Free Essay

Mobile Devices

In:

Submitted By rhtdmain
Words 2085
Pages 9
Mobile devices in workplace
Name
Institution
Course
Instructor
Date

Concerns about mobile devices * Mobile devices are distracting and make people waste time in workplace. Flitting between numerous screens and apps and continuously checking email is enough to disrupt even the most focused employee. * Loss of important corporate data stored in the employee’s mobile device due to attacks is one of the greatest concerns. The employee keeps using personal device for corporate data as it is convenient to work from there but in case of system attacks, the data may be lost or stolen * Access to the company’s critical and confidential data by unauthorized people due to attacks by malicious people on the mobile devices. This happens mostly because it is difficult to enforce security measures on each and every employee’s mobile device and it being difficult to ban their use in workplace

Ways of dealing with the issues The BYOD (Bring Your Own Device) sensation is extending at an amazing rate. It is something that influences each business, from the littlest to the biggest. How every business is managing BYOD ranges from complete lack of concern to a full grasp of it with complex techniques and controls set up to augment worker profit while minimizing danger to the business. Each one organization ought to have such regulations. There are steps you can take to place forms set up, and devices to authorize components of those techniques, that will permit your representatives to utilize their individual gadgets to be profitable while minimizing the security dangers to your organization

1. Know who is getting to your system and your information This appears glaringly evident however needs to be said. Frequently survey what records are dynamic for your email benefit, your VPN, intranet applications with their own particular client databases, and so on. Are there any records dynamic for anybody that shouldn't have entry (previous workers, builders, and so on.)? Are there any records with strange action, for example, a high number of unsuccessful logins? Do you have any open access to business information that does not require any validation?
This is not so much particular to cell phones – you ought to as of now be mindful of every last one of openings on your system. This incorporates anyplace that somebody may acquire access to corporate information, and you ought to be observing the right to gain entrance made by any kind of endpoint.

2. Realize what information can be accessed remotely Some data your organization keeps that representatives use for their employment is not at danger of misfortune in light of the fact that it has no unique esteem that would be traded off in the hands of pariahs. Other data is greatly significant and must be watched painstakingly.
It is useful to organize the relative danger of the information that can be gotten to through every gateway to the outside world. Clearly, you'll need to put more exertion into controlling access to those places that have the most touchy information and may need to put less exertion, or even no exertion, to controlling access to places with generally safe information.

3. Know how worker gadgets are designed Cell phones are of specific concern concerning corporate information due to their high vulnerability to physical misfortune. Any information that the representative rightly needs get to so as to do their occupation is a risk if the gadget were to fall into another person's hands. Notwithstanding the danger of their structure component, there is extra danger of information misfortune through electronic means. Vulnerabilities exist in the majority of the famous cell phone stages.
The most prompt and viable line of safeguard is to insignificantly guarantee that each one gadget that is utilized to get to your system is legitimately arranged to decrease the danger of information misfortune from that gadget. The reference section proposes some particular settings that ought to be checked, and there are various different sources that give specifics on sheltered design. In any case the most critical part is that you are utilizing some strategy to guarantee that representatives have their gadgets safely arranged. This brings us to the following tip:

4. Utilize an administration and/or audit tool The most essential approach to guarantee that representatives are securely designing their gadgets would be to provide for them verbal or composed guidelines on the best way to do this and anticipate that adherence will the approaches. In any case there are potential issues with this methodology:
Workers, even the tireless ones, have a tendency to disregard guidelines – unless thorough preparing is given which makes the directions get to be similar to second nature.
They may take after the directions after they are initially imparted, however then disregard them over the long run and let their gadgets float into more hazardous designs. You'll have better bit of brain on the off chance that you have a method for knowing for sure that your guidelines are being emulated, instead of essentially assuming that they are.
The best approach is to utilize an instrument that can consequently report a gadget's setup and help or power representatives to keep them safely set. The best of these apparatuses ought to provide for you great knowledge into how representative gadgets are designed and where they stray from the arrangements you've set for legitimate design. They ought to additionally help in aligning representative gadgets with your sought arrangement – either by directing the representatives to legitimately set their design, or by setting it for them.

The devices most usually suggested today are MDM (Mobile Device Management) apparatuses. On the other hand, MDM tools are to some degree heavyweight arrangement and may be more than what is required for a ton of littler associations.
There is an exchange approach that may be more suited to BYOD in light of the fact that it doesn't take control of the worker's gadget. This new class of apparatuses gives Mobile Device Auditing, which investigates current gadget arrangements, yet does not take complete control of the gadget. These tools may be a more lightweight methodology to understanding BYOD gadgets and may be more prevalent with your employees.

