Towards an Operating System for the Campus

Total Page:16

File Type:pdf, Size:1020Kb

Towards an Operating System for the Campus Towards an Operating System for the Campus Pengfei Yuan, Yao Guo, and Xiangqun Chen Key Laboratory of High-Confidence Software Technologies (Ministry of Education) School of Electronics Engineering and Computer Science, Peking University {yuanpf12, yaoguo, cherry}@sei.pku.edu.cn ABSTRACT data center or even the whole Internet as a computer, we can Almost every computing device runs an operating system, envision that many applications are \actually" running on which is responsible for managing different resources on the network of computers. Consequently, many researchers the device and providing higher-level programming abstrac- have proposed various operating systems for cloud or even tions. This paper proposes CampusOS, an operating system the Internet. For example, Tim O'Reilly proposed his vision which is responsible for managing networked resources on of an Internet Operating System [7]. At the same time, university campuses, including data of students, teachers, many other operating systems have been proposed for cloud courses, organizations, and even data generated from users' computing [10], networked home appliances [3], commercial computing devices. CampusOS provides flexible support for buildings [2], and even connected city blocks [4]. campus application development with SDKs consisting of In contrast, this paper focuses on the evolvement of campus-related APIs. CampusOS features and SDK APIs applications and services running on closely-connected com- can also be extended by developers easily. We discuss the munities such as a university campus, especially mobile design of CampusOS, as well as its challenges. applications targeting community members and activities. Developing applications for communities like university cam- puses requires a lot of trivial work. A developer would Categories and Subject Descriptors typically need to figure out how to retrieve and manage D.2.2 [Software Engineering]: Design Tools and Tech- users' personal information, schedules, social relations, etc. niques|software libraries; D.4 [Operating Systems]: Or- Large amount of time is spent on these lower-level details, ganization and Design instead of focusing on implementing and improving the key functionalities of the applications. For a closely-connected community such as a university General Terms or a similar organization, different applications have much Design, Management in common at the lower level. Providing higher-level APIs for commonly used lower-level features can improve the Keywords development process significantly. For example, identifying a specific place (such as a building on campus) with a Internet operating system, Middleware, Campus application smartphone requires access to the sensors on the device development, Internetware and the campus building layout information, as well as a positioning algorithm. As many campus applications 1. INTRODUCTION will require the same identification feature, we can provide Operating systems are running on almost all modern common APIs or services for outdoor (or even indoor) computing devices, such as PCs, smartphones, embedded location identification, such that all location-based campus systems and even sophisticated sensors. The key function- applications do not need to reinvent the wheel. alities of an operating system are managing various kinds In order to support the existing (and emerging) appli- of resources (CPU, storage, peripherals, etc.) and providing cations on campus, we argue that an operating system programming and runtime support. is needed to provide sufficient support during application With the prevalence of the Internet, many computers are development, deployment, execution and maintenance. We connected together, forming a grid or cloud, in order to design CampusOS as an open, community-oriented operat- support more complex applications. If we treat a cluster, a ing system for university campuses. Just like traditional operating systems, CampusOS provides programming inter- faces, libraries, and runtime management of applications, although at a higher level. Many components of CampusOS Permission to make digital or hard copies of all or part of this work for depend on traditional operating systems like Windows and personal or classroom use is granted without fee provided that copies are Linux, as well as networked resources in the cloud and on not made or distributed for profit or commercial advantage and that copies the Internet. bear this notice and the full citation on the first page. To copy otherwise, to Many people may wonder why we need another operating republish, to post on servers or to redistribute to lists, requires prior specific system as many features provided by CampusOS can be permission and/or a fee. Internetware ’13 October 23–24 2013, Changsha, China implemented separately. We illustrate the necessity of an Copyright 2013 ACM 978-1-4503-2369-7/13/10 ...