The document discusses user accounts and synchronization in Android applications. It covers the Authenticator, Account, ContentProvider, SyncAdapter, and ContentResolver components involved in synchronization. It provides examples of how these components work together and considerations for their implementation, including supporting multiple account types with a single Authenticator.
This document introduces jQueryMobile fundamentals including listviews, collapsibles, and collapsible sets. It discusses how to create inset and filtered listviews, add dividers and counts, and include icons and thumbnails. It also explains how to make collapsible blocks of content and collapsible sets by adding data attributes. The document is based on demos from http://demos.jquerymobile.com/1.4.0/.
This document introduces various jQuery Mobile fundamentals including tabs, panels, and popups. Tabs can be created using a navbar and listview. Panels provide flexible content displays like navigation, forms, and inspectors. Popups can contain basic content, menus, forms, or dialogs and are opened by linking to their ID. The document aims to expand the user's skills in these jQuery Mobile features.
This document provides an overview of jQueryMobile fundamentals including toolbars, navbars, icons, and other features. It discusses how to set toolbars and navbars to fixed positions, add buttons to headers, group buttons, add navbars to headers and footers, include icons in navbars, and customize icon positions. It also provides a link to additional icon examples. The goal is to expand the user's knowledge of jQueryMobile fundamentals and get started using these features.
This document provides an introduction to working with MySQL databases. It explains that a MySQL database server stores information in an organized format accessible through scripting languages like PHP. It then outlines commands for working with databases and tables, including how to create, show, describe, and drop databases and tables. It also covers inserting, selecting, updating, and deleting data in tables.
This document introduces the fundamentals of jQueryMobile including tables, filters, buttons, grids, checkboxes, and radio buttons. It provides descriptions and examples of each feature, noting that tables can be reflowed into a stacked presentation, elements can be filtered by text content, buttons and inputs are styled via classes, grids are invisible containers, and checkboxes and radio buttons are enhanced for selection. The document is based on examples from the jQueryMobile website.
The document discusses a meeting between two individuals to negotiate a business deal. It describes their initial positions on various issues being negotiated and notes some disagreement. As the discussion progresses, they are able to find some common ground and make concessions to reach an agreement. In the end, both sides are satisfied with the outcome of the negotiations.
This document defines a MySqlHelper class that extends SQLiteOpenHelper. It contains constants for table and column names, SQL statements to create three tables (user, preference, hotel), and methods to create the database tables onCreate and drop/recreate them onUpgrade if the database version changes.
This document contains details of an image attachment including the attachment ID, file name, and indication that it is not an inline attachment. The attachment is a photo named IMG_9883.jpg that is attached separately rather than embedded inline in the message.
This document introduces jQueryMobile fundamentals including listviews, collapsibles, and collapsible sets. It discusses how to create inset and filtered listviews, add dividers and counts, and include icons and thumbnails. It also explains how to make collapsible blocks of content and collapsible sets by adding data attributes. The document is based on demos from http://demos.jquerymobile.com/1.4.0/.
This document introduces various jQuery Mobile fundamentals including tabs, panels, and popups. Tabs can be created using a navbar and listview. Panels provide flexible content displays like navigation, forms, and inspectors. Popups can contain basic content, menus, forms, or dialogs and are opened by linking to their ID. The document aims to expand the user's skills in these jQuery Mobile features.
This document provides an overview of jQueryMobile fundamentals including toolbars, navbars, icons, and other features. It discusses how to set toolbars and navbars to fixed positions, add buttons to headers, group buttons, add navbars to headers and footers, include icons in navbars, and customize icon positions. It also provides a link to additional icon examples. The goal is to expand the user's knowledge of jQueryMobile fundamentals and get started using these features.
This document provides an introduction to working with MySQL databases. It explains that a MySQL database server stores information in an organized format accessible through scripting languages like PHP. It then outlines commands for working with databases and tables, including how to create, show, describe, and drop databases and tables. It also covers inserting, selecting, updating, and deleting data in tables.
This document introduces the fundamentals of jQueryMobile including tables, filters, buttons, grids, checkboxes, and radio buttons. It provides descriptions and examples of each feature, noting that tables can be reflowed into a stacked presentation, elements can be filtered by text content, buttons and inputs are styled via classes, grids are invisible containers, and checkboxes and radio buttons are enhanced for selection. The document is based on examples from the jQueryMobile website.
The document discusses a meeting between two individuals to negotiate a business deal. It describes their initial positions on various issues being negotiated and notes some disagreement. As the discussion progresses, they are able to find some common ground and make concessions to reach an agreement. In the end, both sides are satisfied with the outcome of the negotiations.
This document defines a MySqlHelper class that extends SQLiteOpenHelper. It contains constants for table and column names, SQL statements to create three tables (user, preference, hotel), and methods to create the database tables onCreate and drop/recreate them onUpgrade if the database version changes.
This document contains details of an image attachment including the attachment ID, file name, and indication that it is not an inline attachment. The attachment is a photo named IMG_9883.jpg that is attached separately rather than embedded inline in the message.
The document discusses making changes to a company's organizational structure by eliminating certain roles and departments to reduce costs and improve efficiency. It notes that some positions will be eliminated, while others will be consolidated or have their responsibilities changed. The changes are intended to help the company adapt to current economic conditions and market challenges.
The LIKE operator is used in a WHERE clause to search for a specified pattern in a column using wildcard characters. It uses two wildcards - the percent sign (%) to match any substring and the underscore (_) to match a single character. The percent sign can match any substring, while the underscore matches any single character. Examples show how the LIKE operator with wildcards can be used to search for names starting with "a" or containing "s_ _ _" in a table.
This short document appears to be written in an unknown language consisting primarily of symbols rather than words. As such, it is not possible to determine the topic or essential information being conveyed due to the lack of understandable content.
