Mobile OS - Android

Total Page:16

File Type:pdf, Size:1020Kb

Mobile OS - Android CSF645 – Mobile Computing 行動計算 Mobile OS - Android 吳俊興 國立高雄大學 資訊工程學系 Outline •Mobile Operating System •Android System Overview – Applications, Development, Platform •Android System Security – Kernel and System Level Security – Security Enhancements •Android Application Security 2 Mobile Operating Systems • OS that operates mobile devices such as smartphone, tablet, PDA, or other digital mobile devices • Combining the features of a PC OS with – Touchscreen, cellular, Bluetooth, WiFi, GPS mobile navigation, gyroscope sensor, NFC – Voice recorder, camera, video camera – Speech recognition, music player – Battery-powered • Usually without – Keyboard, mouse, CD/DVD-ROM, HDD 3 Mobile OS Milestones Before 1992 Mobile phones / PDA 1993 Apple Newton OS (Personal Digital Assistant, PDA) 1996 Palm OS 1999 Nokia S40 OS 2000 Symbian for Ericsson 2002 Windows CE (Pocket PC) 2003 BlackBerry 2005 Nokia Maemo OS on the first Internet tablet N770 Google acquired Android Inc. on August 17, 2005 2007 Apple iPhone with iOS introduced as an iPhone - mobile phone and Internet communicator 2007 Open Handset Alliance (OHA) formed by Google, HTC, Sony, Dell, Intel, Motorola, Samsung, LG, etc 2007 Microsoft Windows Mobile 6 (Derived from Windows CE) 2008 OHA releases Android 1.0 with the HTC Dream (T-Mobile G1) as the first Android phone 2010 Microsoft Windows Phone (Metro Design Language) 4 Most Common Mobile OS • Google Android – On top of Linux Kernel • Apple iOS – On top of open source Darwin core OS, derived from Mac OS X • Microsoft Windows Phone (=> Windows 10) • Nokia S40 OS and Symbian OS • BlackBerry 10 • Qualcomm Brew 5 Android System Overview • Android – Unveiled by Google along with the founding of Open Handset Alliance to advance open standards for mobile devices • Early SDK was released on 12 November 2007 – iPhone firstly announced on January 9 2007 • Google acquired Android Inc. on August 17, 2005 • The first Android-powered phone was sold in October 2008 – Designed primarily for touchscreen mobile devices such as smartphones and tablet computers, and now for a multiscreen world include wearables, TV and auto • As of 2015, Android has the largest installed base of all general-purpose operating systems – Building on open-source Linux • Android code released as open source, under the Apache License 6 Android Applications • Applications are usually developed in the Java language using the Android Software Development Kit – Native Development Kit for applications or extensions in C or C++ – Installed from a single file with the .apk file extension • Android applications run in a sandbox – An isolated area of the OS that does not have access to the rest of the system's resources, unless access permissions are granted by the user when the application is installed • However, applications routinely requesting unnecessary permissions, reducing its effectiveness • The complexity of inter-application communication implies Android may have opportunities to run unauthorized code • Two primary sources for applications – Pre-Installed Applications – User-Installed Applications • Either through a store such as Google Play or the Amazon Appstore, or by • Downloading and installing the application's APK file from a third-partysite 7 Android Development • Android consists of – A kernel based on the Linux kernel 2.6 and Linux Kernel 3.x (Android 4.0 onwards) • Does not have a native X Window System nor does it support the full set of standard GNU libraries • a power management feature called wakelocks • The flash storage is split into several partitions, such as "/system" for the operating system itself and "/data" for user data and app installations • Android device owners are not given root access – With middleware, libraries and APIs written in C and • Dalvik virtual machine with just-in-time compilation to run Dalvik dex-code (Dalvik Executable), which is usually translated from Java bytecode – Application software running on an application framework which includes Java-compatible libraries based on Apache Harmony – The main hardware platform for Android is the ARM architecture 8 Android Platform Building Blocks • Device Hardware – Including smart phones, tablets, and set-top-boxes – Processor-agnostic, but taking advantage of some hardware-specific security capabilities such as ARM v6 eXecute-Never • Android Operating System – The core operating system is built on top of the Linux kernel – All device resources, like camera functions, GPS data, Bluetooth functions, telephony functions, network connections, etc. are accessed through OS • Android Application Runtime – Most often written in Java and run in the Dalvik virtual machine – But core Android services and applications are native applications or include native libraries – Both Dalvik and native applications run within the same security environment, contained within the Application Sandbox • Applications get a dedicated part of the filesystem in which they can writeprivatedata, including databases and raw files • Android Runtime (ART) – Introduced by Android 4.4 but not enabled by default • the only runtime in Android 5.0 – Uses ahead-of-time (AOT) compilation to entirely compile the application bytecode into machine code upon the installation of an application 9 Architecture Diagram 10 Android Application Framework Toolkit for applications in Java • Activity Manager: manages the activity life cycle – Started, Running, Background, Killed • Windows Manager: performs window management • View System: handles the views and layouts of UI • Content Providers: allows one application to make its data available to another • Notification Manager: alerts the user about events • Package Manager: maintains information on the available applications on the device • Telephony Manager: provides access to telephony services • Resource Manager: manages the storing of strings and layout files and bitmaps • Location Manager: finds the device’s geographic location • XMPP Service: supports IETF Extensible Messaging and Presence Protocol (adopted by GoogleTalk) 11 Main Android Application Building Blocks • AndroidManifest.xml: the control file that – Tells the system what to do with all the top-level components in an application • specifically activities, services, broadcast receivers, and content providers – Also specifies which permissions are required • Activities: An Activity is the code for a single, user- focused task – Usually includes displaying a UI to the user • some Activities never display UIs – Typically, one of the application's Activities is the entry point to an application 12 Main Android Application Building Blocks (cont.) • Services: A Service is a body of code that runs in the background – It can run in its own process, or in the context of another application's process – Other components "bind" to a Service and invoke methods on it via remote procedure calls – An example of a Service is a media player • even when the user quits the media-selection UI, the user probably still intends for music to keep playing • A Service keeps the music going even when the UI has completed • Broadcast Receiver – A BroadcastReceiver is an object that is instantiated when an IPC mechanism known as an Intent is issued by the operating system or another application – For example, an application may register a receiver for the low battery message and change its behavior based on that information 13 Android Versions Version Release date API level 5.1.x March 9, 2015 22 Lollipop 5.0.x November 3, 2014 21 4.4.x KitKat October 31, 2013 19-20 4.3.x July 24, 2013 18 4.2.xJelly Bean November 13, 2012 17 4.1.x July 9, 2012 16 4.0.x Ice Cream Sandwich October 19, 2011 14-15 3.x.x Honeycomb February 22, 2011 11-13 2.3.x Gingerbread December 6, 2010 9-10 2.2 Froyo May 20, 2010 8 2.0, 2.1 Éclair October 26, 2009 7 1.6 Donut September 15, 2009 4 1.5 Cupcake April 30, 2009 3 14 Android Security Overview • Security objectives – Protect user data – Protect system resources (including the network) – Provide application isolation • Key security features – Linux security • Secure interprocess communication – Mandatory application sandbox for all applications • Exception of a small amount of Android OS code running as root, all code above the Linux Kernel is restricted by the Application Sandbox – Application signing – Application-defined and user-granted permissions 15 Kernel and System Level Security • Linux fundamental security features – Prevents user A from reading user B's files – Ensures that user A does not exhaust user B's memory – Ensures that user A does not exhaust user B's CPU resources – Ensures that user A does not exhaust user B's devices (e.g. telephony, GPS, bluetooth) • Android security features – A user-based permissions model – Process isolation – Extensible mechanism for secure IPC – The ability to remove unnecessary and potentially insecure parts of the kernel 16 Android Security Enhancements • Application Sandbox • System Partition and Safe Mode • Filesystem Permissions • Filesystem Encryption • Device Administration • Password Protection • Memory Management Security Enhancements 17 Application Sandbox • Assign a unique user ID (UID) to each Android application – runs it as that user in a separate process • A kernel-level Application Sandbox – The kernel enforces security between applications and the system at the process level through standard Linux facilities, such as user and group IDs that are assigned to applications – By default, applications cannot interact with each other and applications have limited
Recommended publications
  • A Survey Onmobile Operating System and Mobile Networks
