SlideShare a Scribd company logo
1 of 13
BY
M.Meghana
INTRODUCTION
• mobile operator face the challenge of managing
  a dramatic rise in mobile data traffic
• mobile broadband continues to rise in popularity
  and usage
• Attackers see mobile devices and networks as
  new ground for attacks
HISTORY
• Mobile infrastructure will require plan for OSI
  layer
   to send and receive data
• First generation:
   before 1990’s
   no security to data just mobile was invented
• Second generation(1990’s):
   customer is not satisfied with mobile services
• Third generation(after 1990’s):
   deals with mobile traffic on network
• Fourth generation:
  solves problem of mobile traffic
WORKING PROCESS
• Arbor's Peak flow SP solution allows mobile
 network operators to optimize and protect their
 mobile infrastructure and services.

• Mobile infrastructure protection


• Mobile service protection
TECHNOLOGIES
1)java
• Mobile infrastructure uses Java run time
  environment in cell phones.

2)Database
• database store data when communications are
  done
• brings the applications that were once limited
  to the world where they are most needed.
3)Xml
 XML (Extensible Markup Language) is used
  for integration of software running in mobile
APPLICATIONS
1)SAP Mobile Infrastructure :
 The SAP MI offers tools for synchronization
 It is based on
   java
    xml
2) Wyse technology:
• provider of cloud-based mobile infrastructure
  management technology.
ADVANTAGES
 Decrease security risk and costs involved with
  lost devices.
 Users can select the devices that best
  meets their needs
 get their devices up and running quickly, in just
  minutes instead of days.
• Users get reliable, secure and easy access to
 corporate email and applications

• Use custom attributes to track asset
 information

• Benefit from service level guarantees
DISADVANTAGES
 forced to rely on your chosen vendor’s
  capabilities
 Some times not accessible from anywhere in
  the country
CONCLUSION
 Mobile Infrastructure serves as the universal
 platform for mobilizing your enterprise
 applications

 provides security to data that is transferred
 from one device to other

More Related Content

What's hot

Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computinggaurav jain
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile ComputingJAINIK PATEL
 
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMI
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMIEvolving role of Software,Legacy software,CASE tools,Process Models,CMMI
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMInimmik4u
 
Software Engineering Layered Technology Software Process Framework
Software Engineering  Layered Technology Software Process FrameworkSoftware Engineering  Layered Technology Software Process Framework
Software Engineering Layered Technology Software Process FrameworkJAINAM KAPADIYA
 
2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software conceptsPrajakta Rane
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanismsRajapriya82
 
Distributed computing
Distributed computingDistributed computing
Distributed computingshivli0769
 
Event management by using cloud computing
Event management by using cloud computingEvent management by using cloud computing
Event management by using cloud computingLogesh Waran
 
Unit 4- Software Engineering System Model Notes
Unit 4- Software Engineering System Model Notes Unit 4- Software Engineering System Model Notes
Unit 4- Software Engineering System Model Notes arvind pandey
 
Case study on cloud computing
Case study on cloud computingCase study on cloud computing
Case study on cloud computingSnehal Takawale
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureThanakrit Lersmethasakul
 
Corba concepts & corba architecture
Corba concepts & corba architectureCorba concepts & corba architecture
Corba concepts & corba architecturenupurmakhija1211
 

What's hot (20)

Vision of cloud computing
Vision of cloud computingVision of cloud computing
Vision of cloud computing
 
Architecture of Mobile Computing
Architecture of Mobile ComputingArchitecture of Mobile Computing
Architecture of Mobile Computing
 
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMI
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMIEvolving role of Software,Legacy software,CASE tools,Process Models,CMMI
Evolving role of Software,Legacy software,CASE tools,Process Models,CMMI
 
Software Engineering Layered Technology Software Process Framework
Software Engineering  Layered Technology Software Process FrameworkSoftware Engineering  Layered Technology Software Process Framework
Software Engineering Layered Technology Software Process Framework
 
2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts2. Distributed Systems Hardware & Software concepts
2. Distributed Systems Hardware & Software concepts
 
Distributed database
Distributed databaseDistributed database
Distributed database
 
Security services and mechanisms
Security services and mechanismsSecurity services and mechanisms
Security services and mechanisms
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Event management by using cloud computing
Event management by using cloud computingEvent management by using cloud computing
Event management by using cloud computing
 
Mobile computing unit 5
Mobile computing  unit 5Mobile computing  unit 5
Mobile computing unit 5
 
Google App Engine ppt
Google App Engine  pptGoogle App Engine  ppt
Google App Engine ppt
 
Unit 4- Software Engineering System Model Notes
Unit 4- Software Engineering System Model Notes Unit 4- Software Engineering System Model Notes
Unit 4- Software Engineering System Model Notes
 