$15.00. operating system, as well as the contributions of CampusOS, from the following aspects. Service Campus Campus Application • CampusOS can provide support for students who are Daemon Store App Development interested in building personalized applications and Client excited to share them with friends. CampusOS SDK • CampusOS can provide support for courseware and Feature Service Driver Development course-related applications with course-specific cus- Server tomizations. • CampusOS can help manage different communities on CampusOS Core System campus, such as student union, student clubs, interest Development groups, sports teams, etc. • CampusOS can also serve as a research platform Figure 1: The development architecture of Cam- where researchers can distribute applications for ex- pusOS perimental purposes and collect user information with permission. CampusOS belongs to a larger ongoing project, in which we are constructing a prototype of an Internet operating system, which is a development and runtime supporting Service Interface …… Service Interface environment for Internetware [5, 6]. Syscall over Network CampusOS SDK Network Communication 2. CAMPUSOS DESIGN Network We adopt a hierarchical architecture in CampusOS, which Network Communication is similar to traditional operating systems. In this section, Syscall over Network & Dispatcher CampusOS Core we first present our design goal to make CampusOS an open VFS Dispatcher and extensible ecosystem. Then we describe the specific Service Driver …… Service Driver design of CampusOS. Underlying Implementation 2.1 Goal CampusOS is intended to serve as an open platform Figure 2: The runtime architecture of CampusOS for campus applications, which means that not only can developers publish new applications to CampusOS, but they can also add new features to CampusOS. CampusOS is computing platforms in CampusOS, the CampusOS SDK designed with the principle of extensibility in mind, such supports multiple programming languages, such as C, C++, that new features can be easily added into it. When some Java, C#, JavaScript, etc. developers come up with interesting new features, they can For better extensibility, we adopt two abstractions that choose to share the features with other developers by adding are originated from traditional operating systems and use them to CampusOS. With more and more features added them in CampusOS. One is the system call (syscall) and the into CampusOS, more complex campus applications can other is the virtual file system (VFS). be built, which will in turn attract more users and more Figure 2 shows the hierarchical runtime architecture of developers, thus forming an ecosystem. CampusOS. It illustrates the relation between the Cam- Besides its open and extensible characteristics, Cam- pusOS SDK and the CampusOS Core. The top layer pusOS supports multiple computing platforms to better consists of various service interfaces, which provide campus adapt to the development and deployment of campus ap- applications with APIs for accessing various features. The plications, including traditional PCs, smartphones, tablet service interfaces invoke CampusOS syscalls, which are computers and web browsers. In the meanwhile, CampusOS encoded and passed to the CampusOS Core via network. should protect the security and privacy of users' data against The CampusOS Core running on the server side accepts attackers and malicious campus applications. syscalls, decodes and dispatches them accordingly. The VFS layer maps service interfaces to their corresponding service 2.2 Architecture drivers. This mapping actually correlates feature invoca- Figure 1 shows the hierarchical development architecture tions in campus applications to feature implementations in of CampusOS. The bottom layer is the CampusOS Core CampusOS. and the underlying implementations of the whole system. This layer corresponds to