StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Effectiveness and Efficiency of Mobile Based Applications - Essay Example

Cite this document
Summary
This paper 'The Effectiveness and Efficiency of Mobile Based Applications' tells that Experts predict that by 2020 there will be more than three billion mobile devices making 450 billion mobile transactions (Chordas 2012: 14). Due to such a prediction made by experts about the future trends of mobile growth…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
The Effectiveness and Efficiency of Mobile Based Applications
Read Text Preview

Extract of sample "The Effectiveness and Efficiency of Mobile Based Applications"

?The Effectiveness and Efficiency of Mobile Based Applications Introduction: Experts predict that by 2020 there will be more than three billion mobile devices making 450 billion mobile transactions (Chordas 2012: 14). Due to such a prediction made by experts about the future trends of mobile growth, many companies are thinking ahead and preparing to use mobile-based applications using tools like geolocation and customer data usage to their advantage. Even in markets such as India, which has the second most-populous mobile subscriber base in the world, there are over 500 million mobile subscribers with 12 to 14 million new subscribers being added every month and mobile penetration is growing at over 30% per annum in rural areas (Arora 2012: 1). Quite a few market research studies also forecast a new internet revolution on mobile phones. Some of the new smart phones are more powerful than computers and operate in the ‘intimate’ space, accompanying people throughout the day (Arora 2012: 1). The convenience and capability to access data or do certain tasks with the help of applications from homes or any other public place using mobile devices even without a desktop computer has ensured a considerable increase of convenience and efficiency for businesses and people on the move The smart phone technology research and development wing has become very active in recent years and is improving day by day. Mobile networks are also creating phones that are increasingly better and tougher to intrude into or hack thus correspondingly increasing the capability of mobile devices and its applications. Effectiveness and Efficiency of Mobile Applications: A simple way to describe geolocation is to say that it is a technology that requires data from a computer or mobile phone to pinpoint a person's actual physical position. A better and succinct definition that could be used is as follows: “A geolocation system is an information technology solution that ascertains the location of an object in the physical (geo-spatial) or virtual (Internet) environment. Most often, the object is a person who wants to utilize a service based on location, while maintaining his/her privacy” (ISACA 2011: 5). This has caught up among today’s youth and social networking sites which they commonly use by providing us the ability to track or let friends know where we are, to identify certain or specific joints frequented by them and book tickets in cinema halls. These types of applications can also be accessed on a desktop system but will not be the same as when available on a mobile device. Most individuals have invariably used Google Maps to get directions from one place to another but again the thrill of using such an application from a mobile is unique. Depending on your movement from one place to another, the data sent and received will also change. This is possible due to the GPS (Global Positioning System) chip found inside the device. This chip uses two methods to track your position. In the first method, the chip uses satellite data to calculate a person's exact location but if there are any snags like interference or unavailability of service, then the chip uses data from cell phone towers to calculate location. If the person is driving through rain, cloud cover or even a canopy of trees, there could be a loss of communication but on a clear day, there should not be any problem. Here we should also note that if the software is very sophisticated, the accuracy provided will also be of high quality. Light should also be shed on some concerns regarding this type of application. Sharing of location could lead to personal risk. Anti-social elements like stalkers or even robbers who know that you are out may take advantage of situations. Although all these exist, many application developers are finding ways to counter such disadvantages by providing privacy preferences. If one chooses wisely, the benefits from such an application far outweigh the negative effects though it necessitates a small amount of privacy sacrifice from our side. "The use of geolocation for proximity-based access to applications transparently benefits all users. Users directed to the application instance or website that is physically closest to them mitigates the impact of speed of light limitations on application performance" (MacVittie 2012: 5). For organizations with huge presence of internet, decisions based on physical proximity are an excellent method of distributing resources. The addition of appropriate geolocation technology helps various organizations to understand and implement need-based applications appropriately—providing, for example, more compute resources for urban densely populated, high technology using areas, where there are millions of users, and fewer resources in rural or sparsely populated areas with fewer users. The Advantages of Gaining Access to Their Own Data via Mobile Applications: As a consequence of widespread and all pervasive usage of mobile phones, developers and users need a development environment that allows more of its users to create unique and specialized applications that are user friendly and affordable. Newly developed mobile applications have all the necessary information inbuilt in it to access