Security Analysis of Palm PDA Computing
نویسنده
چکیده
By creating a handheld computer that succeeded where so many other palm computers had failed, Palm Computing quickly gained popularity in the personal organizer market in 1996 and 1997. Today the Palm OS accounts for over 80% of all operating systems installed on handheld computers. In the addition, over the past several years, new open documentation standards, freely available Software Development Kits, and compiler tools have led to an enormous boom in palm computer software. Today a tremendous amount of free software can be downloaded for any version of the Palm OS.
منابع مشابه
The Analysis of Graffiti Input and Its Application to Personal Identification
---------------------------------------------Abstract Recently, the mobile devices such as PDA and smart phones are widely used to organize personal data and to access the host systems from remote places. But, these devices are easily accessed by irregular users due to the stealge or the lost property. The authentification by password or the fingerprint can protect them, but the convenience of ...
متن کاملDesign and development of a prototype for an inexpensive multi-node mobile Palm-PDA-based wireless clinical information system platform
In this paper, we describe the design, development, and testing of an inexpensive wireless intelligent patient monitoring system. The system uses commercially-available wireless data acquisition links that operate on non-IEEE-802.x frequencies to reduce privacy and security concerns. It uses the more readily secured and robust wired Ethernet LAN to move data through the hospital to a PC-based E...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملA Literature Review on Cloud Computing Security Issues
The use of Cloud Computing has increasedrapidly in many organization .Cloud Computing provides many benefits in terms of low cost and accessibility of data. In addition Cloud Computing was predicted to transform the computing world from using local applications and storage into centralized services provided by organization.[10] Ensuring the security of Cloud Computing is major factor in the Clo...
متن کاملSecurity Challenges in Fog Computing in Healthcare
Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...
متن کامل