Skip to content

emka.web.id

menulis pengetahuan – merekam peradaban

Menu
  • Home
  • Tutorial
  • Search
Menu

History of Embedded Device Programming

Posted on April 16, 2012

For a long time, cell phone developers comprised a small sect of a slightly larger group of developers known as embedded device developers. Seen as a less “glamorous” sibling to desktop—and later web—development, embedded device development typically got the proverbial short end of the stick as far as hardware and operating system features, because embedded device manufacturers were notoriously stingy on feature support. Embedded device manufacturers typically needed to guard their hardware secrets closely, so they gave embedded device developers few libraries to call when trying to interact with a specific device.

Embedded devices differ from desktops in that an embedded device is typically a
“computer on a chip.” For example, consider your standard television remote control; it is
not really seen as an overwhelming achievement of technological complexity. When any
button is pressed, a chip interprets the signal in a way that has been programmed into the
device. This allows the device to know what to expect from the input device (key pad),
and how to respond to those commands (for example, turn on the television). This is a
simple form of embedded device programming. However, believe it or not, simple
devices such as these are definitely related to the roots of early cell phone devices and
development.

Most embedded devices ran (and in some cases still run) proprietary operating
systems. The reason for choosing to create a proprietary operating system rather than use
any consumer system was really a product of necessity. Simple devices did not need very
robust and optimized operating systems.
As a product of device evolution, many of the more complex embedded devices, such
as early PDAs, household security systems, and GPSs, moved to somewhat standardized
operating system platforms about five years ago. Small-footprint operating systems such
as Linux, or even an embedded version of Microsoft Windows, have become more
prevalent on many embedded devices. Around this time in device evolution, cell phones
branched from other embedded devices onto their own path. This branching is evident
when you examine their architecture.
Nearly since their inception, cell phones have been fringe devices insofar as they run
on proprietary software—software that is owned and controlled by the manufacturer, and is almost always considered to be a “closed” system. The practice of manufacturers using proprietary operating systems began more out of necessity than any other reason. That is, cell phone manufacturers typically used hardware that was completely developed in-house, or at least hardware that was specifically developed for the purposes of running cell phone equipment. As a result, there were no openly available, off-the-shelf software packages or solutions that would reliably interact with their hardware. Since the manufacturers also wanted to guard very closely their hardware trade secrets, some of which could be revealed by allowing access to the software level of the device, the common practice was, and in most cases still is, to use completely proprietary and closed software to run their devices. The downside to this is that anyone who wanted to develop applications for cell phones needed to have intimate knowledge of the proprietary environment within which it was to run. The solution was to purchase expensive development tools directly from the manufacturer. This isolated many of the “homebrew” developers.
Another, more compelling “necessity” that kept cell phone development out of
the hands of the everyday developer was the hardware manufacturers’ solution to the
“memory versus need” dilemma. Until recently, cell phones did little more than execute
and receive phone calls, track your contacts, and possibly send and receive short text
messages; not really the “Swiss army knives” of technology they are today. Even as late
as 2002, cell phones with cameras were not commonly found in the hands of consumers.
By 1997, small applications such as calculators and games (Tetris, for example) crept
their way onto cell phones, but the overwhelming function was still that of a phone dialer
itself. Cell phones had not yet become the multiuse, multifunction personal tools they
are today. No one yet saw the need for Internet browsing, MP3 playing, or any of the
multitudes of functions we are accustomed to using today. It is possible that the cell
phone manufacturers of 1997 did not fully perceive the need consumers would have
for an all-in-one device. However, even if the need was present, a lack of device memory
and storage capacity was an even bigger obstacle to overcome. More people may have
wanted their devices to be all-in-one tools, but manufacturers still had to climb the
memory hurdle.
To put the problem simply, it takes memory to store and run applications on any
device, cell phones included. Cell phones, as a device, until recently did not have the
amount of memory available to them that would facilitate the inclusion of “extra”
programs. Within the last two years, the price of memory has reached very low levels.
Device manufacturers now have the ability to include more memory at lower prices.
Many cell phones now have more standard memory than the average PC had in the
mid-1990s. So, now that we have the need, and the memory, we can all jump in and
develop cool applications for cell phones around the world, right? Not exactly.
Device manufacturers still closely guard the operating systems that run on their
devices. While a few have opened up to the point where they will allow some Java-based
applications to run within a small environment on the phone, many do not allow this.
Even the systems that do allow some Java apps to run do not allow the kind of access
to the “core” system that standard desktop developers are accustomed to having.