and capture all the geolocation data from a remote location and also transfer such data to the processing server without using a desktop computer, which serves to increase the convenience and also decreases the time needed in order to update specific data. The arrival of mobile applications has allowed businesses to device enterprise level applications that contribute sizeably to escalate their day to day operational efficiency, customer service and quality. These mobile applications also allow flexibility to employees to work from home or any location convenient to them at any time and update or access data on a real time basis. Customers can now log on to any payment center using their cell phone also to settle dues and bills without the inconvenience of having to commute and reach the physical location. They can check bank transactions and balance, read emails, share photos, update their social networking relationships etc. The possibilities are endless. Business processes can be made through secure connections. Business houses using mobile computing have put in adequate measures to ensure authentication and authorization of the user accessing essential services. Some business functions can be run over secure links and also the sharing of information between business partners. The need for lengthy travelling has been reduced, since the use of voice and video conferencing. Meetings, seminars and other informative services can all conducted using the same. The Challenges of Developing Applications for Mobile Devices to Small Screen Size: Designing and creating applications that to fit the screen size of a mobile phone can be very challenging for the developer. Even though the recent developed smart phone are made with extra features that are better than the previous designs with power, better computer like processors and of course enhanced display and better cameras, it is still not advisable to try to recreate full- fledged computer websites or applications for these devices. Such an act would lead to poor performance issues and dissatisfied customers. The crux of the issue is not to shrink the website to fit to a smaller screen but to completely change the sites and applications for better view and display and to make them more mobile. They need to be compatible with the user expectations in order to have a productive experience. One of the pioneering techniques for smart phone web application developers is a concept behind a relatively new term called “responsive design” (Ethan Marcotte, 2012). The main feature of responsive design is that the problems that arise due to poor navigability and readability are easily tackled through the effective utilization of several grid and layout systems and also image optimization. Ever since the movement of “responsive design” has gained acceptance and has been widely adopted by web site, smart phone and tablet developers and designers alike, companies like Adobe are also trying to integrate these game-changing design trends into their existing platform. Information technology needs to process out a novel application development strategy and take the lead in optimizing business processes for mobility. Business organizations that want to gain a leadership role and bring value and admiration from potential employees as well as the leaders of the technology like Apple should be aware and awake to all the potentialities of the latest in mobile application trends. "Potential problems can range from the various input methods for inputting data into the phone (different keypads and methods of scrolling), varying screen sizes, varying phone capabilities, varying user expectations, varying user behavior and leveraging built-in hardware and features on a mobile phone" (Cartman & Ting 2009: 107-110). Without a clear understanding of expectations of the customer, companies can overwhelm users with too much clutter and too little integration between features and functions. In addition, developers need to use mobile interaction to successfully design for mobile device. This can be created in three steps. The first step is the most important one. It involves user research- to understand the needs of the consumer for whom the application is being catered to and then create the design so that it the developer can test it, learn from it and then refine the product before it reaches the customer. This step seeks the direct involvement of the customer too. It uses interviews, user studies etc to assess the requirements for the mobile device. The second step is more factory oriented where all the conceptualizing, designing and prototyping take place. The third and final step involves testing and modifying, if required, of the final product as it will be when it reaches the market. It should be remembered that an application that has been developed cannot be used for all mobile devices. It should be kept in mind that mobile devices have to be particular about their target customers. A mobile application designer understand the most common devices likely to use their site or application and design for that target audience and then use that device when choosing optimal design specifications. Methods Used to Decide the Platforms to Support: An effective and efficient method is dependent on several important factors, but the most important one among all is the choice is the choice of “ecosystem” (How to Choose the Right Ecosystem, n.d., p.3). Understood as a working combination of device, operating system and delivery environment, a mobile ecosystem determines the way an application is discovered and used (How to Choose the Right Ecosystem, n.d., p.3). In recent times, choice of ecosystem becomes complicated because of improvement and easy availability of advanced mobile devices and also variety and choice in the availability of operating systems. The perfect and maximum performance will be accelerated only if works on the