Cari Blog Ini

Selasa, 25 Maret 2014

Analysis Of The Influence Of Mobile Computing to Business Development

Definition of Mobile Computing
Technology is the ability to deal with displacement / movement of people in the use of computers in practice. From this definition we can conclude that the Mobile Computing today is much needed, given the needs of today's computer usage is very high, so that the use of Mobile Computing to facilitate computer users in performing their activities by using a computer.

Type Mobile Computing
Mobile Computing that there are currently several types, such as:
·         Laptops 
·         Wearable Computer 
·         PDA (Personal Digital Assistants) 
·         SmartPhone 

Tools For Mobile Computing
Below are some tools Mobile Computing and usefulness.
·         Java ME, popular for gaming
·         Symbian, general purpose, supported Nokia
·         Android is a Linux-based
·         iPhone, only on Mac OS X
·         Lazarus, Object Pascal ported beneficial to
·         Palm OS, Strong in U.S.
·         etc.
.
Mobile Computing Research
Wireless Communications
·         Quality of connectivity 
·         Bandwidth limitations
Mobility
·         Location transparency 
·         Location dependency
Portability
·         Power limitations 
·         Display, processing, storage limitations


How Would A Mobile Computing Affects Life Of A Businessman And Ordinary People?

Whenever there's something new on the market, people would categorize if that is intended for businessmen or for ordinary people. A lot of technologies and machines are introduced and launched in the market including mobile computing devices. The advantages of this mobile computing device are both applicable for businessmen and ordinary people. So everybody can use these devices to make life easier, have a convenient way of living, safety purposes, and easy access.
The purpose why these mobile computing devices were developed is to bring a maximum advantage that our lives may possibly have. Almost everybody wants to be updated and don't want to be behind the updates. Well, this is just a single advantage of this discovery. It wanted us to be updated real time. If we maximize this gadgets and electronics, there's no way for us to be left alone from anybody else. All parts of the globe are reachable and things are possible. Even if your family is across the globe, you can still feel their presence by maximizing the benefit of these devices anywhere and wherever.
For businesses, this could only be the easiest and the fastest way to approved businesses anywhere in the globe. You don't really need to be in person just to approve any transactions. This way could save money, effort, time, and no delays. Everything could be a click away and transactions easily approved in just a second. Just imagine a business with out this help. For sure a businessman would have to fly for hours or travel for even days just to be on their businesses. It would only be an expense of money. Getting tired even before you do your job, and real hassle that will cause delay and even loses. Or even worst, a business will be at stake and total risk.
Not to mention that everybody has a choice to use these computers for convenient life. It would make our life easy in any means possible. Like if we are on the way driving to home, we can call a family member to prepare for a meal since you may be very hungry. Even in just simple aspects of a simple person, these mobiles will surely help us. Its safety purpose can even save someone's life and could be a way to avoid any danger. It is hassle free to use and to maximize this machine. All of these features are made easy for us to be updated real time, do businesses and transactions right then and there, convenient and hassle free. You can protect your properties and even your families with the use of these techniques.
There are a lot of other minor advantages brought by this computing device. Its main purpose of existence is for us to improve and make life easier than we ever thought. If used potentially to its maximum, effects will surely be advancement in ones life.

TYPES OF TECHNOLOGY TRENDS THAT WILL IMPACT BUSINESS STRATEGIES IN 2014

1. Mobile devices will keep you in contact at all times

Cumbersome desktop computers might work well at home, but you can expect to do most of your business from a mobile device. Laptops will likely remain popular since they have built-in keyboards that people already know how to use. Tablet PCs, however, will become important companion pieces.

2. Cross-device software will help you save time and money

Since you will use several devices in 2014, software providers will respond by letting you download programs to many devices at once without forcing you to pay more. Many developers have already recognized the importance of cross-device software. When you download apps, they often have the opportunity to install the small programs on six or more devices.
This will make it easier for you to learn how to use the software that’s important to your industry. Instead of spending a lot of time trying to figure out how to use several programs, you’ll just adapt to different types of screens.
Of course, it doesn’t hurt that multi-device software helps you save money. Imagine buying separate programs for your desktop, laptop, tablet, and smartphone. That would get expensive fast!

3. Marketing data will come from multiple sources

In 2014, it will become increasingly important for you to learn how to market your products and concepts to precise audiences.
Social media has made marketing more targeted and effective. Of course, many companies have already tapped into this potential. The difference is that more businesses will start integrating information from multiple sources. You might get information from Facebook, your own website, Google, and other data sources.

4. Scalable data plans will become more important

An increased reliance on mobile devices will mean that more people and businesses have to invest in wireless data plans. A tablet can only do so much without accessing the Internet.
Unfortunately, those data plans can cost quite a bit of dosh, especially when you stream video content (we’ll keep mum about whether you’re just watching a movie or trying to convince a client that she needs your services). To combat growing prices, many companies will start to look at scalable data plans.
Scalable data plans differ from those that you probably have for your smartphone. With a scalable plan, you get to exceed your monthly limit without paying ridiculous fees. Many Internet Service Providers will also let customers jump from low-cost packages to higher-cost ones when they go over their allotted data. That’s a great alternative to paying extra fees.

5. Cloud data storage options will become increasingly important

Despite the concerns that many industries have about cloud storage ability and willingness to keep information secure, people will have little choice but to keep more information on these systems as opposed to their hard drives.
While it does raise some concerns, it also offers many advantages to businesses that work in a global marketplace. As many companies have already found, cloud systems make it possible for employees to access information from all over the world. If you have a meeting in China, you can always download a presentation from your cloud system instead of begging someone back at the office to take it off your PC and send it to you. The convenience, in other words, will likely outweigh the concerns. As more industries get involved, cloud service providers will probably find that they have to improve their security measures. That could make it safer for everyone to use.

6. Companies will make more of their own apps

In 2013, people get most of their apps through online stores. This next year will reveal a shift towards proprietary apps owned by employers.
Instead of relying on apps made by outside developers, more companies will start creating apps they can distribute among employees.
A company that builds its own app can include specific features designed to boost productivity and meet client demands. You don’t get that kind of flexibility from many third-party apps.
Many employers will also decide to regulate third-party apps. By assigning a manager to review available apps, the company can make sure that it spends money wisely while giving employees the tools they need to succeed.

7. More employers will ask you to Bring Your Own Device

There is good news for people who hate their workplace computers. Research shows that over two-thirds of companies already let employers bring their own devices to work. BYOD, as it’s called, boosts productivity by keeping employees in constant contact and making it easier for them to work outside of the office.
There’s even research showing that 43 percent of executives encourage BYOD because they want employees to get more work done away from the office. Given the advantages, you can expect this trend to continue in 2014.

8. You will receive BYOD training

As more employers encourage workers to BYOD, they will also need to create training programs that teach workers how to become more productive without compromising network security. Like many technological changes, there are some potential downsides.
Luckily, companies find that a comprehensive BYOD program makes the average employee about $3,150 more valuable every year compared to employees who do not BYOD. Companies that only offer basic BYOD training, see a $400 increase in value.
That means you might as well prepare for training that will turn you into a more valuable employee.
Rederence :
http://tweakyourbiz.com/technology/2013/08/15/8-technology-trends-that-will-impact-business-strategies-in-2014/

http://mobile-computing.bafree.net/how-would-a-mobile-computing-affects-life-of-a-businessman-and-ordinary-people.php

http://ariwiyanto83.blogspot.com/

http://asikgaasik.wordpress.com/2010/05/01/mengenai-mobile-computing/

Senin, 17 Maret 2014

Komunikasi

Sistem Komunikasi
Pada bab ini akan dibahas bagaimana komunikasi antara object2 dalam sistem
terdistribusi, khusus nya dengan menggunakan RMI (Remod Method
Invokation) dan RPC (Remote Procedure Call). RMI dan RPC berbasiskan
metode request dan reply.


                Gambar~2.1: Model komunikasi dan implementasi layer pada sistem terdistribusi
                      Request dan repy diimplementasikan pada protokol jaringan.


Network Protocol
Middleware dan aplikasi terdistribusi di implementasikan diatas protokol network.
Protocol diimplementasikan dalam beberapa lapisan (layer).

TCP dan UDP
TCP
TCP ( Transport Control Protocol) dan UDP (User Datagram Protocol)
adalah protokol transport yang berada di atas lapisan Internet Protocol (IP).
TCP adalah protocol yang handal, TCP dapat memastikan data yang
dikirimkan sampai ke tujuan begitu juga sebaliknya.
TCP menambahkan beberapa prosedur diatas layer internet protocol untuk
memastikan reliabilitas transport data :
² Sequencing
Pada setiap transmisi data (paket) diberi nomor urut. Sehingga pada
titik tujuan tidak ada segmen yang diterima sampai semua segmen
pada urutan bawah belum di terima.
² Flow Control
Pengirim tidak akanmembanjiri penerima.Karena pengiriman didasarkan
pada periode acknowledgment yang di terima oleh pengirim yang berasal
dari penerima.
² Retrasnmission dan duplicate handling

Apabila segmen tidak mendapatkan acknowledge dari penerima sampai
waktu timeout yang ditentukan terlampaui maka pengirim akan mengirim
ulang. Berdasarkan nomor urut penerima data dapat mendeteksi
dan menolak kalau terjadi duplikasi.
² Bu¤ering
Bu¤ering digunakan untuk menyeimbangkan antara pengirim dan penerima.
Kalau bu¤er pada penerima penuh, maka segmen yang datang
akan putus, sehingga menyebabkan tidak ada acknowledge ke pengirim
dan pengirim akan melakukan transmot ulang.
² Checksum
Setiap segment membawa checksum. Apabila checksum segmen yang
di terima tidak sesuai maka paket data tersebut akan di drop (dan
kemudian akan di transmit ulang)
UDP
UDP tidak memberikan garansi seperti halnya yang di berikan oleh TCP.
² UDP tidak memberikan garansi terhadap pengiriman data
Pada Internet Protocol paket data dapat drop karena suatu hal contohnya
jaringan yang rusak, UDP tidak mempunyai mekanisme untuk
menanggulangi hal tersebut.
² Kalau ingin menggunakan UDP sebagai protocol pengiriman yang handal,
makamekanisme kehandalan yang diinginkan di lakukan pada layer
aplikasi.
2.2.2 Komunikasi Request - Reply
Komunikasi antara proses dan objek pada sistem terdistribusi dilakukan
melalui message passing.


Client melakukan :
1. Mengirim (request) pesan ke server
2. Menerima hasil (reply dari server)
Server melakukan :
1. Penerimaan pesan (request) dari client
2. Mengeksekusi permintaan dari client
3. Mengirim hasil (reply) ke client.
RPC dan RMI
Tujuan dari RPC dan RMI dibuat bagi programmer, agar computer yang
terdistribusi terlihat seperti computer yang terpusat. Dan berguna untuk
melihat sistem terdistribusi dari sisi pemrogramman.
RPC dan RMI berada pada Middleware
RMI (Remote Method Invocation)
Berikut ilustrasi



Referensi : 
http://sisterfrisca.blogspot.com/