Issue No.05 - September/October (2005 vol.9)
Published by the IEEE Computer Society
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MIC.2005.100
Review of Internet-related stories in IEEE, Computer Society, and trade press.
Dr. Dobb's Journal
"Java & Bluetooth," by Paul Tremblett
Typically, Bluetooth applications run using Java 2 Micro Edition, but the Bluetooth specification should be able to run on any Java 2 platform, provided that platform offers the Generic Connection Framework. Tremblett, a technical lead at Vonage, outlines how to use the Java Specification Request 82 ( www.jcp.org) — which sets a standard API for developing Bluetooth applications with Java — to find nearby Bluetooth devices and determine what services they offer, as well as connect to those devices using well-defined protocols. The result, he says, helps programmers avoid dealing with low-level details while guaranteeing portability.
Dr. Dobb's Journal
"Mobile Java & 3D Apps," by Oscar Vivall and Tom Thompson
Mobile phones not only embody the convergence concept, they also act as laboratories for next-generation 3D applications. Vivall and Thompson describe two APIs — HI Corp.'s Masco Capsule Micro3D, version 3 and Java Specification Request (JSR) 184 (which describes the Java 2 Mobile Edition's mobile 3D graphics API) — that Sony Ericsson has included on its phones to encourage widespread 3D application development. Each API has its own approach to creating 3D models quickly without consuming too many platform resources. Vivall and Thompson also explain how to use a few of the APIs' capabilities and recommend that those with modest 3D graphics requirements opt for the Mascot Capsule V3, which they say performs better than the JSR 184 on phones currently available to consumers.
"The Incredible VoIP Solution," by David Greenfield
To better help network architects evaluate IP private branch exchanges (PBXs), a panel of leading VoIP designers and architects created a wish list of telephony requirements. Together, they mapped out what the "incredible VoIP solution" would look like. The panel — including Walt Magnussen, Texas A&M University's director of telecommunications; Michele Narcavage, University of Pennsylvania's voice services project leader; Brian Rosen, president of Emergicom; and Henning Schulzrinne, chair of the Department of Computer Science at Columbia University (and former IC editorial board member) — came up with a solution that mixes new functionality with that found in existing VoIP systems. The group defined the system's fully distributed, open architecture and outlined the Session Initiation Protocol network core, while taking into account remote users' needs and integrating remotely managed VoIP and adequate security features. The panel also outlined management solutions that let network architects define global policies, in addition to configurations for individual call servers.
9 Aug. 2005
"MTV in Overdrive," by David Murphy
The cable music channel MTV is offering a new online service (MTV Overdrive) that reaffirms the company's reputation for cultural and technological innovation and offers insight into new ways of combining video broadcasting and the Internet. MTV Overdrive offers largely free video content that users can view like traditional TV, with programs appearing in a predetermined order, or video-on-demand, in which users pick their preferred play lists. Using XML feeds, users can customize Macromedia Flash to power the video streaming. The content is encoded and compressed using Microsoft's Windows Media codec, which lets MTV lock it up with digital rights management; the majority of the content sits on Sybase databases, and users are ensured fast access to video content through a distributed network of Akamai edge servers.
"The Business of Blogging," by Andrew P. Madden
As weblogs, or blogs, continue to grow in popularity, some entrepreneurs are trying to create business models to profit from them. The Pew Internet and American Life Project conducted a survey in March 2005 and found that 25 percent of respondents had read blogs. Still, finding a successful way to generate profits from this readership isn't easy — to sell advertising, a firm must be able to sell space on the most popular blogs, and, by definition, bloggers are an independent lot who want to be paid up front for their content rather than swap it for equity. The article mentions several established and soon-to-be-launched companies that are trying to profit from blogs nonetheless, including Gawker Media, FM Publishing, BlackInc Media, and Weblogs. It also takes an in-depth look at Weblogs' business model: the company has 80 bloggers in its stable and hopes to ultimately have more than 300 that target technology, media, entertainment, and consumer goods.
