It’s great to hear from you. We will definitely cover the I have been reading your magazine since the last few years. The topics suggested by you in one of our forthcoming issues. Keep company I work in is in the manufacturing industry. Similarly, reading our magazine. And do feel free to get in touch with us if your subscribers’ database may have more individuals like me you have any such valuable feedback. from companies that are not directly related to the IT industry. Currently, your primary focus is on technical matters, A request for the Backtrack OS to be and the magazine carries articles written by skilled technical bundled on the DVD individuals, so OSFY is really helpful for open source developers. I am a huge fan of Open Source For You. Thank you for However, you also have some non-IT subscribers like us, who bundling the Ubuntu DVD with the May 2014 issue. Some of can understand that something great is available in the open my team members and I require the Backtrack OS. Could you source domain, which they can deploy to reduce their IT costs. provide this in your next edition? I am studying information But, unfortunately, your magazine does not inform us about open sciences for my undergrad degree. Please suggest the important source solutions providers. programming languages that I should become proficient in. I request you to introduce the companies that provide end-to- —aravind naik; end IT solutions on open source platforms including thin clients, [email protected] desktops, servers, virtualisation, embedded customised OSs, ERP, CRM, MRP, emails and file servers, etc. Kindly publish relevant ED: Thanks for writing in to us. We’re pleased to know that you case studies, with the overall cost savings and benefits. Just as you liked the DVD. Backtrack is no longer being maintained. The feature job vacancies, do give us information about the solutions updated version for penetration testing is now known as ‘Kali providers I mentioned above. Linux’ and we bundled it with the April 2014 issue of OSFY. For —Shekhar Ranjankar; career related queries, you can refer to older OSFY issues or you [email protected] can find related articles on www.opensourceforu.com ED: Thank you for your valuable feedback. We do carry case studies Overseas subscriptions of companies deploying open source, from time to time. We also Previously, I used to get the copies of LINUX For You/ Open regularly carry a list of different solutions providers from different Source For You and Electronics For You from local book stores open source sectors. We will surely take note of your suggestion and but, lately, none of them carry these magazines any more. So try to continue carrying content that interests non-IT readers too. how can I get the copies of all these magazines in Malaysia, and where can I get previous issues too? Requesting an article on Linux server migration —Abdullah Abd. Hamid; I am glad to receive my first copy of OSFY. I have a [email protected] suggestion to make: if possible, please include an article on migrating to VMware (from a Linux physical server to ED: Thank you for reaching out to us. Currently, we do not have VMware ESX). Also, do provide an overview of some open any reseller or distributor in Malaysia for news stand sales, but you source tools (like Ghost for Linux) to take an image of a can always subscribe to the print edition or the e-zine version of the physical Linux server. magazines. You can find the details of how to subscribe to the print —Rohit Rajput; editions on www.pay.efyindia.com and for the e-zine version, please [email protected] go to www.ezines.efyindia.com Please send your comments Share Your or suggestions to: The Editor, Open Source For You, D-87/1, Okhla Industrial Area, Phase I, New Delhi 110020, Phone: 011-26810601/02/03, Fax: 011-26817563, Email: [email protected] 8 | AUGUST 2014 | OPEN SOURCE FOR YOU | www.OpenSourceForU.com www.OpenSourceForU.com | OPEN SOURCE FOR YOU | AUGUST 2014 | PB OFFERS THE MONTH 2000 One Rupees month Coupon free (Free Trial Coupon) Free Dedicated Server Hosting No condition attached for trial of our for one month cloud platform Subscribe for our Annual Package of Dedicated Server Hosting & enjoy one month free service Enjoy & Please share Feedback at [email protected] st Hurry! st Hurry! For more information, call us Offer valid till 31 Offer valid till 31 August 2014! on 1800-209-3006/ +91-253-6636500 August 2014! For more information, call us on 1800-212-2022 / +91-120-666-7718 www.esds.co.in www.cloudoye.com Get 10% 35% discount off & more “Do not wait! Be a part of