5. Communicate clearly with your employees It is critical that workers utilizing BYOD are told plainly what kind of checking and/or control of their gadgets is being utilized. For instance:
• what information is being checked?
• what settings may be naturally altered?
• how will data about their gadgets be utilized by the organization?
• what is the information maintenance period?
• Etc. In the event that you are evaluating or controlling worker gadgets in any capacity, you will probably need to have a composed assention that unmistakably spells out what data you have the capacity see or change on their gadget.
It is additionally vital that workers are mindful of what their obligations are. Case in point:
• keeping the gadget's security arranged
• immediately reporting any suspicious action
• immediately reporting if the gadget is lost or an information break is suspected
• ensure that any specialists utilized for organization examining is kept in living up to expectations request
• Etc.

6. Make certain whatever instruments you utilize don't compromise the privacy of the user’s device Keep in mind that BYOD gadgets, despite the fact that they are utilized for getting to your business' information, still have a place with the representative. It is essential to strike an adjust that addresses the needs of both gatherings. You require a method for being consoled that the gadget is designed and utilized as a part of a safe way that diminishes the danger of loss of your organization's data. They have to have the capacity to utilize the gadget for their individual use in any capacity that doesn't straightforwardly bargain the security of business information.
Representatives will be much more satisfied in the event that they realize that their head honcho does not have entry to data and substance that they don't have a substantial need to get to. This may incorporate GPS areas, substance of individual correspondences i.e., instant messages or email on a non-business account, and so on. Note that most MDM frameworks will take control of the gadget. With the end goal them should know the current design state, they push changes to the gadget to set the arrangement as directed by the security strategy. This may bring about pushback from representatives who are ready to let managers screen the essential setup settings however don't need adjustments to be constrained on their gadget. On the off chance that you are at all worried about this, investigate utilizing a Mobile Device Auditing apparatus as opposed to a conventional MDM framework.

7. Have an arrangement for how to handle any data breach The best approach to lessening the danger of information misfortune is to understand that you are looking to decrease hazard, not dispose of it altogether. It would be cost restrictive, also unimaginable, to totally dispose of the danger of any information break at all. The tips above are organized around distinguishing where danger is the best and putting the most exertion towards those regions with the most hazard.
Since your danger is diminished and not by any means killed, you do need to be arranged for what to do if there ever is an information break. Ponder who ought to be told, what quick design changes ought to be made to effected frameworks, what criminological exercises you may have the capacity to take, and so on. Make a composed arrange so you can take after your arrangement successfully amid what may be an unpleasant time.
In any case the anxiety ought not be excessively overpowering, in light of the fact that by emulating whatever is left of these tips you've lessened the danger of the most expensive circumstances however much as could be expected.
8. Audit regularly

It is essential that the majority of the activities sketched out in the tips above be returned to routinely after some time. Your IT frameworks are certain to change over the long run and it is essential to keep your methods and devices avant-garde with the current condition of your business data frameworks.

9. Plan for eventually having to prove compliance with your policies You might as of now be doing this for your customary server and desktop endpoints. You may be obliged to show up for an outside power on consistence with a regulation, for example, HIPAA, PCI, Sarbanes Oxley, and so forth. You might likewise need to report inside to your own organization's examiners that need to guarantee a certain level of constancy around IT security.
This action will definitely reach out to cover cell phones the way it is presently utilized for customary frameworks. It is just a matter of time before regulations are reached out to demand controls over access to your system from cell phones. On the off chance that you are as of now determinedly taking after strategies, for example, the ones given in these tips, you will be decently arranged for managing this projection.

10. Enjoy a happier workforce and greater piece of mind for your efforts Putting set up the sorts of methods specified here will oblige arranging, exertion, and asset consumption. At the same time take comfort in realizing that it will all pay off. Your organization's administrators will be upbeat that you have deliberately lessened the danger of harming information misfortune, and your workers will be excited that you are working with them to be as beneficial as would be prudent as opposed to having them feel that you are an obstacle to their success. Operating system with highest concern Android operating system is the one with the largest concern in the workplace. The massive applications on the android phones bring a lot of concern in the workplace such as games, videos, WhatsApp among others are the most common forms of distractions to workers in the workplace. These are also easily vulnerable to external attacks and network interference hence unauthorized people can access critical corporate information hence making the company insecure.

