Skip to content

emka.web.id

menulis pengetahuan – merekam peradaban

Menu
  • Home
  • Tutorial
  • Search
Menu

History of Embedded Device Programming

Posted on April 16, 2012

For a long time, cell phone developers comprised a small sect of a slightly larger group of developers known as embedded device developers. Seen as a less “glamorous” sibling to desktop—and later web—development, embedded device development typically got the proverbial short end of the stick as far as hardware and operating system features, because embedded device manufacturers were notoriously stingy on feature support. Embedded device manufacturers typically needed to guard their hardware secrets closely, so they gave embedded device developers few libraries to call when trying to interact with a specific device.

Embedded devices differ from desktops in that an embedded device is typically a
“computer on a chip.” For example, consider your standard television remote control; it is
not really seen as an overwhelming achievement of technological complexity. When any
button is pressed, a chip interprets the signal in a way that has been programmed into the
device. This allows the device to know what to expect from the input device (key pad),
and how to respond to those commands (for example, turn on the television). This is a
simple form of embedded device programming. However, believe it or not, simple
devices such as these are definitely related to the roots of early cell phone devices and
development.

Most embedded devices ran (and in some cases still run) proprietary operating
systems. The reason for choosing to create a proprietary operating system rather than use
any consumer system was really a product of necessity. Simple devices did not need very
robust and optimized operating systems.
As a product of device evolution, many of the more complex embedded devices, such
as early PDAs, household security systems, and GPSs, moved to somewhat standardized
operating system platforms about five years ago. Small-footprint operating systems such
as Linux, or even an embedded version of Microsoft Windows, have become more
prevalent on many embedded devices. Around this time in device evolution, cell phones
branched from other embedded devices onto their own path. This branching is evident
when you examine their architecture.
Nearly since their inception, cell phones have been fringe devices insofar as they run
on proprietary software—software that is owned and controlled by the manufacturer, and is almost always considered to be a “closed” system. The practice of manufacturers using proprietary operating systems began more out of necessity than any other reason. That is, cell phone manufacturers typically used hardware that was completely developed in-house, or at least hardware that was specifically developed for the purposes of running cell phone equipment. As a result, there were no openly available, off-the-shelf software packages or solutions that would reliably interact with their hardware. Since the manufacturers also wanted to guard very closely their hardware trade secrets, some of which could be revealed by allowing access to the software level of the device, the common practice was, and in most cases still is, to use completely proprietary and closed software to run their devices. The downside to this is that anyone who wanted to develop applications for cell phones needed to have intimate knowledge of the proprietary environment within which it was to run. The solution was to purchase expensive development tools directly from the manufacturer. This isolated many of the “homebrew” developers.
Another, more compelling “necessity” that kept cell phone development out of
the hands of the everyday developer was the hardware manufacturers’ solution to the
“memory versus need” dilemma. Until recently, cell phones did little more than execute
and receive phone calls, track your contacts, and possibly send and receive short text
messages; not really the “Swiss army knives” of technology they are today. Even as late
as 2002, cell phones with cameras were not commonly found in the hands of consumers.
By 1997, small applications such as calculators and games (Tetris, for example) crept
their way onto cell phones, but the overwhelming function was still that of a phone dialer
itself. Cell phones had not yet become the multiuse, multifunction personal tools they
are today. No one yet saw the need for Internet browsing, MP3 playing, or any of the
multitudes of functions we are accustomed to using today. It is possible that the cell
phone manufacturers of 1997 did not fully perceive the need consumers would have
for an all-in-one device. However, even if the need was present, a lack of device memory
and storage capacity was an even bigger obstacle to overcome. More people may have
wanted their devices to be all-in-one tools, but manufacturers still had to climb the
memory hurdle.
To put the problem simply, it takes memory to store and run applications on any
device, cell phones included. Cell phones, as a device, until recently did not have the
amount of memory available to them that would facilitate the inclusion of “extra”
programs. Within the last two years, the price of memory has reached very low levels.
Device manufacturers now have the ability to include more memory at lower prices.
Many cell phones now have more standard memory than the average PC had in the
mid-1990s. So, now that we have the need, and the memory, we can all jump in and
develop cool applications for cell phones around the world, right? Not exactly.
Device manufacturers still closely guard the operating systems that run on their
devices. While a few have opened up to the point where they will allow some Java-based
applications to run within a small environment on the phone, many do not allow this.
Even the systems that do allow some Java apps to run do not allow the kind of access
to the “core” system that standard desktop developers are accustomed to having.

Terbaru

  • SALAH! MIT Ungkap AI Tidak Ganti Karyawan Karena Efisiensi
  • Inilah Inovasi Terbaru Profesor UI: Pelumas Mobil dari Minyak Nabati!
  • Daftar Sekarang! Beasiswa S2 di Italia dari IYT Scholarship 2026 Sudah Dibuka
  • Sejarah Hantavirus dan Perkembangannya Sampai ke Indonesia
  • Kementerian Pendidikan: Mapel Bahasa Inggris Wajib di SD Mulai 2027!
  • Ketua Fraksi PKB MPR-RI: Kemenag Respon Cepat Pendidikan Santri Ndolo Kusumo Pati yang Terdampak
  • Viral Video Sejoli Di Balai Kota Panggul Trenggalek, Satpol PP Janji Usut
  • Video Viral Wakil Wali Kota Batam Tegur Keras Pasir Ilegal
  • LPDP Buka Peluang Beasiswa S3 Prancis 2026, Simak Syaratnya!
  • Inilah Panduan Lengkap dan Aturan Main Seleksi Penerimaan Murid Baru (SPMB) SMA dan SMK Negeri Jawa Tengah Tahun 2026
  • Inilah Syarat dan Cara Daftar MOFA Taiwan Fellowship 2027
  • RESMI! Inilah Macam Jalur di SPMB Sekolah Tahun Ajaran 2026
  • Ini Loh Rute Terbaru TransJOGJA Per Mei 2026, Jangan Salah Naik!
  • Inilah Jadwal Operasional MRT Jakarta Per Mei 2026, Berubah Dimana?
  • Inilah Syarat dan Mekanisme Seleksi Siswa Unggul ITB Jalur Talenta (OSN, Seniman, Hafidz, Atlet dll) 2026/2027
  • Inilah Daftar Saham Farmasi di BEI Per Mei 2026, Pilih Mana?
  • Kesehatan Mental Itu Penting: Inilah Isi Chat Terakhir Karyawan Minimarket Sukabumi Bundir
  • Inilah Kampus Swasta Terbaik Jurusan Farmasi di Area Malang Raya
  • Cara Login EMIS 4.0 Kemenag Terbaru 2026 Pakai Akun Lembaga dan PTK Guru Madrasah Aktivasi
  • Survei Parpol Terbaru: Gerindra Unggul, PDIP Ketiga, PKB 5%
  • PKB Resmi Jalin Kerjasama dengan Institut Teknologi & Sains NU Kalimantan
  • Inilah Urutan Terbaru Pangkat TNI Angkatan Darat! (Update 2026)
  • Inilah Panduan Lengkap Operator Sekolah Mengelola SPTJM e-Ijazah dan Menghindari Kesalahan Fatal Data Kelulusan
  • Inilah Syarat dan Penilaian Seleksi Siswa Unggul ITB Jalur UTBK
  • Download Video Viral Guru Bahasa Inggris? Awas Berisi Virus!
  • PKB Minta Kasus C4bul Pendiri Ponpes Pati Tidak Ada Ampunan & Tuntutan Maksimal
  • Inilah Kronologi Video Viral Preman vs Sopir Di Sumedang
  • Ini Alasan UKP Pariwisata Disindir Konten Kreator Drone Gunung Rinjani
  • Inilah Kronologi Viral Video Dugaan Asusila Pegawai Disdik Pasuruan di Mobil Dinas
  • Polisi Polda Sumut Resmi Dipecat: Dari Video Viral Sampai Sidang Etik Ini Kronologinya
  • How to build a high-performance private photo cloud with Immich and TrueNAS SCALE
  • How to Build an Endgame Local AI Agent Setup Using an 8-Node NVIDIA Cluster with 1TB Memory
  • How to Master Windows Event Logs to Level Up Your Cybersecurity Investigations and SOC Career
  • How to Build Ultra-Resilient Databases with Amazon Aurora Global Database and RDS Proxy for Maximum Uptime and Performance
  • How to Build Real-Time Personalization Systems Using AWS Agentic AI to Make Every User Feel Special
  • How to Automate Your Entire SEO Strategy Using a Swarm of 100 Free AI Agents Working in Parallel
  • How to create professional presentations easily using NotebookLM’s AI power for school projects and beyond
  • How to Master SEO Automation with Google Gemini 3.1 Flash-Lite in Google AI Studio
  • How to create viral AI video ads and complete brand assets using the Claude and Higgsfield MCP integration
  • How to Transform Your Mac Into a Supercharged AI Assistant with Perplexity Personal Computer
  • Apa itu Spear-Phishing via npm? Ini Pengertian dan Cara Kerjanya yang Makin Licin
  • Apa Itu Predator Spyware? Ini Pengertian dan Kontroversi Penghapusan Sanksinya
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025

©2026 emka.web.id | Design: Newspaperly WordPress Theme