How Nokia’s fate can be reversed if it concerntrate on security devices

How Nokia’s fate can be reversed if it concerntrate on security devices

1) Windows Phone OS is a proprietary OS which is an advantage when security devices are concerned, where the market for security devices is twice as big as Apple’s market, where the direction of RIM has proved there is a great demand if you have the right products.
2) The cellular network need to be encrypted, where present smartphone devices can easily be hacked to be used for monitoring by cellular and GPS, and if the program is smart enough it can also locate the nearest device for attack. Methods of attack can be like being locked by a drone aircraft where the drone can easily fire a missile. Others would be to listen to the microphone of your phone or easily transmit sublimal messages to program you.
3) To close the loophole, the GPS can only be utilised for finding directions, where scrambling technology can used to prevent tracking. The machine code of security devices should be kept a secret and the team of developers will only have access to security codes that enable to use software tools for developing applications. As such, these devices are hack proofed and there will be a great demand from VVIP and security personnel worldwide.

Microsoft, are you game enough for the challenge?
– Contributed by Oogle.


Author: Gilbert Tan TS

IT expert with more than 20 years experience in Multiple OS, Security, Data & Internet , Interests include AI and Big Data, Internet and multimedia. An experienced Real Estate agent, Insurance agent, and a Futures trader. I am capable of finding any answers in the world you want as long as there are reports available online for me to do my own research to bring you closest to all the unsolved mysteries in this world, because I can find all the paths to the Truth, and what the Future holds. All I need is to observe, test and probe to research on anything I want, what you need to do will take months to achieve, all I need is a few hours.​

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s