Symbian C++ Application Programming Overview
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Mobile Platform Security Architectures: Software
Lecture 3 MOBILE SOFTWARE PLATFORM SECURITY You will be learning: . General model for mobile platform security Key security techniques and general architecture . Comparison of four systems Android, iOS, MeeGo (MSSF), Symbian 2 Mobile platforms revisited . Android ~2007 . Java ME ~2001 “feature phones”: 3 billion devices! Not in smartphone platforms . Symbian ~2004 First “smartphone” OS 3 Mobile platforms revisited . iOS ~2007 iP* devices; BSD-based . MeeGo ~2010 Linux-based MSSF (security architecture) . Windows Phone ~2010 . ... 4 Symbian . First widely deployed smartphone OS EPOC OS for Psion devices (1990s) . Microkernel architecture: OS components as user space services Accessed via Inter-process communication (IPC) 5 Symbian Platform Security . Introduced in ~2004 . Apps distributed via Nokia Store Sideloading supported . Permissions are called ‘capabilities’, fixed set (21) 4 Groups: User, System, Restricted, Manufacturer 6 Symbian Platform Security . Applications identified by: UID from protected range, based on trusted code signature Or UID picked by developer from unprotected range Optionally, vendor ID (VID), based on trusted code signature 7 Apple iOS . Native application development in Objective C Web applications on Webkit . Based on Darwin + TrustedBSD kernel extension TrustedBSD implements Mandatory Access Control Darwin also used in Mac OS X 8 iOS Platform Security . Apps distributed via iTunes App Store . One centralized signature authority Apple software vs. third party software . Runtime protection All third-party software sandboxed with same profile Permissions: ”entitlements” (post iOS 6) Contextual permission prompts: e.g. location 9 MeeGo . Linux-based open source OS, Intel, Nokia, Linux Foundation Evolved from Maemo and Moblin . Application development in Qt/C++ . Partially buried, but lives on Linux Foundation shifted to HTML5- based Tizen MeeGo -> Mer -> Jolla’s Sailfish OS 10 MeeGo Platform Security . -
Tracking of Mental Workload with a Mobile EEG Sensor
sensors Article Tracking of Mental Workload with a Mobile EEG Sensor Ekaterina Kutafina 1,2,* , Anne Heiligers 3, Radomir Popovic 1 , Alexander Brenner 4, Bernd Hankammer 1, Stephan M. Jonas 5, Klaus Mathiak 3 and Jana Zweerings 3 1 Institute of Medical Informatics, Medical Faculty, RWTH Aachen University, 52074 Aachen, Germany; [email protected] (R.P.); [email protected] (B.H.) 2 Faculty of Applied Mathematics, AGH University of Science and Technology, 30-059 Krakow, Poland 3 Department of Psychiatry, Psychotherapy and Psychosomatics, School of Medicine, RWTH Aachen University, 52074 Aachen, Germany; [email protected] (A.H.); [email protected] (K.M.); [email protected] (J.Z.) 4 Institute of Medical Informatics, University of Münster, 48149 Münster, Germany; [email protected] 5 Department of Informatics, Technical University of Munich, 85748 Garching, Germany; [email protected] * Correspondence: ekutafi[email protected] Abstract: The aim of the present investigation was to assess if a mobile electroencephalography (EEG) setup can be used to track mental workload, which is an important aspect of learning performance and motivation and may thus represent a valuable source of information in the evaluation of cognitive training approaches. Twenty five healthy subjects performed a three-level N-back test using a fully mobile setup including tablet-based presentation of the task and EEG data collection with a self- mounted mobile EEG device at two assessment time points. A two-fold analysis approach was chosen including a standard analysis of variance and an artificial neural network to distinguish the levels of cognitive load. -
A Comparative Analysis of Mobile Operating Systems Rina
