PULP Jan 2021.Pages

Total Page:16

File Type:pdf, Size:1020Kb

PULP Jan 2021.Pages THE PULP JANUARY, 2021 The P U L P Newsletter of the Hartford User Group Exchange http://www.huge.org Volume 40 Issue --01 JANUARY 19th General Meeting: Pranks & … Rev. Fleming Hall 2533 Main Street, Glastonbury, CT Q&A Session: 7 PM–7:15PM Meeting starts at: 7:15PM Contents Page From the Editor 2 Stu’s Quiz Page 3 How to Decode Apple Ver- 4 sion and Build Numbers UEFI Configuration for Boot- 7 ing Live Media Genealogy Research Online 9 Calendar 10 Page 1 THE PULP JANUARY, 2021 The PULP is published monthly by and for members of the Hartford User Group MEETING LOCATIONS Exchange, Inc. (HUGE). HUGE is a nonprofit organization whose aim is to pro- vide an exchange of information between users of personal computers. The PULP is Rev. Fleming Hall not in any way affiliated with any computer manufacturer or software company. Original, uncopyrighted articles appearing in the PULP may be reproduced without 2533 Main Street, prior permission by other nonprofit groups. Please give credit to the author and the Glastonbury, CT PULP, and send a copy to HUGE. The opinions and views herein are those of the authors and not necessarily those of HUGE. Damages caused by use or abuse of information appearing in the PULP are the sole responsibility of the user of the in- formation. We reserve the right to edit or reject any articles submitted for publica- tion in the PULP. Trademarks used in this publication belong to the respective own- ers of those trademarks. From The Editor by Stuart Rabinowitz Happy New Year. Thanks to everyone that added to the UEFI/BIOS firmware Three million users installed 28 mali- December discussion.. Those of you that were at the meeting cious Chrome or Edge extensions. A hacker is selling access to may notice a theme to at least one of the articles in this the email accounts of hundreds of C-level executives. month’s PULP. It relates to a topic that came up in the Apple ID has added a recovery key option, but it’s not yet meeting. The January. topic is inspired by a frantic ‘FaceTime’ ready for you to use. call. Law enforcement took down three ‘bulletproof’ VPN Also, as those of you that attended the December meeting providers. may remember, no heat. There is a very good chance the heat Facebook launches new initiative to fight against iOS 14 ad will not be fixed as the are working to get bids to replace the tracking protections hot air gas furnace. If we need to be virtual, I’ll send out a link. Older Android phone just dodged a big web browsing problem. This time we’ll be using ‘Jitsi” which is an open source soft- All Android phones should now be able to access sites secured ware. An iOS and Android version is available. with certificates from Let's Encrypt until 2024. To those of you that sent your dues check into Marty, I 5G standalone networks may have more vulnerabilities than apologize for not having deposited them. We are in the process you think of changing banks to reduce fees, but are having issues with satisfying the bank with our documentation. Microsoft has created a Rewards program which promises sweepstakes for prizes, discounts toward items in the Mi- In the news: The SolarWinds Trojan affected about 18,000 crosoft Store, and other personal benefits, but you need to enterprises that must use hot patches, isolate compromised enroll and provide them some personal information. The pro- gear Reports indicates the company was warned about gram tracks what those customers search on Bing, what web- insecurities years ago. A backdoor was found in the sites they visit and how often, and what time of day are they SolarWinds Orion IT monitoring and management software in online, etc. a dynamic link library called SolarWinds.Orion.Core. Google’s huge Gmail and YouTube outage on 12/14 lasted 50 Some organizations have been infected with Sunburst (not to minutes affected billions and was due to an errant 'zero' be confused with SolarWinds) malware released online. The biggest names on this list include Cisco, SAP, Intel, Cox Send your comments to [email protected] Communications, Deloitte, Nvidia, Fujitsu, Belkin, Amerisafe, Until next month…Happy computing!! Lukoil, Rakuten, Check Point, Optimizely, Digital Reach, and Here is the appropriate copyright citation for the “Tidbits” Digital Sense. articles. Each article has a link to the full text. Academics have been able to turn RAM into Wi-Fi cards to steal data from air-gapped systems. They do need to be fairly http://creativecommons.org/licenses/by-nc-nd/3.0/ close to the computers, at present. FireEye, one of the world's largest security firms, has disclosed security breach. TheNew TrickBot version can tamper with Page 2 THE PULP JANUARY, 2021 A Little Computer Quiz Dec. Quiz Answers Continuing a theme from last month— 1 One of the currently hottest computer pro- 1 Java was developed in the summer of gramming languages is Python, when was it 1994 , but was not originally called have. released? What was the original name? A 1991 2 What company developed it? 2 When was work on it started? A Work began in 1989 3 Who was the lead developer? 