Nokia Mobility Solutions
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
An Architecture for a Next Generation Voip Transmission Systems
An Architecture for a Next Generation VoIP Transmission Systems Christian Hoene1, Kai Clüver2, Jan Weil2 1Wilhelm-Schickard-Institute, University of Tübingen, Germany 2Fachgebiet Nachrichtenübertragung, Technical University of Berlin, Germany 1.1 Abstract Packetized speech transmission systems implemented with Voice over IP are gaining momentum against the traditional circuit switched systems despite the fact that packet switched VoIP is two to three times less efficient then its circuit switched counter part. At the time same time it is supporting just a rather bad “toll” quality. We believe that it is time to for a new architecture developed from the scratch. An architecture that includes an Internet enabled speech codec and its transport system. This architecture manages the perceptual service quality while using the available transmission resources to its best. The transmission of speech is managed and controlled in respect to its speech quality, month-to-ear delay, bit-rate, frame-rate, and loss robustness. Beside the architecture, we describe the requirements for the Internet speech codec and its transport protocol and present the description of an interface between speech codec and transport protocol. 2 Introduction Internet Telephony is a mature technology that has gained increasing popularity against the traditional PSTN systems. Voice over IP (VoIP) is replacing the PSTN service on broadband access networks such as cable modems and DSL, as it is more cost efficient to use IP broadband access also for Internet telephony. In addition, future wireless broadband access networks such as the 3GPP’s Long Term Evaluation (LTE) radio technology will support telephone services only via VoIP [1]. -
Enterprise Solutions Mary Mcdowell
MaryMary McDowellMcDowell Enterprise Solutions Agenda • Building momentum • The market opportunity • Enterprise Solutions strategy • Nokia for Business • Nokia and Intellisync • Go to market • Measuring success Enterprise Solutions Building Momentum Strengthening Expanding New Products Partner Opportunities Relationships Our Market Space VoiceVoice ApplicationsApplications DataData NetworkingNetworking ApplicationsApplications MobilewareMobileware SecuritySecurity MobileMobile OperatorsOperators EnterpriseEnterprise DataData DevicesDevices Desk DevicesDevices Desk PhonesPhones (PC/PDA)(PC/PDA) Our Market Space VoiceVoice ApplicationsApplications DataData NetworkingNetworking NokiaNokia FocusFocus ApplicationsApplications MobilewareMobileware SecuritySecurity MobileMobile OperatorsOperators EnterpriseEnterprise DataData DevicesDevices Desk DevicesDevices Desk PhonesPhones (PC/PDA)(PC/PDA) Nokia: Trusted Provider of Mobility in the Enterprise 2009 Market 2009 Aspiration #1#1 providerprovider ofof EnterpriseEnterprise corporatecorporate devices:devices: 18.118.1 b€b€ DevicesDevices shareshare consistentconsistent withwith globalglobal NokiaNokia shareshare #1#1 providerprovider ofof MobilewareMobileware 6.86.8 b€b€ mobilewaremobileware #2#2 providerprovider ofof firewallfirewall SecuritySecurity 4.64.6 b€b€ && securitysecurity appliancesappliances CAGR 2005/09 27% * Mobileware= Middleware + Applications Enterprise Solutions Strategy toto anyany corporatecorporate ConnectingConnecting peoplepeople overover anyany networknetwork applicationapplication -
Nokia E50 Metal Black Page 1 of 11
Step -by -Step Guide To Making Your Own Nokia E50 Metal Black Page 1 of 11 Nokia E50 HOME ARCHIVE FORUM PHOTOS SKINS REVIEWS ADVERTISE Nokia E50 Forum Now Open! Step-by-Step Guide To Making Your Own Nokia E50 Metal Black Jaro 12. February 2007 :: e50 , metal black , nokia Nokia Hs -3w Wireless Headset... Best Price: $32.99 Ads by ShoppingAds Last week we looked at the photos of a home made Metal Black E50 . This time I have a great guide with photos for you. A huge thanks goes to Doug who documented the whole process. I know that some of you will find it very helpful. So without further comments let’s make our own Metal Black E50: http://nokiae50.info/articles/step-by-step-guide-to-making-your-own-nokia-e50-metal... 30-10-2007 Step -by -Step Guide To Making Your Own Nokia E50 Metal Black Page 2 of 11 http://nokiae50.info/articles/step-by-step-guide-to-making-your-own-nokia-e50-metal... 30-10-2007 Step -by -Step Guide To Making Your Own Nokia E50 Metal Black Page 3 of 11 http://nokiae50.info/articles/step-by-step-guide-to-making-your-own-nokia-e50-metal... 30-10-2007 Step -by -Step Guide To Making Your Own Nokia E50 Metal Black Page 4 of 11 http://nokiae50.info/articles/step-by-step-guide-to-making-your-own-nokia-e50-metal... 30-10-2007 Step -by -Step Guide To Making Your Own Nokia E50 Metal Black Page 5 of 11 You probably noticed that the little bottom part is missing. -
Jarno Niemelä Types of Mobile Threats
Jarno Niemelä Types of Mobile Threats What we have seen so far • Viruses • Worms • Trojans • Single target spying applications What we have not seen yet • Rootkits • A worm that does not need user interaction to spread • Mass distributed spyware • Large scale profit oriented malware (professionals) 26.2.2008 2 Mobile Spy Tools Mobile spy tools are applications that are installed onto a phone to send information out from the phone • Typical example - an application that forwards all received SMS messages to a third party without the user's permission Mobile spy tools are not illegal in and of themselves • Their vendors state (weakly in most cases) that they must only be used for legal purposes • While in reality most of the things for which people use these tools are illegal; or at least they are in countries that have strong privacy protection laws 26.2.2008 3 Who Would Use Spy Tools The same people who use PC based spy tools • Oppressive spouses and other domestic abuse cases • Private investigators / divorce attorneys • Managers monitoring their employees • Industrial spies Some vendors sell both PC and mobile spy tools • And give discounts if you buy both • Spy both on your wife’s PC and her mobile phone 26.2.2008 4 Targeted and Untargeted Spy Tools Targeted spy tools are limited by the vendor • A spy must know the victim before obtaining the spy tool • Limitations are usually applied by requiring the target device's IMEI code in order to obtain the spy software • So the spy needs to have access to the device at least twice • This is -
1 Smartphones and Symbian OS
1 Smartphones and Symbian OS Symbian OS is a full-featured, open, mobile operating system that powers many of today’s smartphones. As these smartphones become more pow- erful and popular, the demand for smartphone software has grown. Symbian smartphones are shipped with a variety of useful pre-loaded and targeted applications, which are selected by each phone’s manu- facturer. Today, the average Symbian smartphone ships with over 30 pieces of third-party software pre-installed. However, the exciting aspect of Symbian smartphones is that they are ‘open’, meaning that users can further customize their phone experience by downloading, installing, and uninstalling applications written by third-party developers (or by the users themselves). Users can download applications from a PC to the smartphone through a link such as USB, or Bluetooth technology, or over-the-air via the Internet. With the largest installed base of smartphones worldwide, Symbian OS offers a great opportunity for software developers to establish them- selves in the mobile market by creating novel and exciting software for the growing mass of smartphone users around the world. There is a growing list of Symbian applications available as freeware or as paid downloads on numerous Internet sites (http://www.handango.com and http://www.epocware.com are good examples). They range from pro- ductivity, entertainment, navigation, multimedia, and communications software to programs that can count fast food calories, improve your golfCOPYRIGHTED swing, keep diaries, and calculate MATERIAL foreign currency exchange. And business opportunities aside, sometimes it’s just plain fun writing your own code to run on your own smartphone. -
Nokia 9500 Communicator
® www.protectstar.com Nokia 9500 Communicator ® ® INTRODUCTION: The Nokia 9500 Communicator provides fast and convenient Internet access via wireless LAN at data transfer rates of up to 11 MBit/s. You can work on presentations or text documents in comfort while you are on the move using the integrated office applications, while accessing data on your company network—such as databases— using wireless LAN or fast mobile telephone connectivity. The Nokia 9500 Communicator has 80 MB in internal memory and an the system known at the time of the testing procedure—operating MMC memory card slot for storing more data. system, applications, CGI abuses, useless services, backdoors, se- curity checks and so on. In addition, we used eEye Digital Security’s Source: www.nokia.de Common Hacker Attack Methods (CHAM®), an artificial intelligence SECURITY technology designed to unearth unknown and concealed weaknes- We have subjected the Nokia 9500 Communicator to a series of tests ses in the system by simulating the thought processes of a hacker. under both laboratory and real-life conditions. We can confirm that the device offers almost complete security protection. In carrying out In order to check wireless connectivity (WiFi, IEEE 802.1b), we used the security tests described below, we used a specially configured specifically developed wireless weak-point scanners to analyse WLAN router (ZyXEL ZyAIR G-2000) and several computer systems security techniques such as WEP (wired equivalent privacy) and operating under Windows XP and Linux that were connected WPA (WiFi protected access) and their encryption functions. We together to the Internet and intranet through the router. -
Nokia E61 User Guide
Nokia E61 User Guide 9246608 Issue 2 DECLARATIONNokia OF CONFORMITY We, NOKIA CORPORATION declare under our sole responsibility that the product RM-89 is in conformity with the provisions of the following Council Directive: 1999/5/EC. A copy of the Declaration of Conformity can be found from www.nokia.com/phones/declaration_of_conformity/. Nokia The crossed-out wheeled bin means that within the European Union the product must be taken to separate collection at the product end-of-life. This applies to your device but also to any enhancements marked with this symbol. Do not dispose of these products as unsorted municipal waste. Copyright © 2006 Nokia. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the prior written permission of Nokia is prohibited. Nokia, Nokia Connecting People, Xpress-on and Pop-Port are trademarks or registered trademarks of Nokia Corporation. Other product and company names mentioned herein may be trademarks or tradenames of their respective owners. Nokia tune is a sound mark of Nokia Corporation. This product includes software licensed from Symbian Software Ltd (c) 1998-2004. Symbian and Symbian OS are trademarks of Symbian Ltd. Includes RSA BSAFE cryptographic or security protocol software from RSA Security. Java and all Java-based marks are trademarks or registered trademarks of Sun Microsystems, Inc. This product is licensed under the MPEG-4 Visual Patent Portfolio License (i) for personal and noncommercial use in connection with information which has been encoded in compliance with the MPEG-4 Visual Standard by a consumer engaged in a personal and noncommercial activity and (ii) for use in connection with MPEG-4 video provided by a licensed video provider. -
PRESS RELEASE Nokia Reports Fourth Quarter 2005 Net Sales Of
