SlideShare una empresa de Scribd logo
1 de 17
Nomadic Computing Nan Jia Janet Jeremy Shafer
What is Nomadic Computing? Nomadic Computing Technologies How is Nomadic Computing used today? Value to Organizations Current Limitations Future Growth Areas Suggested project Agenda
The definition of the term “nomadic computing” has changed over time: According to the WiMAX forum, 	nomadic = semimobile.  Semimobile means “At a minimum, the client mobile device is transportable to secondary fixed locations with no connection while in transit.” In broader industry, nomadic = mobile Mobile computing takes place when portable computing devices interact in some fashion with a central information system.  Users access the Internet and data on their home or work computers while away from the normal, fixed workplace  What is Nomadic computing?
More about mobile computing: Enables the mobile worker to: create, access, process, store, communicate information without being constrained to a single location Enables interaction with organizational personnel that were previously disconnected Ideally, users are not constrained to a single device Mobile computing aims to be “Ubiquitous and Pervasive” What is Nomadic computing?
Mobile computing is accomplished using a combination of: computer hardware, system and applications software, some form of communications medium Hardware : Palmtop, Clamshell , Handheld Penkey , Penslate , Laptop  Software : MSDOS , Windows 3.1/3.11/95/98/NT , Windows for Pen Computing , Windows CE , PenDOS , PenRight , Palm OS , Psion EPOC32 , Unix Communication technologies : Wireless Local Area Networks (WLANs) , Satellite , Cellular Digital Packet Data (CDPD) , Personal Communications Systems (PCS) , Global System for Mobile communications (GSM) , RAM and ARDIS data networks , Specialized Mobile Radio (SMR) service , one and two-way paging , plain old telephone system (POTS) , Internet , infra-red,docking (serial, parallel, LAN),disk swapping Nomadic computing technology
Some popular mobile devices: Apple iPhone Blackberry Curve HTC Touch Helio Ocean Nokia N95 Samsung Upstage … this is just a  short list. Nomadic computing technologies
Some wireless network options: Nomadic computing technologies
For individual users, performs functions such as: email, Web browsing , word processing , scheduling , contact management , to-do lists , messaging , presentation -Mobile devices: laptop computers, handheld devices (PDA, mobile phone, pager, video camera, digital camera) -Wearable devices (smart watches and digital glasses) How is nomadic computing used?
For Estate Agents Emergency Services In courts In companies Stock Information Collation/Control Credit Card Verification Taxi/Truck Dispatch Electronic Mail/Paging How is nomadic computing used?
Improved Information Accessibility Increased Operational Efficiency  ,[object Object]
Transportation and Shipping
General Dispatching
Hotel Operations
News Reporting
Health Care
Car Rental Agencies
Fieldwork

Más contenido relacionado

La actualidad más candente

Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its TypesHTS Hosting
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive ComputingSangeetha Sg
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computingPrince Chandu
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)Parvesh Taneja
 
WiMax - Technology & Architecture
WiMax - Technology & ArchitectureWiMax - Technology & Architecture
WiMax - Technology & Architecturesashar86
 
Unit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed SystemsUnit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed SystemsNandakumar P
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication ProtocolsPradeep Kumar TS
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityGurpreet Singh
 
System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computingpurplesea
 
Wi-max Technology PPT
Wi-max Technology PPTWi-max Technology PPT
Wi-max Technology PPTVinay Krishna
 
Module 5 Wireless Network Design Considerations
Module 5   Wireless Network Design ConsiderationsModule 5   Wireless Network Design Considerations
Module 5 Wireless Network Design Considerationsnikshaikh786
 

La actualidad más candente (20)

Introduction to Application layer
Introduction to Application layerIntroduction to Application layer
Introduction to Application layer
 
Ad hoc networks
Ad hoc networksAd hoc networks
Ad hoc networks
 
Virtualization and its Types
Virtualization and its TypesVirtualization and its Types
Virtualization and its Types
 
Snmp
SnmpSnmp
Snmp
 
Pervasive Computing
Pervasive ComputingPervasive Computing
Pervasive Computing
 
Distributed computing
Distributed computingDistributed computing
Distributed computing
 
Data security in cloud computing
Data security in cloud computingData security in cloud computing
Data security in cloud computing
 
