SlideShare a Scribd company logo
1 of 12
Planning for the Mobile
Enterprise
Introducing Mobile Computing
ā€¢ Mobile Computing
Mobile (moving)
+
Computing (using computer)
Mobile computing = is an umbrella term
used to describe technologies that enable
people to access network services
anyplace,anytime,and anywhere.
Mobile computing
ā€¢ In recent years, distributed computer has become
the norm, especially after the advent of the
internet.
ā€¢ Today, technological advances are shaping a new
computing environment where the user is free
from the need to work at a specific location, and
is even enabled to work while on the move.
ā€¢ This new paradigm is often called mobile
computing.
Mobile Computing Device
ā€¢ LAPTOP
ā€¢ Portable and compact personal
computer with the same capabilities
as a desktop computer.
ā€¢ TABLETS
A small portable computer that accepts input
directly on to its screen rather than via
a keyboard or mouse.
ā€¢ CELLPHONE
A phone with access to a cellular radio system so
it can be used over a wide area, without a
physical connection to a network; a mobile
phone.
ā€¢ LONG-RANGE WIRELESS
Connected devices have so far mostly run
piggyback on the same networks and protocols
that support the Internet and mobile
communications
Going Mobile beyond the Enterprise
ā€¢ Mobile technology along with bring-your-own device
(BYOD) has largely transformed our lives, including the way
we work. But enterprise mobility is more than simply
providing remote access to users. It is rather a shift in work
habits where employees can work remotely leveraging
mobile devices and cloud technology to better perform
business tasks.
ā€¢ The mobile revolution is changing the way organizations
work, manage their operations as well as engage with their
employees. As a result, organizations are reconsidering
their technologies and techniques to make their traditional
organizational cultures and roles more mobile friendly,
making ā€˜mobile firstā€™ a must have strategy.
Navigation
ā€¢ Many external navigation sites like the major
search engines exist to return thousands of links
for almost any topic you might happen to be
curious about.
ā€¢ A DNS server would start its search for an IP
address by contacting one of the root DNS
servers. The root servers know the IP addresses
for all of the DNS servers that handle the top-
level domains (.COM, .NET, .ORG, etc.).
Connectivity
Connectivity describes the extensive process of
connecting various parts of a network to one
another, for example, through the use of
routers, switches and gateways, and how that
process works.
Bandwidth
ā€¢ Bandwidth describes the maximum data
transfer rate of a network or Internet
connection. It measures how much data can
be sent over a specific connection in a given
amount of time. For example, a
gigabit Ethernet connection has a bandwidth
of 1,000 Mbps, (125 megabytes per second).
An Internet connection via cable modem may
provide 25 Mbps of bandwidth.
VPN and SSL access
ā€¢ A VPN or Virtual Private Network is a method used to
add security and privacy to private and public
networks, like WiFi Hotspots and the Internet. VPNs
are most often used by corporations to protect
sensitive data.
ā€¢ SSL (Secure Sockets Layer) is the standard security
technology for establishing an encrypted link between
a web server and a browser. This link ensures that all
data passed between the web server and browsers
remain private and integral. SSL is an industry standard
and is used by millions of websites in the protection of
their online transactions with their customers.
Remote desktops
ā€¢ Remote desktop is a program or an operating
system feature that allows a user to connect
to a computer in another location, see that
computer's desktop and interact with it as if it
were local.
Planning for the Mobile Enterprise

More Related Content

What's hot

M1 computer networks
M1 computer networksM1 computer networks
M1 computer networksCarlTodd
Ā 
Networking basics
Networking basicsNetworking basics
Networking basicsRyan Jones
Ā 
Working principles of internet nme
Working principles of internet nmeWorking principles of internet nme
Working principles of internet nmevinothini1996
Ā 
Protocols and methods
Protocols and methodsProtocols and methods
Protocols and methodsLouise Reed
Ā 
Power point
Power pointPower point
Power pointdrich14
Ā 
Mobile computing 1
Mobile computing   1Mobile computing   1
Mobile computing 1Sujesh Lal
Ā 
APIA2018 - Alexann Zhang - Decentralized Fog Computing World
APIA2018 - Alexann Zhang - Decentralized Fog Computing WorldAPIA2018 - Alexann Zhang - Decentralized Fog Computing World
APIA2018 - Alexann Zhang - Decentralized Fog Computing WorldEuropean Innovation Academy
Ā 
About Networking
About NetworkingAbout Networking
About NetworkingRakeshHalder6
Ā 
Wireless Network
Wireless NetworkWireless Network
Wireless NetworkAayush Sharma
Ā 
Timeline History of Internet
Timeline History of InternetTimeline History of Internet
Timeline History of InternetMi Berras
Ā 
Home networks ----neri
Home networks  ----neriHome networks  ----neri
Home networks ----neriaejay_neri
Ā 
System and networkpresentation(sadaf noor)
System and networkpresentation(sadaf noor)System and networkpresentation(sadaf noor)
System and networkpresentation(sadaf noor)SadafNoor13
Ā 