This document describes Traavle, a trip planning application that allows users to organize trips, invite Facebook friends, and vote on trips. It utilizes technologies like PHP, web services, mashups, Facebook integration, and a user interface to enable these trip planning features.
1. The document provides commentary on extreme political polarization in the United States based on analysis of polling data from Ipsos.
2. Polling data shows extreme positions declining slightly below 11% while extreme negativity rises above 60% of time, with an average spread between extremes of 20%.
3. Sentiment must reverse by at least 20 percentage points to signal an extreme in addition to extremes reached, with historical performance periods and declines noted.
Galen Gondolfi- Disruptive Diner: Local Investment, Local WealthOpenly Disruptive
Galen Gondolfi from Justine PETERSEN knows that building assets changes lives. With Justine PETERSEN's national reputation in community lending, Galen routinely speaks at national events and conferences on issues of microfinance, credit building, microentreprise and the plight of the underbanked. If there isn't a path for everyone, capital and wealth creation just don't work - learn from Galen then common ground we all have.
Why Ethnography Can Turn Fear of Change into Enthusiasm by Antropologerne, De...EPIC
The document provides contact information for a company called "ABC Company" including their phone number, email address, and website. It lists their address as 123 Main St and notes they provide consulting services.
This presentation was provided by Bill Kasdorf of Bowker during the NISO Forum "The E-Book Renaissance: Exploring the Possibilities Exposed by Digital Books" held on October 24, 2011.
This document discusses migrating from Symfony 1 to Symfony 2. It covers key differences like Symfony 2's use of the Dependency Injection Container and lack of sfContext. It provides examples of implementing models, controllers and views in Symfony 2. Recommended bundles for common Symfony 1 features are also mentioned, along with caching and the HTTP layer.
This document provides a detailed menu listing over 100 vegetarian food items across categories like beverages, salads, snacks, sweets, rice dishes, curries and more that are available from Prism Event Management for catering events. It includes options for drinks, starters, main courses and desserts to provide a full vegetarian meal.
The document discusses the technologies used to create a product. It summarizes:
1) The author had some experience with Canon cameras, including the Canon EOS 600D used for filming, and used a tripod to keep the camera steady and focus on close-up objects.
2) Adobe Premier Pro CS5 was used for editing and was found to be relatively easy to learn though additional effects in After Effects were too complex.
3) The software worked well for synchronizing video clips with sound by allowing fast cutting between clips.
This document contains the menu options for a non-vegetarian event. It includes various snacks, starters, main courses and sides for chicken, mutton, seafood as well as rice dishes, breads and desserts. Over 100 items are listed across categories like welcome snacks, salads, beverages, sweets, fried items and more. Main courses include chicken, mutton and seafood preparations in curries, fries and biryani rice dishes.
Images of cool boats. One is a very interesting concept boat, the second is a futuristic looking boat, and the third is a really interesting old fishing boat that was converted into a spa/luxury boat. Slide by Cal Staggers.
Is hearing loss be an indicator of loss of cognitive abilities Hearing Innovations
Hearing Innovations - Full service audiologist with the best selection of hearing aids in Youngstown and Liberty OH areas. See us for hearing tests, custom ear protection, tinnitus treatment, ear wax removal, hearing aid repair.
Hearing Innovations explains the connection between hearing loss and loss of cognitive abilities.
SPICE TOUR
DAILY DEPARTURE
Heading South
The full day guided tour begins and ends at your hotel. After breakfast you will head to the famous spice producing area in the centre of island to explore the tropical plantations that are a tribute to the islands past, and one of the islands most popular excursions.
The uses and history of spice
Since the abolition of the slave trade, spices have been at the heart of Zanzibari enterprise. You will be guided through the plantations and a local spice farm village where you will encounter medicinal, cosmetic and ornamental plants and herbs. Learn about the origins, properties and uses of cloves, nutmeg, rambutan, lipstick, iodine plant, lemon grass, vanilla, henna, and the shampoo plant.
Community engagement
Our spice tour offers you the opportunity to indulge your senses with a kaleidoscope of smells, tastes and textures. From the punch of a chilli to the refreshing juice of green coconut flesh and seasonal fruit, this tour will awaken your senses. It also provides you with the unique opportunity to purchase these exclusive spices straight from the source.
This document discusses best practices for purchasing, inventorying, issuing, and maintaining an appropriate par stock level of linen in a hospitality establishment. Key points covered include buying from reputable suppliers, getting prices from multiple sources, ordering the largest quantity possible for discounts, testing samples before large orders, taking quarterly linen inventories, issuing extra linen to floors for daily use, maintaining linen exchange records, and ensuring adequate but not excessive par stock levels to avoid issues with operations, costs, and productivity.
This document discusses the history and advantages of online shopping. It notes that while online shopping has grown significantly since the mid-1990s, it is still in the early stages of development. The document outlines the key components of online shopping websites, including submitting online orders, maintaining product categories and payment gateways. It identifies conveniences of online shopping like no pressure from vendors and ability to compare prices. However, it also notes the loss of enjoyment from retail shopping. The conclusion states that online shopping provides exciting new opportunities for customers that will likely continue growing over time.
The document contains a detailed menu listing over 150 vegetarian food and beverage items across categories like beverages, mocktails, welcome snacks and sweets, salads, soups, curries, rice dishes, breads and desserts that are available from Prism Event Management for catering vegetable menus. The menu provides options to select specific numbers of items within each category.
The document discusses making changes to a company's organizational structure by eliminating certain roles and departments to reduce costs and improve efficiency. It notes that some positions will be eliminated, while others will be consolidated or have their responsibilities changed. The changes are intended to help the company adapt to current economic conditions and market challenges.
The LIKE operator is used in a WHERE clause to search for a specified pattern in a column using wildcard characters. It uses two wildcards - the percent sign (%) to match any substring and the underscore (_) to match a single character. The percent sign can match any substring, while the underscore matches any single character. Examples show how the LIKE operator with wildcards can be used to search for names starting with "a" or containing "s_ _ _" in a table.
This short document appears to be written in an unknown language consisting primarily of symbols rather than words. As such, it is not possible to determine the topic or essential information being conveyed due to the lack of understandable content.
This document describes Traavle, a trip planning application that allows users to organize trips, invite Facebook friends, and vote on trips. It utilizes technologies like PHP, web services, mashups, Facebook integration, and a user interface to enable these trip planning features.
1. The document provides commentary on extreme political polarization in the United States based on analysis of polling data from Ipsos.
2. Polling data shows extreme positions declining slightly below 11% while extreme negativity rises above 60% of time, with an average spread between extremes of 20%.
3. Sentiment must reverse by at least 20 percentage points to signal an extreme in addition to extremes reached, with historical performance periods and declines noted.
Galen Gondolfi- Disruptive Diner: Local Investment, Local WealthOpenly Disruptive
Galen Gondolfi from Justine PETERSEN knows that building assets changes lives. With Justine PETERSEN's national reputation in community lending, Galen routinely speaks at national events and conferences on issues of microfinance, credit building, microentreprise and the plight of the underbanked. If there isn't a path for everyone, capital and wealth creation just don't work - learn from Galen then common ground we all have.
Why Ethnography Can Turn Fear of Change into Enthusiasm by Antropologerne, De...EPIC
The document provides contact information for a company called "ABC Company" including their phone number, email address, and website. It lists their address as 123 Main St and notes they provide consulting services.
This presentation was provided by Bill Kasdorf of Bowker during the NISO Forum "The E-Book Renaissance: Exploring the Possibilities Exposed by Digital Books" held on October 24, 2011.
This document discusses migrating from Symfony 1 to Symfony 2. It covers key differences like Symfony 2's use of the Dependency Injection Container and lack of sfContext. It provides examples of implementing models, controllers and views in Symfony 2. Recommended bundles for common Symfony 1 features are also mentioned, along with caching and the HTTP layer.
This document provides a detailed menu listing over 100 vegetarian food items across categories like beverages, salads, snacks, sweets, rice dishes, curries and more that are available from Prism Event Management for catering events. It includes options for drinks, starters, main courses and desserts to provide a full vegetarian meal.
The document discusses the technologies used to create a product. It summarizes:
1) The author had some experience with Canon cameras, including the Canon EOS 600D used for filming, and used a tripod to keep the camera steady and focus on close-up objects.
2) Adobe Premier Pro CS5 was used for editing and was found to be relatively easy to learn though additional effects in After Effects were too complex.
3) The software worked well for synchronizing video clips with sound by allowing fast cutting between clips.
This document contains the menu options for a non-vegetarian event. It includes various snacks, starters, main courses and sides for chicken, mutton, seafood as well as rice dishes, breads and desserts. Over 100 items are listed across categories like welcome snacks, salads, beverages, sweets, fried items and more. Main courses include chicken, mutton and seafood preparations in curries, fries and biryani rice dishes.
Images of cool boats. One is a very interesting concept boat, the second is a futuristic looking boat, and the third is a really interesting old fishing boat that was converted into a spa/luxury boat. Slide by Cal Staggers.
Is hearing loss be an indicator of loss of cognitive abilities Hearing Innovations
Hearing Innovations - Full service audiologist with the best selection of hearing aids in Youngstown and Liberty OH areas. See us for hearing tests, custom ear protection, tinnitus treatment, ear wax removal, hearing aid repair.
Hearing Innovations explains the connection between hearing loss and loss of cognitive abilities.
SPICE TOUR
DAILY DEPARTURE
Heading South
The full day guided tour begins and ends at your hotel. After breakfast you will head to the famous spice producing area in the centre of island to explore the tropical plantations that are a tribute to the islands past, and one of the islands most popular excursions.
The uses and history of spice
Since the abolition of the slave trade, spices have been at the heart of Zanzibari enterprise. You will be guided through the plantations and a local spice farm village where you will encounter medicinal, cosmetic and ornamental plants and herbs. Learn about the origins, properties and uses of cloves, nutmeg, rambutan, lipstick, iodine plant, lemon grass, vanilla, henna, and the shampoo plant.
Community engagement
Our spice tour offers you the opportunity to indulge your senses with a kaleidoscope of smells, tastes and textures. From the punch of a chilli to the refreshing juice of green coconut flesh and seasonal fruit, this tour will awaken your senses. It also provides you with the unique opportunity to purchase these exclusive spices straight from the source.
This document discusses best practices for purchasing, inventorying, issuing, and maintaining an appropriate par stock level of linen in a hospitality establishment. Key points covered include buying from reputable suppliers, getting prices from multiple sources, ordering the largest quantity possible for discounts, testing samples before large orders, taking quarterly linen inventories, issuing extra linen to floors for daily use, maintaining linen exchange records, and ensuring adequate but not excessive par stock levels to avoid issues with operations, costs, and productivity.
This document discusses the history and advantages of online shopping. It notes that while online shopping has grown significantly since the mid-1990s, it is still in the early stages of development. The document outlines the key components of online shopping websites, including submitting online orders, maintaining product categories and payment gateways. It identifies conveniences of online shopping like no pressure from vendors and ability to compare prices. However, it also notes the loss of enjoyment from retail shopping. The conclusion states that online shopping provides exciting new opportunities for customers that will likely continue growing over time.
The document contains a detailed menu listing over 150 vegetarian food and beverage items across categories like beverages, mocktails, welcome snacks and sweets, salads, soups, curries, rice dishes, breads and desserts that are available from Prism Event Management for catering vegetable menus. The menu provides options to select specific numbers of items within each category.
