SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Planning for the Mobile
Enterprise
Introducing Mobile Computing
• Mobile Computing
Mobile (moving)
+
Computing (using computer)
Mobile computing = is an umbrella term
used to describe technologies that enable
people to access network services
anyplace,anytime,and anywhere.
Mobile computing
• In recent years, distributed computer has become
the norm, especially after the advent of the
internet.
• Today, technological advances are shaping a new
computing environment where the user is free
from the need to work at a specific location, and
is even enabled to work while on the move.
• This new paradigm is often called mobile
computing.
Mobile Computing Device
• LAPTOP
• Portable and compact personal
computer with the same capabilities
as a desktop computer.
• TABLETS
A small portable computer that accepts input
directly on to its screen rather than via
a keyboard or mouse.
• CELLPHONE
A phone with access to a cellular radio system so
it can be used over a wide area, without a
physical connection to a network; a mobile
phone.
• LONG-RANGE WIRELESS
Connected devices have so far mostly run
piggyback on the same networks and protocols
that support the Internet and mobile
communications
Going Mobile beyond the Enterprise
• Mobile technology along with bring-your-own device
(BYOD) has largely transformed our lives, including the way
we work. But enterprise mobility is more than simply
providing remote access to users. It is rather a shift in work
habits where employees can work remotely leveraging
mobile devices and cloud technology to better perform
business tasks.
• The mobile revolution is changing the way organizations
work, manage their operations as well as engage with their
employees. As a result, organizations are reconsidering
their technologies and techniques to make their traditional
organizational cultures and roles more mobile friendly,
making ‘mobile first’ a must have strategy.
Navigation
• Many external navigation sites like the major
search engines exist to return thousands of links
for almost any topic you might happen to be
curious about.
• A DNS server would start its search for an IP
address by contacting one of the root DNS
servers. The root servers know the IP addresses
for all of the DNS servers that handle the top-
level domains (.COM, .NET, .ORG, etc.).
Connectivity
Connectivity describes the extensive process of
connecting various parts of a network to one
another, for example, through the use of
routers, switches and gateways, and how that
process works.
Bandwidth
• Bandwidth describes the maximum data
transfer rate of a network or Internet
connection. It measures how much data can
be sent over a specific connection in a given
amount of time. For example, a
gigabit Ethernet connection has a bandwidth
of 1,000 Mbps, (125 megabytes per second).
An Internet connection via cable modem may
provide 25 Mbps of bandwidth.
VPN and SSL access
• A VPN or Virtual Private Network is a method used to
add security and privacy to private and public
networks, like WiFi Hotspots and the Internet. VPNs
are most often used by corporations to protect
sensitive data.
• SSL (Secure Sockets Layer) is the standard security
technology for establishing an encrypted link between
a web server and a browser. This link ensures that all
data passed between the web server and browsers
remain private and integral. SSL is an industry standard
and is used by millions of websites in the protection of
their online transactions with their customers.
Remote desktops
• Remote desktop is a program or an operating
system feature that allows a user to connect
to a computer in another location, see that
computer's desktop and interact with it as if it
were local.
Planning for the Mobile Enterprise

Weitere ähnliche Inhalte

Was ist angesagt?

M1 computer networks
M1 computer networksM1 computer networks
M1 computer networks
CarlTodd
 
Power point
Power pointPower point
Power point
drich14
 
Timeline History of Internet
Timeline History of InternetTimeline History of Internet
Timeline History of Internet
Mi Berras
 
Home networks ----neri
Home networks  ----neriHome networks  ----neri
Home networks ----neri
aejay_neri
 

Was ist angesagt? (20)

Lecture 20
Lecture 20Lecture 20
Lecture 20
 
M1 computer networks
M1 computer networksM1 computer networks
M1 computer networks
 
It (bluetoth)
It (bluetoth)It (bluetoth)
It (bluetoth)
 
Networking basics
Networking basicsNetworking basics
Networking basics
 
Working principles of internet nme
Working principles of internet nmeWorking principles of internet nme
Working principles of internet nme
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Protocols and methods
Protocols and methodsProtocols and methods
Protocols and methods
 
