REMOTE MOBILE SCREEN (RMS): an APPROACH for SECURE BYOD ENVIRONMENTS Santiago Manuel Gimenez Ocano University of Nebraska-Lincoln, [email protected]

Total Page:16

File Type:pdf, Size:1020Kb

REMOTE MOBILE SCREEN (RMS): an APPROACH for SECURE BYOD ENVIRONMENTS Santiago Manuel Gimenez Ocano University of Nebraska-Lincoln, Sxntixgo@Gmail.Com University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Computer Science and Engineering: Theses, Computer Science and Engineering, Department of Dissertations, and Student Research Spring 4-2015 REMOTE MOBILE SCREEN (RMS): AN APPROACH FOR SECURE BYOD ENVIRONMENTS Santiago Manuel Gimenez Ocano University of Nebraska-Lincoln, [email protected] Follow this and additional works at: http://digitalcommons.unl.edu/computerscidiss Part of the Digital Communications and Networking Commons, and the Hardware Systems Commons Gimenez Ocano, Santiago Manuel, "REMOTE MOBILE SCREEN (RMS): AN APPROACH FOR SECURE BYOD ENVIRONMENTS" (2015). Computer Science and Engineering: Theses, Dissertations, and Student Research. 86. http://digitalcommons.unl.edu/computerscidiss/86 This Article is brought to you for free and open access by the Computer Science and Engineering, Department of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Computer Science and Engineering: Theses, Dissertations, and Student Research by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. REMOTE MOBILE SCREEN (RMS): AN APPROACH FOR SECURE BYOD ENVIRONMENTS by Santiago Gimenez Ocano A THESIS Presented to the Faculty of The Graduate College at the University of Nebraska In Partial Fulfillment of Requirements For the Degree of Master of Science Major: Computer Science Under the Supervision of Professor Byrav Ramamurthy Lincoln, Nebraska April, 2015 REMOTE MOBILE SCREEN (RMS): AN APPROACH FOR SECURE BYOD ENVIRONMENTS Santiago Gimenez Ocano, M.S. University of Nebraska, 2015 Adviser: Byrav Ramamurthy Bring Your Own Device (BYOD) is a policy where employees use their own personal mobile devices to perform work-related tasks. Enterprises reduce their costs since they do not have to purchase and provide support for the mobile devices. BYOD increases job satisfaction and productivity in the employees, as they can choose which device to use and do not need to carry two or more devices. However, BYOD policies create an insecure environment, as the corporate net- work is extended and it becomes harder to protect it from attacks. In this scenario, the corporate information can be leaked, personal and corporate spaces are not sep- arated, it becomes difficult to enforce security policies on the devices, and employees are worried about their privacy. Consequently, a secure BYOD environment must achieve the following goals: space isolation, corporate data protection, security policy enforcement, true space isolation, non-intrusiveness, and low resource consumption. We found that none of the currently available solutions achieve all of these goals. We developed Remote Mobile Screen (RMS), a framework that meets all the goals for a secure BYOD environment. To achieve this, the enterprise provides the employee with a Virtual Machine (VM) running a mobile operating system, which is located in the enterprise network and to which the employee connects using the mobile device. We provide an implementation of RMS using commonly available software for an x86 architecture. We address RMS challenges related to compatibility, scalability and latency. For the first challenge, we show that at least 90.2% of the productivity applications from Google Play can be installed on an x86 architecture, while at least 80.4% run normally. For the second challenge, we deployed our implementation on a high-performance server and run up to 596 VMs using 256 GB of RAM. Further, we show that the number of VMs is proportional to the available RAM. For the third challenge, we used our implementation on GENI and conclude that an application latency of 150 milliseconds can be achieved. iv ACKNOWLEDGMENTS To my advisor, Dr. Byrav Ramamurthy, for his continued support, encouragement and guidance. Being his student and advisee has been inspiring and a privilege from the very first day. My research topic was suggested by him while I was a student in his Data and Network Security class, which was the most influential class I have taken. I would also like to thank Dr. Yong Wang, from Dakota State University, for his continuous help and advice on my research. His suggestions and comments helped my research greatly. I am also thankful to the members of my MS Thesis committee, Dr. Witawas Srisa-an and Dr. David Swanson for their service and reviewing my thesis. Their feedback and suggestions helped me improve this work. A note of thanks to the members of the Networking Lab. I would specially thank Adrian Lara, Sara El Alaoui and Pan Yi. I would also like express my gratitude to Rigoberto Wong for all his help. Part of this work was performed on computers from the Holland Computing Cen- ter. I am thankful to its director, Dr. David Swanson, and Garhan Attebury for allowing me the use of these assets as well as for helping me. Finally, I would like to thank my love, Nicole, my parents and my sister for their love, support and understanding. This research was partially supported by a National Science Foundation (NSF) Grant No. CNS-1345277. My education at UNL was supported by the Argentinian Presidential Fellowship coordinated by Fulbright Commission in Argentina and Jefatura the Gabinete de Ministros de la Republica Argentina. v Contents List of Figures vii List of Tables ix List of Acronyms x 1 Introduction 1 1.1 Description of BYOD . 2 1.2 Contribution . 4 1.3 Outline of Thesis . 5 2 Background 6 2.1 Threats on Mobile Devices . 6 2.2 Security Challenges Related to BYOD Environment . 14 2.3 Goals for a Secure BYOD Environment . 15 3 Related Work 19 3.1 Mobile Virtual Machine (MVM) . 20 3.2 Agent-based Solutions . 25 3.3 Cloud-based Solutions . 36 3.4 Virtual Private Network (VPN) . 43 vi 3.5 Trusted Environments . 47 3.6 Framework . 52 3.7 Comparison of Solutions . 61 4 Remote Mobile Screen (RMS): Description and Experiments 65 4.1 BYOD Security Framework (BSF) . 65 4.2 Architecture presented by RMS . 68 4.3 Session Initiation and Termination . 72 4.4 Features Offered by RMS . 73 4.5 Implementation . 75 4.6 Security Analysis . 77 4.7 Challenges Presented by RMS . 79 4.8 Compatibility, Scalability and Latency Experiments . 86 5 Conclusion and Future Work 111 5.1 Conclusions . 111 5.2 Directions for Future Work . 113 A List and Description of Mobile Applications Tested in the Usability Experiment 115 B Scripts Used in the Scalability Test 118 C Scripts Used in the Latency Test 122 Bibliography 129 vii List of Figures 1.1 Representation of a BYOD environment. 2 2.1 Flow of a malware attack on mobile devices. 7 3.1 Taxonomy of BYOD solutions. 19 4.1 BSF’s architecture. 67 4.2 RMS architecture. 69 4.3 Implementation using an Apple iPhone 5S accessing Android-x86 as cor- porate space. 76 4.4 Implementation using an Apple iPad Mini accessing Android-x86 as cor- porate space. 77 4.5 Implementation using a Samung Focus accessing AndroVM as corporate space. 77 4.6 Results of compatibility experiment. 87 4.7 RAM usage as a function of the number of concurrent Virtual Machines (VMs). 90 4.8 CPU usage as a function of the number of concurrent VMs. 91 4.9 Load of the system as a function of the number of concurrent VMs. 92 4.10 Number of threads as a function of the number of concurrent VMs. 92 viii 4.11 Start Time as a function of the number of concurrent VMs. 93 4.12 Restart Time as a function of the number of concurrent VMs. 94 4.13 Number of concurrent VMs as a function of the available RAM. 94 4.14 Distribution and order of the clients across the country. 96 4.15 Application delay as a function of the number of concurrent clients, and its regression curve. 98 4.16 Average of the application delay for each of the clients. 98 4.17 Application delay as a function of ping delay for single clients and multiple clients. 99 4.18 Distribution of the clients across the country. 101 4.19 Average of the application delay for each of the clients for single server and multiple servers. 101 4.20 Application delay as a function of ping delay for single clients and multiple clients, for Kettering University server. 102 4.21 Application delay as a function of ping delay for single clients and multiple clients, for UCLA server. 103 4.22 Application delay as a function of ping delay for single clients and multiple clients, for Georgia Tech server. 104 4.23 Average of the application delay for different values of δ. 108 ix List of Tables 2.1 Percentage of corporate accessed data. 11 2.2 Percentage of personal accessed data. 11 3.1 Comparison between the different types of MDM solutions. 35 3.2 Comparison between different consumer-oriented cloud-based solutions. 42 3.3 Comparison between the different type of solutions based on their type, goals they achieve and support for mobile OSes. 62 3.4 Comparison between the different type of solutions based on their type, goals they achieve and support to mobile OSes (contd.). 63 4.1 List of clients used in the first latency experiment. 97 4.2 Ping delay of each client to each server for the third scenario. 100 4.3 List of clients used in the fourth latency experiment. 106 4.4 Ping delay of each client to each server for the fourth scenario. 107 4.5 Average application delay in seconds provided by the OPL/CPLEX and the Matlab simulations. 109 A.1 List of mobile applications analyzed. 116 A.2 List of mobile applications analyzed (contd.). 117 x List of Acronyms 2TAC 2-Tier Access Control. BSF BYOD Security Framework. BYOD Bring Your Own Device. EEM Enterprise Mobility Management.
Recommended publications
  • Procedural Content Generation for Games
    Procedural Content Generation for Games Inauguraldissertation zur Erlangung des akademischen Grades eines Doktors der Naturwissenschaften der Universit¨atMannheim vorgelegt von M.Sc. Jonas Freiknecht aus Hannover Mannheim, 2020 Dekan: Dr. Bernd L¨ubcke, Universit¨atMannheim Referent: Prof. Dr. Wolfgang Effelsberg, Universit¨atMannheim Korreferent: Prof. Dr. Colin Atkinson, Universit¨atMannheim Tag der m¨undlichen Pr¨ufung: 12. Februar 2021 Danksagungen Nach einer solchen Arbeit ist es nicht leicht, alle Menschen aufzuz¨ahlen,die mich direkt oder indirekt unterst¨utzthaben. Ich versuche es dennoch. Allen voran m¨ochte ich meinem Doktorvater Prof. Wolfgang Effelsberg danken, der mir - ohne mich vorher als Master-Studenten gekannt zu haben - die Promotion an seinem Lehrstuhl erm¨oglichte und mit Geduld, Empathie und nicht zuletzt einem mir unbegreiflichen Verst¨andnisf¨ur meine verschiedenen Ausfl¨ugein die Weiten der Informatik unterst¨utzthat. Sie werden mir nicht glauben, wie dankbar ich Ihnen bin. Weiterhin m¨ochte ich meinem damaligen Studiengangsleiter Herrn Prof. Heinz J¨urgen M¨ullerdanken, der vor acht Jahren den Kontakt zur Universit¨atMannheim herstellte und mich ¨uberhaupt erst in die richtige Richtung wies, um mein Promotionsvorhaben anzugehen. Auch Herr Prof. Peter Henning soll nicht ungenannt bleiben, der mich - auch wenn es ihm vielleicht gar nicht bewusst ist - davon ¨uberzeugt hat, dass die Erzeugung virtueller Welten ein lohnenswertes Promotionsthema ist. Ganz besonderer Dank gilt meiner Frau Sarah und meinen beiden Kindern Justus und Elisa, die viele Abende und Wochenenden zugunsten dieser Arbeit auf meine Gesellschaft verzichten mussten. Jetzt ist es geschafft, das n¨achste Projekt ist dann wohl der Garten! Ebenfalls geb¨uhrt meinen Eltern und meinen Geschwistern Dank.
    [Show full text]
  • Newsletter Template May 2013
    In this issue: Emerald City Changes Hands 2 From South Dakota 2 From Alan Brandt 3 Cluster Ballooning / BFA Radio Freq. 4 BFA Youth Summer Camps 5 More BFA Summer Camp Info 6 Kamma Kissack / Mark Your Calendars 7 Dawn Patrol in Ohio 8 Sunrise Calendar 9 For Sale - From Bob Schaible and Larry Houska 10 Flying Reports 11 Monthly Meeting Minutes 12 Club Information/Membership 13 Volume 4, Issue 5 May 2013 DownWind Chase The Official Newsletter for the Pacific Coast Aeronauts PRESIDENT’S MESSAGE Coming into Spring and the winds are here, SKYPE Membership Meeting: Scheduled for though we are getting some really nice flying Wed. May 1st at 7:00pm Pacific. Please try to days between the systems. Russ James reports join in. Contact me if you need info on Skype. things over in Napa have been busy....when David Wakefield [email protected] they could fly. Many cancelled flights lately due to wind. Jeanne Anson says Winter is still hang- As I said last month, I’m working on compiling a ing on up north...Snow. list of annual regional events covering the states of California, Nevada, Arizona, Oregon, Wash- There have been two flight event cancellations in ington and Idaho. Coming soon? the past month. The April 6th event that Scorch put together at Children’s Hospital Central Cali- If you have suggestions or comments I would be fornia had to be cancelled as a storm came happy to hear them. through and left us with high winds in its wake. The Great Lake County Balloon Adventure, a Safety Seminar Presentations: first year event in Lake County which was scheduled for the first weekend in May has been We are listing the 2013 Safety Seminar topics on cancelled as several sponsors pulled out on or the PCA website and a number of the presenta- about April 15th (wonder if the date was a fac- tions will be linked for download.
    [Show full text]
  • Making a Game Character Move
    Piia Brusi MAKING A GAME CHARACTER MOVE Animation and motion capture for video games Bachelor’s thesis Degree programme in Game Design 2021 Author (authors) Degree title Time Piia Brusi Bachelor of Culture May 2021 and Arts Thesis title 69 pages Making a game character move Animation and motion capture for video games Commissioned by South Eastern Finland University of Applied Sciences Supervisor Marko Siitonen Abstract The purpose of this thesis was to serve as an introduction and overview of video game animation; how the interactive nature of games differentiates game animation from cinematic animation, what the process of producing game animations is like, what goes into making good game animations and what animation methods and tools are available. The thesis briefly covered other game design principles most relevant to game animators: game design, character design, modelling and rigging and how they relate to game animation. The text mainly focused on animation theory and practices based on commentary and viewpoints provided by industry professionals. Additionally, the thesis described various 3D animation and motion capture systems and software in detail, including how motion capture footage is shot and processed for games. The thesis ended on a step-by-step description of the author’s motion capture cleanup project, where a jog loop was created out of raw motion capture data. As the topic of game animation is vast, the thesis could not cover topics such as facial motion capture and procedural animation in detail. Technologies such as motion matching, machine learning and range imaging were also suggested as topics worth covering in the future.
    [Show full text]
  • Blender Instructions a Summary
    BLENDER INSTRUCTIONS A SUMMARY Attention all Mac users The first step for all Mac users who don’t have a three button mouse and/or a thumb wheel on the mouse is: 1.! Go under Edit menu 2.! Choose Preferences 3.! Click the Input tab 4.! Make sure there is a tick in the check boxes for “Emulate 3 Button Mouse” and “Continuous Grab”. 5.! Click the “Save As Default” button. This will allow you to navigate 3D space and move objects with a trackpad or one-mouse button and the keyboard. Also, if you prefer (but not critical as you do have the View menu to perform the same functions), you can emulate the numpad (the extra numbers on the right of extended keyboard devices). It means the numbers across the top of the standard keyboard will function the same way as the numpad. 1.! Go under Edit menu 2.! Choose Preferences 3. Click the Input tab 4.! Make sure there is a tick in the check box for “Emulate Numpad”. 5.! Click the “Save As Default” button. BLENDER BASIC SHORTCUT KEYS OBJECT MODE SHORTCUT KEYS EDIT MODE SHORTCUT KEYS The Interface The interface of Blender (version 2.8 and higher), is comprised of: 1. The Viewport This is the 3D scene showing you a default 3D object called a cube and a large mesh-like grid called the plane for helping you to visualize the X, Y and Z directions in space. And to save time, in Blender 2.8, the camera (left) and light (right in the distance) has been added to the viewport as default.
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]
  • Photos Copied" Box
    Our photos have never been as scattered as they are now... Do you know where your photos are? Digital Photo Roundup Checklist www.theswedishorganizer.com Online Storage Edition Let's Play Digital Photo Roundup! Congrats on making the decision to start organizing your digital photos! I know the task can seem daunting, so hopefully this handy checklist will help get your moving in the right direction. LET'S ORGANIZE! To start organizing your digital photos, you must first gather them all into one place, so that you'll be able to sort and edit your collection. Use this checklist to document your family's online storage accounts (i.e. where you have photos saved online), and whether they are copied onto your Master hub (the place where you are saving EVERYTHING). It'll make the gathering process a whole lot easier if you keep a record of what you have already copied and what is still to be done. HERE'S HOW The services in this checklist are categorized, so that you only need to print out what applies to you. If you have an account with the service listed, simply check the "Have Account" box. When you have copied all the photos, check the "Photos Copied" box. Enter your login credentials under the line between the boxes for easy retrieval. If you don't see your favorite service on the list, just add it to one of the blank lines provided after each category. Once you are done, you should find yourself with all your digital images in ONE place, and when you do, check back on the blog for tools to help you with the next step in the organizing process.
    [Show full text]
  • Synchronize Documents Between Computers
    Synchronize Documents Between Computers Helladic and unshuttered Davidde oxygenizes his lent anted jaws infuriatingly. Is Dryke clitoral or vocalic when conceded some perpetualities hydrogenate videlicet? Geoff insufflates maritally as right-minded Sayre gurgles her immunochemistry slots exaltedly. Cubby will do exactly what is want Sync folders between systems on the internet It benefit cloud options as fresh but they demand be ignored if you'd telling It creates a. Sync Files Among Multiple Computers Recoverit. Cloud Storage Showdown Dropbox vs Google Drive Zapier. This means keeping files safe at the jump and syncing them control all of. Great solution for better than data synchronization history feature requires windows live id, cyber security purposes correct drivers with? If both PC are knew the complex kind no connection and when harm would happen. How to Sync Between Mac and Windows Documents Folder. It is so if they have access recently modified while both computers seamlessly across all backed up with documents or backup? File every time FreeFileSync determines the differences between input source review a target. How to synchronize a Teams folder to separate local Computer. Very much more, documents is well. So sent only sync a grant key files to new devices primarily my documents folder and custom folder of notes It's also five gigabytes of parcel and generally. Binfer is a cloudless file transfer authorities that allows you to sync files between devices without the complex being stored or replicated on any 3rd party systems Binfer. Does Windows 10 have wealth Transfer? File Sync Software Synchronize files between multiple.
