SlideShare a Scribd company logo
1
ANURAG COLLEGE OF ENGINEERING
Aushapur(V), Ghatkesar(M), Medchal(D),T.S
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING
MOBILE COMPUTING
Under the guidance of :-
Mr. S. Vijay Kumar
Assistant Professor.
Presented by:
Mr. P. ESHWAR 19PQ1A0560
CONTENTS
1. What is mobile computing?
2. Comparison to wired networks
3. Why go mobile?
4. Types of wireless devices
5. Mobile objects
6. Security & Privacy
7. Applications of mobile computing
8. Challenges
9. Future of mobile computing
10. Conclusion
11. References
2
What Is Mobile Computing?
What is computing?
Operation of computers (according to oxfords advance
learner’s dictionary)
What is the mobile?
That someone /something can move or be moved easily and
quickly from place to place
What is mobile computing?
Users with portable computers still have network
connections while they move
3
What Is Mobile Computing?
(Cont.)
 Mobile Computing is an umbrella term used to describe
technologies that enable people to access network services
anyplace, anytime, and anywhere.
4
Comparison to Wired Net.
Wired Networks
-high bandwidth
-low bandwidth variability
-can listen on wire
-high power machines
-high resource machines
-need physical access(security)
-low delay
-connected operation
Mobile Networks
-low bandwidth
-high bandwidth variability
-hidden terminal problem
-low power machines
-low resource machines
-need proximity
-higher delay
-disconnected operation
5
Why Go Mobile?
• Enable anywhere/anytime connectivity
• Bring computer communications to areas without
pre-existing infrastructure
• Enable mobility
• Enable new applications
• An exciting new research area
6
Types of Wireless Devices
 Laptops
 Palmtops
 PDAs
 Cell phones
 Pagers
 Sensors
7
Mobile Objects
1. A mobile object is
some code that
carries a state
8
Mobile Objects (Cont.)
1. A mobile object is
some code that
carries a state
2. that lives on a host
9
Mobile Objects (Cont.)
1. A mobile object is
some code that
carries a state
2. Lives in a host
3. That visits places
10
Mobile Objects (Cont.)
1. A mobile object is
some code that
carries a state
2. Lives in a host
3. That visits places
4. which is let in when
trusted
11
Mobile Objects (Cont.)
1. A mobile object is
some code that
carries a state
2. Lives in a host
3. That visits places
4. which is let in when
trusted
5. and barred when
untrusted
12
Mobile Objects (Cont.)
1. A mobile object is some
code that carries a state
2. Lives in a host
3. That visits places
4. which is let in when
trusted
5. and barred when
untrusted
6. and will refuse to go to
untrustworthy places
13
Mobile Objects (Cont.)
7. Mobile objects can
talk to their friends
14
Mobile Objects (Cont.)
7. Mobile objects can
talk to their friends
8. but only by co-
operation of the hosts
15
Security & Privacy
Threats:
 Wi-Fi networks are a shared network that makes it easier
for others to eavesdrop on your communication.
 Devices are Stolen and tampered.
 Cryptography.
 Connection
16
Security & Privacy
Solutions:
 Secure Web Browsing
 Use secure, encrypted sessions.
 Secure Internet Transactions
 Use UCI’s VPN to encrypt your network traffic.
 Always use a Personal Firewall.
 Set the firewall to deny.
 ALL incoming connections.
17
Applications of Mobile
Computing (Cont.)
 For Estate Agents
 In courts
 In companies
 Stock Information Collection/Control
 Credit Card Verification
 Taxi/Truck Dispatch
 Electronic Mail/Paging
18
Challenges
 Disconnection
 Low bandwidth
 High bandwidth variability
 Low power and resources
 Security risks
 Wide variety terminals and devices with different
capabilities
 Device attributes
 Fit more functionality into single, smaller device
19
Future of Mobile Computing
 Use of Artificial Intelligence
 Integrated Circuitry -> Compact Size
 Increases in Computer Processor speeds
20
Conclusion
Mobile computing has severe limitations
- however, it is far from impossible, and technology improves
all the time
Lots of challenges
- some have (good) solutions, many others are still waiting to
be solved
21
References
http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol4/
vk5/report.html
http://www.doc.ic.ac.uk/~nd/surprise_96/journal/vol1/vk5/art
icle1.html
http://www.cs.ucsb.edu/~ebelding/courses/284/w04/slides/int
ro.pdf
http://www.ansa.co.uk/ANSATech/ANSAhtml/98-
ansa/external/9807tb/9807mose.pdf
http://www.danishtechnology.dk/it/9238
22
23
QURIES ?
24
THANK YOU…

More Related Content

Similar to Mobile-Computing ppt.ppt

Mobile computing
Mobile computingMobile computing
Mobile computing
YUSRA FERNANDO
 
Mobile computing
Mobile computingMobile computing
U - 4 Emerging.pptx
U - 4 Emerging.pptxU - 4 Emerging.pptx
U - 4 Emerging.pptx
MulukenTamrat2
 
presentation on mobile computing
presentation on mobile computingpresentation on mobile computing
presentation on mobile computing
Balakumar232
 
Mobile computing
Mobile computingMobile computing
Mobile computing
najwa92
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Anuja Mane
 
Mobile computing
Mobile computingMobile computing
Mobile computing
Kelly Zhang
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architecture
Swapnali Pawar
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012
Infomanjjb
 
Iot with azure | Yogesh Ojha | Global Azure BootCamp
Iot with azure | Yogesh Ojha | Global Azure BootCampIot with azure | Yogesh Ojha | Global Azure BootCamp
Iot with azure | Yogesh Ojha | Global Azure BootCamp
Yogesh Ojha
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic Network
IOSR Journals
 
Mobile com 21 3 2020
Mobile com 21 3 2020Mobile com 21 3 2020
Mobile com 21 3 2020
Dr. MAMTA BANSAL
 
MobileComputing by Mudasir
MobileComputing by MudasirMobileComputing by Mudasir
MobileComputing by Mudasir
Mudasir Ahmad Bhat
 
Important questions on mobile computing
Important questions on mobile computingImportant questions on mobile computing
Important questions on mobile computing
Bhupesh Rawat
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
John Intindolo
 
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESEFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
IJNSA Journal
 
7 (1)
7 (1)7 (1)
Mobile computing
Mobile computingMobile computing
Mobile computing
shubham chavan
 
Internet Of Things(IoT).pptx
Internet Of Things(IoT).pptxInternet Of Things(IoT).pptx
Internet Of Things(IoT).pptx
bhargavikarukuri21
 

Similar to Mobile-Computing ppt.ppt (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
U - 4 Emerging.pptx
U - 4 Emerging.pptxU - 4 Emerging.pptx
U - 4 Emerging.pptx
 
presentation on mobile computing
presentation on mobile computingpresentation on mobile computing
presentation on mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Unit 2.design mobile computing architecture
Unit 2.design mobile computing architectureUnit 2.design mobile computing architecture
Unit 2.design mobile computing architecture
 
G011123539
G011123539G011123539
G011123539
 
Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012
 
Iot with azure | Yogesh Ojha | Global Azure BootCamp
Iot with azure | Yogesh Ojha | Global Azure BootCampIot with azure | Yogesh Ojha | Global Azure BootCamp
Iot with azure | Yogesh Ojha | Global Azure BootCamp
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic Network
 
Mobile com 21 3 2020
Mobile com 21 3 2020Mobile com 21 3 2020
Mobile com 21 3 2020
 
MobileComputing by Mudasir
MobileComputing by MudasirMobileComputing by Mudasir
MobileComputing by Mudasir
 
Important questions on mobile computing
Important questions on mobile computingImportant questions on mobile computing
Important questions on mobile computing
 
ISSC456_Final_J_Intindolo
ISSC456_Final_J_IntindoloISSC456_Final_J_Intindolo
ISSC456_Final_J_Intindolo
 
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIESEFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
EFFECT MAN-IN THE MIDDLE ON THE NETWORK PERFORMANCE IN VARIOUS ATTACK STRATEGIES
 
7 (1)
7 (1)7 (1)
7 (1)
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Internet Of Things(IoT).pptx
Internet Of Things(IoT).pptxInternet Of Things(IoT).pptx
Internet Of Things(IoT).pptx
 

Recently uploaded

Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
Data Hops
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
Neo4j
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
c5vrf27qcz
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 

Recently uploaded (20)

Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3FREE A4 Cyber Security Awareness  Posters-Social Engineering part 3
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge GraphGraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
GraphRAG for LifeSciences Hands-On with the Clinical Knowledge Graph
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Y-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PPY-Combinator seed pitch deck template PP
Y-Combinator seed pitch deck template PP
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 

Mobile-Computing ppt.ppt

  • 1. 1 ANURAG COLLEGE OF ENGINEERING Aushapur(V), Ghatkesar(M), Medchal(D),T.S DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING MOBILE COMPUTING Under the guidance of :- Mr. S. Vijay Kumar Assistant Professor. Presented by: Mr. P. ESHWAR 19PQ1A0560
  • 2. CONTENTS 1. What is mobile computing? 2. Comparison to wired networks 3. Why go mobile? 4. Types of wireless devices 5. Mobile objects 6. Security & Privacy 7. Applications of mobile computing 8. Challenges 9. Future of mobile computing 10. Conclusion 11. References 2
  • 3. What Is Mobile Computing? What is computing? Operation of computers (according to oxfords advance learner’s dictionary) What is the mobile? That someone /something can move or be moved easily and quickly from place to place What is mobile computing? Users with portable computers still have network connections while they move 3
  • 4. What Is Mobile Computing? (Cont.)  Mobile Computing is an umbrella term used to describe technologies that enable people to access network services anyplace, anytime, and anywhere. 4
  • 5. Comparison to Wired Net. Wired Networks -high bandwidth -low bandwidth variability -can listen on wire -high power machines -high resource machines -need physical access(security) -low delay -connected operation Mobile Networks -low bandwidth -high bandwidth variability -hidden terminal problem -low power machines -low resource machines -need proximity -higher delay -disconnected operation 5
  • 6. Why Go Mobile? • Enable anywhere/anytime connectivity • Bring computer communications to areas without pre-existing infrastructure • Enable mobility • Enable new applications • An exciting new research area 6
  • 7. Types of Wireless Devices  Laptops  Palmtops  PDAs  Cell phones  Pagers  Sensors 7
  • 8. Mobile Objects 1. A mobile object is some code that carries a state 8
  • 9. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. that lives on a host 9
  • 10. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. Lives in a host 3. That visits places 10
  • 11. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. Lives in a host 3. That visits places 4. which is let in when trusted 11
  • 12. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. Lives in a host 3. That visits places 4. which is let in when trusted 5. and barred when untrusted 12
  • 13. Mobile Objects (Cont.) 1. A mobile object is some code that carries a state 2. Lives in a host 3. That visits places 4. which is let in when trusted 5. and barred when untrusted 6. and will refuse to go to untrustworthy places 13
  • 14. Mobile Objects (Cont.) 7. Mobile objects can talk to their friends 14
  • 15. Mobile Objects (Cont.) 7. Mobile objects can talk to their friends 8. but only by co- operation of the hosts 15
  • 16. Security & Privacy Threats:  Wi-Fi networks are a shared network that makes it easier for others to eavesdrop on your communication.  Devices are Stolen and tampered.  Cryptography.  Connection 16
  • 17. Security & Privacy Solutions:  Secure Web Browsing  Use secure, encrypted sessions.  Secure Internet Transactions  Use UCI’s VPN to encrypt your network traffic.  Always use a Personal Firewall.  Set the firewall to deny.  ALL incoming connections. 17
  • 18. Applications of Mobile Computing (Cont.)  For Estate Agents  In courts  In companies  Stock Information Collection/Control  Credit Card Verification  Taxi/Truck Dispatch  Electronic Mail/Paging 18
  • 19. Challenges  Disconnection  Low bandwidth  High bandwidth variability  Low power and resources  Security risks  Wide variety terminals and devices with different capabilities  Device attributes  Fit more functionality into single, smaller device 19
  • 20. Future of Mobile Computing  Use of Artificial Intelligence  Integrated Circuitry -> Compact Size  Increases in Computer Processor speeds 20
  • 21. Conclusion Mobile computing has severe limitations - however, it is far from impossible, and technology improves all the time Lots of challenges - some have (good) solutions, many others are still waiting to be solved 21