wireless edge conference and expopage 44 - SYS
Transcription
wireless edge conference and expopage 44 - SYS
COMING: WIRELESS EDGE CONFERENCE AND EXPO PAGE 44 JANUARY 2002 | VOLUME 2 ISSUE 1 MOBILE MESSAGING PROVES EFFECTIVE FOR Sony Entertainment page 26 SECURE Networks page 50 page 30 WIRELESS INTERNET THE Next Generation? page 40 THIRD GENERATION FOMA Technology and BlueGrid page 43 PRODUCT REVIEW: Pocket PC 2002 page 48 BOINGO Jumps In page 56 15 Y O U R U N W I 26 R E D R E S 47 O U R C E W 53 W W . W B T 2 . C O M APRIVA W W W.APRIVA.COM/BUSINESS/DATA 2 www.WBT2.com J A N U A R Y 2 0 0 2 SOFTWIRED W W W.SOFTWIRED-INC.COM J A N U A R Y 2 0 0 2 www.WBT2.com 3 IANYWHERE (SYBASE) W W W.IANYWHERE.COM/SOAR 4 www.WBT2.com J A N U A R Y 2 0 0 2 IANYWHERE (SYBASE) W W W.IANYWHERE.COM/SOAR J A N U A R Y 2 0 0 2 www.WBT2.com 5 J A N U A R Y 2 0 0 2 | V O L U M E 2 I S S U E 1 WBT INSIDE THIRD GENERATION FOMA TECHNOLOGY AND BLUEGRID FEATURES Going Global World phones coming at you by Robert McGarvey COVER STORY 50 Powerful capabilities could finally drive a global standard for a wireless Internet by Junichi Threat M-COMMERCE 43 SECURITY 30 Wireless Internet... The Next Generation? Wireless Security: Not something to gamble on NTT SOFT is bringing their unified vision of wireless and Internet technology to the U.S. by Nagy Moustafa by Junichi Threat SECURITY 20 Secure Networks An overview of security technologies available today for LAN and WAN wireless networks by Kevin Wittmer 6 www.WBT2.com M-COMMERCE 40 J A N U A R Y 2 0 0 2 COMPA Q W W W.COMPAQ.COM/MOBILE J A N U A R Y 2 0 0 2 www.WBT2.com 7 INSIDEWBT DEPARTMENTS OTW: KEEPING AHEAD OF THE W-CURVE SPECTRUM iConverse ‘JumpStarts’ Customers into Workforce Mobility The Spectrum Cap Fight: A Left, a Right and a Smoke Screen Was the cap lifted to increase services or to fill the pocketbooks of major carriers? by David Geer The Cat Sat on the Phone 16 Texas Instruments Helps Drive Communications Convergence ‘Mobile Mickey’ to Rescue Disney Profits? CASE STUDY: M-MARKETING How to Gain Longer Life for 3G Mobile Devices? Mobile Messaging Proves Effective for Sony Entertainment Freedom of choice plays a big role in consumers’ acceptance by David Sklaver Bravo, ‘Maestro’! 26 ‘Wow, Now That’s 3G!’ FOCUS ON TECHNOLOGY M-COMMERCE: M-CAMPAIGN WATCH Can Billboards Successfully Go Wireless? They’re working out at New York health clubs by David Cotriss 14 Product Review 38 Pocket PC 2002 is enterprise-ready with a built-in VPN client VENTURE CAPITAL Boingo Jumps In The killer network of the future may be a combination of Wi-Fi and 3G by Tim Bresien 56 WIRELESS FUTURES Wearable and Wireless Computing Converge Welcome to the world of wireless wallets, “smart spaces,” and “interactive clothing” by Scott Stemberger 60 PLUS DATELINE JAPAN The Wireless Uptick Begins Here... 3G Crunch Time for DoCoMo and J-Phone Can FOMA attract 1,500,000 users by March 2003? by Michiyo Nakamoto 8 www.WBT2.com 48 11 Publisher’s Commentary by Jeremy Geelan 66 12 Letters Reader Feedback J A N U A R Y 2 0 0 2 HIDDENMIND W W W.HIDDENMIND.COM J A N U A R Y 2 0 0 2 www.WBT2.com 9 EDITORIAL DIRECTOR Jeremy Geelan [email protected] EDITOR-IN-CHIEF Robert Diamond [email protected] I N T E R N A T I O N A L A D V I S O R Y B O A R D Ron Dennis, Cofounder, Livemind, Inc. (CA) • Andrea Hoffman, Editor-in-Chief, Mobile Media Japan (Tokyo) • Douglas Lamont, Visiting Professor of Marketing, DePaul University (IL) • James Ogilvy, Director and VP, Global Business Network (CA) • Anita Osterhaug, Director of Knowledge Products, Brokat Technologies (CA) Keyur Patel, Chief Strategy Officer, Brience, Inc. (CA) • James Pearce, UK Director, AnywhereYouGo.com (London) • Ian Pearson, Futurologist, C2G (Martlesham, UK) Simon Phipps, Chief Software Evangelist, Sun Microsystems, Inc. (CA) • Bob Pinna, CEO, Mobilize, Inc. (CA) • Bruce Scott, President & CEO, PointBase, Inc. (CA) • Roger Strukhoff, President, SYS-CON Custom Media (CA) • Alan Williamson, CTO, n-ary (consultancy) Ltd (Scotland) T E C H N I C A L A D V I S O R Y B O A R D Joshua Allen, Senior Developer, Ulex, Inc., and Microsoft Corporation • Carl Braga, NWSS User Interface and Game Design, Nokia • Jacob Christfort, Chief Technical Officer & VP, Product Development, OracleMobile, Inc. • Ben Forta, ColdFusion Evangelist, Macromedia, Inc. • Scott Geddes, Vice President of Mobile Commerce, Brokat Technologies • James Gosling, VP & Fellow, Sun Microsystems, Inc. • Rajiv Gupta, General Manager, E-Speak Solutions & Chief Architect for E-Services, Hewlett-Packard Company • Larry Mittag, VP & Chief Technologist, Stellcom, Inc. • Peter Roxburgh, Mobile Solutions Developer, SecureTrading Ltd. D E P A R T M E N T E D I T O R S ART DIRECTOR Alex Botero [email protected] • EXECUTIVE MANAGING EDITOR Jamie Matusow [email protected] M-COMMERCE Paul Eijkemans (Netherlands) [email protected] SECURITY WAP Hans-Henrik T. Ohlsen (Denmark) [email protected] WIRELESS JAVA Jake McKee (New York) [email protected] M-MARKETING DESIGN WML APPLICATIONS USABILITY Wei Meng Lee (Singapore) [email protected] Jim Milbery (Pennsylvania) [email protected] Luca Passani (Denmark) [email protected] EUROWIRELESS Tom Dibble (London) [email protected] CONVERGENCE Tom Hauff (Florida) [email protected] I-MODE BLUETOOTH COLDFUSION GENERATION Y PRIVACY ENTERTAINMENT/GAMING E-DUCATION Ori Neibach (San Francisco) [email protected] Chatschik Bisdikian (New York) [email protected] NEWS TELEMATICS WIRELESS LAN Ben Spero (CA) [email protected] STOCKWATCH SHORT MESSAGING Dan Lubar (CO) [email protected] PRODUCT REVIEW VICE PRESIDENT MARKETING EAST COAST SALES REPRESENTATIVE Alan Williamson (Scotland) [email protected] David Cotriss (CA) [email protected] Ben Forta (MI) [email protected] Jeremy Hill (Los Angeles) [email protected] Pascal Stolz (CA) [email protected] Dean Terry (San Francisco) [email protected] Anne Jenkins (Durham, UK) [email protected] Margarita Strange (US) [email protected] Douglas Lamont (IL) [email protected] The Stockwatcher (San Francisco) [email protected] George Spelvin (New York) [email protected] E D I T O R I A L A D V E R T I S I N G SR. VICE PRESIDENT MARKETING Bill Ray (England) [email protected] EXECUTIVE EDITOR Carmen Gonzalez [email protected] Gary Rhodes [email protected] M’lou Pinkham [email protected] EDITOR Nancy Valentine [email protected] MANAGING EDITOR Cheryl Van Sise [email protected] Miles Silverman [email protected] ADVERTISING DIRECTOR Robyn Forma [email protected] ASSOCIATE EDITOR Gail Schultz [email protected] ADVERTISING MANAGER Megan Ring [email protected] ASSOCIATE EDITOR Jean Cassidy [email protected] REPRINT SALES COORDINATOR Carrie L. Gebert [email protected] ADVERTISING ASSISTANT Alisa Catalano [email protected] ADVERTISING ASSISTANT Kristin Kuhnle [email protected] P R O D U C T I O N W W W . W B T 2 . C O M VICE PRESIDENT PRODUCTION Jim Morgan [email protected] WEB MASTER Bahadir Karuv [email protected] DEPUTY ART DIRECTOR WEB DESIGNER Stephen Kilmurray [email protected] ASSOCIATE ART DIRECTOR A. Venkataraman [email protected] WEB DESIGNER Chris Croce [email protected] ASSISTANT ART DIRECTOR Cathy Burak [email protected] CONTENT EDITOR Lin Goetz [email protected] Louis F. Cuffari [email protected] GRAPHIC DESIGNER Richard Silverberg [email protected] SYS-CON TV James M. Bartolozzi [email protected] S Y S - C O N E V E N T S C O R P O R A T E A C C O U N T I N G PRESIDENT & CEO Fuat A. Kircaali [email protected] CHIEF FINANCIAL OFFICER Bruce Kanner VP BUSINESS DEVELOPMENT Grisha Davida ASSISTANT COMPTROLLER Judith Calnan SALES EXECUTIVE Michael Pesick CREDIT MANAGER Jan Braidech SALES EXECUTIVE Richard Anderson C I R C U L A T I O N ACCOUNTS PAYABLE Joan LaRose CONFERENCE MANAGER Michael Lynch CIRCULATION MANAGER Engin Sezici CLERICAL ASSISTANT Betty White NEWSSTAND CONSULTANT Brian Gregory VP EVENTS Cathy Walters SHOW ASSISTANT Niki Panagopoulos REGISTRATION ASSISTANT Jaclyn Redmond JDJ STORE MANAGER Anthony D. Spitzer CUSTOMER SERVICE Patti Del Vecchio SUBSCRIPTIONS: For subscriptions and requests for bulk orders, please call our Subscription Hotline: 800 513-7111 Cover Price: $5.99/issue: Domestic: $49.99/yr. (12 issues) Canada/Mexico: $79.99/yr. Overseas: $99.99/yr. includes airmail delivery (U.S. Banks or Money Orders). Back Issues: $10 U.S. - $15 each, all other countries. OFFICES: SYS-CON Media, 135 Chestnut Ridge Road, Montvale, NJ 07645 Telephone: 201 802-3000. Fax: 201 782-9600. [email protected] WIRELESS BUSINESS & TECHNOLOGY is published monthly (12 times a year) for $49.99 by SYS-CON Media. POSTMASTER: Send address changes to: WIRELESS BUSINESS & TECHNOLOGY, SYS-CON Media, 135 Chestnut Ridge Road, Montvale, NJ 07645. ©COPYRIGHT: © 2002 by SYS-CON Media, all rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy or any information storage and retrieval system, without written permission. For promotional reprints, contact reprint coordinator. SYS-CON Media reserves the right to revise, republish and authorize its readers to use the articles submitted for publication. WORLDWIDE DISTRIBUTION: Curtis Circulation Company, New Milford NJ. ISSN #1533-6735 SUN, SUN MICROSYSTEMS, J2ME, J2SE, AND JAVA ARE TRADEMARKS OR REGISTERED TRADEMARKS OF SUN MICROSYSTEMS, INC., IN THE UNITED STATES AND OTHER COUNTRIES. BLUETOOTH IS A TRADEMARK OWNED BY TELEFONAKTIEBOLAGET LM ERICSSON, SWEDEN. ALL OTHER TRADEMARKS MENTIONED ARE PROPERTY OF THEIR RESPECTIVE OWNERS. 10 www.WBT2.com J A N U A R Y 2 0 0 2 PUBLISHER’S COMMENTARY by Jeremy Geelan EDITORIAL DIRECTOR Okay, okay. Mea culpa. Guilty as charged. I’ve been taken to task for allowing a somewhat uncharacteristic burst of negativity to creep into my commentary last month. T’S QUITE ENOUGH, READers complained, to have the U.S. economy shrinking at an annual rate of 1.3% – marking the weakest performance since the first quarter of 1991, when the country was enduring its last recession – without WBT making things worse by bemoaning the conspicuous absence to date of a wireless “Big Bang.” Wireless Rome was never likely to be built in a day, it has been pointed out to me. And of course it’s true. If you care to remember, say, that scene in Wall Street in which Michael Douglas sits in his limousine trading stocks via his mammoth-size cell phone, then you’ll remember, too, that the wireless telephone was about as common in 1987 as the Bloomberg machine, and far from being a part of everyday life. In other words, it has already taken nearly 15 years – so what’s another month or two between friends? Therefore my New Year’s resolution was to wipe the slate clean and keep a renewed ear, eye – and e-mail Inbox! – out for best-of-breed examples of wireless ROI and case studies. Wherever in the world they may occur, they demonstrate how the combined innovative and entrepreneurial energies of the entire global economy are now systematically engaged in the move to wireless. One sure place to look for indicators of an uptick is U.S. consumer spending – the lifeblood of the economy. This grew at a rate of only 1% in the third quarter of 2001, the weakest showing since the first quarter of 1993 and a big drop from the 2.5% growth rate posted in the second quarter. But since consumer spending nonetheless accounts for two-thirds of all economic activity, it remains a crucial bellwether where wireless is concerned. I Any indication that at last a plethora of welldesigned and impressively functional devices was arriving would be a huge shot in the arm for the consumer (and therefore the overall economic) wireless market. So I am delighted to report here that this month’s Consumer Electronics Show (CES) in Las Vegas provided just that. High-quality handsets now abound, Wi-Fi, GPS and telematics are bringing wireless connectivity to previously untouched areas of our home and working lives and, above all, the applications are moving beyond the trivial to the absolutely life-changing. For example, take Wherify, a company that is launching a new GPS personal locator for children, which WBT’s SMS Editor Dan Lubar describes as looking “like a bulky Gen Y wristwatch.” A parent will now be able to find the location of any child wearing it in about a minute, using any Internet browser. Now that’s the kind of functionality that not just thousands, but literally millions of potential wireless consumers have been waiting for! This is also the quarter in which Danger, Inc., promises to release its long-awaited “Hiptop” phone/PDA, which not surprisingly, was swiftly nominated for the best design of the show award. The Hiptop is going to do some very interesting things to 2.5/3G markets in the U.S. Significantly Microsoft also announced their “Smartphone 2002” at CES. As the consumer play unfolds through 2002, other more marginal issues will fade into the background. For example, it was always the case that, as one commentator puts it, “The Internet doesn’t need the wireless data industry. The wireless data industry, however, does need the Internet – desperately.” But it was always going to take a great deal of price, hardware, and distribution channel tinkering before the wireless industry came close to providing a mass-market “wireless Web” product…so we shouldn’t be surprised that it’s taken till now for the Hiptop and its like to emerge. The wireless uptick begins here. The Wireless Uptick Begins Here… Jeremy Geelan, editorial director of Wireless Business & Technology, is also a regular commentator on alternative social, political, economic, and technological futures for a variety of European journals and newspapers. J A N U A R Y 2 0 0 2 [email protected] www.WBT2.com @ 11 LETTERS READER FEEDBACK WAP Can Still Help Untether the U.S. from the PC [“UMTS and Common Sense” v. 1 n. 7] In his article “UMTS and Common Sense,” Hans-Henrik T. Ohlsen asks if WAP will really matter in, say, two years. Contrary to popular belief, the answer is that it certainly will. WAP remains uniquely positioned in the U.S. to provide consumers and business users with value-added mobile data services in conjunction with the maturation of networks, devices, and