Apple Ipad and Iphone Mobile Devices with Ios 12

Total Page:16

File Type:pdf, Size:1020Kb

Apple Ipad and Iphone Mobile Devices with Ios 12 Apple Inc. Apple iPad and iPhone Mobile Devices with iOS 12 Security Target PP_MD_V3.1 with EP_MDM_AGENT_V3.0, PP_WLAN_CLI_EP_V1.0, MOD_VPN_CLI_V2.1. Version 1.6 2019-03-12 VID: 10937 Prepared for: Prepared by: Apple Inc. atsec information security Corp. One Apple Park Way 9130 Jollyville Road, Suite 260 MS 927-1CPS Austin, TX 78759 Cupertino, CA 95014 www.atsec.com www.apple.com © 2019 Apple Inc. This document may be reproduced and distributed only in its original entirety without revision VID: 10937 Table of Contents Revision History ....................................................................................................................... 9 1 Security Target Introduction .......................................................................................... 11 1.1 Security Target Reference ............................................................................................... 11 1.2 TOE Reference .................................................................................................................. 11 1.3 TOE Overview .................................................................................................................... 11 1.4 TOE Description ................................................................................................................. 12 1.4.1 General information .............................................................................................. 12 1.4.2 Obtaining the mobile devices.............................................................................. 12 1.4.3 Obtaining software updates ................................................................................ 13 1.4.4 Supervising and configuring the mobile devices ............................................. 13 1.4.5 Mobile devices covered by this evaluation ....................................................... 13 1.5 TOE Architecture ............................................................................................................... 28 1.5.1 Physical Boundaries ............................................................................................. 29 1.5.2 Security Functions provided by the TOE .......................................................... 29 1.5.3 TOE Documentation ............................................................................................. 34 1.5.4 Other References ................................................................................................. 35 2 Conformance Claims ....................................................................................................... 36 2.1 CC Conformance ............................................................................................................... 36 2.2 Protection Profile (PP) Conformance ............................................................................. 36 2.2.1 Technical Decisions ............................................................................................. 36 2.3 Conformance Rationale .................................................................................................... 37 3 Security Problem Definition ........................................................................................... 38 3.1 Threats ................................................................................................................................ 38 3.2 Assumptions ....................................................................................................................... 41 3.3 Organizational Security Policies ...................................................................................... 42 4 Security Objectives.......................................................................................................... 43 4.1 Security Objectives for the TOE ...................................................................................... 43 4.2 Security Objectives for the TOE Environment .............................................................. 44 5 Extended Components Definition .................................................................................. 46 6 Security Functional Requirements ................................................................................ 47 6.1 Security Audit (FAU).......................................................................................................... 48 Agent Alerts (FAU_ALT) ............................................................................................................. 48 FAU_ALT_EXT.2 Extended: Agent Alerts ..................................................................... 48 Audit Data Generation (FAU_GEN).......................................................................................... 48 FAU_GEN.1(1) Audit Data Generation .......................................................................... 48 FAU_GEN.1(2) Audit Data Generation .......................................................................... 50 Security Audit Event Selection (FAU_SEL) ............................................................................. 52 FAU_SEL.1(2) Security Audit Event Selection ............................................................. 52 Security Audit Event Storage (FAU_STG) .............................................................................. 52 FAU_STG.1 Audit Storage Protection ............................................................................ 52 FAU_STG.4 Prevention of Audit Data Loss .................................................................. 52 6.2 Cryptographic Support (FCS) .......................................................................................... 53 Cryptographic Key Management (FCS_CKM)........................................................................ 53 FCS_CKM.1(1) Cryptographic Key Generation ............................................................ 53 Page 2 of 172 © 2019 Apple Inc. Version: 1.6 VID: 10937 FCS_CKM.1/WLAN Cryptographic Key Generation (Symmetric Keys for WPA2 Connections) ......................................................................................................... 53 FCS_CKM.1/VPN VPN Cryptographic Key Generation (IKE) .................................... 53 FCS_CKM.2(1) Cryptographic Key Establishment ...................................................... 53 FCS_CKM.2(2) Cryptographic Key Establishment (While device is locked) ........... 54 FCS_CKM.2/WLAN WLAN Cryptographic Key Distribution (GTK) ........................... 54 FCS_CKM_EXT.1 Extended: Cryptographic Key Support (REK) ............................. 54 FCS_CKM_EXT.2 Extended: Cryptographic Key Random Generation ................... 54 FCS_CKM_EXT.3 Extended: Cryptographic Key Generation.................................... 54 FCS_CKM_EXT.4 Extended: Key Destruction ............................................................. 55 FCS_CKM_EXT.5 Extended: TSF Wipe........................................................................ 55 FCS_CKM_EXT.6 Extended: Salt Generation.............................................................. 55 FCS_CKM_EXT.7 Extended: Cryptographic Key Support (REK) ............................. 56 Cryptographic Operations (FCS_COP).................................................................................... 57 FCS_COP.1(1) Confidentiality Algorithms ..................................................................... 57 FCS_COP.1(2) Hashing Algorithms ............................................................................... 57 FCS_COP.1(3) Signature Algorithms ............................................................................. 57 FCS_COP.1(4) Keyed Hash Algorithms ........................................................................ 57 FCS_COP.1(5) Password-Based Key Derivation Functions ...................................... 57 HTTPS Protocol (FCS_HTTPS) ................................................................................................ 58 FCS_HTTPS_EXT.1 Extended: HTTPS Protocol ........................................................ 58 IPsec Protocol (FCS_IPSEC) .................................................................................................... 58 FCS_IPSEC_EXT.1 Extended: IPsec ............................................................................ 58 Initialization Vector Generation (FCS_IV)................................................................................ 59 FCS_IV_EXT.1 Extended: Initialization Vector Generation ........................................ 59 Random Bit Generation (FCS_RBG) ....................................................................................... 60 FCS_RBG_EXT.1(Kernel and User space) Extended: Cryptographic Operation (Random Bit Generation) .................................................................................... 60 FCS_RBG_EXT.1(SEP) Extended: Cryptographic Operation (Random Bit Generation) ............................................................................................................ 60 Cryptographic Algorithm Services (FCS_SRV) ...................................................................... 60 FCS_SRV_EXT.1 Extended: Cryptographic Algorithm Services............................... 60 Cryptographic Key Storage (FCS_STG).................................................................................. 61 FCS_STG_EXT.1 Extended: Secure Key Storage ...................................................... 61 FCS_STG_EXT.2 Extended: Encrypted Cryptographic Key Storage ......................
Recommended publications
  • Learning with Ipad Preparing Students for Careers
    Learning with iPad Preparing students for careers Mobile technology is changing the way we learn and work. It’s driving transformation in businesses of all sizes and across all industries. This digital transformation is redefining what career readiness means and driving a shift in the skills students need to be successful. Learning with iPad prepares them for a world that’s increasingly mobile, global, and connected. Learning with iPad: Preparing students for careers | 1 Get students career ready with iPad We live in an age of unprecedented information, access, and connection. Technology has changed the way we communicate, engage, and live. Companies are leveraging technology to create new models for how they work, and they’re defining new jobs that didn’t exist 10 years ago. Employers are finding that soft skills like problem-solving, creativity, collaboration, communication, and adapting to change are more important than ever. iPad can help engage students as they build these skills and prepare for high-demand careers and industries. With its built-in features, access to a breadth of resources, and free Apple-designed learning resources, iPad can help students collaborate, brainstorm, and use design thinking to create solutions to real-world problems. And with advanced technologies designed to make augmented reality experiences more powerful and engaging, iPad creates an experience that’s simply not possible on other platforms. This guide can show you how iPad helps empower students to become better communicators, skilled collaborators,
