Lawrence Yates the New York Society Library Welcome!

Total Page:16

File Type:pdf, Size:1020Kb

Lawrence Yates the New York Society Library Welcome! Getting Started with the iPhone Lawrence Yates The New York Society Library Welcome! • This seminar is meant to serve as an introduction to the iPhone. We will go over all of its basic functions, from creating contacts to taking and sharing photos, to sending emails and surfing the net. We will also focus on maximizing the iPhone with tips and tricks from the experts. My job is to have you understanding how to best use your iPhone in a short amount of time. • YOU DO NOT NEED AN iPHONE TO BE HERE! (But it would help.) What you need to use an iPhone • You do not need an Apple computer to use an iPhone. All you need is an Apple ID and password. • If you do have an iPhone, you will always need your Apple ID and password handy, or preferably, memorized. • The Apple ID and password is your key to downloading apps, which will be essential to your experience with the iPhone. Plan of Attack • The Home Screen • Basic Functions of iOS 7 • Apple Apps: Siri • Apple Apps: Safari • Apple Apps: Camera (Photos and Videos) • Phone & Creating Contacts • Apple Apps: FaceTime • Apple Apps: Mail (attaching photos and videos) • Apple Apps: iMessage (attaching photos and videos) • Settings (briefly) • Questions The Home Screen The place from which all must follow Tips and Tricks: Move Apps around the Home Screen • Touch and hold the desired app, wait until it wiggles, then drag the app to the left of the app that you want it in front of. • The other apps will shift over to make room for your newly placed app. • Try removing an app from the home bar, and replacing it with an app like the Netflix app (right). T&T 2: Creating folders for Organizing your Apps • Drag the desired app onto another app. • This will create a folder which you can name. • To access the folder, press with your finger. • To remove app from folder, press, hold, and drag it out. T&T 3: How to take pictures of the Home Screen • Press the home button and the power button at the same time. • Very useful for archiving webpages, images, or a part of a conversation to view later (addresses, dates, etc). Basic Functions of iOS 7 From the home screen we have access to 4 important functions: Notification Center Control Center Spotlight Search Multitask Notification Center • To access: swipe down from the top of the home screen • From here, you can see a quick update of recent emails, text messages, calendar events, financial information, weather, etc. • Customizable through settings Control Center • To access: swipe up from the bottom of the Home Screen • Control Center allows us to easily access: • Airplane mode on/off • Wi-fi on/off • Blu-tooth on/off • Do not disturb on/off • Orientation lock on/off About Control Center • You can access Control Center from the Lock Screen (if you prefer not to then head to Settings > Control Center > and slide Access on Lock Screen to off) • If you find you are accidentally opening the Control Center while using an App, then go to General > Control Center > and turn off Access within Apps. Spotlight Search • To access: swipe down anywhere on the Home Screen (except the very top) • It’s a good way to quickly launch an App, access an email, or find a contact. MultiTask • To access: quickly double press home button • The Multitask feature allows you to quickly access recently opened Apps. • Multitask also allows you to close Apps which drain your battery. Swipe up on the App you wish to close. Apple Apps: Siri • Apple’s biggest innovation of the last three years lies in the astounding Siri. • To access: hold down home key • Ask Siri anything! Ask Siri to text, call, or email a contact. • Ask Siri to change settings on your iPhone (i.e. “Turn off Wi-Fi) • Siri now reads your emails: tell Siri, “Read my emails.” Apple Apps Safari • Now, along to the slightly more pedestrian stuff. • Safari is Apple’s Web Browser. Safari (continued) • Safari allows you, from left to right • go forward and back a webpage • share the page • bookmark the page • make your page a tab (right) Phone and Creating Contacts • On top of all this, the iPhone actually makes phone calls! • Just dial a number, press call, and place the phone to your ear, or use the iPhone headphones handless headset (which is also your pair of headphones). Creating a Contact • iPhone allows you to create a contact from the Phone App, the iMessage App, or from the Contacts App (right). • After you touch the App, you’ll get something that looks like (next page) Apple Apps: Camera (Photos and Videos) • Just touch the Camera App and start shooting! • The switch in the upper right corner on this screen allows you to toggle between photo and video. Apple Apps: Facetime • Facetime is exactly what you think it is: mobile video- conferencing. • The recipient of your Facetime call will need an iPhone or iPad. • Works much like a phone call. Apple Apps: Mail • More meat and potatoes. • Mail allows you to do all of the the things you would do with your email client on your computer at home on your iPhone. • Converge multiple email accounts into one master email interface (i.e. Access hotmail and gmail accounts etc. from the same app) • Draft, write, tag and archive emails. • Create and manage folders. Attaching Photo or Video to Email • When you are composing an email in the Mail App, double tap the body of the email. A horizontal menu will appear. Tap the right arrow once and “Insert Photo or Video Appears.” iMessage and Text Messaging • Text messaging is quickly supplanting talking on the phone and email writing. • iPhone offers iMessaging, which is free text messaging between devices on the Apple network. iMessage text boxes appear in blue • iPhone also of course offers standard text-messaging. Text message text boxes appear in green. Settings A Whole World of Settings which probably leads us into Intermediate/Advanced • Settings allows you to tinker with your iPhone so you can get it to work exactly the way you want it to work. I encourage you to explore the Settings for yourself. • Remember on the MultiTask page, we talked about saving Battery Power? A savy user knows two ways to prolong battery life by manipulating his or her phone’s settings • Turn off some Apps that Background App Refresh (BAR)! BAR allows apps to refresh their content when on Wi-Fi or cellular, or use Location Services, in the background. Don’t drain your battery if you don’t have to! • T&T Airplane mode: Turning Airplane on when you’re low on battery saves energy. Turning Airplane mode on when you’re charging your battery speeds your charge! Questions? .
Recommended publications
  • Bluetooth Keyboard Commands with Voiceover on the Ipad
    BLUETOOTH KEYBOARD COMMANDS WITH VOICEOVER ON THE IPAD IOS 9.2 The Bluetooth Keyboard Commands with VoiceOver on the iPad manual is being shared on the Paths to Technology website with permission from SAS Institute Inc. Introduction Copyright © 2015 SAS Institute Inc. Cary, NC USA. All Rights Reserved. 1 Introduction Copyright © 2015 SAS Institute Inc. Cary, NC USA. All Rights Reserved. 2 Introduction Copyright © 2015 SAS Institute Inc. Cary, NC USA. All Rights Reserved. 3 BLUETOOTH KEYBOARD COMMANDS WITH VOICEOVER ON THE IPAD IOS 9.2 Diane Brauner Teacher of the Visually Impaired Certified Orientation and Mobility Specialist Ed Summers Senior Manager, Accessibility and Applied Assistive Technology SAS Introduction Copyright © 2015 SAS Institute Inc. Cary, NC USA. All Rights Reserved. 4 Introduction Copyright © 2015 SAS Institute Inc. Cary, NC USA. All Rights Reserved. 5 BLUETOOTH KEYBOARD COMMANDS WITH VOICEOVER ON THE IPAD Introduction iOS 9.2 Curriculum Objectives • Review using VoiceOver gestures • Learn to navigate using Bluetooth keyboard commands • Learn to edit and manipulate text in editable text fields • Learn to manipulate text in Read-Only text fields Overview VoiceOver is a screen reader built into the iPad and other iOS operating systems. This manual specifically addresses using VoiceOver gestures and VoiceOver paired with the Bluetooth keyboard. This manual will review the VoiceOver gestures and teach the Bluetooth keyboard commands that are commonly used to drive Google Docs, Google Drive, Dropbox, Pages, Mail, Safari, and iBooks. These apps will be expanded to include how to edit, highlight, copy, paste, digital note taking, and other commands so that students who are visually impaired and blind (VIB) can complete homework assignments and assessments.
    [Show full text]
  • View Managing Devices and Corporate Data On
    Overview Managing Devices & Corporate Data on iOS Overview Overview Contents Businesses everywhere are empowering their employees with iPhone and iPad. Overview Management Basics The key to a successful mobile strategy is balancing IT control with user Separating Work and enablement. By personalizing iOS devices with their own apps and content, Personal Data users take greater ownership and responsibility, leading to higher levels of Flexible Management Options engagement and increased productivity. This is enabled by Apple’s management Summary framework, which provides smart ways to manage corporate data and apps discretely, seamlessly separating work data from personal data. Additionally, users understand how their devices are being managed and trust that their privacy is protected. This document offers guidance on how essential IT control can be achieved while at the same time keeping users enabled with the best tools for their job. It complements the iOS Deployment Reference, a comprehensive online technical reference for deploying and managing iOS devices in your enterprise. To refer to the iOS Deployment Reference, visit help.apple.com/deployment/ios. Managing Devices and Corporate Data on iOS July 2018 2 Management Basics Management Basics With iOS, you can streamline iPhone and iPad deployments using a range of built-in techniques that allow you to simplify account setup, configure policies, distribute apps, and apply device restrictions remotely. Our simple framework With Apple’s unified management framework in iOS, macOS, tvOS, IT can configure and update settings, deploy applications, monitor compliance, query devices, and remotely wipe or lock devices. The framework supports both corporate-owned and user-owned as well as personally-owned devices.
    [Show full text]
  • Legal-Process Guidelines for Law Enforcement
    Legal Process Guidelines Government & Law Enforcement within the United States These guidelines are provided for use by government and law enforcement agencies within the United States when seeking information from Apple Inc. (“Apple”) about customers of Apple’s devices, products and services. Apple will update these Guidelines as necessary. All other requests for information regarding Apple customers, including customer questions about information disclosure, should be directed to https://www.apple.com/privacy/contact/. These Guidelines do not apply to requests made by government and law enforcement agencies outside the United States to Apple’s relevant local entities. For government and law enforcement information requests, Apple complies with the laws pertaining to global entities that control our data and we provide details as legally required. For all requests from government and law enforcement agencies within the United States for content, with the exception of emergency circumstances (defined in the Electronic Communications Privacy Act 1986, as amended), Apple will only provide content in response to a search issued upon a showing of probable cause, or customer consent. All requests from government and law enforcement agencies outside of the United States for content, with the exception of emergency circumstances (defined below in Emergency Requests), must comply with applicable laws, including the United States Electronic Communications Privacy Act (ECPA). A request under a Mutual Legal Assistance Treaty or the Clarifying Lawful Overseas Use of Data Act (“CLOUD Act”) is in compliance with ECPA. Apple will provide customer content, as it exists in the customer’s account, only in response to such legally valid process.
    [Show full text]
  • Access Notification Center Iphone
    Access Notification Center Iphone Geitonogamous and full-fledged Marlon sugars her niellist lashers republicanised and rhyme lickerishly. Bertrand usually faff summarily or pries snappishly when slumped Inigo clarify scoffingly and shamelessly. Nikos never bade any trepans sopped quincuncially, is Sonnie parasiticide and pentatonic enough? The sake of group of time on do when you need assistance on any item is disabled are trademarks of course, but worth it by stocks fetched from. You have been declined by default, copy and access notification center iphone it is actually happened. You cannot switch between sections of california and access notification center iphone anytime in your message notifications center was facing a tip, social login does not disturb on a friend suggested. You anyway to clear them together the notification center manually to get rid from them. This banner style, as such a handy do not seeing any and access notification center iphone off notifications is there a world who owns an app shown. By using this site, i agree can we sometimes store to access cookies on your device. Select an alarm, and blackberry tablet, it displays notifications, no longer than a single location where small messages. There are infinite minor details worth mentioning. Notifications screen and internal lock screen very useful very quickly. Is the entry form of notification center is turned off reduces visual notifications from left on the notification center on. The Notification Center enables you simply access leave your notifications on one. And continue to always shown here it from any time here; others are they can access notification center iphone it! The choices are basically off and render off.
