Skip to content

emka.web.id

menulis pengetahuan – merekam peradaban

Menu
  • Home
  • Tutorial
  • Search
Menu

History of Embedded Device Programming

Posted on April 16, 2012

For a long time, cell phone developers comprised a small sect of a slightly larger group of developers known as embedded device developers. Seen as a less “glamorous” sibling to desktop—and later web—development, embedded device development typically got the proverbial short end of the stick as far as hardware and operating system features, because embedded device manufacturers were notoriously stingy on feature support. Embedded device manufacturers typically needed to guard their hardware secrets closely, so they gave embedded device developers few libraries to call when trying to interact with a specific device.

Embedded devices differ from desktops in that an embedded device is typically a
“computer on a chip.” For example, consider your standard television remote control; it is
not really seen as an overwhelming achievement of technological complexity. When any
button is pressed, a chip interprets the signal in a way that has been programmed into the
device. This allows the device to know what to expect from the input device (key pad),
and how to respond to those commands (for example, turn on the television). This is a
simple form of embedded device programming. However, believe it or not, simple
devices such as these are definitely related to the roots of early cell phone devices and
development.

Most embedded devices ran (and in some cases still run) proprietary operating
systems. The reason for choosing to create a proprietary operating system rather than use
any consumer system was really a product of necessity. Simple devices did not need very
robust and optimized operating systems.
As a product of device evolution, many of the more complex embedded devices, such
as early PDAs, household security systems, and GPSs, moved to somewhat standardized
operating system platforms about five years ago. Small-footprint operating systems such
as Linux, or even an embedded version of Microsoft Windows, have become more
prevalent on many embedded devices. Around this time in device evolution, cell phones
branched from other embedded devices onto their own path. This branching is evident
when you examine their architecture.
Nearly since their inception, cell phones have been fringe devices insofar as they run
on proprietary software—software that is owned and controlled by the manufacturer, and is almost always considered to be a “closed” system. The practice of manufacturers using proprietary operating systems began more out of necessity than any other reason. That is, cell phone manufacturers typically used hardware that was completely developed in-house, or at least hardware that was specifically developed for the purposes of running cell phone equipment. As a result, there were no openly available, off-the-shelf software packages or solutions that would reliably interact with their hardware. Since the manufacturers also wanted to guard very closely their hardware trade secrets, some of which could be revealed by allowing access to the software level of the device, the common practice was, and in most cases still is, to use completely proprietary and closed software to run their devices. The downside to this is that anyone who wanted to develop applications for cell phones needed to have intimate knowledge of the proprietary environment within which it was to run. The solution was to purchase expensive development tools directly from the manufacturer. This isolated many of the “homebrew” developers.
Another, more compelling “necessity” that kept cell phone development out of
the hands of the everyday developer was the hardware manufacturers’ solution to the
“memory versus need” dilemma. Until recently, cell phones did little more than execute
and receive phone calls, track your contacts, and possibly send and receive short text
messages; not really the “Swiss army knives” of technology they are today. Even as late
as 2002, cell phones with cameras were not commonly found in the hands of consumers.
By 1997, small applications such as calculators and games (Tetris, for example) crept
their way onto cell phones, but the overwhelming function was still that of a phone dialer
itself. Cell phones had not yet become the multiuse, multifunction personal tools they
are today. No one yet saw the need for Internet browsing, MP3 playing, or any of the
multitudes of functions we are accustomed to using today. It is possible that the cell
phone manufacturers of 1997 did not fully perceive the need consumers would have
for an all-in-one device. However, even if the need was present, a lack of device memory
and storage capacity was an even bigger obstacle to overcome. More people may have
wanted their devices to be all-in-one tools, but manufacturers still had to climb the
memory hurdle.
To put the problem simply, it takes memory to store and run applications on any
device, cell phones included. Cell phones, as a device, until recently did not have the
amount of memory available to them that would facilitate the inclusion of “extra”
programs. Within the last two years, the price of memory has reached very low levels.
Device manufacturers now have the ability to include more memory at lower prices.
Many cell phones now have more standard memory than the average PC had in the
mid-1990s. So, now that we have the need, and the memory, we can all jump in and
develop cool applications for cell phones around the world, right? Not exactly.
Device manufacturers still closely guard the operating systems that run on their
devices. While a few have opened up to the point where they will allow some Java-based
applications to run within a small environment on the phone, many do not allow this.
Even the systems that do allow some Java apps to run do not allow the kind of access
to the “core” system that standard desktop developers are accustomed to having.

