Windows Phone Highlights

Total Page:16

File Type:pdf, Size:1020Kb

Windows Phone Highlights Windows Phone Highlights Table of Contents Microsoft Windows Phone Update ................................................................................................ 2 Windows Phone – Enterprise -1 ..................................................................................................... 3 Windows Phone – Enterprise -2 ..................................................................................................... 4 Windows Phone – Trusted Hardware ............................................................................................. 6 Windows Phone – App Security ...................................................................................................... 8 Windows Phone – AppContainer .................................................................................................. 10 Windows Phone – ASLR & DEP ..................................................................................................... 11 Windows Phone – Storage ............................................................................................................ 14 Windows Phone – Assigned Access .............................................................................................. 16 Windows Phone – Authentication ................................................................................................ 18 Windows Phone – VPN ................................................................................................................. 19 Windows Phone – Remote Assistant ............................................................................................ 20 Notices .......................................................................................................................................... 21 Page 1 of 21 Microsoft Windows Phone Update Microsoft Windows Phone Update 110 **110 Mark Williams: Some of the security features in Windows phone that are of note and are interesting. Page 2 of 21 Windows Phone – Enterprise -1 Windows Phone – Enterprise -1 Ubiquitous OS • Consistent look / feel — Whether using a phone, desktop, tablet, other Common security features • Unified Extensible Firmware Interface (UEFI) • Trusted Platform Module (TPM) • Data Execution Prevention (DEP) • Address Space Layout Randomization (ASLR) • BitLocker Drive Encryption • AppContainer Sandbox • Information Rights Management (IRM) 111 **111 One is the fact that Windows has done a-- Microsoft has gone a long way to try to make a ubiquitous operating system, one that will work on the desktop system, one that will work on the tablet and even on your phone. And so, that operating system is going-- supposed to give us a seamless communication between all the devices and a seamless user interface. Some of the common security features that we're going to discuss that Windows has-- or Microsoft has provided for us in their Windows phone is that fact that we have this unified, extensible firmware interface. Page 3 of 21 They incorporate a trusted protection or trusted platform module into the system. We'll look at the concept of data execution prevention, as well as address space layout randomization, and a couple other neat little feature and functionality that Microsoft has added to provide this seamless enterprise experience for the phone. Windows Phone – Enterprise -2 Windows Phone – Enterprise -2 Mobile Device Management – Organization can easily enroll WP in MDM system • Manage and push security policies to devices Assigned Access – Organizations can create a “white list” of authorized apps Enterprise Wi-Fi – Support for enterprise level wireless access • Extensible Authentication Protocol – Transport Layer Security (EAP- TLS) • EAP-Tunneled Transport Layer Security (EAP-TTLS) • Certificate based authentication 112 **112 Some other things that they have done to make it much more of an enterprise friendly environment is they've given us the ability to tie it in with MDM systems and software, mobile device management, so that Page 4 of 21 the enterprise can control the policies and security feature and functionality and what programs and applications are able to run on your phone. We'll talk a little bit about this concept of assigned access where we can specifically say via a whitelist of what's going to be allowed on the system. And if it's not on the whitelist, what's going to be prevented. And also from an enterprise standpoint, it allows us to integrate into the enterprise wireless environment by natively supporting various VPN technologies such as-- and authentication such as TLS and extensible authentication protocol. Page 5 of 21 Windows Phone – Trusted Hardware Windows Phone – Trusted Hardware UEFI = BIOS + Security • Creates a “chain of trust” for the boot process • Firmware digitally signed by device manufacturer • Required for “trusted boot” Trusted Platform Module • Tamper resistant security processor Trusted Boot • Stores cryptographic keys • Stores hashes used to verify firmware and critical files • Stores BitLocker keys Trusted Boot • UEFI & TPM work together to ensure integrity of boot process 113 **113 So, what are some of the more noteworthy security features that we have? One is the unified extensible firmware interface. Basically, this is a secure form of BIOS. The idea here is Microsoft has created this code that has been signed by Microsoft-- signed by the device manufacturer, actually. And when this code boots up, we know it is a trusted code. And that's going to eliminate the ability for malware manufacturers to introduce root kits and other types of malware at the lower levels of the operating system, before the operating system takes place. Page 6 of 21 And UEFI works with this trusted platform module. And together, they provide what's referred to as trusted boot. And the idea behind trusted boot is if we think about security on any device, much of the security is provided by the operating system. And so, a simple way of bypassing security is to bypass that operating system in its entirety. So, trusted boot simply says you're not going to be able to do that. You have to be an authorized individual to be able to boot this device, which means that when we first turn it on, we have to provide some sort of credentials to authenticate ourselves. Well, those credentials are not going to be just stored in an insecure location. They are stored in the TPM, the trusted platform module. The TPM is basically a secure chip and a secure set of code for storing all of our authentication credentials and our encryption keys. Page 7 of 21 Windows Phone – App Security Windows Phone – App Security Windows Phone Store security controls combined with applications sandboxing (AppContainer) • Offers limited protection, especially when sideloading • Organizations should review sideloaded apps to ensure they meet policy Manage apps through policy • Disable access to Windows Phone Store • Disable sideloading • Allow / block specific apps 114 **114 Windows phone also has what's referred to as an AppContainer. The AppContainer, we're trying to establish trust in all the apps that we run on our phones, whether they be apps provided to us from Microsoft, or whether they be apps that we get from a third party. So, the way Windows phone provides security of our apps, it's kind of a twofold system. First, the Windows phone store adds some security measures. So, they will, in the Windows phone store, when apps are supplied there, they will verify that they are free of malware. And then also, on the phone itself, when an Page 8 of 21 app is ran, it is sandboxed, which is-- to remind you, it is that containment of the app where we see that app cannot have any access to any resources locally on the machine. It can only have access to resources that were downloaded along with the application. And Microsoft increases the level of application security by allowing us to create various policies. The policies can say here are the apps that we're going to allow access. Here are the apps that we're going to block access to. We can even say you can only get apps from a certain location. So, maybe you have an enterprise app server. And that's the only place we can get apps from. And users will not be allowed to maybe go out to the Windows phone store and download apps directly from that. Or they won't be able to side load. They can only get apps that you have authorized, that you have trusted through your local enterprise environment. So, application security is what we have. Page 9 of 21 Windows Phone – AppContainer Windows Phone – AppContainer Least Privilege AppContainer policy defines specific capabilities to which the app processes have access to • Location • Camera • Microphone • Networking • Sensors 115 **115 That AppContainer that I just mentioned, it's following the concept of least privilege. It basically is allowing us to set specific policies for what the different features and functionality of the phone are going to be allowed to do. So, what apps can utilize the camera? What apps can utilize location-based services? What apps can use the various sensors that are on there? So, an enterprise could set a policy that says this app, because it's a map, it needs to have access to the GPS capabilities. This app over here is a calendar. It doesn't really need access to the GPS, so we're going to limit its abilities in that way. So, Page 10 of 21 AppContainer allows us to implement that concept of least privilege. Windows Phone – ASLR & DEP Windows Phone – ASLR & DEP Apps are written by humans, therefore apps will
Recommended publications
  • Chapter # 1 Introduction
    Chapter # 1 Introduction Mobile applications (apps) have been gaining rising popularity dueto the advances in mobile technologies and the large increase in the number of mobile users. Consequently, several app distribution platforms, which provide a new way for developing, downloading, and updating software applications in modern mobile devices, have recently emerged. To better understand the download patterns, popularity trends, and development strategies in this rapidly evolving mobile app ecosystem, we systematically monitored and analyzed four popular third-party Android app marketplaces. Our study focuses on measuring, analyzing, and modeling the app popularity distribution, and explores how pricing and revenue strategies affect app popularity and developers’ income. Our results indicate that unlike web and peer-to-peer file sharing workloads, the app popularity distribution deviates from commonly observed Zipf-like models. We verify that these deviations can be mainly attributed to a new download pattern, to which we refer as the clustering effect. We validate the existence of this effect by revealing a strong temporal affinity of user downloads to app categories. Based on these observations, we propose a new formal clustering model for the distribution of app downloads, and demonstrate that it closely fits measured data. Moreover, we observe that paid apps follow a different popularity distribution than free apps, and show how free apps with an ad-based revenue strategy may result in higher financial benefits than paid apps. We believe that this study can be useful to appstore designers for improving content delivery and recommendation systems, as well as to app developers for selecting proper pricing policies to increase their income.
    [Show full text]
  • Download Play Store Nokia Lumia 520
    Download play store nokia lumia 520 LINK TO DOWNLOAD 11/1/ · HOW To download play store on my Lumia This thread is locked. You can follow the question or vote as helpful, but you cannot reply to this thread. Apps Store: All In One App - Your Play Store AppApp Store: All in one app - Your Play store App: save-mobile RAM, memory, time. Free. How to Install apps - Download apps from the::Windows Phone Store:: Nokia / Lumia / Install apps Nokia Lumia Install apps - Nokia Lumia 1 Before you start Before downloading and installing apps on your Lumia, your Microsoft account must be activated. Nokia Lumia PC suite is going to be download from this page. Here is the solution to connect your Nokia Lumia to PC via USB data cable on your windows XP sp3,7,8,10 and Vista on the go. This is the best alternative to Nokia Ovi suite for Lumia which is enabling you to perform various tasks of your device model above mentioned very smartly. Download this app from Microsoft Store for Windows 10 Mobile, Windows Phone , Windows Phone 8. See screenshots, read the latest customer reviews, and compare ratings for Lumia Play to. Cómo instalar Google Play Store en el Nokia Lumia todo lo que debes saber si de verdad quieres encontrar una solución a este problema. 15/6/ · The Google Play Store Whether it is an application to root the Nokia Lumia , an app to generate a backup of the Nokia Lumia , or any other type of app, the procedure is generally the same.
    [Show full text]
  • Mobile Developer's Guide to the Galaxy
    Don’t Panic MOBILE DEVELOPER’S GUIDE TO THE GALAXY U PD A TE D & EX TE ND 12th ED EDITION published by: Services and Tools for All Mobile Platforms Enough Software GmbH + Co. KG Sögestrasse 70 28195 Bremen Germany www.enough.de Please send your feedback, questions or sponsorship requests to: [email protected] Follow us on Twitter: @enoughsoftware 12th Edition February 2013 This Developer Guide is licensed under the Creative Commons Some Rights Reserved License. Editors: Marco Tabor (Enough Software) Julian Harty Izabella Balce Art Direction and Design by Andrej Balaz (Enough Software) Mobile Developer’s Guide Contents I Prologue 1 The Galaxy of Mobile: An Introduction 1 Topology: Form Factors and Usage Patterns 2 Star Formation: Creating a Mobile Service 6 The Universe of Mobile Operating Systems 12 About Time and Space 12 Lost in Space 14 Conceptional Design For Mobile 14 Capturing The Idea 16 Designing User Experience 22 Android 22 The Ecosystem 24 Prerequisites 25 Implementation 28 Testing 30 Building 30 Signing 31 Distribution 32 Monetization 34 BlackBerry Java Apps 34 The Ecosystem 35 Prerequisites 36 Implementation 38 Testing 39 Signing 39 Distribution 40 Learn More 42 BlackBerry 10 42 The Ecosystem 43 Development 51 Testing 51 Signing 52 Distribution 54 iOS 54 The Ecosystem 55 Technology Overview 57 Testing & Debugging 59 Learn More 62 Java ME (J2ME) 62 The Ecosystem 63 Prerequisites 64 Implementation 67 Testing 68 Porting 70 Signing 71 Distribution 72 Learn More 4 75 Windows Phone 75 The Ecosystem 76 Implementation 82 Testing
    [Show full text]
  • Defendant Apple Inc.'S Proposed Findings of Fact and Conclusions Of