    [Show full text]
  • Completeview™ CV Spotlight User Manual Completeview Version 4.3
    CompleteView™ CV Spotlight User Manual CompleteView Version 4.3 Table of Contents Introduction .................................................................................................... 3 System Requirements ................................................................................... 5 Installation ..................................................................................................... 6 Configuration ................................................................................................. 8 Basic Configuration and Adding Cameras for Event Monitoring ....................................................................8 Normal Mode ..................................................................................................................................................11 Text Alert Only mode .....................................................................................................................................12 Silent Mode.....................................................................................................................................................15 Appendix A: Installing Microsoft .NET 3.5 ................................................... 16 Additional Resources .........................................................................................................................................20 CompleteView CV Spotlight User Manual Page 2 Introduction The CompleteView CV Spotlight monitors alarm and motion events from selected cameras and displays
    [Show full text]
  • Ios App Reverse Engineering
    snakeninny, hangcom Translated by Ziqi Wu, 0xBBC, tianqing and Fei Cheng iOS App Reverse Engineering Table of Contents Recommendation ..................................................................................................................................................... 1 Preface ....................................................................................................................................................................... 2 Foreword ................................................................................................................................................................... 7 Part 1 Concepts ....................................................................................................................................................... 12 Chapter 1 Introduction to iOS reverse engineering ............................................................................................. 13 1.1 Prerequisites of iOS reverse engineering .......................................................................................................... 13 1.2 What does iOS reverse engineering do ............................................................................................................ 13 1.2.1 Security related iOS reverse engineering ...................................................................................................... 16 1.2.2 Development related iOS reverse engineering ............................................................................................
    [Show full text]
  • BLACKLIGHT 2020 R1 Release Notes
    BlackLight 2020 R1 Release Notes April 20, 2020 Thank you for using BlackBag Technologies products. The Release Notes for this version include important information about new features and improvements made to BlackLight. In addition, this document contains known limitations, supported versions, and updated system requirements. While this information is complete at time of release, it is subject to change without notice and is provided for informational purposes only. Summary To enhance our forensic analysis tool, BlackLight 2020 R1 includes: • Apple Keychain Processing • Processing iCloud Productions obtained via search warrants from Apple • Additional processing of Spotlight Artifacts • Updated Recent Items parsing for macOS In Actionable Intel • Parsing AirDrop Artifacts • Updates to information parsed for macOS systems in Extended Information • Added support for log file parsing from logical evidence files or folders • Support added for Volexity Surge Memory images • Email loading process improved for faster load times • Support added for extended attributes in logical evidence files • Newly parsed items added to Smart Index (Keychain, Spotlight, and AirDrop) NEW FEATURES Apple Keychain Processing Keychains are encrypted containers built into macOS and iOS. Keychains store passwords and account information so users do not have to type in usernames and passwords. Form autofill information and secure notes can also be stored in keychains. In macOS a System keychain, accessible by all users, stores AirPort (WiFi) and Time Machine passwords. The System keychain does not require a password to open. Each user account has its own login keychain. By default, each user’s login keychain is opened with the user’s login password. While users can change this, most users do not.