3 Who created Python? 4 What was the first app written? A Guido van Rossum, He has been Presi- dent of the Python Software Foundation, after 5 When was JavaScript announced? stepping down it 2018 as (BDFL) ‘benevolent dictator for life’. 4 Even older is BASIC. When was the first BASIC program successfully run? A May 1. 1964 at 4 AM on a General Elec- tric computer. 6 Where? A Dartmouth College in Hanover NH. Stuart Rabinowitz Page 3 THE PULP JANUARY, 2021 How to Decode Apple Version and Build Numbers build numbers, you can glean additional information about any given release. DAVID SHAYER 8 July 2020 Everyone knows that Apple operating systems have ver- Understanding Apple Version and Build Numbers sion numbers, like iOS 13.5.1 or macOS 10.15.5. But have Apple’s two main operating system lines, iOS and macOS, you noticed that Apple operating systems also have build have independent version and build number systems. iOS, numbers? For instance, iOS 13.5.1 is build number 17F80. iPadOS, watchOS, and tvOS share a common system since But what does that mean? they are all derived from the iOS code base. (Only Dar- To see your macOS version and build numbers on a Mac, win-derived operating systems—macOS, iOS, iPadOS, choose Apple > About This Mac and click the version watchOS, and tvOS—use build numbers. Classic Mac OS number. In iOS or iPadOS, go to Settings > General > and iPod OS didn’t use the same build number system.) About and tap Software Version. For watchOS, in your As you know, every Apple operating system release has an iPhone’s Watch app, go to General > About and look at official version number, composed of three parts: the Version line. Major version: For iOS, it’s incremented once per year for significant upgrades. For macOS, the major version num- ber has been 10 since the initial release of Mac OS X, ren- dering it pointless up until the upcoming update to mac- OS 11 Big Sur. Minor version: For iOS, the minor version is incremented as necessary (usually three to six times) throughout the lifespan of a major version to reflect updates that contain new features along with bug fixes. For macOS, the minor version is really the major version, incrementing for each annual named release of macOS. Patch version: For iOS, the patch version increments as necessary for bug fix updates to each minor release. For macOS, Apple updates the patch version for every release that’s more than just a quick bug fix—those are called “supplemental updates” and don’t get their own version numbers. But their build numbers change! Here’s a simple chart to help clarify the official version numbering scheme. OS Major Minor Patch iOS 13 5 1 macOS 10 15 5 An Apple build number also has three parts: Finding build numbers in Apple operating systems Although it’s easy to check the build number of any oper- Major version: Within Apple, the major version is called ating system you’re running, Apple doesn’t publish a the build train. canonical list of them anywhere. For that information, Minor version: For iOS and its descendants, the minor head to Wikipedia’s iOS Version History, macOS Version version tracks with the minor release; for macOS, it tracks History, watchOS, and tvOS articles or look in the Mac- with patch releases. Tracker app (for the macOS build numbers, you’ll need to Daily build version: The daily build indicates how many click through from the version history article to the ex- times Apple has built the source code for the release since panded article about each release). the previous public release. Apple makes a new build of each operating system at least To make this crystal clear, look at iOS 13.5.1, which is build every night, so there’s a fresh version ready for the engi- 17F80, and macOS 10.15.5 with its supplemental update, neers each morning. Most of these builds are never re- which is build 19F101. leased outside the company, so they don’t get an official version number like 13.5.1. But the engineers still need a OS Major Minor Daily way to identify a particular build. That’s what build num- iOS 13.5.1 17 F 80 bers are for.