The document discusses the challenges faced by a CIO at a college over several years, including four reorganizations, four bosses, budget cuts, and the need to implement numerous new systems. It describes how the CIO had to recalibrate the IT mission statement to focus on leveraging technology to deliver academic programs globally and improve the student experience. To cope with rapid changes and a faster pace, the CIO emphasizes team building, relationship building, technology innovation, process improvement, better data analysis, and seeking new partners and strategies. While change can be difficult, the need for visionary IT leadership in higher education has never been greater.
This document contains a detailed menu listing for vegetarian food options for an event. It includes categories for beverages, welcome sweets and snacks, salads, soups, sweets, starters/appetizers, breads, rice dishes, curries, pickles, desserts, fruits and more. Over 100 individual food items are listed under each category, providing guests with a wide variety of Indian and international veg meal and snack options.
Everything you always wanted to know about forms* *but were afraid to askAndrea Giuliano
La componente dei Form di Symfony2 rende possibile la costruzione di diverse tipologie di form in modo del tutto semplice. La sua architettura flessibile e altamente scalabile permette di poter gestire strutture adatte ad ogni tipo di esigenza. Tuttavia, conoscere come utilizzare appieno tutta la sua potenza non è banale. In questo talk verrà trattato in profondità la componente Form di Symfony2, mostrando i suoi meccanismi di base e come utilizzarli per estenderli ed introdurre la propria logica di business, così da costruire form cuciti a misura delle tue necessità.
The document describes steps to create an Android application that allows user registration and login authentication using a database. It includes code snippets to:
1. Design activity layouts with input fields for registration and login.
2. Define a database and user table to store user details.
3. Insert initial user records and authenticate login details entered by the user against the database records.
4. Display appropriate dialogs like success or failed login based on authentication result.
This document summarizes new features and changes in Android 2.2 Froyo. It includes improved support for Bluetooth, Exchange, camera, music apps, and tethering. It also describes new developer features like apps on external storage, data backup, device policy manager, cloud to device messaging, and UI improvements like car and night modes. Key infrastructure changes include JIT compilation, V8 JavaScript engine, and support for over 256MB RAM.
AI: Mobile Apps That Understands Your Intention When You TypedMarvin Heng
With Microsoft's Cognitive Services - Language Understanding Intelligent Service (LUIS), we can build a smart app. By following this tutorial, you should learn how to create a intelligent cross platform Mobile App that understands what is your intention.
Read more @ www.techconnect.io
By Marvin Heng
Twitter: @hmheng
Blog: www.techconnect.io
GDI Seattle - Intro to JavaScript Class 4Heather Rock
This document provides an introduction to beginning JavaScript and jQuery. It covers HTML forms and accessing form values with JavaScript. It also discusses APIs, AJAX requests, JSON, libraries like jQuery, and making requests to GitHub's API using jQuery's AJAX functionality. Code examples are provided for creating forms, handling form submissions, making AJAX requests, and looping through the returned JSON data to output ids.
The document describes how to create an Android app that allows users to create an account and log in using a SQLite database. The app includes activities for sign up and login. The sign up activity allows creating a new user account by inserting data into a database table. The login activity authenticates users by querying the database and checking the password. The database is implemented using a DatabaseHelper class to manage creating and upgrading the database, and a LoginDatabaseAdapter class for performing CRUD operations.
SE2016 Android Mikle Anokhin "Speed up application development with data bind...Inhacking
Event: #SE2016
Stage: Android
Data: 4 of September 2016
Speaker: Mikle Anokhin
Topic: Speed up application development with data binding
INHACKING site: https://inhacking.com
SE2016 site: http://se2016.inhacking.com/
The document discusses Symfony2 and the MVC pattern. It provides an example of a model with Shopper, Order, and Item entities. It then shows how to fetch these entities from the database using Doctrine repositories. The document also briefly covers Twig templating, routing, generating links, and controllers in Symfony.
JavaOne Brasil 2016: JavaEE e HTML5: da web/desktop ao mobileLoiane Groner
This document discusses using Java and HTML5 platforms for desktop, web, and mobile applications. It covers key technologies like JSON, WebSockets, RESTful web services, and frameworks like Angular and Sencha. It also provides examples of building applications with these technologies, including a contacts app example in Java EE and Angular.
You've seen Kris' open source libraries, but how does he tackle coding out an application? Walk through green fields with a Symfony expert as he takes his latest “next big thing” idea from the first line of code to a functional prototype. Learn design patterns and principles to guide your way in organizing your own code and take home some practical examples to kickstart your next project.
The document discusses using semantic web technologies like structured data, JSON-LD, and linked data to enrich content in TYPO3 with metadata. It provides examples of generating schema.org structured data for pages, news articles, and organizations. It also proposes using a REST API powered by the Hydra specification to expose this semantic data and content to applications and search engines.
Presentation from the Charlotte Android developers meetup on 3/10/2015 at Skookum Digital Works.
One of the most common things done when writing mobile applications is accessing RESTful web-services. This normally requires a lot of boilerplate code, but it doesn’t have to. Retrofit from Square is an Android networking library that takes a lot of pain out of networking code. During the talk we’ll examine Retrofit in-depth and discuss its benefits. We’ll also discuss areas it could improve
The document discusses various methods for accessing and consuming external data with jQuery including:
1) RESTful web services and consuming REST APIs with jQuery's AJAX methods by making GET and POST requests.
2) Common data formats for APIs like XML, JSON, and RSS and examples of each.
3) Consuming the Twitter REST API with jQuery to get user tweets, post new tweets, and search tweets.
4) Twitter's @Anywhere solution which makes it easy to add Twitter features like follow buttons and tweet widgets to applications.
5) Demonstrating the Facebook JavaScript SDK and APIs for features like login/logout and posting.