What's hot (20)

Lecture 20
Lecture 20Lecture 20
Lecture 20
Ā 
M1 computer networks
M1 computer networksM1 computer networks
M1 computer networks
Ā 
It (bluetoth)
It (bluetoth)It (bluetoth)
It (bluetoth)
Ā 
Networking basics
Networking basicsNetworking basics
Networking basics
Ā 
Working principles of internet nme
Working principles of internet nmeWorking principles of internet nme
Working principles of internet nme
Ā 
Mobile computing
Mobile computingMobile computing
Mobile computing
Ā 
Protocols and methods
Protocols and methodsProtocols and methods
Protocols and methods
Ā 
Power point
Power pointPower point
Power point
Ā 
Networks
NetworksNetworks
Networks
Ā 
Network
NetworkNetwork
Network
Ā 
Network
NetworkNetwork
Network
Ā 
Mobile computing 1
Mobile computing   1Mobile computing   1
Mobile computing 1
Ā 
APIA2018 - Alexann Zhang - Decentralized Fog Computing World
APIA2018 - Alexann Zhang - Decentralized Fog Computing WorldAPIA2018 - Alexann Zhang - Decentralized Fog Computing World
APIA2018 - Alexann Zhang - Decentralized Fog Computing World
Ā 
About Networking
About NetworkingAbout Networking
About Networking
Ā 
Wireless Network
Wireless NetworkWireless Network
Wireless Network
Ā 
Timeline History of Internet
Timeline History of InternetTimeline History of Internet
Timeline History of Internet
Ā 
Bluetooth
BluetoothBluetooth
Bluetooth
Ā 
5 g technology
5 g technology5 g technology
5 g technology
Ā 
Home networks ----neri
Home networks  ----neriHome networks  ----neri
Home networks ----neri
Ā 
System and networkpresentation(sadaf noor)
System and networkpresentation(sadaf noor)System and networkpresentation(sadaf noor)
System and networkpresentation(sadaf noor)
Ā 

Similar to Planning for the Mobile Enterprise

Mobile computing
Mobile computingMobile computing
Mobile computingsadia Afrose
Ā 
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSENETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSETENZING LHADON
Ā 
Data Communications.pptx
Data Communications.pptxData Communications.pptx
Data Communications.pptxjepoy808
Ā 
Lecture 2 types of network
Lecture 2 types of networkLecture 2 types of network
Lecture 2 types of networkAlbert Abbosey
Ā 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxRbalasubramani
Ā 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxlisbala
Ā 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxGaganaP13
Ā 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxHaythanSunday
Ā 
Networking
NetworkingNetworking
Networkingrahul2485
Ā 
Computer networks.pptx
Computer networks.pptxComputer networks.pptx
Computer networks.pptxshubhidas
Ā 
E business webinternet slides world wide web / protocols
E business webinternet slides  world wide web / protocolsE business webinternet slides  world wide web / protocols
E business webinternet slides world wide web / protocolsAsjadAli34
Ā 
NF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptxNF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptxmmmm11111
Ā 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networkingnhumar
Ā 
Computer networks
Computer networksComputer networks
Computer networksRohit Kori
Ā 
Computer network
Computer networkComputer network
Computer networkRahul Das
Ā 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxVishwaTej10
Ā 
A Fundamental elements of a network.pptx
A Fundamental elements of a network.pptxA Fundamental elements of a network.pptx
A Fundamental elements of a network.pptxdexdexjoyjoy
Ā 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internetAnish Thomas
Ā 

Similar to Planning for the Mobile Enterprise (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
Ā 
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSENETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
Ā 
Data Communications.pptx
Data Communications.pptxData Communications.pptx
Data Communications.pptx
Ā 
Lecture 2 types of network
Lecture 2 types of networkLecture 2 types of network
Lecture 2 types of network
Ā 
Networking
NetworkingNetworking
Networking
Ā 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
Ā 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
Ā 
Internet
InternetInternet
Internet
Ā 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptx
Ā 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptx
Ā 
Networking
NetworkingNetworking
Networking
Ā 
Computer networks.pptx
Computer networks.pptxComputer networks.pptx
Computer networks.pptx
Ā 
E business webinternet slides world wide web / protocols
E business webinternet slides  world wide web / protocolsE business webinternet slides  world wide web / protocols
E business webinternet slides world wide web / protocols
Ā 
NF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptxNF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptx
Ā 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networking
Ā 
Computer networks
Computer networksComputer networks
Computer networks
Ā 
Computer network
Computer networkComputer network
Computer network
Ā 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptx
Ā 
A Fundamental elements of a network.pptx
A Fundamental elements of a network.pptxA Fundamental elements of a network.pptx
A Fundamental elements of a network.pptx
Ā 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
Ā 