Power point
Power pointPower point
Power point
 
Networks
NetworksNetworks
Networks
 
Network
NetworkNetwork
Network
 
Network
NetworkNetwork
Network
 
Mobile computing 1
Mobile computing   1Mobile computing   1
Mobile computing 1
 
APIA2018 - Alexann Zhang - Decentralized Fog Computing World
APIA2018 - Alexann Zhang - Decentralized Fog Computing WorldAPIA2018 - Alexann Zhang - Decentralized Fog Computing World
APIA2018 - Alexann Zhang - Decentralized Fog Computing World
 
About Networking
About NetworkingAbout Networking
About Networking
 
Wireless Network
Wireless NetworkWireless Network
Wireless Network
 
Timeline History of Internet
Timeline History of InternetTimeline History of Internet
Timeline History of Internet
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
5 g technology
5 g technology5 g technology
5 g technology
 
Home networks ----neri
Home networks  ----neriHome networks  ----neri
Home networks ----neri
 
System and networkpresentation(sadaf noor)
System and networkpresentation(sadaf noor)System and networkpresentation(sadaf noor)
System and networkpresentation(sadaf noor)
 

Ähnlich wie Planning for the Mobile Enterprise

Data Communications.pptx
Data Communications.pptxData Communications.pptx
Data Communications.pptx
jepoy808
 

Ähnlich wie Planning for the Mobile Enterprise (20)

Mobile computing
Mobile computingMobile computing
Mobile computing
 
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSENETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
NETWORK FUNDAMENTALS, CLASS X, 402 , CBSE
 
Data Communications.pptx
Data Communications.pptxData Communications.pptx
Data Communications.pptx
 
Lecture 2 types of network
Lecture 2 types of networkLecture 2 types of network
Lecture 2 types of network
 
Networking
NetworkingNetworking
Networking
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
 
Hardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptxHardware and Software requirements for Internet 2.pptx
Hardware and Software requirements for Internet 2.pptx
 
Internet
InternetInternet
Internet
 
interconnected_network_of_internets.pptx
interconnected_network_of_internets.pptxinterconnected_network_of_internets.pptx
interconnected_network_of_internets.pptx
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptx
 
Networking
NetworkingNetworking
Networking
 
Computer networks.pptx
Computer networks.pptxComputer networks.pptx
Computer networks.pptx
 
E business webinternet slides world wide web / protocols
E business webinternet slides  world wide web / protocolsE business webinternet slides  world wide web / protocols
E business webinternet slides world wide web / protocols
 
NF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptxNF_Ch1_Introduction.pptx
NF_Ch1_Introduction.pptx
 
Internet and Networking
Internet and NetworkingInternet and Networking
Internet and Networking
 
Computer networks
Computer networksComputer networks
Computer networks
 
Computer network
Computer networkComputer network
Computer network
 
Computer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptxComputer Networks: Evolution of Computer Networks.pptx
Computer Networks: Evolution of Computer Networks.pptx
 
A Fundamental elements of a network.pptx
A Fundamental elements of a network.pptxA Fundamental elements of a network.pptx
A Fundamental elements of a network.pptx
 
Introduction to internet
Introduction to internetIntroduction to internet
Introduction to internet
 

Mehr von Anurag Bhusal

Mehr von Anurag Bhusal (20)

Warehousing management
Warehousing managementWarehousing management
Warehousing management
 
The Ottoman Empire
The Ottoman EmpireThe Ottoman Empire
The Ottoman Empire
 
Risk management
Risk managementRisk management
Risk management
 
Recruitment and Selection
Recruitment and Selection Recruitment and Selection
Recruitment and Selection
 
Globalization India
Globalization IndiaGlobalization India
Globalization India
 
Contemporary Theories Of Entrepreneurship (Prof.Harvey Leibenstein )
Contemporary Theories Of Entrepreneurship (Prof.Harvey Leibenstein )Contemporary Theories Of Entrepreneurship (Prof.Harvey Leibenstein )
Contemporary Theories Of Entrepreneurship (Prof.Harvey Leibenstein )
 
Nepal's Rivers Systems
Nepal's Rivers SystemsNepal's Rivers Systems
Nepal's Rivers Systems
 
Types of transportation
Types of transportationTypes of transportation
Types of transportation
 
Industrial Revolution
Industrial RevolutionIndustrial Revolution
Industrial Revolution
 
Feudalism system then and now
Feudalism system then and nowFeudalism system then and now
Feudalism system then and now
 
Cash flow
Cash flowCash flow
Cash flow
 
Bitcoin
BitcoinBitcoin
Bitcoin
 
You been given a 1000 pounds to do some thing good.
You been given a 1000 pounds to do some thing good.You been given a 1000 pounds to do some thing good.
You been given a 1000 pounds to do some thing good.
 