ecosystem designed and developed for it, so, it must be ensured that the right decisions have been taken in this regard to ensure the success of your mobile application. Several questions arise when we consider the platform to choose for your mobile site or applications. For Example, the type of carriers which offer devices for the platform, the number of handsets that are available, and the features do they put forward to the consumer, how strong the platform's development environment is, whether the newly developed platform's application delivery system conform to acceptable norms are all factors to be given serious thought to and then only the final decision of supporting a platform should be taken. The platform that answers all the above mentioned questions is the best one to start with. Today the expectations from the business end have increased and it is expected that the same application or a variation of the application should be available for several different platforms. Today mobile developers have to usually choose between Android, BlackBerry, iPhone, Palm webOS, Symbian, and Windows Mobile – and the list continues. “To make matters worse the applications developed for these platforms are incompatible with each other. Because of this the choice of platform limits the choice of tools and languages that are available and the range of devices the applications are used with” (McAllister, 2009). Ways of Providing High Availability for Mobile Applications: A strong focus by IT departments is required with regard to the preparation and planning for the development of web or hybrid applications. There also exists the need for a much researched approach in dealing with the issue of “high availability” (Understanding High Availability for the BlackBerry Enterprise Server 2009) for smart phone users. Mobile applications require high availability because consumers and businesses that use "high availability" platform need to have continuous access to IT systems. More importantly, “this type of application is designed to protect mobile users against both planned and unplanned service interruptions. Unplanned service interruptions are typically triggered by technical problems within the system. Planned service interruptions, such as upgrades, are often necessary for maintaining peak performance and service” (Understanding High Availability for the BlackBerry Enterprise Server 2009). Some sort of solutions that will address the high availability fiasco is by creating partnerships with third-party companies that would be able to monitor transactions throughout and provide back-end support for data storage. This is one of the strategies that has been adopted by Blackberry maker, Research In Motion Limited (RIM). Any breakdown in the system can adversely affect businesses with respect to customer service, productivity, sales and revenues for end users. Service failures, breakdowns, consequences of unfair weather are all not be considered as excuses for bad performance but if there is a particular planned shutdown, because the customer will get an advance warning that systems will be shut down for a specific time period for maintenance or any other need of the service provider “but the catastrophic affects of unplanned downtime can bring about serious consequences” (Technical Whitepaper, 2009). “Even a few minutes of application downtime can cost big financial losses, erode client confidence damage brand image, and present public relations problems” (Brooks, Leung & Mariza, 2007). Usually, there are three methods of handling unplanned outages- Clustering, Network load balancing and Replication. In the clustering method, “multiple computers that are physically networked together and logically connected using cluster software. This software is flexible and will allow two or more independent servers to work as a single system” (Yant 2012:1). If a failure is detected anywhere, the workload will be automatically moved to another server, all the client processes are switched over and the failed application will then be restarted. There might be a slight delay but the service will be completed. “A few benefits of clustering are reduction of unplanned downtime, reduction of planned downtime, continuous health monitoring and it is compatible with industry standard hardware” (Yant 2012:1). Another method is called Network Load Balancing. This is also like Clustering but in this, the Web traffic is evenly distributed over a number of servers so that it will automatically detect the failure of the server and will also reroute the customer to the next server within a short span of time. The time taken for this process is very fast. This process expedites the reinstatement of services within a short span of time and the client is not even aware of breaking or interruption in service. Some of the advantages of this method are "continuous application service and incremental server additions" (Yant 2012:1). Replication is another method that reflects the “data to a remote storage system so that if the primary storage system becomes unavailable, the data can be retrieved and accessed through the remote subsystem” (Yant 2012:1). Methods to Make Mobile Devices More Secure: Mobile devices are more likely to be targeted for hacking at a higher rate than non-mobile devices the issue of security becomes more prevalent as the adoption rate of smart phones increases. As the number of smart phones increases so do the chances of fraud. According to Lookout Inc., the leading mobile security company, Mobile malware has now become a profitable industry. Due to widespread use worldwide as a method of payments for mobile devices, this point is considered to the most vulnerable point for malware writers to penetrate security. The issue of privacy also features importantly with security issues. A significant part of privacy problems are from aggressive advertising techniques, including pushing out-of-application advertisements and accessing personally identifiable information without user notification. Certain precautions taken can reduce these security threats. One of the most important is to recognize the nature of applications that you download. They should be from trusted sources like Google play or Apple store. Always be wary of applications that make false claims that promise to give a paid application for free. Here are some other techniques suggested: Check for suspicious activity. Review your phone bill regularly to confirm you haven't been charged. (Lookout's State of Mobile Security Identifies Malware Designed for Profit and Privacy as 2012 Growth, 2012). We can also lock the device by using password protection or even lock the mobile when we are sure that whether we are not going to use it within a short time. so that random people cannot access your data. Taking advantage of the ability of a mobile to send signals in case of lost devices, users can set up a remote wiping facility that erases all data stored in it including e-mails, contacts, photos, etc. Encryption is another security step that a lot of organizations require on their laptops and other devices but it is not commonly for all devices on the market today but if it is available it should be used (Lookout's State of Mobile Security Identifies Malware Designed for Profit and Privacy as 2012. Special software designed for protecting devises against the threat of viruses, though it doesn't promise security is another option for protecting your phone or device. It can detect the presence of dangerous malware and can be useful when used wisely. Yet another method to get past security breaches is to use the concept of “thin client” (Yant 2012:1). It is always advisable to use caution while downloading from unreliable or new sites. The use of GPS should also be as and when required only and at other times this should be disabled. These small precautions will also enhance the battery life of the mobile devices. Conclusion: The ever increasing advances in the efficiency and availability of mobile internet and smart phone capabilities have considerably increased the efficiency and speed with which tasks can be completed using only mobile devices rather than the conventional desktop computers. Today's mobile users have easy access to information, can conduct transactions and perform multitude of tasks through mobile applications. This convenience has resulted in improving everyday lives of ordinary people by saving a lot of time previously in queues- to buy ticket, pay bills, etc. The pinpointing of locations and the availability of personal and professional data from all consumers are very useful in all mobile devices applications and it also forsakes the undue dependence on desktop computers. This also increases convenience and decreases the time required to transfer the data. The advent of mobile applications has allowed businesses to create enterprise level applications that significantly enhance their operational efficiency, customer service and quality. References Arora, S. 2012. Mobile Research: Datamatics Global Services Limited. Retrieved September 11, 2013, from Brooks, C., Leung, C. & Mariza, A. 2007, p-10. IBM System Storage Business Continuity Solutions Overview. Retrieved September 11, 2013, from Cartman, J. & Ting, R. 2009. Excerpted from Strategic Mobile Design: Creating Engaging Experiences. Pearson Education, pp-107-110. Retrieved September 11, 2013, from Chordas, L. 2012. The New Tech Priorities: Best's Review, Vol.11: p 14. Retrieved September 11, 2013, from From Insight to Action: The Impact of the Mobile Intelligence Revolution in Business. (2011). Micro Strategy Inc. Retrieved September 11, 2013, from How to Choose the Right Ecosystem for Your Mobile Application. n.d. Retrieved September 11, 2013, from Geolocation: Risk, Issues and Strategies. (2011). Retrieved September 11, 2013, from Lookout's State of Mobile Security Identifies Malware Designed for Profit and Privacy as 2012 Growth Areas. (2012). Business Wire. Retrieved September 11, 2013, from MacVittie, L. (2012). Geolocation and Application Delivery: FS Networks, P-5. Retrieved September 11, 2013, from Mobile Application Development. (2010). Straight Talk Telecoms. Retrieved September 11, 2013 from Responsive Web Design, Most Complete Guide. (2012). Webdesignshock.com. Retrieved, September 11, 201, from Technical Whitepaper. (2009). Understanding High Availability for the BlackBerry Enterprise Server. Retrieved September 11,2013, from bhttp://ae.blackberry.com/services/business/server/full/pdf-understanding-high- availability.pdf> Understanding High Availability for the BlackBerry Enterprise Server. (2009). Research in Motion, Limited. Retrieved, September 5, 2012 from dam/blackBerry/pdf/whitePaper/northAmerica/english/ RIM1270_UnderstandingHighAvailability- LowRes.pdf Yant, J. 2012. Mobile Computing and Social Networks. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Mobile Computing and Social Networks Essay Example | Topics and Well Written Essays - 2500 words - 1”, n.d.)
Mobile Computing and Social Networks Essay Example | Topics and Well Written Essays - 2500 words - 1. Retrieved from https://studentshare.org/information-technology/1485370-mobile-computing-and-social-networks
(Mobile Computing and Social Networks Essay Example | Topics and Well Written Essays - 2500 Words - 1)
Mobile Computing and Social Networks Essay Example | Topics and Well Written Essays - 2500 Words - 1. https://studentshare.org/information-technology/1485370-mobile-computing-and-social-networks.
“Mobile Computing and Social Networks Essay Example | Topics and Well Written Essays - 2500 Words - 1”, n.d. https://studentshare.org/information-technology/1485370-mobile-computing-and-social-networks.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Effectiveness and Efficiency of Mobile Based Applications