Mixpanel is the most advanced analytics platform for mobile & web. Instead of measuring pageviews, it helps you analyze the actions people take in your application. An action can be anything - someone uploading a picture, playing a video, or sharing a post, for example
CMIS is a standard API for working with content repositories that allows clients to interact with content management systems in a vendor-independent way. It defines operations for reading, searching, editing, versioning, and organizing content. The document provides code examples for common CMIS tasks like getting a session, navigating folders, working with properties, querying, and creating/updating documents and folders. CMIS has been implemented by over 30 vendors and has open source projects for client and server implementations.
This document discusses several popular third-party JavaScript libraries including: DataJS for working with data, BreezeJS for managing data models, KnockoutJS for building user interfaces, AngularJS as a full-featured MVC framework, LESS as a CSS pre-processor, Bootstrap for responsive design, and media queries for responsive design across devices. Code examples are provided for implementing these libraries.
The document provides instructions for creating an Android application to demonstrate the activity lifecycle and passing data between activities. It involves creating multiple activities and linking them together. The main activity displays buttons to launch a second activity, select a contact, and change the background color. Methods are added to each activity to log lifecycle events to the logcat. When changing color or selecting contact, data is passed back to the main activity using startActivityForResult and onActivityResult. This allows the main activity to update the UI based on the result from other activities.
The document provides instructions for creating an Android application to demonstrate the activity lifecycle and passing data between activities. It involves creating multiple activities and linking them together. The main activity displays buttons to launch a second activity, select a contact, and change the background color. Methods are added to each activity to log lifecycle events to the logcat. When changing color or selecting contact, data is passed back to the main activity using startActivityForResult and onActivityResult. This allows the main activity to update the UI based on the result from other activities.
This document summarizes the HTML::FormFu module, which provides a framework for efficiently generating and validating web forms. It discusses how FormFu defines forms using a configuration file and handles validation and submission through controller methods or special action names. Examples show how to create basic login and registration forms that validate fields and check for unique usernames. Custom validators can be added to check application-specific logic. FormFu aims to reduce repetitive form code and bugs by generating consistent forms and validation based on field element and constraint definitions.
The document provides an overview of location-based services and the telephony API in Android. It discusses how to use the mapping package to display maps, obtain an API key from Google, and integrate a MapView into an application. It also demonstrates how to send SMS messages using the telephony API and SmsManager class, including code samples for the layout and activity.
Similar to GDG Montréal - Account Manager Basics and Use Case (20)
Null Bangalore | Pentesters Approach to AWS IAMDivyanshu
#Abstract:
- Learn more about the real-world methods for auditing AWS IAM (Identity and Access Management) as a pentester. So let us proceed with a brief discussion of IAM as well as some typical misconfigurations and their potential exploits in order to reinforce the understanding of IAM security best practices.
- Gain actionable insights into AWS IAM policies and roles, using hands on approach.
#Prerequisites:
- Basic understanding of AWS services and architecture
- Familiarity with cloud security concepts
- Experience using the AWS Management Console or AWS CLI.
- For hands on lab create account on [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
# Scenario Covered:
- Basics of IAM in AWS
- Implementing IAM Policies with Least Privilege to Manage S3 Bucket
- Objective: Create an S3 bucket with least privilege IAM policy and validate access.
- Steps:
- Create S3 bucket.
- Attach least privilege policy to IAM user.
- Validate access.
- Exploiting IAM PassRole Misconfiguration
-Allows a user to pass a specific IAM role to an AWS service (ec2), typically used for service access delegation. Then exploit PassRole Misconfiguration granting unauthorized access to sensitive resources.
- Objective: Demonstrate how a PassRole misconfiguration can grant unauthorized access.
- Steps:
- Allow user to pass IAM role to EC2.
- Exploit misconfiguration for unauthorized access.
- Access sensitive resources.
- Exploiting IAM AssumeRole Misconfiguration with Overly Permissive Role
- An overly permissive IAM role configuration can lead to privilege escalation by creating a role with administrative privileges and allow a user to assume this role.
- Objective: Show how overly permissive IAM roles can lead to privilege escalation.
- Steps:
- Create role with administrative privileges.
- Allow user to assume the role.
- Perform administrative actions.
- Differentiation between PassRole vs AssumeRole
Try at [killercoda.com](https://killercoda.com/cloudsecurity-scenario/)
Road construction is not as easy as it seems to be, it includes various steps and it starts with its designing and
structure including the traffic volume consideration. Then base layer is done by bulldozers and levelers and after
base surface coating has to be done. For giving road a smooth surface with flexibility, Asphalt concrete is used.
Asphalt requires an aggregate sub base material layer, and then a base layer to be put into first place. Asphalt road
construction is formulated to support the heavy traffic load and climatic conditions. It is 100% recyclable and
saving non renewable natural resources.
With the advancement of technology, Asphalt technology gives assurance about the good drainage system and with
skid resistance it can be used where safety is necessary such as outsidethe schools.
The largest use of Asphalt is for making asphalt concrete for road surfaces. It is widely used in airports around the
world due to the sturdiness and ability to be repaired quickly, it is widely used for runways dedicated to aircraft
landing and taking off. Asphalt is normally stored and transported at 150’C or 300’F temperature
This study Examines the Effectiveness of Talent Procurement through the Imple...DharmaBanothu
In the world with high technology and fast
forward mindset recruiters are walking/showing interest
towards E-Recruitment. Present most of the HRs of
many companies are choosing E-Recruitment as the best
choice for recruitment. E-Recruitment is being done
through many online platforms like Linkedin, Naukri,
Instagram , Facebook etc. Now with high technology E-
Recruitment has gone through next level by using
Artificial Intelligence too.
Key Words : Talent Management, Talent Acquisition , E-
Recruitment , Artificial Intelligence Introduction
Effectiveness of Talent Acquisition through E-
Recruitment in this topic we will discuss about 4important
and interlinked topics which are
Applications of artificial Intelligence in Mechanical Engineering.pdfAtif Razi
Historically, mechanical engineering has relied heavily on human expertise and empirical methods to solve complex problems. With the introduction of computer-aided design (CAD) and finite element analysis (FEA), the field took its first steps towards digitization. These tools allowed engineers to simulate and analyze mechanical systems with greater accuracy and efficiency. However, the sheer volume of data generated by modern engineering systems and the increasing complexity of these systems have necessitated more advanced analytical tools, paving the way for AI.
AI offers the capability to process vast amounts of data, identify patterns, and make predictions with a level of speed and accuracy unattainable by traditional methods. This has profound implications for mechanical engineering, enabling more efficient design processes, predictive maintenance strategies, and optimized manufacturing operations. AI-driven tools can learn from historical data, adapt to new information, and continuously improve their performance, making them invaluable in tackling the multifaceted challenges of modern mechanical engineering.
Blood finder application project report (1).pdfKamal Acharya
Blood Finder is an emergency time app where a user can search for the blood banks as
well as the registered blood donors around Mumbai. This application also provide an
opportunity for the user of this application to become a registered donor for this user have
to enroll for the donor request from the application itself. If the admin wish to make user
a registered donor, with some of the formalities with the organization it can be done.
Specialization of this application is that the user will not have to register on sign-in for
searching the blood banks and blood donors it can be just done by installing the
application to the mobile.
The purpose of making this application is to save the user’s time for searching blood of
needed blood group during the time of the emergency.
This is an android application developed in Java and XML with the connectivity of
SQLite database. This application will provide most of basic functionality required for an
emergency time application. All the details of Blood banks and Blood donors are stored
in the database i.e. SQLite.
This application allowed the user to get all the information regarding blood banks and
blood donors such as Name, Number, Address, Blood Group, rather than searching it on
the different websites and wasting the precious time. This application is effective and
user friendly.
Digital Twins Computer Networking Paper Presentation.pptxaryanpankaj78
A Digital Twin in computer networking is a virtual representation of a physical network, used to simulate, analyze, and optimize network performance and reliability. It leverages real-time data to enhance network management, predict issues, and improve decision-making processes.
17. Liste de comptes
public static final class Source implements BaseColumns {
public static final String TYPE_ITEM = CURSOR_ITEM_BASE_TYPE + "/" + Source.class.getCanonicalName().toLowerCase();
public static final String TYPE_DIR = CURSOR_DIR_BASE_TYPE + "/" + Source.class.getCanonicalName().toLowerCase();
public static final String FIELD_NAME = "name";
public static final String FIELD_TYPE = "type";
public static final String ID = TABLE_DEFAULT_ID;
private Source() {
}
}
18. Liste des informations affichées
public static class News implements BaseColumns {
public static final String TYPE_ITEM = CURSOR_ITEM_BASE_TYPE + "/" +
News.class.getCanonicalName().toLowerCase();
public static final String TYPE_DIR = CURSOR_DIR_BASE_TYPE + "/" +
News.class.getCanonicalName().toLowerCase(); public static final String FIELD_SOURCE_ID = "source_id";
public static final String FIELD_ORIGINAL_ID = "original_id";
public static final String FIELD_TITLE = "title";
public static final String FIELD_SUMMARY = "summary";
public static final String FIELD_URL = "url";
public static final String FIELD_DATE = "date";
public static final String FIELD_IMAGE = "img";
public static final String ID = TABLE_DEFAULT_ID;
private News() {
}
}
Je suis Simon GUEROUT, je suis en charge de la branche Québécoise - à Montréal - de Sidereo.
Sidereo est une entreprise originaire de France, spécialisée dans le développement de technologies mobiles.
My name is Simon GUEROUT, I am in charge of the new branch of Sidereo in Montreal, QC.
Sidereo started its business in France, and is specialized in mobile technologies.
Qui n’a pas déjà vu ces écrans ?
Aujourd’hui je vais vous parler de différentes choses les concernant :
Un premier rappel concernant les éléments du système qu’ils représentent
Un second rappel concernant la manière dont ils sont liés
Finalement, une présentation d’une utilisation un peu spéciale
Who doesn’t know these screens ?
Today, I am going to explain different things about them :
A first reminder about what they represent inside the system
A second reminder about the way they interact
At last, I’l show how I used the components to handle a specific case
L’Authenticator est le composant qui gère le compte utilisateur.
Son rôle principal consiste :
Fournir l’accès aux différents jetons d’authentification d’un compte,
Tenter d’authentifier l’utilisateur auprès du serveur (typiquement en utilisant ses identifiants),
Proposer à l’utilisateur de se reconnecter au service le cas échéant (en fournissant un Intent approprié);
The Authenticator manages the user account.
Its main role consists in :
Offer acces to the various authentication tokens of an account,
Use the account’s credentials and authenticate the user
Redirect the user to a connection activity, using an Intent;
Ici, on voit la description de 2 Authenticator.
Les informations importantes qui permettent de définir l’Authenticator sont :
son type (nous reviendrons sur ce point plus tard)
son label : qui est présenté à l’utilisateur
les icônes qui seront affichées dans les paramètres
les préférences auxquelles l’utilisateur aura accès
Cette description est faite dans un fichier XML, que l’on référence dans le Manifest lorsque que l’on déclare le service de l’Authenticator.
C’est un exemple intéressant issu du code source d’Android (cf. packages/apps/Email).
On voit la possibilité d’avoir plusieurs Authenticator pour un même type de compte.
We can see the description of 2 Authenticators.
The information defining the Authenticator is :
its type (we’ll get back to that)
its label, which will be displayed to the user
the icons used in the parameters screen
the preferences screen
This description is written in a XML file, which is referenced in the Manifest, when declaring the Authenticator’s service.
http://developer.android.com/training/sync-adapters/creating-authenticator.html
http://developer.android.com/reference/android/accounts/AbstractAccountAuthenticator.html
http://udinic.wordpress.com/2013/04/24/write-your-own-android-authenticator/
Le système représente le compte utilisateur à l’aide de la classe Account.
Cette référence va servir par la suite pour un certain nombre d’opérations.
On va pouvoir y rattacher - via le gestionnaire de comptes “AccountManager” - un certain nombre d’informations:
Des données utilisateurs sous la forme de chaînes de caractères
Des jetons d’authentification, aussi sous la forme de chaînes de caractères
Le mot de passe du compte, qui sert essentiellement à redemander un jeton d’authentification si le précédent est périmé
Ces informations ne sont normalement utilisable que par des paquets signés avec la même clé, afin de garantir un certain niveau sécurité
Si d’autres applications tentent d’accéder aux informations du compte, l’utilisateur sera notifié, et pourra accepter ou non ce partage.
The system represents the user account using the Account class.
This will be used as a reference for various operations.
The application will be able to save many informations, using the AccountManager:
User data, formatted as strings,
Authentication tokens, also formatted as strings,
The account password, which could be used to re-authenticate the user without prompting a login screen,
These informations are only shared to applications with an identical signature, in order to keep it safe.
If other apps try to access it, the user will be asked if he wants to let the them access it or not.
http://developer.android.com/reference/android/accounts/Account.html
http://developer.android.com/reference/android/accounts/AccountManager.html
Le ContentProvider est une classe largement connue et documentée.
Il est souvent utilisé de manière indépendante dans les applications, afin de fournir une abstraction de base de données.
On peut aussi l’exposer, pour partager et/ou mettre en commun des informations (ce qui est fait typiquement avec les contacts ou encore le calendrier).
The ContentProvider is a widely used and documented class.
It is often used independently in applications, in order to provide a database abstraction.
It can be exported, in order to share information : Contacts and Calendars are the best examples.
Le ContentProvider est rattaché à une ou plusieurs autorités, qui permettent de définir le type de données qu’il contient.
Lorsque l’on regarde de près nos comptes sur le périphérique, on peut faire le lien avec les ContentProviders auxquels ceux-ci sont connectés.
Mais justement, comment fait-on le lien entre un compte et des ContentProvider ? On va le voir par la suite !
The ContentProvider is linked to one or many authorities, which describe the type of data it provides.
When we take a look at the list of accounts on a device, it is possible to link the ContentProviders to which they are connected.
But, how can we connect Accounts and ContentProviders ? That is what we are going to see next.
Ce lien est fait avec un composant que l’on appelle un SyncAdapter.
Il est lié à un service, déclaré dans le manifest, et décrit dans un fichier XML.
Cette descirption relie une autorité (ContentProvider) avec un type de compte (Authenticator).
Le composant fait plus que le lien, il est appelé par le systèmes pour synchroniser les données du compte vers le ContentProvider.
C’est là où l’on va effectuer les appels réseaux, en utilisant les informations du compte utilisateur.
This link is done using a component called the SyncAdapter.
It is linked to a serviice, declared in the app’s manifest, and described in a XML file.
This description connects the dots between an authority (ContentProvider) and an account type (Authenticator).
This component does more than a link, it is called by the system in order to sync the account’s data with the ContentProvider.
This is where the calls to the network wil be done, using the user’s account informations.
Vous avez déjà probablement utilisé le ContentResolver pour utiliser un ContentProvider, mais celui-ci ne sert pas qu’à faire des requêtes !
Il permet de définir, entre autres la manière dont vous souhaitez synchroniser un le contenu d’un ContentProvider en fonction d’un compte.
Votre application va pouvoir définir certains paramètres comme l’automatisation de la synchro ou sa périodicité.
I va aussi permettre de demander des synchronisations manuelles, ce qui peut s’avérer utile.
You may haved used the ContentResolve in order to make requests to a ContentProvider, but it is not its only use !
It allows to set how your application will synchronize your service’s content with a ContentProvider, depending on an account.
Your application will be able to set whether you sync will happen automatically and/or its perodicity.
Voici donc un schéma qui récapitule le fonctionnement de l’ensemble des composants.
Here is a diagram that summarizes the operation of all components.
source : http://fr.slideshare.net/AlexTumanoff/android-sync-adapter
Les gros avantages de cette solution sont :
L’intégration au système Android, qui sait bien gérer tout ce qui concerne le comptes utilisateurs et les contenus
La synchronisation est simplifiée et optimisée en fonction de la batterie, de la disponibilité réseau, etc.
Toutefois, comparé, à une solution maison, on a un peu plus de développement à faire.
The advantages of using these component are:
It is part of the Android system, which is able to manage everything about user accouts and contents,
Synchronization is simplified and optimized depending on the battery, network availability, etc.
Though, compared to a homemade solution, you may have to develop a little bit more.
Je vais vous présenter un cas d’usage, qui nous a amené à utiliser ces composants, et la manière dont nous avons pu en tirer profit au maximum.
Nous voulions développer une application, connectée simultanément à différents services, qui fournissent des informations utiles, stockées dans une base de données.
Nous ne voulions pas mettre en place une solution impliquant un service web qui gère le traitement de ces informations.
De plus, l’application doit être capable de gérer plusieurs comptes, parfois pour un même fournisseur.
Et pour finir, on doit toujours obtenir des informations récentes lorsque l’on ouvre l’application.
I am going to show you a use case, which led us to use these components, and how we were able to take full advantage of them.
We wanted to develop an app, connected simultaneaously to different services, offering useful data, which would be stored in a database.
We did not want to set up a data processeing webservice of our own.
Furthermore, the application would have to handle multiple accounts, even of the same provider.
