Sign In
Not register? Register Now!
You are here: HomeResearch PaperTechnology
Pages:
3 pages/≈825 words
Sources:
2 Sources
Level:
MLA
Subject:
Technology
Type:
Research Paper
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 19.44
Topic:

Challenges of Developing an OS to block any non-authorized users (Research Paper Sample)

Instructions:
The instructions required the writer to write about the Challenges of Developing an OS to block any non-authorized users. The sample explores the challenges of developing an os to bloc unathorized users and compares it with a cm security app source..
Content:
Name Instructor Course Date Challenges of Developing an OS to block any non-authorized users Most users are heavily interested in taking the necessary steps to prevent unauthorized people from accessing their smartphones, or tablets. Developing an Operating System (OS) such as Windows 8.1, Apple iOS, or Google’s Android presents a solution to protecting privacy and safeguarding against unwanted access. Most OS have a firewall that prevents viruses and other malware from accessing the device. They also have a provision for creating passwords to prevent unauthorized access. However, building an OS is difficult and expensive. An operating system requires hundreds of software developers and programmers to work on it. The entire process entails creating and recreating command, testing, and adjusting to achieve the desired system. Being an operating system, it runs on both the hardware and the software components in the device. It is quite difficult to interface the OS with the hardware. Similarly, different commands have to be developed and integrated with other applications that will work on the device. Microsoft incurred US$ 10 billion when it was developing Windows Vista. Over 10000 employees worked for five years to come up with the OS (McPherson, Proffitt, and Hale-Evans, 1). Other versions of the Windows OS have been costly to develop. The company has been forced to inject millions of dollars into its development. Similarly, Apple’s Mac OS has been expensive and difficult to develop. Similarly, the development of iOS and Android mobile operating system was costly and took years before they came into the market. The smartphone and tablet industry is dominated by Google’s Android, Apple’s iOS, and Windows (McPherson et al. 1). The three are undoubtedly some of the leading technology and software companies in the world. Android has the largest share followed by iOS and Windows at a distant third place. It is entirely difficult to develop an operating system that can rival the three established ones. For a company to develop more advanced OS, it will need enormous capital and human resource. The costs incurred in creating an OS to prevent unauthorized access far outweigh the perceived benefits of marketing the device. After all, the market has free apps that guarantee privacy and prevent any unwanted access to the tablet (McPherson et al. 1). If the business software company were to develop the OS, it would have to charge a much higher price for the device to recover the cost incurred in the development of the tablet. Although this may appear practical, the reality is that the high pricing means that the customers will not be able to afford it. Perhaps, this explains the expensive nature of Apple’s tablets. The company has developed its operating system that runs devices. However, its strong brand name and reputation for quality makes its product attractive in the market. Being the most valuable company in the world, it has the resources and expertise to develop its OS. CM Security App The CM security app is designed for all Android smartphones and tablets. Apart from working as an antivirus, the application can lock apps from potential thieves (Tumbokon 2). It is powered by both local & cloud engines for the purpose of protecting the device against any threats. The users only need to have access to the internet to download it from the app store. Once they download the app, they can tap scan where the app will scan all apps on the device to identify any Trojans, virus’s adware, spyware, and vulnerabilities. One of the best features that come with CM security app is that it allows the user to locate his or her device. The user needs to visit https://findphone.cmcm.com website with personal email. The app will ask for one to set up a security password that allows him or her to locate the tablet on a map (Tumbokon 2).When the owner taps yell, the device can make some sounds to find it even if...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Research Blockchain Bonds & Regulatory Compliance
    Description: The paper analyses the Blockchain- Bonds & Regulatory Compliance (Asset Structuring) and Explain the link of block chain as an information systems...
    6 pages/≈1650 words| 18 Sources | MLA | Technology | Research Paper |
  • Alternative Fuels: Controlling Environmental Pollution
    Description: Write a research proposal on the use of alternative fuels as a way of controlling environmental pollution. use atleast three sources...
    2 pages/≈550 words| 5 Sources | MLA | Technology | Research Paper |
  • Women in mathematics, engineering and technology.
    Description: Women in mathematics, engineering and technology. Technology Research Paper...
    10 pages/≈2750 words| 8 Sources | MLA | Technology | Research Paper |
Need a Custom Essay Written?
First time 15% Discount!