Effective Employee Survey Process at Jollibee

Hence, the goal is to evaluate out-dated policies and penalties to employees and those that need stringent measure to enhance efficiency at work.... Besides this, efficiency is highlighted as part of the goals due to potential changes in employee benefits and remuneration basic to assessment of increase in responsibilities in return for an increase in benefits and remuneration.... Finally, with the exemption of management, the study targets employees in order to evaluate and get feedback on manager effectiveness, in which case the use of managers in the study would be redundant with the issue of asking an individual to give him or herself an honest opinion about his or her qualities....
9 Pages (2250 words) Admission/Application Essay

Principle Based Decision Making

The choice among the several existing alternatives to a particular my life to, evaluate the principle-based decision-making will be illustrated in the following sections.... It is my problem of to cope up with any sexual based decision from the perspective of AIDS....
5 Pages (1250 words) Admission/Application Essay

Statement of purpose

A career in… I was given some basic training on operations and applications of computer in my school days.... I was given some basic training on operations and applications of computer in my school days.... I learned topics like Computer Organization, Microprocessor applications and Digital Logic Design which expanded my theoretical knowledge.... I had the opportunity to undertake a live project at BPL mobile Ltd.... I accomplished the project called “mobile High Roaming Alert” which was implemented by the company and is done in Oracle and VB....
1 Pages (250 words) Admission/Application Essay

Overall effectiveness of self managed teams

Moreover, due to the fact that a level of outside oversight is not present, the means by which key shareholders within the group can seemingly hijack the process and divert the problem solving abilities of the group into something of a contest between opposing views necessarily reduces the effectiveness that such an entity could otherwise possess.... With regards to the overall effectiveness of self-managed teams, the understanding of how these work, their drawbacks, and strengths must be integrated with in order to realize the full potential and weaknesses that they portend....
2 Pages (500 words) Admission/Application Essay

Movie compare

In the book The Protestant Ethic and the Spirit of Capitalism, the author Max Weber has explored the relationship between ascetic Protestantism and the development of modern Capitalism.... Weber has argued that the religious concepts of several groups like the Calvinists are… The axiom that capitalism views profit as end in itself has religious affiliation....
5 Pages (1250 words) Admission/Application Essay

Community-Based Learning - Feed the Hungry

Through community based learning (CBL), most of these managerial aspects are experienced.... Management in an organization is the main ‘engine' coordinating the people's effort to accomplish set goals and objectives by use of available resources effectively and efficiently.... Management… Resourcing is also very crucial for an organization since most of the activities will not take place minus resourcing efforts....
10 Pages (2500 words) Admission/Application Essay

Increasing Efficiency and Enhancing Value in Health Care

This paper highlights that in today's healthcare industries, there is growing concern over spending both during difficult economic conditions and during periods where the costs of providing health services continue to increase at the supply chain level.... nbsp;… According to the paper, in the healthcare industry, there is considerable focus on improving quality, both in the actual service delivery and related to how organizational staff interacts with various patients or consumers....
14 Pages (3500 words) Admission/Application Essay

Personal, Academic, and Career Effectiveness

The essay “Personal, Academic, and Career effectiveness” illuminates the foreign student's reflection on his academic achievements, communication skills and ways to increase internal motivation to achieve goals, plans to get an MBA degree and find a prestigious job in a multinational company.... nbsp; Doing this exercise in Personal and Career effectiveness has made me learn so many things about myself, as a lot of reflection and introspection are entailed....
13 Pages (3250 words) Admission/Application Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us