How Smartphones Work

The Future of Smartphones

With data transmission rates reaching blistering speeds and the incorporation of WiFi technology, the sky is the limit on what smartphones can do. Possibly the most exciting thing about smartphone technology is that the field is still wide open. It's an idea that probably hasn't found its perfect, real-world implementation yet. Every crop of phones brings new designs and new interface ideas. No one developer or manufacturer has come up with the perfect shape, size or input method yet. The next "killer app" smartphone could look like a flip phone, a tablet PC, a candy bar or something no one has conceived of yet.

Perhaps the most challenging consideration for the future is security. Smartphones may be vulnerable to security breaches such as an Evil Twin attack. In one of these attacks, a hacker sets a server’s service identifier to that of a legitimate hotspot or network while simultaneously blocking traffic to the real server. When a user connects with the hacker’s server, information can be intercepted and security is compromised.

On the other side, some critics argue that anti-virus software manufacturers greatly exaggerate the risks, harms and scope of phone viruses in order to help sell their software. Read more in the article How Cell Phone Viruses Work.

The incredible diversity in smartphone hardware, software and network protocols inhibit practical, broad security measures. Most security considerations either focus on particular operating systems or have more to do with user behavior than network security.

For lots more information on smartphones and related topics, check out the links on the following page.

Related HowStuffWorks Articles

More Great Links


  • ARCchart Whitepaper. Mobile Operating Systems: The New Generation
  • Mobile Telephony Fast Reference Guide,289893,sid9_gci1192492,00 .html
  • “Linux, Windows forecast to pass Symbian by 2010”
  • Palm Infocenter
  • “Big Changes Ahead for Smart Phone Market.” Wayne Rash.,1895,2065929,00.asp
  • “Next Wave in Security: Protecting Smart Phones, PDAs.” Brian Prince.,1895,2093092,00.asp
  • “The March of the Smartphones.” Ecommerce Times. The-March-of-the-Smartphones.xhtml
  • “Mobile phones to get more touchy, report finds.”
  • “Chip Makers Support Mobile TV for Smartphones” InfoWorld Daily. _1.html?source=searchresult
  • “Mobile Control of Your Front Door”. Mobile Magazine.
  • "Active objects." APIGuide/Base/InterProcessCommunication/AsynchronousServices Guide/AsynchronousServicesGuide3/
  • "Expo Highlights Healthy Symbian Economy." PDAStreet. 2004-10-5-Expo-Highlights-Healthy.html
  • "If the mountain will not come to Mahomet, Mahomet must go to the mountain: SyncML plug-in for Microsoft Exchange released."
  • Lavender, Schmidt. "Active Object - An Object Behavioral Pattern for Concurrent Programming."
  • OMA Technical Section - SyncML Whitepaper. compliant_products.html
  • OMA Technical Section - Affiliates - SyncML Compliant Products. compliant_products.html
  • "Nokia Takes Smartphone To The EDGE." Wireless Week. newsat2direct&starting=1&pubdate=01/15/04
  • "EDGE Platform." GSM World.
  • Series 60 Application Development.
  • Series 60 Platform.
  • Smartphone Thoughts.,8313
  • Symbian: Technology.
  • Whitepapers.