This is another long chapter with that Dr. Andrews summarizes in two pages, so there is hope of grasping the key points. The chapter begins with a list of devices you might be required to support in an enterprise environment that come in a new category. Some companies have a Bring Your Own Device (BYOD) policy for certain devices, which saves the company the expense of buying or leasing the device, but provides headaches to support staff who are charged to support devices that are not compliant with company standards.
The text lists four operating systems that it says are the most popular.
Dr. Andrews discusses each of the operating systems listed above
for a few pages. You should browse through any system you know
well, and read the other sections to compare pluses
and minuses.The text offers a major element of
comparison on page 453.
The author recommends that you explore the settings app found in Android and in Apple smartphones when you need to configure anything about the device, such as turning Bluetooth, cell service, or Wi-Fi service on or off. She refers to "turning the antenna" on or off for each service, but I find it easier to think of them as separate services instead of antennas.
A mobile device that is connected to a cellular data service can be used as a Mobile Hotspot, if your contract for data allows that, and if you have a huge amount of data to share. This could be a nice feature if you are rich and have several poor friends. It is a bit like having my daughter attach to my WAP when she comes over, since I have no particular limit on data, and her contract frequently runs out. Cellular data is typically more expensive than cable data, and it comes with lower limits. The video below shows you how to set up a Mobile Hotspot on an Apple phone and on an Android phone. (It also reviews some of the ideas above.)
Sometimes there isn't an easy way to connect to another devices service wirelessly. In that case, you may be able to tether two devices together. Page 456 shows a picture of a laptop that has no data service, connected by a USB cable to a cell phone whose owner is willing to share his/hers. (In a few pages, the author mentions that such cables often have micro USB, mini USB, or USB-C connectors for Android devices. Apple devices have used Lightning connectors for a while, but some now use USB-C connectors.) When using a shared connection, the text points out that you may need to supply one or more of three identifiers.
Regarding SIM cards, the author points out that if you are upgrading from a device that uses a SIM card to another, you can transfer credentials by moving the card to the new device. If your carrier does not use SIM cards, or if you are changing to a device that does not use them, you will have to have your account moved to the new device by the carrier. In either case, contact the carrier for the correct procedure.
The text discusses how to set up email on a mobile device. This should be familiar to anyone who has used mail on a mobile device. The text points out that email can typically be accessed by a browser (web interface) or by a client (program interface), You should be aware of POP3 and IMAP, the two main protocols that are used for email, as well as SMTP.
Basic facts: outgoing email is typically sent across the Internet using Simple Mail Transfer Protocol (SMTP, port 25). This is what your post office uses to send email to another post office. This does require an SMTP server on each of the networks involved. The receiving SMTP server delivers your email to your mailbox, which you can think of as a set of records in a database. Your email client may pull the mail from the mailbox with Post Office Protocol 3 (POP3, port 110), or just read it with Internet Message Access Protocol (IMAP, port 143). There is no specific POP3 or IMAP server involved with those requests to your mailbox, only a service that your client's request activates in the post office.
The text presents a short section on synchronizing data from a mobile device. It begins by telling us that synchronizing is about making a copy of your data in another place. Making a back up is more extensive, because that concept include making a copy of your OS and programs. In either case, you are encouraged to consider storing in the related cloud service, Google storage for Android, and iCloud for Apple. There is also a discussion of synchronizing with a desktop, to allow continuation of work on that device. This makes it necessary to synchronize back to the phone, if you intend to continue on a file that you changed on the PC. General rule: if you change a file, synch to the other device ASAP. A way to manage such things would be to use Microsoft's OneDrive or Dropbox.
The video below is kind of long, but it addresses the concepts of the Internet of Things and the lack of security on them.
All devices need security, especially those that use wireless technology. The text discusses several ways to increase security:
The text turns to diagnosing and removing malware. What you do can depend greatly on the tools available to you. I recommend reviewing slides 70 through 82 of the PowerPoint file for this chapter.