StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Software for wireless devices - Essay Example

Cite this document
Summary
First is the number of competing standards for application development on various mobile devices. This means the lack of a single uniform standard is cumbersome for the…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.5% of users find it useful
Software for wireless devices
Read Text Preview

Extract of sample "Software for wireless devices"

SOFTWARE FOR WIRELESS DEVICES (Electronic Commerce) ID number: BU460 of (affiliation) Location of University:Date of Submission: February 14, 2014Estimated Word Count = 283 (text only)Software for Wireless DevicesThere are two main reasons why developing software for wireless devices is particularly quite challenging. First is the number of competing standards for application development on various mobile devices. This means the lack of a single uniform standard is cumbersome for the software developers as they have to customize the software for each type of device with which the application has to communicate.

Second, software applications need to be adapted for the specific requirements of the mobile device such as small display screens, reduced bandwidth, a restricted memory storage capacity, and limited input capabilities (Turban et al., 2008, 425). The software developers have to anticipate special requirements and design the system differently such as by re-designing the software program to deal with a limited memory, for example.The five major software components necessary in mobile computing include 1) mobile operating system such as Microsoft, Symbian, Linux, and other specialized operating systems, 2) a mobile application user interface which is the application logic in mobile devices to operate the various interface devices such as a mini-joystick, touch screen, thumb wheel, and jog dial, 3) the microbrowsers which are actually similar to standard Internet browsers but specially adapted to deal with the limitations in the memory, bandwidth, and smaller display screens of mobile devices, 4) the wireless application protocol or WAP which is the suite of network protocols to enable different kinds of wireless devices to access WAP-readable files on an Internet-connected Web server, and 5) various mark-up languages which is also an area that lacks a single uniform standard; examples of competing standards are wireless markup language (WML), the compact hypertext markup language (cHTML), and extensible hypertext markup language (eHTML).

Reference Turban, E., King, D., McKay, J., Marshall, P., Lee, J., & Viehland, D. (2008). Electronic commerce 2008: A managerial perspective. New York, NY, USA: Pearson Learning Solutions.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Software for wireless devices Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Software for wireless devices Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/e-commerce/1625669-software-for-wireless-devices
(Software for Wireless Devices Essay Example | Topics and Well Written Essays - 250 Words)
Software for Wireless Devices Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/e-commerce/1625669-software-for-wireless-devices.
“Software for Wireless Devices Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/e-commerce/1625669-software-for-wireless-devices.
  • Cited: 0 times

CHECK THESE SAMPLES OF Software for wireless devices

The Age of Handheld Devices

In simple words, mobile computing makes use of different high technology gadgets and devices, it has helped make communication easy and the lives of people more convenient by keeping them well informed about the current happenings.... That was just the beginning as since then innumerable number of devices have ventured into the market that have brought about a sense of wireless communication and have given an extra edge to everyone's communication dilemma.... Today, everyone has access to infinite number of high end devices which can easily connect to the internet....
3 Pages (750 words) Research Paper

Inferno Network Operating System

hellip; An operating system in the simplest of words is a control software on a computer or similar devices where several other softwares can also be incorporated.... It controls computers and other communication media through the three components of networks; making it allow usage not only to specific devices but also taking into account inter-device features that are shared.... With this property, a unique feature that is not common to other current technological devices, for instance, the compatibility communication mode between a wrist watch which has an encrypted alarm to trigger various programme sessions; is made a possibility....
3 Pages (750 words) Research Paper

Application of Bluetooth, Advantages and Disadvantages of Using Bluetooth

This essay "Bluetooth Device" will look at Bluetooth technology and its compatible devices.... nbsp;… Bluetooth is a wireless technology which is a short-range communication technology which is intended to replace the cable that is used in connecting portable devices or fixed ones and at the same time maintain a high level of security.... However, Bluetooth denies a uniform structure of which represents a wide range of devices that are used for connection and communication with each other....
5 Pages (1250 words) Essay

Wireless Communication

Mesh topology or mesh network is a network topology in which devices are connected with many redundant interconnections between network nodes.... Running Header: WIRLESS Wireless Communication Mesh Topology Mesh topology or mesh network is a network topology in which devices are connected with many redundant interconnections between network nodes.... Ring Topology In ring topology all devices are connected to one another in the shape of a closed loop, so that each device is connected directly to two other devices, one on either side of it....
2 Pages (500 words) Essay

Internet Connections

Moreover, a wireless network adapter installation will be needed in each of the devices that need to be connected.... Answer 2The enterprise is required to purchase the following devicesHubsSwitchesBridgesRoutersNICs (Network Interface Card)WAPs (Wireless Access Point)FirewallsBeing an enterprise, the company requires both wired and wireless network protocols and all the devices mentioned above are commonly used in enterprises for providing both types of networks....
2 Pages (500 words) Essay

Wireless Deployment Plan

This paper ''wireless Deployment Plan'' discusses that a wireless deployment plan is a sequence of operations that is carried out to deliver wireless networking services.... In this context, the wireless service will be delivered to an institution of learning.... nbsp;… A wireless deployment plan provides an efficient and effective implementation of the wireless network in the institution and provides guidance towards the implementation of the system....
6 Pages (1500 words) Term Paper

The Bluetooth Wireless Technology and the Radio Frequency Identification Technology

It is an industrial design for wireless personal area networks (PANs) and affords a means of connecting to and trading data between gadgets such as personal computers, laptops, printers, mobile phones, digital cameras, personal digital assistants (PDAs), video game consoles, and the like over a secure, globally-available-and unlicensed short-range radio frequency.... escription of both SystemsBluetooth wireless technology is intended for low power consumption and short-range communications and is designed to eliminate the need for cables connecting devices while still sustaining a high level of security....
8 Pages (2000 words) Thesis

All Your Devices Can Be Hacked by Avi Rubin

This paper provides a summary of Avi Rubin's “All devices can be hacked” Rubin shows people the unnoticed security implications of modern computerized, wireless devices and explains how hackers compromise smartphones, automobiles, and medical devices.... Rubin also explains how reflection on sunglasses is used to capture Smartphone passwords and the criteria of writing software for stabilizing phones, processing them, and detecting typing.... The paper "All Your devices Can Be Hacked by Avi Rubin" sheds light on matters regarding network security and the manner in which the particular principles can actually be practically applied to various technologies including pacemakers and the P52 radio transmitters....
1 Pages (250 words) Article
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us