    [Show full text]
  • Autopilot 2 Manual
    AutoPilot® 2 Instruction Manual December 2002 (REV C) 7 Beaver Brook Road Littleton, MA 01460 978-486-0086 FAX 978-486-0081 Copyright © 2002 Burk Technology, Inc. All rights reserved. Table of Contents Introduction...........................................................................................................................4 Minimum System Requirements.......................................................................................4 Getting Started..................................................................................................................4 Getting Additional Help.....................................................................................................4 ARC-16 Setup........................................................................................................................5 ARC-16 Properties............................................................................................................5 ARC-16 Group..................................................................................................................6 Time Zone.........................................................................................................................7 Logging Options................................................................................................................7 Add New Connection........................................................................................................8 Add Channels ...................................................................................................................10
    [Show full text]
  • Google Says These Are 2014'S Best Android Apps
    7/22/2015 Google Says These Are 2014’s Best Android Apps | TIME TECH APPS Google Says These Are 2014’s Best Android Apps Victor Luckerson @VLuck Dec. 1, 2014 Check out Google's list of the best of the best With more than 1 million apps available, parsing through the Google Play Store can be a challenge. Google has provided some help by offering a list of the best Android apps of 2014. Whether you’re looking to stream a movie, learn a new language or manage your business calendar, Manor Farm Watermead Condes de chances are there’s an app that Bed & Guest House Barcelona will fit the bill. Breakfast Here’s a look at what Google has highlighted as the best of the best: Search Search Search Productivity Wunderlist: To­Do List & Tasks MORE SwiftKey Keyboard IFTTT (If This, Then That) Here’s What Really Makes Sunrise Calendar Microsoft’s Cortana So Amazing Todoist: To­Do List, Task List Microsoft Will Sell Windows 10 on a Mailbox USB Stick Offtime – Life Unplugged Rundavoo An Angry Birds Sequel Is Officially Money Tracker by BillGuard Happening SlideShare Presentations Strive Sandra Bland Dashcam Video Examined Over Alleged Edits NBC News Education World's Oldest Quran Fragments TED Found, Experts Say NBC News Lumosity Duolingo Air Bag Probe Widens: Are Old Parts Craftsy Classes Dangerous? NBC News Monki Chinese Class Child Mode & Time Education Amazing World Atlas Entertainment Hulu Comedy Central Disney Movies Anywhere DramaFever 5by Dailymotion PHOTOS: INSIDE GOOGLE’S NEW YORK CITY OFFICE http://time.com/3611709/best­android­google­play­apps­2014/ 1/3 7/22/2015 Google Says These Are 2014’s Best Android Apps | TIME Eric Laignel—Google A subway themed conference room where Googlers can video conference with other Google offices around the world.
    [Show full text]
  • Marianne Van Den Boomen Trans Coding the Digital How Metaphors Matter in New Media
    MARIANNE VAN DEN BOOMEN TRANS CODING THE DIGITAL HOW METAPHORS MATTER IN NEW MEDIA A SERIES OF READERS PUBLISHED BY THE INSTITUTE OF NETWORK CULTURES ISSUE NO.: 14 MARIANNE VAN DEN BOOMEN TRANSCODING THE DIGITAL HOW METAPHORS MATTER IN NEW MEDIA Theory on Demand #14 Transcoding the Digital: How Metaphors Matter in New Media Author: Marianne van den Boomen Editorial support: Miriam Rasch Design and DTP: Katja van Stiphout Publisher: Institute of Network Cultures, Amsterdam 2014 Printer: ‘Print on Demand’ First 200 copies printed at Drukkerij Steenman, Enkhuizen ISBN: 978-90-818575-7-4 Earlier and different versions of Chapter 2 has been published in 2008 as ‘Interfacing by Iconic Metaphors’, in Configurations 16 (1): 33-55, and in 2009 as ‘Interfacing by Material Metaphors: How Your Mailbox May Fool You’, in Digital Material: Tracing New Media in Everyday Life and Technology, edited by Marianne van den Boomen, Sybille Lammes, Ann-Sophie Lehmann, Joost Raessens, and Mirko Tobias Schäfer. Amsterdam: Amsterdam University Press, p. 253-266. An earlier and different version of Chapter 6 has been published in 2006 as ‘Transcoding Metaphors after the Mediatic Turn’, in SPIEL 25 (h.1): 47-58. Contact Institute of Network Cultures Phone: +31 20 5951865 Email: [email protected] Web: http://www.networkcultures.org This publication is available through various print on demand services. For more information, and a freely downloadable PDF: http://networkcultures.org/publications This publication is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International (CC BY-NC-SA 4.0). TRANSCODING THE DIGITAL 3 TRANSCODING THE DIGITAL HOW METAPHORS MATTER IN NEW MEDIA De transcodering van het digitale Hoe metaforen ertoe doen in nieuwe media (met een samenvatting in het Nederlands) PROEFSCHRIFT ter verkrijging van de graad van doctor aan de Universiteit Utrecht op gezag van de rector magnificus, prof.dr.
