The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May/June (2006 vol.10)
pp: 8-11
Published by the IEEE Computer Society
ABSTRACT
A round-up of Internet-related stories in IEEE Computer Society and trade press.
E-Commerce
PC Magazine
www.pcmag.com
7 March 2006
"Net to the Rescue," by Sebastian Rupley
Until recently, the scope of the Internet's role in personal decisions has been unclear. Yet, in a recent survey of 2,200 adults by the Pew Internet & American Life Project, 45 percent said the Internet "played a crucial role" in how they made a major life decision in the past two years — up from 33 percent three years ago. Among the types of information those surveyed sought out were advice on finances, cars, career training, and medical information.
Internet Media
PC Magazine
www.pcmag.com
11 April 2006
"Net Film Distribution Coup," by Sebastian Rupley
New technology from start-up Itiva looks like it could play a pivotal role in efforts to bring Hollywood to the Web. Itiva's Quantum Streaming technology breaks up high-definition (HD) video into http-based Web pages that can be cached at an ISP in the same way as regular Web pages. In a demonstration, Itiva's president downloaded a two-minute HD movie trailer at 5.5 Mbits per second (Mbps) in just seconds. If that speed is typical, users could potentially download a 90-minute movie in less than 15 minutes. One major studio has already signed Itiva to distribute its content.
Mobile and Wireless Computing
PC Magazine
www.pcmag.com
7 March 2006
"HyperMegaSuperWireless?" by Sebastian Rupley
Like Wi-Fi, ultrawideband (UWB) uses radio technology, but with claims of more than 480-Mbps delivery speeds, it could facilitate short-range options such as wireless transfer of images between digital cameras and PCs. For now, however, the WiMedia Alliance and the UWB Forum are pursuing competing standards. Despite the lack of official certification standards, several firms touted their UWB offerings at the recent Consumer Electronics Show and at MacWorld — an increasingly common practice among wireless-product vendors.
Technology Review
www.technologyreview.com
March/April 2006
"Underground Wi-Fi," by Patric Hadenius
Wi-Fi has made the Internet available 1,000 feet underground. Coal, iron, and copper mines across the world are using broadband to retrieve information that helps improve productivity and worker safety. By early 2007, for example, an iron-ore mine located 150 kilometers north of the Arctic Circle in Sweden will have a network of Wi-Fi-linked drills. And copper and coal mines in Germany and Chile are in the process of installing hundreds of Wi-Fi hotspots.
In addition to creating a reliable link to the world above, the networks also mean fewer individuals need to be underground because drill and truck location data and truck-load weights can be wirelessly transferred above ground.
"Cognitive Radio," by Neil Savage
Every year, Technology Review details 10 emerging technologies worth watching. One of this year's is cognitive radio. Heather Zheng, an assistant professor of computer science at the University of California, Santa Barbara, believes cognitive radios could help address the growing problem of shrinking Wi-Fi bandwidth because the devices can scan for frequencies that aren't being used at a given moment and select one or more for transmitting or receiving data. She is working on a way to get cognitive radios to work together, giving priority to the FCC-designated frequency owner, but sharing the rest of the unused spectrum with other cognitive radios.
"Pervasive Computing," by Neil Savage
Savage outlines efforts at a radio test-bed lab at Rutgers University to develop a protocol that standardizes the way remote devices communicate — a key to pervasive computing's success.
The lab, directed by Dipankar Raychaudhuri, features 800 computers with three radios apiece. Two radios handle Wi-Fi standards, and the third uses either the ZigBee or Bluetooth short-range protocols. When programmers come up with potential protocols, they configure the radios to test how long it takes each to contact the others and send data. The lab's size lets researchers test for real-world challenges and complexities.
Security
IT Architect
www.itarchitect.com
March 2006
"Email Payola for AOL,Yahoo," by Andrew Conry-Murray
America Online (AOL) has begun a certified email system in which businesses can pay for direct access to users' inboxes — as long as those receiving the emails agree. AOL is using Goodmail Systems' technology, which verifies a sender's identity and adds a "trust symbol" to certified messages. The messages bypass spam filters and retain images and Web links that are often stripped out of incoming emails. Conry-Murray suggests that Yahoo is testing the Goodmail system as well. AOL says the system will help cut down on phishing and spam by charging companies for legitimate, user-approved access to inboxes. It says the quarter cent to one cent it charges per email will go toward offsetting AOL's spam-filtering expenses.
