ACM Queue - Mobile Computing
http://queue.acm.org/listing.cfm?item_topic=Mobile Computing&qc_type=topics_list&filter=Mobile Computing&page_title=Mobile Computing&order=desc
Mobile Devices in the Enterprise: CTO Roundtable Overview: An overview of the key points discussed in the ACM Roundtable on Mobile Devices in the Enterprise
http://queue.acm.org/detail.cfm?id=2019556
The CTO Roundtable on Mobile Devices in the Enterprise focuses on the implications of the widespread use of mobile devices, such as smartphones, in the enterprise computing environment. These new personal devices have presented great challenges and opportunities for the protection of valuable information assets and creation of business value. What follows are the key points from that broader conversation.Mobile Computing2011年8月12日 09:07:23 GMTMache Creeger2019556ACM CTO Roundtable on Mobile Devices in the Enterprise: Finding solutions as growth and fragmentation complicate mobile device support
http://queue.acm.org/detail.cfm?id=2016038
BlackBerry? iPhone? Android? Other? Thin client or fat client? Browser or Wi-Fi? Developers of mobile applications have many variables to consider in a rapidly changing environment. The mobile device market is growing quickly and fragmenting as it does so. Supporting mobile devices in the enterprise is getting much more complicated because of both this rapid growth worldwide and the diverse set of devices and networks.Mobile Computing2011年8月03日 15:06:38 GMTMache Creeger2016038Mobile Application Development: Web vs. Native: Web apps are cheaper to develop and deploy than native apps, but can they match the native user experience?
http://queue.acm.org/detail.cfm?id=1968203
A few short years ago, most mobile devices were, for want of a better word, "dumb." Sure, there were some early smartphones, but they were either entirely e-mail focused or lacked sophisticated touch screens that could be used without a stylus. Even fewer shipped with a decent mobile browser capable of displaying anything more than simple text, links, and maybe an image. This meant if you had one of these devices, you were either a businessperson addicted to e-mail or an alpha geek hoping that this would be the year of the smartphone. Then Apple changed everything with the release of the iPhone, and our expectations for mobile experiences were completely reset.Mobile Computing2011年4月12日 00:27:51 GMTAndre Charland, Brian LeRoux1968203Like a Podcast in the Sea: Mean ol’ LoTech Blues: Is it just a matter of semantics?
http://queue.acm.org/detail.cfm?id=1147540
<h2>Like a Podcast in the Sea - Mean Ol' LoTech Blues</h2>
<h3>Is it just a matter of semantics?</h3>
<h4>Stan Kelly-Bootle, Author</h4>
<p>Mache Creeger's general pessimism<sup>1</sup> about IT's status quo rests on his perception that HiTech (the character- and tree-saving token for High Technology, somewhat, if not totally, vitiated by this long-winded, unnecessary explanation) is not quite Hi enough. IT relies too much on dreary, evolutionary gradualism rather than on the exciting Kuhnian discontinuities that spell revolution and paradigm shifts.<sup>2</sup></p>
<p> I have no qualms about Creeger's observation that the marketeers, both commercial and academic (if such categories can be distinguished in these pursy PC times), are fond of paint jobs - coloring the most modest upgrades with claims of major, must-have breakthroughs. This is an ancient and, alas, effective promotional ploy in other trades. I recall one cornflake manufacturer who was forced to confess that what was "new" about its latest product was the bold slogan "NEW" on the package.</p>Mobile Computing2006年7月27日 10:33:08 GMTStan Kelly-Bootle1147540Java in a Teacup: Programming Bluetooth-enabled devices using J2ME
http://queue.acm.org/detail.cfm?id=1127868
Few technology sectors evolve as fast as the wireless industry. As the market and devices mature, the need (and potential) for mobile applications grows. More and more mobile devices are delivered with the Java platform installed, enabling a large base of Java programmers to try their hand at embedded programming. Unfortunately, not all Java mobile devices are created equal, presenting many challenges to the new J2ME (Java 2 Platform, Micro Edition) programmer. Using a sample game application, this article illustrates some of the challenges associated with J2ME and Bluetooth programming.Mobile Computing2006年5月02日 08:29:10 GMTStephen Johnson1127868Streams and Standards: Delivering Mobile Video: The era of video served up to mobile phones has arrived and threatens to be the next “killer app” after wireless calling itself.
http://queue.acm.org/detail.cfm?id=1066067
<h1>Streams and Standards: Delivering Mobile Video</h1>
<h2>The era of video served up to mobile phones has arrived and threatens to be
the next “killer app” after wireless calling itself. </h2>
<h3>TOM GERSTEL, TURNER BROADCASTING SYSTEM</h3>
<p>Don’t believe me? Follow along… </p><p>
Mobile phones are everywhere. Everybody has one. Think about the last time
you were on an airplane and the flight was delayed on the ground. Immediately
after the dreaded announcement, you heard everyone reach for their phones
and start dialing.</p>Mobile Computing2005年6月07日 09:49:16 GMT1066067Mobile Media: Making It a Reality: Two prototype apps reveal the challenges in delivering mobile media services.
http://queue.acm.org/detail.cfm?id=1066066
<h1>Mobile Media Making it a Reality</h1> <h2>Two prototype apps reveal the challenges in delivering mobile media services. </h2> <h3>FRED KITSON, HP LABORATORIES</h3> <p>Many future mobile applications are predicated on the existence of rich, interactive media services. The promise and challenge of such services is to provide applications under the most hostile conditions—and at low cost to a user community that has high expectations. Context-aware services require information about who, where, when, and what a user is doing and must be delivered in a timely manner with minimum latency. This article reveals some of the current state-of-the-art “magic” and the research challenges. </p><p> In our research we are combining media systems and mobility systems to support the creation, distribution, and consumption of rich media to mobile or nomadic users. In this article we present two visions of future applications. The first is an example of personal context-aware mobile services that leverage RFID technology. The second is a highly collaborative interactive mobile gaming system. This example in particular highlights some of the key technical challenges we encountered while developing a prototype. We then focus on some of the broader system and software issues that need to be addressed to fully realize commercially viable mobile media systems. In particular, we summarize the complexities of getting media anywhere, creating media anywhere, and securely delivering media anywhere.</p>Mobile Computing2005年6月07日 09:48:58 GMTFred Kitson1066066Enterprise-Grade Wireless: Wireless technology has come a long way, but is it robust enough for today’s enterprise?
http://queue.acm.org/detail.cfm?id=1066065
<h1>Enterprise-Grade Wireless</h1>
<h2>Wireless technology has come a long way, but is it robust enough for today’s
enterprise? </h2>
<h3>BRUCE ZENEL AND ANDREW TOY, MORGAN STANLEY</h3>
<p>We have been working in the wireless space in one form or another in excess
of 10 years and have participated in every phase of its maturation process.
We saw wireless progress from a toy technology before the dot-com boom, to
something truly promising during the boom, only to be left wanting after the
bubble when the technology was found to be not ready for prime time. Fortunately,
it appears that we have finally reached the point where the technology and
the enterprise’s expectations have finally converged. Even with the current
level of maturity in this space, creating and managing a cohesive wireless
strategy within an enterprise is difficult. There are technological hurdles,
cost/efficiency trade-offs to be considered, and obtaining buy-in/acceptance
at all levels of the company. To identify and overcome these issues, we have
developed a model called enterprise-grade wireless. This article is a discussion
of the model itself, the context in which it exists, and a justification of
its criticality to the enterprise.</p>
<h3>WIRELESS IN THE ENTERPRISE DEFINED</h3>
<p>It is important that we first define the
context of this article. We have a specific view of what constitutes wireless
in the enterprise; note that we are not espousing that this is the only view,
just defining the perimeter of the space to improve the applicability of
the various points we make in the discussion that follows.</p>Mobile Computing2005年6月07日 09:48:40 GMTBruce Zenel1066065A Conversation with Teresa Meng: The founder of Atheros analyzes the role of signal processing in the evolving world of wireless communications.
http://queue.acm.org/detail.cfm?id=984469
<h3>A Conversation with Teresa Meng</h3>
<p>In 1999, Teresa Meng took a leave of absence from Stanford University and with
colleagues from Stanford and the University of California, Berkeley, founded
Atheros Communications to develop and deliver the core technology for wireless
communication systems. Using a combination of signal processing and CMOS RF technology,
Atheros came up with a pioneering 5 GHz wireless LAN chipset found in most 802.11a/b/g
products, and continues to extend its market as wireless communications evolve.
</p>
</p>Mobile Computing2004年4月16日 10:01:25 GMTRobert Broderson984469Wireless Networking Considered Flaky: You know what bugs me about wireless networking? Everyone thinks it’s so cool and never talks about the bad side of things.
http://queue.acm.org/detail.cfm?id=957735
<h3>Wireless Networking Considered Flaky<br>
<em>Eric Allman, Sendmail</em></h3>
<p>
You know what bugs me about wireless networking? Everyone thinks it’s
so cool and never talks about the bad side of things. Oh sure, I can get on
the ’net from anywhere at Usenix or the IETF (Internet Engineering Task
Force), but those are _hostile_ _nets_. Hell, all wireless nets are hostile.
By their very nature, you don’t know who’s sharing the ether with
you. But people go on doing their stuff, confident that they are OK because
they’re behind the firewall.</p><p>
Let’s face it: WEP (Wired Equivalent Privacy) is a joke. There’s
no privacy on a wireless net. When you type your password, it’s there
for the world to see—and take, and abuse. A lot of places don’t
even bother with WEP, even behind firewalls. You want free ‘net access?
Drive into a random parking lot in Silicon Valley and pull up next to one of
those big, two-story “ranch house” style buildings that seem to
be ubiquitous there. You’ll have a shockingly good chance of being on
the ‘net. But not just the Internet: their _internal_ network. And if
you sniff that network you might just get a password or two. Or maybe several
dozen. You’ll probably even trip over some root passwords.</p>Mobile Computing2003年12月05日 10:56:22 GMTEric Allman957735