    Case 4:20-cv-05640-YGR Document 410 Filed 04/08/21 Page 1 of 325 1 THEODORE J. BOUTROUS JR., SBN 132099 MARK A. PERRY, SBN 212532 [email protected] [email protected] 2 RICHARD J. DOREN, SBN 124666 CYNTHIA E. RICHMAN (D.C. Bar No. [email protected] 492089; pro hac vice) 3 DANIEL G. SWANSON, SBN 116556 [email protected] [email protected] GIBSON, DUNN & CRUTCHER LLP 4 JAY P. SRINIVASAN, SBN 181471 1050 Connecticut Avenue, N.W. [email protected] Washington, DC 20036 5 GIBSON, DUNN & CRUTCHER LLP Telephone: 202.955.8500 333 South Grand Avenue Facsimile: 202.467.0539 6 Los Angeles, CA 90071 Telephone: 213.229.7000 ETHAN DETTMER, SBN 196046 7 Facsimile: 213.229.7520 [email protected] ELI M. LAZARUS, SBN 284082 8 VERONICA S. MOYÉ (Texas Bar No. [email protected] 24000092; pro hac vice) GIBSON, DUNN & CRUTCHER LLP 9 [email protected] 555 Mission Street GIBSON, DUNN & CRUTCHER LLP San Francisco, CA 94105 10 2100 McKinney Avenue, Suite 1100 Telephone: 415.393.8200 Dallas, TX 75201 Facsimile: 415.393.8306 11 Telephone: 214.698.3100 Facsimile: 214.571.2900 Attorneys for Defendant APPLE INC. 12 13 14 15 UNITED STATES DISTRICT COURT 16 FOR THE NORTHERN DISTRICT OF CALIFORNIA 17 OAKLAND DIVISION 18 19 EPIC GAMES, INC., Case No. 4:20-cv-05640-YGR 20 Plaintiff, Counter- DEFENDANT APPLE INC.’S PROPOSED defendant FINDINGS OF FACT AND CONCLUSIONS 21 OF LAW v. 22 APPLE INC., The Honorable Yvonne Gonzalez Rogers 23 Defendant, 24 Counterclaimant. Trial: May 3, 2021 25 26 27 28 Gibson, Dunn & Crutcher LLP DEFENDANT APPLE INC.’S PROPOSED FINDINGS OF FACT AND CONCLUSIONS OF LAW, 4:20-cv-05640- YGR Case 4:20-cv-05640-YGR Document 410 Filed 04/08/21 Page 2 of 325 1 Apple Inc.
    [Show full text]
  • Mobile at the Base of the Pyramid: Ghana, Mozambique, Nigeria, Zambia
    Mobile at the Base of the Pyramid: Ghana, Mozambique, Nigeria, Zambia Growing Innovation ©2014 infoDev / The World Bank | 1818 H Street, NW | Washington DC, 20433 Email: [email protected] | Tel + 1 202 458 8831 | Twitter: @infoDev www.infodev.org Mobile 99066_Mobile_Cover.indd066_Mobile_Cover.indd 1 88/26/14/26/14 110:150:15 AAMM Mobile at the Base of the Pyramid: Ghana, Mozambique, Nigeria, Zambia Summary Report Mobile 99066_MobileAtBaseOfPyramid.indd066_MobileAtBaseOfPyramid.indd i 88/26/14/26/14 110:110:11 AAMM © 2014 International Bank for Reconstruction and Development / The World Bank Mailing Address: MSN I9-900 1818 H St. NW, Washington D.C., 20433 USA Telephone: (+1) 202-458-4070 Website: www.infoDev.org Email: [email protected] Twitter: @infoDev Facebook: /infoDevWBG Some rights reserved. This work is a product of the staff of infoDev / World Bank. Note that the World Bank does not necessarily own each component of the content included in the work. The World Bank therefore does not warrant that the use of the content contained in the work will not infringe on the rights of third parties. The risk of claims resulting from such infringement rests solely with you. The findings, interpretations, and conclusions expressed in this work do not necessarily reflect the views of the donors of infoDev, The World Bank, its Board of Executive Directors, or the governments they represent. The World Bank does not guarantee the accuracy of the data included in this work. The boundaries, colors, denominations, and other information shown on any map in this work do not imply any judgment on the part of The World Bank concerning the legal status of any territory or the endorsement or acceptance of such boundaries.