expectations. As Ohlsen mentions, WAP’s growing pains can be traced to its status as an emerging technology, combined with poor marketing and positioning, and a U.S. user market that is quite different from those in Europe and Asia. Had the wireless industry set user expectations correctly, priced services appropriately, and given better incentives to thirdparty content providers, WAP would be viewed in a much different light. Developers can help accelerate WAP’s growth and acceptance by designing and building WAP applications that take advantage of the core benefits of mobile technology (time, location). They cannot expect to duplicate the wired Web on mobile devices, but rather must be innovative in their approach to presenting data to the mobile user in a fashion that is most intuitive and useful. Ultimately, we should all recognize that mobile phone penetration will continue to grow; this, coupled with the eventual rollout of 3G, creates tremendous opportunities for WAP. The near-term challenge will be for entrepreneurs to create high-quality data delivery services and to bridge the gap between the vast content available on the Web and the more limited offerings currently available through mobile devices. In the end, however, questions still exist regarding whether WAP and mobile data will ever reach the level of popularity in the U.S. that they currently experience in other countries. The answer, for WAP anyway, is likely “no,” given its position as a complementary technology viewed on small devices. However, if a way can be found for WAP to be taken seriously on all mobile devices, we 12 www.WBT2.com just may have one technology that completely untethers the user from the modern PC. Either way, wireless technology will still continue to progress along the technology cycle, and reach that final destination of true innovation and efficiency. At that point, users will have moved way beyond messaging and become part of a truly connected, mobile data–driven society. —Scott Stemberger [email protected] Fixed-line DSL Puts Wireless 3G in Its Place I have noticed that Michiyo Nakamoto’s excellent Dateline Japan columns in WBT have focused mostly on 3G throughout 2001. However, instead of 2001 being “The Year of 3G” in Japan, it might very well come to be referred to as “The Year of DSL.” xDSL access is a very hot and underdeveloped market in Japan and continues to rapidly add subscribers, no doubt competing on a significant level with next-generation wireless Internet services. While in October 2001 (according to Nakamoto) just over 11,000 subscribers joined NTT DoCoMo’s 3G FOMA service in its much-hyped first month, I can reveal that there were 270,000 new xDSL subscribers. As WBT’s Dateline Japan columns remind us, Japan is heading into the unknown with wireless 3G, whereas with xDSL it’s headed into rather more predictable territory. South Korea, Japan’s north Asian neighbor and the world’s most advanced broadband market with over 60% public penetration (versus Japan at less than 10%), experienced this same kind of meteoric xDSL growth two years ago. And Korea Telecom, the country’s largest telecom and xDSL provider, increased their number of xDSL subscribers from 100,000 to 2 million during the 12 months prior to February 2001, and now has over 3 million subscribers. Put this growth rate in a market more than 10 times as big and the major question becomes: If xDSL follows the same path in Japan as it has in Korea, will this cannibalize the 3G business? This is an internal battle Japan’s other carriers face as well. KDDI and J-Phone also have xDSL businesses offered by their fixed-line business units (KDDI through ISP partner Dion, and J-Phone through their parent company, Japan Telecom’s OCN Internet service). It will be interesting to see what effect xDSL will have on existing 2.5G ARPU and the 3G service launches of J-Phone and KDDI (scheduled for mid to late 2002). It’s also a nice coincidence that the carriers delayed their 3G networks at the same time that xDSL was seeing explosive growth. Testing the networks and ironing out the bugs and performance issues are good reasons to delay 3G services – in the case of DoCoMo, their worldwide reputation is at stake – but maybe it will help to have a landline broadband moneymaker pumping yen into the coffers while the 3G market matures. xDSL is already much more of a commodity than the wireless Internet at this point. The Japanese consumer is uniquely blessed to have this choice of broadband wireline and wireless Internet. —M. Thuresson [email protected] An Excellent Book for Those New to Wireless I wanted to alert WBT readers who may be new to wireless – and also those who’d like to learn more – to a new book I’ve found, called 3G Wireless Networks by Daniel Collins and Clint Smith. Its 500 pages cover 1G, 2G, 2.5G, and 3G wireless networks and various air interfaces used and/or proposed for these networks. It gets over the ambiguities of various 3GPP releases and clearly describes each release and its associated network reference model. There are also good descriptions of various 2G radio access standards (AMPS, TMDA, CDMA, GSM, WCDMA, CDMA2000) and their associated network reference models. While it doesn’t offer in-depth coverage of any particular wireless topic, it attempts to give a broad overview on everything wireless and provides plenty of references for readers to follow up. When I checked on Amazon.com recently there were only four copies left, so apparently I’m not the only one who likes it! —Murtaza Amiji [email protected] Send us your feedback. Letters may be edited for length and clarity. Please provide full name, location, and, if applicable, title and company. [email protected] J A N U A R Y 2 0 0 2 QUICKOFFICE W W W.QUICKOFFICE.COM J A N U A R Y 2 0 0 2 www.WBT2.com 13 OFF THE WIRES >>>> iConverse ‘JumpStarts’ Customers into Workforce Mobility JumpStart customers, he explains, “will another – and it’s also amazing how be able to institute project-, departmentcompletely, fundamentally unnecessary and pilot-level applications that can be it is to do any such thing. easily upgraded to global deployments But then of course, reality intrudes, Just when enterprises were thinking as individual needs increase and ROI and even the most saintly analyst of the that their mobile workers could only be models are formulated.” wireless world realizes that these handprovided with point solutions with Undoubtedly it’s this type of managesets, and this service, won’t be used for access to out-of-date or static data and rial confidence that has made the overall showing anything so innocent as a cat limited application functionality, along iConverse Mobility Platform a recent peering around a chair leg. DoCoMo is comes Waltham, Massachusetts-based winner of multiple prizes and wireless doubtless poised to capitalize on the iConverse with their snappily named software awards. WBT will be keeping a world’s second-oldest vice, pornography. “Adaptix” solution. keen eye on the company’s progress in There was never any doubt that this was By enabling application users to conhelping developers leverage existing Java always going to be the first service to tinue to perform their job functions code for more dynamic user experience, make serious money out of mobile regardless of mode of operation (whether code protection, and ease of maintevideo, nor that it would probably start connected, intermittently connected, or nance. www.iconverse.com doing so first in the East rather than the disconnected), iConverse Adaptix 1.0 is West. But how long can it take now, designed to help enterprises increase the before bored businessmen and snickering productivity of their mobile workers. The Cat Sat on the Phone teenagers in Europe and America are The vastly experienced Ron Matros, What was it Andy Rooney used to say? pouring large portions of their discreCEO and president of iConverse isn’t shy “Computers make it easier to do a lot of tionary income away in indiscreet pursuit about the merits of Adaptix. He is espethings, but most of the things they make it of full-motion titillation at the rate of 10¢ cially proud of the company’s awardeasier to do don’t need to be done.” a second? winning iConverse Mobile Studio, a What’s true of computers is perhaps If you think this is overly pessimistic, 100% visual drag-and-drop development also true of cell phones. Rooney’s words then just consider the fact that, of the 190 environment for rapidly creating cuscame mischievously to mind on hearing million or so e-mail messages currently the very latest reports from Japan about received by i-mode users every day, 90% a new functionality being added to NTT are “dating club” solicitations – in other DoCoMo’s much-publicized “worldwords, spam invitations to sex. leading, third-generation cellular telephone service” – a.k.a. FOMA (Freedom of Mobile multimedia Access). Texas Instruments Helps In announcing their complementary Drive Communications “world-beating full-motion video” servConvergence ice, i-motion, DoCoMo apparently took Best known as the world leader in a full-page ad in the Asahi Shimbun, digital signal processing and analog Japan’s leading business newspaper. “In technologies – the so-called “semiconaddition to i-mode content,” the ad ductor engines of the Internet age” – purred, “enjoy the thrill of full-motion Dallas-based Texas Instruments is now imagery in the palm of your hand.” also making big inroads in wireless – What did the folks at Tokyo’s equivaspecifically, in the convergence of wirelent of Madison Avenue hit upon as a tomized mobile business applications, less voice, multimedia, and data – with sample video frame to demonstrate the enabling the simultaneous creation of their OMAP processing platform . incredible extra dimension of functionboth thin- and smart-client applications. As a foundation for enabling new ality now being added to DoCoMo’s “In addition to our award-winning wireapplications, TI boldly claims that N2002N handsets thanks to i-motion? less technology,” he gushes, “suppleOMAP has become “the de facto stanYup, you guessed it: staring out from the menting our product offering with adapdard platform for 2.5G and 3G wireless tiny frame was...a cat. tive, distributed mobile computing handhelds today.” To back up their Never mind Lara Croft. Forget makes us the only platform provider in claim that OMAP processors support Michael Jackson. If you’re a Japanese the market able to supply a 100% comhigh performance and low power conconsumer you can now hold your favorite plete mobile technology solution.” sumption – two essential features for pussycat in the palm of your hand and, With its low cost of ownership, new any mobile device – and are scalable to best of all, the i-mode N2002N only smart-client functionality, and a rapid address any market segment, they have costs a paltry $500, plus say $1.25 in development and deployment cycle, recently announced that Palm-branded viewing fees for a 12-second video clip. Adaptix 1.0 claims to provide a feature handhelds incorporating OMAP procesSo you can demonstrate your feline love set that marries rapid application cresors are expected to be introduced fiscally, by sacrificing huge sums of ation with enterprise-strength deployapproximately one year from now. money to DoCoMo as you show her off ment and scalability. For less than Gilles Delfassy, TI senior vice presiin full-motion video to all your friends. $16,000, Matros assures WBT, Adaptix dent and general manager of their wireRooney was right. It’s amazing how customers will be able to begin rapidly less business unit, told WBT that TI’s easy i-motion makes it for ordinary developing and deploying adaptive, disOMAP and wireless GSM/GPRS techmortals to show off their pets to one tributed mobile applications. iConverse nology will help Palm deliver “a set of 14 www.WBT2.com J A N U A R Y 2 0 0 2 KEEPING AHEAD OF THE W-CURVE >>> ‘Mobile Mickey’ to Rescue Disney Profits? next-generation devices that take the Bravo, ‘Maestro’! user experience to new levels.” A new pocket PC has just In addition to Palm’s selection of TI’s been launched by Audiovox They may be scaling back the conOMAP processors, Delfassy explained, Communications Corporation, tent on ABC.com, closing MrShowbiz.com “TI will continue to offer Palm their a U.S. leader in CDMA handand Go.com, and ending the status of portfolio of other silicon and software sets. “Maestro,” as the Disney Internet Group as a separate diviproducts, which include advanced DSPsion, but Michael Eisner’s faltering enterdevice is called, combines based GSM/GPRS modem processors, tainment powerhouse clearly isn’t blind to the ease of use and comradio frequency, analog baseband techthe commercial potential of the humble prehensive functionality of nology, power management, audio wireless handset. In Japan, Disney already Microsoft Windows–powcodecs and touch-screen controllers.” offers low-price content to cell phone users ered Pocket PC 2002 softThrough copromoting the features through their Disney Mobile division, which ware with advanced wireand benefits of the products resulting has already signed less communications from this new collaboration, Delfassy up 2-million subcapabilities. Not bad for expects Palm and TI will expand the scribers and is plana device that’s just about overall market for wireless handhelds. ning to expand to the size of a 3" x 5" file Certainly it’s multifaceted business other areas of Asia card! alliances such as this – encompassing and Europe. Small, lightweight and powerful, technology, product collaboration and In his recent annuAudiovox will be selling the Maestro joint marketing – that are tending to al letter to shareholdPocket PC through wireless carriers, bunmake 2002–3 the phase of the business ers, CEO and chairman Eisner explained that dled with an Audiovox CDM-9100 wireand technology cycle in which major Disney had scaled back their Internet operations less handset. This combination, hopes companies at last make good on the conbut mentioned Disney Mobile as being one of the ACC president and CEO Philip sumer and enterprise promise of wireless. high-tech initiatives he views as being an area of Christopher, will make Maestro a total “By combining TI’s wireless technolgrowth for Disney. Who’d have thought five or ten mobile communications and pocket ogy leadership with Palm’s expertise in years ago that “mobilizing Mickey” would ever computing solution: “By bundling handheld computing,” Todd Bradley, Audiovox’s Maestro with our flagship have such a strategic impact on one of the world’s Palm’s executive vice president and CDM-9100 phone,” he told those attendlargest entertainment conglomerates? COO of its solutions group, told WBT, ing this month’s Consumer Electronics “our two companies can bring users Show (CES) in Las Vegas, “we support the How to Gain Longer Life for 3G higher performance, longer battery life, wireless data initiatives of our carrier cusMobile Devices? and a host of new capabilities.” tomers while making Pocket PC Internet What if cell phone batteries were able to last “Examples of new business functions,” connectivity practical and easy.” longer? And/or to charge faster? Danish inventor he continued, “could include utilizing The link between the Maestro and Lars Rosenmeir foresaw that extending the life rich multimedia presentations or docuAudiovox’s CDM-9100 tri-mode CDMA of mobile devices – or, in the technical jargon, ments, or employing biometrics for secuwireless phone is via a simple, single “increasing energy density” – was going to be rity (fingerprinting). Other more maincable connection, allowing users to surf even more crucial for 3G mobile handsets than stream functions might include searching the Internet, and check and send e-mail for current 2G and 2.5G phones, as 3G phones large databases, browsing the Web with – including Pocket Word and Excel docgobble up electricity. Rosenmeir outsourced rich multimedia content, playing video uments – anytime, anyplace. the necessary R&D tasks, founded a startup clips, listening to music, or playing graphThis crowns Audiovox’s first 15 years called Danacell…and has just won his battery ically intensive interactive games.” in the wireless game. Maestro will find technology company $600,000 in funding In a neat quid pro quo, Texas its way to market through the company’s from a Danish venture capitalist. Instruments will endorse the OMAP international sales force, which reaches “The capital injection,” Rosenmeir tells processor-powered Palm solucustomers in 42 countries across six WBT from Danacell’s headtions as soon as continents. Although all sales team quarters in the Danish they’re availmembers will now likely be equipped Science Park north of able, by with this winning combination, we can’t Copenhagen, “will be used for adopting help wondering what connectivity probfurther research and developthem interlems they might encounter along the ment of new polymers for lithinally as an way. www.audiovox.com um ion batteries and to hire a executive stancommercial manager to identify dard, and placbattery producers for Danacell to ‘Wow, Now That’s 3G!’ ing them on sell our technology to.” “When people see this futuristic their approved The startup hasn’t yet built up a Sprint PCS phone by Sanyo,” said John technology stanWeb presence at www.danacell.com, Garcia, senior vice president of sales dards list for more than and distribution for Sprint’s wireless diviso Rosenmeir is best contacted directly 35,000 TI employees worldsion, “the immediate reaction is ‘Wow, by e-mail: [email protected]. Send wide. now that’s 3G!’ The OLED [Organic it direct from your mobile phone, if the www.palm.com battery isn’t too low! www.danacell.com www.ti.com —continued on page 17 J A N U A R Y 2 0 0 2 www.WBT2.com 15 SPECTRUM SP SE CS MC FT GS VC WF DJ The Spectrum Cap Fight: A Left, a Right and a Smoke Screen Was the cap lifted to increase services or to fill the pocketbooks of major carriers? riers more profitable? Or only the latter? Unfortunately, we may not ited capacity to a larger market, thereby profiting from what the market will (continue to) bear? know until the smoke clears whether the consumers, the carriers, or The Challenger Is the cap lift equally capable of improving QoS and making car- both are the winners. by David Geer David Geer, a journalist and computer technician, graduated from Lake Erie College in 1993 with a BA in psychology. He has worked in the computer industry and in the media since 1998. @ [email protected] 16 www.WBT2.com o n November 8, 2001, the FCC began a gradual lift of the spectrum cap for mobile radio frequency (inclusive of cellular PCS). The cap lift elevates the amount of spectrum any single carrier can own in any one market from 45 to 55MHz. The lift will be completed in 2003. Cellular service is becoming essential technology in terms of national security (wireless communications were both vital and strained during the terrorist attacks of September 11), business communications (BlackBerry e-mail devices, cell phones, and pagers to name a few), and private-sector consumers (varied devices accommodate a culture that is constantly on the go, with multiplejob families, multiple responsibilities and stressors requiring convenient, immediate, mobile communication, not to mention emergency use). Because this essential technology depends on a scarce commodity called spectrum, we have a struggle for power. The power is capacity and the titans are assembled in camps for or against the cap lift. Most of the liberal left, along with small carriers trying to avoid being gobbled up in mergers the lift will produce, are against peeling away the cap. Much of the conservative right, who want to spur the economy and foster a free and open market, along with the big carriers that expect to swallow up smaller competitors or rob them of the ability to compete, are for the cap’s demise. While the fur and dust are flying, is our attention being drawn away from the fact that a few major carriers will remain...stronger, richer, and more powerful? That they’ll have more spectrum to work with and more room to breathe? And that they’ll still have no accountability to the government or anyone else for making good on promises of more capacity and better quality of service (QoS) for all? Will carriers improve, optimize, and innovate as a result of the cap lift? Or, will they simply rest on their laurels and enjoy their spoils, selling only the same poor quality of service and lim- The camp on the left, which wishes the cap had been left in place, points to the following cons. Along with a few big guys who have enough spectrum (like Sprint), the naysayers argue that there is still enough spectrum left to justify maintaining the cap. But it seems unreasonable to wait until absolutely no spectrum is left before freeing up more. The real motivations for making claims of no shortage are obvious. The smaller carriers won’t be able to compete with the three or four remaining giants the mergers will create. They will shortly be assimilated or wiped out. The consumer’s union sits in the no-lift faction, fearing prices will skyrocket and quality of service will plummet when there is a handful of providers remaining. But according to Charles Shalvoy, president and CEO of Conductus, manufacturers of wireless superconducting systems, larger companies, such as Sprint, that are sitting on a spectrum stockpile find it easier to lead the market in geographical areas where competitors such as Cingular and Verizon are spectrum-strapped. Again, some on the left also point to the political angle, suspecting right-wing shenanigans, and citing a money trail from large-carrier lobbyists to Republican campaigns. They claim these contributions swayed the Bush administration to push for a speedy removal of spectrum limitations. J A N U A R Y 2 0 0 2 OTW—continued from page 15 Mike Rosenthal, director of regulatory affairs at Southern LINC (a regional wireless carrier in the Southeast), says they wish the FCC would make the cap lift more gradual. They see some negative results to its removal. “Larger national carriers are suggesting that the FCC lift the cap entirely so that free competition and market forces can operate unhindered. But this new system rewards carriers with lousy business plans who have pursued growth at all costs and now must consolidate in order to stay afloat,” says Rosenthal. He adds that innovation falls when market consolidation increases, another notso-nice side effect of quickly raising the spectrum ceiling. The Champ Those on the right argue that a free market is great for spectrum and for the economy. Shalvoy says, “Basic economic theory would say that...if the free market is allowed to work its magic, then the scarce good [spectrum] will be put to the highest economic benefit and people will bid and buy and sell that scarce good until it finds its highest economic return. And I think that’s the basic philosophy behind the Bush administration; let’s free this spectrum up so that it will go to the highest possible economic use.” According to Shalvoy there is a shortage and the cap wasn’t helping any. “The number of subscribers grew by about 25% last year. Minutes of use per subscriber grew by about 30%, [and] overall capacity needs of wireless networks in this country grew by over 70%. Spectrum is a key part of adding more and more capacity. The initial reason to put spectrum caps on the providers was to foster competition in the wireless industry. That was successful in [that] there are at least 10 different wireless operators in the J A N U A R Y 2 0 0 2 U.S. providing different services. In any metropolitan market you might have six or more providers, but the problem is that none of them are providing really good service. Or the service is often spotty and varies from city to city and many of them are running into spectrum shortages that prohibit their ability to make the service better,” says Shalvoy. Another suggested benefit of the cap lift is that we may see some leeway at the 2.5G level, permitting some new applications to enter the market. Applications developers dependent only on 2.5G bandwidth will benefit. According to Dr. Scott Snyder, president and CTO of OmniChoice (provider of technical solutions to optimize telecom sales and marketing), “Software.com and Phone.com should benefit from the cap lift as well as office-related applications [providers]. InfoSpace.com and similar content providers may be able to add content as bandwidth frees up.” From a broader economic perspective, some predict a domino effect. The cap lift, like the bright light at the end of the tunnel, forecasts eventual success for 3G, which can only come from a position of financial success in the current market. This should spur investment and, in turn, raise hopes of developers and press them toward new products. The buildout of networks also continues. If the carriers optimize networks as they should to capitalize on the opportunity the cap lift provides, consumers will enjoy the service more and should use it more. This drives revenues and motivates providers to release more services to the market. History argues in favor of the conservative camp. In each major new industry (the auto industry being one example) a field of a number of small play- ers eventually developed into a clearer field of a few large companies. To resist the cap lift in order to avoid this prospect arguably would be trying to avoid the inevitable. As Shalvoy puts it, “Three or four suppliers could be a good number. That would be an amount that would encourage the suppliers to provide a quality product at a competitive price, which is good for consumers. ...It also allows those three or four suppliers to have enough business that they can afford to continue to invest in making new products and services available and expand their networks.” This view tends to consider the economic impact on everyone, and not just the benefits to smaller competitors who would like to stay in business. The Big Smoke Screen A few carriers will be left standing with a lot more breathing room after the smoke screen clears. But then it will be payback time – time for those carriers to produce and give us the quality of service we desire and deserve by optimizing their networks. Will they come through or will they give in to the temptation to sell their capacity thin so that they have more and more customers while we all get the same poor service? The government holds landline carriers to account, but not the wireless carriers. Without such lawful accountability, how can we be sure we’ll get the payoff we hoped lifting the cap would bring? According to Annabel Dodd, author of The Essential Guide to Telecommunications, Third Edition, and adjunct professor at Northeastern University, the government should hold wireless carriers accountable just as they hold landline carriers accountable: “The landline carriers are held responsible for the quality of their networks. They have to make reports to the FCC when Light Emitting Diode] display makes an ideal screen for viewing demos of 3G applications such as multimedia, games, and digital imaging.” Garcia was referring to the launch of a new Sprint/Sanyo initiative, unveiled at CES. The strong relationship between Sprint and Sanyo has already produced a number of leading devices, including the first color screen in the U.S. and the thinnest phone. So when Sprint chairman and CEO, William T. Esrey, displayed a futuristic 3G Sprint PCS phone by Sanyo featuring a 2.5-in. OLED display, it seemed to many to be nothing more than further evidence of the innovative Sprint/Sanyo tradition. During his keynote address, Esrey treated the CES audience to a preview of a day in 3G life, with a series of demonstrations to illustrate how customers will connect to family, friends, information, and entertainment using enhanced applications, a faster network, and wireless devices such as the new 3G Sprint/Sanyo PCS handset, which is estimated to be available by 2003. “The Consumer Electronics Association has already recognized and awarded Sanyo