    [Show full text]
  • Open Online Meeting
    Open online meeting Project report 2021 1 Content Page ➢ Objectives and background ○ Background, current situation and future needs 3 ○ Purpose and aim of the project 4 ○ Implementation: Preliminary study 5 ○ Functionalities 6 ➢ Results of the study ○ Group 1: Web-conferencing and messaging solutions 7 ○ Group 2: Online file storage, management and collaboration platforms 21 ○ Group 3: Visual online collaboration and project management solutions 30 ○ Group 4: Online voting solutions 37 ➢ Solution example based on the study results ○ Selection criteria 42 ○ Description of the example solution 43 ➢ Next steps 44 2021 2 Background, current situation and future needs Municipalities in Finland have voiced a need to map out open source based alternatives for well-known proprietary online conferencing systems provided by e.g. Google and Microsoft for the following purposes: ➢ Online meeting (preferably web-based, no installation), ➢ Secure file-sharing and collaborative use of documents, ➢ Chat and messaging, ➢ Solution that enables online collaboration (easy to facilitate), ➢ Cloud services, ➢ Online voting (preferably integrated to the online meeting tool with strong identification method that would enable secret ballot voting). There are several open source based solutions and tools available for each category but a coherent whole is still missing. 2021 3 Purpose and aim of the project The purpose in the first phase of the project was to conduct a preliminary study on how single open source based solutions and tools could be combined to a comprehensive joint solution and research the technical compatibility between the different OS solutions. The project aims to create a comprehensive example solution that is based on open source components.
    [Show full text]
  • P27 Layout 1
    MONDAY, JUNE 8, 2015 TECHNOLOGY Microsoft moving into iOS, Android platforms NEW YORK: Looking for a new app for making “to-do” Geeks typically refer to this concept as “augmented reali- lists on your Apple or Android phone? You could use ty.” Abovitz prefers to think of it as “cinematic” or “mixed” Apple’s Reminders or Google’s Keep. But Microsoft is hop- reality. ing you’ll try Wunderlist, created by a German tech start- “We are giving people a paintbrush to paint the entire up that Microsoft bought this week. world,” Abovitz said Tuesday during a rare appearance at Microsoft’s acquisition of German firm 6Wunderkinder a San Francisco conference presented by the MIT this week for an undisclosed sum is part of its broader Technology Review. Abovitz is still being cagey about effort to win friends in the mobile world. It is still promot- when Magic Leap will begin selling its products, but it ing its Windows operating software for smartphones, but might not be too much longer. He revealed that the relatively few consumers are buying Windows phones. So Dania Beach, Florida, company is planning to manufac- the company is also building a stable of apps for devices ture a “photonic lightfield chip” in a 300,000-square-foot that run on Apple’s iOS and Google’s Android platforms. plant. The expansion is being financed by Google Inc. That includes Android and iOS versions of Microsoft’s and other prominent investors, including Microsoft co- Office programs, which the Redmond, Washington, com- founder Paul Allen, who have poured $592 million into pany created in-house and released earlier this year.
    [Show full text]