Flexible Interfaces - r: Q o1 K3 z, o& ^. n
$ |& h( C# a9 [/ ?1 n! B2 c* q0 a0 j
The core services on smartphones all tie in to the idea of a multi-purpose device that can effectively multitask. A user can watch a video clip, field a phone call, then return to the video clip after the call, all without closing each application. Or he or she can flip through the digital calendar and to-do list applications without interrupting the voice call. All of the data stored on the phone can be synchronized with outside applications or manipulated by third-party phone applications in any number of ways. www.examw.com) N0 r& \: u# p$ f
8 I9 y0 X8 B. h: l
Systems supported by smartphones include Bluetooth, a short-range, wireless radio service that allows phones to wirelessly link up with each other and with other nearby devices that support it. This includes things like printers, scanners, input devices, computers and headsets. Some varieties of Bluetooth only allow communication with one device at a time, but others allow simultaneous connection with multiple devices.
# `( x4 g- q3 b( q# b4 e : q, R& ^" W3 [% o- Z# ]3 R
Also included is data synchronization(同步), a phone that keeps track of your personal information, like appointments, to-do lists, addresses, and phone numbers, needs to be able to communicate with all of the other devices you use to keep track of those things. There are hundreds of possible platforms and applications you might use for this in the course of a day. If you want to keep all of this data in synchronization with what’s on your phone, then you generally have to look for a cell phone that speaks the languages of all of the devices and applications you use. Or you can go out and buy new applications that speak the language of your cell phone.
# @; ?+ O, g, Z ( n$ ^' S+ `' q# Q/ m
Then there is Open Mobile Alliance (OMA), a collaborative organization with the mission to "facilitate global user adoption of mobile data services by specifying market driven mobile service enablers that ensure service interoperability (互用性) across devices, geographies, service providers, operators, and networks, while allowing businesses to compete through innovation and differentiation". The OMA formed a Data Synchronization Working Group, which is continuing the work begun by the SyncML Initiative. SyncML is an open-standards project designed to eliminate the trouble of worrying about whether your PIM devices sync up with your phone and vice-versa. The project is designed so that any kind of data can be synchronized with any application on any piece of hardware, through any network, provided that they are all programmed to OMA standards. This includes synchronization over the Web, Bluetooth, mail protocols and TCP/IP networks. ) M* }! P L) o: Y
3 U5 n# m' z0 T: n* c
SyncML allows data to be synchronized from a phone to PalmOS, Windows, Mac and Linux applications using Bluetooth, infrared (红外线), HTTP or a USB cable.
- R9 s4 W" q; e; ]+ T6 y 2 k2 B/ C, a/ {. L$ g/ L# ?
The Future of Smartphones
& n" E5 A0 q x: w/ V; R . a5 ^, u, o% b8 l/ b
Smartphones are getting thinner and cheaper, and as a result are entering the consumer market. For the past few years smartphones have been aimed at prosumers, or "professional consumers" (prosumers can also refer to "production consumers", or consumers who drive the design, production and alteration of a product). Prosumers are generally early adopters of products. They have disposable income and great enthusiasm for particular products or technologies. Smartphone developers find prosumers very useful when designing applications and hardware. As prosumers pick and choose the phones that offer the applications they want, developers can tweak designs and move towards mass production. Analysts predict that one billion smartphone handsets will be sold by 2011. ! x5 b6 C5 [! A: K1 }9 S* }% C# ?
! y9 B! j6 b" |4 B) C
Perhaps the most challenging consideration for the future is security. Smartphones and PDAs are already popular among many corporate executives, who often use their phones to transmit confidential information. Smartphones may be vulnerable to security breaches such as an Evil Twin attack. In an evil twin attack, a hacker sets a server’s service identifier to that of a legitimate hotspot or network while simultaneously blocking traffic to the real server. When a user connects with the hacker’s server, information can be intercepted (截取) and security is compromised.
# G2 v4 Z4 l. [) Z4 A9 e1 g' {
5 M$ J/ v: {" h* |* m One downside to the openness and configurability of smartphones is that it also makes them susceptible to viruses. Hackers have written viruses that attack SymbianOS phones. The viruses can do things like turning off anti-virus software, locking the phone completely or deleting all applications stored on the phone. : \1 k1 B: I% U9 U) q
www.Examw.com
9 F' Z5 N* O( u5 x4 X; `. s9 c On the other side, some critics argue that anti-virus software manufacturers greatly exaggerate the risks, harms and scope of phone viruses in order to help sell their software. 1 p: l8 u5 N7 ]; S6 ~& Y+ |
6 H9 n8 P3 @+ _8 P2 o8 |8 n The incredible diversity in smartphone hardware, software and network protocols restrain practical, broad security measures. Most security considerations either focus on particular operating systems or have more to do with user behavior than network security.
r3 e0 F. R8 M( \
) \$ h7 S2 J& T7 }1 Y( K Q With data transmission rates reaching fast speeds and the incorporation of WiFi (无线局域网) technology, the sky is the limit on what smartphones can do. Possibly the most exciting thing about smartphone technology is that the field is still wide open. It’s an idea that probably hasn’t found its perfect, real-world implementation yet. Every crop of phones brings new designs and new interface ideas. No one developer or manufacturer has come up with the perfect shape or size yet. The next generation smartphone could look like a flip phone, a tablet PC, a candy bar or something no one has conceived of yet. |