SlideShare a Scribd company logo
Open Mobile Alliance 2011 Annual Release
Architecture, Security and Charging Categorization Based Content Screening Framework 1.0 Charging Data Elements 1.0 General Service Subscription Management 1.0 On-Board Key Generation 1.0 OMA Global Service Architecture 1.1  Smart Card Web Server 1.2
Person to Person Communications Mobile Email 1.0  Multimedia Messaging System 1.3 Presence Data Elements 1.2 Presence Data Elements 1.3 Push to talk Over Cellular 2.0  Push to talk Over Cellular 2.1
Devices Converged Personal Network Service 1.0 Data  Synchronisation  2.0 Delta Record Management Object 1.0 Device Profiles Evolution 1.0 Diagnostic  Monitoring 1.1 DM Scheduling 1.0 List of Supported Managed Objects 1.0 Look and Feel Customization 1.0 Software and Application Control MO 1.0  Software Component Management Object 1.1 Software Component Management Object 1.0
Access to Content Browsing 2.4 Browser Protocol Stack 1.0 Content Management Interface 1.0  Digital Rights Management 2.2 Download over the air 1.0 Dynamic Content Delivery 1.0 External Functionality Interface 1.0 Games Services Client/Server Interface 1.0 Mobile Augmented Reality 1.0 Push 2.1  Push 2.3 Push Security (Push 2.2) Push over SIP 1.0 Rich Media Environment 1.0 Rights Issuer Common Domain 1.0 Secure Content Exchange 1.0 Secure Removable Media 1.1 User Agent Profile 1.1
Service Access Interfaces Device Management Client-Side API Framework 1.0   RESTful binding OMA Push Access Protocol  1.0 RESTful bindings Parlay X Web Services, part 2 RESTful Network API Device Capabilities 1.0 RESTful Network API Notification Channel 1.0 RESTful Network API Short Messaging 1.0
Service Customization Condition Based URI selection 1.0 LPP Extensions 1.0   Location in SIP/IP core 1.0   Mobile Location Protocol 3.1 Mobile Location Service 1.0   Mobile Location Service 1.1   Mobile Location Service 1.2 Secure User Plane Location 3.0   Service User Profile Management 1.0

More Related Content

What's hot

Keyrock - Lesson 3. Applications. How to create OAuth2 tokens.
Keyrock - Lesson 3. Applications. How to create OAuth2 tokens.Keyrock - Lesson 3. Applications. How to create OAuth2 tokens.
Keyrock - Lesson 3. Applications. How to create OAuth2 tokens.
Álvaro Alonso González
 
Decriminalize Your Colleagues - How to Address Shadow IT in the Enterprise
Decriminalize Your Colleagues -  How to Address Shadow IT in the EnterpriseDecriminalize Your Colleagues -  How to Address Shadow IT in the Enterprise
Decriminalize Your Colleagues - How to Address Shadow IT in the Enterprise
BoxHQ
 
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeNet
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
jasonlan
 
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
cdanger
 
KeyRock and Wilma - Openstack-based Identity Management in FIWARE
KeyRock and Wilma - Openstack-based Identity Management in FIWAREKeyRock and Wilma - Openstack-based Identity Management in FIWARE
KeyRock and Wilma - Openstack-based Identity Management in FIWARE
Álvaro Alonso González
 

What's hot (6)

Keyrock - Lesson 3. Applications. How to create OAuth2 tokens.
Keyrock - Lesson 3. Applications. How to create OAuth2 tokens.Keyrock - Lesson 3. Applications. How to create OAuth2 tokens.
Keyrock - Lesson 3. Applications. How to create OAuth2 tokens.
 
Decriminalize Your Colleagues - How to Address Shadow IT in the Enterprise
Decriminalize Your Colleagues -  How to Address Shadow IT in the EnterpriseDecriminalize Your Colleagues -  How to Address Shadow IT in the Enterprise
Decriminalize Your Colleagues - How to Address Shadow IT in the Enterprise
 
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
SafeWord 2008 Migration Bundle Building a Fully Trusted Authentication Enviro...
 
Technet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager PresentationTechnet System Center Mobile Device Manager Presentation
Technet System Center Mobile Device Manager Presentation
 
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
 
KeyRock and Wilma - Openstack-based Identity Management in FIWARE
KeyRock and Wilma - Openstack-based Identity Management in FIWAREKeyRock and Wilma - Openstack-based Identity Management in FIWARE
KeyRock and Wilma - Openstack-based Identity Management in FIWARE
 

Similar to 2011 Annual Release - Open Mobile Alliance

Intelligent Internet of Things (IIoT): System Architectures and Communications
Intelligent Internet of Things (IIoT): System Architectures and CommunicationsIntelligent Internet of Things (IIoT): System Architectures and Communications
Intelligent Internet of Things (IIoT): System Architectures and Communications
Raghu Nandy
 
SenseHome : IoT based home automation system
SenseHome : IoT based home automation systemSenseHome : IoT based home automation system
SenseHome : IoT based home automation system
Rafiul Islam
 
Softvative Microsoft Sharepoint Brainstorming plan V1.1
Softvative Microsoft Sharepoint Brainstorming plan V1.1Softvative Microsoft Sharepoint Brainstorming plan V1.1
Softvative Microsoft Sharepoint Brainstorming plan V1.1
Faisal Masood
 
Cisco Sona
Cisco SonaCisco Sona
Cisco Sona
jayconde
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
Nugroho Gito
 
Enable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointEnable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePoint
CA API Management
 
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
apidays
 
Ccna 1 chapter 3 v4.0 answers 100 updated 2011
Ccna 1 chapter 3 v4.0 answers 100 updated 2011Ccna 1 chapter 3 v4.0 answers 100 updated 2011
Ccna 1 chapter 3 v4.0 answers 100 updated 2011
Dân Chơi
 
Bouwen in de Cloud: Anthony Priestman - Filr
Bouwen in de Cloud: Anthony Priestman - FilrBouwen in de Cloud: Anthony Priestman - Filr
Bouwen in de Cloud: Anthony Priestman - Filr
InterExperts
 
Quantum Architecture Overview
Quantum Architecture OverviewQuantum Architecture Overview
Quantum Architecture Overview
jinpeng
 
Quantum Architecture Overview
Quantum Architecture OverviewQuantum Architecture Overview
Quantum Architecture Overview
jinpeng
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
John Rhoton
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WG
Bjorn Hjelm
 
Agile Network Agile Management
Agile Network Agile ManagementAgile Network Agile Management
Agile Network Agile Management
Huawei Enterprise Hong Kong
 
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies
 
Connecting Heterogeneus IoT Technologies & Products
Connecting Heterogeneus IoT Technologies & ProductsConnecting Heterogeneus IoT Technologies & Products
Connecting Heterogeneus IoT Technologies & Products
FIWARE
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WG
Bjorn Hjelm
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
John Rhoton
 
Windows Networking Introduction
Windows Networking IntroductionWindows Networking Introduction
Windows Networking Introduction
Nevil Dsouza
 
Android Introduction by Kajal
Android Introduction by KajalAndroid Introduction by Kajal
Android Introduction by Kajal
Kajal Kucheriya Jain
 

Similar to 2011 Annual Release - Open Mobile Alliance (20)

Intelligent Internet of Things (IIoT): System Architectures and Communications
Intelligent Internet of Things (IIoT): System Architectures and CommunicationsIntelligent Internet of Things (IIoT): System Architectures and Communications
Intelligent Internet of Things (IIoT): System Architectures and Communications
 
SenseHome : IoT based home automation system
SenseHome : IoT based home automation systemSenseHome : IoT based home automation system
SenseHome : IoT based home automation system
 
Softvative Microsoft Sharepoint Brainstorming plan V1.1
Softvative Microsoft Sharepoint Brainstorming plan V1.1Softvative Microsoft Sharepoint Brainstorming plan V1.1
Softvative Microsoft Sharepoint Brainstorming plan V1.1
 
Cisco Sona
Cisco SonaCisco Sona
Cisco Sona
 
Mobile Enterprise Application Platform
Mobile Enterprise Application PlatformMobile Enterprise Application Platform
Mobile Enterprise Application Platform
 
Enable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointEnable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePoint
 
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
APIsecure 2023 - API orchestration: to build resilient applications, Cherish ...
 
Ccna 1 chapter 3 v4.0 answers 100 updated 2011
Ccna 1 chapter 3 v4.0 answers 100 updated 2011Ccna 1 chapter 3 v4.0 answers 100 updated 2011
Ccna 1 chapter 3 v4.0 answers 100 updated 2011
 
Bouwen in de Cloud: Anthony Priestman - Filr
Bouwen in de Cloud: Anthony Priestman - FilrBouwen in de Cloud: Anthony Priestman - Filr
Bouwen in de Cloud: Anthony Priestman - Filr
 
Quantum Architecture Overview
Quantum Architecture OverviewQuantum Architecture Overview
Quantum Architecture Overview
 
Quantum Architecture Overview
Quantum Architecture OverviewQuantum Architecture Overview
Quantum Architecture Overview
 
System Center Mobile Device Manager
System Center Mobile Device ManagerSystem Center Mobile Device Manager
System Center Mobile Device Manager
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WG
 
Agile Network Agile Management
Agile Network Agile ManagementAgile Network Agile Management
Agile Network Agile Management
 
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management SuiteFriendly Technologies- Cloud-Based TR-069 Device Management Suite
Friendly Technologies- Cloud-Based TR-069 Device Management Suite
 
Connecting Heterogeneus IoT Technologies & Products
Connecting Heterogeneus IoT Technologies & ProductsConnecting Heterogeneus IoT Technologies & Products
Connecting Heterogeneus IoT Technologies & Products
 
OpenID Foundation MODRNA WG
OpenID Foundation MODRNA WGOpenID Foundation MODRNA WG
OpenID Foundation MODRNA WG
 
Mobile Device Management
Mobile Device ManagementMobile Device Management
Mobile Device Management
 
Windows Networking Introduction
Windows Networking IntroductionWindows Networking Introduction
Windows Networking Introduction
 
Android Introduction by Kajal
Android Introduction by KajalAndroid Introduction by Kajal
Android Introduction by Kajal
 

More from Musa Unmehopa

Zhaga CALI LED Symposium Shanghai - 25 July 2014
Zhaga CALI LED Symposium Shanghai - 25 July 2014Zhaga CALI LED Symposium Shanghai - 25 July 2014
Zhaga CALI LED Symposium Shanghai - 25 July 2014
Musa Unmehopa
 
Management and Provisioning of M2M Devices and Applications
Management and Provisioning of M2M Devices and ApplicationsManagement and Provisioning of M2M Devices and Applications
Management and Provisioning of M2M Devices and Applications
Musa Unmehopa
 
M2M Stategy of the Open Mobile Alliance - Fraunhofer FUSECO Forum 2011
M2M Stategy of the Open Mobile Alliance - Fraunhofer FUSECO Forum 2011M2M Stategy of the Open Mobile Alliance - Fraunhofer FUSECO Forum 2011
M2M Stategy of the Open Mobile Alliance - Fraunhofer FUSECO Forum 2011
Musa Unmehopa
 
Open Mobile Alliance strategy on M2M and API - Keynote at OMA/CCSA Symposium ...
Open Mobile Alliance strategy on M2M and API - Keynote at OMA/CCSA Symposium ...Open Mobile Alliance strategy on M2M and API - Keynote at OMA/CCSA Symposium ...
Open Mobile Alliance strategy on M2M and API - Keynote at OMA/CCSA Symposium ...
Musa Unmehopa
 
ETSI M2M Workshop - OMA Strategy for Internet of Things
ETSI M2M Workshop - OMA Strategy for Internet of ThingsETSI M2M Workshop - OMA Strategy for Internet of Things
ETSI M2M Workshop - OMA Strategy for Internet of Things
Musa Unmehopa
 
ITU-T SDP Workshop - Role of OMA in SDP Standards
ITU-T SDP Workshop - Role of OMA in SDP StandardsITU-T SDP Workshop - Role of OMA in SDP Standards
ITU-T SDP Workshop - Role of OMA in SDP Standards
Musa Unmehopa
 
Opening Keynote at BMMP 2011 - OMA API Program
Opening Keynote at BMMP 2011 - OMA API ProgramOpening Keynote at BMMP 2011 - OMA API Program
Opening Keynote at BMMP 2011 - OMA API Program
Musa Unmehopa
 
Opening Keynote at ICIN 2011 - OMA API Program
Opening Keynote at ICIN 2011 - OMA API ProgramOpening Keynote at ICIN 2011 - OMA API Program
Opening Keynote at ICIN 2011 - OMA API Program
Musa Unmehopa
 
OMA Strategy on Open API Standardization
OMA Strategy on Open API StandardizationOMA Strategy on Open API Standardization
OMA Strategy on Open API Standardization
Musa Unmehopa
 

More from Musa Unmehopa (9)

Zhaga CALI LED Symposium Shanghai - 25 July 2014
Zhaga CALI LED Symposium Shanghai - 25 July 2014Zhaga CALI LED Symposium Shanghai - 25 July 2014
Zhaga CALI LED Symposium Shanghai - 25 July 2014
 
Management and Provisioning of M2M Devices and Applications
Management and Provisioning of M2M Devices and ApplicationsManagement and Provisioning of M2M Devices and Applications
Management and Provisioning of M2M Devices and Applications
 
