Tech Topic Connection

 

    Blogs are one of the most ideal ways to communicate to the world when trying to express different experiences and educate others. Throughout this course, we have become educated in the roots of information technology. Provided all of this information that has been learned throughout this course, the focus point will be revolving around the chosen tech topic of web and mobile applications. As the world steadily progresses to a more modernized mobile world, applications are being designed to function on a mobile device for ease of access, whether these applications are strictly built as an application or even designed for a web browser, the functionality resembles that of what an application does on a computer. The main functions of mobile devices have become a gateway to allowing users to use applications that were originally built for computers to a more on-the-go feature. Technology has become so advanced in the last century, that many changes in sizes of computers have become smaller and smaller with much easier accessibility, Vahid & Lysecky (2017) explains, “1940’s computers, with thousands of baseball-sized switches, occupied entire rooms” (Section 1.1, para. 2). Knowing that the original computers in the world were created to be massive, and now throughout time have become so advanced that these devices have become handheld. Without knowing the history of computer technology, one would never realize how advanced we have come to bring such a large system down to such a small device. This does not even scratch the surface of how the components in these devices have changed tremendously over the years.

            The advancements in hardware alone in technology have become so advanced from what it first was back in the 1940’s everything that allowed a computer to function properly had been changed. As Vahid & Lysecky (2017) mentions, “by the 1970’s, an entire computer could fit on a one-coin sized device known as a computer chip” (Section 1.1, para. 2). How quickly computer systems went from being the size of a room down to the size of a coin is incredible, that does not even recognize the other parts of a computer that have been developed over the years. Another very critical piece of hardware that has changed throughout the time that has begun advancing in the mobile technology world is processors. Processors as Vahid & Lysecky (2017) explain are, “hardware that runs program instructions and controls other hardware” (Section 2.1, para.1). These processing units are what drives a computer to function between numerous tasks during a session of use, this controls how quickly tasks can be completed or accessed, and originally these processors were slower, but have rapidly advanced to function with faster-operating speeds. Mobile devices have become more advanced in computing power because of processor enhancements, Reddi et al. (2018) explain that “a smartphone today has enough computing power to be on par with the fastest supercomputers from the 1990s” (para. 1). This determining how even though three years ago mobile processors have become so advanced which would determine how technology has been steadily trending in a positive way. However, mobile devices do not only run based off of their hardware, but a critical function also that plays a role in how devices run are through software designs.

           

            The way hardware is designed is to coexist and work parallel with how software is designed through programming. Programming languages are what allows the hardware to interact with the software designed in programs or operating systems, this allows users to have more control over their systems and allows the user to run programs. Mobile devices use similar programming habits to run their hardware like computers. All programs are run from different types of programming languages. These two share a common programming language known as Java. Java is the main framework for android mobile devices whereas on computers the Java language is used in application use. Software programming is the main framework of how all technology runs and is the most critical function of how the hardware works with the device.

            As mobile devices become more accepted to becoming main technological devices that people use, applications that are developed for these devices become the main reasoning behind this. Applications that are on mobile devices are usually known for their compatibility when used between computer systems and mobile devices, a lot of applications get developed so that people have access to their email, important documents, and even in some cases video games. In some cases people use their mobile devices in a way to work anywhere, mobile devices enable users to view different parts of their businesses, some companies use these for their databases to view them. As Li et al. (2020) mentions “When users allow their data to be collected via software applications and mobile devices, users need to have some level of trust and control over their data” (p. 1). Having this level of trust for mobile devices to manage their databases in a business has a lot of meaning. While users have trust in their mobile devices to manage their databases, these devices are protected from security risks with built-in features that the programmers implement into their apps. Some of these features are when swapping applications on the device the program’s security takes into effect by logging the user out of the application. Another way that apps are secured is by having an account authentication that asks for private credentials that only the user would know that way it can be protected from outside users without the device owner’s permission. Other features that have been designed are 2-step authentication which requires another outside source to enable the login to the application, this being a phone number text, email, or even log in from a computer. These types of authentications require the owner of the device to have the proper credentials to log in than needing credentials to approve the login request. These are some of the ways that applications are developed in ways to secure the user in the application they are using.

 

References


Li, Z., Peng, B., & Weng, C. (2020). XeFlow: Streamlining Inter-Processor Pipeline Execution for the Discrete CPU-GPU Platform. IEEE Transactions on Computers, Computers, IEEE Transactions on, IEEE Trans. Comput, 69(6), 819–831. https://doi-org.proxy-library.ashford.edu/10.1109/TC.2020.2968302

Reddi, V. J., Yoon, H., & Knies, A. (2018). Two Billion Devices and Counting. IEEE Micro, 38(1), 6–21.

Vahid, F., & Lysecky, S. (2017). Computing technology for all. Retrieved from zybooks.zyante.com/

No comments:

Post a Comment