    [Show full text]
  • Padrão (Template) Para Submissão De Trabalhos Ao
    Intercom – Sociedade Brasileira de Estudos Interdisciplinares da Comunicação XXXVII Congresso Brasileiro de Ciências da Comunicação – Foz do Iguaçu, PR – 2 a 5/9/2014 Serviços de rádio social, novos intermediários da indústria da música1 Marcelo KISCHINHEVSKY2 Luiza Borges CAMPOS3 Universidade do Estado do Rio de Janeiro (UERJ) Resumo O presente trabalho busca sistematizar reflexões preliminares decorrentes de pesquisa exploratória sobre a reconfiguração das indústrias da radiodifusão sonora e fonográfica num cenário de convergência midiática e de expansão de grandes plataformas digitais de produção, distribuição e circulação de áudio. O foco recai sobre os principais serviços internacionais de rádio social, que se apresentam como novos intermediários dos negócios da música, articulando web rádios, podcasts e sofisticados sistemas de streaming. Interessa- nos particularmente a arquitetura de interação destes portais, entendidos como atores centrais desse rádio expandido, um meio híbrido que, progressivamente, vem se amalgamando a outros segmentos das indústrias culturais, como as mídias sociais. Palavras-chave: Comunicação; Rádio Social; Indústria Fonográfica; Indústria da Radiodifusão Sonora; Interações Novos hábitos de escuta Ao longo de grande parte do século XX, os mais diversos segmentos sociais sintonizavam emissoras de rádio, sobretudo em Frequência Modulada, quando queriam ouvir música. As FMs musicais, consolidadas no Brasil entre os anos 1970 e 1980, constituíam lugar privilegiado de escuta, servindo à indústria fonográfica
    [Show full text]
  • Tesis De Maestria
    MAESTRIA EN GESTIÓN DE SERVICIOS TECNOLÓGICOS Y TELECOMUNICACIONES TESIS DE MAESTRIA Título: APLICACIONES MÓVILES La evolución en la adopción de aplicaciones móviles y su relación con el parque de dispositivos. Descripción y análisis de las curvas de descargas de aplicaciones móviles y su acelerado crecimiento en comparación con las curvas de penetración de los dispositivos móviles y su conexión a Internet en Argentina entre 2008 y 2013. Maestrando: Ing. Nicolás A. Ursino Director de Tesis: Dr. Alejandro Prince Buenos Aires – Junio 2014 “Te despiertas y ves tú email en tu iPad. Es una app. Durante el desayuno te conectas a Facebook, Twitter y The New York Times en el mismo dispositivo. Más Apps. De camino a la oficina escuchas un podcast a través de tu Smartphone. Otro App. En el trabajo lees tus feeds RSS y hablas por Skype y mensajería instantáneas. Al final del día llegas a casa, haces la cena y escuchas música en Pandora, juegas en Xbox Live y ves una película en el servicio de streaming de NetFlix. Acabas de pasar un día en Internet, pero no has utilizado la Red. No estás solo”. ANDERSON, CHRIS. 2010. The Web Is Dead. Long Live the Internet. Nicolás A. Ursino Aplicaciones Móviles 2 INDICE 1. AGRADECIMIENTOS ........................................................................................................... 5 2. TÍTULO. .............................................................................................................................. 6 2.1. PALABRAS CLAVES.....................................................................................................
    [Show full text]
  • OCG Journal Ausgabe 2/2015
    Ausgabe 02 • 2015 I Jg. 40 I EUR 5,00 P.b.b. Verlagspostamt 1010 Wien I 02Z031460M 1010 Wien I 02Z031460M Verlagspostamt P.b.b. Musik und digitale Musik- Musik und digitale Musikwirtschaft 2015: wirtschaft OCG Journal Ausgabe 02 NEUERSCHEINUNGEN in der OCG Schriftenreihe In Memoriam Heinz Zemanek Hinter allen Ehrungen, Laudationes, Lebensläufen und Memora- Es ist nicht verwunderlich, dass fast jeder Beitrag mehreren Katego- bilien einer großen öffentlichen Persönlichkeit wie Prof. Heinz Ze- rien zugeordnet werden kann – ein Phänomen typisch für Zemaneks manek steht immer auch der Mensch. Diese Sicht kommt leider Vernetzung und Interdisziplinarität. manchmal zu kurz. Die Beiträge wurden praktisch unredigiert übernommen, auch In- formations-Redundanz zwischen den Beiträgen wurde bewusst Mit diesem Erinnerungsband wollen die Herausgeber genau diese belassen. Sicht auf eine faszinierende Persönlichkeit für die Nachwelt erhal- ten: seine Internationalität, seine starke Vernetzung, seine Men- Die vorliegende Sammlung eröffnet eine Sicht auf den Menschen schenfreundlichkeit und Lebensphilosophie und auch seine Schlag- Heinz Zemanek, die oft vergessen wird, aber von den Personen in fertigkeit. seinem Umfeld immer besonders geschätzt wurde. Freunde, Mitarbeiter, Wegbegleiter und Bekannte schrieben Beiträ- ge, die sich, ohne scharfe Trennung und mit vielen Überlappungen, in folgende Kategorien einteilen lassen: IN MEMORIAM • Gemeinsame Zeit in der OCG (Österreichische Computer Gesell- schaft) und IFIP (International Federation for Information
    [Show full text]
  • E-Book E Web 2.0 No Setor Editorial Em Portugal E Brasil
    FACULTAD DE TRADUCCIÓN Y DOCUMENTACIÓN E-Book e Web 2.0 no setor editorial em Portugal e Brasil Tesis doctoral Jorge Manuel dos Santos Gonçalves Salamanca 2014 UNIVERSIDAD DE SALAMANCA Facultad de Traducción y Documentación Doctorado en Información y Documentación E-Book e Web 2.0 no setor editorial em Portugal e Brasil Tese a apresentar à Facultad de Traducción y Documentación da Universidad de Salamanca para obtenção do grau de doutor em Informação e Documentação Direção: José A. Cordón García Raquel Gómez Díaz Jorge S. Gonçalves Salamanca, 2014 Gonçalves, Jorge S. E-book e Web 2.0 no setor editorial em Portugal e Brasil / Tese a apresentar à Facultad de Traducción y Documentación da Universidad de Salamanca para obtenção do grau de doutor em Informação e Documentação ; direção, José A. Cordón García, Raquel Gómez Díaz. Salamanca : Universidad de Salamanca, Facultad de Traducción y Documentación, 2014 383 p. ; il. ; 29,7 cm ; Portable Document Format (PDF) Tesis Doctoral. Univ. Salamanca 1. Setor editorial - Portugal. 2. Setor editorial - Brasil. 3. Livro eletrónico. 4. Web 2.0. 5. Edição digital. 6. Redes sociais I. Cordón García, José A. (dir.). II. Gómez Díaz, Raquel (dir.). III. Universidad de Salamanca (España). IV. Título. 655 025 681.4 José Antonio Cordón García y Raquel Gómez Díaz, profesores titulares de la Facultad de Traducción y Documentación de la Universidad de Salamanca y directores de la tesis doctoral titulada E-book e Web 2.0 no setor editorial em Portugal e Brasil: Certifican que Jorge Manuel dos Santos Gonçalves ha trabajado bajo su orientación en la elaboración de la tesis doctoral titulada E-book e Web 2.0 no setor editorial em Portugal e Brasil.
    [Show full text]
  • Microsoft Windows (Phone)
    Laat ons weten wat u vindt van deze sessie! Vul de evaluatie in via www.techdaysapp.nl en maak kans op een van de 20 prijzen*. Prijswinnaars worden bekend gemaakt via Twitter (#TechDaysNL). Gebruik hiervoor de code op uw badge. Let us know how you feel about this session! Give your feedback via www.techdaysapp.nl and possibly win one of the 20 prizes*. Winners will be announced via Twitter (#TechDaysNL). Use your personal code on your badge. * Over de uitslag kan niet worden gecorrespondeerd, prijzen zijn voorbeelden – All results are final, prices are examples Application deployment across several devices with ConfigMgr 2012 R2 Kenneth van Surksum & Peter Daalmans Agenda •Introduction •Microsoft’s Cross Plaform Architecture •Enrollment •Deployment Types for Mobile Applications •Settings Management Introduction Who we are Kenneth van Surksum Consultant at itgration Microsoft MVP for 3 yrs, vExpert for 2 yrs Authoring: • Contributor System Center 2012 Configuration Manager Unleashed • Contributor System Center 2012 R2 Configuration Manager Unleashed • Contributor System Center 2012 R2 Service Manager Unleashed • Co-Author Mastering Windows 7 Deployment Communities: • Co-founder WMUG NL (http://wmug.nl) • Founder and Blogger www.vansurksum.com • Chief Editor at virtualization.info en cloudcomputing.info Speaker: • Microsoft Techdays • Microsoft Management Summit Follow me: @kennethvs / www.vansurksum.com Who we are Peter Daalmans Senior Technical Consultant at IT-Concern 3 year Microsoft MVP: Enterprise Client Management (ConfigMgr and Windows Intune) Author: • Mastering System Center 2012 Configuration Manager • Mastering System Center 2012 R2 Configuration Manager Communities: • Co-founder WMUG NL (http://wmug.nl) • Founder and Blogger ConfigMgrBlog.com Speaker: • Spoke on several events like TechDays Netherlands, ExpertsLive, User Group meetings, TechEd New Zealand and TechEd Australia.
    [Show full text]
  • App Stores & ISO/IEC 25000: Product Certification at Last?
    App Stores & ISO/IEC 25000: Product Certification at Last? John Estdale IT Architecture Specialists Ltd, The Springers, Broadlayings, Woolton Hill, NEWBURY [email protected] Abstract The idea that software products could usefully be assessed and certified by an independent 3rd party organisation has been around for many years. Back in the 1990s, the European Union’s ESPRIT II program proposed investigating the feasibility of a programme for the European certification of software quality, to support certific- ation schemes for industries such as rail and motor manufacture. Unfortunately commercial success seems to have eluded them. Second party certification is more common. Many supplier organisations go to Microsoft to endorse devices as “Certified for Windows”, and software as “Windows n Compatible” or “Certified for Windows Server yyyy”. But the world has moved on. According to one survey there are now 81 different smartphone App Stores, with varying kinds of ‘quality promise’. This paper compares the requirements of the Apple App Store, and the Microsoft Windows Store, with the software quality model in the relevant International Standard series ISO/IEC 25000, for Systems and software Quality Requirements and Evaluation (SQuaRE), and uses them to identify some strengths and weaknesses of this quality model. Keywords: Software certification, software product quality, Quality Model, ISO 25000, SQuaRE, App Stores 1.0 Introduction Software products are initially considered for purchase based on their expected usefulness: their user-visible functions and features. Inevitably they will have practical limitations, in reliability, capacity, performance, maintainability, etc, informally summarised as their Non-functional attributes or ‘quality’. The idea of independent assessment and certification to assist acquirers is attractive.
    [Show full text]
  • Gaikai - Wikipedia Case 3:19-Cv-07027-WHA Document 28-2 Filed 10/14/19 Page 2 of 8 Not Logged in Talk Contributions Create Account Log In
    Case 3:19-cv-07027-WHA Document 28-2 Filed 10/14/19 Page 1 of 8 EXHIBIT B Gaikai - Wikipedia Case 3:19-cv-07027-WHA Document 28-2 Filed 10/14/19 Page 2 of 8 Not logged in Talk Contributions Create account Log in Article Talk Read Edit View history Gaikai From Wikipedia, the free encyclopedia Main page Gaikai (外海, lit. "open sea", i.e. an expansive outdoor space) is an American company which provides technology for the streaming of high- Contents Gaikai Featured content end video games.[1] Founded in 2008, it was acquired by Sony Interactive Entertainment in 2012. Its technology has multiple applications, Current events including in-home streaming over a local wired or wireless network (as in Remote Play between the PlayStation 4 and PlayStation Vita), as Random article well as cloud-based gaming where video games are rendered on remote servers and delivered to end users via internet streaming (such as Donate to Wikipedia the PlayStation Now game streaming service.[2]) As a startup, before its acquisition by Sony, the company announced many partners using Wikipedia store [3] the technology from 2010 through 2012 including game publishers, web portals, retailers and consumer electronics manufacturers. On July Founded November 2008 Interaction 2, 2012, Sony announced that a formal agreement had been reached to acquire the company for $380 million USD with plans of establishing Headquarters Aliso Viejo, California, U.S. [4] Help their own new cloud-based gaming service, as well as integrating streaming technology built by Gaikai into PlayStation products, resulting Owner Sony [5] [6] About Wikipedia in PlayStation Now and Remote Play.
    [Show full text]