More from Anurag Bhusal

Warehousing management
Warehousing managementWarehousing management
Warehousing managementAnurag Bhusal
Ā 
The Ottoman Empire
The Ottoman EmpireThe Ottoman Empire
The Ottoman EmpireAnurag Bhusal
Ā 
Risk management
Risk managementRisk management
Risk managementAnurag Bhusal
Ā 
Recruitment and Selection
Recruitment and Selection Recruitment and Selection
Recruitment and Selection Anurag Bhusal
Ā 
Globalization India
Globalization IndiaGlobalization India
Globalization IndiaAnurag Bhusal
Ā 
Contemporary Theories Of Entrepreneurship (Prof.Harvey Leibenstein )
Contemporary Theories Of Entrepreneurship (Prof.Harvey Leibenstein )Contemporary Theories Of Entrepreneurship (Prof.Harvey Leibenstein )
Contemporary Theories Of Entrepreneurship (Prof.Harvey Leibenstein )Anurag Bhusal
Ā 
Nepal's Rivers Systems
Nepal's Rivers SystemsNepal's Rivers Systems
Nepal's Rivers SystemsAnurag Bhusal
Ā 
Types of transportation
Types of transportationTypes of transportation
Types of transportationAnurag Bhusal
Ā 
Industrial Revolution
Industrial RevolutionIndustrial Revolution
Industrial RevolutionAnurag Bhusal
Ā 
Feudalism system then and now
Feudalism system then and nowFeudalism system then and now
Feudalism system then and nowAnurag Bhusal
Ā 
You been given a 1000 pounds to do some thing good.
You been given a 1000 pounds to do some thing good.You been given a 1000 pounds to do some thing good.
You been given a 1000 pounds to do some thing good.Anurag Bhusal
Ā 
You been given a 1000 pounds to do some thing good.
You been given a 1000 pounds to do some thing good.You been given a 1000 pounds to do some thing good.
You been given a 1000 pounds to do some thing good.Anurag Bhusal
Ā 
Service Industries
Service IndustriesService Industries
Service IndustriesAnurag Bhusal
Ā 
The three division of power in Nepal
The three division  of power in NepalThe three division  of power in Nepal
The three division of power in NepalAnurag Bhusal
Ā 
Financial institution
Financial institutionFinancial institution
Financial institutionAnurag Bhusal
Ā 
Launching new product
Launching new productLaunching new product
Launching new productAnurag Bhusal
Ā 
The role of fiscal policy and central bank
The role of fiscal policy and central bankThe role of fiscal policy and central bank
The role of fiscal policy and central bankAnurag Bhusal
Ā 
Accounting system in Nepal
Accounting system in NepalAccounting system in Nepal
Accounting system in NepalAnurag Bhusal
Ā 

More from Anurag Bhusal (20)

Warehousing management
Warehousing managementWarehousing management
Warehousing management
Ā 
The Ottoman Empire
The Ottoman EmpireThe Ottoman Empire
The Ottoman Empire
Ā 
Risk management
Risk managementRisk management
Risk management
Ā 
Recruitment and Selection
Recruitment and Selection Recruitment and Selection
Recruitment and Selection
Ā 
Globalization India
Globalization IndiaGlobalization India
Globalization India
Ā 
Contemporary Theories Of Entrepreneurship (Prof.Harvey Leibenstein )
Contemporary Theories Of Entrepreneurship (Prof.Harvey Leibenstein )Contemporary Theories Of Entrepreneurship (Prof.Harvey Leibenstein )
Contemporary Theories Of Entrepreneurship (Prof.Harvey Leibenstein )
Ā 
Nepal's Rivers Systems
Nepal's Rivers SystemsNepal's Rivers Systems
Nepal's Rivers Systems
Ā 
Types of transportation
Types of transportationTypes of transportation
Types of transportation
Ā 
Industrial Revolution
Industrial RevolutionIndustrial Revolution
Industrial Revolution
Ā 
Feudalism system then and now
Feudalism system then and nowFeudalism system then and now
Feudalism system then and now
Ā 
Cash flow
Cash flowCash flow
Cash flow
Ā 
Bitcoin
BitcoinBitcoin
Bitcoin
Ā 
You been given a 1000 pounds to do some thing good.
You been given a 1000 pounds to do some thing good.You been given a 1000 pounds to do some thing good.
You been given a 1000 pounds to do some thing good.
Ā 
You been given a 1000 pounds to do some thing good.
You been given a 1000 pounds to do some thing good.You been given a 1000 pounds to do some thing good.
You been given a 1000 pounds to do some thing good.
Ā 
Service Industries
Service IndustriesService Industries
Service Industries
Ā 
The three division of power in Nepal
The three division  of power in NepalThe three division  of power in Nepal
The three division of power in Nepal
Ā 
Financial institution
Financial institutionFinancial institution
Financial institution
Ā 
Launching new product
Launching new productLaunching new product
Launching new product
Ā 
The role of fiscal policy and central bank
The role of fiscal policy and central bankThe role of fiscal policy and central bank
The role of fiscal policy and central bank
Ā 
Accounting system in Nepal
Accounting system in NepalAccounting system in Nepal
Accounting system in Nepal
Ā 

Recently uploaded

FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhisoniya singh
Ā 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
Ā 
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...Alan Dix
Ā 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
Ā 
#StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024BookNet Canada
Ā 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
Ā 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
Ā 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
Ā 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
Ā 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
Ā 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
Ā 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
Ā 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
Ā 
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...Patryk Bandurski
Ā 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
Ā 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
Ā 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
Ā 

Recently uploaded (20)

FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY šŸ” 8264348440 šŸ” Call Girls in Diplomatic Enclave | Delhi
Ā 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
Ā 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Ā 
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Swan(sea) Song ā€“ personal research during my six years at Swansea ... and bey...
Ā 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
Ā 
#StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: Whatā€™s new for BISAC - Tech Forum 2024
Ā 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ā 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Ā 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
Ā 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Ā 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
Ā 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Ā 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Ā 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Ā 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Ā 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Ā 
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...
Integration and Automation in Practice: CI/CD in MuleĀ Integration and Automat...
Ā 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
Ā 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Ā 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Ā 

Planning for the Mobile Enterprise

  • 1. Planning for the Mobile Enterprise
  • 2. Introducing Mobile Computing ā€¢ Mobile Computing Mobile (moving) + Computing (using computer) Mobile computing = is an umbrella term used to describe technologies that enable people to access network services anyplace,anytime,and anywhere.
  • 3. Mobile computing ā€¢ In recent years, distributed computer has become the norm, especially after the advent of the internet. ā€¢ Today, technological advances are shaping a new computing environment where the user is free from the need to work at a specific location, and is even enabled to work while on the move. ā€¢ This new paradigm is often called mobile computing.
  • 4. Mobile Computing Device ā€¢ LAPTOP ā€¢ Portable and compact personal computer with the same capabilities as a desktop computer. ā€¢ TABLETS A small portable computer that accepts input directly on to its screen rather than via a keyboard or mouse.
  • 5. ā€¢ CELLPHONE A phone with access to a cellular radio system so it can be used over a wide area, without a physical connection to a network; a mobile phone. ā€¢ LONG-RANGE WIRELESS Connected devices have so far mostly run piggyback on the same networks and protocols that support the Internet and mobile communications
  • 6. Going Mobile beyond the Enterprise ā€¢ Mobile technology along with bring-your-own device (BYOD) has largely transformed our lives, including the way we work. But enterprise mobility is more than simply providing remote access to users. It is rather a shift in work habits where employees can work remotely leveraging mobile devices and cloud technology to better perform business tasks. ā€¢ The mobile revolution is changing the way organizations work, manage their operations as well as engage with their employees. As a result, organizations are reconsidering their technologies and techniques to make their traditional organizational cultures and roles more mobile friendly, making ā€˜mobile firstā€™ a must have strategy.
  • 7. Navigation ā€¢ Many external navigation sites like the major search engines exist to return thousands of links for almost any topic you might happen to be curious about. ā€¢ A DNS server would start its search for an IP address by contacting one of the root DNS servers. The root servers know the IP addresses for all of the DNS servers that handle the top- level domains (.COM, .NET, .ORG, etc.).
  • 8. Connectivity Connectivity describes the extensive process of connecting various parts of a network to one another, for example, through the use of routers, switches and gateways, and how that process works.
  • 9. Bandwidth ā€¢ Bandwidth describes the maximum data transfer rate of a network or Internet connection. It measures how much data can be sent over a specific connection in a given amount of time. For example, a gigabit Ethernet connection has a bandwidth of 1,000 Mbps, (125 megabytes per second). An Internet connection via cable modem may provide 25 Mbps of bandwidth.
  • 10. VPN and SSL access ā€¢ A VPN or Virtual Private Network is a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data. ā€¢ SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral. SSL is an industry standard and is used by millions of websites in the protection of their online transactions with their customers.
  • 11. Remote desktops ā€¢ Remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.