Reseller package special offer ! the winning team” Free Dedicated hosting/VPS for one Get 35% off on course fees and if you appear month. Subscribe for annual package for two Red Hat exams, the second shot is free. of Dedicated hosting/VPS and get Hurry! st one month FREE st Hurry! Contact us @ 98409 82184/85 or Offer valid till 31 Contact us at 09841073179 Offer valid till 31 Write to [email protected] August 2014! or Write to [email protected] August 2014! www.space2host.com www.vectratech.in Get PACKWEB PACK WEB Get 25% HOSTING 12 Months P roX Free Off Time to go PRO now Pay Annually & get 12 Month Free Considering VPS or a Dedicated Services on Dedicated Server Hosting Server? Save Big !!! And go Subscribe for the Annual Packages of with our ProX Plans Dedicated Server Hosting & Enjoy Next 25% Off on ProX Plans - Ideal for running 12 Months Free Services st Hurry! st Hurry! High Traffic or E-Commerce Websites. Coupon Code : OSFY2014 Offer valid till 31 Offer valid till 31 August 2014! For more information, call us on August 2014! Contact us at 98769-44977 or 1800-212-2022 / +91-120-666-7777 Write to [email protected] www.goforhosting.com www.prox.packwebhosting.com To advertise here, contact Omar on +91-995 888 1862 or 011-26810601/02/03 or Write to [email protected] www.opensourceforu.com Email : [email protected] FOSSBYTES Powered by www.efytimes.com CentOS 7 now available A rare SMS worm is attacking The CentOS Project has announced the general availability of CentOS 7, the first your Android device! release of the free Linux distro based on the source code for RedHat Enterprise Android does get attacked with Linux (RHEL) 7. It is the first major release after the collaboration between the Trojan apps that have no self- CentOS Project and Red Hat. CentOS 7 is built from the freely available RHEL 7 propagation mechanism, so users source code tree. The features closely resemble that of Red Hat’s latest operating don’t notice the malfunction. But system. Just like RHEL 7, it here’s a different, rather rare, mode is now powered by version of attack that Android devices are 3.10.0 of the Linux kernel, with now facing. Selfmite is a SMS a default file system. It is also worm attack. It is the second of such the first version to include a deadly viruses found in the past two management engine, systemd, months. Selfmite automatically sends dynamic firewall system called the firewalld, and the boot loader, GRUB2. SMSs to the users with their name The default Java Development Kit has also been upgraded to OpenJDK 7, and in the message. The SMS contains a the system now ships with open VMware tools and 3D graphics drivers, out-of- shortened URL which triggers users the-box. Also, like RHEL 7, this is the version of CentOS that claims to offer an in- to install a third part APK file called place upgrade path. Soon, users will be able to upgrade from CentOS 6.5 to CentOS TheSelfTimerV1.apk. The SMS 7 without reformatting their systems. says, “Dear [name], Look the Self- The CentOS team has launched a new build process, in which the entire time..” Some remote server hosts this distro is built from code hosted at the CentOS Project’s own Git repository. malware application. Users can find Source code packages (SRPMs) are created as a side effect of the build cycle, SelfTimer installed in the app drawer and will be hosted on the main CentOS download servers. of their Android devices. Disc images of CentOS 7, which include separate builds for the GnOME and KDE The Selfmite worm desktops, a live CD image and a network-installable version, are also now available. shows a pop-up to download mobogenie_122141003.apk, which Google to launch Android One smartphones with MediaTek chipset offers synchronisation between Google made an announcement Android devices and PCs. The app about its Android One program has over 50 million downloads on at the recent Google I/O 2014, Play Store, but all are through various San Francisco, California. The paid referral schemes and promotion company plans to launch devices programmes. Researchers at Adaptive powered by Android One in Mobile believe that a number of India first, with companies like Mobogenie downloads are promoted Micromax, Spice and Karbonn. through some malicious software Android One has been launched used by an unknown advertising to reduce the production costs of phones. The manufacturers mentioned earlier platform. A popular vendor of security will be able to launch US$ 100 phones based on this platform. Google will solutions in north America detected handle the software part, using Android One.