Recommended publications
  • Deploying Ios and Tvos Devices Using Apple Configurator 2 and Jamf Pro
    Deploying iOS and tvOS Devices Using Apple Configurator 2 and Jamf Pro Technical Paper Jamf Pro 10.9.0 or Later 7 October 2020 © copyright 2002-2020 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate. Jamf 100 Washington Ave S Suite 1100 Minneapolis, MN 55401-2155 (612) 605-6625 Jamf, the Jamf Logo, JAMF SOFTWARE®, and the JAMF SOFTWARE Logo® are registered or common law trademarks of JAMF SOFTWARE, LLC in the U.S. and other countries. Apple, Apple Configurator 2, the Apple logo, Apple TV, iTunes, Mac, macOS, OS X, and tvOS are trademarks of Apple Inc., registered in the United States and other countries. IOS is a trademark or registered trademark of Cisco in the U.S. and other countries. All other product and service names mentioned herein are either registered trademarks or trademarks of their respective companies. Contents Contents 4 Introduction 4 What's in This Guide 4 Additional Resources 5 Choosing a Deployment Method 6 Supervision Identities 6 Use a Supervision Identity from Apple Configurator 2 7 Create and Use a Supervision Identity from Jamf Pro 8 Automated Enrollment 8 Requirements 8 Deploying Devices Using Automated Enrollment 11 Manual Enrollment with an Enrollment URL 11 Requirements 11 Deploy Devices Using Manual Enrollment with an Enrollment URL 13 Further Considerations 14 Manual Enrollment with an Enrollment Profile 14 Requirements 14 Create an Enrollment Profile 14 Create and Upload the Supervision Identity 14 Create the "Prepare" Blueprint 15 Create the "Enroll" Blueprint 15 Deploy Devices Using Manual Enrollment with an Enrollment Profile 3 Introduction What's in This Guide This guide provides step-by-step instructions for deploying iOS and tvOS devices using Apple Configurator 2 and Jamf Pro.
    [Show full text]
  • Don't Pay with Itunes Gift Card Consumer Alert
    DON’T PAY WITH iTUNES GIFT CARDS Consumer Alert In the news: SPOT IT: You are asked to pay with iTunes Demands for you to pay right away Someone calls instilling panic and urgency—your for taxes, hospital or utility bills, grandchild is going to jail; you will be arrested for bail money, or to settle a debt are past due taxes; or your utilities will be turned off common. Criminals make up all in hours—unless you immediately buy iTunes gift kinds of reasons for why you owe cards then share the 16-digit code with the caller urbanbuzz Shutterstock.com money. The goal is the same: to to make your payment. steal from you. You apply for a loan and to prove your credit Con artists using this ploy will ask for an untraceable worthiness, you are asked for an advance fee to form of payment, like wiring money, sending cash, or a be paid right away with iTunes gift cards. pre-loaded money or gift card. The iTunes gift card is the payment method of choice right now for many criminals. A caller tells you that an iTunes gift card is the way you use Apple Pay. What you need to know: When someone catches you off guard and hits your panic button, it is hard to think straight. Criminals know STOP IT: Don’t pay anyone with a gift card this, and hope you will focus on the worse-case scenario they are painting and not on your common sense. If you’re not shopping at the iTunes store, you should not be paying with an iTunes gift card.
    [Show full text]
  • View Managing Devices and Corporate Data On
    Overview Managing Devices & Corporate Data on iOS Overview Overview Contents Businesses everywhere are empowering their employees with iPhone and iPad. Overview Management Basics The key to a successful mobile strategy is balancing IT control with user Separating Work and enablement. By personalizing iOS devices with their own apps and content, Personal Data users take greater ownership and responsibility, leading to higher levels of Flexible Management Options engagement and increased productivity. This is enabled by Apple’s management Summary framework, which provides smart ways to manage corporate data and apps discretely, seamlessly separating work data from personal data. Additionally, users understand how their devices are being managed and trust that their privacy is protected. This document offers guidance on how essential IT control can be achieved while at the same time keeping users enabled with the best tools for their job. It complements the iOS Deployment Reference, a comprehensive online technical reference for deploying and managing iOS devices in your enterprise. To refer to the iOS Deployment Reference, visit help.apple.com/deployment/ios. Managing Devices and Corporate Data on iOS July 2018 2 Management Basics Management Basics With iOS, you can streamline iPhone and iPad deployments using a range of built-in techniques that allow you to simplify account setup, configure policies, distribute apps, and apply device restrictions remotely. Our simple framework With Apple’s unified management framework in iOS, macOS, tvOS, IT can configure and update settings, deploy applications, monitor compliance, query devices, and remotely wipe or lock devices. The framework supports both corporate-owned and user-owned as well as personally-owned devices.