    [Show full text]
  • Apple TV 4Th Generation Teardown Guide ID: 49046 - Draft: 2021-04-21
    Apple TV 4th Generation Teardown Guide ID: 49046 - Draft: 2021-04-21 Apple TV 4th Generation Teardown Teardown of the fourth generation Apple TV on September 21, 2015. Written By: Sam Goldheart This document was generated on 2021-04-21 12:02:09 PM (MST). © iFixit — CC BY-NC-SA www.iFixit.com Page 1 of 14 Apple TV 4th Generation Teardown Guide ID: 49046 - Draft: 2021-04-21 INTRODUCTION Apple fans are doing the happy dance, what with a slew of new devices coming out of Cupertino— including the first new Apple TV in more than three years. Our teardown engineers look pretty happy too. That's because we've got our hands on a 4th generation Apple TV. That's right, kids. It's teardown time! Don't touch that dial—unless you're looking for more teardown news on our Facebook, Instagram, or Twitter. [video: https://www.youtube.com/watch?v=lSA8uFwptJc] TOOLS: iFixit Opening Picks set of 6 (1) Spudger (1) T7 Torx Screwdriver (1) T3 Torx Screwdriver (1) This document was generated on 2021-04-21 12:02:09 PM (MST). © iFixit — CC BY-NC-SA www.iFixit.com Page 2 of 14 Apple TV 4th Generation Teardown Guide ID: 49046 - Draft: 2021-04-21 Step 1 — Apple TV 4th Generation Teardown We like to start with some specs, and in this case a lot of the good stuff is packed into the fancypants new remote. The box itself contains: Dual-core, 64-bit Apple A8 chip Ethernet, 802.11a/b/g/n/ac Wi-Fi, IR receiver, and HDMI 1.4 connectivity ...whilst the remote is packing: Glass Touch surface Dual microphones Accelerometer and gyroscope Bluetooth 4.0, IR transmitter, Lightning connector This document was generated on 2021-04-21 12:02:09 PM (MST).
    [Show full text]
  • Download Ios 12.1 Beta Profile Download Ios 12.1 Beta Profile
    download ios 12.1 beta profile Download ios 12.1 beta profile. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 66ab045d4d70fac0 • Your IP : 188.246.226.140 • Performance & security by Cloudflare. Download ios 12.1 beta profile. Apple has released the first macOS Monterey public beta, giving more people the chance to install it and see what everyone will be using when the software is made available later this year. Those who are on the public beta program can now download macOS Monterey via the Software Update portion of the System Preferences app, assuming they have the correct beta profile installed. Apple gives public beta testers the chance to try macOS, iOS, iPadOS, tvOS, and watchOS betas out ahead of public release, all of which can be installed via the Apple Beta Software Program website. Help make the next releases of iOS, iPadOS, macOS, tvOS and watchOS our best yet. As a member of the Apple Beta Software Program, you can take part in shaping Apple software by test-driving pre-release versions and letting us know what you think.
    [Show full text]
  • Vi Customers in Kerala Can Now Avail Esim on Primary Device
    Press Release Vi customers in Kerala can now avail eSIM on Primary device Kochi, June 28, 2021: India’s leading telecom operator, Vi has announced the availability of eSIM for its postpaid customers using eSIM compatible devices including: . Apple: Apple iPhone 11, iPhone 11 Pro, iPhone 11 Pro Max, iPhone SE, iPhone Xs, iPhone Xs Max, iPhone Xr, iPhone 12 Mini, iPhone 12, iPhone 12 Pro & iPhone 12 Pro Max . Samsung: Samsung Galaxy Z Flip, Samsung Galaxy Fold, Samsung Galaxy Note 20 Ultra 5G, Samsung Galaxy Note 20, Samsung Galaxy Z Fold 2, Samsung Galaxy S21 5G, Samsung Galaxy S21+ 5G, Samsung Galaxy S21 Ultra 5G, Samsung Galaxy S20, Samsung Galaxy S20+, Samsung Galaxy S20 Ultra . Google Pixel 3A onwards . Motorola Razr Vi eSIM service is now available in Mumbai, Gujarat, Delhi, Karnataka, Punjab, UP East, Kerala, Kolkata, Maharashtra and Goa. Vi postpaid customers using eSIM enabled handsets will no longer be required to put in a physical SIM card to access the network. eSIM comes in the form of an integrated SIM chip which will be compliant with all the supported mobile network operators. The consumer will be able to carry out normal calling, SMS, data access and more without having to change physical SIM cards manually. S.Murali, Cluster Business Head- Kerala and Tamil Nadu, Vodafone Idea, said, “Vi is happy to introduce eSIM technology for our post paid customers in Kerala, which will enable them to enjoy the benefits of convenience and flexibility of having more than one sim even on single sim device. We believe that eSIM will provide enhanced experience to our customers as it will enable them to do a lot more with their device.” How to get Vi eSIM on your phone Existing Customer .
    [Show full text]
  • Download Ios 12 Eta Download Ios 12 Eta
    download ios 12 eta Download ios 12 eta. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 67d363cfac2d15fe • Your IP : 188.246.226.140 • Performance & security by Cloudflare. Download iOS 12 Beta 1 IPSW for iPhone and iPad. iOS 12 beta 1 IPSW firmware can now be downloaded for installation on iPhone 5s, SE, 6, 6s, Plus, 7, 8, X, and iPad Mini 2 and above, as well as iPod Touch 6G. Introduced at WWDC 2018, it’s available for those on the Apple Developer Program. iOS 12 is the latest update from Apple for iDevices and boasts a number of new features. Its public release is slated for fall, 2018. You can download iOS 12 beta 1 ISPW firmware file for your device right now. iOS 12 Beta 1 IPSW Download Is Now Available for iPhone X, 8, 7+, 7, 6s, 6, SE, 5s, iPod & iPad. Interested in trying out this early beta of iOS 12? Well then, follow the steps we’ve listed below.
    [Show full text]
  • Android Vs Ios
    Android vs iOS By Mohammad Daraghmeh Jack DeGonzaque AGENDA ● Android ○ History ● Samsung S6 ○ System Architecture ○ Processor ○ Performance Metrics ● iOS ○ History ● iPhone 6 ○ System Architecture ○ Processor ○ Performance Metrics ● Samsung S6 vs iPhone 6 Android Android History ● The Android OS was created mainly by three amazing people Andy Rubin, Rich Miner, Nick Sears, and Chris White. ○ Initial development for the OS was to create an operating system for digital cameras and PC integration. ○ After gauging the size of the market for such a product, Rubin and his colleagues decided to target the booming smartphone market. ● In 2005, Google also wanted to venture into the smartphone market and did so by acquiring Android Inc. ○ The primary directive was to develop technologies that are developed and distributed at a significantly lower cost to make it more accessible. ○ In 2008, the first Android running smartphone, the HTC Dream, was released. Android History (Cont.) ● The Android operating system has become one of the most popular operating systems. ○ According to research firm, called Gartner, more than a billion Android devices were sold in 2014, which is roughly five times more than Apple iOS devices sold and three times more Windows machines sold. ● Their attribute to success stems from the fact that Google does not charge for Android, and that most phone manufacturers are making cost effective phones, which results in affordable smartphones and internet services at low costs for consumers to enjoy. SAMSUNG GALAXY S6 System Architecture ● Samsung S6 uses the Exynos 7420 processor, which is developed by Samsung as well. ○ The Exynos 7420 is a 78 mm^2 SoC comprised of 8 cores connected to two L2 cache instances.
    [Show full text]
  • CIS Apple Ios 12 Benchmark
    CIS Apple iOS 12 Benchmark v1.0.0 - 10-19-2018 Terms of Use Please see the below link for our current terms of use: https://www.cisecurity.org/cis-securesuite/cis-securesuite-membership-terms-of-use/ 1 | P a g e Table of Contents Terms of Use ........................................................................................................................................................... 1 Overview .................................................................................................................................................................. 7 Intended Audience ........................................................................................................................................... 7 Consensus Guidance ........................................................................................................................................ 7 Scoring Information ........................................................................................................................................ 9 Profile Definitions ......................................................................................................................................... 10 Acknowledgements ...................................................................................................................................... 11 Recommendations ............................................................................................................................................. 12 1 Benchmark Guidance ..............................................................................................................................
    [Show full text]
  • Mise En Avant SPECIFICATIONS PRINCIPALES
    Apple iPhone 6(MQ3D2ZD/A) Apple iPhone 6 - Smartphone - 4G LTE - 32 Go - GSM - 4.7"- 1334 x 750 pixels (326 ppi) - Retina HD - 8 MP (caméra avant de 1,2 mégapixels) - gris L'iPhone 6 n'est pas seulement plus grand en taille. Il est plus grand en tout. Plus large,mais beaucoup plus fin. Plus puissant,mais remarquablement économe en énergie. Sa surface lisse métallique épouse à merveille le nouvel écran Retina. Sous son design profilé s'opère une fusion parfaite entre matériel et logiciel. Redessinée,affûtée,perfectionnée,une nouvelle génération d'iPhone est née. Mise en avant L'iPhone n'a jamais été aussi grand Pas juste un écran plus grand Formidablement puissant L'appareil qui a changé la photo révolutionne maintenant la vidéo Sans-fil plus rapide Votre doigt sur la sécurité Le plus grand des iOS Les atouts L'iPhone n'a jamais été aussi grand Pour développer un iPhone avec un écran plus grand et plus performant,il a fallu repousser plus loin les limites du design. Du mariage parfait du verre et du métal à l'épuration des lignes,le moindre détail a été soigneusement étudié et mis au service de votre utilisation. Ainsi,même avec son écran plus grand,l'iPhone 6 reste parfaitement calibré. Pas juste un écran plus grand C'est une chose que d'agrandir l'écran. C'en est une autre que de mettre au point un écran multi- touch plus grand aux couleurs éclatantes,au contraste accru,avec des angles de vision encore plus larges. Formidablement puissant Le coprocesseur de mouvement M8 compile efficacement les données issues de capteurs innovants et d'un nouveau baromètre.
    [Show full text]
  • Apple Ipad User Guide Ios 12.Pdf
    Apple Ipad User Guide Ios 12 Browse Manuals by Product. Previous iPad User Guide for iPadOS · Web / Apple Books. Sep 24, 2019. iPhone User Guide for iOS 13 · Web / Apple Books. View the iPad User Guide in Safari, add a bookmark or save it as a shortcut on the Home screen for easy access. Or download it from Apple Books and read it. Browse Manuals by Product. Previous. Apple Watch. iPhone. iPad. Mac notebooks. Mac desktops. Apple TV. HomePod. iPod. Peripherals. Professional. Apple iPad Manual / User Guide This is the official Apple iPad User Guide in iOS 12 or update your iPad with iOS 12 learn a complete guide iOS 12 user guide. Apple Ipad User Guide Ios 12 Click Here --> iPad User Guide for iOS 12. iPad User Guide iOS 12.3. Apple Inc. What We Like. The web version is interactive. In-depth guides. Includes. in PDF version to your device (You can download iOS 12 manual for iPhone, iOS 12 manual for iPod, iOS 12 Manual for iPad) you. Amazon.com: The iPad User's Guide to iOS 12: Tips, Tricks & Tutorials for Using iOS 12 on the iPad (iOS User Series) (Volume 2) (9781726244497): Berner. iPad. User Guide. For iOS 8.1 Software (February 2015) 12 SIM card tray in iCloud, and access them from your iPad, iPhone, iPod touch, Mac, or PC. iPad User Guide for iOS 12 - Download iOS 12 or update your iPad with iOS 12 learn a complete guide iOS 12 user guide on iPad X / iPad X Pro and get iOS 12.