and Sprint for achievements in innovation with the SCP-6000 and SCP-5150, and this new phone with its OLED display takes innovation to the next level for the next generation of wireless networks,” said Atsushi Kodera, group vice president, general manager of Sanyo Fisher Company’s Communications/ Information Technology Division. The new phone’s OLED display is comprised of thin layers of individual carbon-based elements that emit light when electric current is passed through them. Perfect, in fact, for streaming video clips, games, and digital imaging. Best of all, OLED screens are self-emitting, and thus require no backlighting – which will mean lower battery consumption for all of us in the wonderful world of 3G...whenever it finally comes. www.sprintpcs.com www.WBT2.com 17 SPECTRUM WIRELESS SPECTRUM Broadcast TV 30 MHz 90 54 – 72MHz 76 – 88MHz 174 – 216MHz 470 – 512MHz 512 – 608MHz 614 – 806MHz 120 AM/FM Radio 150 535 – 1,605KHz 88 – 108MHz 60 180 3G Broadband Wireless 210 746 – 764MHz; 776 – 794MHz 240 Personal Communications Service (PCS) 270 300 MHz 1,850 – 1,990MHz 600 Wireless Communications Service (WCS) 900 2,305 – 2,320MHz 2,345 – 2,360MHz 1200 1500 1800 2100 Digital TV 54 – 88MHz 174 – 216MHz 470 – 806MHz Teledesic 18.8 – 19.3GHz 28.6 – 29.1GHz 2400 2700 3 GHz 6 9 12 Satellite-Delivered Digital Radio 2,320 – 2,325MHz Cellular Phone Service 806 – 902MHz 3G Broadband Wireless (proposed) 1,710 – 1,855MHz 2,500 – 2,69MHz 15 18 Local Multipoint Distribution Service (LMD ) 21 7.5 – 29.5GHz 31.0 – 31.3GHz 24 27 30 GHz 18 Multichannel Multipoint Distribution Service (MMD ) 2,150 – 2,680MHz www.WBT2.com SP SE CS they have outages that either affect public service carriers or more than a certain number of callers; they have to report all those outages and the FCC analyzes them. There is no such thing that happens on the cellular side. I think just lifting caps, letting people do whatever they want, is very wrong. …There should have been something done to say you’ve got some responsibility to the government. “You’re using a national resource, you’ve got responsibility for not overselling, for keeping a certain amount of spare capacity, for making sure calls go through. And reliability and redundancy, you know, [it’s like the carriers say] ‘oh here, just take whatever you want.’ I think a lot of people have talked about the fact that prices will go up and innovation could be hurt and I think that’s true and I agree with that. But then there’s also the issue of capacity and reliability. You know, reliability, redundancy, sustainability… all those things should be looked at by the FCC; there should be some accountability.” Yuval Davidor, founder of Schema Inc., optimizer of wireless networks for recovery of spectrum, says it’s time for carriers to pay up: the market forces and definitely the media are already focused on carriers paying the bill. Davidor says, “I mean prove that whatever we gave you – whether it was the trust in buying your shares or the revenues [generated] by sticking to you and getting the service from you, the fact that the federal government gave you additional spectrum and so on – that you took it seriously and you have improved the service to meet QoS. …It [QoS] is extremely quantifiable.” For example, when Schema does a retune – a retune is when an operator implements a change to the network RF setup; MC FT GS namely, a change in the frequencies assigned to the cells to use when a demand to initiate a call is made, or when the equipment parameters are changed, such as the power of transmission, antenna type, or antenna direction – two to three weeks later the operator collects statistics from the switches and knows exactly what percent the retune has improved on dropped calls, the bit error rate, attempt failures, additional capacity, and so on. “It’s so quantifiable.” Davidor says. “You just need to ask the question. “Maybe after a year or so the market will become so intelligent that they [will] say you have to give me the bottom line of the switch statistics,” he says. “That will tell me how good your service is. We don’t need ifs and buts and guesswork and to talk to my neighbor or my friend at work. I’ll just know the statistics that result from a million users. Shop-and-compare benefits from quality-of-service estimates are coming, according to Shalvoy: “There are two impediments that I think make people nervous about the industry consolidating down to three or four and still being competitive. The QoS data on who is the best provider in a geographic area is not real well known right now. It’s not the same as if I wanted to buy a new station wagon for my wife and could pick up Consumer Reports or JD Power and see a ranking of all the station wagons, find the top two or three that I was interested in, and go out to those dealers and buy one. “In wireless the quality of service can vary dramatically from one region of the country to another. Cingular might be best in one region, Verizon in another, and Dobson in another; so those could vary all over the map. One thing that could be very helpful [is] if there was a good service that would rank VC WF DJ all of these different providers in each geographical area. So if you use a certain provider in your area and you’re dissatisfied with them…you could say, well, okay, let’s see who’s better. …You could pick up a survey and if all their prices are pretty much the same, you’re really looking for quality of service. “This issue is amplified by the fact that Congressman Anthony Weiner, a Democrat out of New York, submitted legislation in Congress that required the FCC to collect and disseminate this quality of service information on a regional basis. He was responding to a number of surveys that showed that quality of service was a major dissatisfier for a large percentage of wireless users in this country. So that could be one thing that could help consumers.” The cap lift may buy carriers more time to prove themselves but may not really make a difference in quality of service. According to Dodd, “The caps are lifted but they don’t really have any more spectrum unless they buy somebody else who may also be at capacity. …I think there’s a lot of synergy if you put two networks together, and you use the same kind of access technology, a little bit more capacity with one big network than two smaller ones. …It really depends if these carriers are going to buy somebody that also has the spare capacity where they need it….” What will it take for us to get the quality of service we should be able to have now? Will we have it when carriers run out of excuses like caps needing to be repealed? Will we get it when consumers have the ability to compare quality of service and to switch based on what they find? Will we get clear, stable calls when the FCC regulates wireless providers the way they do landlines? These questions remain to be answered. J A N U A R Y 2 0 0 2 KADA SYSTEMS W W W.KADASYSTEMS.COM J A N U A R Y 2 0 0 2 www.WBT2.com 19 WIRELESS PRIMER: SECURITY by Nagy Moustafa Nagy Moustafa is president and CEO of Diversinet. He has more than 16 years of professional experience working in technology and engineering. Nagy was founder and president of CIT Canada Inc., an IT consulting company, and director of information technology for Rogers Communications. Prior to that he worked at IBM, Computerland, and the Canadian Ministry of Treasury and Economics. @ [email protected] 20 www.WBT2.com According to the research firm IDC, 84-million people in the U.S. will plug into the wireless Internet by 2005. Mobile devices will shift from being personal communication tools to a way of purchasing everything from soda to equities. With the increased exchange of confidential information required for these transactions, users, enterprises, and wireless operators are seeking more advanced levels of security to protect their intellectual and monetary assets. One solution is wireless PKI. J A N U A R Y 2 0 0 2 Advantages of Wireless over Wireline ver the next few years, the wireless industry will see a significant uptake of mobile Internet services resulting from faster wireless data rates as carriers roll out 2.5 and 3G networks, more functional enduser equipment, and always-on capabilities. The heavy investment by network operators and Internet O J A N U A R Y 2 0 0 2 merchants in mobile commerce (m-commerce) opportunities has subsequently led to an increase in wireless applications, such as prescriptions and stock trading, and the modification of existing wired applications to communicate with Internet-enabled mobile devices. Businesses are now starting to look at their wireless strategies, as it will be essential to stay close to their customers to avoid losing them to competitors. Additionally, the right wireless strategy can create new revenue streams from previously untapped sales channels and value-added services. The key vertical markets that have been identified as early adopters of these new mobile applications are the financial (wireless account access, debit and credit trans- Remote access to corporate systems and information will supplement rather than replace static access to network systems. The type of information and services accessed from wireless applications will be of a different nature than wired access and will take advantage of the unique benefits that remote retrieval can offer. With the Internet, financial institutions began to seek consumer retention by offering low-value applications such as accessing bank account balances, transferring funds, and paying bills online. The value of mobile applications is the ability for users to conduct transactions or access services anytime, anyplace. Mobile www.WBT2.com 21 WIRELESS PRIMER: SECURITY SECURITY actions, equity and bond trading, real-time stock quotes, account billing and payment, and loan approvals), health care (patient records and medical reports), gaming, and leisure markets. These market segments will benefit the most from the burgeoning opportunities that m-commerce can bring. However, as with any new ebusiness avenue, companies will have to figure out ways to protect their monetary and intellectual property offerings. For these industries, wireless security will be paramount. Enterprises are generally the first adopters of new technologies, as they are able to pay a premium for valued services and applications. New services and devices are introduced to employees before being extended to revenue-generating customers. Wireless access can enable mobile workforces and give remote workers access to proprietary information and databases that they would have otherwise needed a wired computer to access. This mobility provides improved response time to customer needs, and can increase the efficiency of the mobile workforce. SECURITY 1 2 Sona Innovations’ wireless product development platform enables corporations to mobilize new or existing mission-critical data Sona’s advanced architecture can be secured either through a secured session on the handheld device, communicating directly with the secure server, or with PKI-enabled digital certificates and signatures applications such as stock portfolio alerts or wireless lines of credit will get the wireless market off the ground. High-value applications such as these provide consumers with preferential salient information that is “pushed” to them, whereas the Internet provides static information that has to be “pulled” from its databases. High-value applications based on pushed information are done with the aid of intelligent applications such as Customer Relationship Management (CRM) engines and Global Positioning Systems (GPS). With the help of these intelligent systems, personalized, customizable alerts are possible. Services can be provided to track stock movement at the source so traders can know instantly about unusual buying patterns that might affect their portfolios. Global Positioning Systems offer locationbased information that can enable mobile services such as “call me a cab” or “find the best price for this product within a 10-minute walk.” These applications will go beyond remote access e-mail, location-specific information, and access to time-sensitive news. They will also provide enterprises with mobile access to information such as a company’s supply chain, real-time access to customer or partner data, and remote order entry. Consumers will be able to conduct personal finance transactions (e-cash transfer between personal devices) and instant product and price comparisons while out shopping. Interactive financial services will foster customer loyalty. For example, you will be able to pay a fee for a service that will notify you if a check is about to be returned for insufficient funds. Before the bank charges you for an NSF check, they would alert you of the situation via your mobile device – wherever you are – and you can immediately transfer money to cover the amount of the check. Unfortunately, the adoption of these services and the growth of the wireless Internet have been hampered by security issues. Widespread news of network hackers, credit card fraud, and cyber-thieves has created a universal fear of transmitting personal information over the wireless Internet. Need for Advanced Security Most of the online applications mentioned above can be implemented today, and secured to a level that is acceptable to the consumer. But once the perceived value of the information being transferred wirelessly becomes high enough, the level of security is reevaluated. The more money or value that is put on the line, the higher the level of security and documentation must be. For enterprises, the basic value equation is providing secure mobile applications to customers or employees with a value that exceeds the cost and risks of not rolling out applications 22 www.WBT2.com or building security into their solutions. With wired Internet applications there was less of a perceived need for greater security among some users. Therefore, companies did not invest enough time and money in an advanced security solution and their application offerings did not evolve. To ensure the future of Internet-enabled wireless devices and applications, enterprises must offer secure high-value transactions and services. This is the fundamental necessity to grow the Internet from a static resource to a mobile transactional arena. The mobile user must be 100% comfortable that all information is kept confidential and that transactions are assured. This security is a value-added service in any online transactional service – people pay for peace of mind. Some of the tools needed to ensure security in mobile environments are: • On-demand wireless digital signatures: “I approve” or “I accept” in a legally recognizable fashion • Signed-session authentication: Use of digital signatures to authenticate mobile device users and their devices to enterprise systems and enable access to those applications for which the user is entitled • Encryption: For confidentiality of transactional messaging Advanced security solutions need to be in place before the mass market for wireless data can mature. Advanced Security Methods Hackers, poor implementation of security policies, and low employee awareness of security procedures are the most common threats to wireless infrastructure and access to the wireless network database. To counteract these risks, the three most important elements of wireless security in a high-value transaction are: (1) confirmation of the parties involved; (2) legalization of the transaction; and (3) protection of information transferred. The wired Internet has traditionally been secured for users using encryption with electronic server authentication and username/password authentication. While this is fine for low-risk transactions, it does not provide for the strong authentication of users and nonrepudiation of transactions that are required in high-risk situations. The most effective way to increase the security in the wireless world and to more closely mimic the strong security of the “bricks-andmortar” world is through a public-key infrastructure (PKI), a system that verifies and authenticates the validity of each party involved in an Internet transaction. Consider the following security steps taken in a bricks-and-mortar banking transaction: J A N U A R Y 2 0 0 2 LS S I W W W.LSSI.NET J A N U A R Y 2 0 0 2 www.WBT2.com 23 SECURITY TYPE OF SECURITY Encryption Scrambles data so it can not be seen/read when transmitted Wireless transport layer security Provides an encrypted link between the mobile device and server application and authenticates the server Public Key Infrastructure A secure key infrastructure for digital certificate management and user-and-server authentication SECURITY PROVIDED SECURITY NOT PROVIDED CONFIDENTIALITY • Data integrity • User and server authentication •Nonrepudiation of transaction CONFIDENTIALITY DATA INTEGRITY • User authentication • Nonrepudiation of transactions AUTHENTICATION CONFIDENTIALITY DATA INTEGRITY AUTHORIZATION NONREPUDIATION • Authentication: The customer authenticates the bank by identifying the building and signage. The bank authenticates its customer by asking for identification or a password. • Privacy: The customer stands at the teller booth away from other customers. • Authorization: A customer card or profile indicates what transactions the customer can do. • Integrity: Business is transacted; cash is tendered and counted by both parties. • Proof of contact: The bank’s records and the customer’s bankbook are updated. A signed receipt is provided. An advanced PKI environment encompasses all five of these pillars of security: digital certificates and digital signatures provide authentication, integrity, and nonrepudiation or proof; privacy is ensured through the use of encryption; and authorization is conducted through the use of digital permits that establish where users can go and what they can do. In addition to encryption and authentication, public-key cryptography provides a way to digitally sign messages. Electronic or digital signatures are analogous to handwritten signatures, which bind a person’s identity to a particular message or document. Digital signatures are a digital code that can be attached to an electronically transmitted message to identify the sender. Digitally signing a message is a technique used by the sender to sign a message with his or her private key; then, using the freely available public key, others can verify that signature. With the advent of the Electronic Signatures in Global and National Commerce Act (E-SIGN) S. 761 enacted by the U.S. in June of 2000, and similar legislation throughout the world, digital signatures are now as legally binding in the electronic world as they are on paper. Digital signatures used in PKI allow enterprises to offer high-risk services and transactions online. Digital signatures are especially important for electronic commerce and are a key component of most legitimate authentication schemes. The use of digital signatures in transactions is a very effective way for enterprises to reduce their liability in conducting transactions over the Internet. By verifying that the person conducting the transaction is who they say they are, and by having a signed receipt that the transaction took place, institutions have a legally binding record of the transaction. For example, Sona Innovations Inc., a wireless application development company, is working with Diversinet to enhance the security features in Sona’s existing and future wireless financial and gaming applications. The addition of Diversinet-enabled digital certificates and digital signatures in Sona’s wireless applications enhances the security features 0RENCEON 5 1 $CONFETRATI E IV LL REGIS E U F C ROEUNTICOEFSF EDGE C V DISB SER WE 24 www.WBT2.com J A N U A R Y 2 0 0 2 One of the problems that wireless security vendors are discovering is how to provide advanced security on a wireless device. Securing applications running on a network is easy, but tried and true solutions in the wired world do not convert smoothly into the wireless world, where devices are highly constrained by their networks (limited bandwidth), computing power (limited CPU and memory), and an ongoing need to preserve battery life. Battery life is probably the most significant issue in the development of wireless applications and implementing wireless security. If you try to download a 256x256 color image to your PDA, your battery will run out in approximately three minutes. Battery life is a consideration in any wireless application. Additionally wireless networks provide relatively low data transmission speeds. Therefore, security tools such as the digital certificates used in wired public-key infrastructures are too large for wireless devices and applications. The CPUs in mobile devices are also less advanced than their wired counterparts. This, combined with limited memory, means lengthier processing times for wireless transactions. To resolve these issues, smaller digital certificates using condensed encryption algorithms have been devel- Summary As mobile networks and the wireless Internet become more advanced, mobile devices will shift from being solely a personal communication tool to a way of enabling business transactions. In addition, the wireless handset will become a user’s wireless wallet, purchasing everything from soda to equities. With the increased exchange of confidential information, users, enterprises, and wireless operators are seeking more advanced levels of security to protect their intellectual and monetary assets. Privacy and authentication are as important in the wireless world as they are in everyday life. In order to get a head start on the competition, enterprises and operators should incorporate wireless PKI security from the onset. An advanced security solution is imperative to generate more revenues, improve efficiency, retain customers, and evolve their service offering. SECURITY The Challenges of Wireless Security oped specifically for wireless security applications. Another major challenge facing m-commerce is the complexity of current systems for wireless transactions. Whereas the wired Internet features standardized computer tools and browsers that are independent of a device’s underlying operating system, wireless devices lack both a common user interface and a cross-platform way of providing content. Users prefer a simple, standardized system for conducting transactions. Applications are being developed today that incorporate common, standardized security tools. This will make secure m-commerce as simple as transactions handled on the wired Internet (e.g., entering one passcode for all transactions). It will help broaden the development of seamless applications designed for this purpose, and help to make mcommerce more ubiquitous. Digital signatures are now as legally binding in the electronic world as they are on paper beyond the privacy and confidentiality that encryption provides. Digital signatures provide accountability by verifying the identity of users, binding the identity of a user to the transaction so that knowledge of the banking or gaming transaction cannot later be denied, and proving that data transmitted wirelessly has not been tampered with in transit. These supplementary security features are important in wireless financial and gaming transactions where substantial monetary risk and liability exist. Jump-start your Web Services knowledge. Get ready for Web Services Edge East and West! AIMED AT THE JAVA DEVELOPER COMMUNITY AND DESIGNED TO EQUIP ATTENDEES WITH ALL THE TOOLS AND INFORMATION TO BEGIN IMMEDIATELY CREATING, DEPLOYING, AND USING WEB SERVICES. EXPERT PRACTITIONERS TAKING AN APPLIED APPROACH WILL PRESENT TOPICS INCLUDING BASE TECHNOLOGIES SUCH AS SOAP, WSDL, UDDI, AND XML, AND MORE ADVANCED ISSUES SUCH AS SECURITY, EXPOSING LEGACY SYSTEMS, AND REMOTE REFERENCES. PRESENTERS... Anne Thomas Manes, Systinet CTO, is a widely recognized industry expert who has published extensively on Web Services and service-based computing. She is a participant on standards development efforts at JCP, W3C, and UDDI, and was recently listed among the Power 100 IT Leaders by Enterprise Systems, which praised her “uncanny ability to apply technology to create new solutions.” Zdenek Svoboda is a Lead Architect for Systinet’s WASP Web Services platform and has worked for various companies designing and developing Java and XML-based products. EXCLUSIVELY SPONSORED BY J A N U A R Y BOSTON, MA (Boston Marriott Newton) ..............JANUARY 29 WASHINGTON, DC (Tysons Corner Marriott) .....FEBRUARY 26 NEW YORK, NY (Doubletree Guest Suites) .................MARCH 19 SAN FRANCISCO, CA (Marriott San Francisco) ............APRIL 23 REGISTER WITH A COLLEAGUE AND SAVE 15% OFF THE $495 REGISTRATION FEE. Register at www.sys-con.com or Call 201 802-3069 www.WBT2.com 2 0 0 2 25 CASE STUDY: M-MARKETING SP SE CS MC FT GS VC WF DJ Mobile Messaging Proves Effective for Sony Entertainment Freedom of choice plays a big role in consumers’ acceptance As wireless technology continues to evolve at breakneck speed, marketers believe they are coming closer to finding their Holy Grail. In 2002, the reality of wireless media, and the unheard-of new anti- by David Sklaver spam and user-control standards it requires, calls for “interest-certain” mobile messaging. t his concept of mobile marketing, while in its early stages, is already mainstream in the entertainment industry and is quickly attracting attention from leading Fortune 500 companies. The Ups and Downs of Online Advertising David Sklaver is CEO and president of Upoc. He is a senior marketing communications executive with more than 25 years of experience. Prior to Upoc, David was general partner and founder of Artustry Partnership, a strategic and creative communications consultancy. Before founding Artustry, David was president of Wells Rich Greene. @ [email protected] 26 www.WBT2.com As history has taught us, however, claiming victory is a difficult and risky task. From the early days of Internet advertising, online banner ads promised to deliver throngs of consumers to a marketer’s Web site. The buzz was shortlived and the technology wizards went back to the drawing board to reinvent the online advertising arena. The dawn of multimedia interactive ads raised the bar for creativity and pushed marketers to communicate to consumers in new and exciting ways. As multimedia online advertising grew in popularity, the advertising industry soon learned that although the technology enabled them to target consumers creatively, it did not deliver on attracting and retaining them. The Web did not evolve into a broadcasting medium as some anticipated, but it has proven effective as a direct marketing and customer relationship medium, offering marketers a means to connect directly with their target audience. While mobile marketing is a relatively new term in the United States, it is widely accepted, and consequently frequently used, in Europe and Asia. In the past, the lack of any unified standards in the United States prevented many compa- nies from understanding and experiencing the true benefits of mobile marketing. Now, platform-agnostic technologies that work with any wireless carrier and device have been developed to help break down the barriers and enable companies to reach consumers in an intimate way, providing them with requested content on the device that is always with them. U.S. companies, especially in the music and film industries, are beginning to understand the potential of mobile marketing and are increasingly incorporating wireless initiatives into their overall marketing strategies. Living the Mobile Lifestyle According to a mobile lifestyle survey conducted by Frank N. Magid Associates in November 2001, over 58% of Americans now own mobile phones. For marketers, consumer adoption of mobile has surpassed 50% in every key demographic from teens to the 55+ crowd. This number is up from an estimated 23-million users last year, representing an incredible annual growth rate of 40%. At the same time, people’s awareness of text messaging and wireless Internet capabilities also continues to increase. Consumers have been exposed to text-based wireless advertising for some time now. Unfortunately, wireless advertising has not been well received by con- J A N U A R Y 2 0 0 2 SOFTWIRED W W W.SOFTWIRED-INC.COM J A N U A R Y 2 0 0 2 www.WBT2.com 27 CASE STUDY: M-MARKETING 1 Mobile users receive Ali trivia SP SE CS sumers, who don’t want to be spammed with unwanted advertisements. Mobile marketing platforms need to give consumers freedom of choice so they can select which messages they want to receive. They should be able to choose their own communities and willingly interact with the message. This is referred to as “interest-certain” content, and it serves to guide the development of mobile programs for marketers. Mobile messaging has proved effective for marketers aiming to build relationships with core consumer groups. For example, Sony Music was able to build communities for artists including Lil Bow Wow and Destiny’s Child. Sony Pictures recognized that mobile messaging was also a targeted way to promote their movies. By giving artists and actors additional touch points through which to reach their fans, mobile messaging offers marketers the opportunity to actively engage consumers prior to the release of a movie. This approach has the potential to be far more effective than traditional mass marketing because it engages consumers in a relationship and dialogue, whereas traditional marketing allows the consumer to remain passive and potentially nonparticipatory. Sony Pictures Packs a Mobile Marketing Punch for Ali One clear example of mobile marketing’s ability to reach target audiences is the recent promotion and release of Sony Pictures Entertainment’s blockbuster Ali. Sony Pictures wanted 2 28 Text messages update community members on celebrity sightings www.WBT2.com MC FT GS to build a mobile community where end users could request both voice and text messages containing information on prerelease activities prior to the launch of Ali on Christmas day. Another significant goal was to raise awareness for the film with younger urban audiences who are already using this technology in their everyday lives and to provide enthusiasts with the opportunity to create a personal connection to the film. Sony Pictures’ marketers enlisted Upoc to develop content on public appearances and events by the cast, behind-thescenes information, inspirational messages, movie premiere news, as well as trivia, which could be disseminated through Ali’s wireless community. Accordingly, the mobile community was integrated into Sony Picture’s Web site and promoted across partner sites. Launched in early December and slated to last through January 2002, this marketing tool was utilized by Sony Pictures to help Ali stand out during a very crowded holiday movie season. The cross-media promotion of the campaign was particularly successful in driving sign-up for dedicated e-mail blasts, promotional banners, and community chat rooms. As of press time, the number of users who had signed up for the Ali mobile messaging campaign went well beyond expectations to become the largest mobile community to date for any domestic film release. The wireless communities allowed Sony Pictures to turn each of these interactive touch points into an ongoing relationship with Ali fans. The mobile VC WF DJ alerts helped create buzz among fans and press alike. The wireless campaign helped Sony Pictures build relationships with core consumers and create excitement around the film’s launch. Aside from the Ali-specific outreach, the wireless promotion also helped Sony Pictures build a mobile user base of avid entertainment consumers that can be tapped for inclusion in future initiatives for new releases. Having realized the power of mobile communication, Sony Pictures Digital Entertainment can now leverage an effective, targeted way to promote future movies and give artists and actors the ability to interact with their fans anytime, anywhere. “Upoc brings a fresh perspective to viral marketing with their mobile services,” said Zachary Eller, director of partnership marketing, Sony Pictures Digital Entertainment. “The Ali program is a compelling example of SPDE’s commitment to let audiences connect with Sony Pictures content on multiple devices, anytime, anywhere.” Lessons Learned Over the last few years we’ve learned a lot in the world of Web marketing, including a number of tough lessons from the dotcom era that helped us to understand the possibilities – as well as the limitations – for marketing in the mobile arena. Mobile marketing is clearly in a good place when viewed as a logical extension of a company’s communications program, not as a be-all and end-all. Prescient marketers will be well served by acquainting themselves with this new communications channel unlike any they’ve seen before. “This approach has the potential to be far more effective than traditional mass marketing because it engages consumers in a relationship and dialogue“ J A N U A R Y 2 0 0 2 CTIA W W W.CTIASHOW.COM J A N U A R Y 2 0 0 2 www.WBT2.com 29 WIRELESS PRIMER: SECURITY Despite what you may have heard, secure wireless networks can be deployed. However, truly secure wireless networks require hybrid solutions. Read on to learn about the solutions used in such network configurations. by Kevin Wittmer Kevin Wittmer works as a senior software engineer for Expand Beyond Corporation, headquartered in Chicago. Expand Beyond develops enterprise software that enables organizations to manage their IT infrastructure wirelessly. www.XB.com @ [email protected] 30 www.WBT2.com J A N U A R Y 2 0 0 2 I memory address space common to most mobile devices, as well as latency delays often experienced during RF transmission. In nearly all cases, implementing any of these technologies requires support by the mobile platform residing behind the firewall inside the enterprise network. Table 1 provides a sample listing of mobile application platform products along with what security technologies each currently supports. SSL is the most common technology supported, while VPN technology receives the least support. PKI, which is centered around the use of digital certificates, provides the best security, but also requires the most effort in planning and deployment. WTLS Wireless Security Today Corporate IS organizations that have taken a wait-and-see approach to wireless network technology become even more hesitant when they learn of the holes present in the first releases of wireless security technologies such as WEP and WTLS. Companies both large and small expect deployable security solutions that are on a par with wired networks. As a result, some organizations, fearing the worst, have scaled back ambition deployment plans of installing wireless network technology into the enterprise, waiting instead for many of the wireless-specific security technologies developed to mature into proven, reliable solutions. The list of technologies available for implementing secure wireless connections includes WTLS, WEP, ECC, SSL, TLS, VPN, RADIUS, and PKI. Technologies such as WEP are used to provide security over IEEE 802.11 networks, while WTLS is generally used to provide security for WAP sessions carried over CDMA or GSM. The remaining family of technologies, such as ECC, PKI, SSL, TLS, RADIUS, and VPN can be applied to both Local Area Network (LAN) and Wide Area Network (WAN) deployments. These security technologies share common features such as support for authentication and encryption. In addition, all of them, many of which originated in the wired world, have been modified to cope with low-bandwidth wireless connections, limited processing power and MOBILE APPLICATION PLATFORM 2ROAM WIRELESS PLATFORM AIRIX AIR2WEB IBUS MESSAGE SERVER ELLIPSUS INFINITE MAP COVIGO MOBILE APPLICATION PLATFORM CURIOUS NETWORKS CONTINUUM ENGINE AVANTGO 4.0 M-BUSINESS SERVER ZYCONNECT ZYMOBILE SERVER MSHIFT MOBILE ENGINE AETHER INTELLIGENT MESSAGE PLATFORM WAP is typically carried over cellular networks based on CDMA or GSM. This includes all derivatives such as GPRS, CDMA2000, or UMTS. Bluetooth also has a provision in its specification for carrying WAP, although it has received little interest from vendors or early adopters of WAP. WTLS, part of the WAP family of technologies, is used to provide confidentiality, integrity, and authentication over circuit- and packet-based networks. WTLS provides security over the RF air link between the WAP mobile device and the WAP gateway that typically resides on the carrier’s network. WTLS is based on TLS, and is classified into three levels (see Table 2) with support of client and server certificates being the primary differentiator among the three levels. The first version of WTLS had a few highly publicized weaknesses, including vulnerabilities to attacks involving datagram truncation and message forgery. A further weakness in WTLS architecture is the role that the WAP gateway is required to play in encrypting and decrypting WTLS packets, and then encrypting or decrypting the information as SSL/TLS packets. WAP 2.0 has addressed these weaknesses by adding support for TLS 1.0 (RFC 2817) and TLS tunneling to the WAP profile (see Figure 1). WAP profile support for TLS consists of cipher suites, X.509 certificate formats, signing algorithms, and sessionresume functionality. And whereas WAP 1.x supported WTLS over UDP, WAP 2.0 allows TLS operations to occur over TCP. SECURITY SUPPORTED SSL 3.0 HTTPS PKI RECIPROCAL DIGITAL CERTIFICATE TRANSFER SSL SSL AND WTLS HTTPS, WTLS, AND PKI VPN, WTLS, SSL, AND PKI 128-BIT SSL WITH CERTICOM ECC, HTTPS SSL AND WTLS SSL/TLS, WTLS, AND PKI CERTICOM ECC TABLE 1: Security supported in various mobile application platforms J A N U A R Y 2 0 0 2 A SECURITY VOCABULARY • Encryption: Algorithms used to provide confidentiality during data transmission. There are two basic types of encryption: symmetric and asymmetric. Symmetric encryption involves two parties sharing a private key and using a cipher function to encrypt or decrypt data, while asymmetric encryption has the recipient distributing a public key used for encrypting messages to all intended senders, and using a private key to decrypt any encrypted message subsequently sent. In practice, most security mechanisms implement a hybrid approach that first uses asymmetric encryption to exchange keys and then switches over to symmetric encryption for the duration of the session. For example, both SSL and WTLS provide algorithms such as RSA, DH, or ECC for key exchange, and then transition to DES for symmetric encryption once a minimally secure link session has been established. • Authentication: The process of validating the true identity of the mobile user using a password challenge and response mechanism or digital certificates. The ChallengeHandshake Authentication Protocol (CHAP) is an established protocol that is most often used to validate username and password, encrypting the information so as not to transmit either item in clear text over the network. One proven solution for implementing authentication in systems that use WAP or IEEE 802.11 is to use a system based on the open RADIUS server specification. • Authorization: Involves determining what rights are assigned to the mobile user. These rights can include access levels that determine what operations can be performed, as well as what network resources can be —continued on page 33 www.WBT2.com 31 WIRELESS PRIMER: SECURITY f you follow wireless technology, then you frequently read articles on the Web or in various trade magazines reporting the latest security holes found. This article will attempt to draw a border around the wireless security landscape by providing a discussion of various security technologies that have been designed and optimized to operate over local and cellular-based wireless networks. The support for security in mobile application platforms will be highlighted along with what technologies are available today for securing wireless networks; accompanying diagrams depicting different configurations are also included. WIRELESS PRIMER: SECURITY 1 2 Example deployment diagram for TLS and WTLS Example deployment diagram for ECC and SSL A key point to consider when implementing WTLS is making sure that support is available on both sides of the connection. On the mobile device side, WML microbrowsers supporting WTLS include Openwave’s Mobile Browser, which supports WTLS Class 2 security (see Table 2) as well as SSL, and Nokia’s WAP browser version 2.1, which has support for the highest level of WTLS security, Class 3. The other side of the equation is the WAP gateways. For example, Motorola’s 1200 data system is a WAP gateway system that supports the first two classes of WTLS, but not Class 3, the highest level. WEP The IEEE association is composed of a number of committees that define various industryaccepted technical standards. Members of the association include the 802.3 standards committee, whose focus is the Ethernet network standard, the 802.5 standards committee devoted to the Token Ring specification; and the IEEE 802.11 standards committee charged with advancing SECURITY FEATURE PUBLIC KEY EXCHANGE SERVER CERTIFICATES CLIENT CERTIFICATES SHARED-SECRET HANDSHAKE COMPRESSION ENCRYPTION MAC SMART CARD INTERFACE CLASS 1 MANDATORY OPTIONAL OPTIONAL OPTIONAL — MANDATORY MANDATORY — wireless LAN standards. Within the IEEE 802.11 standard committee are working groups and technical advisory groups that focus on the family of technologies covered under the IEEE 802.11 standard umbrella, including the Wired Equivalent Privacy, or simply WEP. The WEP standard defines the layer-two security protocol that is to be employed in IEEE 802.11 wireless LAN technology. The first specification of WEP called for a secret key to be shared between a mobile station and the local access point, which made key management at large sites quite unmanageable. It also specified 40-bit encryption using RC4 encryption with static keys. Early adopters and vendors found the first