The New Design Of Mobile Computing

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

PART C:

Executive Summary

Companies that are considering the redesign of mobile devices within their network have many decisions to make.

These reports include (but are not limited to):

• How new design of mobile computing will support the business mission

• What problems will be issued

• What training will be used to support mobile devices

• What the cloud is

• What the most suitable proposal of mobile computing is

The new design of mobile computing provides potential solution of the processing needs of the applications utilised by the organisation.

Each of these stages provides insight into both the overall usability of a given mobile solution for an company and the risks and information associated with its implementation. Each parts would be help to determine whether addition of a mobile solution is right for them. The new design of mobile computing provides potential solution of the processing needs of the applications utilised by the organisation. Completing the reports helps the company build a use case for mobile computing by establishing who needs access to what, where they need access to it.

Introduction

Concept of computing now days is anytime anywhere, companies has offices around the world and maintaining a communication bridge which connects them across the world. Data is transferred and travelled across the globe within seconds, today is mobile computing and can be seen as the future of the computing industry.

Mobile computing technology enables the mobile worker to create, access, process, store and communicate information without being constrained to a single location. By extending the reach of an organization's fixed information system, mobile computing enables interaction with organizational personnel that were previously disconnected.

Mobile computing is the discipline for creating an information management platform, which is free from spatial and temporal constraints. The freedom from these constraints allows its users to access and process desired information from anywhere in the space.

The new design of mobile computing

The solution of network design

Our goal is to allow mobile computers to provide a high-performance, integrated computing environment. This requires as followed.

Marsh, Douglis and Caceres (1993) said that the decreasing size of computer components and the increasing availability of wireless communication technology make possible mobile computing. In order to success the mobility network must provide seamless access, dependable and secure information from different mobile computing devices to improve user productivity and cut total costs of maintaining the network. (Motion Computing, Inc. 2013, n.p.)

The computer networks and the variety of services have to be access from anywhere, at any time and provided to them.

Mobile computers provide a powerful interface to services that allow a mobile user to access diverse sources of information, exchange electronic messages, interact with other users in real time, and utilize remote computing resources. (Marsh, Douglis & Caceres 1993)

It is important that the hardware's weight is lightly but performance is powerful. In other words, It needs low performance hardware in which utilize microprocessors and storage systems for reduced power consumption, weight and size. The most powerful computer resources is less than mobile access to wireless networks, mobile devices, in order to achieve high performance. Additionally, It means the need for configuration again at diverse system to moving a computer.

Marsh, Douglis and Caceres (1993) explain that across physical boundaries between buildings such as to provide uninterrupted access to the network, the network reconfiguration is required. To allow applications to access local services and to cope with security concerns such as those between two divisions of a corporation to cross administrative boundaries require application reconfiguration . The maximum user benefit realize from mobile computers demands that the system deal with all the above problems.

The reason of suitable new design

Computing networks are complex by nature, and wireless network overlays multiply that complexity.

After the introduction of mobile computing, there are benefits as follow.

It can be used to access data and services in a network environment unstructured as selling through third party networks. Product of mobile technology solutions, third party network while enabling real-time decision making at the point of service, worker productivity, improves data accuracy and security. (Motion Computing, Inc. 2013, n.p.)

Employees in companies can provide in important presentations to main customers using mobile computers. They can contact the most recent marketplace share information. At a little break, it can takes advantage of this information that they can rectify the presentation. It provides to be converse with the office or customers that is potential new proposes and call meetings for discussing answers to the new suggestions. Therefore, mobile computers can leverage competitive advantages. (Koudounas 1996)

The problems

Security Issues

There is no company in which wants to lay open their secrets to hacker and other intruders, who will in terms sell them to their competitors. Therefore minimizing of these threats is important that to take the necessary protection from taking place.

‘The mobility of users and the data that they carry introduces security problems from the point of view of the existence and location of a user (which is deemed to be data in themselves) and the secrecy and authenticity of the data exchanged between users and between a user and a fixed host.’ (Hardjono & Seberry 1996, p. 6). For example, a user on a mobile wireless network may select to have the information regarding subsistence of someone treated as being top secret.

The problem of identity theft is very difficult to contain or eradicate. Issues with unauthorized access to data and information by hackers, is also a plaguing problem that they gain access to steal vital data from companies. (Tutorialspoint 2013)

Mobile computing has its fair share of security concerns as any other technology. Due to their nomadic nature, it's not easy to monitor the proper usage. User might have different intentions on how to utilize this privilege. Another big problem plaguing mobile computing is credential verification. It's not possible to that the person using that person is the true barrier. Other users share username and passwords. This is also a major threat to security. This being a very sensitive issue, most companies are very reluctant to implement mobile computing to the dangers of misrepresentation.

Location Intelligence

A mobile computer must be able to switch from infrared mode to radio mode as it moves from indoors to outdoors and it should be capable of switching from cellular mode of operation to satellite mode as the computer moves from urban and rural areas. (Deepak & Pradeep 2012)

Power Consumption

Mobile Computers will rely on their batteries as the primary power source. Batteries should be ideally as light as possible but at the same time that they should be capable of longer operation times. Deepak & Pradeep (2012) argue that power consumption should be minimized to increase battery life, chips can be redesigned to operate at lower voltages and power management can also help. Individual Components would be powered down when they are idle.