Terbaru

  • Inilah Cara Lolos Seleksi Siswa Unggul ITB Lewat Jalur Tes Tulis Biar Jadi Mahasiswa Ganesha
  • Inilah Penemuan Fosil Hadrosaurus yang Ungkap Bahwa Penyakit Langka Manusia Sudah Ada Sejak Zaman Prasejarah
  • Inilah Penemuan Terbaru yang Mengungkap Bahwa Sunburn Ternyata Disebabkan Oleh Kerusakan RNA
  • Inilah Alasan Kenapa Manusia Lebih Sering Hamil Satu Bayi daripada Kembar Menurut Penelitian Terbaru
  • Inilah Syarat dan Cara Pendaftaran IMEI Internasional Mulai Mei 2026
  • Bocoran Spek Samsung Galaxy S27 Ultra Nih, Kamera 3X Hilang + Teknologi AI
  • Inilah Perbedaan Motorola G47 dan Motorola G45, Cuma Kamera 108 Megapiksel Doang?
  • Update Baru Google Gemini: Bisa Bikin File Word, PDF, Excel secara Otomatis
  • Rekomendasi Motor Listrik 2026 Anti Mogok!
  • Ini Loh Honda Vision 110, Motor Baru Seharga Beat & Rangka eSAF Khusus Pasar Eropa
  • Inilah Mobil-Mobil Paling Cocok Transisi ke Bioetanol E20 dan Biodiesel B50!
  • Inilah Ternyata Batas Minimal Daya Cas Mobil Listrik di Rumah
  • DJP Geser Batas Akhir Lapor Pajak Sampai 31 Mei 2026
  • PKB Tanggapi Dingin Usul Yusril Ihza Mahendra Soal Parliamentary Treshold 13 Kursi
  • LPTNU Kritik Keras Rencana Penutupan Prodi: Kenapa Tidak Komprehensi & Berbasis Problematika Nyata?
  • Gus Rozin PWNU Jawa Tengah Setuju Cak Imin, Konflik PBNU bikin Warga Kesal dan Tidak Produktif
  • Pengamat: Prabowo Harus Benahi KAI, Aktifkan juga Jalur Kereta Lama & Baru
  • Sekjend PBNU: Jadwal Muktamar Usulan PWNU Sejalan Hasil Rapat Pleno & Rais Aam
  • PKB Desak Hukuman Maksimal Kasus Little Aresha & Evaluasi Total Sistem Penitipan Anak secara Nasional
  • PKB Usul Modernisasi Sistem Kereta dan CCTV di Kabin Masinis, Setuju?
  • Menteri PPA Arifah Fauzi Minta Maaf Soal Polemik Pindah Gerbong Wanita di KRL
  • Cara Kirim Robux Mudah di Roblox Beli Skin Shirt Preview
  • Kronologi kasus dugaan penyebaran konten asusila oleh anak anggota DPRD Kutai Barat?
  • Inilah Alasan Kenapa Gelembung Air di Luar Angkasa Bisa Jadi Eksperimen Fisika yang Keren Banget
  • Inilah Contoh Naskah Doa Upacara Hardiknas 2026 yang Syahdu dan Penuh Makna
  • Inilah 10 Peringkat SMP di Daerah Istimewa Yogyakarta Berdasarkan Hasil TKA TKAD 2025/2026 Terbaru
  • Inilah Cara Download FF Beta Versi Terbaru 2026, Lengkap Dengan Cara Daftar Advanced Server Resmi
  • Inilah Cara Menghilangkan YouTube Shorts di Beranda Biar Nggak Menghambat Scrolling Kalian!
  • Inilah Kabar Gembira Program Magang Nasional 2026, Kuota Naik Drastis Jadi 150 Ribu Peserta!
  • Inilah House of Amartha: Mengenal Bisnis Thariq Halilintar di Balik Pernikahan Mewah El Rumi dan Syifa Hadju
  • How to build a high-performance private photo cloud with Immich and TrueNAS SCALE
  • How to Build an Endgame Local AI Agent Setup Using an 8-Node NVIDIA Cluster with 1TB Memory
  • How to Master Windows Event Logs to Level Up Your Cybersecurity Investigations and SOC Career
  • How to Build Ultra-Resilient Databases with Amazon Aurora Global Database and RDS Proxy for Maximum Uptime and Performance
  • How to Build Real-Time Personalization Systems Using AWS Agentic AI to Make Every User Feel Special
  • How to Clone Your Voice for Free and Create Unlimited AI Audio
  • How to Deploy Your Google AI Studio Web App Using Hostinger
  • How to Create Viral Motivational YouTube Videos Using Only Free AI
  • How to Create High-End Cinematic Ads and Viral Content with Seedance 2.0
  • How OpenAI is Taking the Lead Again with GPT 5.5 and Codex
  • Apa itu Spear-Phishing via npm? Ini Pengertian dan Cara Kerjanya yang Makin Licin
  • Apa Itu Predator Spyware? Ini Pengertian dan Kontroversi Penghapusan Sanksinya
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025

©2026 emka.web.id | Design: Newspaperly WordPress Theme