Академический Документы
Профессиональный Документы
Культура Документы
CALDONA
Friday 8am-10am
Brings more detailed content directly to the index screen by using components to
display portions of related tools or content.
This pattern is more suited to tablet than mobile due to its complexity.
FILTERED VIEW
A filtered view pattern allows the user to navigate within a set of data by selecting
filter options to create an alternative view.
Apps or sites with large quantities of content, such as articles, images and videos.
Can be a good basis for magazine style apps or sites.
Native App
Some companies choose to develop both a native app and a mobile web app. Heres a
side-by-side look at Facebooks native app and mobile web app:
Development
Capabilities
Mobile Web Apps
Native Apps
Monetization
Mobile Web Apps
Native Apps
Method of Delivery
Mobile Web Apps
Native Apps
Native Apps
Strengths
Mobile Web Apps
Native Apps
Weaknesses
Mobile Web Apps
Native Apps
Internal Memory
Some tips to maximize it:
Review and determine the internal memory's availability
A high Built-in Internal memory
Example: an iPhone has a high built-in internal memory.
External memory
Some tips to maximize it:
Delete some unnecessary applications
Buy a high Memory card (SD CARD) in a mobile market
Screen Resolution
Some tips to maximize it:
Use some other device to maximize your screen resolution
Example : Projector.
Power
Some tips to maximize it:
Buy a powerbank in a market to maximize the use of your battery
File sharing
Some tips to maximize it:
Using bluetooth, infrared and etc.
Can also share using some applications available in the market like superbeam.
Processor
Some tips to maximize it:
You can maximize your mobile processor by upgrading it
In IOS, they implement an automatic upgrading system.
DEVELOPMENT ENVIRONMENT
Mobile application development
Application Environment
Fault tolerance
Computer or system program with self contained backup system
Allows you to continue work and give satisfaction results despite of errors
Transaction Execution in Mobile Database Systems
Disappearance of MH (mobile host) due to disconnections
Fault tolerance
Transaction proxy - The MHs do no execute any computation, but instead ask the
MSSs(mobile support stations) to execute transactions on their behalf
Read-Only Transactions - MHs only cache data ob jects for queries, and updates
are performed as in the preceding case.
Weak Transactions - In this case, they must stabilize their updates as soon as
they re-connect, that is, they have to globally commit the updates in order to reestablish consistency and to guarantee durability.
Low power electronic devices is cheap, tiny, smart and efficient. These traits of low
power computing is what makes it awesome and profitable.
Examples of a low power computing
LAPTOP
SMARTPHONES
TABLETS
NOTEBOOKS
MEMORY MANAGEMENT
Is the act of managing computer memory. In its simpler forms, this involves
providing ways to allocate portions of memory to programs at their request, and
freeing it for reuse when no longer needed. The management of main memory is
critical to the computer system.
Each process in the system has its own virtual address space. These virtual
address spaces are completely separate from each other and so a process
running one application cannot affect another. Also, the hardware virtual
memory mechanisms allow areas of memory to be protected against writing.
This protects code and data from being overwritten by rogue applications.
3. Memory Mapping
Memory mapping is used to map image and data files into a processes address
space. In memory mapping, the contents of a file are linked directly into the
virtual address space of a process.
SECURITY ISSUES
The common issues regarding low power computings is the security of its data and
application. Exploits may come from means of communication like wifi, vpn, lan
and etc.
There are also attacks that exploits the vulnerabilty of a software (Be it from OS
up to browsers).
Different security counter-measures are being developed and applied to low
power electronics which improves the security of a device; from its security up to
its design.
Another big problem plaguing mobile computing is credential verification. It's
not possible to that the person using that person is the true barrier.
Other users share username and passwords. This is also a major threat to security.
This being a very sensitive issue, most companies are very reluctant to implement
mobile computing to the dangers of misrepresentation.
The problem of identity theft is very difficult to contain or eradicate. Issues with
unauthorized access to data and information by hackers, is also a plaguing
problem.
They gain access to steal vital data from companies. This problem has been a
major headache and hindrance in rolling out mobile computing services.
No company wants to lay open their secrets to hacker and other intruders, who will
in terms sell them to their competitors. It's also important to take the necessary
precautions to minimize these threats from taking place.
Some of those measures include: