Comments
yourfanat wrote: I am using another tool for Oracle developers - dbForge Studio for Oracle. This IDE has lots of usefull features, among them: oracle designer, code competion and formatter, query builder, debugger, profiler, erxport/import, reports and many others. The latest version supports Oracle 12C. More information here.
Cloud Expo on Google News
SYS-CON.TV
Cloud Expo & Virtualization 2009 East
PLATINUM SPONSORS:
IBM
Smarter Business Solutions Through Dynamic Infrastructure
IBM
Smarter Insights: How the CIO Becomes a Hero Again
Microsoft
Windows Azure
GOLD SPONSORS:
Appsense
Why VDI?
CA
Maximizing the Business Value of Virtualization in Enterprise and Cloud Computing Environments
ExactTarget
Messaging in the Cloud - Email, SMS and Voice
Freedom OSS
Stairway to the Cloud
Sun
Sun's Incubation Platform: Helping Startups Serve the Enterprise
POWER PANELS:
Cloud Computing & Enterprise IT: Cost & Operational Benefits
How and Why is a Flexible IT Infrastructure the Key To the Future?
Click For 2008 West
Event Webcasts
Linux Solution Tackles iPhone AJAX Security
iPhone, whatever its sales, was disruptive from the moment Steve Jobs first showed it off in January

iPhone, whatever its sales, was disruptive from the moment Steve Jobs first showed it off in January.

It immediately started redefining the smartphone business and focused the attention of smartphone makers on the importance of software, according to serial entrepreneur Pauline Alker, the CEO of a la Mobile, the Venrock-backed developer of what is supposed to be the first Linux software stack for smart devices ready to deliver.

IPhone's pushing smartphones up the evolutionary ladder from voice-centric gadgets with limited data functions into sophisticated multimedia devices deploying a broad range of enterprise and consumer applications.

But the increased use of data-rich applications leaves mobile devices vulnerable to security threats - even the loss of a phone can represent a threat to the personal and corporate data stored on it.

According to In-Stat eight million phones will be lost this year including 700,000 smartphones.

So - to deal with this massive carelessness - the start-up just added a patent-pending Mobile Security Engine to its mobile phone operating system - called the Convergent Linux Platform - that provides enterprise-class security like sandboxing and an encrypted file system.

The widgetry, developed in-house, promises to protect against software threats and, since everything is encrypted, make a lost or stolen phone useless if tampered with and the data safe.

The pending patent, a la Mobile says, is focused on the location of the security technology - at the bootloader and kernel levels. The security isn't added on as an application. Instead it attacks the problem at the most fundamental layer of its OS platform.

Besides encryption, the widgetry ensures the integrity of the operating system against tampering through digital signature verification of the kernel at boot time.

It also "signs" all applications to protect against malware; only signed applications are given access to sensitive system operations like reading user data, placing calls or modifying system settings. And the firmware can't be updated without a signature either.

The Mobile Security Engine will be integrated in the Convergent Linux Platform, which otherwise provides the Linux kernel, all device drivers, middleware, browser, Java, Adobe Flash and a core suite of applications such as messaging, push-mail, VoIP, streaming multimedia and over-the-air firmware updating,

iPhone underscored the fact that all devices are not the same, which, Alker says, is the way Microsoft and its one-size-fits-all Windows Mobile platform, her main competitor, has been treating smartphones.

She, on the other hand, offers customization and configurability and if she doesn't have it, she'll go out and get it.

About iPhone News Desk
iPhone News Desk monitors the new world of the iPhone to present software developers and IT professionals with immediate updates on related technology advances, software and business trends, new products and standards in the iPhone and i-technology space.

In order to post a comment you need to be registered and logged in.

Register | Sign-in

Reader Feedback: Page 1 of 1

iPhone, whatever its sales, was disruptive from the moment Steve Jobs first showed it off in January. It immediately started redefining the smartphone business and focused the attention of smartphone makers on the importance of software, according to serial entrepreneur Pauline Alker, the CEO of a la Mobile, the Venrock-backed developer of what is supposed to be the first Linux software stack for smart devices ready to deliver. IPhone's pushing smartphones up the evolutionary ladder from voice-centric gadgets with limited data functions into sophisticated multimedia devices deploying a broad range of enterprise and consumer applications. But the increased use of data-rich applications leaves mobile devices vulnerable to security threats - even the loss of a phone can represent a threat to the personal and corporate data stored on it.


Your Feedback
iPhone News Desk wrote: iPhone, whatever its sales, was disruptive from the moment Steve Jobs first showed it off in January. It immediately started redefining the smartphone business and focused the attention of smartphone makers on the importance of software, according to serial entrepreneur Pauline Alker, the CEO of a la Mobile, the Venrock-backed developer of what is supposed to be the first Linux software stack for smart devices ready to deliver. IPhone's pushing smartphones up the evolutionary ladder from voice-centric gadgets with limited data functions into sophisticated multimedia devices deploying a broad range of enterprise and consumer applications. But the increased use of data-rich applications leaves mobile devices vulnerable to security threats - even the loss of a phone can represent a threat to the personal and corporate data stored on it.
Latest Cloud Developer Stories
Creating replica copies to tolerate a certain number of failures is easy, but very expensive at cloud-scale. Conventional RAID has lower overhead, but it is limited in the number of failures it can tolerate. And the management is like herding cats (overseeing capacity, rebuilds, ...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Ind...
"We're developing a software that is based on the cloud environment and we are providing those services to corporations and the general public," explained Seungmin Kim, CEO/CTO of SM Systems Inc., in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the ...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relatio...
Leading companies, from the Global Fortune 500 to the smallest companies, are adopting hybrid cloud as the path to business advantage. Hybrid cloud depends on cloud services and on-premises infrastructure working in unison. Successful implementations require new levels of data mo...
Subscribe to the World's Most Powerful Newsletters
Subscribe to Our Rss Feeds & Get Your SYS-CON News Live!
Click to Add our RSS Feeds to the Service of Your Choice:
Google Reader or Homepage Add to My Yahoo! Subscribe with Bloglines Subscribe in NewsGator Online
myFeedster Add to My AOL Subscribe in Rojo Add 'Hugg' to Newsburst from CNET News.com Kinja Digest View Additional SYS-CON Feeds
Publish Your Article! Please send it to editorial(at)sys-con.com!

Advertise on this site! Contact advertising(at)sys-con.com! 201 802-3021



SYS-CON Featured Whitepapers
ADS BY GOOGLE