Examine the challenges of developing applications

Assignment Help Management Information Sys
Reference no: EM13758723

Term Paper: Mobile Computing and Social Networks

There are thousands of iPhone Apps, iPad Apps, and Android Apps that have been developed to perform a myriad of tasks and processes. Initially, most of these applications were games intended to be played on mobile devices. The popularity of these applications led businesses to ponder whether some of their business process applications that run on desktop platforms and the Web could be redesigned to run on mobile devices. The answer was a resounding yes! For example, Nationwide developed the Nationwide® Mobile, a free iPhone App that allows its insurance policyholders to file a claim on the spot when an accident occurs. The application can snap pictures of the accident and attach them to the claim data and upload the claim information to a server. This reduces the length of time to process a claim filed this way. Nationwide competitors have followed suit and developed iPhone, iPad, and Android applications of their own. Policyholders can receive messages via Facebook or Twitter. Other business processes that have been reengineered as a result of mobile computing include Quick Response (QR) codes which have replaced one-dimensional bar codes. They are read using mobile devices, accepting credit card payments from an iPhone, iPad or Android device, depositing checks using an iPhone without visiting a bank, and many more. Write a ten to fifteen (10-15) page term paper in which you:

Assess the effectiveness and efficiency mobile-based applications provide to capture geolocation data and customer data, and quickly upload to a processing server without users having to use a desktop system.

Evaluate benefits realized by consumers because of the ability to gain access to their own data via mobile applications.

Examine the challenges of developing applications that run on mobile devices because of the small screen size.

Describe the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android.

Mobile applications require high availability because end users need to have continuous access to IT and IS systems.

Discuss ways of providing high availability.

Mobile devices are subjected to hacking at a higher rate than non-mobile devices. Discuss methods of making mobile devices more secure.

Use at least three (3) quality resources in this assignment.

Reference no: EM13758723

Questions Cloud

Designing vb applications across multiple platforms : Technical Project "Designing VB Applications Across Multiple Platforms"This assignment will contain two (2) Parts: Written Paper and Visual Basic Prototype. The Visual Basic Prototype is not included in the total page count but is included in the eva..
Who are the fools mentioned in the poem trees : Who are the "fools" mentioned in the poem "Trees"? When a poet wishes to use figurative language, he or she will use words that are.
Historical evidence for the u.s. economy indicates : Historical evidence for the U.S. economy indicates that recessions have occurred roughly once every six years since the 1960s and the unemployment rate usually decreases during a recession and increases shortly after the recession ends.
Web server vulnerabilities : Describe at least three web server vulnerabilities and how they are typically exploited. Provide unique answers here, posting early will help.
Examine the challenges of developing applications : Examine the challenges of developing applications that run on mobile devices because of the small screen size. Describe the methods that can be used to decide which platform to support, i.e., iPhone, iPad, Windows Phone, or Android
What is ec and how has it evolved : What is EC, and how has it evolved?Describe the difference between affiliate marketing and Web adverting.What are the three stages of B2C EC?
Cabinet maker produces two types of cabinets : A furniture cabinet maker produces two types of cabinets that house and hide plasma televisions. The Mission-style cabinet requires #340 in materials and 15 labor hours to produce, and it yields a profit of $910 per cabinet.
What word best describes relationship between buck and john : What word best describes the relationship between Buck and John Thornton? The purpose of the expedition Buck takes with Thornton and his partners is to.
The actual life expectancy of the product : What is the ease of fixing or repairing the product if it fails? Likelihood that the product will perform throughout its expected life. The actual life expectancy of the product.  The actual life expectancy of the product

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss cloud computing how would you define it

Discuss cloud computing. How would you define it. What are its essential features. Give examples.

  Solution to supply chain management

Solution to Supply Chain Management and Supply Chain Management identify the main issues in the chosen area, and contain and reference new learning that has occurred

  Operations management - supply chainplease answer the

operations management - supply chainplease answer the following questions.generally speaking who manages a supply

  Dss model management softwarebriefly explain what

dss model management softwarebriefly explain what information is provided by the dss that aid in decision making and

  What are several e-business applications

What are several e-business applications that you might recommend to a small company to help it survive and succeed in challenging economic times. Why

  Investigate the mis requirements of the organisation

You are required to investigate the MIS requirements of the organisation in the case study.

  Determine the effectiveness of an information system

Discuss the job functions that are needed to support the intended information system used by the organization. Include a description about how an organization can determine the effectiveness of an information system

  Explain underlying principles of agile systems development

Agile Systems Development Methodologies - Explain the underlying principles of agile systems development methodologies

  Algorithm for criminal justice purposes

Conduct a computer research on the MD5 algorithm and explain why it is considered an important part of the computer forensic analysis. What is it, how it is used and is it still a valid algorithm for Criminal Justice purposes

  Describe the difference between a vulnerability and threat

Describe the difference between a vulnerability and threat - Firewall vulnerability is explained in a structured manner in this response. The answer includes references used.

  Technology effectiveness for verizon

Technology Effectiveness for Verizon - How does Verizon's Technology cause the organization to move from their present state to a desired future state

  Compare the amount of safety stock in two systems

To reduce safety stock, should the cross-dock facility be closer to the factory or the retail outlets? For this purpose, analyzed the impact of increasing L1, and therefore decreasing L2, on total safety stock.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd