Mobile Cloud Computing: The Next Logical Evolution

Mobile Cloud Computing: The Next Logical Evolution

Mobile Cloud Computing (MCC) is the next logical evolution for cloud computing. Though mobile technology is still evolving, especially the operating systems, it is doing so in a very rapid pace. Most modern mobile devices are now sporting capable web browsers mainly due to advances in mobile operating systems done by Google, Microsoft, and Apple. Because of this, mobile devices are now able to consume some cloud applications, with some tweaking on the part of the provider, of course. But the divide between a mobile browser and browsers found in PCs is blurring quickly and pretty soon all web-based cloud applications can be run on mobile devices like smart phones and tablets which will allow further flexibility and freedom to those users of cloud applications.

Mobile cloud computing can be considered as the blend three technology foundations, namely mobile computing, networking, and of course cloud computing. Cloud application developers will now have little trouble developing applications that will run on mobile browsers because the restrictions created by the limitations of mobile operating systems are now gone, giving developers and providers a wider market for their applications and services. This is also because mobile hardware has progressed quickly that today the power of a high end smart phone may rival that of smaller netbooks.

This is a revolutionary step towards how people do computing, but it is not without its hurdles. The biggest one would be money. Currently smart phones and tablets are pushing applications though a market system that provides big revenue for the owners of the mobile OS. Think Apple and the AppStore and Google and the Android Marketplace. Let’s say Apple does not make any money when people consume cloud applications on their iPhone, then there is a big possibility and the guys at Cupertino will restrict the use of these cloud applications, effectively hindering the progress of MCC. This could be the same for Google, but they are way more tolerant when it comes to things like this.

Another problem would be the infrastructure. MCC is dependent on the reliability of the network which allows people to use cloud applications properly. However, carriers around the world never really achieve their advertised connectivity prowess and even some locations may not have 3G at all. 4G is set to change that but so far the promises that come with the technology have not yet been met. If you cannot access cloud applications from anywhere then that defeats the purpose of MCC, and it could then be limited to metropolitan centers because of connectivity issues.

But I am still hopeful that mobile communications technology will be able to provide everything as advertised, and this will certainly help secure the future of mobile cloud computing.

By Abdul Salam

Sorry, comments are closed for this post.

Having Your Cybersecurity And Eating It Too

Having Your Cybersecurity And Eating It Too

The Catch 22 The very same year Marc Andreessen famously said that software was eating the world, the Chief Information Officer of the United States was announcing a major Cloud First goal. That was 2011. Five years later, as both the private and public sectors continue to adopt cloud-based software services, we’re interested in this…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And The Extension/Expansion Of Virtual Reality

Virtual Immersion And Virtual Reality This is a term I created (Virtual Immersion). Ah…the sweet smell of Virtual Immersion Success! Virtual Immersion© (VI) an extension/expansion of Virtual Reality to include the senses beyond visual and auditory. Years ago there was a television commercial for a bathing product called Calgon. The tagline of the commercial was Calgon…