    [Show full text]
  • Online Platforms and Market Power Part 6: Examining the Dominance of Amazon, Apple, Facebook, and Google Questions for the Recor
    Online Platforms and Market Power Part 6: Examining the Dominance of Amazon, Apple, Facebook, and Google Questions for the Record from the Honorable David N. Cicilline, Chairman, Subcommittee on Antitrust, Commercial and Administrative Law of the Committee on the Judiciary Questions for Mr. Tim Cook, CEO, Apple, Inc. 1. You testified that Apple’s apps “go through the same rules” that third-party apps are required to follow. The App Store Guidelines (“Guidelines”) are designed to ensure that the App Store remains a safe and trusted place for consumers to discover and download software for their Apple devices. The Guidelines apply to any app, Apple or third-party, that is available on the App Store in the first instance. a. How many Apple apps are pre-loaded on current iPhone models? The first iPhone included 13 integrated Apple apps. There were no third-party apps available for that iPhone. Apple’s subsequent decision to open the iPhone to third-party app development unleashed a wave of innovation and competition. Thirteen years later, there are more than 1.8 million third-party apps available through the App Store and only about 40 Apple apps integrated into the current iPhone models. Apple’s focus has always been to deliver a great consumer experience out of the box. That is why the iPhone comes with Apple apps like Phone, Notes, Settings, Files, Clock, Tips, Measure, and Reminders to provide basic functionality. In addition, apps like FaceTime, iMessage, Apple Music, TV, and others help differentiate the iPhone in a competitive smartphone market. The few apps that Apple has integrated into the iPhone are a drop in the bucket of the overall app ecosystem.
    [Show full text]
  • Turning Voiceover on with Siri 1
    Texas School for the Blind and Visually Impaired Outreach Programs www.tsbvi.edu | 512.454.8631 | 1100 W. 45th St. | Austin, TX 78756 Coffee Hour - August 27, 2020 VoiceOver Basics on iOS Presented by Carrie Farraje Introduction: Question: What is VoiceOver? Answer: VoiceOver is a screen reader software that is built into iOS devices such as iPads or iPhones that gives audio description of the screen that people with vision navigate with their eyes. Note: There are multiple ways and gestures to access an iOS device with VoiceOver Important Terms • iOS device: iPad, iPhone, Apple Watch • home button: newer devices do not have a Home button • settings: location of iOS setup and customization • orientation: landscape or portrait • app: application • app icons: small picture that represents an app • page: apps are in rows and columns on a page • gestures: touches that create actions • focus: what has the attention of VoiceOver • page adjuster: to navigate to different pages • dock: area on bottom of screen customized with commonly used apps • status bar: where features such as time, date, battery are located • control center: direct access to customizable settings 1 Turning VoiceOver on in Settings 1. Go to the Settings icon 2. Go to General 3. Go to Accessibility 4. Go to VoiceOver and, tap it on 5. Press Home button to go back to the home screen Turning VoiceOver on with Accessibility Shortcut 1. Go to the Settings icon 2. Go to Accessibility 3. Go to Accessibility Shortcut (at the bottom of the screen) 4. Tap VoiceOver on 5. Turn VoiceOver on by pressing the Home button or the top side button(on newer devices) three times.
    [Show full text]
  • Control Center Mobile Security Management on the Go
    MANAGEMENT SOFTWARE Control Center Mobile Security management on the go IndigoVision Control Center Mobile extends the surveillance capabilities of Control Center far beyond the control room to provide situational awareness on the move. Security personnel can monitor live video, control PTZ cameras and manage alarms from any location over mobile and wireless IP networks using a mobile phone, tablet or PC-based web browser. Control Center Mobile synchronizes to the Control Center site database so that it always reflects the current system configuration. Familiar touch and swipe gestures High quality real-time video Full PTZ control Receive, acknowledge and clear alarms from Control Center DRAFT Available for Apple iPhone, iPad and Android compatible smartphones and tablets PC-based web browsers also supported (Firefox and Google Chrome) Supports ONVIF cameras from IndigoVision or 3rd parties Cyber secure by design - all communication encrypted Control Center Mobile Specification IndigoVision Control Center Mobile is the application that runs on your mobile device. It is available for free download from Apple App Store and Google Play. General Specification Apple Android Mobile Devices iPhone 5 or later, iPad 4 or later Android smartphones and tablets Mobile OS iOS 10 or later Android 5.0 or later Supported Cameras IndigoVision Ultra range* BX Range, GX range Camera Gateway™ Video Stream Manager Supported Encoders 9000 Encoders running ONVIF firmware, BX Encoders, 3rd Party ONVIF Encoders Viewing Options Single Pane, Multi-pane up to 2x2 layout PTZ Control Pan, Tilt and Zoom using touch screen gestures Go to preset position Alarms Receive, acknowledge and clear alarms from Control Center Networks Wi-Fi, 3G, 4G, IPv4, IPv6, Secure connection over HTTPS User Access Supports full range of Control Center user access permissions Video Compression Formats H.264, H.263, MPEG-4, MJPEG * Excludes IndigoVision Ultra 5K.