Terbaru

  • Inilah Bahaya Astute Beta Server APK, Jangan Sembarang Klik Link Download FF Kipas 2026!
  • Inilah Bahaya Nonton Film di LK21 dan IndoXXI, Awas Data Pribadi dan Saldo Rekening Kalian Bisa Ludes!
  • Inilah Kronologi & Video Lengkap Kasus Sejoli Tambelangan Sampang Viral, Ternyata Gini Awal Mulanya!
  • Inilah Alasan Kenapa Koin Nego Neko Shopee Nggak Bisa Dipakai Bayar Full dan Cara Rahasia Dapetinnya!
  • Inilah Cara Menjawab Pertanyaan Apakah di Sekolahmu Sudah Ada IFP/PID dengan Benar dan Profesional
  • Inilah Fakta Isu Roblox Diblokir di Indonesia 2026, Benarkah Akan Ditutup Total?
  • Inilah Penyebab dan Cara Mengatasi FF Kipas My ID Verify UID Biar Akun Tetap Aman
  • Inilah Deretan HP RAM 8GB Harga di Bawah 2 Juta Terbaik 2026, Spek Dewa Tapi Nggak Bikin Kantong Jebol!
  • Contoh Cara Buat SK Panitia TKA 2026
  • Inilah Cara Download Point Blank ID Versi Terbaru 2026, Gampang Banget Ternyata!
  • Inilah Persiapan Lengkap Gladi Bersih TKA 2026 SD dan SMP: Jadwal, Teknis Proktor, dan Aturan yang Wajib Kalian Tahu
  • Inilah Aturan Lengkapnya, Apakah Zakat dalam Bentuk Barang Bisa Mengurangi Pajak Penghasilan Kalian?
  • Inilah Kenapa KBLI Sangat Penting Buat Bisnis Digital dan Gini Caranya Biar Kalian Nggak Salah Pilih Kode
  • Inilah Fitur Keren ONLYOFFICE Docs 9.3, Cara Baru Edit PDF dan Dokumen Lebih Efisien!
  • Inilah Cara Banjir Komisi Shopee Affiliate Hanya Dalam 7 Hari Saja
  • Cara Download Aplikasi BUSSID Versi 3.7.1 Masih Dicari dan Link Download Aman Mediafire
  • Inilah Cara Lengkap Mengajukan SKMT dan SKBK di EMIS GTK 2026, Biar Tunjangan Cair Tanpa Drama!
  • Inilah Kenapa Bukti Setor Zakat Kalian Harus Ada NPWP-nya, Jangan Sampai Klaim Pajak Ditolak!
  • Inilah Cara Jadi Clipper Video Sukses Tanpa Perlu Tampil di Depan Kamera
  • Inilah Cara Upload NPWP dan Rekening di EMIS GTK Madrasah Terbaru, Jangan Sampai Tunjangan Terhambat!
  • Inilah Fakta di Balik Video Ukhti Sholat Mukena Pink Viral yang Bikin Geger Media Sosial
  • Belum Tahu? Inilah Langkah Pengisian Survei Digitalisasi Pembelajaran 2026 Biar Nggak Salah
  • Ini Kronologi Video Viral Ibu Tiri vs Anak Tiri Ladang Sawit Tiktok
  • Inilah Caranya Update Chromebook Sekolah Agar Siap Digunakan untuk TKA SD dan SMP
  • Inilah Caranya Menghindari Mafia Kontraktor Renovasi Nakal Supaya Budget Nggak Boncos
  • Inilah Trik Rahasia Tembus 4000 Jam Tayang YouTube Tahun 2026 Cuma Dalam 2 Hari
  • Inilah Rahasia Tomoro Coffee Bisa Singkirkan Semua Pesaing dan Ekspansi Massif Banget!
  • Inilah Kenapa AI Sering Jadi Kambing Hitam Saat PHK Massal, Padahal Masalahnya Bukan Itu!
  • Inilah Cara Baru Cepat Monetisasi YouTube Tanpa Trik Musik, Cuma 2 Bulan Langsung Cuan!
  • Inilah Kapan Pengumuman SNBP 2026 Jam Berapa Lengkap dengan Cara Cek Hasil Kelulusannya
  • Kubernetes Traffic Tutorial: How to Create Pod-Level Firewalls (Network Policies)
  • This Is Discord Malware: Soylamos; How to Detect & Prevent it
  • How Stripe Ships 1,300 AI-Written Pull Requests Every Week with ‘Minions’
  • How to Disable Drag Tray in Windows 11: Simple Steps for Beginners
  • About Critical Microsoft 365 Copilot Security Bug: Risks and Data Protection Steps
  • How to the OWASP Top 10 Security Risks, Attacking LLM
  • How to Create Visual Storytelling with Higgsfield Soul 2.0
  • How to Use the Tiiny AI Pocket Lab to Run Local Large Language Models
  • AI SEO Tutorial With OpenClaw, Make Your Website Traffic from 0 to 780 Clicks Daily
  • How to Use SoulX FlashHead To Create The Best Talking Avatar for Free on Google Colab!
  • Apa itu Spear-Phishing via npm? Ini Pengertian dan Cara Kerjanya yang Makin Licin
  • Apa Itu Predator Spyware? Ini Pengertian dan Kontroversi Penghapusan Sanksinya
  • Mengenal Apa itu TONESHELL: Backdoor Berbahaya dari Kelompok Mustang Panda
  • Siapa itu Kelompok Hacker Silver Fox?
  • Apa itu CVE-2025-52691 SmarterMail? Celah Keamanan Paling Berbahaya Tahun 2025
Beli Morning Star Kursi Gaming/Kantor disini: https://s.shopee.co.id/805iTUOPRV

©2026 emka.web.id | Design: Newspaperly WordPress Theme