References
Casey, Kevin (2012). "Risks Your BYOD Policy Must Address",InformationWeek. Retrieved 19 June 2013.
Wiech, Dean (2013) "The Benefits And Risks Of BYOD". Manufacturing Business Technology. Retrieved 28 January 2013.
El Ajou, Nadeen (2012). "Bring Your Own Device trend is ICT industry's hottest talking point at GITEX Technology Week". Forward-edge.net. Retrieved26 September 2012.
Rene Millman, ITPro (2012.). "Surge in BYOD sees 7/10 employees using their own devices." Retrieved Jun 5, 2013.

Similar Documents

Premium Essay

Mobile Devices at

...NSG 403 Article Critique 5 Challenges and benefits in a mobile medical world, written by Anne Meneghetti, M.D. discusses the growing trends in healthcare of bringing your own mobile device to work. This article points out the advantages and disadvantages of mobile devices in private practices as well as the hospital setting. The targeted audience is primarily physicians, but can be adapted for any discipline in healthcare. The purpose of the article is to encourage healthcare practitioners to bring their mobile devices to work, to increase the information at their fingertips, to save time, to increase face time with their patients, and to increase their efficiency, all while increasing patient satisfaction. The author also suggests guidelines for institutions on acceptable usage and security of information when using a mobile device. The author seems biased toward Apple products, as she references them frequently, but also offers the other popular platforms of operating systems and devices. Dr. Meneghetti has thoughtfully covered guidelines for BYOD that foster mobile device usage while considering the security of protected patient information. The article is written in a clear and concise manner that is easily understood, and adaptable to the nursing world. The information is insightful and informative, and encourages institutions to consider allowing employees to bring their own portable electronic devices to work. Suggestions for 2013 can be initiated in any institution...

Words: 625 - Pages: 3

Premium Essay

Mobile Devices

...MovMobile Devices Technology Report E-Commerce - Online The history of business has been defined by advances in technology that have fundamentally changed the business playing field. The invention of the railroad, the motor vehicle, the airplane, and the internet revolutionized the business industry, changed the dynamics of how businesses compete, and brought economic prosperity for those who leveraged, adapted, and utilized the new technology. Smart Phones, Tablets, & other mobile devices are rapidly growing and are becoming common place around the world. Mobile devices will not only change the way we do business, it will revolutionize it. This technology will change business models, create revenue streams, and improve consumer’s lives. (Mcdermott, 2011) Mobile devices are heralding in this new revolution, changing the dynamics of business, and transforming how businesses operate and interact with consumers. Mobile computing consists of hand-held/mobile devices usually with a miniature keyboard, which allow users to instantly access information, instantly communicate with others, use applications to solve problems, or just relax and socialize with others while on the go. These devices generally consist of smart phones and tablet computers. Most mobile devices use touch screens, which allows the consumer to interact in a unique way with their device. The most important technology within mobile devices is the device’s operating system. Operating...

Words: 3056 - Pages: 13

Premium Essay

Mobile Device Attacks

...Mobile Device Attacks and Their Effect on Your Personal Privacy CIS 4680- Security Issues Paper (Group 6) Over the last decade, smartphones have become more and more popular as the new handheld PC. With its processing power catching up with the PC, it brings much convenience to people’s daily life from fast access to latest information to efficient financial activities. However, with this increase in use of these functions, more security threats have aroused surrounding smartphones. As the mobile operation systems in different devices become more, it is opens more possibility for fast virus propagation and large scale damage. There have been several attacks targeting smartphones and it is a trend that hackers are moving the battlefield from PCs to smartphones because of promising profit and smartphones’ limitations for antivirus work. Hackers are migrating to the new smartphone platform for many reasons. Not only is the profit from smartphone hacking increasing, but as more consumers link their personal accounts (email, social networking, financial, etc.) to their smartphones, the private information of the users opens a window of opportunity. Hackers can infect smartphones to record phone calls, send and delete data messages, and spy on your phone’s activity. It does not only pose great security threats, but also causes an economic loss to common users. This definitely becomes a major issue when businesses are also taking advantage of the portable PC power of smartphones...

Words: 3045 - Pages: 13

Premium Essay

Mobile and Wearable Devices

...Comparison Essay on Mobile And Wearable Devices Grace Goss IT/200 Mr. Robert Quintin Comparison Essay on Mobile and Wearable Devices Mobile devices are still growing much rapidly. Technology industry is also blooming faster. Macro companies are seen to bet small wearable devices. Talking of wearable devices, such concerns a broad category of trackers that includes: fitness trackers, smart watches, smart glasses, clothes with embedded sensors and even tattoos. Wearable devices are not meant to replace smart phones, on the contrary, they act as satellite device that give useful data Apple iwatch Apple iwatch can only be paired with another iphone but one at a time. Another security feature of the apple iwatch is that they have not activated the activation lock in the apple iwatch yet. Hence, in times of the iwatch being stolen, someone will not be able to access the owner’s data since pairing this device to their phone will immediately delete all data clean. It has a standard blue tooth 4.1 that is used for pairing. (Lobodzinski, 2012) Encryption keys used in the iphone for communication between apple watch and the iphone are also much secured using class-based protection. Apple watch has an in-built wi-fi. When it is outside the range of its Bluetooth icloud is used as connection between the devices. When apple iwatch uses siri security, the device randomly uses its own random identifier. It produces all information that apple phone has sent to the iphone. Fit Bit In fit bit...

Words: 515 - Pages: 3

Free Essay

Mobile and Wearable Devices

...Mobile and Wearable Devices IT/200 Wearable Devices The use of wearable technology has increased massively within the last few years, from smartwatches, pedometers, activity trackers etc, there has been a demand for wearable technology so that consumers to be able to keep up with information that is important to them. In the past wearable technology were limited to one or two functions, whether you wanted to count your calories for the day or how many steps you have walked, now wearable technology are able to check your text messages, emails, and keep you updated with your fitness. Lets take a look at a few wearable devices. Apple Watch Released in 2015 the Apple Watch is one of the most popular wearable devices to date. The Apple watch is an all in one smartwatch that connects to a users Iphone and syncs important information such as text messages emails and photos. Users are able not only able to respond to their text messages from the watch, they can also use their voice to record an audio message to send as a reply and also the audio can be converted into text. Users are also able to download applications on the Apple Watch that they frequent use on their Iphones for easy use. With the watch connected to your smartphone by Bluetooth any notifications that are received on the Iphone will also be accessible from the watch, this great feature allows the user to never miss a call or message. The Apple Watch is also a health and fitness...

Words: 993 - Pages: 4

Free Essay

Should Students Be Allowed to Use Mobile Devices in School?

...Should Students be allowed to Use Mobile Devices in School? Stacy Scott COMM/215 January 10, 2014 Linda Camp Should Students be allowed to Use Mobile Devices in School? Mobile devices have brought a whole new outlook on the world as we know it today. It can be used for entertainment such as games, movies and music; networking such as social media; communicating such as texting, face-time and Skype; organization such as Outlook; and much, much more. Mobile devices have allowed anyone who uses it to access almost anything they want or need like a pocket-size computer. Schools have already started to incorporate mobile devices in the classroom. This then raises my point that students should be allowed to use mobile devices in school. The first and most important reason I believe in this is a lot of students have expected or unexpected after school activities. For those students who have required after school activities, this activity may run later than usual, and they may want to let their parents know they are going to be late and why. For those students who have unexpected after school activities such as some extra tutoring, they may want to let their parents know where they are and when they can expect them home or when they can be picked up. This gives the students the opportunity to text, e-mail, or leave a voicemail message to their parents in order to alert them of these types of changes. It also frees the parents from worry and maybe even rushing as well as giving...

Words: 823 - Pages: 4

Premium Essay

Term Paper: Students’ Self-Service Website for Mobile Devices

...Term Paper: Students’ Self-Service Website for Mobile Devices Due Week 10 and worth 200 points Disclaimer: This is a hypothetical interaction design example. The university has made no announcements or commitments to a project of this nature. In order to provide a convenient self-service solution for students to access personal and course-related material, Strayer University would like develop a mobile Web application that runs on an iPhone, iPad, Droid, Blackberry, and other mobile devices. Students are currently able to use the Internet Explorer, Chrome, Firefox, and other desktop browsers to perform self-service tasks. The university has asked you to provide a Human-Computer Interaction (HCI) guide that will help with the design and implementation of this service. Write a ten to fifteen (10-15) page term paper that can help the university achieve its objective. The paper must address the following topics: Information Gathering 1. Describe the following: a. The purpose and goals of the mobile self-service. b. The target audience. c. The audience needs and wants. d. The resources that will be required to achieve the desired output. Design Strategy 2. Describe each of the following. a. The design of the Website for mobile devices. b. The interfaces that are applicable to the mobile devices. 3. Design each of the following using Microsoft Visio or any open source wireframing or mockup tool. Note: The graphically depicted solution is not included in the...