W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)W-LAN (Wireless Local Area Network)
W-LAN (Wireless Local Area Network)
 
WiMax - Technology & Architecture
WiMax - Technology & ArchitectureWiMax - Technology & Architecture
WiMax - Technology & Architecture
 
Vlan
Vlan Vlan
Vlan
 
Unit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed SystemsUnit 3 cs6601 Distributed Systems
Unit 3 cs6601 Distributed Systems
 
IT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTINGIT6601 MOBILE COMPUTING
IT6601 MOBILE COMPUTING
 
IoT Communication Protocols
IoT Communication ProtocolsIoT Communication Protocols
IoT Communication Protocols
 
Wi-Fi Wireless Fidelity
Wi-Fi Wireless FidelityWi-Fi Wireless Fidelity
Wi-Fi Wireless Fidelity
 
System models for distributed and cloud computing
System models for distributed and cloud computingSystem models for distributed and cloud computing
System models for distributed and cloud computing
 
Wi-max Technology PPT
Wi-max Technology PPTWi-max Technology PPT
Wi-max Technology PPT
 
OSI MODEL
    OSI MODEL    OSI MODEL
OSI MODEL
 
AODV routing protocol
AODV routing protocolAODV routing protocol
AODV routing protocol
 
Module 5 Wireless Network Design Considerations
Module 5   Wireless Network Design ConsiderationsModule 5   Wireless Network Design Considerations
Module 5 Wireless Network Design Considerations
 
Peer to peer system
Peer to peer systemPeer to peer system
Peer to peer system
 

Similar a Nomadic Computing: Enabling Mobile Workers

iPhones: Markets, Marketing, Development and research
iPhones: Markets, Marketing, Development and researchiPhones: Markets, Marketing, Development and research
iPhones: Markets, Marketing, Development and researchchrisvanaart
 
Mobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online LearningMobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online LearningTmobile Girl
 
Cloud Computing & Mobile digital platform
Cloud Computing & Mobile digital platformCloud Computing & Mobile digital platform
Cloud Computing & Mobile digital platformsahrudayaartz
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobilityreneznet105
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Editor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingEditor IJCATR
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobilityreneznet105
 
Nomadic Computing with Mobile Devices
Nomadic Computing with Mobile DevicesNomadic Computing with Mobile Devices
Nomadic Computing with Mobile DevicesCognizant
 
Welcome To The Mobile World
Welcome To The Mobile WorldWelcome To The Mobile World
Welcome To The Mobile WorldFrank La Vigne
 

Similar a Nomadic Computing: Enabling Mobile Workers (20)

iPhones: Markets, Marketing, Development and research
iPhones: Markets, Marketing, Development and researchiPhones: Markets, Marketing, Development and research
iPhones: Markets, Marketing, Development and research
 
CS.pptx
CS.pptxCS.pptx
CS.pptx
 
Ch1
Ch1Ch1
Ch1
 
CS8601 1 MC NOTES.pdf
CS8601 1 MC NOTES.pdfCS8601 1 MC NOTES.pdf
CS8601 1 MC NOTES.pdf
 
MobileComputing by Mudasir
MobileComputing by MudasirMobileComputing by Mudasir
MobileComputing by Mudasir
 
Mobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online LearningMobile Computing: Microsoft Mobile Solutions for Online Learning
Mobile Computing: Microsoft Mobile Solutions for Online Learning
 
Cloud Computing & Mobile digital platform
Cloud Computing & Mobile digital platformCloud Computing & Mobile digital platform
Cloud Computing & Mobile digital platform
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobility
 
Pda
PdaPda
Pda
 
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
Hop- by- Hop Message Authentication and Wormhole Detection Mechanism in Wirel...
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
A Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile ComputingA Posteriori Perusal of Mobile Computing
A Posteriori Perusal of Mobile Computing
 
Micronic Mobility
Micronic MobilityMicronic Mobility
Micronic Mobility
 
Nomadic Computing with Mobile Devices
Nomadic Computing with Mobile DevicesNomadic Computing with Mobile Devices
Nomadic Computing with Mobile Devices
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Welcome To The Mobile World
Welcome To The Mobile WorldWelcome To The Mobile World
Welcome To The Mobile World
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 
Micronics,Llc
Micronics,LlcMicronics,Llc
Micronics,Llc
 

