SlideShare a Scribd company logo
1 of 21
Download to read offline
Smart Phone - 101



http://interactiveiphone.com/
http://support.t-mobile.com/docs/DOC-4619#/SPIN
http://pocketnow.com/android/ice-cream-sandwich-tour-how-to-run-the-emulator-yourself
0:25 – 1:20|3:00 – 3:32 |3:54 – 4:23
History
Introducing Nokia 9000 Communicator – 1996 Samsung Galaxy S III (29 Aug 2012)
 •   397 gm                                 •   133 gm
 •   Intel 24 Mhz i386 CPU                  •   Quad-core 1.4 GHz Cortex-A9
 •   8 MB Memory                            •   Up to 64GB, 1GB RAM | External Up to 64MB
 •   GEOS 3.0                               •   Android




           9110                                       9000
―An iPod, a phone, an internet mobile communicator… these are NOT three separate
devices! And we are calling it iPhone! Today Apple is going to reinvent the phone. And
here it is.‖
What
    is
    a
    Smartphone
A smartphone is like a one-stop-shop for all your communication needs: music, video,
camera, email, games, internet… and the basic phone function.
Operating System
In general, a smartphone is based on an operating system that allows it to run
applications.

Apple's iPhone runs the iOS, and BlackBerry smartphones run the BlackBerry OS. Other
devices run Google's Android OS and Microsoft's Windows Phone.
APP STORE              GOOGLE PLAY                  MARKETPLACE (Feb,      APP WORLD
                                                    2012)
Over 701,702 apps in   Over 430,000 apps in                                3 billion download and
total. Approximately   total. About 72% of all of   Over 100,000 apps in   counting: BlackBerry
37% apps are free.     Google Play apps that        total.                 App World had reached
                       are free.                                           a new milestone last
                                                                           month from a total of
                                                                           90,000 apps


Applications
An app is a small piece of software that runs on an operating system. In general, an app
is designed to accomplish one primary task. For e.g. Camera app, Weather app, etc.

Select your app based on your needs:
Yelp, Facebook, IMDB, Dictionary, Kindle, iBooks, Spotify, GIST (ISP Speed), TV
Remote, Starbucks, GasBuddy, CardMunch, SketchbookX
QWERTY Keyboard
Most smartphone includes a QWERTY keyboard – same as on your laptop. The same
keyboard layout makes the end user experience seamless.
Messaging
Apart from SMS & MMS messages, smartphones are capable of syncing emails from
various accounts, like Gmail, AOL, Yahoo, Hotmail, and Enterprise for corporate users.

iMessage – Unlimited messages to iOS5 users.
Standard SMS & MMS
SIM Lock / Locked Phone
A SIM (Subscriber Identity Module) lock is a capability built into mobile phones by mobile
phone manufacturers. Network providers use this capability to restrict the use of these
phones to specific countries and network providers.


Which phone is better: locked or unlocked?
Mobile
Plans
http://www.myrateplan.com
BYOD




BYOD




BYOD              Unlimited   Unlimited
       $55   NA                           Unlimited
Mobile
Hacks
Type of Hacks
- Auto sign up for an expensive subscription SMS text

- Copy of all your input, including passwords and other personal information

- Send a message to everyone on your contact list

- View your personal content (photos, audio, video, docs)

- Track your location

Security Tools
 Android: Norton Mobile Security, Kaspersky Mobile Security

 iPhone: Trend Micro Mobile

 Symbian: Trend Micro Mobile, Kaspersky Mobile Security, McAfee WaveSecure

 BlackBerry: McAfee WaveSecure

 Windows Phone: McAfee WaveSecure
Primary Features of Anti-Virus Tools
 • Anti-Malware: Scans for infections on phone and checks the safety of any new apps
   before installation.

 • Lost or Stolen Device Access: Using another mobile phone or a website, the missing
   phone can be made to send information about its location, based on the built-in GPS
   or its location relative to cellphone towers. In case of non retrieval of device, provides
   remote lock, or wipe phone memory features.

 • Anti-Spam: Block incoming text messages and/or phone calls from specified
   numbers.

