- Provides patterns based on the Symbian OS architectural elements
- Describes how patterns suited for non-mobile software should be adapted or even avoided for Symbian OS
- Provides Symbian OS based examples and code illustrations
Each chapter covers patterns that address specific key concern experienced by developers: memory performance, time performance, power performance, security and responsiveness.
This book is not specific to any particular version of Symbian OS. While individual examples may come from one version or another the patterns outlined in this book are intended to be more generic and based on the common functionality available in all releases. Where possible the examples given for the design patterns will directly reflect the software in Symbian OS.
Common Design Patterns for Symbian OS is intended to be used in conjunction with one or more SDKs for specific Symbian OS phones and with the resources available at the Symbian DevNet web site. This facility will provide the background material needed to help understand the patterns and the examples accompanying them.
- Professional Xen Virtualization
- Client/Server Survival Guide, 3rd Edition
- Windows 7 Secrets
- Mac OS X Snow Leopard Bible
- Microsoft Windows XP Professional Step By Step Courseware Core Skills
- Alan Simpson's Windows XP Bible, 2nd Edition
- DOS for Dummies Quick Reference, 3rd Edition
- Switching to a Mac Portable Genius
Sign up now »
Advances in mobility and client computing technology combined with the ubiquity of the Internet and social media are creating a culture and desire for constant connectivity and anywhere access to ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Users, cats more likely hack culprits than cyber-espionage: Trustwave
- AusCERT 2013: Home-electronics gear’s UPnP as insecure in Australia as rest of world: Metasploit
- AusCERT 2013: Big data skills help beat the bad guys, says HP
- Growing mobile malware threat swirls (mostly) around Android
- In pictures: AusCERT 2013 Day One