Último

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 

Último (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 

Nomadic Computing: Enabling Mobile Workers

  • 1. Nomadic Computing Nan Jia Janet Jeremy Shafer
  • 2. What is Nomadic Computing? Nomadic Computing Technologies How is Nomadic Computing used today? Value to Organizations Current Limitations Future Growth Areas Suggested project Agenda
  • 3. The definition of the term “nomadic computing” has changed over time: According to the WiMAX forum, nomadic = semimobile. Semimobile means “At a minimum, the client mobile device is transportable to secondary fixed locations with no connection while in transit.” In broader industry, nomadic = mobile Mobile computing takes place when portable computing devices interact in some fashion with a central information system. Users access the Internet and data on their home or work computers while away from the normal, fixed workplace What is Nomadic computing?
  • 4. More about mobile computing: Enables the mobile worker to: create, access, process, store, communicate information without being constrained to a single location Enables interaction with organizational personnel that were previously disconnected Ideally, users are not constrained to a single device Mobile computing aims to be “Ubiquitous and Pervasive” What is Nomadic computing?
  • 5. Mobile computing is accomplished using a combination of: computer hardware, system and applications software, some form of communications medium Hardware : Palmtop, Clamshell , Handheld Penkey , Penslate , Laptop Software : MSDOS , Windows 3.1/3.11/95/98/NT , Windows for Pen Computing , Windows CE , PenDOS , PenRight , Palm OS , Psion EPOC32 , Unix Communication technologies : Wireless Local Area Networks (WLANs) , Satellite , Cellular Digital Packet Data (CDPD) , Personal Communications Systems (PCS) , Global System for Mobile communications (GSM) , RAM and ARDIS data networks , Specialized Mobile Radio (SMR) service , one and two-way paging , plain old telephone system (POTS) , Internet , infra-red,docking (serial, parallel, LAN),disk swapping Nomadic computing technology
  • 6. Some popular mobile devices: Apple iPhone Blackberry Curve HTC Touch Helio Ocean Nokia N95 Samsung Upstage … this is just a short list. Nomadic computing technologies
  • 7. Some wireless network options: Nomadic computing technologies
  • 8. For individual users, performs functions such as: email, Web browsing , word processing , scheduling , contact management , to-do lists , messaging , presentation -Mobile devices: laptop computers, handheld devices (PDA, mobile phone, pager, video camera, digital camera) -Wearable devices (smart watches and digital glasses) How is nomadic computing used?
  • 9. For Estate Agents Emergency Services In courts In companies Stock Information Collation/Control Credit Card Verification Taxi/Truck Dispatch Electronic Mail/Paging How is nomadic computing used?
  • 10.
  • 18. Mobile AutomationIncreased Management Effectiveness Value for organizations
  • 19. Disconnection Low bandwidth High bandwidth variability Low power and resources Security and Privacy risks Wide variety of devices with different capabilities Device attributes Fit more functionality into single, smaller device Limitations
  • 21. A suggested exploratory/experimental project “Good Citizen Software” Addresses a basic human function ... to warn
  • 22. GCS Phase I Objective: Build a simple notification agent that can run on multiple nomadic platforms. Build public good will. Partner with government and/or news organizations. Maximize the install base. Use only as needed. Establish test schedule. Profit Model: None / Charitable service
  • 23. GCS Phase II Description: Leverage GPS technology to allow users to tag physical space Objective: Build a popular nomadic social network. Do not over-notify users. This service works because: It is mobile It is free It is platform independent Profit Model: None / Entertainment service
  • 24. GCS Phase III Description: Market the data with business value. Objective: Establish a revenue stream. Profit Model: Market Intelligence
  • 25. GCS Phase IV Description: Leverage a ubiquitous and pervasive install base. Objective: To be determined Profit Model: To be determined

Notas del editor

  1. Reference: http://www.pcworld.com/article/133536/in_pictures_iphone_competitors.html
  2. Reference: http://www.pcworld.com/article/133536/in_pictures_iphone_competitors.htmlLTE stands for Long Term Evolution, a standard being advanced by Verizon in the US