PRESS RELEASE 1 (24) January 26, 2006 Nokia reports fourth quarter 2005 net sales of EUR 10.3 billion, EPS of EUR 0.25 Nokia reports 2005 net sales of EUR 34.2 billion, EPS of EUR 0.83 Device market share gains in Q4 and 2005 drive 16% annual sales growth and 20% EPS growth Nokia’s Board of Directors will propose a dividend of EUR 0.37 per share for 2005 (EUR 0.33 per share for 2004) NOKIA Q4 and 2005 EUR million Q4/2005 Q4/2004 Change 2005 2004 Change (*revised) (%) (*revised) (%) Net sales 10 333 9 456 9 34 191 29 371 16 Mobile Phones 6 217 5 871 6 20 811 18 521 12 Multimedia 2 024 1 272 59 5 981 3 676 63 Enterprise Solutions 153 295 -48 861 839 3 Networks 1 951 2 031 -4 6 557 6 431 2 Operating profit 1 368 1 450 -6 4 639 4 326 7 Mobile Phones 1 060 1 107 -4 3 598 3 786 -5 Multimedia 310 168 85 836 175 Enterprise Solutions -136 -44 -258 -210 Networks 268 306 -12 855 884 -3 Common Group Expenses -134 -87 -392 -309 Operating margin (%) 13.2 15.3 13.6 14.7 Mobile Phones (%) 17.1 18.9 17.3 20.4 Multimedia (%) 15.3 13.2 14.0 4.8 Enterprise Solutions (%) -88.9 -14.9 -30.0 -25.0 Networks (%) 13.7 15.1 13.0 13.7 Financial income and expenses 78 116 -33 322 405 -20 Profit before tax and minority interests 1 453 1 556 -7 4 971 4 705 6 Net profit 1 073 1 083 -1 3 616 3 192 13 EPS, EUR Basic 0.25 0.24 4 0.83 0.69 20 Diluted 0.25 0.24 4 0.83 0.69 20 All reported Q4 and 2005 figures can be found in the tables on pages (10-13) and (19-23) SPECIAL ITEMS Fourth quarter 2005 special items - EUR 29 million charge for Enterprise Solutions restructuring -
Sami Lönn's Homepage
CURRICULUM VITAE 13.03.2018 PERSONAL INFORMATION NAME Sami Petteri Lönn ADDRESS Lausteentie 14 25130 Muurla Finland DATE OF BIRTH 1976-06-04 PHONE NUMBER +358407296307 EMAIL [email protected] MARITAL STATUS Married and two kids HOMEPAGE http://www.samiplonn.com CORE EXPERTISE Technical / IT Core Expertise - Studied Microsoft Axure virtual machines: Microsoft Learning honor Certificate of Completion in Microsoft AZURE202x: Microsoft Azure Virtual Machines - Coding skills: Angular, AngularJS, TypeScript coding: Doing social welfare customer information system. Web: Homepage http://www.samiplonn.com/. PHP and JavaScript coding. Modified readymade Snake game engine with jQuery to get touch events work so that it can be played with phone. Other games are just ported. Also MySQL by doing warehouse inventory web app and also used graph library to show inventory amounts. http://www.samiplonn.com/warehouse.html. In current role I have used Angular. Mobile apss: Finnish TeleText application (http://www.samiplonn.com/tekstitv.mp4) (QT, C# and Android Java) Windows Phone version ended up also to Mikrobitti magazine review Autokuumetta (http://www.samiplonn.com/autokuumetta.mp4) application which searches cars from http://www.nettiauto.com, http://www.autotalli.com and http://www.auto24.ee Newtop Oy Liikelahjat (http://www.samiplonn.com/newtop.mp4) This application is shopping basket for Newtop corporation business gifts. Did close co-operation with Newtop firm and made this application to them according to their requirements. This application uses xlm data from cloud to show details of offered products. (Unfortunately, company had economy problems and application isn’t in active use anymore) Couple of others that aren’t found from store see Windows Phone and QT. -
IA XIV-2.V20.Indd 46 2/8/07 1:42:24 PM You Can Implement a Hummingbird in a Matter of Hours on the Materials in Order to Design New Applications on Any Wi-Fi Phone
LARS ERIK HOLMQUIST [email protected] E G D Mobile 2.0 E By now no one can have failed to notice the latest There are some interesting parallels between E hype: Web 2.0. Everybody is on Flickr and MySpace, Web 2.0 and Mobile 2.0. Both make use of a wide- H blogging away and running their lives through Google’s spread, standardized platform: In Web 2.0 this is the T map and calendar services. According to Web 2.0 browser; in Mobile 2.0, the mobile phone. Both take stalwart Wikipedia, the term refers to “a supposed advantage of connections between people. In Web 2.0 N second generation of Internet-based services such this means everyone on the Internet. In Mobile 2.0 the O as social-networking sites, wikis, communication value of this connectivity is determined by the mobile tools, and folksonomies that setting, shared locale, shared let people collaborate and share context, shared history, and so information online in previously on. Rather than connecting with unavailable ways.” It also implies anyone on the Net, it can be accessing services through a more useful to find someone unified, distributed interface i. who is in the same place right e., Web browsers. In fact, what now, or who was here two hours the user sees often looks just ago, or who is in a similar place like a stand-alone application, somewhere else in the world. except that it runs in a browser Finally, just as Web 2.0 services window. Figure 1. The Hummingbird was an early are aggregating, connecting, One device that often comes Mobile 2.0 device that had to be constructed massaging, and repurposing with a Web browser is the mobile from scratch. -
Detection of Smartphone Malware
Detection of Smartphone Malware Eingereicht von Diplom-Informatiker Aubrey-Derrick Schmidt Von der Fakult¨atIV { Elektrotechnik und Informatik der Technischen Universit¨atBerlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften { Dr.-Ing. { genehmigte Dissertation Promotionsausschuß: Vorsitzender: Prof. Dr. Jean-Pierre Seifert Berichter: Prof. Dr.-Ing. Sahin Albayrak Berichter: Prof. Dr. Fernando C. Colon Osorio Tag der wissenschaftlichen Aussprache: 28.06.2011 Berlin 2011 D 83 ii Acknowledgements On completion of my Ph.D. thesis I would like to sincerely thank all those who supported me in realizing and finishing my work. First of all, I am heartily thankful to my supervisors and Ph.D. Com- mittee spending time and effort on me. Prof. Dr.-Ing. Sahin Albayrak and Ph.D. Ahmet Camtepe always were a shining example for scientific success to me. Throughout all of the stages of my thesis, they helped me to keep track on the right research direction, seriously revised all of my work, and patiently discussed and resolved issues not only related to my work. I am also deeply moved by their serious and honest attitude towards academic work. Additionally, I really appreciate their will for hosting and motivating me all the time while working at DAI-Laboratory at Technische Univer- sit¨atBerlin. I want to honestly thank them for their friendly, personal, and self-sacrificing will to help me in any situation throughout my time at the DAI-Laboratory. When meeting Prof. Dr. Fernando C. Colon Osorio on Malware Conference 2009 in Montreal the first time, I was really impressed by his will to put scientific discussion into the focus of the conference. -
Pointsec Mobile Symbian OS (S60) 3.3.1 Revision and Device Tracking
Pointsec Mobile Symbian OS (S60) 3.3.1 Revision and Device Tracking Revised: October 2, 2008 This Revision and Device Tracking document contains information on changes and corrections implemented in previous versions of Pointsec Mobile Symbian OS (S60). It also contains information on devices supported in different releases Note - There may be an updated version of this document and of the other documents you received with your copy of Pointsec Mobile Symbian OS (S60). You can access the latest version at: http://www.checkpoint.com/support/ In This Document Introduction page 2 Product Version Tracking page 2 Version 3.3.0 page 2 Version 3.2.1 page 5 Version 3.2.1 page 5 Version 3.1.4 page 7 Version 3.1.3 page 8 Version 3.1.2 (Limited Release) page 9 Version 3.1.1 page 11 Version 3.1.0 page 12 Version 3.0.1 page 13 Version 3.0.0 page 14 Device Tracking page 15 Documentation Feedback page 15 Copyright © 2008 Pointsec Mobile Technologies AB, a Check Point Software Technologies company. All rights reserved 1 Introduction Introduction This document contains information on previous releases of Pointsec Mobile Symbian OS (S60) in the 3.X series. The information included here is based on the Release Notes for each release. For information on releases in the 2.X series, please see the documentation accompanying that product. As you read this document, please note the following: • The first Pointsec for Symbian OS (S60 3rd Ed.) version recorded in this document is 3.0, because this is the version in which the Symbian OS platform changed from S80 to S60.