Words: 550 - Pages: 3

Free Essay

How Mobile Devices Impact the World

...the same devices as businessman and the social groups mostly use the smartphone from connection on to Facebook, Instagram and Twitter. With the emerge of mobile and smart devices has brought business, the empowered business user, created new consumer channels, enhanced the consumer/brand experience, improved transparency and created a digital cash for small businesses. As an employee in business the smartphone enables them to connect online to check emails, communicate work from anywhere, and access information. Also with the use of mobile and smart devices connecting with office productivity and sales applications can also be access through them. There are some risks, with using your personal tablets and smartphones devices at the workplace. Physical access, malicious code, device attacks, communication interception and insider threats are a few risks involving using personal devices at work. The physical risk about tablets and smartphones is that they small and thin and can be easily broken or damage. The malware attacks is no longer involved in pc’s but they can happen with tablets and smartphones. With using smartphones internet browsers, it now makes it easy for hackers to hack into smartphones. Some companies has banned employees the use of connecting their personal devices to their server, because how easily devices can be lost or hacked and may be able to lost information that is business related. There are many advantages that students use mobile devices with helping...

Words: 375 - Pages: 2

Premium Essay

Mobile Devices

...Case I Study: Mobile Devices Ditty A. Kone Dr. Alaba Oluyomi CIS 333 Networking Security Fundamentals April 17, 2012 Case I Study: Mobile Devices Ditty A. Kone Dr. Alaba Oluyomi CIS 333 Networking Security Fundamentals April 17, 2012 Nowadays, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Risks inherent in the use of wireless and mobile technologies Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs. In the other hand there are many risks inherent in using wireless and mobile technologies. Each wireless device, such as a laptop or PDA, that is equipped with a wireless card and is turned on is constantly sending out signals called "probes," indicating that it is seeking to "hook up" with a nearby access point. This probe automatically detects the nearest access point, called a hot spot. A screen is then displayed to instruct the user on how to...

Words: 789 - Pages: 4

Premium Essay

Mobile Device

...Mobile Devices Now days, wireless communication and devices are very flexible, convenient, and easy to use everywhere. With the introduction of wireless local area network (WLAN) many users find it very flexible to move laptops from one place to another within the office while maintaining connectivity with the network, sharing data and applications with network system and other users with compatible devices without been tied to printer cables and other peripheral device connection. This is very important in a doctor’s office because patients and doctors move from room to room depends on the type of test they are doing. Having mobile device makes it easier for them to do their jobs easier and it can even help cut wiring costs (Patricia & Donna, 2008). In the other hand there are many risks inherent in using wireless and mobile technologies. Wireless networks face the same threats as conventional wired network because intruders who gain access to information systems via wireless communication can bypass firewall protection and expose patient’s information and data. Besides lunching denial of service attacks, insert viruses or malicious code, disable operations, most importantly they can violate the privacy of patients and even steal their identities.  Risk of using wireless or mobile technology makes it easier to come up with a plan is place to try preventing further actions. This open connectivity brings with it risks, however, some of which are similar to those in wired...

Words: 671 - Pages: 3

Premium Essay

Mobile Devices

...more easy and flexible work place. Mobile technology can mean greater productivity, but it also has inadequate security measures to mitigate the risks inherent in the use of mobile devices. There are many factors to consider when deciding if wireless networking or in specifically if wireless technology is a reliable and safe route for the healthcare systems. Given the type of wireless infrastructure and different construction techniques, there are many ways to develop safe, reliable and most importantly a secure wireless health care technology. First, the important thing to consider is the assurance and security that we may face in today's enterprise healthcare systems. For this particular case, there are multiple office spaces in the professional building. With that said there may be multiple wireless transmitters and due to a radio-frequency wireless application may be a source of interference for another application. Security for wireless medical devices and systems must be addressed and make sure that it is able to handle such risks that can be involved. Some things to keep in mind would be if this exchangeability is worth the risks with such diligent information. With these interferences, it's a matter of manageability for a safe and secure method of transferring patient data from one space to another. Secondly, threats differ by groups whether they may be a police force or a medical team and most security issues inherent to mobile technology must have a well-planned...

Words: 529 - Pages: 3

Free Essay

How to Boost Communication Through Mobile Devices

...Table of Contents 1. Abstract 2. Brief Company Background 3. Discussion of Business Problems 4. High Level Solution 5. Benefits of Solving the Problem 6. Benefits/Technical Approach 7. Business Process Changes 8. Technology of Business Practices Used to Augment the Solution 9. Conclusions and Overall Recommendations 10. High-Level Implementation Plan 11. Summary of Project 12. References Abstract Johnson Controls has poor communications with all of its departments within the organization. Can Johnson Controls help boost profits and productivity by improving communications and personnel issues? I will conduct a research and create a plan to improve Johnson Controls’ communications and personnel issues. Brief Company Background Johnson Controls employs over 170,000 individuals world wide in several different businesses. The businesses that make up Johnson Controls are building efficiency, global workplace solutions, automotive experience and power solutions. The corporate headquarters is in Milwaukee, Wisconsin and they were number 66 on U.S. Fortune 599 and number 254 on Global Fortune 500. Johnson Controls is traded on the New York Stock Exchanged under the symbol JCI and generated $42.8 billion in sales in 2014. Warren Johnson started Johnson Electric Service Company in 1885. In 1902, the business was renamed Johnson Service Company and grew tremendously by providing regulated temperatures in buildings worldwide and stream-powered...

Words: 1959 - Pages: 8

Premium Essay

Mobile Devices

...Project One Alliant International University Sabrina Morris MG 210 Entrepreneurship Dr. Dana Leland April 20, 2014 Project #1: The Business Plan When should an entrepreneur write a business plan? Writing a business plan ahead of time, before you open your doors for business, appear to help the performance of the business subsequently. Business plans are all about walking the walk. People who write business plans also do more stuff so doing more stuff, such as researching markets and preparing projections, increases the chances an entrepreneur will follow through. a well-written plan is great for attracting talent. When a prospect asks to understand your business, you can hand them a plan that gives them an entire overview. The written record of your goals coupled with a track record of delivering against those goals sends a message loud and clear: You understand your business and can deliver the results you promise. Great employees will respond to that message-as will banks and investors the next time you need to raise money. (http://www.entrepreneur.com/article/230350, n.d.) When might it not be necessary to write a business plan? Some entrepreneurs fail to write business plans because they don’t want to test their ideas too much, for fear they won’t withstand the scrutiny. Taken seriously, a business plan will show that some businesses should not be started, a possibility some entrepreneurs don’t want to confront. Most of the business plans had nothing to do...

Words: 768 - Pages: 4

Free Essay

Term Paper: Students’ Self-Service Website for Mobile Devices

...Term Paper: Students’ Self-Service Website for Mobile Devices 6/17/2013 Professor: Kiran Chittargi CIS375 Mobility is on the rise in this current era and it is important to provide access to products for consumers as conveniently as possible. The use of smartphones with high speed data capabilities made it easier to view regular desktop websites without much hassle, but the issue occurs with rendering a website built for a PC on a much smaller screen of a mobile device. Another major issue is that, although the mobile devices are much powerful than they were, they still have compatibility issues with PC websites. For example, Apple’s iOS devices lack flash compatibilities, which is an integral part of many desktop websites today. This lack of compatibility calls for a new and much simpler implementation of an existing desktop website for accessing through a mobile device without much clutter. Building a website specifically for a mobile device allows users to access the website even when they are away from a computer and have an important task at hand. The target audience for such a website is the general people who use it on a daily basis which comprises mostly of students and instructors. Accessing the website through a mobile device comfortably will help the users a great deal. Most students who access the website are fulltime working students and lead a completely busy life, and their need would be able to access the website on their time without much hassle. The...

Words: 1869 - Pages: 8

Free Essay

Mobile Database

...Mobile database A mobile database is either a stationary database that can be connected to by a mobile computing device ( eg smartphone and PDA) over a mobile network OR A database, which is actually stored by the mobile device this could be list of contacts, price information distance travelled or any other information Many applications require the ability to download information from an information repository and operate on this information even when out of range or disconnected. An EXAMPLE of this is your contacts and calendar on the phone. In this scenario a user would require access to update information from files in the home directories on a server or customer records from a database. This type of access and work load generated by such users is different from the traditional workloads seen in client-server system of today CONSIDERATION • Mobile users must be able to work without a network connection due to poor or non existent connections. A cache could be maintained to hold recently accessed data and transactions so that they are not lost due to connection failure. Users might not require access to truly live data, only recently modified data, and uploading of changing might be deferred until reconnected • Bandwidth must be conserved (a common requirement on wireless networks that charge per megabyte or data transferred) • Mobile computing devices tend to have slower CPU and limited battery life • Users with multiple device (eg. Smartphone and tablet) need...

Words: 2537 - Pages: 11