"Maps, the Killer Apps," by Andy Dornan
A recent study by the Pew Internet & American Life Project shows that looking up directions and maps has become the number one activity on the Internet. So it's no surprise that Google, Microsoft, Yahoo, and mobile operators have announced plans to unveil new mapping technologies in the near future.
Yet, safety could become an issue when queries are transferred through carriers or other services where they could be stored indefinitely and serve as treasure troves for criminals. To help address this issue, Microsoft has unveiled Location Finder, a free Windows application that triangulates right on a client's laptop. Location Finder listens without connecting, so it works offline or with commercial hotspots, even if a user doesn't have an account, thanks to a Wi-Fi hotspot database linked to geographic coordinates.
To run Location Finder, however, users must set their default browsers to Internet Explorer, which opens up other security concerns such as spyware and Trojans. Also, to get an actual map, Location Finder must connect to the Internet and the user must allow the data to be sent to Microsoft.
PC Magazine
www.pcmag.com
21 March 2006
"Who, Me?" by Sebastian Rupley
In the wake of the controversy in which MSN, Yahoo, and Google agreed to adhere to China's censorship policies, one company is working to free Chinese citizens from its government's directives. Anonymizer says it will soon release free tools that will let Web users anonymously post information and access the Internet without any filters. The company already helps similar efforts in Iran. Anonymizer's president says, "Information bounces off a proxy we operate. It encrypts all the traffic and scrambles the URLs, so there's no trace left on the user's PC."
11 April 2006
"The Wireless Snare," by Robert Lemos
How many times have you worked on your laptop while waiting for a flight? Recent real-world experiments by researcher Mark Loveless show you could be opening yourself up to serious security threats if you do — thanks to your laptop's default wireless settings.
Loveless came to this conclusion after he began exploring why so many laptops at airports were broadcasting common network names or service set identifiers (SSIDs). He found a "significant portion" of laptops' default settings were configured to look for and connect to common SSIDs, such as "linksys" or "dlink." If they find no network, laptops often create their own wireless network using a common SSID and connecting to each other, creating serious security gaps that could let attackers join and control these ad hoc networks and gain access to usernames, passwords, and other confidential information. Lemos examines a threefold solution: turn off the laptop's wireless when you're not trying to connect to a known network; make sure the laptop doesn't automatically turn on its wireless when it can't find an Ethernet connection; and disable ad hoc networking.
Technology Review
www.technologyreview.com
March/April 2006
"Jonathan Zittrain: Preempting an Internet Clampdown," by David Talbot
Jonathan Zittrain, professor of Internet governance at the University of Oxford and cofounder of Harvard Law School's Berkman Center for Internet and Society, says it's easy to envision the day when a single destructive virus does so much damage that governments are forced to enact strict regulations that not only send consumers running to safer, closed networks but also eliminate amateurs' invaluable contributions to the Internet. To help combat the likelihood that this will take place, Zittrain and fellow academicians have launched StopBadWare.org, a project funded by Google, Sun Microsystems, and Lenovo.
In this Q&A, Zittrain explains what brought us to this point, including an example of a worst-case scenario that could lead to a clampdown on the Internet's unfettered nature. He also describes StopBadWare's goals, which include fostering a better understanding of malware and proposing solutions that don't generate other centralized control issues.
"Universal Authentication," by David Talbot
Although many technologies compete in the area of Internet authentication, Shibboleth, an open-standard system used by the research community and universities could soon provide the solution to single-sign-on access to multiple Web sites. It not only lets Web users hop from site to site after signing in only once but also guards users' privacy by passing on only the identifying information that additional sites need.
Shibboleth has been expanding its reach exponentially, growing from use at a few US colleges in 2003 to more than 500 sites around the world in 2005. The system is now moving into commercial circles. Reed Elsevier, for example, has started to offer its university-based subscribers access to its online library through Shibboleth.
Alison Skratt is a freelance writer based in Oakville, Conn.
37 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool