Mobile Computing and Social Networks

Mobile Computing and Social Networks

  • Submitted By: Lady313
  • Date Submitted: 02/16/2014 5:46 PM
  • Category: Technology
  • Words: 1738
  • Page: 7
  • Views: 1

Mobile Computing and Social Networks

Mobile Computing and Social Networks
Assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system. A mobile website is generally a much less restrictive means to build a mobile presence compared to app development. For one thing, app development requires the production of different apps for different platforms (e.g. iPhone vs. Android vs. Blackberry), and submission to an app store, making apps much more fragmented and expensive to produce with a longer timeline before they reach target visitors. Most importantly, an app requires users to download the app before it can be accessed. On the other hand, a mobile website is universal to all contemporary smartphone browsers, making a mobile website more flexible and cost efficient, with fewer barriers between you and your target users. Of course, there are some applications that are better-suited to an app format (interactive games being a primary example), and often it makes sense to have both an app and a mobile website. But for a well-rounded mobile presence a mobile-optimized website is generally a practical and effective first step.
Evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications. Security is the biggest concern when it comes to cloud computing. By leveraging a remote cloud based infrastructure, a company essentially gives away private data and information, things that might be sensitive and confidential. It is then up to the cloud service provider to manage, protect and retain them, thus the provider’s reliability is very critical. A company’s existence might be put in jeopardy, so all possible alternatives should be explored before a decision. On the same note, even end users might feel uncomfortable surrendering their data to a third party.
Similarly,...

Similar Essays