Training and Education

Business Idea Center: Mobile Computer Training

Most computer training require place for training classes. But this is often not practical for companies that have upgraded or purchased new computers and software, especially if there are five to ten or more employees who are in need of training or retraining. Likewise, not everyone who purchases a new computer, software, or other hardware devices has time to attend classes to learn how to use the equipment.

Herein lies the opportunity in online or through other third party on mobile devices, and software, you can start a mobile computer training service and training on one, or in a group format at their homes, businesses, or office through internet. The proliferation of technological advances, and the constant new stream of software applications and hardware devices means that there will always be lots of people in need of training or skills upgrading, so they can get the most benefit from their computer equipment and programs.(Entrepreneur Media, Inc. 2013, n.p.)

E-learning

Whilst eLearning can't totally replace traditional learning methods, it can be a good medium for the delivery of effective training, especially in a geographically dispersed organisation. There are the benefits of Online Learning offer low cost training, allowing you to further your training budget and to pay for only the training that you need. Furthermore, you can manage your progress via the Learning Management System (LMS). ( Enliten-IT Ltd. 2011, n.p.)

Technology Solutions Training Portal

For example, the Dell has technology solutions training portal site and provides own training.

• The full range of considerations involved in scoping mobility strategies

• The social, technical and business drivers behind the adopting a formal mobility strategy

• The physical components of a mobile infrastructure

• The range of products, software and solutions that Dell provides to deliver business mobility

(Dell 2013, n.p.)

The different type and capabilities of cloud

Features of cloud

The most important thing to regard as including the type of content you can store in a cloud service is functions. It allows you to upload and save any kind of file to the best cloud computing services are those that you can save on your local hard drive, from word documents to video files and everything in between. Even it is possible in cloud that is some services allow you to keep email, contacts and calendar. Your content in spite of what computer or device you are using in which you should also allow to view, edit and share any cloud service. Automatic syncing of your contents across all your devices in which looking for other functions, and protection of password sharing and file encryption to safeguard your file.

Types of Cloud

If you need unlimited storage or you need it for free, as follow a list of the types.

Details are available from the cloud storage <http://gizmodo.com/5990589/the-best-way-to-store-your-stuff-in-the-cloud>

Best Beefy Free Service: MediaFire

Best Unlimited Service: Carbonite

Best Platform Hopper: SugarSync

Best Windows-Specific: Skydrive

Best Overall: Google Drive

Best Battle-Proven Standby: Dropbox

Capability

5.3.1 Mobile Access

Arguably one of the biggest selling points of cloud computing services is their wide-ranging access. Whether you’re on your work computer at the office or at home on your iPad, cloud services allow you to access your content anywhere, anytime and on any one of your devices. Look for services that offer the greatest range of mobile access, including apps for popular smart phones and the ability to log into your account from any mobile browser.

5.3.2 Ease of Use

Considering how often you’ll likely be accessing your content in the cloud, it’s important to select a cloud service that is intuitive and straightforward. The service’s interface and tools should be easy to navigate and convenient to use.

5.3.3 Help & Support

Getting help when you need it is crucial when using any type of technology, including cloud services. Available support options should include technical assistance via telephone, email and live chat. The service should also provide a knowledgebase and user forums as resources.

The best fit of the mobile computing

Some companies are tout as cloud services are more akin to online backup or file sharing services. While there is certainly some overlap between each of these services, cloud services are unique because they allow you to view, edit and share files saved in the cloud. (TopTenREVIEWSTM 2013) With some services, you can even sync your content across all your computers and devices.

The mobile computing environment and its' security presents a new ground for further research, with some problems which are non-existent in the traditional non-mobile computing environment. Future work on the security of mobile computing must address the problems pertaining to the security of information within the three sub-areas of the mobile environment. Hardjono & Seberry (1996) argue said: these three sub-areas of research will be the best fit if mobile computing is to be a reality in the future.

• The security of information residing in the mobile units, and the correctness and integrity of data in these mobile units.

• The security of information as it travels "over the air" between mobile units and mobile support stations. An important consideration in this area is the power consumption of the algorithms and schemes that implement this secure data transfer. New secure data storage schemes and data organization techniques will be required to facilitate rapid searching and transfer of data to and from mobile units.

• The security of information within the mobile wireless network. This includes the security of databases holding control data used for the operations and management of the mobile wireless network.

Conclusions

In this paper I have proposed security to be a major category for new design of network in mobile computing. I have discussed the problems of security, Training and cloud, presenting the best fit of a mobile computing environment.

Mobile computing offers significant benefits for organizations that choose to integrate the technology into their fixed organizational information system.

Mobile computing is made possible by portable computer hardware, software, and communications systems that interact with a non-mobile organizational information system while away from the normal, fixed workplace.

Mobile computing is a versatile and potentially strategic technology that improves information quality and accessibility, increases operational efficiency, and enhances management effectiveness.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now