Recommended publications
  • Operating System Boot from Fully Encrypted Device
    Masaryk University Faculty of Informatics Operating system boot from fully encrypted device Bachelor’s Thesis Daniel Chromik Brno, Fall 2016 Replace this page with a copy of the official signed thesis assignment and the copy of the Statement of an Author. Declaration Hereby I declare that this paper is my original authorial work, which I have worked out by my own. All sources, references and literature used or excerpted during elaboration of this work are properly cited and listed in complete reference to the due source. Daniel Chromik Advisor: ing. Milan Brož i Acknowledgement I would like to thank my advisor, Ing. Milan Brož, for his guidance and his patience of a saint. Another round of thanks I would like to send towards my family and friends for their support. ii Abstract The goal of this work is description of existing solutions for boot- ing Linux and Windows from fully encrypted devices with Secure Boot. Before that, though, early boot process and bootloaders are de- scribed. A simple Linux distribution is then set up to boot from a fully encrypted device. And lastly, existing Windows encryption solutions are described. iii Keywords boot process, Linux, Windows, disk encryption, GRUB 2, LUKS iv Contents 1 Introduction ............................1 1.1 Thesis goals ..........................1 1.2 Thesis structure ........................2 2 Boot Process Description ....................3 2.1 Early Boot Process ......................3 2.2 Firmware interfaces ......................4 2.2.1 BIOS – Basic Input/Output System . .4 2.2.2 UEFI – Unified Extended Firmware Interface .5 2.3 Partitioning tables ......................5 2.3.1 MBR – Master Boot Record .
    [Show full text]
  • Cisco Gigabit Ethernet Transceiver Modules Compatibility Matrix
    Cisco Gigabit Ethernet Transceiver Modules Compatibility Matrix Revised: April 4, 2017 Requirements and procedures for initial configurations and software upgrades tend to change and therefore appear only in the switch or router software release notes. Before installing, configuring, or upgrading a switch, refer to the product release notes on Cisco.com for the latest information. This matrix does not replace or supersede the release notes. This publication contains information on the Cisco platforms and minimum software releases that support the Gigabit Interface Converter (GBIC) and Gigabit Ethernet Small Form-Factor Pluggable (SFP) transceiver modules. Contents Revised: March 3, 2017 ....................................................................................................................... 1 Contents .............................................................................................................................................. 1 Gigabit Ethernet Transceiver Models .................................................................................................... 6 GBIC Transceivers ........................................................................................................................................................ 6 CWDM GBIC Transceivers (Dual SC/PC connectors) ................................................................................................... 6 DWDM GBIC Transceivers (Dual SC/PC connectors) ..................................................................................................
    [Show full text]
  • White Paper: Indestructible Firewall in a Box V1.0 Nick Mccubbins
    White Paper: Indestructible Firewall In A Box v1.0 Nick McCubbins 1.1 Credits • Nathan Yawn ([email protected]) 1.2 Acknowledgements • Firewall-HOWTO • Linux Router Project • LEM 1.3 Revision History • Version 1.0 First public release 1.4 Feedback • Send all information and/or criticisms to [email protected] 1.5 Distribution Policy 2 Abstract In this document, the procedure for creating an embedded firewall whose root filesystem is loaded from a flash disk and then executed from a RAMdisk will be illustrated. A machine such as this has uses in many environments, from corporate internet access to sharing of a cable modem or xDSL connection among many computers. It has the advantages of being very light and fast, being impervious to filesystem corruption due to power loss, and being largely impervious to malicious crackers. The type of firewall illustrated herein is a simple packet-filtering, masquerading setup. Facilities for this already exist in the Linux kernel, keeping the system's memory footprint small. As such the device lends itself to embedding very well. For a more detailed description of firewall particulars, see the Linux Firewall-HOWTO. 3 Equipment This project has minimal hardware requirements. An excellent configuration consists of: For a 100-baseT network: • SBC-554 Pentium SBC with PISA bus and on-board PCI NIC (http://www.emacinc.com/pc.htm#pentiumsbc), approx. $373 • PISA backplane, chassis, power supply (http://www.emacinc.com/sbcpc_addons/mbpc641.htm), approx. $305 • Second PCI NIC • 32 MB RAM • 4 MB M-Systems Flash Disk (minimum), approx. $45 For a 10-baseT network: • EMAC's Standard Server-in-a-Box product (http://www.emacinc.com/server_in_a_box.htm), approx.