    A SURVEY ONMOBILE OPERATING SYSTEM AND MOBILE NETWORKS Vignesh Kumar K1, Nagarajan R2 (1Departmen of Computer Science, PhD Research Scholar, Sri Ramakrishna College of Arts And Science, India) (2Department of Computer Science, Assistant Professor, Sri Ramakrishna College Of Arts And Science, India) ABSTRACT The use of smartphones is growing at an unprecedented rate and is projected to soon passlaptops as consumers’ mobile platform of choice. The proliferation of these devices hascreated new opportunities for mobile researchers; however, when faced with hundreds ofdevices across nearly a dozen development platforms, selecting the ideal platform is often met with unanswered questions. This paper considers desirable characteristics of mobileplatforms necessary for mobile networks research. Key words:smart phones,platforms, mobile networks,mobileplatforms. I.INTRODUCTION In a mobile network, position of MNs has been changing due todynamic nature. The dynamic movements of MNs are tracked regularlyby MM. To meet the QoS in mobile networks, the various issuesconsidered such as MM, handoff methods, call dropping, call blockingmethods, network throughput, routing overhead and PDR are discussed. In this paper I analyse the five most popular smartphone platforms: Android (Linux), BlackBerry, IPhone, Symbian, and Windows Mobile. Each has its own set of strengths and weaknesses; some platforms trade off security for openness, code portability for stability, and limit APIs for robustness. This analysis focuses on the APIs that platforms expose to applications; however in practice, smartphones are manufactured with different physical functionality. Therefore certain platform APIs may not be available on all smartphones. II.MOBILITY MANAGEMENT IP mobility management protocols proposed by Alnasouri et al (2007), Dell'Uomo and Scarrone (2002) and He and Cheng (2011) are compared in terms of handoff latency and packet loss during HM.
    [Show full text]
  • August 22, 2015
    Dan Brody From: [email protected] Subject: E-Bulletin - Aug 22, 2015 - W Newton Tree Walk Sunday! Newton Conservators E-Bulletin Saturday, August 22, 2015 ... Newton's land trust working to preserve open space since 1961 Great Old Trees of West Newton Hill Historic Newton Walk Series Sunday, August 23, 2015, 2pm Peirce School Playground (Temple and Berkeley Streets) 1 Listen to the stories trees tell about Newton's development as you walk through the city, lead by two experts on a Sunday August afternoon. Newton has many beautiful old trees, and they can tell the story of the city’s development just as well as its buildings. Marc Welch, Director of Urban Forestry for the City of Newton, and Beth Wilkinson, local resident, member of the Newton Tree Conservancy, and President of the Newton Conservators, will lead us through the history of one of Newton’s many leafy neighborhoods, drawing out the stories of the place through its historic trees. Meet at the Peirce School Playground, corner of Temple and Berkeley Streets, Newton 02465. Free; $10 donation suggested. For questions, please call Historic Newton at 617.796.1450 or 617.641.9142 r, visit http://www.historicnewton.org. Sunday, September 13 (Rain Date: Sunday October 4) Tour de Newton 2 Bicycle Tour of 13 Villages of Newton Postponed from June 21 Thirteen villages - one community! The annual Tour de Newton is a great event for kids, adults, and casual bicyclists. The ride starts simultaneously in all 13 villages. You’ll be riding with your village neighbors and have a trained leader/sweep to guide you.
    [Show full text]
  • Email Download App for Pc Set up Email in the Mail App for Windows 10
    email download app for pc Set up email in the Mail app for Windows 10. If you log on to Windows 10 using a Microsoft account with an Outlook.com, Live, Hotmail, or MSN address, that account is added to the Mail and Calendar apps. You can add that and many other email accounts to the Mail and Calendar apps to start sending and receiving email and creating and managing events. Seeing a message that your account is out of date? You probably need to update your account settings. See Fixing an out-of-date account for more information. Did you set up your email, but you don't see your messages? Change your mailbox sync settings. Add a new email account. Open the Mail app by clicking the Windows Start menu and choosing Mail . If this is the first time you've opened the Mail app, you’ll see a Welcome page. Select Add account to get started. If you've used the Mail app before, at the bottom of the left navigation pane, select Settings , and then choose Manage Accounts . Note: On a phone or tablet, tap the three dots at the bottom of the page to access Settings . Select Add account . Choose the type of the account you want to add. You may need to scroll down the Add an account dialog box to view all options. If you choose Google , you’ll need to sign in to your Google account, enter your 2-step verification code if you’ve enabled that security feature, and give Windows permission to access your information.
