Section 2 of this Article stages of the life cycle methodology are presented.
Section 3 discusses how to analyze the mobility of business processes.
But actually this is a massive online service though which peoples are creating groups to share their assignments, universities have built their special pages to depart online lectures similarly any one can find to someone if he / she has a Facebook ID with his/ her original name. Above all there is community of some special persons who are miss-using this convenient online social facility and making it harsh to use to Use FB without enough knowledge.
They are using fake accounts or IDs just to disturb or fraud some-one.
In this paper, a methodology to help companies develop business strategies and architectures for mobile computers offered.
Overall mobile technical infrastructure is presented to assist companies in the evaluation and deployment of mobile applications.Discusses software standards, which can have a big impact on the technical architectures and mobile application development. Mobile workers in this study are defined as workers who spend more than 20 % of their time away from his desk attending meetings, traveling, or telecommuting from home.Finally, the implications of the proposed methodology for mobile computing for practitioners and researchers discussed in the conclusion. 14 4 Conclusions 15 1 Mobile computing The twenty-first century workforce is becoming increasingly mobile. Some players in the mobile computing market with an emphasis on content and services, such as ringtones , music in MP3 format as well as MMS consumer oriented . The abundance of new mobile technologies and standards, as well as enable them to benefit created great confusion among business managers and IT architects.We have developed a methodology to help organizations plan and build a mobile computing applications throughout the enterprise.The proposed methodology is illustrated in Figure 1 is in sense IDEF0 notation.In IDEF0, the process is represented as a rectangular box and its relation to the inputs, controls, outputs and mechanisms (ICOM) can be interpreted as: Figure 1 A Methodology for Building Enterprise-Wide Mobile Applications " The inputs to the outputs of the process are converted according to the control group , using the mechanisms.The method proposed in this paper is an attempt to provide a comprehensive strategic framework for identifying business opportunities for mobile business and commerce, as well as plans and action plan for the development and deployment of mobile applications.This methodology is designed to help companies realize the potential benefits of mobile technology more easily.aggressive deployment of mobile computers is partly due to recent advances in mobile computing technologies , high return on investment for effective implementation of mobile technology .Some studies show that the productivity of mobile workers can be increased by 30% when the corresponding mobile technology deployed .