    [Show full text]
  • Apple Business Manager Overview Overview
    Getting Started Guide Apple Business Manager Overview Overview Contents Apple Business Manager is a web-based portal for IT administrators to deploy Overview iPhone, iPad, iPod touch, Apple TV, and Mac all from one place. Working Getting Started seamlessly with your mobile device management (MDM) solution, Apple Configuration Resources Business Manager makes it easy to automate device deployment, purchase apps and distribute content, and create Managed Apple IDs for employees. The Device Enrollment Program (DEP) and the Volume Purchase Program (VPP) are now completely integrated into Apple Business Manager, so organizations can bring together everything needed to deploy Apple devices. These programs will no longer be available starting December 1, 2019. Devices Apple Business Manager enables automated device enrollment, giving organizations a fast, streamlined way to deploy corporate-owned Apple devices and enroll in MDM without having to physically touch or prepare each device. • Simplify the setup process for users by streamlining steps in Setup Assistant, ensuring that employees receive the right configurations immediately upon activation. IT teams can now further customize this experience by providing consent text, corporate branding or modern authentication to employees. • Enable a higher level of control for corporate-owned devices by using supervision, which provides additional device management controls that are not available for other deployment models, including non-removable MDM. • More easily manage default MDM servers by setting a default server that’s based on device type. And you can now manually enroll iPhone, iPad, and Apple TV using Apple Configurator 2, regardless of how you acquired them. Content Apple Business Manager enables organizations to easily buy content in volume.
    [Show full text]
  • Maas360 and Ios
    MaaS360 and iOS A comprehensive guide to Apple iOS Management Table of Contents Introduction Prerequisites Basics and Terminology Integrating MaaS360 with Apple’s Deployment Programs Deployment Settings Enrollment: Manual Enrollment Enrollment: Streamlined Apple Configurator Device View Policy App Management Frequently Asked Questions "Apple’s unified management framework in iOS gives you the best of both worlds: IT is able to configure, manage, and secure devices and control the corporate data flowing through them, while at the same time users are empowered to do great work with the devices they love to use.” -Apple Business “Managing Devices and Corporate Data on iOS” Guide IBM Security / © 2019 IBM Corporation 3 Types of iOS Management “Supervision gives your organization more control iOS supports 3 “styles” of management that will over the iOS, iPadOS, and tvOS devices you own, determine the MDM capabilities on the device. allowing restrictions such as disabling AirDrop or Apple Music, or placing the device in Single App Standard – an out-of-the-box device with no additional Mode. It also provides additional device configurations. Would be enrolled over-the-air via a Safari configurations and features, so you can do things URL or the MaaS360 agent. like silently install apps and filter web usage via a global proxy, to ensure that users’ web traffic stays Supervised – Supervision unlocks the full management within the organization’s guidelines. capabilities available on iOS. Can be automated via the Apple streamlined enrollment program or enabled manually By default, iOS, iPadOS, and tvOS devices are not via Apple configurator. Supervision of an existing device supervised.
    [Show full text]
  • Iphone Ios 5 Development Essentials
    iPhone iOS 5 Development Essentials i iPhone iOS 5 Development Essentials – First Edition ISBN-13: 978-1466337275 © 2011 Neil Smyth. All Rights Reserved. This book is provided for personal use only. Unauthorized use, reproduction and/or distribution strictly prohibited. All rights reserved. The content of this book is provided for informational purposes only. Neither the publisher nor the author offers any warranties or representation, express or implied, with regard to the accuracy of information contained in this book, nor do they accept any liability for any loss or damage arising from any errors or omissions. This book contains trademarked terms that are used solely for editorial purposes and to the benefit of the respective trademark owner. The terms used within this book are not intended as infringement of any trademarks. Rev 2.3p ii Table of Contents Preface ............................................................................................................................................................... xix 1. About iPhone iOS 5 App Development Essentials .............................................................................................. 1 1.1 Example Source Code ................................................................................................................................... 2 1.2 Feedback ...................................................................................................................................................... 2 2. The Anatomy of an iPhone 4S ...........................................................................................................................