You been given a 1000 pounds to do some thing good.
You been given a 1000 pounds to do some thing good.You been given a 1000 pounds to do some thing good.
You been given a 1000 pounds to do some thing good.
 
Service Industries
Service IndustriesService Industries
Service Industries
 
The three division of power in Nepal
The three division  of power in NepalThe three division  of power in Nepal
The three division of power in Nepal
 
Financial institution
Financial institutionFinancial institution
Financial institution
 
Launching new product
Launching new productLaunching new product
Launching new product
 
The role of fiscal policy and central bank
The role of fiscal policy and central bankThe role of fiscal policy and central bank
The role of fiscal policy and central bank
 
Accounting system in Nepal
Accounting system in NepalAccounting system in Nepal
Accounting system in Nepal
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Kürzlich hochgeladen (20)

A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Planning for the Mobile Enterprise

  • 1. Planning for the Mobile Enterprise
  • 2. Introducing Mobile Computing • Mobile Computing Mobile (moving) + Computing (using computer) Mobile computing = is an umbrella term used to describe technologies that enable people to access network services anyplace,anytime,and anywhere.
  • 3. Mobile computing • In recent years, distributed computer has become the norm, especially after the advent of the internet. • Today, technological advances are shaping a new computing environment where the user is free from the need to work at a specific location, and is even enabled to work while on the move. • This new paradigm is often called mobile computing.
  • 4. Mobile Computing Device • LAPTOP • Portable and compact personal computer with the same capabilities as a desktop computer. • TABLETS A small portable computer that accepts input directly on to its screen rather than via a keyboard or mouse.
  • 5. • CELLPHONE A phone with access to a cellular radio system so it can be used over a wide area, without a physical connection to a network; a mobile phone. • LONG-RANGE WIRELESS Connected devices have so far mostly run piggyback on the same networks and protocols that support the Internet and mobile communications
  • 6. Going Mobile beyond the Enterprise • Mobile technology along with bring-your-own device (BYOD) has largely transformed our lives, including the way we work. But enterprise mobility is more than simply providing remote access to users. It is rather a shift in work habits where employees can work remotely leveraging mobile devices and cloud technology to better perform business tasks. • The mobile revolution is changing the way organizations work, manage their operations as well as engage with their employees. As a result, organizations are reconsidering their technologies and techniques to make their traditional organizational cultures and roles more mobile friendly, making ‘mobile first’ a must have strategy.
  • 7. Navigation • Many external navigation sites like the major search engines exist to return thousands of links for almost any topic you might happen to be curious about. • A DNS server would start its search for an IP address by contacting one of the root DNS servers. The root servers know the IP addresses for all of the DNS servers that handle the top- level domains (.COM, .NET, .ORG, etc.).
  • 8. Connectivity Connectivity describes the extensive process of connecting various parts of a network to one another, for example, through the use of routers, switches and gateways, and how that process works.
  • 9. Bandwidth • Bandwidth describes the maximum data transfer rate of a network or Internet connection. It measures how much data can be sent over a specific connection in a given amount of time. For example, a gigabit Ethernet connection has a bandwidth of 1,000 Mbps, (125 megabytes per second). An Internet connection via cable modem may provide 25 Mbps of bandwidth.
  • 10. VPN and SSL access • A VPN or Virtual Private Network is a method used to add security and privacy to private and public networks, like WiFi Hotspots and the Internet. VPNs are most often used by corporations to protect sensitive data. • SSL (Secure Sockets Layer) is the standard security technology for establishing an encrypted link between a web server and a browser. This link ensures that all data passed between the web server and browsers remain private and integral. SSL is an industry standard and is used by millions of websites in the protection of their online transactions with their customers.
  • 11. Remote desktops • Remote desktop is a program or an operating system feature that allows a user to connect to a computer in another location, see that computer's desktop and interact with it as if it were local.