    [Show full text]
  • Evaluating Cloud Service Vendors with Comparison J.Jagadeesh Babu1 Mr.P.Saikiran 2 M.Tech Information Technology Dept of IT/LBRCE College India
    Volume 3, Issue 5, May 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Evaluating Cloud Service Vendors with Comparison J.Jagadeesh Babu1 Mr.P.Saikiran 2 M.Tech Information Technology Dept of IT/LBRCE college India. India. Abstract: In this paper we reviewed the technical and service aspects of different Cloud providers and presents the comparisons of these selected service offerings in cloud computing. By this User can have good understanding regarding services provided to avoid bottlenecks are also obstacles that could limit the growth. This comparison of cloud service providers, to serve as a starting point for user looking to take throw service and for Selecting the better one for there need into cloud environment . Keywords: Cloud Computing, Service Vendors, Cloud Services. I. Introduction As the use of computers in our day-to-day life has increased, the computing resources that we need also grown up. It was costly to buy a mainframe and computer‘s, it became important to find the alternative ways to get the greatest return on the investment, allowing multiple users to share among both the physical access to the computer from multiple terminals and to share the CPU time, eliminating periods of inactivity, which became known in the industry as time- sharing[1]. The origin of the term cloud computing is vague, but it appears to derive from the way of drawings of stylized clouds to denote networks in diagrams of computing and communications systems.Cloud computing is a paradigm shift in which computing is moved away from personal computers and even the individual enterprise application‘s to a ‗cloud‘ of computers.
    [Show full text]
  • Good for Enterprise – Android V1.9.1 Release Notes (Service Release)
    Good for Enterprise – Android v1.9.1 Release Notes (Service Release) Updated: April 27, 2012 Good for Enterprise – Android v1.9.1 (Service Release) .............................................................................................. 1 Issues Resolved ........................................................................................................................................................ 1 Good for Enterprise – Android v1.9.0 ........................................................................................................................... 1 New Features ............................................................................................................................................................ 1 Issues Resolved ........................................................................................................................................................ 2 Good for Enterprise – Android v1.8.1 (Service Release) .............................................................................................. 2 Good for Enterprise – Android v1.8.0 ........................................................................................................................... 3 New Features ............................................................................................................................................................ 3 Good for Enterprise – Android v1.7.5 Service Release ................................................................................................ 3
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Standard Deck
    OVERVIEW Customers in 50+ countries All industry segments All sizes: 250 to 1 million+ devices/IPs Annual subscription model with 95% client renewal rate Strong partnerships with SIs and resellers Based in Connecticut, USA www.device42.com Representative Clients and Partners www.device42.com Visualize the Entire Estate DEVICE42 REFERENCE ARCHITECTURE KEY SELLING POINTS FOR DISCOVERY CUSTOMER COMPLEX PROJECTS: INFRASTRUCTURE INFRASTRUCTURE Windows Discovery WMI (TCP 135, 137, 139, 445,1024-65535) WINDOWS /HYPER-V Agentless auto-discovery Netlow Collector SYSTEMS Broad Support NETFLOW (UDP 2055) APIs - ACI, F5, UCS, - HTTPS (TCP 443) NETWORK MS and Unix, Cloud vendors, Hypervisors DEVICES Device42 SNMP (UDP 161) CISO Friendly Management