International Journal of Computer Sciences and Engineering Open Access Research Paper Vol.-6, Issue-12, Dec 2018 E-ISSN: 2347-2693 A Comparative Analysis of mobile Operating Systems Rina Dept of IT, GGDSD College, Chandigarh ,India *Corresponding Author: [email protected] Available online at: www.ijcseonline.org Accepted: 09/Dec/2018, Published: 31/Dec/2018 Abstract: The paper is based on the review of several research studies carried out on different mobile operating systems. A mobile operating system (or mobile OS) is an operating system for phones, tablets, smart watches, or other mobile devices which acts as an interface between users and mobiles. The use of mobile devices in our life is ever increasing. Nowadays everyone is using mobile phones from a lay man to businessmen to fulfill their basic requirements of life. We cannot even imagine our life without mobile phones. Therefore, it becomes very difficult for the mobile industries to provide best features and easy to use interface to its customer. Due to rapid advancement of the technology, the mobile industry is also continuously growing. The paper attempts to give a comparative study of operating systems used in mobile phones on the basis of their features, user interface and many more factors. Keywords: Mobile Operating system, iOS, Android, Smartphone, Windows. I. INTRUDUCTION concludes research work with future use of mobile technology. Mobile operating system is the interface between user and mobile phones to communicate and it provides many more II. HISTORY features which is essential to run mobile devices. It manages all the resources to be used in an efficient way and provides The term smart phone was first described by the company a user friendly interface to the users. -
1 Smartphones and Symbian OS
1 Smartphones and Symbian OS Symbian OS is a full-featured, open, mobile operating system that powers many of today’s smartphones. As these smartphones become more pow- erful and popular, the demand for smartphone software has grown. Symbian smartphones are shipped with a variety of useful pre-loaded and targeted applications, which are selected by each phone’s manu- facturer. Today, the average Symbian smartphone ships with over 30 pieces of third-party software pre-installed. However, the exciting aspect of Symbian smartphones is that they are ‘open’, meaning that users can further customize their phone experience by downloading, installing, and uninstalling applications written by third-party developers (or by the users themselves). Users can download applications from a PC to the smartphone through a link such as USB, or Bluetooth technology, or over-the-air via the Internet. With the largest installed base of smartphones worldwide, Symbian OS offers a great opportunity for software developers to establish them- selves in the mobile market by creating novel and exciting software for the growing mass of smartphone users around the world. There is a growing list of Symbian applications available as freeware or as paid downloads on numerous Internet sites (http://www.handango.com and http://www.epocware.com are good examples). They range from pro- ductivity, entertainment, navigation, multimedia, and communications software to programs that can count fast food calories, improve your golfCOPYRIGHTED swing, keep diaries, and calculate MATERIAL foreign currency exchange. And business opportunities aside, sometimes it’s just plain fun writing your own code to run on your own smartphone. -
Nokia 9500 Communicator
® www.protectstar.com Nokia 9500 Communicator ® ® INTRODUCTION: The Nokia 9500 Communicator provides fast and convenient Internet access via wireless LAN at data transfer rates of up to 11 MBit/s. You can work on presentations or text documents in comfort while you are on the move using the integrated office applications, while accessing data on your company network—such as databases— using wireless LAN or fast mobile telephone connectivity. The Nokia 9500 Communicator has 80 MB in internal memory and an the system known at the time of the testing procedure—operating MMC memory card slot for storing more data. system, applications, CGI abuses, useless services, backdoors, se- curity checks and so on. In addition, we used eEye Digital Security’s Source: www.nokia.de Common Hacker Attack Methods (CHAM®), an artificial intelligence SECURITY technology designed to unearth unknown and concealed weaknes- We have subjected the Nokia 9500 Communicator to a series of tests ses in the system by simulating the thought processes of a hacker. under both laboratory and real-life conditions. We can confirm that the device offers almost complete security protection. In carrying out In order to check wireless connectivity (WiFi, IEEE 802.1b), we used the security tests described below, we used a specially configured specifically developed wireless weak-point scanners to analyse WLAN router (ZyXEL ZyAIR G-2000) and several computer systems security techniques such as WEP (wired equivalent privacy) and operating under Windows XP and Linux that were connected WPA (WiFi protected access) and their encryption functions. We together to the Internet and intranet through the router. -
Preparation of Papers in 2-Column Format
INTEGRATION OF LINUX COMMUNICATION STACKS INTO EMBEDDED OPERATING SYSTEMS Jer-Wei Chuangξ, Kim-Seng Sewξ, Mei-Ling Chiang+, and Ruei-Chuan Changξ Department of Information Management+ National Chi-Nan University, Puli, Taiwan, R.O.C. Email: [email protected] Department of Computer and Information Scienceξ National Chiao-Tung University, Hsinchu, Taiwan, R.O.C. Email: [email protected], [email protected] Thus, various operating systems design dedicated for embedded systems are thus created, such as PalmOS ABSTRACT [22], EPOC [12], Windows CE [25], GEOS [16], As the explosion of Internet, Internet connectivity is QNX [23], Pebble [2,17], MicroC/OS [21], eCos [11], required for versatile computing systems. TCP/IP LyraOS [3-7,18,19,26], etc. protocol is the core technology for this connectivity. As the explosion of Internet, adding Internet However, to implement TCP/IP protocol stacks for a connectivity is required for embedded systems. target operating system from the scratch is a TCP/IP protocol [8,9,24] is the core technology for time-consuming and error-prone task. Because of the this connectivity. However, to implement the TCP/IP spirit of GNU GPL and open source codes, Linux protocol stacks for a target operating system from the gains its popularity and has the advantages of stability, scratch is a time-consuming and error-prone task. reliability, high performance, and well documentation. Because of the spirit of GNU General Public License These advantages let making use of the existing open (GPL) [15] and open source codes, Linux [1] gains its source codes and integrating Linux TCP/IP protocol popularity and has the advantages of stability, reli- stacks into a target operating system become a ability, high performance, and well documentation. -
PRESS RELEASE Nokia Reports Fourth Quarter 2005 Net Sales Of
PRESS RELEASE 1 (24) January 26, 2006 Nokia reports fourth quarter 2005 net sales of EUR 10.3 billion, EPS of EUR 0.25 Nokia reports 2005 net sales of EUR 34.2 billion, EPS of EUR 0.83 Device market share gains in Q4 and 2005 drive 16% annual sales growth and 20% EPS growth Nokia’s Board of Directors will propose a dividend of EUR 0.37 per share for 2005 (EUR 0.33 per share for 2004) NOKIA Q4 and 2005 EUR million Q4/2005 Q4/2004 Change 2005 2004 Change (*revised) (%) (*revised) (%) Net sales 10 333 9 456 9 34 191 29 371 16 Mobile Phones 6 217 5 871 6 20 811 18 521 12 Multimedia 2 024 1 272 59 5 981 3 676 63 Enterprise Solutions 153 295 -48 861 839 3 Networks 1 951 2 031 -4 6 557 6 431 2 Operating profit 1 368 1 450 -6 4 639 4 326 7 Mobile Phones 1 060 1 107 -4 3 598 3 786 -5 Multimedia 310 168 85 836 175 Enterprise Solutions -136 -44 -258 -210 Networks 268 306 -12 855 884 -3 Common Group Expenses -134 -87 -392 -309 Operating margin (%) 13.2 15.3 13.6 14.7 Mobile Phones (%) 17.1 18.9 17.3 20.4 Multimedia (%) 15.3 13.2 14.0 4.8 Enterprise Solutions (%) -88.9 -14.9 -30.0 -25.0 Networks (%) 13.7 15.1 13.0 13.7 Financial income and expenses 78 116 -33 322 405 -20 Profit before tax and minority interests 1 453 1 556 -7 4 971 4 705 6 Net profit 1 073 1 083 -1 3 616 3 192 13 EPS, EUR Basic 0.25 0.24 4 0.83 0.69 20 Diluted 0.25 0.24 4 0.83 0.69 20 All reported Q4 and 2005 figures can be found in the tables on pages (10-13) and (19-23) SPECIAL ITEMS Fourth quarter 2005 special items - EUR 29 million charge for Enterprise Solutions restructuring -
Mobile OS: Analysis of Customers’ Values
Mobile OS: analysis of customers’ values Georgii Shamugiia Bachelor's Thesis Business Administration 2020 Mobile OS 01.11.2020 Author(s) Georgii Shamugiia Degree programme Bachelor of Business Administration SAMPO18 Report/thesis title Number of pages Mobile OS: analysis of customer's values and appendix pages 14 + 47 The rapid development of the mobile industry since the start of new millennium led to much more extensive usage of mobile devices than desktop computers. Fast-developing technol- ogies of wireless networking led to the excessive need of a device, which can search any info on the web conveniently, be a decent communicational tool and be able to adapt to dif- ferent needs of customers. The device which fully fulfils this need is a smartphone, which is being widely used today by the majority of the global population. In this thesis, the author digests the tools, which allows smartphones to work appropriately, give consumers a pleasuring experience while using them and run all the operations and data stored on them. These tools are mobile op- erating systems – platforms, which allow all those things and even more. In this research, the author investigates the historical development of mobile operating systems, which put a mark in the history of the industry. By digesting three cases of Nokia, Blackberry and Mi- crosoft, the author explains what were the selling points, that succeeded and managed to popularise each mobile operating system globally among consumers and gadget manufac- turers and what were the reasons that caused their global downfall. A separate chapter of this research is dedicated to a survey regarding customer values and customer opinions about mobile devices and mobile operating systems. -
Symbian Phone Security
Symbian phone Security Job de Haas ITSX Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Overview • Symbian OS. • Security Risks and Features. • Taking it apart. • Conclusions. Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian History • Psion owner of EPOC OS, originally from 1989, released EPOC32 in 1996 • EPOC32 was designed with OO in C++ • 1998: Symbian Ltd. formed by Ericsson, Nokia, Motorola and Psion. • EPOC renamed to Symbian OS • Currently ~30 phones with Symbian and 15 licensees. Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian Organization • Symbian licenses the main OS • Two GUI’s on top of Symbian: – Series 60, led by Nokia – UIQ, subsidiary of Symbian • Ownership: – Nokia 47.5% Panasonic 10.5% – Ericsson 15.6% Siemens 8.4% – SonyEricsson 13.1% Samsung 4.5% Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian Versions • EPOC32 • EPOC R5 • Symbian v6.0 • Symbian v7.0 • Symbian v8.0 • Symbian v9.0 announced for Q3 ‘05 Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Series60 versions • 1st edition • 2nd edition • 3rd edition, announced feb. 2005 Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 UIQ versions • UIQ 1.0 • UIQ 2.1 • UIQ 3.0 released feb 2005 Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian OS Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian OS • Multitasking, preemptive kernel. • MMU protection of kernel and process spaces. • Strong Client – Server architecture • Plug-in patterns • Filesystem in ROM, Flash, RAM and on SD-card Symbian phone Job de Haas BlackHat Security ITSX BV Amsterdam 2005 Symbian development • Symbian v6 and v7 are compiled with a modified GCC. -
Introduction to Symbian OS
Fundamentals of Symbian OS Introduction to Symbian OS Introduction Part 1a Copyright © 2001-2007 Symbian Software Ltd. Fundamentals of Symbian OS Introduction Introduction This lecture serves as general introduction to the course • The background of Symbian the company • Symbian OS C++ dialect • The architecture of Symbian OS • What is covered in the course • Resources 2 Copyright © 2001-2007 Symbian Software Ltd. Fundamentals of Symbian OS Introduction Background 3 Copyright © 2001-2007 Symbian Software Ltd. Fundamentals of Symbian OS Introduction Before Symbian - Psion Psion was established in 1980 • To develop games and software for the Z80-based Sinclair ZX81 and ZX Spectrum Products included • Flight simulator, “Horace Goes Skiing”, Psion Chess, Space Raiders and other games. • Psion Chess for the ZX81 took 1K memory • Office suite for the Sinclair QL (1983) 4 Copyright © 2001-2007 Symbian Software Ltd. Fundamentals of Symbian OS Introduction Before Symbian - Psion Mid ‘80s - Hardware • The 6301 based 8-bit Organiser (1984) - 14cm x 9cm, 2K RAM, 4K ROM, 8K datapak, 6 months battery life! • Organiser II (1986) - the world’s first proper PDA • Organiser II variants were created: up to 64K memory, 4 line screen resolution, add-on hardware • Half a million sold over a decade 5 Copyright © 2001-2007 Symbian Software Ltd. Fundamentals of Symbian OS Introduction Before Symbian - Psion 1989 - MC400 laptop • 16-bit “EPOC” Operating System - multi tasking, GUI, built-in apps • Exceptional power management, screen technology 1991 - Series 3, 1993 - Series 3a, 1996 Series 3c/Siena, Series 3mx • Clam shell organisers, built in apps, OPL, up to 2MB memory • Built on EPOC • Over 1.5 million units sold 1997 - Series 5 • 32 bit OS “EPOC32” (EPOC -> EPOC16 -> SIBO) • Slide out QWERTY keyboard, touch screen, 4MB/8MB • Implemented using C++ http://3lib.ukonline.co.uk/historyofpsion.htm 6 Copyright © 2001-2007 Symbian Software Ltd. -
Personal Digital Assistants: Which One Is Right for Your Practice?