    [Show full text]
  • Senior Services Resource Directory” As Just One of Our Mission-Driven Initiatives
    SENIOR SERVICES RESOURCE DIRECTORY County of Sussex Department of Health and Human Services DIVISION OF SENIOR SERVICES One Spring Street, 2nd Floor Newton, NJ 07860 973-579-0555 www.sussex.nj.us/seniorservices SUSSEX COUNTY BOARD OF CHOSEN FREEHOLDERS Herbert Yardley, Director Sylvia Petillo, Deputy Director George F. Graham Dawn Fantasia Joshua L. Hertzberg SUSSEX COUNTY ADMINISTRATOR Gregory V. Poff II ADMINISTRATOR, DEPARTMENT OF HEALTH AND HUMAN SERVICES Carol R. Novrit DIRECTOR, DIVISION OF SENIOR SERVICES Lorraine Hentz 2 County of Sussex Department of Health and Human Services DIVISION OF SENIOR SERVICES OUR MISSION The mission of the Sussex County Division of Senior Services is to empower older individuals, those 18 and older who are disabled, and/or their caregivers to choose from a coordinated system of services that enable seniors to live as independently as possible in their homes and in their communities while enjoying a dignified quality of life. RESOURCE DIRECTORY FOR THE ELDERLY AND THEIR CAREGIVERS We are pleased to provide this comprehensive “Senior Services Resource Directory” as just one of our mission-driven initiatives. This guide includes the most current information regarding a wealth of resources and support services available to seniors and their caregivers. This directory is also available at our web-site: www.sussex.nj.us/seniorservices Those who are 60+ years of age may be eligible for a variety of these services that are funded by federal, state and county funds as well as private foundations and charities. Many services coordinated by the Sussex County Division of Senior Services are funded through Title III of the Older Americans Act.
    [Show full text]
  • Highlights for Summer
    Table of CoNTents notes Class Categories Art & Photography ................................................4 Business & Career .................................................6 I’m Lisa, and I run the NCE Kids program. How I came to Computers & Technology .....................................7 work here is a story of serendipity: it was ten years ago, and my son Ethan was in 2nd grade. Having always sought just-right Crafts ....................................................................9 enrichment opportunities for my kids, I was delighted to find Dance & Fitness ..................................................11 Mad Science, perfect for my young science buff, offered at our English Language Learners (ELL) ........................13 very own Williams School—I enrolled Ethan right away. But Finance & Real Estate ..........................................13 Patty from the NCE office called a week before the start of this class to tell me it had been cancelled due to low enrollment. Food & Drink .......................................................14 “How could this be?” I protested, “Can’t I have a chance to HiSET™ (formerly GED®) .....................................16 recruit?” When Patty pleaded my case to Mad Science and granted me a two-day Home & Garden ...................................................16 extension, I got to work. In less than 24 hours, that class was full with 18 kids. The Languages ..........................................................17 truth is that Williams School had a tight group of playground
    [Show full text]
  • Intel Celeron Vs. Arm
    COMPARING CHROMEBOOKS FOR CONSUMERS: INTEL CELERON VS. ARM If you’ve decided to get a Chromebook, it may not be immediately clear which model is right for you. Do you often switch back and forth from playing games to watching videos to chatting with friends in a Google Hangouts call? Do you want to spend less time opening and loading Web sites? Do you worry about battery life? In our hands-on testing at Principled Technologies, we looked at an Intel Celeron processor-powered Chromebook and an ARM processor-based Chromebook. We put these two systems through consumer scenarios that included everyday tasks such as opening a Web site, watching a video, and chatting with a friend in a Google Hangouts call. We looked at different aspects of user experience—measuring frame rate, time to complete tasks, and battery life. Which Chromebook is the better choice? We found that the Intel Celeron processor-powered Chromebook outperformed the ARM processor-based Chromebook, taking less time to complete tasks in four scenarios while lasting 34 minutes longer in our battery life test. The Intel Celeron processor-powered Chromebook also delivered more frames per second in a number of use cases, including playing a game, watching a video, working in BioDigital Human, and chatting in a Google Hangouts call. The Intel Celeron processor-powered Chromebook can deliver a better user experience by providing better performance without sacrificing battery life. SEPTEMBER 2014 A PRINCIPLED TECHNOLOGIES TEST REPORT Commissioned by Intel Corp. MAKING THE RIGHT CHROMEBOOK CHOICE To help with choosing the right Chromebook, we looked at one with an Intel Celeron processor and one with the latest ARM processor.
