mobile cmm

Upload: syed-naseer

Post on 03-Apr-2018

237 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/29/2019 Mobile Cmm

    1/12

  • 7/29/2019 Mobile Cmm

    2/12

    A Technology thatallows

    transmission ofdata, via a

    computer, without

    having to be

    connected to a

    fixed physical link

  • 7/29/2019 Mobile Cmm

    3/12

    A smart phone is the tool of

    mobile computing capable of

    web browsing, e-mail access,video playback, document

    editing, image editing, among

    many other tasks common onsmart phones.

    http://en.wikipedia.org/wiki/File:PalmTX.jpg
  • 7/29/2019 Mobile Cmm

    4/12

  • 7/29/2019 Mobile Cmm

    5/12

    LimitationsInsufficient bandwidth: Mobile Internet access is generally slower thandirect cable connections, using technologies such asGPRSandEDGE, and

    more recentlyHSDPAandHSUPA3Gnetworks.

    Security standards: When working mobile, one is dependent on publicnetworks, requiring careful use ofVPN. Security is a major concern whileconcerning the mobile computing standards on the fleet.

    Power consumption: When a power outlet or portable generator is notavailable, mobile computers must rely entirely on battery power. Combinedwith the compact size of many mobile devices,

    Transmission interferences: Weather, terrain, and the range from thenearest signal point can all interfere with signal reception. Reception in

    tunnels, some buildings, and rural areas is often poor.

    http://en.wikipedia.org/wiki/GPRShttp://en.wikipedia.org/wiki/EDGEhttp://en.wikipedia.org/wiki/HSDPAhttp://en.wikipedia.org/wiki/HSUPAhttp://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/Virtual_private_networkshttp://en.wikipedia.org/wiki/Virtual_private_networkshttp://en.wikipedia.org/wiki/3Ghttp://en.wikipedia.org/wiki/HSUPAhttp://en.wikipedia.org/wiki/HSDPAhttp://en.wikipedia.org/wiki/EDGEhttp://en.wikipedia.org/wiki/GPRS
  • 7/29/2019 Mobile Cmm

    6/12

    DevicesMany types of mobile computers have been introduced since the

    1990s including the:

    Personal digital assistant/enterprise digital assistant

    Smartphone

    Tablet computerUltra-Mobile PC

    Wearable computer

    http://en.wikipedia.org/wiki/Personal_digital_assistanthttp://en.wikipedia.org/wiki/Enterprise_digital_assistanthttp://en.wikipedia.org/wiki/Smartphonehttp://en.wikipedia.org/wiki/Tablet_computerhttp://en.wikipedia.org/wiki/Ultra-Mobile_PChttp://en.wikipedia.org/wiki/Wearable_computerhttp://en.wikipedia.org/wiki/Wearable_computerhttp://en.wikipedia.org/wiki/Ultra-Mobile_PChttp://en.wikipedia.org/wiki/Ultra-Mobile_PChttp://en.wikipedia.org/wiki/Ultra-Mobile_PChttp://en.wikipedia.org/wiki/Tablet_computerhttp://en.wikipedia.org/wiki/Smartphonehttp://en.wikipedia.org/wiki/Enterprise_digital_assistanthttp://en.wikipedia.org/wiki/Personal_digital_assistant
  • 7/29/2019 Mobile Cmm

    7/12

    Security Issues involved in Mobile ComputingMobile security ormobile phone security has become increasingly important in mobilecomputing. It is of particular concern as it relates to thesecurityof personal informationnow stored on thesmartphone.

    All smart phones, as computers, are preferred targets of attacks. These attacks exploit

    weaknesses related to smart phones that can come from means of communication

    likeSMS, MMS, wifi networks, andGSM.

    Different security counter-measures are being developed and applied to

    Smartphone, from security in different layers of software to the dissemination of

    information to end users.

    http://en.wikipedia.org/wiki/Information_securityhttp://en.wikipedia.org/wiki/Smartphonehttp://en.wikipedia.org/wiki/SMShttp://en.wikipedia.org/wiki/Multimedia_Messaging_Servicehttp://en.wikipedia.org/wiki/Wifihttp://en.wikipedia.org/wiki/GSMhttp://en.wikipedia.org/wiki/GSMhttp://en.wikipedia.org/wiki/Wifihttp://en.wikipedia.org/wiki/Wifihttp://en.wikipedia.org/wiki/Wifihttp://en.wikipedia.org/wiki/Multimedia_Messaging_Servicehttp://en.wikipedia.org/wiki/SMShttp://en.wikipedia.org/wiki/Smartphonehttp://en.wikipedia.org/wiki/Information_security
  • 7/29/2019 Mobile Cmm

    8/12

    Appstore madness. As usual Apple has blazed the trail and now it is up to Microsoft,RIM and Google to catch up.

    Business matters. Apple has never seemed to interested in the business to business

    marketplace.

    The carriers may be finally getting it. The big carriers have been some of the biggest

    obstacles in getting the mobile application business moving.

    The mobile device is a platform, not an adjunct. Applications need to written for thesmaller user interface and unique characteristics of the devices.

    Your mobile phone knows where you and your friends are. The location determining

    capabilities of the mobile network continue to improve as the processing horsepower

    residing in the phone and on the network grows.

  • 7/29/2019 Mobile Cmm

    9/12

    The MOBILE framework is used to determine when it is mostappropriate to use mobile computing technology to address a problem,

    opportunity, or directive. The name MOBILE is derived from the first

    letter in each of six categories that make up the framework.

    The six categories are: M the need for mobility O the need to improve operations B the need to break business barriers I the need to improve information quality L the need to decrease transaction lag E the need to improve efficiency

  • 7/29/2019 Mobile Cmm

    10/12

    The main benefit of mobile computer s is that you do nothave to bind yourself to a certain place. You can do yourwork while sitting in a car or a train.

    The second major benefit is related to the first benefit. When

    people can do their work while sitting anywhere they will domore work. This will play an important role in the economyof the country and the world .

    During these days there is no problem for a student to search

    any information that he needs for his assignments . Manypeople use these mobile computing for entertainment.Children play video games on these computers.

  • 7/29/2019 Mobile Cmm

    11/12

    Mobile computing offers significant benefits fororganizations that technology into their fixed organizationalinformation system.

    Mobile computing is made possible by portable computer

    hardware, software, and communications systems thatinteract with a non-mobile organizational informationsystem while away from the normal , fixed workplace

    Mobile computing is a versatile and potentially strategic

    technology that improves information quality andaccessibility, increases operational efficiency, and enhancesmanagement effectiveness

  • 7/29/2019 Mobile Cmm

    12/12

    THE END