the development of the CampusOS 2.3 Feature Extension system. The middle layer consists of service drivers on the In our design, CampusOS features are attached to VFS server side and the CampusOS SDK and service daemons on nodes and accessed via syscalls. In this way, we achieve the client side. This layer corresponds to the development the principle of extensibility. On the one hand, we provide and extension of CampusOS features. The top layer is uniform interfaces for accessing different features in the based on the CampusOS SDK, including CampusStore and CampusOS SDK. On the other hand, we provide a general campus applications. The development of various campus approach to organizing different CampusOS features. In applications belongs to this layer. short,
Recommended publications
  • Ebook - Informations About Operating Systems Version: August 15, 2006 | Download
    eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org AIX Internet: AIX AmigaOS Internet: AmigaOS AtheOS Internet: AtheOS BeIA Internet: BeIA BeOS Internet: BeOS BSDi Internet: BSDi CP/M Internet: CP/M Darwin Internet: Darwin EPOC Internet: EPOC FreeBSD Internet: FreeBSD HP-UX Internet: HP-UX Hurd Internet: Hurd Inferno Internet: Inferno IRIX Internet: IRIX JavaOS Internet: JavaOS LFS Internet: LFS Linspire Internet: Linspire Linux Internet: Linux MacOS Internet: MacOS Minix Internet: Minix MorphOS Internet: MorphOS MS-DOS Internet: MS-DOS MVS Internet: MVS NetBSD Internet: NetBSD NetWare Internet: NetWare Newdeal Internet: Newdeal NEXTSTEP Internet: NEXTSTEP OpenBSD Internet: OpenBSD OS/2 Internet: OS/2 Further operating systems Internet: Further operating systems PalmOS Internet: PalmOS Plan9 Internet: Plan9 QNX Internet: QNX RiscOS Internet: RiscOS Solaris Internet: Solaris SuSE Linux Internet: SuSE Linux Unicos Internet: Unicos Unix Internet: Unix Unixware Internet: Unixware Windows 2000 Internet: Windows 2000 Windows 3.11 Internet: Windows 3.11 Windows 95 Internet: Windows 95 Windows 98 Internet: Windows 98 Windows CE Internet: Windows CE Windows Family Internet: Windows Family Windows ME Internet: Windows ME Seite 1 von 138 eBook - Informations about Operating Systems Version: August 15, 2006 | Download: www.operating-system.org Windows NT 3.1 Internet: Windows NT 3.1 Windows NT 4.0 Internet: Windows NT 4.0 Windows Server 2003 Internet: Windows Server 2003 Windows Vista Internet: Windows Vista Windows XP Internet: Windows XP Apple - Company Internet: Apple - Company AT&T - Company Internet: AT&T - Company Be Inc. - Company Internet: Be Inc. - Company BSD Family Internet: BSD Family Cray Inc.
    [Show full text]
  • Hacker Poderá Me Invadir Se O Computador Não Estiver Conectado À Internet?
    Cartilha de Segurança para Internet 16deoutubrode2000 Resumo Esta cartilha destina-se aos usuários finais com pouco ou nenhum co- nhecimento a respeito da utilização da Internet. Como tais usuários não possuem conhecimentos dos termos técnicos normalmente empregados pe- los profissionais da área de informática, usou-se uma linguagem não-técnica neste texto. A idéia desta cartilha é dar ao usuário iniciante uma visão geral dos con- ceitos mais básicos de segurança. Sumário 1 Introdução 3 2 Senhas 3 2.1 Como escolher uma boa senha? ................... 3 2.2 Com que freqüência devo mudar minha senha? .......... 4 2.3 Quantas senhas diferentes devo usar? ................ 4 3 Problemas Usuais de Segurança 5 3.1 Engenharia Social .......................... 5 3.2 Cavalos de Tróia .......................... 5 3.2.1 Como meu computador pode ser infectado por um Cavalo de Tróia? .......................... 5 3.2.2 O que um Cavalo de Tróia pode fazer em meu computador? 6 3.2.3 O hacker poderá me invadir se o computador não estiver conectado à Internet? .................... 6 3.2.4 O computador pode ser infectado por um Cavalo de Tróia sem que se perceba? .................... 6 3.2.5 Como posso saber se o computador está infectado? . 6 3.2.6 Como proteger o computador dos Cavalos de Tróia? . 6 3.3 Backdoors .............................. 7 3.3.1 Como se prevenir dos Backdoors? ............. 7 3.4 Vírus ................................ 7 1 3.4.1 Como o computador é infectado por um Vírus? ...... 7 3.4.2 O que os Vírus podem fazer no computador? ....... 8 3.4.3 O computador pode ser infectado por um Vírus sem que se perceba? .........................
    [Show full text]
  • Structuring the Smartphone Industry: Is the Mobile Internet OS Platform the Key?
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Kenney, Martin; Pon, Bryan Working Paper Structuring the smartphone industry: Is the mobile internet OS platform the key? ETLA Discussion Papers, No. 1238 Provided in Cooperation with: The Research Institute of the Finnish Economy (ETLA), Helsinki Suggested Citation: Kenney, Martin; Pon, Bryan (2011) : Structuring the smartphone industry: Is the mobile internet OS platform the key?, ETLA Discussion Papers, No. 1238, The Research Institute of the Finnish Economy (ETLA), Helsinki This Version is available at: http://hdl.handle.net/10419/44498 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen
    [Show full text]
  • Underware: an Exokernel for the Internet?
    Underware: An Exokernel for the Internet? David Irwin, Jeff Chase, Laura Grit, Aydan Yumerefendi, and Jeannie Albrecht‡ DukeUniversity UniversityofCalifornia,SanDiego‡ {irwin,chase,grit,aydan}@cs.duke.edu,[email protected] Abstract distributed computing The principles for designing and building shared dis- environments tributed computing environments are still evolving: to- Other Internet-scale PlanetLab services day, there exist a myriad of environments targeting dif- Globus Grid Environments ferent applications serving different user communities. visible allocation and revocation NSF’s GENI initiative proposes a new shared environ- control plane ment to serve as an open testbed for designing and build- Underware resource multiplexing ing a Future Internet. The design of GENI, along with resource virtualization other distributed computing environments, must confront distributed hardware resources core OS issues of isolation, coordinated multiplexing of hardware resources, and abstractions for distributed com- Figure 1: Distributed computing environments, such as Planet- puting. This paper draws parallels to the extensible OS Lab and Globus Grids, are built above machine-level resource “kernel wars” of the past, and considers how architec- abstractions obtained from infrastructure providers through the tural lessons from that time apply to an Internet OS. Our underware control plane. view echoes, in key respects, the principles of Exokernel a decade ago: the common core of an Internet OS should of Internet computing today is analogous in key ways. concern itself narrowly with physical resource manage- There are multiple existing platforms for resource shar- ment. We refer to this common core as underware to ing and distributed computing with large user communi- emphasize that it runs underneath existing programming ties (e.g., PlanetLab [5] and grid systems [13]).
    [Show full text]
  • INTERNET EXPLORER 11–ALUNO Educação Profissional
    Qualifi cação Profi ssional cação Profi Qualifi INTERNET EXPLORER 11 – ALUNO PARA PESSOAS COM DEFICIÊNCIA VISUAL Educação Profissional Internet Explorer 11 Para pessoas com deficiência visual Educação Profissional Manual do Monitor Copyright © 2017 by Fundação Bradesco Direitos desta edição: Fundação Bradesco Homepage: www.fb.org.br Conteúdos Originais: Internet e Outlook: Felix de Sena Silva InfoServer Vitual Vision: MicroPower Comércio e Desenvolvimento de Software Ltda. Revisão técnica, pedagógica, adaptações e Departamento de Educação Profi ssional e Educação de metodologia de ensino: Jovens e Adultos Gina Ester Leôncio Coordenação: Departamento de Educação Profi ssional e Educação de Jovens e Adultos Rosa Maria Pires Bueno Allyson Luiz de Cayres Lino Projeto gráfi co: Departamento Administrativo e Financeiro Relações Institucionais – Produção Editorial Revisão textual: Three-R Editora e Comunicação Ltda. Me Publicação: 2017 Virtual Vision 8, Windows 7, Outlook 2013 e Internet Explorer 11 : monitor para pessoas com defi ciência visual : educação profi ssional : manual do monitor / Felix de Sena Silva, InfoServer. -- Osasco, SP : Fundação Bradesco, 2017. Bibliografi a. 1. Defi cientes visuais - Educação 2. Educação especial 3. Educação inclusiva 4. Informática 5. Informática e defi cientes visuais 6. Professores - Formação I. Silva, Felix de Sena. II. InfoServer. 16-02004 CDD-371.911 Índices para catálogo sistemático: 1. Defi cientes visuais e informática : Educação especial 371.911 2. Informática e defi ciência visual : Educação especial 371.911 Reservados à Fundação Bradesco todos os direitos patrimoniais, de reprodução, publicação e compartilhamento do conteúdo na internet e nas redes sociais. Venda proibida. Apresentação Seja bem-vindo ao Internet Explorer 11! O Internet Explorer 11 é um programa para navegação na Web.