    [Show full text]
  • IT Management Checklist
    IT Management Checklist About FileWave Since 1992, FileWave has provided business, education, and government customers with industry-leading unified endpoint management software to effectively secure and manage the complete life-cycle of devices, applications, and content from one easy-to-use console. With offices throughout the USA, Europe, and Asia, FileWave provides worldwide support, when you need it. Key Components (All-Inclusive) Multi-Platform Management Device Discovery, Geo-Location & Security macOS, iOS, Windows, Chrome OS & Android Discover, locate and protect devices Windows & macOS Imaging Asset Management Zero-touch, direct, network & layered models Complete life-cycle visibility to all assets. Software/Application Deployment (deploying, operating, maintaining, upgrading & disposal) Filesets, MSI, PKG, EXE, plist, scripts & more License & Content Management Patch Management License, application, & usage reporting Windows, macOS, iOS & 3rd party Self-Healing/Auto-Resume Technology (Java, Flash, MS Office, CS, etc.) Auto-repair broken installations & resume interrupted Self-Service Kiosk/Portal deployments On-Demand - empower users & reduce support Scalable & Flexible Infrastructure calls On-premise, hosted, & distribution point layout Regional References Baldwin County Public Schools - AL Mooresville Graded School District - NC Managing 50K+ macOS, iOS, WinOS & Chrome OS Managing 15K+ macOS, Windows, & iOS Iredell-Statesville Schools - NC Lincoln Public Schools - NE Managing 30K+ macOS, Windows, & iOS Managing 50K+ Chrome
    [Show full text]
  • Technology Plan July 1, 2017-June 30, 2020 Working Draft March, 2017 (10/16/18)
    GREENFIELD PUBLIC SCHOOLS Technology Plan July 1, 2017-June 30, 2020 Working Draft March, 2017 (10/16/18) Superintendent of Schools Jordana Harper Greenfield School Committee Adrienne Nunez, Chair Cameron Ward, Vice Chair Don Alexander, Secretary Mayor William Martin Susan Hollins Katie Caron Susan Eckstrom Technology Contact Person Carol S. Holzberg, PhD, CETL Director of Technology Email: [email protected] 413.772.1322 (Direct) 413.774.7940 (fax) Greenfield Public Schools 195 Federal Street, Suite 100 Greenfield, MA 01301 413.772.1300 District Web Site: www.gpsk12.org Table of Contents BACKGROUND INFORMATION ............................................................................................................ 1 COMMUNITY ............................................................................................................................................... 1 CITY OF GREENFIELD POPULATION ............................................................................................................ 1 GREENFIELD PUBLIC SCHOOLS: RACE, ETHNICITY AND ENROLLMENT DATA ................ 2 ELEMENTARY SCHOOLS (3) ........................................................................................................................ 2 MIDDLE SCHOOL (1) ................................................................................................................................... 2 HIGH SCHOOL (1) ....................................................................................................................................... 3
    [Show full text]
  • Resource List
    Exhibit “ N “ RESOURCE LIST The Commission is prohibited, under RCW 42.17.260(7), from providing lists of applicants for commercial purposes. We read this statute as constraining us from making available the names, addresses, and phone numbers of applicants who have received Credit Reservation Contracts to those parties who could provide services necessary for the viability of the projects, such as lenders, lawyers, and accountants. We are pursuing an alternative approach of supplying to the applicant’s lists of practitioners in various fields: accountants, attorneys, consultants, lenders, property managers, and syndicators. We hope that the resource list will facilitate applicants in obtaining the advice and resources to produce a successful project. We have assembled this list with two cautions. First, the list is not exhaustive. We contacted practitioners that we were aware were active in providing services to tax credit projects, and were approached by others to be included on a resource list. There are likely others available that we are not aware of or that we may have overlooked. Second, the Commission does not endorse any of the companies or individuals on the attached lists, and has not verified that the comments provided by those on the list are accurate. We have merely compiled the list. You should use your own judgment in selecting any of the parties listed to assist in your project. We update the resource list periodically. Anyone wishing to be added to the list should contact the Tax Credit Division at (206) 464-7139 or email us at [email protected] for a copy of the resource information form.
