Assignment #2 Mobile Computing
Assignment #2 Mobile Computing
Assignment #2 Mobile Computing
Mobile Computingisatechnologythatallowstransmissionofdata,voice
andvideoviaacomputeroranyotherwirelessenableddevicewithout
havingtobeconnectedtoafixedphysicallink.Themainconceptinvolves
-Mobile communication
- Mobile hardware.
- Mobile software
Mobile communication
The mobile communication in this case, refers to the infrastructure put in place
to ensure that seamless and reliable communication goes on. These would
include devices such as protocols, services, bandwidth, and portals necessary to
facilitate and support the stated services. The data format is also defined at this
stage. This ensures that there is no collision with other existing systems which
offer the same service.
Mobile
Hardware
Mobile hardware includes mobile devices or device components that receive or
access the service of mobility. They would range from portable laptops,
smartphones, tablet Pc's, Personal Digital Assistants.
Mobile software
Mobile software is the actual program that runs on the
mobile hardware. It deals with the characteristics and
requirements of mobile applications. This is the engine of
the mobile device. In other terms, it is the operating
system of the appliance. It's the essential component that
operates the mobile device.
Location Flexibility
This has enabled users to work from anywhere as long as there is a connection
established. A user can work without being in a fixed position. Their mobility
ensures that they are able to carry out numerous tasks at the same time and
perform their stated jobs.
Saves Time
The time consumed or wasted while travelling from different locations or to the office
and back, has been slashed. One can now access all the important documents and files
over a secure channel or portal and work as if they were on their computer. It has
enhanced telecommuting in many companies. It has also reduced unnecessary incurred
expenses.
Enhanced Productivity
Users can work efficiently and effectively from whichever location they find
comfortable. This in turn enhances their productivity level.
Ease of Research
Research has been made easier, since users earlier were required to go to the field
and search for facts and feed them back into the system. It has also made it easier for
field officers and researchers to collect and feed data from wherever they are without
making unnecessary trips to and from the office to the field.
Mobile computing has its fair share of security concerns as any other technology.
Due to its nomadic nature, it's not easy to monitor the proper usage. Users might
have different intentions on how to utilize this privilege. Improper and unethical
practices such as hacking, industrial espionage, pirating, online fraud and
malicious destruction are some but few of the problems experienced by mobile
computing.
These are just but a few ways to help deter possible threats to any company
planning to offer mobile computing. Since information is vital, all possible
measures should be evaluated and implemented for safeguard purposes.
In the absence of such measures, it's possible for exploits and other unknown
threats to infiltrate and cause irrefutable harm. These may be in terms of
reputation or financial penalties. In such cases, it's very easy to be misused in
different unethical practices.
Conclusion
Today's computing has rapidly grown from being confined to a single location.
With mobile computing, people can work from the comfort of any location they
wish to as long as the connection and the security concerns are properly factored.
In the same light, the presence of high speed connections has also promoted the
use of mobile computing.
Being an ever growing and emerging technology, mobile computing will continue
to be a core service in computing, and Information and Communications
Technology.