Mobility is about individual and on-demand connection. It's about getting the right information at the right time and in the right place. In the end, mobility has the power to transform the way we go beyond the Internet.Delivering mobility isn't just about wireless devices and networks. It's really about connecting people - connecting them with one another, with their work, their homes and their play - and supporting their experience regardless of which technology is used. So that the end result is a seamless customer experience with all the old boundaries removed.

                        The Wireless Application Protocol (WAP) has been proposed as a better way to achieve the mobility.WAP is a specification for a set of communication protocols designed to allow and standardize ways for wireless devices to get information from networks and display it in their browsers. WAP helps to define servers, called gateways, that mediate between wired and wireless networks, and provide value-added services to wireless networks. Using WAP, you can communicate with any operating system.

                         Global enterprises are automating the distribution and sharing of data, information and applications in real time. This necessitates a strategic plan that assures the privacy, confidentiality, integrity and availability of their information systems, supporting infrastructures and other intellectual assets. In the transition from e-commerce to the digital economy the major roadblock, lack of trust, must be removed. So the issue of data security is given the top concern when planning comprehensive information assurance strategy.

                                Security is both an enabling and disabling technology. Its purpose is to enable communication and transactions to take place in a secure environment without Fear of compromise, while at the same time disabling non-legitimate activities and access to information and facilities. Non-legitimate activities include eavesdropping, pretending to be another party (also known as impostering or spoofing), or tampering with data during transmission. In general these activities are either unacceptable or illegal outside of the digital environment, so security simply helps to enforce the status quo in that sense.

Tags :
Your rating: None Average: 5 (1 vote)

Posted by

Sun, 19/12/2010 - 12:49