Unit 4
Unit 4Unit 4
Unit 4
 
Case study on cloud computing
Case study on cloud computingCase study on cloud computing
Case study on cloud computing
 
NIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference ArchitectureNIST Cloud Computing Reference Architecture
NIST Cloud Computing Reference Architecture
 
Distributed information system
Distributed information systemDistributed information system
Distributed information system
 
Stepwise planning
Stepwise planningStepwise planning
Stepwise planning
 
Corba concepts & corba architecture
Corba concepts & corba architectureCorba concepts & corba architecture
Corba concepts & corba architecture
 
4. system models
4. system models4. system models
4. system models
 
Distributed Systems Naming
Distributed Systems NamingDistributed Systems Naming
Distributed Systems Naming
 

Viewers also liked

Bright talk summit ea and innovation - jude umeh
Bright talk summit   ea and innovation - jude umehBright talk summit   ea and innovation - jude umeh
Bright talk summit ea and innovation - jude umehJude Umeh
 
Designing Web Interfaces
Designing Web InterfacesDesigning Web Interfaces
Designing Web InterfacesBill Scott
 
Surface Computing
Surface ComputingSurface Computing
Surface Computingshivu1234
 
Heliodisplay brochure
Heliodisplay brochureHeliodisplay brochure
Heliodisplay brochureBenn Sachi
 
Analysis of the power quality impact of multiple directed energy loads on an ...
Analysis of the power quality impact of multiple directed energy loads on an ...Analysis of the power quality impact of multiple directed energy loads on an ...
Analysis of the power quality impact of multiple directed energy loads on an ...cahouser
 
3 d optical data storage
3 d optical data storage3 d optical data storage
3 d optical data storageSanchit Gautam
 
A review of cloud computing for transportation system
A review of cloud computing for transportation systemA review of cloud computing for transportation system
A review of cloud computing for transportation systemNaveena N
 
AUTOMATIC NIGHT LAMP WITH MORNING ALARM
AUTOMATIC NIGHT LAMP WITH MORNING ALARMAUTOMATIC NIGHT LAMP WITH MORNING ALARM
AUTOMATIC NIGHT LAMP WITH MORNING ALARMWaj Jenny Bunny
 
Holographic versatile disc
Holographic versatile discHolographic versatile disc
Holographic versatile discAkhil Kumar
 
Holographic Versatile Disc - Seminar
Holographic Versatile Disc - SeminarHolographic Versatile Disc - Seminar
Holographic Versatile Disc - SeminarNitin Balakrishnan
 
Surface computing
Surface computingSurface computing
Surface computingChandan Jha
 
Application of cloud computing to agriculture
Application of cloud computing to agriculture Application of cloud computing to agriculture
Application of cloud computing to agriculture Swathi Rampur
 

Viewers also liked (20)

Bright talk summit ea and innovation - jude umeh
Bright talk summit   ea and innovation - jude umehBright talk summit   ea and innovation - jude umeh
Bright talk summit ea and innovation - jude umeh
 
Designing Web Interfaces
Designing Web InterfacesDesigning Web Interfaces
Designing Web Interfaces
 
Surface Computing
Surface ComputingSurface Computing
Surface Computing
 
5D DVD
5D DVD5D DVD
5D DVD
 
Heliodisplay brochure
Heliodisplay brochureHeliodisplay brochure
Heliodisplay brochure
 
Light fidelity
Light fidelity Light fidelity
Light fidelity
 
holographic versatile disc
holographic versatile discholographic versatile disc
holographic versatile disc
 
Analysis of the power quality impact of multiple directed energy loads on an ...
Analysis of the power quality impact of multiple directed energy loads on an ...Analysis of the power quality impact of multiple directed energy loads on an ...
Analysis of the power quality impact of multiple directed energy loads on an ...
 
HVD
HVDHVD
HVD
 
Fuel cells
Fuel cellsFuel cells
Fuel cells
 
AirBar Sensor
AirBar SensorAirBar Sensor
AirBar Sensor
 
3 d optical data storage
3 d optical data storage3 d optical data storage
3 d optical data storage
 
Htc ppt
Htc pptHtc ppt
Htc ppt
 
A review of cloud computing for transportation system
A review of cloud computing for transportation systemA review of cloud computing for transportation system
A review of cloud computing for transportation system
 
Presentation on edt
Presentation on edtPresentation on edt
Presentation on edt
 
AUTOMATIC NIGHT LAMP WITH MORNING ALARM
AUTOMATIC NIGHT LAMP WITH MORNING ALARMAUTOMATIC NIGHT LAMP WITH MORNING ALARM
AUTOMATIC NIGHT LAMP WITH MORNING ALARM
 
