Blogs are one of the most ideal ways to communicate to
the world when trying to express different experiences and educate others. Throughout
this course, we have become educated in the roots of information technology.
Provided all of this information that has been learned throughout this course,
the focus point will be revolving around the chosen tech topic of web and mobile
applications. As the world steadily progresses to a more modernized mobile
world, applications are being designed to function on a mobile device for ease
of access, whether these applications are strictly built as an application or
even designed for a web browser, the functionality resembles that of what an
application does on a computer. The main functions of mobile devices have
become a gateway to allowing users to use applications that were originally
built for computers to a more on-the-go feature. Technology has become so
advanced in the last century, that many changes in sizes of computers have
become smaller and smaller with much easier accessibility, Vahid & Lysecky
(2017) explains, “1940’s computers, with thousands of baseball-sized switches,
occupied entire rooms” (Section 1.1, para. 2). Knowing that the original
computers in the world were created to be massive, and now throughout time have
become so advanced that these devices have become handheld. Without knowing the
history of computer technology, one would never realize how advanced we have
come to bring such a large system down to such a small device. This does not
even scratch the surface of how the components in these devices have changed
tremendously over the years.
The
advancements in hardware alone in technology have become so advanced from what
it first was back in the 1940’s everything that allowed a computer to function
properly had been changed. As Vahid & Lysecky (2017) mentions, “by the
1970’s, an entire computer could fit on a one-coin sized device known as a
computer chip” (Section 1.1, para. 2). How quickly computer systems went
from being the size of a room down to the size of a coin is incredible, that
does not even recognize the other parts of a computer that have been developed
over the years. Another very critical piece of hardware that has changed
throughout the time that has begun advancing in the mobile technology world is
processors. Processors as Vahid & Lysecky (2017) explain are, “hardware
that runs program instructions and controls other hardware” (Section 2.1,
para.1). These processing units are what drives a computer to function between
numerous tasks during a session of use, this controls how quickly tasks can be
completed or accessed, and originally these processors were slower, but have
rapidly advanced to function with faster-operating speeds. Mobile devices have
become more advanced in computing power because of processor enhancements,
Reddi et al. (2018) explain that “a smartphone today has enough computing
power to be on par with the fastest supercomputers from the 1990s” (para. 1).
This determining how even though three years ago mobile processors have become
so advanced which would determine how technology has been steadily trending in
a positive way. However, mobile devices do not only run based off of their
hardware, but a critical function also that plays a role in how devices run are
through software designs.
The way
hardware is designed is to coexist and work parallel with how software is
designed through programming. Programming languages are what allows the
hardware to interact with the software designed in programs or operating
systems, this allows users to have more control over their systems and allows
the user to run programs. Mobile devices use similar programming habits to run
their hardware like computers. All programs are run from different types of
programming languages. These two share a common programming language known as
Java. Java is the main framework for android mobile devices whereas on
computers the Java language is used in application use. Software programming is
the main framework of how all technology runs and is the most critical function
of how the hardware works with the device.
As mobile
devices become more accepted to becoming main technological devices that people
use, applications that are developed for these devices become the main
reasoning behind this. Applications that are on mobile devices are usually
known for their compatibility when used between computer systems and mobile
devices, a lot of applications get developed so that people have access to
their email, important documents, and even in some cases video games. In some
cases people use their mobile devices in a way to work anywhere, mobile devices
enable users to view different parts of their businesses, some companies use
these for their databases to view them. As Li et al. (2020) mentions “When
users allow their data to be collected via software applications and mobile
devices, users need to have some level of trust and control over their data”
(p. 1). Having this level of trust for mobile devices to manage their databases
in a business has a lot of meaning. While users have trust in their mobile
devices to manage their databases, these devices are protected from security
risks with built-in features that the programmers implement into their apps. Some
of these features are when swapping applications on the device the program’s
security takes into effect by logging the user out of the application. Another
way that apps are secured is by having an account authentication that asks for
private credentials that only the user would know that way it can be protected
from outside users without the device owner’s permission. Other features that
have been designed are 2-step authentication which requires another outside
source to enable the login to the application, this being a phone number text,
email, or even log in from a computer. These types of authentications require
the owner of the device to have the proper credentials to log in than needing
credentials to approve the login request. These are some of the ways that
applications are developed in ways to secure the user in the application they
are using.
References
Li,
Z., Peng, B., & Weng, C. (2020). XeFlow: Streamlining Inter-Processor
Pipeline Execution for the Discrete CPU-GPU Platform. IEEE Transactions
on Computers, Computers, IEEE Transactions on, IEEE Trans.
Comput, 69(6), 819–831.
https://doi-org.proxy-library.ashford.edu/10.1109/TC.2020.2968302
Reddi, V. J., Yoon, H., &
Knies, A. (2018). Two Billion Devices and Counting. IEEE Micro, 38(1),
6–21.
Vahid, F., &
Lysecky, S. (2017). Computing technology for all. Retrieved from
zybooks.zyante.com/
No comments:
Post a Comment