Mobile and Wireless Computing
"Don't Get Locked In," by Andy Dornan
Over the past two years, the Wi-Fi industry has seen both start-ups and established companies produce Wi-Fi switches used with so-called "thin" access points (APs). Today, most thin APs will work only with vendor-made controllers, inhibiting interoperability. Dornan suggests that, over the next two years, the proprietary architecture of these switches and APs will become less important, giving network architects more choices. Nonetheless, he says that even after standards are set, users seeking advanced features such as fast roaming or location tracking will have to get proprietary extensions.
"RFID vs. Wi-Fi ID," by Andy Dornan
Radio frequency identification's popularity, and its close link to Wi-Fi, have led some developers to envision the creation of buildings with RFID readers embedded throughout their infrastructures. Several established companies, led by Cisco Systems, are promoting Wi-Fi itself as a way to produce RFID-like applications. Start-up Reva Systems hasn't introduced any products yet, but it has announced a basic architecture for its Tag Acquisition Network, a system of RFID readers that would work with passive tags with ranges of just a few inches. Such networks could aid in managing inventory, but not monitoring movement in a room or building. To monitor movement, users would need a system with a longer reach — perhaps requiring active, battery-powered RFID tags, which would increase tag costs from pennies to dollars.
Programming and Development
Volume 9, Number 1
"Pushing Portal Potential," by David Hritz
Portal applications are becoming increasingly prevalent on the Internet primarily because they provide functionality for things like commerce, content management, searching, and collaboration. But Hritz says they owe some of their popularity to newness, which leads some buyers to opt for portals even though they provide more services than users actually need. He explains how to decide whether a portal application is necessary for a given user's needs or if a Web application will do. Among other things, Hritz discusses some important features, including customization, integration with legacy applications, and the Java community's efforts to define standards for developing "portlets," the subcomponents that make up portals, using Java specification request 168 ( www.jcp.org).
"Adware Laws Get Teeth?" by Andrew Conry-Murray
The US Congress is continuing to explore antispyware legislation. Pending bills include HR 29, which would make malicious software such as keystroke loggers and browser hijackers illegal, and HF 744, which would require prison sentences and fines for those involved in spyware or phishing scams. Congress still hasn't decided how to address adware, but it's studying the problem and at least one industry official believes this alone has pressured companies such as Claria and 180solutions to better inform users about potentially unwanted software.
"IPS Odyssey," by Andrew Conry-Murray
Conry-Murray suggests that today's malware and worm threats have "out-evolved" the abilities of most signature-based intrusion-prevention systems (IPSs). Although vendors can implement new signatures within hours, this window is still big enough for attackers to enter systems. Consequently, he says, vendors in both the IPS and host-based IPS (HIPS) arenas are increasing efforts to shut that window of vulnerability. Conry-Murray outlines a new generation of "upstart" HIPS products that challenge the traditional premise that software can discern good and bad behavior. The products take various approaches, including preventing buffer overflows by enforcing essential programming conventions; generating protected subsystems to run untrustworthy programs without hurting hosts' critical files; and creating strict enforcement agents that run only approved executables.
Volume 9, Number 1
"Write a Web Service Server," by Kevin Jones
As with other aspects of software development, you can write a Web service server using more than one method. Jones acknowledges that the best approach is probably to first write the Web Services Description Language (WSDL) document and then generate the required code from that. However, he explains that starting with Java code presents a more accessible method given the programming community's breadth of Java expertise; it also helps programmers better understand the "larger picture." He outlines a method that, among other things, touches on how to interact with the remainder of the Web application, and describes faults and complex types.
9 Aug. 2005
"Flipping File Formats," by Sebastian Rupley
Microsoft Office 12, due out in late 2005, will include new royalty-free, XML-based open formats for Excel, Word, and Powerpoint. Unless users opt to revert to the current binary format, files created in those applications will save as .xlsx, .docx, and .pptx by default. The files will be saved as compressed files, including the underlying XML and offering better error recovery and storage.
Compatibility issues will certainly arise when, for instance, a user with Office 2003 receives a newly formatted file. Microsoft says those users will be prompted to download a converter, and the company might let IT departments implement the converters in the same way it currently distributes its service packs to its registered users.