SlideShare a Scribd company logo
1 of 11
GROUP MEMBER
1.ASHFAHAN AZAM FAROOQUE
2.PANKAJ KUMAR DEEPAK
3.SAGAR JOSHI
Mobile Computing
Trends in mobile computing
 The objectives of your growing business needs can be achieved through the mobile
wireless networks. Today, no business is successful without the fast and in-time
communication. Delayed communications in the businesses may result in the financial
losses, client’s dissatisfaction, reduces sales and the problems with in-time decision
making. Mobile computing refers to using the small portable and hand held computing
devices such as PDA, laptops, mobile phones, MP3 players, digital cameras, tablet PC
and Palmtops in a wireless enabled network. In broad sense, it is referred to use any
handheld computing device without the cables. In recent years the growth of mobile
broadband and mobile broadband pay as you go devices have meant that many more
people and business can take advantage of mobile computing
 For consumers who need Internet connectivity that’s as easy and accessible as cell
phone coverage, computer and electronics manufacturers provide broadband
connectivity support and network operators offer broadband modems to subscribers.
Mobile computing solutions benefit:
 Personal and business users: digital nomads, executives, students, parents, small
businesses, enterprises
 Manufacturers of laptops, netbooks, Wi-Fi/cellular gateways, multi-purpose computing
devices
 Wireless network operators.
 Recently, the free Linux operating system has been modified
to run on hand held computers of different types. Some
manufacturers are also adopting Linux for their handheld
computers. As this operating system carries no licensing fee, it
could further reduce the cost of handheld computers. In
developing countries like India, voice activated Linux-based
computers have been developed for mass usage in rural
areas where the computing infrastructure is limited.
 Device integration, such as the integration of cell phones and
handheld computers, is also occurring. Location aware mobile
computing—in which a person is able to obtain information on
local restaurants, theaters, coffee-shops, maps, driving
directions, traffic, weather, news, tourist attractions, and the
like on a handheld computer—is also becoming prominent.
The name MOBILE is derived from the first
letter in each of the six categories that make
up the framework.
The six categories are:
 M the need for mobility
 O the need to improve operations
 B the need to break business barriers
 I the need to improve information quality
 L the need to decrease transaction lag
 E the need to improve efficiency
mobile computing applications can generally be divided into two
categories--horizontal and vertical.
Horizontal
 Horizontal applications have broad-based appeal and include
software that performs functions such as: (a) email; (b) Web
browsing; (c) word processing; (d) scheduling; (e) contact
management; (f) to-do lists; (g) messaging; (h) presentation. These
types of applications usually come standard on Palmtops,
Clamshells, and laptops with systems software such as Windows 95.
Vertical
 Vertical applications are industry-specific and only have appeal
within the specific industry for which the application was written.
Vertical applications are commonly used in industries such as: (a)
retailing; (b) utilities; (c) warehousing; (d) shipping; (e) medical; and
(f) law enforcement and public safety. These vertical applications are
often transaction oriented and normally interface with a corporate
database.
Voice /sound quality
Battery life
Bluetooth
Data service
Cost
Connectivity range
Mobile computing

More Related Content

What's hot

American University Presentation (3) 2012 on Mobile Trends and Emerging Techn...
American University Presentation (3) 2012 on Mobile Trends and Emerging Techn...American University Presentation (3) 2012 on Mobile Trends and Emerging Techn...
American University Presentation (3) 2012 on Mobile Trends and Emerging Techn...Wayne Chen
 
Converging technology- Smartphone
Converging technology- SmartphoneConverging technology- Smartphone
Converging technology- SmartphonePrachi Agarwal
 
E tools mobile devices reloaded
E tools mobile devices reloadedE tools mobile devices reloaded
E tools mobile devices reloadedtechnomarket
 
Hugh campbell mobile opportunities
Hugh campbell mobile opportunitiesHugh campbell mobile opportunities
Hugh campbell mobile opportunitieseventsbbaa
 
10 latest trends of mobile technology
10 latest trends of mobile technology10 latest trends of mobile technology
10 latest trends of mobile technologyFaizan Subzwari
 

What's hot (9)

Voice Command
Voice CommandVoice Command
Voice Command
 
American University Presentation (3) 2012 on Mobile Trends and Emerging Techn...
American University Presentation (3) 2012 on Mobile Trends and Emerging Techn...American University Presentation (3) 2012 on Mobile Trends and Emerging Techn...
American University Presentation (3) 2012 on Mobile Trends and Emerging Techn...
 
Converging technology- Smartphone
Converging technology- SmartphoneConverging technology- Smartphone
Converging technology- Smartphone
 
Tablet Marketing Speech
Tablet Marketing SpeechTablet Marketing Speech
Tablet Marketing Speech
 
Rim
RimRim
Rim
 
E tools mobile devices reloaded
E tools mobile devices reloadedE tools mobile devices reloaded
E tools mobile devices reloaded
 
Hugh campbell mobile opportunities
Hugh campbell mobile opportunitiesHugh campbell mobile opportunities
Hugh campbell mobile opportunities
 
Smart phones
Smart phonesSmart phones
Smart phones
 
10 latest trends of mobile technology
10 latest trends of mobile technology10 latest trends of mobile technology
10 latest trends of mobile technology
 

Viewers also liked

วิชาเคมี
วิชาเคมีวิชาเคมี
วิชาเคมีSathida Suyati
 
Blogging is it effective?
Blogging  is it effective?Blogging  is it effective?
Blogging is it effective?Colin Campbell
 
Life As A Fraudster: Fraud University
Life As A Fraudster: Fraud UniversityLife As A Fraudster: Fraud University
Life As A Fraudster: Fraud UniversityKount
 
7 สามัญ คณิต
7 สามัญ คณิต7 สามัญ คณิต
7 สามัญ คณิตSathida Suyati
 
ฟิสิกส์ 7 วิชาสามัญ โดย ideal physics
ฟิสิกส์ 7 วิชาสามัญ โดย ideal physicsฟิสิกส์ 7 วิชาสามัญ โดย ideal physics
ฟิสิกส์ 7 วิชาสามัญ โดย ideal physicsSathida Suyati
 
recome(レコミー)
recome(レコミー)recome(レコミー)
recome(レコミー)shionew176
 
A Research Guide to Jamaican Art
A Research Guide to Jamaican ArtA Research Guide to Jamaican Art
A Research Guide to Jamaican ArtKai Alexis Smith
 
Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101Kount
 
Photo Manipulation in the Digital Age
Photo Manipulation in the Digital Age Photo Manipulation in the Digital Age
Photo Manipulation in the Digital Age Kai Alexis Smith
 

Viewers also liked (11)

วิชาเคมี
วิชาเคมีวิชาเคมี
วิชาเคมี
 
Blogging is it effective?
Blogging  is it effective?Blogging  is it effective?
Blogging is it effective?
 
Life As A Fraudster: Fraud University
Life As A Fraudster: Fraud UniversityLife As A Fraudster: Fraud University
Life As A Fraudster: Fraud University
 
Biology
BiologyBiology
Biology
 
7 สามัญ คณิต
7 สามัญ คณิต7 สามัญ คณิต
7 สามัญ คณิต
 
ฟิสิกส์ 7 วิชาสามัญ โดย ideal physics
ฟิสิกส์ 7 วิชาสามัญ โดย ideal physicsฟิสิกส์ 7 วิชาสามัญ โดย ideal physics
ฟิสิกส์ 7 วิชาสามัญ โดย ideal physics
 
Blog
BlogBlog
Blog
 
recome(レコミー)
recome(レコミー)recome(レコミー)
recome(レコミー)
 
A Research Guide to Jamaican Art
A Research Guide to Jamaican ArtA Research Guide to Jamaican Art
A Research Guide to Jamaican Art
 
Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101Life As A Fraudster: Carding 101
Life As A Fraudster: Carding 101
 
Photo Manipulation in the Digital Age
Photo Manipulation in the Digital Age Photo Manipulation in the Digital Age
Photo Manipulation in the Digital Age
 

Similar to Mobile computing

Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobilityreneznet105
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobilityreneznet105
 
Micronics Mobility
Micronics MobilityMicronics Mobility
Micronics Mobilityrosenthal123
 
Mobile Customer Information
Mobile Customer InformationMobile Customer Information
Mobile Customer InformationWalter Adamson
 
Smac social, mobile, analytics, cloud
Smac   social, mobile, analytics, cloudSmac   social, mobile, analytics, cloud
Smac social, mobile, analytics, cloudSumit Roy
 
Mobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderMobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderOKTOPUS Consulting
 
Mobile Website Optimization
Mobile Website OptimizationMobile Website Optimization
Mobile Website Optimizationhebsyesh
 
How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?   How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India? Ranjit Kumar
 
WiFi Offload Strategy for Telcos-Operators
WiFi Offload Strategy for Telcos-OperatorsWiFi Offload Strategy for Telcos-Operators
WiFi Offload Strategy for Telcos-OperatorsGreen Packet
 
WiFi Offload Guide / Strategies for Telcos
WiFi Offload Guide / Strategies for TelcosWiFi Offload Guide / Strategies for Telcos
WiFi Offload Guide / Strategies for TelcosJustus @GreenPacket
 
Basics of telecommunication and networking
Basics of telecommunication and networkingBasics of telecommunication and networking
Basics of telecommunication and networkingMilan Padariya
 

Similar to Mobile computing (20)

Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobility
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobility
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics Mobility
Micronics MobilityMicronics Mobility
Micronics Mobility
 
mobile computing
mobile computingmobile computing
mobile computing
 
Mobile Customer Information
Mobile Customer InformationMobile Customer Information
Mobile Customer Information
 
Mobile commerce
Mobile commerceMobile commerce
Mobile commerce
 
Smac social, mobile, analytics, cloud
Smac   social, mobile, analytics, cloudSmac   social, mobile, analytics, cloud
Smac social, mobile, analytics, cloud
 
Mobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builderMobile reporting 2010 07 information builder
Mobile reporting 2010 07 information builder
 
SMAC - Social, Mobile, Analytics, Cloud
SMAC - Social, Mobile, Analytics, CloudSMAC - Social, Mobile, Analytics, Cloud
SMAC - Social, Mobile, Analytics, Cloud
 
Mobile Website Optimization
Mobile Website OptimizationMobile Website Optimization
Mobile Website Optimization
 
How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?   How we do monotize SaaS as a VAS in India?
How we do monotize SaaS as a VAS in India?
 
WiFi Offload Strategy for Telcos-Operators
WiFi Offload Strategy for Telcos-OperatorsWiFi Offload Strategy for Telcos-Operators
WiFi Offload Strategy for Telcos-Operators
 
WiFi Offload Guide / Strategies for Telcos
WiFi Offload Guide / Strategies for TelcosWiFi Offload Guide / Strategies for Telcos
WiFi Offload Guide / Strategies for Telcos
 
Basics of telecommunication and networking
Basics of telecommunication and networkingBasics of telecommunication and networking
Basics of telecommunication and networking
 

Recently uploaded

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Recently uploaded (20)

AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Mobile computing

  • 1.
  • 2. GROUP MEMBER 1.ASHFAHAN AZAM FAROOQUE 2.PANKAJ KUMAR DEEPAK 3.SAGAR JOSHI
  • 3. Mobile Computing Trends in mobile computing
  • 4.  The objectives of your growing business needs can be achieved through the mobile wireless networks. Today, no business is successful without the fast and in-time communication. Delayed communications in the businesses may result in the financial losses, client’s dissatisfaction, reduces sales and the problems with in-time decision making. Mobile computing refers to using the small portable and hand held computing devices such as PDA, laptops, mobile phones, MP3 players, digital cameras, tablet PC and Palmtops in a wireless enabled network. In broad sense, it is referred to use any handheld computing device without the cables. In recent years the growth of mobile broadband and mobile broadband pay as you go devices have meant that many more people and business can take advantage of mobile computing  For consumers who need Internet connectivity that’s as easy and accessible as cell phone coverage, computer and electronics manufacturers provide broadband connectivity support and network operators offer broadband modems to subscribers. Mobile computing solutions benefit:  Personal and business users: digital nomads, executives, students, parents, small businesses, enterprises  Manufacturers of laptops, netbooks, Wi-Fi/cellular gateways, multi-purpose computing devices  Wireless network operators.
  • 5.
  • 6.
  • 7.  Recently, the free Linux operating system has been modified to run on hand held computers of different types. Some manufacturers are also adopting Linux for their handheld computers. As this operating system carries no licensing fee, it could further reduce the cost of handheld computers. In developing countries like India, voice activated Linux-based computers have been developed for mass usage in rural areas where the computing infrastructure is limited.  Device integration, such as the integration of cell phones and handheld computers, is also occurring. Location aware mobile computing—in which a person is able to obtain information on local restaurants, theaters, coffee-shops, maps, driving directions, traffic, weather, news, tourist attractions, and the like on a handheld computer—is also becoming prominent.
  • 8. The name MOBILE is derived from the first letter in each of the six categories that make up the framework. The six categories are:  M the need for mobility  O the need to improve operations  B the need to break business barriers  I the need to improve information quality  L the need to decrease transaction lag  E the need to improve efficiency
  • 9. mobile computing applications can generally be divided into two categories--horizontal and vertical. Horizontal  Horizontal applications have broad-based appeal and include software that performs functions such as: (a) email; (b) Web browsing; (c) word processing; (d) scheduling; (e) contact management; (f) to-do lists; (g) messaging; (h) presentation. These types of applications usually come standard on Palmtops, Clamshells, and laptops with systems software such as Windows 95. Vertical  Vertical applications are industry-specific and only have appeal within the specific industry for which the application was written. Vertical applications are commonly used in industries such as: (a) retailing; (b) utilities; (c) warehousing; (d) shipping; (e) medical; and (f) law enforcement and public safety. These vertical applications are often transaction oriented and normally interface with a corporate database.
  • 10. Voice /sound quality Battery life Bluetooth Data service Cost Connectivity range