Mobile computing explained

Mobile computing is human–computer interaction in which a computer is expected to be transported during normal usage and allow for transmission of data, which can include voice and video transmissions. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad hoc networks and infrastructure networks as well as communication properties, protocols, data formats, and concrete technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications.

Main principles

Devices

Some of the most common forms of mobile computing devices are as given below:

These classes are expected to endure and to complement each other, none replacing another completely.

Other types of mobile computers have been introduced since the 1990s, including the:

Limitations

In-vehicle computing and fleet computing

Many commercial and government field forces deploy a rugged portable computer with their fleet of vehicles. This requires the units to be anchored to the vehicle for driver safety, device security, and ergonomics. Rugged computers are rated for severe vibration associated with large service vehicles and off-road driving and the harsh environmental conditions of constant professional use such as in emergency medical services, fire, and public safety.

Other elements affecting function in the vehicle:

Security issues involved in mobile

See main article: article and Mobile security. Mobile security has become increasingly important in mobile computing. It is of particular concern as it relates to the security of personal information now stored on the smartphone. Mobile applications might copy user data from these devices to a remote server without the users’ permission and often without the users’ consent.[4] The user profiles automatically created in the cloud for smartphone users raise privacy concerns on all major platforms, in terms of, including, but not limited to, location tracking[5] and personal data collection,[6] regardless of user settings on the device.[7]

More and more users and businesses use smartphones as a means of planning and organizing their work and private life. Within companies, these technologies are causing profound changes in the organization of information systems and therefore they have become the source of new risks. Indeed, smartphones collect and compile an increasing amount of sensitive information to which access must be controlled to protect the privacy of the user and the intellectual property of the company.

All smartphones are preferred targets of attacks. These attacks exploit weaknesses related to smartphones that can come from means of wireless telecommunication like WiFi networks and GSM. There are also attacks that exploit software vulnerabilities from both the web browser and operating system. Finally, there are forms of malicious software that rely on the weak knowledge of average users.

Different security counter-measures are being developed and applied to smartphones, from security in different layers of software to the dissemination of information to end-users. There are good practices to be observed at all levels, from design to use, through the development of operating systems, software layers, and downloadable apps.

Portable computing devices

See main article: article, Mobile device and Portable computer. Several categories of portable computing devices can run on batteries but are not usually classified as laptops: portable computers, PDAs, ultra mobile PCs (UMPCs), tablets, and smartphones.

Boundaries that separate these categories are blurry at times. For example, the OQO UMPC is also a PDA-sized tablet PC; the Apple eMate had the clamshell form factor of a laptop but ran PDA software. The HP Omnibook line of laptops included some devices small enough to be called ultra mobile PCs. The hardware of the Nokia 770 internet tablet is essentially the same as that of a PDA such as the Zaurus 6000; the only reason it's not called a PDA is that it does not have PIM software. On the other hand, both the 770 and the Zaurus can run some desktop Linux software, usually with modifications.

Mobile data communication

Wireless data connections used in mobile computing take three general forms.[11] Cellular data service uses technologies GSM, CDMA or GPRS, 3G networks such as W-CDMA, EDGE or CDMA2000.[12] [13] and more recently 4G and 5G networks. These networks are usually available within range of commercial cell towers. Wi-Fi connections offer higher performance,[14] may be either on a private business network or accessed through public hotspots, and have a typical range of 100 feet indoors and up to 1000 feet outdoors.[15] Satellite Internet access covers areas where cellular and Wi-Fi are not available[16] and may be set up anywhere the user has a line of sight to the satellite's location,[17] which for satellites in geostationary orbit means having an unobstructed view of the southern sky. Some enterprise deployments combine networks from multiple cellular networks or use a mix of cellular, Wi-Fi and satellite.[18] When using a mix of networks, a mobile virtual private network (mobile VPN) not only handles the security concerns, but also performs the multiple network logins automatically and keeps the application connections alive to prevent crashes or data loss during network transitions or coverage loss.[19] [20]

