areppim Technotes

This website collects articles on a variety of topics, mainly around the Internet, with a focus on the mobile web.

The postings are organized according to the categories below, and are, within each category, linked together in a reasonably logical sequence. It is also possible to navigate articles chronologically via the links at the bottom of each page.

For comments, corrections or any other feedback, please contact us.

collapse Terminals

collapse Market Analysis

Mobile phones, tablets and personal computers vary in capabilities and exhibit marked differences in life-cycles – both between and within device categories. Knowledge of these characteristics is crucial when designing Internet services.

collapse Networks

collapse Market Analysis

Each novel communication technology is touted as ushering a new era in efficient distributed services. Drawn-out deployments, stark differences between regions, countries, and operators, as well as technical and commercial constraints must be factored in when designing Internet applications.

collapse Servers

collapse Storage Management

Servers handle and deliver vast amounts of information that require efficient techniques at the levels of persistent storage, caches, and main memory so as to ensure adequate response times for the end-users.

collapse Websites

collapse Content Adaptation

To make Internet services accessible via computers, mobile phones and televisions, on must take into account fundamental differences in the terminals and delivery channels involved; these ultimately imply wide-ranging content adaptations.

collapse Symbol Encoding

Characters and symbols are the atomic building elements of web pages. Developing an appealing website requires knowledge about how they are defined, represented and encoded, what programming techniques exist to include them in web pages, and what are recommended practices.

collapse Software

collapse Security

Security appears under numerous guises in our ever more densely connected societies, but although on a technical level security can be analysed under various well-defined constituent aspects, getting it right in practice is a challenge.