M2M Stategy of the Open Mobile Alliance - Fraunhofer FUSECO Forum 2011
M2M Stategy of the Open Mobile Alliance - Fraunhofer FUSECO Forum 2011M2M Stategy of the Open Mobile Alliance - Fraunhofer FUSECO Forum 2011
M2M Stategy of the Open Mobile Alliance - Fraunhofer FUSECO Forum 2011
 
Open Mobile Alliance strategy on M2M and API - Keynote at OMA/CCSA Symposium ...
Open Mobile Alliance strategy on M2M and API - Keynote at OMA/CCSA Symposium ...Open Mobile Alliance strategy on M2M and API - Keynote at OMA/CCSA Symposium ...
Open Mobile Alliance strategy on M2M and API - Keynote at OMA/CCSA Symposium ...
 
ETSI M2M Workshop - OMA Strategy for Internet of Things
ETSI M2M Workshop - OMA Strategy for Internet of ThingsETSI M2M Workshop - OMA Strategy for Internet of Things
ETSI M2M Workshop - OMA Strategy for Internet of Things
 
ITU-T SDP Workshop - Role of OMA in SDP Standards
ITU-T SDP Workshop - Role of OMA in SDP StandardsITU-T SDP Workshop - Role of OMA in SDP Standards
ITU-T SDP Workshop - Role of OMA in SDP Standards
 
Opening Keynote at BMMP 2011 - OMA API Program
Opening Keynote at BMMP 2011 - OMA API ProgramOpening Keynote at BMMP 2011 - OMA API Program
Opening Keynote at BMMP 2011 - OMA API Program
 
Opening Keynote at ICIN 2011 - OMA API Program
Opening Keynote at ICIN 2011 - OMA API ProgramOpening Keynote at ICIN 2011 - OMA API Program
Opening Keynote at ICIN 2011 - OMA API Program
 
OMA Strategy on Open API Standardization
OMA Strategy on Open API StandardizationOMA Strategy on Open API Standardization
OMA Strategy on Open API Standardization
 

Recently uploaded

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 

Recently uploaded (20)

Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
Introducing Milvus Lite: Easy-to-Install, Easy-to-Use vector database for you...
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 

2011 Annual Release - Open Mobile Alliance

  • 1. Open Mobile Alliance 2011 Annual Release
  • 2. Architecture, Security and Charging Categorization Based Content Screening Framework 1.0 Charging Data Elements 1.0 General Service Subscription Management 1.0 On-Board Key Generation 1.0 OMA Global Service Architecture 1.1 Smart Card Web Server 1.2
  • 3. Person to Person Communications Mobile Email 1.0 Multimedia Messaging System 1.3 Presence Data Elements 1.2 Presence Data Elements 1.3 Push to talk Over Cellular 2.0 Push to talk Over Cellular 2.1
  • 4. Devices Converged Personal Network Service 1.0 Data Synchronisation 2.0 Delta Record Management Object 1.0 Device Profiles Evolution 1.0 Diagnostic Monitoring 1.1 DM Scheduling 1.0 List of Supported Managed Objects 1.0 Look and Feel Customization 1.0 Software and Application Control MO 1.0 Software Component Management Object 1.1 Software Component Management Object 1.0
  • 5. Access to Content Browsing 2.4 Browser Protocol Stack 1.0 Content Management Interface 1.0 Digital Rights Management 2.2 Download over the air 1.0 Dynamic Content Delivery 1.0 External Functionality Interface 1.0 Games Services Client/Server Interface 1.0 Mobile Augmented Reality 1.0 Push 2.1 Push 2.3 Push Security (Push 2.2) Push over SIP 1.0 Rich Media Environment 1.0 Rights Issuer Common Domain 1.0 Secure Content Exchange 1.0 Secure Removable Media 1.1 User Agent Profile 1.1
  • 6. Service Access Interfaces Device Management Client-Side API Framework 1.0 RESTful binding OMA Push Access Protocol 1.0 RESTful bindings Parlay X Web Services, part 2 RESTful Network API Device Capabilities 1.0 RESTful Network API Notification Channel 1.0 RESTful Network API Short Messaging 1.0
  • 7. Service Customization Condition Based URI selection 1.0 LPP Extensions 1.0 Location in SIP/IP core 1.0 Mobile Location Protocol 3.1 Mobile Location Service 1.0 Mobile Location Service 1.1 Mobile Location Service 1.2 Secure User Plane Location 3.0 Service User Profile Management 1.0