Tag Archives: phones

Design Tips and Practice for Non-Smartphone Mobile Hardware (which still exist)

This guest post is contributed by Grady Winston. Grady is an avid writer and Internet entrepreneur from Indianapolis. He has worked in the fields of technology, business, marketing, and advertising – implementing multiple creative projects and solutions for a range of clients.

imageBreaking news: there’s an alternative to smartphones. It’s called a feature phone. You may remember them. They existed long before Android, iOS, Windows Phones and even BlackBerry. If you’ve been paying attention, which most people haven’t, you’ll notice they make up a huge portion of the global market. In fact, they’re very much alive and well.

Most developers completely overlook the feature phone market entirely, ignoring a massive market segment. In other words, there’s plenty of money to make with mass-market phones.

More About Feature Phones:

According to a recent Forbes piece, feature phones are now far more profitable than mid-market smartphones. How can this be?

As smartphones began their steady rise to dominance, popular handset makers from all over the world abandoned the feature phone market. Since most handset makers stopped development for mass-market mobile phones, it left a huge market wide open for Nokia and handful of feature phone developers throughout Asia. While the feature phone market is experiencing a decline, as of 2012, over a billion mass-market handsets are being sold annually. The bottom line: it’s time for developers to get in the feature phone development game.

Top Feature Phone Development Platforms

Brew MP

· About – The Binary Runtime Environment for Wireless (BREW) platform, developed by the engineers at Qualcomm, has been around for upwards of a decade. To date, over a billion devices have been sold with BREW as the chief OS platform. Additionally, over $3 billion has been paid out to BREW developers.

The big idea behind BREW is that it seamlessly integrates simple applications with feature phones. The way it does this is kind of misleading. Yes, BREW-powered phones can be programmed in C+ or C++, but for all intents and purposes, BREW works as the pseudo operating system.

While the faux-OS allows you to run native code on each device, you don’t need to code applications for a specific device. This is largely because the runtime library is actually a part of each BREW-powered phone’s on-chip firmware. In other words, BREW is among the most flexible and powerful feature phone development platforms out there.

· Navigation & Basic BREW Development Concepts – Start by downloading the BREW SDK from the Qualcomm site. Once you download the SDK or DevKit from the BREW resources page, you’ll find the Brew Simulator or Emulator, depending on the SDK release.

Throughout the dev process, the simulator offers multiple levels of application signatures: one signature to authenticate you (the developer), and another signature to ensure the application has passed all BREW-related app testing.

Testing apps involves transferring them to-and-from a BREW-powered handset via USB using the Brew AppLoader tool built by Qualcomm. If the app isn’t configured correctly, BREW will automatically delete the app once you restart the phone. From here, apps can be deleted and removed from the handset via USB to free up onboard memory for further app testing.

Symbian

· About – While the Nokia-owned Symbian OS has recently been re-tooled to focus on smartphone development; its history is in feature phone development. The platform is based in C++ programming, but there tends to be multiple issues with the Symbian platform to date. Essentially, Nokia had big plans for the OS – mainly to provide a development community with a repository of standardized code to work with – but third-party developers own much of the code. This essentially means that only a select number of development firms have access to the full source code.

In 2010, the development platform was switched over to open source, which marks the largest open-source code migration in the history of mobile development.

· Basic Symbian Development Concepts – The bad news is that the Symbian development platform is fairly complex. The good news is that once you wrap your head around it, it can prove to be a powerful platform for feature phone development.

For starters, the platform is fairly versatile. While the bulk of apps are programmed in C++, you can easily code with languages as diverse as Python, Java ME, Flash Lite, Ruby and .NET.

Downloading the SDK will reveal some crucial components you’ll need to spend some time with – namely the header files, library files and the Windows-based emulator.

The basics of Symbian development can be broken down into three main components: descriptors, active object and the cleanup stack. The problem with using these components is that they’re based on older, out-of-date Windows hardware components. While you can use a wide range of MobileDev languages to create apps, implementation is often limited to a small number of Nokia handsets.

Most Symbian developers use third-party tools like Carbide C++ express. With these coding tools, programmers can benefit from UI design features and other app debugging tools to get apps ready for deployment in a timely fashion.

The same development concepts that apply to smartphone apps also apply to feature phones: create an app people can use and you can make money off of. The key takeaway is this: there’s a $3 billion+ development market that many mobile developers have given up on. Don’t let that be you.

4 Comments

Filed under Business Development, cell phone, Connected Devices, Guest Writers

Scan a QR code – Expose yourself to mobile malware

Guest post by David Maman – CTO & Founder of GreenSQL.

imageA single poisoned link is all it takes to expose an entire organization to a full-scale attack.