    [Show full text]
  • Flex IT Distribution
    Flex IT Distribution +34 (0) 932 203 347 www.flexitdistribution.es Información de producto Información Fabricante Apple Referencia MK9N2NF/A-2202237R4 del fabricante Apple iPad mini 4 Wi-Fi - 4th generation - tablet - 128 GB - 7.9" Especificación General Status R4 Product Type Tablet Operating System Apple iOS 12 Display Type 7.9" IPS TFT - LED backlight Resolution 2048 x 1536 (326 ppi) Touchscreen Multi-Touch Features Anti-glare, anti-fingerprint, Retina display, fully laminated display Processor Processor Apple A8 64-bit Computing Yes Memory Storage 128 GB Communications Wireless Connectivity 802.11a/b/g/n/ac, Bluetooth 4.2 Rear Camera Sensor Resolution 8 Megapixel Focus Adjustment Automatic Lens Aperture F/2.4 Flex IT Distribution | Trade name of Xeptor B.V. | Zaalbergweg 9 | 2314XS Leiden | Netherlands | CoC: 70449740 | VAT no.: NL858321488B01 Flex IT Distribution +34 (0) 932 203 347 www.flexitdistribution.es HDR Mode Auto HDR mode Face Detection Face detection Features Hybrid IR filter, Exposure control, geotagging Front Camera Sensor Resolution 1.2 Megapixel Lens Aperture F/2.2 Features FaceTime HD camera Multimedia Supported Digital Audio Standards WAV, AAC, AIFF, Audible, MP3, Apple Lossless, AC-3, HE-AAC, protected AAC, EAC3, MP3 VBR Supported Digital Video Standards MPEG-4 SP (up to 640x480), Motion JPEG (up to 1280x720), H.264 High Profile Level 4.2 (up to 4K) Audio Two microphones, stereo speakers Input Device Security Devices Fingerprint reader Software Preloaded Software Clock, Mail, Notes, Calendar, Contacts, Messages,
    [Show full text]
  • The Flash Technology Center Price List
    Updated: 5-2-2017 124 Kent Student Center (located inside the University Bookstore) Serving Kent State University Phone: 330-672-1595 Store Hours: 8:00AM – 8:00PM Monday – Thursday 8:00AM – 5:00PM Friday [email protected] 11:00AM – 4:00PM Saturday & Sunday www.kent.edu/flashtech Accepted Payment Methods Credit Cards FlashCash Payroll deduction Departmental IDC No checks or American Express 7.25% sales tax added to all non-University sales The Flash Technology Center Price List To check current stock levels or to place a special or custom order, please call or email the Flash Technology Center and an associate will work with you to provide whatever assistance is required. MacBook Pro 13-Inch MacBook Pro 2.7GHz dual-core Intel Core i5 Turbo Boost up to 3.1GHz 8GB 1866MHz memory 128GBPCIe-basedSSD Intel Iris Graphics 6100 (Retina Display) Two Thunderbolt2 ports 3.48 Pounds $1299 Retail Price $1199 Education Price 2.0GHz dual-core Intel Core i5 Touch Bar and Touch ID Touch Bar and Touch ID Turbo Boost up to 3.3GHz 2.9GHz dual-core Intel Core i5 2.9GHz dual-core Intel Core i5 8GB 1866MHz memory Turbo Boost up to 3.3GHz Turbo Boost up to 3.3GHz 256GB PCIe-based SSD 8GB 2133MHz memory 8GB 2133MHz memory Intel Iris Graphics 540 256GBPCIe-basedSSD 512GB PCIe-based SSD TwoThunderbolt 3 ports Intel Iris Graphics 550 Intel Iris Graphics 550 3.02 Pounds Four Thunderbolt 3 ports Four Thunderbolt 3 ports 3.02 Pounds 3.02 Pounds $1499 Retail Price $1799 Retail Price $1999 Retail Price $1449 Education Price $1699 Education Price $1899 Education Price
    [Show full text]
  • Unit 23 a Few Big Ideas 1 a Few Big Ideas 2
    23.1 23.2 Unit 23 Summary Review of some key concepts from the first half of the semester A BRIEF SUMMARY 23.3 23.4 A Few Big Ideas 1 A Few Big Ideas 2 • Any algorithm can be implemented • Software interacts with hardware by setting, clearing, in software or hardware Application and reading bits in specific registers Specific Hardware • Hardware will: (no software) • Because we do not know when HW events will occur – Be faster and use less power we use interrupts and/or polling to check for HW – Convert input combinations to desired events output combinations using Cost – Take care; speed matters! One physical event may be seen combinational logic that often includes Spectrum Performance as multiple events to a fast software loop; or you may miss muxes, adders, decoders, and System Computing Flexibility, Design Time Flexibility, an event completely if your software responds too slowly comparators General Purpose – We must write our software with this in mind – Use sequential logic, namely a register, HW w/ Software to capture and save state or various data variables on a clock edge for processing in subsequent clocks 23.5 23.6 A Few Big Ideas 3 • We want to reduce latency and/or increase throughput by techniques such as caching and pipelining • Parallelism both at the hardware and software level can be carefully exploited to improve performance – Communication and collaboration reduce the effectiveness Big picture ideas of what the computer engineering is about REVISITING COMPUTER ENGINEERING 23.7 23.8 Remember Day 1 You Can Do That With
    [Show full text]