    [Show full text]
  • Legal-Process Guidelines for Law Enforcement
    Legal Process Guidelines Government & Law Enforcement within the United States These guidelines are provided for use by government and law enforcement agencies within the United States when seeking information from Apple Inc. (“Apple”) about customers of Apple’s devices, products and services. Apple will update these Guidelines as necessary. All other requests for information regarding Apple customers, including customer questions about information disclosure, should be directed to https://www.apple.com/privacy/contact/. These Guidelines do not apply to requests made by government and law enforcement agencies outside the United States to Apple’s relevant local entities. For government and law enforcement information requests, Apple complies with the laws pertaining to global entities that control our data and we provide details as legally required. For all requests from government and law enforcement agencies within the United States for content, with the exception of emergency circumstances (defined in the Electronic Communications Privacy Act 1986, as amended), Apple will only provide content in response to a search issued upon a showing of probable cause, or customer consent. All requests from government and law enforcement agencies outside of the United States for content, with the exception of emergency circumstances (defined below in Emergency Requests), must comply with applicable laws, including the United States Electronic Communications Privacy Act (ECPA). A request under a Mutual Legal Assistance Treaty or the Clarifying Lawful Overseas Use of Data Act (“CLOUD Act”) is in compliance with ECPA. Apple will provide customer content, as it exists in the customer’s account, only in response to such legally valid process.
    [Show full text]
  • Ibank Mobileme Sync
    iBank Mobile: Setting up Manual Sync via MobileMe Overview This manual will walk you through manually setting up iBank and iBank Mobile to talk to each other through your MobileMe account. The manual setup method must be used if your iPhone is not connected to the same local network as the Mac running iBank. If your iPhone IS on the same local network as your Mac, we recommend instead using the automatic setup covered in the iBank user manual. For these purposes, the local network means a wireless network such as the kind created by an Airport, Linksys, or similar kind of router. MobileMe Setup The syncing method detailed here requires that you are subscribed to Appleʼs MobileMe online service. This service is not provided or supported by IGG Software. IBank is simply one of the many great programs that can make use of the service to exchange data between your computer and your iPhone. If you are not set up with MobileMe, open your browser and visit http://me.com to sign up. A free trial is available, after which you pay Apple a yearly subscription fee. Terms and conditions are subject to change according to Appleʼs product policy. Going forward, we assume you have signed up for MobileMe, and you know your MobileMe username and password. In this document, I use my own username, jstaloff, as an example; you should use your own instead. 1 IGG SOFTWARE, LLC iBank Mobile: Setting up Manual Sync via MobileMe Configuring your Mac to connect to your MobileMe account Open your System Preferences (under the Apple Menu), and click the icon for MobileMe.
    [Show full text]
  • Lotus Notes Traveler
    Lotus ® Notes Version 8.5.2 Lotus Notes Traveler Lotus ® Notes Version 8.5.2 Lotus Notes Traveler Note Before using this information and the product it supports, read the information in the Notices section. Second Edition (September, 2010) This edition applies to the version 8.5.2 release and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 2005, 2009. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Overview ..............1 Planning for installation and configuration ............45 Planning for installation and Choosing a deployment configuration .....45 configuration ............3 Planning your network topology ......45 Choosing a deployment configuration ......3 Using a virtual private network .....46 Planning your network topology ......3 Using a reverse proxy .........47 Using a virtual private network ......4 Direct connection ..........48 Using a reverse proxy .........5 Remote and local mail file considerations . 48 Direct connection ...........6 Supporting multiple Lotus Domino domains . 49 Remote and local mail file considerations ....6 Server capacity planning .........50 Supporting multiple Lotus Domino domains . 7 Clustering and failover ..........50 Server capacity planning .........8 Downlevel Domino directory servers ......51 Clustering and failover ...........8 Setting auto sync options ..........51 Downlevel Domino directory servers ......9 Configuring scheduled sync ........51 Setting auto sync options ..........9 Using SMS mode for auto sync .......52 Configuring scheduled sync ........9 Setting the heartbeat algorithm maximum Using SMS mode for auto sync .......10 interval ...............53 Setting the heartbeat algorithm maximum Language support ............53 interval ...............11 Lotus mobile installer ...........54 Language support ............11 Planning for security ...........55 Lotus mobile installer ...........12 Moving Lotus Notes Traveler to a new server .