Vol. 01, No. 12 / December 2002 Personal digital assistants: Which one is right for your practice? PDAs come in many models and offer a range of features and extras. Here’s help sorting through the options. John Luo, MD Assistant clinical professor and director of psychiatric informatics Department of psychiatry University of California-Davis, Sacramento Personal digital assistants (PDAs) are becoming more commonplace in practice because they immediately provide critical information at the point of care. If you’re in the market for a handheld computer, chances are you’re fazed by the multitude of available models, upgrades, and extras. Choosing a PDA is not that difficult, however, if you take the time to assess your needs and do a little homework. Start by answering these four questions: 1. Why do I need a PDA? Look at your work patterns and see how a PDA would fit in. Do you frequently look up DSM-IV criteria and other reference information? Are you constantly writing prescriptions, giving presentations, or assessing drug-drug interactions? Do you find yourself regularly checking your schedule? Also try to envision: z where you would carry the device z where, when, and how you would charge it when needed z what connections to computers for data exchange are available z with whom you would share data z and from whom you could get technical support. You may have trouble thinking that far ahead, but doing so will help you narrow your PDA choices. 2. Which operating system should I use? A PDA operates on one of four main operating systems: z Palm OS, the most popular world wide z EPOC OS, which is more popular in Europe z Pocket PC, which is rapidly gaining popularity z and Linux OS, which recently entered the PDA market. -
Demystifying the Secure Enclave Processor
Demystifying the Secure Enclave Processor Tarjei Mandt (@kernelpool) Mathew Solnik (@msolnik) David Wang (@planetbeing) About Us • Tarjei Mandt ▫ Senior Security Researcher, Azimuth Security ▫ [email protected] • Mathew Solnik ▫ Director, OffCell Research ▫ [email protected] • David Wang ▫ Senior Security Researcher, Azimuth Security ▫ [email protected] Introduction • iPhone 5S was a technological milestone ▫ First 64-bit phone • Introduced several technological advancements ▫ Touch ID ▫ M7 motion coprocessor ▫ Security coprocessor (SEP) • Enabled sensitive data to be stored securely ▫ Fingerprint data, cryptographic keys, etc. Secure Enclave Processor • Security circuit designed to perform secure services for the rest of the SOC ▫ Prevents main processor from gaining direct access to sensitive data • Used to support a number of different services ▫ Most notably Touch ID • Runs its own operating system (SEPOS) ▫ Includes its own kernel, drivers, services, and applications Secure (?) Enclave Processor • Very little public information exists on the SEP ▫ Only information provided by Apple • SEP patent only provides a high level overview ▫ Doesn’t describe actual implementation details • Several open questions remain ▫ What services are exposed by the SEP? ▫ How are these services accessed? ▫ What privileges are needed? ▫ How resilient is SEP against attacks? References • Patent US8832465 – Security enclave processor for a system on a chip ▫ http://www.google.com/patents/US8832465 • L4 Microkernels: The Lessons from 20 Years