gogogo
Syndetics cover image
Image from Syndetics

Wireless Internet enterprise applications : a Wiley tech brief / Chetan Sharma.

By: Material type: TextTextSeries: Wiley tech brief seriesPublication details: New York : John Wiley, 2001.Description: xx, 236 p. : ill. ; 24 cmISBN:
  • 0471393827 (pbk. : alk. paper)
Subject(s): DDC classification:
  • 004.6 SHA
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Standard Loan Moylish Library Main Collection 004.6 SHA (Browse shelf(Opens below)) 1 Available 39002000229980

Enhanced descriptions from Syndetics:

Get a jump start on deploying next-generation Internet technologies in your business The rapid growth of wireless Internet technologies is changing not only the way we do business but also the way we must think about designing wireless and Web applications and services. This book provides a much-needed overview of the various technologies and business aspects of what is fast becoming a priority for corporate technical and nontechnical staff alike. Industry expert Chetan Sharma provides complete guidance on how to devise and implement a successful wireless Internet business plan, revealing the latest wireless hardware and software trends, solutions, and services.

With his competent advice, you'll discover how the technology works and how to weigh business, technical, and cost issues when integrating wireless capabilities into your applications and services. You'll also be able to sail through the dizzying array of available business products, standards, and applications. Along with illustrations, references, and a useful listing of Web resources, you'll find easily accessible, up-to-the-minute discussions of:

The history of wireless communication and where it's heading Wireless Internet solutions for all major industries Enabling technologies such as WAP, VoiceXML, Position Location, Bluetooth, Personalization, Biometrics, and much more The major players in wireless Internet, including AT&T, NTT DoCoMo, Nokia, Palm, Phone.com, IBM, and many others

Includes bibliographical references (p. 217-222) and index.

Table of contents provided by Syndetics

  • List of Illustrations (p. x)
  • List of Tables (p. xii)
  • Acknowledgments (p. xiv)
  • Introduction (p. xv)
  • About the Author (p. xx)
  • Chapter 1 Wireless Internet Enterprise Applications (p. 1)
  • The Network Computing Model (p. 1)
  • The Client/Server Model (p. 2)
  • The Internet-centric Model (p. 4)
  • A Pervasive Computing Model (p. 6)
  • Wireless Internet Enterprise Applications (p. 10)
  • Chapter 2 A Wirless Primer (p. 15)
  • Basic Wireless Network Architecture (p. 15)
  • Wireless Data Networks (p. 17)
  • Basics of Data Transmission (p. 18)
  • Wireless Network Technologies: Past, Present, and Future (p. 20)
  • Chapter 3 Market Drivers (p. 25)
  • Mobile Subscriber Growth and Market Potential (p. 26)
  • Trends in Component Technologies (p. 27)
  • Processing Power (p. 27)
  • Memory (p. 28)
  • Power Consumption (p. 29)
  • New Standards and Technologies (p. 29)
  • Less Powerful CPUs (p. 31)
  • Limited Memory (p. 31)
  • Restricted Power Consumption (p. 31)
  • Small Displays (p. 31)
  • Difficult Input Devices (p. 32)
  • Limited Bandwidth (p. 32)
  • Latency (p. 32)
  • Standards and Technologies (p. 32)
  • The Internet Revolution (p. 40)
  • Wireless Data Moves toward Ubiquity (p. 42)
  • Need to Streamline Enterprise Information (p. 43)
  • Convergence of Computing and Communications Industries (p. 43)
  • Competition (p. 44)
  • Consumer Awareness and Demand (p. 44)
  • Chapter 4 The Wireless Internet Applications and Services Landscape (p. 47)
  • Consumer Applications (p. 47)
  • Wireless Portals (p. 47)
  • Personal Organizers (p. 55)
  • Transactional Services (p. 55)
  • Ecommerce Services (p. 58)
  • Entertainment (p. 59)
  • Communications (p. 60)
  • Location-Based Services (p. 60)
  • Corporate Applications (p. 61)
  • Voice Portals (p. 61)
  • Enterprise Applications (p. 61)
  • Dispatch and Deliver (p. 62)
  • Field Service (p. 63)
  • Sales Force Automation (p. 63)
  • Remote IT Monitoring (p. 64)
  • Remote Access to Intranets (p. 64)
  • Health Care (p. 64)
  • Chapter 5 Technology Landscape (p. 67)
  • Computing Technologies (p. 68)
  • Transcoding and Markup Languages (MLs) (p. 68)
  • Wireless Application Protocol (p. 80)
  • Speech Recognition (p. 82)
  • Jini (p. 84)
  • Motion Picture Experts Group 7 (MPEG7) (p. 85)
  • IP-Based Technologies (p. 86)
  • Mobile IP (p. 87)
  • Internet Protocol Version 6 (IPv6) (p. 87)
  • IPsec (p. 87)
  • VoIP/FoIP (p. 87)
  • HTTP-NG (p. 88)
  • Compression and Encryption (p. 90)
  • Personalization (p. 91)
  • Biometrics (p. 94)
  • Face Recognition (p. 95)
  • Finger Scanning (p. 95)
  • Hand Geometry (p. 96)
  • Finger Geometry (p. 96)
  • Iris Recognition (p. 96)
  • Palm Biometrics (p. 96)
  • Retina Biometrics (p. 96)
  • Signature Biometrics (p. 96)
  • Voice Biometrics (p. 97)
  • False Rejection and False Acceptance (p. 97)
  • Smart Cards (p. 98)
  • Synchronization (p. 98)
  • Mobile Agents (p. 99)
  • Smart Materials (p. 101)
  • Eink (p. 101)
  • Micropayments (p. 102)
  • Wireless Technologies (p. 103)
  • Short Message Service (SMS) (p. 103)
  • Wireless Local and Personal Area Networks (LAN and PAN) (p. 104)
  • Automatic Identification and Data Capture (AIDC) Technologies (p. 106)
  • 2.5G and 3G Wireless Technologies (p. 107)
  • Position Location Technologies (p. 108)
  • Network-centric Approaches (p. 109)
  • Handset-centric Approach: The Global Positioning System (p. 113)
  • Satellite Technologies (p. 115)
  • Smart Antennas (p. 116)
  • Technology Ecosystem (p. 116)
  • Chapter 6 Players (p. 119)
  • The Value Chain (p. 119)
  • Content Providers (p. 121)
  • Aggregators (p. 121)
  • Middleware Software Providers (p. 122)
  • System Developers and Service Providers (p. 123)
  • Voice Recognition (p. 124)
  • Synchronization (p. 124)
  • Infrastructure Providers (p. 125)
  • Network Operators and Wireless Service Providers (p. 126)
  • Device Manufacturers (p. 130)
  • Consumers (p. 134)
  • Chapter 7 Evaluating Wireless Internet Solutions (p. 135)
  • Extending the Email Platform (p. 136)
  • Microsoft Exchange (p. 136)
  • Lotus Notes (p. 139)
  • Extending Existing Web-Based Applications to Wireless Devices (p. 140)
  • HTML Sites (p. 140)
  • AvantGo (p. 141)
  • Palm (p. 142)
  • Windows CE (p. 143)
  • Building New Ebusiness Solutions (p. 144)
  • The Presentation Layer: The User Interface (p. 145)
  • The Business Logic Layer (p. 146)
  • The Services Layer (p. 146)
  • Session Management for Wireless Platforms (p. 147)
  • HDML or WML? (p. 147)
  • Developer Tools (p. 149)
  • WAP (p. 149)
  • Palm (p. 150)
  • WinCE (p. 150)
  • EPOC (p. 151)
  • ATVEF (p. 151)
  • VoiceXML (p. 151)
  • XML (p. 152)
  • Definition and Implementation Checklist (p. 152)
  • Requirements (p. 152)
  • Implementation (p. 153)
  • Chapter 8 Wireless Internet Strategy: Critical Success Factors and Guiding Principles (p. 155)
  • Clear Strategy and Goal (p. 156)
  • Competitive Analysis (p. 157)
  • Affinity of Service and Devices Analysis (p. 157)
  • Aggregation of Content (p. 158)
  • Usability (p. 159)
  • Non-PC Devices (p. 160)
  • Know Your Users (p. 160)
  • Interfaces for Handheld Devices (p. 160)
  • Simplify (p. 162)
  • Keep Text Concise (p. 162)
  • Additional Usability Tips (p. 162)
  • Issues in Developing Speech Recognition-Based Applications (p. 163)
  • Specifications and Emerging Technologies (p. 163)
  • Interoperability (p. 164)
  • Internationalization (p. 164)
  • Prototypes and Trials (p. 165)
  • Personalization and Configuration (p. 165)
  • Security (p. 165)
  • Forging Synergetic Relationships (p. 166)
  • Learning from Web Site Building Experience (p. 166)
  • Billing and Pricing (p. 166)
  • QoS and SLA (p. 167)
  • Detection and Prevention of Fraud (p. 168)
  • Types of Wireless Fraud (p. 169)
  • Solutions to Wireless Fraud (p. 170)
  • Credit Card Fraud and Solutions (p. 170)
  • Mcommerce Fraud and Solutions (p. 171)
  • Keep It Simple (p. 172)
  • Respect Consumer Privacy (p. 173)
  • Existing Infrastructure and Backward Compatibility (p. 173)
  • Monitor the Network (p. 173)
  • Chapter 9 Wireless Internet Tomorrow (p. 175)
  • Semiconductor Technology (p. 176)
  • Displays and Devices (p. 177)
  • Biometrics (p. 178)
  • Networks (p. 180)
  • The Napster Model (p. 181)
  • Wireless Internet as an Interface to Technologies (p. 181)
  • Chapter 10 The Last Word (p. 183)
  • Enterprise Applications (p. 185)
  • Expense Reporting (p. 185)
  • Project Management (p. 186)
  • IT Network Alarm and Monitoring (p. 187)
  • Vertical Industry Applications (p. 188)
  • Health Care (p. 188)
  • Retail (p. 189)
  • Transportation (p. 189)
  • Field Services (p. 189)
  • Financial Services (p. 190)
  • Utilities (p. 190)
  • Conclusion (p. 191)
  • Appendix A Useful URLs (p. 193)
  • Appendix B Acronyms (p. 209)
  • References and Recommended Readings (p. 217)
  • Index (p. 223)

Author notes provided by Syndetics

CHETAN SHARMA is the founder and principal of Pervasive Computing Practice at Luminant Worldwide, one of the world's largest and most experienced Internet professional services firm. In this role, he provides vision and strategic direction, directs R&D efforts, identifies and establishes leading industry partnerships, oversees global client engagements, and provides industry leadership. He is frequently invited to speak at industry conferences worldwide on wireless and related technologies and is often quoted in media publications. He also holds patents in wireless communications.

Wiley Tech Briefs

Focused on the needs of the corporate IT and business manager, the Tech Briefs series provides in-depth information on a new or emerging technology, solutions, and vendor offerings available in the marketplace. With their accessible approach, these books will help you get quickly up-to-speed on a topic so that you can effectively compete, grow, and better serve your customers.

Powered by Koha