    [Show full text]
  • IT Department User Survey Report
    IT Department User Survey Report Introduction The CERN computing user community is very heterogeneous consisting of people having varying backgrounds and working environments. There are over 30000 external and internal computer users at CERN belonging to over 15 departments and these user have different work habits and methods of working. In addition, user preferences are very strong in terms of hardware and software, which makes it impossible to propose closed solutions for services delivery. The IT-CDA group is concerned with the way users collaborate, their devices and their software applications and so it is important for the group to have a better understanding of the user community and their traits. The results listed in this document can be used as a reference to help IT-CDA members to improve on their services. Objective The project aims at understanding the user community better and to do this data was collected in order to evaluate: • The use cases of the CERN computer users. • User working preferences. • Why people make their computing choices. • The software people are using. • Which public IT supported services are preferred. • Which other services people prefer using instead of central IT services. Project Exclusions The project is not intended as an exercise of evaluating new tools or for recommending any particular hardware or software. On top of this it was not the aim to do any requirements gathering or to gather data relating to user satisfaction. Project audience Data was collected from all CERN computer users including external users. All departments and experiments were invited to take part.
    [Show full text]
  • Tools to Simplify Mobile Application Development
    E-Book APPLICATION DEVELOPMENT 101 June 2016 TOOLS TO SIMPLIFY MOBILE APPLICATION DEVELOPMENT With a slew of tools to build, streamline, transform and refactor applications on the market, companies should have no trouble finding ways to ease developers’ struggles. BY ROBERT SHELDON D Integrated Development Environments D Mobile Application Development Platforms Mobile Application D Mobile Backend Development D as a Service Frameworks D Application Refactoring APPLICATION DEVELOPMENT 101 Home Integrated Development Environments Mobile Application Development Frameworks Mobile Application Development Platforms T CAN BE a lot of work to develop mo- apps. Yet choosing which tools are right for an organization Mobile Backend bile applications, especially because and the developers that use them can be a daunting task. as a Service companies must support multiple Before the search begins, IT decision makers should operating systems and device types. know what device types and operating systems the applica- Application Refactoring Nothing can help ease the load more tions will target. Will they run on both Google Android and than having the right development tools. Yet these tools Apple iOS phones? What about tablets? Or even smart- come in an assortment of shapes and sizes, so it isn’t easy to watches? And don’t forget Windows and BlackBerry devices. choose the right ones. Companies should also determine the types of apps they There are many development tools at IT’s disposal, from want to deliver. Native apps provide the best user experi- Iintegrated development environments (IDEs) to products ence, but generally take more time and resources to de- and services for refactoring applications.
    [Show full text]
  • 2018 Kyste Conference Sessions
    2018 KySTE Conference Sessions Wednesday, March 7, 2018 -- 08:30 AM Wednesday, March 7, 2018 -- 08:30 AM Archibald CIO Summit David Couch Nunn Empathize, Imagine, Create, Evaluate, Repeat: Your Guide to 3D Printing Heidi Neltner, Andrew Martin In this hands on workshop participants will learn the basic process needed to develop lessons that use Design Thinking for 3D printing. Through the process, participants will use digital tools, measurement tools, and Tinkercad to create a design with feedback & will learn the process to create G-Code so that they can 3D print the object. Participants must have a device that works with Tinkercad. Wednesday, March 7, 2018 -- 09:30 AM Breathitt New Computer Science Resources from Google Keith Barnes Google has a lot of new resources to help teach Computer Science. Come and hear about these new resources and the Digitial Literacy Curriculum Brown Managing Windows, MacOS, iOS, Android, & ChromeOS with FileWave Ashlee Jamison, Michael Hughes FileWave's all-inclusive, highly scalable software solves the many challenges of managing a diverse and growing population of users, devices, and content by ensuring IT teams have a comprehensive solution that supports both client (desktop/laptop) and mobile devices across Windows, Mac, iOS, Android, and ChromeOS Carroll Ford OneNote Class Notebook Heather Daniel From Lesson Design to Professional Development, teachers will discover and experience the power that OneNote, Learning Tools, and Class Notebook tools can provide for classrooms. OneNote allows you to not only organize this information, but share it as well. Collaboration becomes an any time, any place activity with a shared OneNote Notebook.
    [Show full text]