    [Show full text]
  • Apple at Work Deployment and Management White Paper
    Apple at Work Deployment and Management Simple to deploy. At any scale. Apple makes it easy for IT teams to administer devices, manage their configuration, distribute apps and content, and secure corporate data. With Apple Business Manager, devices can be distributed directly to employees and used right out of the box, all without manual configuration. And with flexible deployment models across all Apple platforms, IT can get employees up and running faster than ever with the best tools for the job. Management made easy Apple devices have a built-in mobile device management (MDM) framework, making it easy for IT to deploy devices, distribute apps and books, configure settings, and ensure the security of each device. Paired with a third-party MDM tool, IT teams can remotely manage and update devices over the air. And if devices ever go missing, IT teams can remotely and securely erase them. MDM supports configuration for apps, accounts, and data on each device. This includes integrated features such as password and policy enforcement. Controls remain transparent to employees while ensuring their personal information stays private. And IT maintains necessary oversight without disrupting the productivity employees need to succeed. Whether a business uses a cloud-based or on-premise server, MDM solutions are available from a wide range of vendors with a variety of features and pricing for ultimate flexibility. And each solution utilizes the Apple management framework in iOS, iPadOS, tvOS, and macOS to manage features and settings for each platform. Zero-touch deployment Apple Business Manager is a web-based portal for IT administrators to deploy iPhone, iPad, iPod touch, Apple TV, and Mac, all from one place.
    [Show full text]
  • What's New for Enterprise and Education-WWDC 2020
    What’s New for Enterprise and Education WWDC 2020 June 2020 (v1.0) Contents Introduction 3 Integration and Setup 4 Deployment and Provisioning 5 Configuration Management 6 Identity Management 13 Content Distribution 15 Security and Compliance 16 App Updates 21 AppleSeed for IT 23 Deprecated Services 24 Additional Resources 25 2 What’s New for Enterprise and Education June 2020 Introduction This document is for IT administrators who want to learn about the new security and deployment-related features across Apple platforms as of WWDC 2020. There are also updates to Apple School Manager, Apple Business Manager, and AppleSeed for IT, as well as changes to the Apple mobile device management (MDM) protocol and its associated payloads. This document supplements the Deployment Reference for iPhone and iPad, the Deployment Reference for Mac, and Mobile Device Management Settings for IT Administrators, all designed to help administrators understand the key technologies for deploying Apple devices at scale and providing an optimal experience for users. NOTE: This material is provided for information purposes only; Apple assumes no liability related to its use. The Apple software and services discussed hereunder are pre-release versions that may be incomplete and may contain inaccuracies or errors that could cause failures or loss of data. 3 What’s New for Enterprise and Education June 2020 Integration and Setup Apple School Manager and Apple Business Manager System for Cross-domain Identity Management (SCIM) Administrators can use SCIM to import users into Apple School Manager and Apple Business Manager. SCIM allows them to merge Apple School Manager and Apple Business Manager properties (such as SIS user name and grades in Apple School Manager, and roles in Apple School Manager and Apple Business Manager) over account data imported from Microsoft Azure Active Directory (Azure AD).
    [Show full text]
  • Distributed Tuning of Boundary Resources: the Case of Apple's Ios Service System
    Ben Eaton, Silvia Elaluf-Calderwood, Carsten Sørensen and Youngjin Yoo Distributed tuning of boundary resources: the case of Apple's iOS service system Article (Published version) (Refereed) Original citation: Eaton, Ben, Elaluf-Calderwood, Silvia, Sorensen, Carsten and Yoo, Youngjin (2015) Distributed tuning of boundary resources: the case of Apple's iOS service system. MIS Quarterly, 39 (1). pp. 217-243. ISSN 0276-7783 Reuse of this item is permitted through licensing under the Creative Commons: © 2015 The Authors CC-BY This version available at: http://eprints.lse.ac.uk/63272/ Available in LSE Research Online: August 2015 LSE has developed LSE Research Online so that users may access research output of the School. Copyright © and Moral Rights for the papers on this site are retained by the individual authors and/or other copyright owners. You may freely distribute the URL (http://eprints.lse.ac.uk) of the LSE Research Online website. SPECIAL ISSUE: SERVICE INNOVATION IN THE DIGITAL AGE DISTRIBUTED TUNING OF BOUNDARY RESOURCES: THE CASE OF APPLE’S IOS SERVICE SYSTEM1 Ben Eaton Department of IT Management, Copenhagen Business School, Copenhagen, DENMARK {[email protected]} Silvia Elaluf-Calderwood and Carsten Sørensen Department of Management, The London School of Economics and Political Science, London, GREAT BRITAIN {[email protected]} {[email protected]} Youngjin Yoo Fox School of Business, Temple University, Philadelphia, PA 19140 UNITED STATES {[email protected]} The digital age has seen the rise of service systems involving highly distributed, heterogeneous, and resource- integrating actors whose relationships are governed by shared institutional logics, standards, and digital technology.
    [Show full text]