Holographic versatile disc
Holographic versatile discHolographic versatile disc
Holographic versatile disc
 
Holographic Versatile Disc - Seminar
Holographic Versatile Disc - SeminarHolographic Versatile Disc - Seminar
Holographic Versatile Disc - Seminar
 
Surface computing
Surface computingSurface computing
Surface computing
 
Application of cloud computing to agriculture
Application of cloud computing to agriculture Application of cloud computing to agriculture
Application of cloud computing to agriculture
 

Similar to mobile infrastructure management

Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture materialAnkit Gupta
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud ComputingPooja Sharma
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computingVENNILAV6
 
Mobile computing
Mobile computingMobile computing
Mobile computingamellia27
 
Management and Provisioning of M2M Devices and Applications
Management and Provisioning of M2M Devices and ApplicationsManagement and Provisioning of M2M Devices and Applications
Management and Provisioning of M2M Devices and ApplicationsMusa Unmehopa
 
GSM ARCHITECTURE-Mobile Communication.pptx
GSM ARCHITECTURE-Mobile  Communication.pptxGSM ARCHITECTURE-Mobile  Communication.pptx
GSM ARCHITECTURE-Mobile Communication.pptxDr.R.SUGANYA RENGARAJ
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Canada
 
Cloud_Computing.pptx
Cloud_Computing.pptxCloud_Computing.pptx
Cloud_Computing.pptxYash771676
 
Chapter 5. infrastructure ti
Chapter 5. infrastructure tiChapter 5. infrastructure ti
Chapter 5. infrastructure tiAditya TroJhan
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGIJCI JOURNAL
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedAsyathShahina
 
Security and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud ComputingSecurity and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud ComputingRam Kumar K R
 
Nomadic Computing with Mobile Devices
Nomadic Computing with Mobile DevicesNomadic Computing with Mobile Devices
Nomadic Computing with Mobile DevicesCognizant
 

Similar to mobile infrastructure management (20)

Week 7 lecture material
Week 7 lecture materialWeek 7 lecture material
Week 7 lecture material
 
Basics of Mobile COmmunication.pptx
Basics of Mobile COmmunication.pptxBasics of Mobile COmmunication.pptx
Basics of Mobile COmmunication.pptx
 
Mobile cloud Computing
Mobile cloud ComputingMobile cloud Computing
Mobile cloud Computing
 
Overview of mobile computing
Overview of mobile computingOverview of mobile computing
Overview of mobile computing
 
The Mobile Ecosystem
The Mobile EcosystemThe Mobile Ecosystem
The Mobile Ecosystem
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
4 gppt
4 gppt4 gppt
4 gppt
 
5G 2
5G 25G 2
5G 2
 
Management and Provisioning of M2M Devices and Applications
Management and Provisioning of M2M Devices and ApplicationsManagement and Provisioning of M2M Devices and Applications
Management and Provisioning of M2M Devices and Applications
 
GSM ARCHITECTURE-Mobile Communication.pptx
GSM ARCHITECTURE-Mobile  Communication.pptxGSM ARCHITECTURE-Mobile  Communication.pptx
GSM ARCHITECTURE-Mobile Communication.pptx
 
Webinar on Enterprise Security & android
Webinar on Enterprise Security & androidWebinar on Enterprise Security & android
Webinar on Enterprise Security & android
 
Cisco Meraki- Simplifying IT
Cisco Meraki- Simplifying ITCisco Meraki- Simplifying IT
Cisco Meraki- Simplifying IT
 
Cloud_Computing.pptx
Cloud_Computing.pptxCloud_Computing.pptx
Cloud_Computing.pptx
 
Chapter 5. infrastructure ti
Chapter 5. infrastructure tiChapter 5. infrastructure ti
Chapter 5. infrastructure ti
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTINGEFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
EFFECTIVE BANDWIDTH ANALYSIS OF MIMO BASED MOBILE CLOUD COMPUTING
 
Mobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it usedMobile computing The brief explanation of mobile computing and how it used
Mobile computing The brief explanation of mobile computing and how it used
 
Security and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud ComputingSecurity and Privacy in Mobile Cloud Computing
Security and Privacy in Mobile Cloud Computing
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Nomadic Computing with Mobile Devices
Nomadic Computing with Mobile DevicesNomadic Computing with Mobile Devices
Nomadic Computing with Mobile Devices
 

More from Akhil Kumar

Edp section of solids
Edp  section of solidsEdp  section of solids
Edp section of solidsAkhil Kumar
 
Edp projection of solids
Edp  projection of solidsEdp  projection of solids
Edp projection of solidsAkhil Kumar
 
Edp projection of planes
Edp  projection of planesEdp  projection of planes
Edp projection of planesAkhil Kumar
 
Edp projection of lines
Edp  projection of linesEdp  projection of lines
Edp projection of linesAkhil Kumar
 
Edp ortographic projection
Edp  ortographic projectionEdp  ortographic projection
Edp ortographic projectionAkhil Kumar
 
Edp intersection
Edp  intersectionEdp  intersection
Edp intersectionAkhil Kumar
 
Edp ellipse by gen method
Edp  ellipse by gen methodEdp  ellipse by gen method
Edp ellipse by gen methodAkhil Kumar
 
Edp development of surfaces of solids
Edp  development of surfaces of solidsEdp  development of surfaces of solids
Edp development of surfaces of solidsAkhil Kumar
 
Edp typical problem
Edp  typical problemEdp  typical problem
Edp typical problemAkhil Kumar
 
Edp st line(new)
Edp  st line(new)Edp  st line(new)
Edp st line(new)Akhil Kumar
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authenticationAkhil Kumar
 

More from Akhil Kumar (20)

Edp section of solids
Edp  section of solidsEdp  section of solids
Edp section of solids
 
Edp scales
Edp  scalesEdp  scales
Edp scales
 
Edp projection of solids
Edp  projection of solidsEdp  projection of solids
Edp projection of solids
 
Edp projection of planes
Edp  projection of planesEdp  projection of planes
Edp projection of planes
 
Edp projection of lines
Edp  projection of linesEdp  projection of lines
Edp projection of lines
 
Edp ortographic projection
Edp  ortographic projectionEdp  ortographic projection
Edp ortographic projection
 
Edp isometric
Edp  isometricEdp  isometric
Edp isometric
 
Edp intersection
Edp  intersectionEdp  intersection
Edp intersection
 
Edp excerciseeg
Edp  excerciseegEdp  excerciseeg
Edp excerciseeg
 
Edp ellipse by gen method
Edp  ellipse by gen methodEdp  ellipse by gen method
Edp ellipse by gen method
 
Edp development of surfaces of solids
Edp  development of surfaces of solidsEdp  development of surfaces of solids
Edp development of surfaces of solids
 
Edp curves2
Edp  curves2Edp  curves2
Edp curves2
 
Edp curve1
Edp  curve1Edp  curve1
Edp curve1
 
Edp typical problem
Edp  typical problemEdp  typical problem
Edp typical problem
 
Edp st line(new)
Edp  st line(new)Edp  st line(new)
Edp st line(new)
 
graphical password authentication
graphical password authenticationgraphical password authentication
graphical password authentication
 
yii framework
yii frameworkyii framework
yii framework
 
cloud computing
cloud computingcloud computing
cloud computing
 
WORDPRESS
WORDPRESSWORDPRESS
WORDPRESS
 
AJAX
AJAXAJAX
AJAX
 

Recently uploaded

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

mobile infrastructure management

  • 2. INTRODUCTION • mobile operator face the challenge of managing a dramatic rise in mobile data traffic • mobile broadband continues to rise in popularity and usage • Attackers see mobile devices and networks as new ground for attacks
  • 3. HISTORY • Mobile infrastructure will require plan for OSI layer to send and receive data • First generation: before 1990’s no security to data just mobile was invented • Second generation(1990’s): customer is not satisfied with mobile services • Third generation(after 1990’s): deals with mobile traffic on network
  • 4. • Fourth generation: solves problem of mobile traffic
  • 5. WORKING PROCESS • Arbor's Peak flow SP solution allows mobile network operators to optimize and protect their mobile infrastructure and services. • Mobile infrastructure protection • Mobile service protection
  • 6.
  • 7. TECHNOLOGIES 1)java • Mobile infrastructure uses Java run time environment in cell phones. 2)Database • database store data when communications are done • brings the applications that were once limited to the world where they are most needed.
  • 8. 3)Xml  XML (Extensible Markup Language) is used for integration of software running in mobile
  • 9. APPLICATIONS 1)SAP Mobile Infrastructure :  The SAP MI offers tools for synchronization  It is based on java xml 2) Wyse technology: • provider of cloud-based mobile infrastructure management technology.
  • 10. ADVANTAGES  Decrease security risk and costs involved with lost devices.  Users can select the devices that best meets their needs  get their devices up and running quickly, in just minutes instead of days.
  • 11. • Users get reliable, secure and easy access to corporate email and applications • Use custom attributes to track asset information • Benefit from service level guarantees
  • 12. DISADVANTAGES  forced to rely on your chosen vendor’s capabilities  Some times not accessible from anywhere in the country
  • 13. CONCLUSION  Mobile Infrastructure serves as the universal platform for mobilizing your enterprise applications  provides security to data that is transferred from one device to other