 • Site Safety Check: This feature checks to see if a site will try to install malicious
   software or phish for personal information via mobile web browsers.

 • Backup: Some programs include the ability to back up phone data to an online
   storage account. That way, if a phone is damaged or wiped of the data remotely after
   losing it, the secure copy of information exists in the cloud.




Apple maintains strict control over what's offered in the iTunes App Store — Google
doesn't supervise the Android Market.
Stolen
Phone
How to Prevent/Report Stolen Phone

• Use the security lock code or PIN feature

• Keep Phone Details including IMEI (*#06#) number (on GSM phones)

• Register your loss immediately to your provider

• File a police report immediately

• Consider adding a security mark
Conclusion
Finding the right smart phone is the holy grail of today’s smartphone users. It is a
challenging task, given the vast choice of providers, platforms and models.

No smartphone is the right phone, some are good at one thing, some are at others.

Make a laundry list of all the features you would like to use in a smartphone and try
to narrow down your choices.

Don’t be afraid of buying a wrong one, the world is not going to end with your
choice; because, even the dumbest smartphone is smart.

Stay connected!


Praveen Verma
Twitter: @praveenkvma

More Related Content

Recently uploaded

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentMahmoud Rabie
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 

Recently uploaded (20)

Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
Digital Tools & AI in Career Development
Digital Tools & AI in Career DevelopmentDigital Tools & AI in Career Development
Digital Tools & AI in Career Development
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 

Smart Phones - 101

  • 1. Smart Phone - 101 http://interactiveiphone.com/ http://support.t-mobile.com/docs/DOC-4619#/SPIN http://pocketnow.com/android/ice-cream-sandwich-tour-how-to-run-the-emulator-yourself
  • 2. 0:25 – 1:20|3:00 – 3:32 |3:54 – 4:23
  • 3.
  • 5. Introducing Nokia 9000 Communicator – 1996 Samsung Galaxy S III (29 Aug 2012) • 397 gm • 133 gm • Intel 24 Mhz i386 CPU • Quad-core 1.4 GHz Cortex-A9 • 8 MB Memory • Up to 64GB, 1GB RAM | External Up to 64MB • GEOS 3.0 • Android 9110 9000
  • 6. ―An iPod, a phone, an internet mobile communicator… these are NOT three separate devices! And we are calling it iPhone! Today Apple is going to reinvent the phone. And here it is.‖
  • 7. What is a Smartphone A smartphone is like a one-stop-shop for all your communication needs: music, video, camera, email, games, internet… and the basic phone function.
  • 8. Operating System In general, a smartphone is based on an operating system that allows it to run applications. Apple's iPhone runs the iOS, and BlackBerry smartphones run the BlackBerry OS. Other devices run Google's Android OS and Microsoft's Windows Phone.
  • 9. APP STORE GOOGLE PLAY MARKETPLACE (Feb, APP WORLD 2012) Over 701,702 apps in Over 430,000 apps in 3 billion download and total. Approximately total. About 72% of all of Over 100,000 apps in counting: BlackBerry 37% apps are free. Google Play apps that total. App World had reached are free. a new milestone last month from a total of 90,000 apps Applications An app is a small piece of software that runs on an operating system. In general, an app is designed to accomplish one primary task. For e.g. Camera app, Weather app, etc. Select your app based on your needs: Yelp, Facebook, IMDB, Dictionary, Kindle, iBooks, Spotify, GIST (ISP Speed), TV Remote, Starbucks, GasBuddy, CardMunch, SketchbookX
  • 10. QWERTY Keyboard Most smartphone includes a QWERTY keyboard – same as on your laptop. The same keyboard layout makes the end user experience seamless.
  • 11. Messaging Apart from SMS & MMS messages, smartphones are capable of syncing emails from various accounts, like Gmail, AOL, Yahoo, Hotmail, and Enterprise for corporate users. iMessage – Unlimited messages to iOS5 users. Standard SMS & MMS
  • 12. SIM Lock / Locked Phone A SIM (Subscriber Identity Module) lock is a capability built into mobile phones by mobile phone manufacturers. Network providers use this capability to restrict the use of these phones to specific countries and network providers. Which phone is better: locked or unlocked?
  • 15. BYOD BYOD BYOD Unlimited Unlimited $55 NA Unlimited
  • 17. Type of Hacks - Auto sign up for an expensive subscription SMS text - Copy of all your input, including passwords and other personal information - Send a message to everyone on your contact list - View your personal content (photos, audio, video, docs) - Track your location Security Tools  Android: Norton Mobile Security, Kaspersky Mobile Security  iPhone: Trend Micro Mobile  Symbian: Trend Micro Mobile, Kaspersky Mobile Security, McAfee WaveSecure  BlackBerry: McAfee WaveSecure  Windows Phone: McAfee WaveSecure
  • 18. Primary Features of Anti-Virus Tools • Anti-Malware: Scans for infections on phone and checks the safety of any new apps before installation. • Lost or Stolen Device Access: Using another mobile phone or a website, the missing phone can be made to send information about its location, based on the built-in GPS or its location relative to cellphone towers. In case of non retrieval of device, provides remote lock, or wipe phone memory features. • Anti-Spam: Block incoming text messages and/or phone calls from specified numbers. • Site Safety Check: This feature checks to see if a site will try to install malicious software or phish for personal information via mobile web browsers. • Backup: Some programs include the ability to back up phone data to an online storage account. That way, if a phone is damaged or wiped of the data remotely after losing it, the secure copy of information exists in the cloud. Apple maintains strict control over what's offered in the iTunes App Store — Google doesn't supervise the Android Market.
  • 20. How to Prevent/Report Stolen Phone • Use the security lock code or PIN feature • Keep Phone Details including IMEI (*#06#) number (on GSM phones) • Register your loss immediately to your provider • File a police report immediately • Consider adding a security mark
  • 21. Conclusion Finding the right smart phone is the holy grail of today’s smartphone users. It is a challenging task, given the vast choice of providers, platforms and models. No smartphone is the right phone, some are good at one thing, some are at others. Make a laundry list of all the features you would like to use in a smartphone and try to narrow down your choices. Don’t be afraid of buying a wrong one, the world is not going to end with your choice; because, even the dumbest smartphone is smart. Stay connected! Praveen Verma Twitter: @praveenkvma

Editor's Notes

  1. In 1996, Nokia introduced the first PDA with full mobile phone functionality, the 9000 Communicator, which became the world's best-selling PDA. The Communicator spawned a new category of PDAs: the "PDA phone", now called "smartphone".
  2. Samsung BADA, Meego (Linux), Symbian (Nokia+NTTDoCoMo+Sony Ericsson & Symbian; and is currently maintained by Accenture), WebOS (HP)
  3. Apple - http://148apps.biz/app-store-metrics/Android -http://www.androidauthority.com/google-play-vs-windows-phone-marketplace-2012-78170/Marketplace - http://www.engadget.com/2012/06/20/windows-phone-marketplace-100000-published-apps/
  4. Apple - http://148apps.biz/app-store-metrics/Android -http://www.androidauthority.com/google-play-vs-windows-phone-marketplace-2012-78170/Marketplace - http://www.engadget.com/2012/06/20/windows-phone-marketplace-100000-published-apps/
  5. SMS – Short Message ServiceMMS – Multimedia Message Service
  6. http://www.phonedog.com/2010/02/05/smart-shopping-whose-smartphone-plans-are-cheapest/
  7. Use the security lock code or PIN feature.Keep Phone Details including The IMEI number (on GSM phones)Register your loss immediately: If stolen, contact your service provider asap. Advise your IMEI number, so they can block your account, handset, outgoing calls and sms. If done, this will prevent anyone from using the phone across any network, even if the SIM card is changed.Keep records of this call - the date, time, any reference or contact details. This is important in case the thief makes fraudulent charges on your account.File a police report immediately Some phone companies may require proof that the phone was actually stolen, versus it having been lost. A police report serves as evidence, which will make your wireless provider more cooperative, especially if insurance is involved.Consider adding a security mark. Use an ultra violet pen, engraving tool, non-removable label or other. An alternate contact number on the phone would also help the finder of your handset to contact you if they intend to return it.