Interfaces Secure, behind firewall, read only credentials SSH (TCP404), SSH (TCP22) Linux/Unix No data leaves the enterprise HTTPS (TCP443), SYSTEMS HTTP (TCP4242), HTTPS(4343) MAIN VENDOR API / SSH VARIOUSPORTS Full access to data APPLIANCE HYPERVISORS Fully documented complete APIs Robust reporting and audit logs CSP APIs - HTTPS (TCP443) PUBLIC CLOUD DISCOVERY Just the facts Agnostic as to vendor or disposition DNS (TCP53) DNS ZONES Easy to deploy VARIOUSPROTOCOLS Lightweight footprint, self-hosted virtual appliance makes HTTPS (TCP443) OTHER DISCOVERY deployment and management simple REMOTE VARIOUSPROTOCOLS SEGMENTED / REMOTE COLLECTOR INFRASTRUCTURE www.device42.com Continuous Discovery for your IT Infrastructure Service connections, application configs, APPLICATIONS and service groupings SERVICES Service,
    [Show full text]
  • Rugged Smartphones in the Enterprise 2015 Buyer’S Guide Rugged Smartphones in the Enterprise: 2015 Buyer’S Guide
    Rugged Smartphones in the Enterprise 2015 Buyer’s Guide Rugged Smartphones in the Enterprise: 2015 Buyer’s Guide Are you considering purchasing rugged smartphone devices for your business? If so, this 2015 Buyer’s Guide will help you make the best decision, taking into account specific use case and industry needs. We’ve analyzed some of the most popular rugged smartphones in the market today, outlined important specifications, highlighted the advantages and disadvantages of each device and pulled together the details to make clear recommendations for different types of businesses. Advantages of Rugged Smartphones 1 More Functionality 2 Lower Total Cost of Ownership Rugged smartphones offer businesses greater overall A main advantage to using rugged smartphones in the functionality to meet IT needs. Dedicated, purpose-built enterprise is the reduction of Total Cost of Ownership devices are designed to solve a single business problem. (TCO). VDC Research and other industry research firms Smartphones—unlike dedicated hardware—provide have established1 that environmental sealant and employees with access to telephone, GPS, email and military drop protection ratings can drastically lower enterprise mobile apps that make them many times more the TCO of mobile hardware. Rugged smartphones valuable in the workplace. Why purchase a dedicated are far less expensive than rugged mobile computers, barcode scanner and an employee smartphone, when making them an effective replacement for outdated you can leverage two devices for the price of one? mobile
    [Show full text]
  • Rugged Smartphone
    EA630 Rugged Smartphone The unitech EA630 is a 6-inch rugged mobile smartphone offering 80% screen to body ratio, featuring versatile functionality with powerful data collection. Specially designed for portability, the EA630 is combined with compact and durable design that makes it an ideal tool to increase higher efficiency for applications in the retail, hospitality and light-duty field service. Android device with high screen to body ratios User-Friendly Functionality Powered by Android 9 OS with GMS Certified, the EA630 rugged With a long-lasting 4000mAh removable battery, the EA630 offers smartphone has a 6-inch 18:9 display as offering 80% screen to continuous use for days and it is easily replaced. It also has the body ratio. It also provides the 450nits brightness for easy viewing in various accessories and supports MDM software solutions and outdoor environment. utilities that allow users to meet the needs of your applications. All-In-One functionality The EA630 has an integrated 1D/2D scanning capability, as well as Features an integrated HF/NFC RFID reader/writer, GPS, and a high resolution 6 inch rugged smartphone with a screen-to-body ratio of over 80% 16MP camera in a compact device. It allows users to add values to Android 9.0 OS with GMS Certification your device with the unique UHF RFID gun grip or 2D long-range All-In-One functionality: 2D Imager, HF/NFC and 16MP camera gun grip (optional). Just simply attaches it and it delivers a conve- Rugged: Corning® Gorilla® Glass 6 touch display, IP65 rated, and nient way to support standard barcode scanning, RFID scanning or 1.2M drop (1.5M with boot case) 2D long-range scanning in inventory tracking and taking solutions.
    [Show full text]
  • Magic Quadrant for Enterprise High-Productivity Application Platform As a Service
    This research note is restricted to the personal use of [email protected]. Magic Quadrant for Enterprise High- Productivity Application Platform as a Service Published: 26 April 2018 ID: G00331975 Analyst(s): Paul Vincent, Van Baker, Yefim Natis, Kimihiko Iijima, Mark Driver, Rob Dunie, Jason Wong, Aashish Gupta High-productivity application platform as a service continues to increase its footprint across enterprise IT as businesses juggle the demand for applications, digital business requirements and skill set challenges. We examine these market forces and the leading enterprise vendors for such platforms. Market Definition/Description Platform as a service (PaaS) is application infrastructure functionality enriched with cloud characteristics and offered as a service. Application platform as a service (aPaaS) is a PaaS offering that supports application development, deployment and execution in the cloud. It encapsulates resources such as infrastructure. High- productivity aPaaS (hpaPaaS) provides rapid application development (RAD) features for development, deployment and execution — in the cloud. High-productivity application platform as a service (hpaPaaS) solutions provide services for declarative, model-driven application design and development, and simplified one-button deployments. They typically create metadata and interpret that metadata at runtime; many allow optional procedural programming extensions. The underlying infrastructure of these solutions is opaque to the user as they do not deal with servers or containers directly. The rapid application development (RAD) features are often referred to as "low-code" and "no-code" support. These hpaPaaS solutions contrast with those for "high-control" aPaaS, which need professional programming — "pro-code" support, through third-generation languages (3GLs) — and provide transparent access to the underlying infrastructure.
    [Show full text]
  • Developing Your App for Nokia: Symbian Belle, NFC, the Next Billion and Windows Phone! Andreas Jakl Senior Technical Consultant Nokia
    Developing your App for Nokia: Symbian Belle, NFC, the next billion and Windows Phone! Andreas Jakl Senior Technical Consultant Nokia 1 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Agenda • Platforms & Development – Series 40 (Asha) – Windows Phone (Lumia) – MeeGo Harmattan, Symbian Belle: Qt – Now & Future (Qt Project) • Near Field Communication (NFC) • Nokia Store 2 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Nokia World & Qt Dev Days 3 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Nokia World & Qt Dev Days 4 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Nokia World & Qt Dev Days 5 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Nokia World & Qt Dev Days 6 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Platforms & Development 7 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Your Development Options Series 40 Symbian MeeGo / Maemo Windows Phone Java Silverlight Native (Qt) XNA Web 8 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Series 40 (Asha) 9 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl Series 40 Java Nokia SDK for Java http://www.developer.nokia.com/Develop/Java/ 10 © 2011 Nokia Developing your App for Nokia Mobile2Days, Sofia November 4, 2011 Andreas Jakl New Java APIs • Nokia Maps for Java • Extension to existing Location API – Cell-ID based Location • System Information extension – Dual SIM – Battery level, network status, etc.
    [Show full text]
  • Firefox OS Overview Ewa Janczukowicz
    Firefox OS Overview Ewa Janczukowicz To cite this version: Ewa Janczukowicz. Firefox OS Overview. [Research Report] Télécom Bretagne. 2013, pp.28. hal- 00961321 HAL Id: hal-00961321 https://hal.archives-ouvertes.fr/hal-00961321 Submitted on 24 Apr 2014 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Collection des rapports de recherche de Télécom Bretagne RR-2013-04-RSM Firefox OS Overview Ewa JANCZUKOWICZ (Télécom Bretagne) This work is part of the project " Étude des APIs Mozilla Firefox OS" supported by Orange Labs / TC PASS (CRE API MOZILLA FIREFOX OS - CTNG13025) ACKNOWLEGMENTS Above all, I would like to thank Ahmed Bouabdallah and Arnaud Braud for their assistance, support and guidance throughout the contract. I am very grateful to Gaël Fromentoux and Stéphane Tuffin for giving me the possibility of working on the Firefox OS project. I would like to show my gratitude to Jean-Marie Bonnin, to all members of Orange NCA/ARC team and RSM department for their help and guidance. RR-2013-04-RSM 1 RR-2013-04-RSM 2 SUMMARY Firefox OS is an operating system for mobile devices such as smartphones and tablets.
    [Show full text]