See also

References

Bibliography

Further reading

Notes and References

  1. Web site: U Drive. U Text. U Pay.. andrew.currin.ctr@dot.gov. 8 September 2016. NHTSA. 25 March 2018. 5 October 2011. https://web.archive.org/web/20111005162804/http://www.distraction.gov/stats-and-facts/. live.
  2. Web site: Hands Free Cell Phones No Safer, Insurance Study Claims. 16 July 2015. 17 July 2015. https://web.archive.org/web/20150717052047/http://handsfreeinfo.com/study-handheld-cell-bans-have-no-effect/. live.
  3. Web site: Study: Distractions, not phones, cause car crashes. CBS Interactive. CNET. 16 July 2015. 18 January 2013. https://web.archive.org/web/20130118084549/http://news.cnet.com/8301-30686_3-10444717-266.html. dead.
  4. Web site: Apple iPhones could have been hacked for years — here's what to do about it . Sikos . Leslie F. . Haskell-Dowland . Paul . 5 Sep 2019 . ABC News . 2019-12-10 . 2019-09-09 . https://web.archive.org/web/20190909011141/https://www.abc.net.au/news/2019-09-05/apple-iphones-could-have-been-hacked-for-years-%E2%80%93-heres-what-to/11481206 . live .
  5. Web site: Google sued over tracking user location amid privacy concerns . Laura . Hautala . 20 August 2018 . CNET . 10 December 2019 . 10 December 2019 . https://web.archive.org/web/20191210071243/https://www.cnet.com/news/google-sued-over-keeping-location-data-amid-privacy-concerns/ . live .
  6. Web site: Pre-Installed Apps on Android Represent a Threat to User Privacy and Security . Nicole . Lindsey . CPO Magazine . 10 April 2019 . 10 December 2019 . 10 December 2019 . https://web.archive.org/web/20191210071243/https://www.cpomagazine.com/data-privacy/pre-installed-apps-on-android-represent-a-threat-to-user-privacy-and-security/ . live .
  7. Web site: Google records your location even when you tell it not to . The Guardian . 14 August 2018 . 10 December 2019 . 10 December 2019 . https://web.archive.org/web/20191210071239/https://www.theguardian.com/technology/2018/aug/13/google-location-tracking-android-iphone-mobile . live .
  8. Web site: Carputer Articles on Engadget. AOL. Engadget. 16 July 2015. 5 May 2018. https://web.archive.org/web/20180505145743/https://www.engadget.com/tag/carputer/. live.
  9. Web site: Gear Diary » The FLY Fusion Pentop Computer Review. 7 October 2007. 16 July 2015. 23 October 2017. https://web.archive.org/web/20171023064252/https://geardiary.com/2007/10/07/the-fly-fusion-pentop-computer-review/. live.
  10. G Rowley, K Barker, and V Callaghan “ The Questronic Project and the Ferranti MRT 100 A Boon For Survey Research”, The Professional Geographer, Volume 37, Issue 4, pages 459–463, November 1985
  11. Web site: Wireless Data Communications for Beginners. dead. https://web.archive.org/web/20110713084232/http://www.ositech.com/downloads/123dwnlod_1.html. 2011-07-13. 2011-07-12. Ositech Communications.
  12. Lachu Aravamudhan, Stefano Faccin, Risto Mononen, Basavaraj Patil, Yousuf Saifullah, Sarvesh Sharma, Srinivas Sreemanthula. "Getting to Know Wireless Networks and Technology", InformIT
  13. http://www.itu.int/ITU-D/imt-2000/DocumentsIMT2000/What_really_3G.pdf "What really is a Third Generation (3G) Mobile Technology"
  14. Gier, Jim. "Wireless Network Industry Report", Wireless Nets, Ltd.
  15. http://www.hotrecruiter.com/resources/technical-tutorials/35-freelance-tips-a-tutorials/893-wi-fi "Wi-Fi"
  16. Web site: Mitchell. Bradley. about.com. Satellite Internet. https://web.archive.org/web/20110726110741/http://compnetworking.about.com/od/internetaccessbestuses/g/bldef_satellite.htm. 26 July 2011.
  17. http://www.compassroseintl.com/pubs/Intro_to_sats.html "Introduction to Global Satellite Systems"
  18. http://www.netmotionwireless.com/resources/case_studies.aspx Case studies
  19. Phifer, Lisa. "Mobile VPN: Closing the Gap", SearchMobileComputing.com, July 16, 2006.
  20. Cheng, Roger. "Lost Connections", The Wall Street Journal, December 11, 2007.