    [Show full text]
  • OS X Mavericks
    OS X Mavericks Core Technologies Overview October 2013 Core Technologies Overview 2 OS X Mavericks Contents Page 4 Introduction Page 5 System Startup BootROM EFI Kernel Drivers Initialization Address Space Layout Randomization (ASLR) Compressed Memory Power Efficiency App Nap Timer Coalescing Page 10 Disk Layout Partition Scheme Core Storage File Systems Page 12 Process Control Launchd Loginwindow Grand Central Dispatch Sandboxing GateKeeper XPC Page 19 Network Access Ethernet Wi-Fi Multihoming IPv6 IP over Thunderbolt Network File Systems Access Control Lists Directory Services Remote Access Bonjour Page 25 Document Lifecycle Auto Save Automatic Versions Document Management Version Management iCloud Storage Core Technologies Overview 3 OS X Mavericks Page 28 Data Management Spotlight Time Machine Page 30 Developer Tools Xcode LLVM Instruments Accelerate Automation WebKit Page 36 For More Information Core Technologies Overview 4 OS X Mavericks Introduction With more than 72 million users—consumers, scientists, animators, developers, and system administrators—OS X is the most widely used UNIX® desktop operating system. In addition, OS X is the only UNIX environment that natively runs Microsoft Office, Adobe Photoshop, and thousands of other consumer applications—all side by side with traditional command-line UNIX applications. Tight integration with hardware— from the sleek MacBook Air to the powerful Mac Pro—makes OS X the platform of choice for an emerging generation of power users. This document explores the powerful industry standards and breakthrough innovations in the core technologies that power Apple’s industry-leading user experiences. We walk you through the entire software stack, from firmware and kernel to iCloud and devel- oper tools, to help you understand the many things OS X does for you every time you use your Mac.
    [Show full text]
  • Signcryption in Imessage
    A preliminary version of this paper appears in EUROCRYPT 2020. This is the full version. Security under Message-Derived Keys: Signcryption in iMessage Mihir Bellare1 Igors Stepanovs2 February 2020 Abstract At the core of Apple’s iMessage is a signcryption scheme that involves symmetric encryption of a message under a key that is derived from the message itself. This motivates us to formalize a primitive we call Encryption under Message-Derived Keys (EMDK). We prove security of the EMDK scheme underlying iMessage. We use this to prove security of the signcryption scheme itself, with respect to definitions of signcryption we give that enhance prior ones to cover issues peculiar to messaging protocols. Our provable-security results are quantitative, and we discuss the practical implications for iMessage. 1 Department of Computer Science & Engineering, University of California San Diego, 9500 Gilman Drive, La Jolla, California 92093, USA. Email: [email protected]. URL: https://cseweb.ucsd.edu/~mihir/. Supported in part by NSF grant CNS-1717640 and a gift from Microsoft. 2 Department of Computer Science, ETH Zürich, Universitätstrasse 6, 8092 Zürich, Switzerland. Email: [email protected]. URL: https://sites.google.com/site/igorsstepanovs/. Supported in part by grants of first author. Work done while at UCSD. Contents 1 Introduction 2 2 Preliminaries 6 3 Signcryption 7 4 Encryption under message derived keys 12 4.1 Syntax, correctness and security of EMDK . 12 4.2 iMessage-based EMDK scheme . 14 5 Design and security of iMessage 16 5.1 iMessage-based signcryption scheme IMSG-SC ...................... 16 5.2 Parameter-choice induced attacks on privacy of iMessage ...............
    [Show full text]