    [Show full text]
  • IPG AMS LES MF Datasheet
    Datasheet HP LaserJet Managed Flow MFP E72535z - Speed 35 ppm Businesses that stay ahead don’t slow down. It’s why HP built the next generation of HP LaserJet MFPs—to power productivity with a streamlined design that delivers premium quality, maximum uptime, and the strongest security.1 Print Speed:Up to 35 ppm black; First Page Out: As fast as High quality, low cost 7.6 sec black ● Print premium, professional-quality documents with sharp text and crisp graphics for a low cost. Print Resolution:Black (best): Up to 1200 x 1200 dpi reduced speed; Color (best): Up to 600 x 600 dpi ● Get consistent, professional quality and performance you count on with Original HP toner cartridges and Standard Connectivity:2 Hi-Speed USB 2.0 Host; 1 Hi-Speed drums. USB 2.0 Device; 1 Gigabit Ethernet 10/100/1000T network; ● 1 Hardware Integration Pocket; 1 Fax modem port Choose from a range of modular accessories designed to adapt to the needs of workgroups of all sizes. Standard Memory:Standard: 7 GB; Maximum: 7 GB Mobile Printing Capability:Yes Minimal interruptions. Maximum uptime. Paper Handling:100-sheet multi-purpose tray, 2 x ● Avoid interruptions with an HP LaserJet Managed MFP designed to be streamlined for maximum 520-sheet input tray, 520-sheet input tray, 250 sheet ADF; productivity. 500 sheet face-down output bin ● Display:8.0-in (20.3 cm) touchscreen, SVGA Color Graphic Tailor this MFP to the needs of your business with a wide range of paper-handling accessories. Display (CGD) ● Scan files directly to Microsoft® Office 365 and SharePoint, plus email, USB, and network folders.2 ● Grab pages and go, without waiting.
    [Show full text]
  • Aula 00 Informática P/ PC-CE (Escrivão) - 2021 - Pré-Edital
    Aula 00 Informática p/ PC-CE (Escrivão) - 2021 - Pré-Edital Autor: Diego Carvalho, Equipe Informática e TI, Renato da Costa Aula 00 01 de Fevereiro de 2021 Aula Demonstrativa Diego Carvalho, Equipe Informática e TI, Renato da Costa Aula 00 Sumário Navegadores .............................................................................................................................................. 4 1 – Conceitos Básicos ............................................................................................................................ 4 2 – Interface Gráfica ............................................................................................................................... 9 2.1 – Barra de Guias/Abas ................................................................................................................. 9 2.2 – Barra de Navegação ............................................................................................................... 11 2.3 – Barra de Menu ......................................................................................................................... 13 2.4 – Barra de Favoritos ................................................................................................................... 14 2.5 – Barra de Status ........................................................................................................................ 16 3 – Funcionalidades Comuns .............................................................................................................