Last, we wanted our app to always have fresh information loaded when the user starts it.
Notre application affiche du contenu de différents réseaux sociaux.
Voici une copie d’écran qui montre des informations venant de Twitter et Facebook.
Our application displays content from social networks.
Here is a screenshot showing data from Twitter and Facebook.
Si on regarde les composants que j’ai présenté au début, c’est exactement ce qui semble adapté à la situation :
On a des comptes utilisateurs, authentifiés auprès de services externes
Les informations de l’application doivent être constamment à jour
On doit stocker cette information dans une base de données
By looking a the components I described before, these are adapted to the situation:
We have user accounts, authenticated to external services,
The information have to be updated on a regular basis
We have to store data in a database
L’application connecte l’utilisateur à plusieurs services, comment est-ce que je vais les représenter ?
Est-ce que je vais créer un Authenticator et un SyncManager pour chacun d’entre eux ?
Ou est-ce que je vais créer un système global, qui saura gérer tous les types de comptes ?
Je vais vous expliquer comment nous avons choisi de développer cette partie de l’application et quelles ont les raisons qui nous y ont poussé.
The application is connected to multiple services, but how am I going to represent them ?
Will I create multiple Authenticator and SyncManager for each of them ?
Or shall I develop a global system, which will handle every kind of account ?
I will give you explanations about the choices we made when developing this application.
Notre base de données contient une table faisant la liste des comptes.
Vous allez me dire que c’est un doublon du système, mais en fait, c’est important de conserver l’information.
En effet, lorsque le système modifie un compte, un Intent est diffusé, mais on ne sait pas ce qui a changé.
Il faut donc faire la différence entre les comptes du système et se propres comptes.
On va donc stocker un minimum d’informations (id, nom du compte, type de compte).
Our database contains a table for the user accounts.
You are going to tell me that the system holds the list of accounts, but I’ll reply that it is important to store a copy of this list.
In fact, when an account is changed, an Intent is broadcasted, but it does not contain information about the change.
The difference between the system’s list and our application’s list has to be made.
We will store a small amount of data about the account : id, name, and type.
Voici ce que l’on stocke en provenance de nos sources d’informations.
On stocke toujours l’id de la source, et l’id d’origine, c’est utile en cas de mise à jour.
This describes the data stored from the social networks.
We always store the original id and the source id, in order to be able to update easily the database.
Le fait de choisir cette solution nous aurait permis d’avoir quelque chose d’assez cloisonné en fonction de chaque source de données.
On gère un Authenticator et un SyncAdapter par source, puis tout va fonctionner comme prévu.
Toutefois, le fait de développer plusieurs Authenticator possède toutefois un désavantage, qui n’est pas technique.
C’est en terme de lisibilité que cela nous a posé problème.
Lorsque l’on va ajouter un compte ou lister les comptes, notre application va apparaître plusieurs fois dans la liste de comptes ou dans les possibilités d’ajout de comptes.
De plus, du fait de la nature de ces comptes, nous ne souhaitions pas créer la confusion (pourquoi plusieurs comptes reliés à Twitter ? etc.)
Nous avons préféré avoir un seul élément dans ces listes, pour ne pas perdre l’utilisateur.
Using multiple Authenticator would have allowed us to split the logic for each data source.
One Authenticator and one SyncAdapter per source could have done the job.
Though, this solution is problematic, but not technically.
The lisibility of the information was a problem.
When the user will add or list the accounts, our application will appear multiple times in the lists.
As the accounts are connected to services that might have their own accounts already in the system, it may be confusing (multiple Twitter accounts ? etc.)
We made the choice of having a single entry in the accounts list.
Nous avons donc choisi de n’avoir avec un seul type de compte.
On ne crée donc qu’un seul Authenticator, et un seul SyncAdapter.
La petite différence est que chaque compte doit être identifié en fonction du service auquel il est connecté.
We decided to have only one type of accoutn.
We will develop only one Authenticator and one SyncAdapter.
The small différence with the previous solution, is that each account has a subtype, representing the service it is connected to.
Notre Authenticator et notre SyncAdapter ne font que gérer ce qui est commun à tous les types de comptes et de sources de données:
lien avec l’AccountManager pour la récupération des jetons d’authentification existants
insertion, suppression et mise à jour des données dans le content provider
Pour le reste, nous avons donc décidé de nous baser sur de la délégation :
récupération de nouveaux jetons de connexion
sauvegarde des jetons de connexion via l’AccountManager
chargement des données et adaptation au modèle communs
Au final, c’est presque identique à la première solution, en terme de développement, mais on y gagne en lisibilité.
Our Authenticator and SyncAdapter are handling the common logic to all types of accounts and data sources :
call the AccountManager to retrieve existing account data,
add, suppress or update data with the ContentProvider
For other operations, we decided to delegate it to service-dependent classes :
retrieving new authentication data,
backup the new authentication tokens with the AccountManager
load the social networks’ data and fit it into a defined model
In the end, our solution, is almost identical to the first possibility in terms of development, but we improved the lisibility.
On a une approche qui est similaire à ce qui est disponible dans le framework aujourd’hui (Contacts, etc.)
On profite des automatismes du système et des optimisations qui ont pu être faites pour ce type de cas.
Lorsque l’on va développer l’affichage, on peut accéder à une base de données unique, et on utilise des mécanismes standards.
Bien que l’on utilise qu’un seul Authenticator, on ne perd pas la flexibilité offerte par le système (plusieurs comptes d’un même type, règles de synchronisation, etc.).
We have used the components of the framework, the same way standard applications do it (Contatcs, Email, …).
We take advantage of the system’s automatisms, and optimizations for this use case.
When developing the applications activities, we will access to a single database, using standard mechanisms.
Although we have a single Authenticator, we still have a flexible system (multiple accounts - even of the same type-, synchronization rules, etc.)