Capítulo I Lenguajes Para Aplicaciones Web
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Motorola-A780-Manual.Pdf
CG.GSM.A780.book Page 1 Thursday, November 11, 2004 4:05 PM Welcome Welcome to the world of Motorola digital wireless communications! We are pleased that you have chosen the Motorola A780 GSM wireless phone. Earpiece Camera TransFlash™ Memory Card Port (on back) Loudspeaker & Earpiece Rocker Camera Switch Key End Key LCD Send Key Touch Screen Keypad Voice Clear/ Recognition Cancel Key Key Battery Door Latch Power On/Off Key Home Key Audio Jack & USB Port 5-Way Navigation Key Note: Your phone may not appear exactly as shown above. All features and functions remain the same regardless of your phone’s appearance. 1 CG.GSM.A780.book Page 2 Thursday, November 11, 2004 4:05 PM Check It Out! Mirror Stylus (for use with the touch screen) Camera Lens Battery Door Feature Description Take Photo Open the flip to see the on-screen view finder. Press the camera key to activate the camera, point lens at subject, then press the camera key to take a photo. Record Video Press the camera key to activate the camera. Tap , then tap Record Video. Tap Record to start video recording. Tap Done to stop video recording. TransFlash™ Used to store downloaded files Memory Card 2 CG.GSM.A780.book Page 3 Thursday, November 11, 2004 4:05 PM Feature Description Send Send a multimedia message Multimedia with pictures, animations, 032380o Message sounds, and videos: Read Read a missed multimedia Multimedia message that you have 032380o Message received: Tap , tap Download, tap to play. Play Music or Play a song or watch a video clip Video Clip stored on your phone: Tap Media, tap , then tap Open. -
Open Mohamedhassan-Thesis.Pdf
The Pennsylvania State University The Graduate School SECURITY ENFORCEMENT IN MOBILE TELEPHONY SERVER A Thesis in Computer Science and Engineering by Mohamed N Hassan °c 2008 Mohamed N Hassan Submitted in Partial Ful¯llment of the Requirements for the Degree of Master of Science August 2008 The thesis of Mohamed N Hassan was reviewed and approved¤ by the following: Trent Jaeger Associate Professor of Computer Science and Engineering Thesis Advisor Thomas LaPorta Professor of Computer Science and Engineering Mahmut Kandemir Director of Graduate A®airs and Associate Professor of Computer Science and Engineering ¤Signatures are on ¯le in the Graduate School. Abstract The increasing market share of Linux based mobile phones has motivated developers to make use of the Linux flexible environment to write applications that provide ser- vices for mobile users. These services vary from short messaging, calendar, phonebook management, internet browser, mobile games and email clients. These applications re- quire cellular connectivity which is provided via the telephony server API. The telephony server, a part of the phone software architecture, converts these API calls to attention commands (AT) that are sent to the modem. AT commands pose a threat on user data, SIM data and the core cellular network. The current Linux security modules like SELinux enforce access control at the granularity of applications access to the telephony server. Therefore, we intend to design a reference monitor module inside the telephony server that enforces policy over AT+ commands sent to the phone modem. We introduce user level LSM that can decide which classes of application can access which telephony services. -
Author Guidelines for 8
Appeared: In’tl Symposium on Wearable Computers, Montreux, Switzerland Oct. 11-15, 2006 VibeFones: Socially Aware Mobile Phones Anmol Madan, Alex “Sandy” Pentland MIT Media Lab {anmol,pentland}@media.mit.edu Abstract Today's mobile phones are essentially off-the-shelf, Feature ETH QBIC MIT MiThril VibeFone (2003-06) (2003-05) Motorola Phone mass-market wearable computers. In this paper, we Processor 230-400 Mhz 230 Mhz 312 Mhz XScale describe mobile social software that uses location, and OS XScale, Linux StrongARM Zaurus, mobile phone, Linux proximity and tone of voice to create a sophisticated Linux Connectivity Wifi, optional wifi, optional Cellular, optional wifi understanding of people's social lives, by mining their cellular cellular face-to-face and phone interactions. We describe Peripheral wired and wired and Bluetooth Supports Bluetooth several applications of our system – automatic Sensors Bluetooth sensors sensors characterization of social and workplace interactions, sensors Location GPS, bluetooth IR tags, Bluetooth Cell ID, bluetooth, a courtesy reminder for phone conversations, and a and optional GPS personal trainer for dating encounters. Proximity Data storage SD card > 4 GB SD card > 4 GB SD card > 4 GB Video External External webcam Integrated 1.2 Mpx Capture 1. Introduction Table 1. Comparison of mobile phones with wearable The mobile phone will soon be the most popular computing platforms consumer device on the planet. About half of the 800 million phones sold last year had significant We propose that mobile applications can become processing power (more than a Pentium I), broadband socially aware by measuring non-linguistic speech data connectivity, external storage, integrated cameras attributes (e.g., tone of voice, social signals) and and multimedia playback [12]. -
Vysok´E Uˇcení Technick´E V Brnˇe T-Mobile Mda Ii V Linuxu
VYSOKEU´ CENˇ ´I TECHNICKE´ V BRNEˇ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMACNˇ ´ICH TECHNOLOGI´I USTAV´ INFORMACNˇ ´ICH SYSTEM´ U˚ FACULTY OF INFORMATION TECHNOLOGY DEPARTMENT OF INFORMATION SYSTEMS T-MOBILE MDA II V LINUXU T-MOBILE MDA II IN LINUX DIPLOMOVA´ PRACE´ MASTER’S THESIS AUTOR PRACE´ Bc. ZBYNEKˇ MICHL AUTHOR VEDOUC´I PRACE´ Ing. TOMA´ Sˇ KASPˇ AREK´ SUPERVISOR BRNO 2009 Abstrakt Diplomov´apr´acese zab´yv´amobiln´ımdigit´aln´ımasistentem T-Mobile MDA II v operaˇcn´ım syst´emu Linux. Prvn´ıˇc´astpr´aceje zamˇeˇrenana identifikaci zaˇr´ızen´ıa specifikaci parametr˚u MDA II. Druh´aˇc´astpopisuje v´ybˇerGNU distribuce s Linuxov´ymzavadˇeˇcema porovn´av´a souˇcasn´ystav podpory MDA II v r˚uzn´ych verz´ıch Linuxov´ehoj´adra.Posledn´ıˇc´astpr´acese vˇenuje implementaci k´odunˇekter´ych komponent a jeho zaˇclenˇen´ıdo Linuxov´ehoj´adra. Kl´ıˇcov´aslova Angstr¨om,ARM,˚ ASIC3, bootldr, distribuce, Familiar, GPIO, Handhelds, HaRET, Hi- malaya, HTC, j´adro,LinExec, Linux, MDA, mobiln´ı,modul, ovladaˇc,Pocket PC, PXA263, T-Mobile, vanilla, Xanadux, zaˇr´ızen´ı,zavadˇeˇc Abstract MSc. thesis deals with mobile digital assistant T-Mobile MDA II running Linux operating system. The first part presents device identification and parameters' specification of the MDA II. The second part focuses on selection of GNU distribution with Linux bootloader and Linux kernel support comparison. The subject of the last part is MDA II component code implementation and its merging into Linux kernel. Keywords Angstr¨om,ARM,˚ ASIC3, bootldr, bootloader, device, distribution, driver, Familiar, GPIO, Handhelds, HaRET, Himalaya, HTC, kernel, LinExec, Linux, MDA, mobile, module, Pocket PC, PXA263, T-Mobile, vanilla, Xanadux Citace ZbynˇekMichl: T-Mobile MDA II in Linux, diplomov´apr´ace,Brno, FIT VUT v Brnˇe,2009 T-Mobile MDA II in Linux Prohl´aˇsen´ı Prohlaˇsuji,ˇzejsem tuto diplomovou pr´aci vypracoval samostatnˇepod veden´ımIng. -
Open Anuj-Dissertation.Pdf
The Pennsylvania State University The Graduate School PROVIDING VERIFIABLE INTEGRITY ON MOBILE PLATFORMS A Thesis in Electrical Engineering by Anuj Sawani c 2008 Anuj Sawani Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Science August 2008 The thesis of Anuj Sawani was reviewed and approved∗ by the following: Trent Ray Jaeger Associate Professor of Computer Science and Engineering Thesis Co-Adviser George Kesidis Professor of Electrical Engineering and Computer Science and Engineering Thesis Co-Adviser Ken Jenkins Professor and Head of the Department of Electrical Engineering ∗Signatures are on file in the Graduate School. Abstract Mobile phone systems are becoming as advanced and powerful as desktop comput- ers. They now provide services beyond telephony, such as browsing the internet, personal information management or even playing games. However, third-party ap- plications, such as mobile games, could execute malware on the phone and threaten to affect the integrity of trusted software like mobile banking clients. The goal is to prevent trusted data or code from being affected by untrusted software with mini- mum overhead. The phone has limited processing power and we aim to show that an optimized security framework running on the phone does not affect the performance significantly. We use the Security Enhanced Linux (SELinux) framework combined with Policy Reduced Integirty Measurement Architecture (PRIMA) to provide in- tegrity guarantees to remote parties. Each of these components have been ported to work with an ARM-based platform. Further, the SELinux policy loaded at boot time also ensures that the trusted software is not compromised at any time.