    [Show full text]
  • The Open Source Paradigm Shift
    The Open Source Paradigm Shift Tim O’Reilly O’Reilly & Associates, Inc. www.oreilly.com June 2003 Paradigm Shift A change in world view that calls everything you know into question The PC Paradigm Shift (Hardware) • Commodity hardware with an open architecture – IBM beats Apple • Low cost and a pure play commodity hardware business model beat proprietary add-ons – Dell beats IBM and Compaq • Companies stuck in the old paradigm die off: Digital, Data General, Prime • Even open architectures have proprietary components – Intel Inside® The PC Paradigm Shift (Software) • Software decoupled from hardware • Lock-in and competitive advantage move to software – Microsoft beats IBM Paradigm Failure at Work! • Linux critic: “There are no user-friendly applications on Linux” • Linux advocate: Have you seen the latest release of Gnome, OpenOffice, or the Gimp? What's being missed here? User Friendly Applications on Linux What’s Wrong with This Picture? • These applications are being created by open source developers and run on an open source platform, but… – Source code is not distributed (and it wouldn't be useful to many developers if it were) – Licenses triggered by binary software distribution have no effect – The value in these applications is in their data and their customer interactions more than in their software – Most are fiercely proprietary The Internet Paradigm Shift • Commodity software with an open architecture • Information applications decoupled from both hardware and software • Competitive advantage and revenue opportunities move "up the stack" to services above the level of a single device. • Lock in is based on data and customer relationships, not proprietary software • Intel is still Inside, but so is Cisco, and eventually others -- there's plenty of room at the bottom as well as at the top “I’m an inventor.
    [Show full text]
  • Rise and Fall of Platforms: Systematic Analysis Of
    21ST INTERNATIONAL CONFERENCE ON ENGINEERING DESIGN, ICED17 21-25 AUGUST 2017, THE UNIVERSITY OF BRITISH COLUMBIA, VANCOUVER, CANADA RISE AND FALL OF PLATFORMS: SYSTEMATIC ANALYSIS OF PLATFORM DYNAMICS THANKS TO AXIOMATIC DESIGN Legrand, Julien; Thomas, Maxime; Le Masson, Pascal; Weil, Benoît MINES ParisTech, France Abstract While platforms are multiplying across industries, the laws governing their dynamic are still poorly understood. The high diversity of disciplines covering the topic, spanning from strategy management to engineering design, made it difficult for any new model to integrate the numerous phenomena at stakes. In a new effort to bring them together, we exhibit Suh’s Axiomatic Design as an ideal framework to systematically analyse platforms dynamics when market and technology forces meet and interact. Exporting the current description of platforms from Design Structure Matrices to Design Matrices, our research enables us to systematically explore platforms potential evolutions. While the model leads us to rediscover classical behaviours, it also uncovers new results, such as situations of split leadership and platform overthrow, in which complementors challenge the platform leader. Both can be linked to two necessary conditions: functional generativity and technical genericity. We then identify those behaviours in several cases. Keywords: Platform strategies, Design engineering, Market implications, Design theory, Innovation Contact: Julien Legrand MINES ParisTech CGS France [email protected] Please cite this paper as:
    [Show full text]
  • Android and the Demise of Operating System-Based Power: Firm Strategy and Platform Control in the Post-PC World