Hackers write sophisticated browser-based attacks that operate quite stealthily. Now, they’re going after our mobile phones, which are soon to be the number one way we access the web.

As QR codes have evolved, they now can offer users – and thieves – unlimited information within seconds of scanning.

And we scan them voluntarily.

We’ve already been trained to think twice before entering an unknown link we get from a stranger or even a friend, but almost anyone will scan an unknown QR code with a smartphone or a tablet, if the offer it’s embedded in looks tempting enough.

The Experiment:

Over a three-day security conference in London, I created a small poster featuring a big security company’s logo and the sentence “Just Scan to Win an iPAD.” Thousands of people walked by, no one asked where the sign came from, and no one took it down, not even a representative of the company featured on the sign.

The results: 455 people scanned the sign and browsed the link over the three days. The breakdown: 142 iPhone users, 211 Android users, 61 Blackberry, and 41 unknown browsers.

Remember, this was a conference for security professionals.

As I’m a nice guy fighting for the right side, the QR code simply linked to a web page featuring a smiley face. If I had decided to include a malware or poisoned URL attack based on multiple mobile smart phone browsers, I wonder whose phone I would have penetrated…

To make a long story short: QR codes are becoming more and more prevalent. And most of us don’t have the same AV or URL filtering technology on our phones or tablets that we have on our PCs.

The question is: Can we really fully trust the QR codes we see on the streets, in restaurants, or in ads? Regretfully, the answer is no.

Any attacker can take advantage of QR codes. And remember, unlike computers, most mobile devices do not include antivirus solutions to protect us against mobile malware.

Think before you scan.

· Does this QR code seem to come from a reliable source?

· After scanning the QR code and seeing the link, is the link really from whom it claimed to be?

· Would I click on this link if it came through my email?

Even if you miss out on the iPAD or the free ice cream cone, you’re probably better off.

Author bio:

David Maman is CTO & Founder of GreenSQL, the database security company.

About GreenSQL:

GreenSQL, the Database Security Company, delivers out-of-the-box database security solutions for small and mid-sized organizations. Started as an open source project back in 2006, GreenSQL became the no. 1 database security solution for MySQL with 100,000 users worldwide. In 2009, in response to market needs, GreenSQL LTD developed a commercial version, bringing a fresh approach to protecting databases of small- and medium-sized businesses.

GreenSQL provides database security solutions that are affordable and easy to install and maintain. GreenSQL supports Microsoft Azure, SQL Server (all versions including SQL Server 2012), MySQL and PostgreSQL.

6 Comments

Filed under Connected Devices, Cyber Crime, Don't Get Hacked, Guest Writers, Internet Safety Tools

Benefits of a Wired Life

Wired life Over the last ten to fifteen years, we have seen an explosive amount of growth related to high technology.

In just a few short years, we have gone from land lines and dial-up internet connections to 3g cell phones and wireless internet.

Living in this period of time is exciting for many different reasons and living a wired life has many benefits, a few of which will be explored in the following article.

Instant Access to Information

Whenever you need to find something out in this day and age, all you need to do is go to Google and you will have the answer in a matter of seconds. This is great for many different reasons. There is rarely a need to dial information, and when you look up something on the internet, you also can see reviews, updated information, and alternatives to your search as well, regardless of what you’re looking for.

Get Anywhere with Ease

Whether you utilize the Google Maps tool or have a GPS system in your vehicle, chances are you’ll have a tough time getting lost on the way to a new location. Although there have been some instances where this technology hasn’t been quite as effective, it is generally the best information available out there at the moment. Glitches have basically been worked out and maps are updated frequently as new routes are assessed and opened up.

Mobility

mobility Practically everything you could ever need in the way of technology is now available in a portable device.

In 1998, the average hard drive on a PC was 8 GB; now an 80 GB mp3 player is smaller than a deck of cards. In such a brief time period, practically everything is now portable.

Pocket PCs and cell phones have access to a variety of function that go far beyond the bulky cell phone of ten to twelve years ago. The ability to access your PC’s desktop from a remote location is another of many benefits of the increasingly mobile nature of technology.

Promise of Greatness to Come

Each time a new technology is developed, it brings a sense of hope for what the future has in store. Even now, documents and records are being scanned and backed up, books are being saved to digital formats, and databases are being created to be able to make the most of our technology. As this field continues to grow and develop, our lives can and will only get better as a result.

By-line:

This article was contributed by Holly McCarthy, who writes on the subject of an internet provider. She invites your feedback at hollymccarthy12 (at) gmail dot com

4 Comments

Filed under Interconnectivity, Living Life, Networking, Personal Perspective, social networking, Windows Tips and Tools