    Telecommunications Policy 38 (2014) 979–991 Contents lists available at ScienceDirect Telecommunications Policy URL: www.elsevier.com/locate/telpol Android and the demise of operating system-based power: Firm strategy and platform control in the post-PC world Bryan Pon a,n, Timo Seppälä b, Martin Kenney c a Geography Graduate Group, University of California, Davis, Davis, CA 95616, USA b Department of Industrial Engineering and Management, Aalto University and the Research Institute of the Finnish Economy, Helsinki, Finland c Community and Regional Development Unit, University of California, Davis, Davis, CA 95616, USA article info abstract Available online 30 June 2014 The emergence of new mobile platforms built on Google's Android operating system “ ” Keywords: represents a significant shift in the locus of the platform bottleneck, or control point, in Smartphone the mobile industry. Using a case study approach, this paper examines firm strategies in a Platform market where the traditional location of the ICT platform bottleneck—the operating Bottleneck system on a device—is no longer the most important competitive differentiator. Instead, each of the three firms studied has leveraged different core competencies to build complementary services in order to control the platform and lock-in users. Using platform theories around bottlenecks and gatekeeper roles, this paper explores these strategies and analyzes them in the broader context of the changing mobile industry landscape. & 2014 Elsevier Ltd. All rights reserved. 1. Introduction
    [Show full text]
  • Market Study Into Mobile App Stores
    Public Report Market study into mobile app stores The Netherlands Authority for Consumers & Markets Public Market study into mobile app stores Case no.: ACM/18/032693 / Date: 11 April, 2019 Table of contents Executive summary 3 Managementsamenvatting 9 1 Introduction 15 1.1 Reason for looking into mobile app stores 15 1.2 ACM’s perspective, public interests and the scope of this report 16 1.3 Methodology and structure of this report 17 2 The app-ecosystem 19 2.1 Online Platforms 19 2.2 The consumer 22 2.3 App providers 23 2.4 The app stores 26 2.5 Platform-ecosystems 30 2.6 Observations 38 3 Importance of the app stores 40 3.1 Bottleneck 40 3.2 Alternatives to apps 42 3.3 Alternatives to app stores 44 3.4 Alternative app-ecosystems 51 3.5 Bargaining Power 68 3.6 Future Developments 71 3.7 Observations 72 4 Conduct 74 4.1 Equal acCess to the end-user 74 4.2 In-app purchases 86 4.3 Transparency & liability 96 5 Public interests 101 5.1 Competitive markets 101 5.2 Safeguarding consumer interests 104 6 Findings and follow-up 106 6.1 Favouring own apps over apps from other providers 106 6.2 Unequal treatment of apps in general 107 6.3 Lack of transparency 107 6.4 Follow-up 108 Annex 1: Contacts (confidential) 109 2/109 The Netherlands Authority for Consumers & Markets Public Market study into mobile app stores Case no.: ACM/18/032693 / Date: 11 April, 2019 Executive summary For a Dutch version of this executive summary, see the next chapter.
    [Show full text]
  • Cartilha Internet Segura Informações E Orientações Para Você E Sua Família Utilizarem a Internet De Forma Segura
    CARTILHA INTERNET SEGURA INFORMAÇÕES E ORIENTAÇÕES PARA VOCÊ E SUA FAMÍLIA UTILIZAREM A INTERNET DE FORMA SEGURA. A INTERNET ESTÁ PRESENTE NO DIA-A-DIA, HOJE É MUITO DIFÍ- CIL IMAGINAR COMO SERIA A VIDA SEM PODER USUFRUIR DAS DIVERSAS FACILIDADES E OPORTUNIDADES TRAZIDAS POR ESTA TECNOLOGIA. POR MEIO DA INTERNET VOCÊ PODE: encontrar antigos amigos, fazer novas amizades, encontrar pessoas que compartilham seus gostos e manter contato com Introdução amigos e familiares distantes; acessar sites de notícias e de esportes, participar de cursos à Identificando distância, pesquisar assuntos de interesse e tirar dúvidas em listas de discussão; os riscos efetuar serviços bancários, como transferências, pagamentos de contas e verificação de extratos; fazer compras em supermercados e em lojas de comércio eletrônico, pesquisar preços e verificar a opinião de outras pessoas sobre os produtos ou serviços ofertados por uma determinada loja; acessar sites dedicados a brincadeiras, passatempos e histórias em quadrinhos, além de grande variedade de jogos, para as mais diversas faixas etárias; enviar a sua declaração de Imposto de Renda, emitir boletim de ocorrência, consultar os pontos em sua carteira de habilitação e agendar a emissão de passaporte; consultar a programação das salas de cinema, verificar a agenda de espetáculos teatrais, exposições e shows e adquirir seus ingressos antecipadamente; consultar acervos de museus e sites dedicados à obra de grandes artistas, onde é possível conhecer a biografia e as técnicas empregadas por cada um. 2 ESTES SÃO APENAS ALGUNS EXEMPLOS DE COMO VOCÊ PODE UTILIZAR pode ser usado para a divulgação de informações falsas, que podem A INTERNET PARA FACILITAR E MELHORAR A SUA VIDA.
    [Show full text]