version of WEP to have some significant shortcomings in both security and management. The list of deficiencies included vulnerability to disassociation attacks, no central authentication, no accounting support, RC4 stream chippers that are vulnerable to known plain-text attacks, lack of a key management protocol, and a CLASS 2 MANDATORY MANDATORY OPTIONAL OPTIONAL OPTIONAL MANDATORY MANDATORY OPTIONAL CLASS 3 MANDATORY MANDATORY MANDATORY OPTIONAL OPTIONAL MANDATORY MANDATORY OPTIONAL TABLE 2: WTLS security feature matrix MICROSOFT CERTICOM ENTRUST V-ONE EPIPHAN CONSULTING WWW.MICROSOFT.COM/ WWW.CERTICOM.COM/ WWW.ENTRUST.COM/ WWW.V-ONE.COM/ WWW.EPIPHAN.COM/ Pocket PC 2002 comes with a built-in VPN client MovianVPN Pocket PC client VPN software that interoperates with various VPN gateways Pocket PC VPN solution that operates with Entrust VPN gateway systems SmartPassCE VPN supports various CE devices including SH3, MIPS, and ARMS VPN and LinkSpy provide the framework for implementing VPN clients for Pocket PC TABLE 3: VPN solutions available for Pocket PC. For the latest list of mobile VPN offerings, go to the following link and select VPN: www.microsoft.com/mobile/enterprise/solutions/swsol.asp 32 www.WBT2.com J A N U A R Y 2 0 0 2 Bluetooth Security The primary application of Bluetooth wireless network technology is to support peer-to-peer device networks that operate over small distances. Maintaining security at the data-link layer of a Bluetooth network is accomplished using a unique public address for the Bluetooth device, two private keys, and a random number generated for each network transaction. Different primary keys are used for authentication and encryption, and both are derived during hardware device initialization. For authentication, the size of the key is fixed at 128 bits while the size of the encryption keys is made to support variable lengths ranging from 8–128 bits. Variable length encryption-key sizes allow for flexibility for future upgrade paths as well as easing the effort that Bluetooth device implementers have to exercise in conforming to government export restrictions placed on various cryptographic algorithms. Since the Bluetooth specification does outline support for WAP, support of WTLS might be a theoretical possibility in enhancing security over a Bluetooth connection, but more than likely not a terribly practical one, because most mobile devices support Bluetooth. J A N U A R Y 2 0 0 2 Wireless Securities for WLANs and WANs A SECURITY VOCABULARY The following wireless technologies can be applied to local and cellular networks, as they are not tech-type specific. In fact, some of these technologies can be combined to enhance security of wireless networks. —continued from page 31 ECC • Elliptic Curve Cryptosystems (ECC) are based on discrete logarithm mathematics, specifically various points located along an elliptic curve. ECC, which is commonly implemented in hardware (see Figure 2), can be used to provide a digital and encryption communications scheme. ECC has been employed in wireless applications that use WTLS over WAP-compliant networks such as Verizon’s CDMA wireless network, or in non-WAP systems that operate over CDPD networks such as Mobitex. SSL The Secure Sockets Layer (SSL) is a protocol that was first developed by Netscape to provide a secure data channel over the TCP/IP network protocol stack. The SSL protocol consists of two distinct protocols: the SSL Record Protocol and the SSL Handshake Protocol. The SSL Handshake Protocol allows the client and server to authenticate each other, negotiate an encryption algorithm such as DES or RC4, and exchange cryptographic keys before an application protocol such as HTTP or SMTP initiates any communication. The length of the encryption transaction session key, typically 40- or 128-bit, is contained in server-side certificates, and determines the security strength of the SSL communication channel. Due to government export restrictions, 128-bit capable (or greater) Web browsers cannot be exported outside the U.S. or Canada. For the wired Internet, SSL is the de facto technology for building Internet trust infrastructures capable of supporting secure e-commerce transactions. The SSL protocol, X.509 digital certificates, and SSL server-side certificates form many of the key components in a PKI solution. For wireless systems, SSL is typically used between the Web server or mobile application platform and the WAP gateway or the Web clipping proxy server. Given the limited memory, RF bandwidth, and processing resources of most mobile devices, secure SSL-based communication has not been widely adopted for securing online transactions. This has particularly been the case between the wireless gateway or proxy and the mobile device. For example, the Palm Web clipping client browser that is integrated into the operating system of wireless-ready Palm devices does not support any form of SSL. Recently, however, support for SSL in mobile browsers has begun to appear. Mobile browsers such as Handspring’s Blazer, Microsoft’s Pocket Internet Explorer, and • • • accessed. Some WAP gateway systems provide for authorization through support of access control lists. Auditing: Involves reviewing all previously recorded events related to network or system security. If there is a security breach, one of the first responses is to isolate where the breach came from by reviewing various system logs to determine what users were active and where in the system they were. Auditing capabilities are commonly found in WAP gateway and RADIUS software systems. Integrity: Required to prevent malicious intruders from tampering with encrypted message data while it is being transmitted over the radio spectrum or across the wired network. Algorithms used to guarantee message integrity include Message Digest 2 (MD-2), Message Digest 5 (MD-5), and Secure Hash Algorithm (SHA1). Techniques applied by these algorithms include protecting the integrity of messages over wireless connections, cryptographic chaining, date/time stamps, sequence numbers, and server ID fields. Nonrepudiation: Concerned with not allowing the mobile client or user to claim that a secured communication did not occur. One technique for implementing nonrepudiation in SSL is using a unique token in conjunction with the DSS, Fortezza, and SHA algorithms. Key management: Defines how the client and server will exchange keys for public and private encryption. Exchange key algorithms include RSA and Diffie-Hellman. DiffieHellman uses an advanced mathematical algorithm known as modular exponentiation to exchange keys between peers on a public network without certificates or prior communications between client and server. www.WBT2.com 33 WIRELESS PRIMER: SECURITY security scheme that could be instantly comprised if an attacker obtained access to the shared private key residing on a lost or stolen mobile station. Vendors addressed various shortcomings such as lack of a key management protocol by enhancing their implementation of WEP by increasing the size of the encryption keys or developing their add-on 802.11-based security protocols (see sidebar “Securing Your 802.11b Network”). CISCO’s Lightweight Extensible Authentication Protocol, or LEAP, incorporated into the Aironet product line, is one example of this. LEAP is a derivative of the Extensible Authentication Protocol (EAP) that has been optimized to operate over wireless LANs. EAP specifies that authentication and key exchange be done at layer three, not at layer two as WEP does. LEAP also calls for keys being generated as part of the login process, and requires that all clients have unique keys. The IEEE 802.11 Task Group 1 has been laboring away at the 802.11 specifications to address the initial shortcomings of WEP by developing the WEP2 technical specification. WEP2 specifies 128-bit encryption using the RC4 algorithm, and calls for a scheme that will involve implementing authentication and encryption functions at the software layer (layer 3 and above). Enhanced Security Network, or ESN, is another technical specification that has been proposed for the next-generation of IEEE 802.11 products. ESN will support WEP, WEP2 and AES encryption algorithms, and employs dynamic, associationspecific cryptographic keys. SYS-CON EVENTS W W W.SYS-CON.COM 34 www.WBT2.com J A N U A R Y 2 0 0 2 SYS-CON EVENTS W W W.SYS-CON.COM J A N U A R Y 2 0 0 2 www.WBT2.com 35 WIRELESS PRIMER: SECURITY 3 WAP Gateway – RADIUS Network Configuration QUALCOMM’s Eudora Web browsers now all support SSL, along with the capability to render common wireless markup languages such as WML, HDML, and cHTML. TLS HIGHLY RECOMMENDED MICROSOFT WHITE PAPERS Microsoft has published three useful white papers on implementing IEEE.802.11b networks in the enterprise VPN technology for Windows 2000, and PKI configuration in the Windows 2000 environment: • Making IEEE 802.11 Networks Enterprise-Ready www.microsoft.com/windows2000/techinfo/administration/security/wirelessec.asp • Virtual Private Networking with Windows 2000: Deploying Remote Access VPNs www.microsoft.com/windows2000/techinfo/planning/incremental/vpndeploy.asp • Windows 2000 Server and PKI: Using the nCipher Hardware Security Module www.microsoft.com/windows2000/techinfo/administration/security/win2kpki.asp Transport Layer Security (TLS) 1.0 is a followup to SSL 3.0 and includes minor enhancements to the implementation of SSL dealing with message authentication, key material generation, certificate verification, and alerting. TLS, like other security technologies such as RADIUS, can be used to enhance the security of wireless networks. In the case of the IEEE 802.11 network protocol, TLS can be used in conjunction with RADIUS to enhance the security of local wireless networks. VPN Virtual Private Networks provide private, secure, point-to-point connections between two machines or networks over a shared or public network. To achieve security, local network protocol traffic is encrypted using a tunneling function supported by a VPN protocol such as IPSEC, and split into a series of IP packets for transport across the Internet. All PC-based variants of Microsoft Windows can be configured with a VPN client, including Microsoft Windows ME, XP, 2000, and 98. This makes VPN technology an attractive solution for deployment on mobile SANS INSTITUTE VERISIGN SECURITY RESOURCE WEB SITE BLUETOOTH FORUM SSL RESOURCE WEB SITE SSL OPEN SOURCE WAP FORUM clients installed with Windows ME operating over the IEEE 802.11b wireless network. As Table 3 shows, VPN solutions are also available for both the Pocket PC 2000 and 2002 platforms. Included in this mix is the Microsoft-centric VPN client that ships with Pocket PC 2002. This VPN client with support for PPTP is ideally suited to work with Microsoft’s VPN gateway software found in Windows NT and 2000 server operating systems. Additionally, this implementation has been designed to operate within Microsoft Windows networks by utilizing a primary domain controller for authentication. Overall VPN support for Pocket PC 2000 and 2002, while new, does look promising. This, unfortunately, is not the case for existing PalmOS-based platforms. The main reason for this is the limited processing power and task management capabilities of the embedded CPU and operating system, which, combined, are barely sufficient to sustain a VPN client session over a wireless link and then also execute a browser or network business application to communicate over the VPN session. There is a cost associated with using a VPN connection over a wireless network, however, and that is the reduction in bandwidth available for transport of application data. In cases where bandwidth is particularly tight, performance of application data transmissions will be noticeably degraded and therefore not a practical solution. RADIUS RADIUS, or Remove Access Dial In User Service, is an open-source protocol for performing user authentication and security accounting activities. It is based on a client/server model with support for encrypted communication between the client and the server. The RADIUS protocol is UDP-based, with port 1645 assigned to authentication and 1646 assigned to accounting activities. RADIUS server software is available for a number of platforms, including Windows NT and UNIX. It is interoperable over many network protocols, including the IEEE 802.11 wireless network protocol. In this scenario the wireless LAN access point (AP) forwards all mobile station challenge responses to the RADIUS server for authentication (see Figure 3). Upon validating the mobile station, the RADIUS server responds by sending an encrypted authentication key to the AP for use. Once received, the AP uses this key to securely transmit unicast and multicast authentication keys to the mobile station. WWW.SANS.ORG/ WWW.VERISIGN.COM/ WWW.CSM.ORNL.GOV/ ~DUNIGAN/SECURITY.HTML WWW.BLUETOOTH.ORG/ WWW.MODSSL.ORG/ WWW.OPENSSL.ORG/ WWW.WAPFORUM.ORG/ TABLE 4: Security resources table 36 www.WBT2.com J A N U A R Y 2 0 0 2 SECURING YOUR 802.11b NETWORK To secure your 802.11based wireless network, configure a VPN client on each mobile device, place the access points in a firewall segmented part of your network, define access control lists (ACLs), and configure each mobile device to use a common WEP key. The instructions below outline setup as well as the steps involved in configuring the AP and mobile devices with WEP key security 1. Collect the six-digit hardware MAC addresses of all the mobile devices that will operate on the local 802.11-based wireless network. 2. Using the access point (AP) administrator tool, enter all of the MAC addresses into the list that determines which mobile devices can gain access to the AP. 3. Select (enable) WEP key usage on the AP using the administrator tool. 4. Create a shared, private WEP key. This key will either be five or eight bytes long, and can be a pass phrase or hex string (randomly generated by the AP administrator tool). 5. Enter this shared key into all of the mobile devices that are intended to have access to the wireless local area network (WLAN). RECOMMENDED READING LIST SSL and TLS Essentials —Stephen Thomas Wiley Essential WAP —Damon Hougland, —Khurram Zafar Prentice Hall Voice and Data Security — (Many authors) SAMS J A N U A R Y 2 0 0 2 The RADIUS server is flexible; it can authenticate the user based on an internal username/password list or elect to act as a client (via a proxy) to another type of authentication system, such as those found in Windows NT, Netware, or UNIX. When a user makes a connection of some sort to a remote access server (i.e., WAP gateway), the username and password are sent to the RAS, which in turn passes the information to the RADIUS server for authentication. The RADIUS server will issue either a PASS or a FAIL to the user via RAS. To learn more about the RADIUS specification, visit www.itef.org and search either for RFC 2138 or RFC 2139. For more details about how RADIUS can be applied to secure IEEE 802.11 networks, visit www.microsoft.com/windows2000/techinfo/administration/security/wirelessec.asp. PKI Public Key Infrastructure (PKI) for wireless systems, also sometimes referred to as WPKI, is composed of the following components, including the Certificate Authority (CA) server, the Registration Authority (RA) server, a database system such as LDAP for storing certificates, the mobile-side application that is usually a Web browser preloaded with trusted certificates, a Web server or mobile application platform that supports SSL or WTLS certificates, and an optional wireless gateway server if WAP is being used. In a PKI system, the CA is a trusted agency that digitally signs and distributes certificates used for client and server authentication. CAs can either be a third-party organization, as is the case with CAs such as GTE CyberTrust, VeriSign, Entrust.NET, and Thawte, or internal. Advantages of establishing an internal CA network are added levels of trust and the flexibility to organize multiple CA servers in a hierarchical arrangement to alleviate potential scalability problems. In either case, a master CA, also referred to as root CA, will sit at the top of the CA hierarchy. In addition to issuing certificates, the CA also manages them. More specifically, the CA will determine how long certificates are valid and when they should be renewed, and track those that are no longer valid. The type of information contained in a certificate includes subject identification, key assertion, and the trusted organization that issued the document. The most common standard followed for defining the content of a certificate is the X.509. Certificates used with WTLS are based on the X.509 standard, but are not 100% compliant certificates. The CA can validate a server (the most common usage), the client, or both. Support for client- and server-side certificates is the primary difference between WTLS Classes 2 and 3 in the WAP protocol suite. Please note, it is important to determine whether the mobile application, most commonly a browser, supports client-side certificates and whether it comes preloaded with certificate authority files. In the case of WAP, few browsers, with the exception of Nokia’s, support Class 3 in the WTLS specification, which is the highest level of security in a WAP system using WTLS. Summary Security over wireless networks, as with many other areas of wireless technology, is just starting to mature. Weaknesses in WEP and WTLS have been clearly identified, and newer versions of these technologies (such as WAP 2.0), as well as adaptations of more established technologies such as SSL, ECC, and PKI, are in the pipeline and will be available shortly. In the meantime, look for hybrid solutions that involve mixing various security technologies to shore up the weaknesses of a particular security technology and increase the strength of the overall solution. Wearable and Wireless Computing Converge —continued from page 64 will constantly analyze data and make decisions to provide access to content, services, and entertainment for anyone, at any time, in any place. Indeed, wearable devices will pave the way for gains in mobile computing that entirely transcend our current set of mobile devices and the advantages they offer today. Of course, this change won’t occur overnight, as we can only move as fast as the technology evolves. Companies such as Levi Strauss are already looking to capitalize on the wearable concept, offering a line of jackets that incorporate a hidden MP3 player and mobile phone connected to a remote control and microphone in the collar. Peerto-peer technology companies also continue to proliferate, with P2P technology perhaps playing an important role in the energy conservation challenge associated with wearable devices. Of course, even as we hear about “wireless wallets” and “interactive clothing,” we’re occasionally informed of real mind-numbing advancements like those by the Israeli scientists who developed a DNA computer so tiny that a trillion of them could be combined to perform a billion operations per second, expanding our horizons and challenging issues we might have viewed previously as insurmountable. DNA computers currently have no business applications, implying that people aren’t yet interested. However, if I told you that these DNA computers are being considered for potentially operating within human cells and acting as monitoring devices to detect disease-causing changes and synthesizing drugs to fix them, would the terms “wearable computer” and “proactive interactions” take on a new meaning? FIRST PUBLISHED BY IBM DEVELOPERWORKS AT HTTP://WWW.IBM.COM/DEVELOPERWORKS/. www.WBT2.com 37 M-COMMERCE: M-CAMPAIGN WATCH by David Cotriss M-MARKETING EDITOR Some people think outdoor ads clutter the landscape. I couldn’t help but notice the vast array of billboards for dot-com companies along California’s Highway 101 a few years ago. I didn’t mind them, but then again, I was into the whole dot-com thing. Now most of them have been replaced by other offerings. While it could be argued that there is too much outdoor advertising today, it can be highly effective when combined with other marketing avenues. Who would have Can Billboards Successfully Go Wireless? They’re working out at New York health clubs thought a few years ago that billboards and wireless could have anything in common? In this day and age of new media miracles, several firms are attempting to make the connection. F IVE EQUINOX FITNESS CLUBS IN NEW York’s financial district have installed wall units inside that deliver information to PDAs when they’re aimed at special RF ports on the boards. Creative copy and graphics on the boards, along with in-club stickers and demos, draw users who can download information on all classes, spas, and training. Class schedules are searchable by activity, instructor, and day, and can be added to the user’s daybook. Special promotions and incentives can also be delivered. “This is an easy, timely, and fun way to provide members with information,” explains Equinox vice president of marketing, Kathy Reilly. “It reduces costs to get information to members and is a great branding mechanism since it shows up on their daily plan.” David Cotriss is WBT’s m-marketing editor. 38 www.WBT2.com She says this fits well with the target market since members are affluent and successful, with good wireless penetration. While Reilly couldn’t reveal specific figures, she said she is pleased with the download and response rates. One recent successful promotion offered 10% off a spa treatment, redeemed by showing the page on the handheld. While costs are lower during this proof-of-concept phase, Reilly says all indications are that it will continue and be rolled out to more clubs, even with higher costs. She says plans also include placing the boards outside to reach prospective members. Streetbeam, the company providing the technology, has focused mainly on outdoor phone kiosks and bus terminal ads thus far, mostly in New York. adAlive, a competitor, uses the concept for indoor airport billboards, but sends users travel-related information in addition to an ad. The companies are fairly tight-lipped about their revenue models, but both rely on premium fees charged to advertisers. For the most part, Gartner analyst Mike McGuire agrees it’s too early to tell at what point between convenience and spontaneous purchases a successful business model can be derived from the mobile billboard concept. “This is a great way to leverage existing customers and increase brand awareness,” states McGuire. “For cold prospects, it’s best used along with other marketing methods.” Equinox’s model is similar to that of opt-in e-mail, where regular communication can be maintained with customers. Both companies have reported advertiser success, but numbers are hard to come by. Another question is whether the concept could work in other countries. As with most overseas marketing programs, McGuire agrees it depends largely on the culture. In a way, I miss those dot-com billboards, let alone the whole dot-com craze. Fortunately, wireless is even allowing billboards to innovate. Now if I could just get a PDA. [email protected] J A N U A R Y @ 2 0 0 2 IMARK COMMUNICATIONS W W W.EXPO4MOBILE.COM J A N U A R Y 2 0 0 2 www.WBT2.com 39 M-COMMERCE 40 www.WBT2.com J A N U A R Y 2 0 0 2 M-COMMERCE The wireless Internet has become a way of life for Japanese consumers. What will it take to create a similar experience for North American users? NTT SOFT thinks they have the answer and they have set up an ambitious plan to achieve their goals. ver the past decade, NTT’s wireless division, NTT DoCoMo, has developed the mobile communications technology that has given Japanese consumers access to more than 40,000 Internet sites as well as more traditional online services. NTT DoCoMo, with their i-mode platform for wireless voice and Internet communications, has amassed over 28-million subscribers, or about 20% of the population of Japan. As you can see in Table 1, Japan commands an impressive share of the global market for m-commerce. Projections show that Japan will retain a major share of revenue generated from m-commerce for the next one to two years. Wireless technology is well suited to the lifestyles of Japanese consumers. Japan is a very mobile society in which time spent commuting to and from work represents a sizable portion of the working day. For this reason, mobile computing and wireless products are important tools in making travel time a productive extension of the physical office. Commuting time and business travel also create the opportunity for personal use of the Internet in the form of commercial transactions, entertainment, and information services. There are other ways in which mobile communications and computing devices are suited to the special needs of Japanese consumers. The popularity of home computers is not nearly as O J A N U A R Y 2 0 0 2 widespread in Japan as it is in the U.S. Many people who do not own or do not use home computers to access the Internet will purchase a mobile phone for Internet access. In this respect, mobile phones have three distinct advantages: (1) they are much simpler to operate, (2) they are much less expensive than wired access, and (3) they allow the user to avoid the expense of purchasing a home computer. Unlike other countries, Japan enjoys certain advantages in the nature of its market that set it apart from other major world markets. One key advantage in Japan is the presence of universal engineering standards for telecommunications products and services. Universal standards have certainly accelerated the adoption and acceptance of mobile phones in Japan. They enable NTT DoCoMo to deliver a wider selection of content to mobile subscribers along with lighter, more attractive handsets designed for convenience and ease of use. by Junichi Threat The North American Market By contrast, in North America the marketplace for wireless and mobile products is subdivided into operative zones based on the prevailing types of technology that are dominant in that particular area. In North America, there are no universal standards for interoperability between devices and across networks. This absence of national standards for protocols, connectivity, infrastructure, applications, and services must be overcome in order for the U.S. to become a real powerhouse in the global wireless technology arena. This diversity of standards is due to the very competitive nature of American culture and the innovative mindset that is always seeking a cheaper, faster, and better alternative to the traditional way of doing things. To be sure, these innovative qualities are also embedded in Japanese culture, but the considerable diversity to be found in North America cer- Junichi (JT) Threat is cofounder and EVP of Vuico’s international operations. JT gained his business experience by founding and selling two successful systems integration and international consulting companies. He has 18 years of international business development and IT consulting experience. Recently, he was the president and CEO of JQuest, Inc., an international consulting company that specialized in building Japanese and North American joint business ventures. @ [email protected] www.WBT2.com 41 SOURCE: JUPITER RESEARCH COMPANY M-COMMERCE WORLD ELECTRONIC COMMERCE VIA WIRELESS INTERNET (M-COMMERCE) MARKET FORECAST (2000-2005) Table 1: Global m-commerce market tainly impedes the voluntary adoption of uniform standards and manufacturing processes. And yet, that is exactly what has to happen for m-commerce to become as pervasive and profitable as it is in Japan. Challenges of the North American Market Unlike the Japanese market, North American wireless subscribers’ access to the Internet is somewhat limited. Although many North American wireless users have wireless Internet capabilities, only a small proportion of these subscribers actually use them. In my opinion, the main problems with the wireless Internet in North America are briefly: • The lack of a robust wireless application infrastructure to enable the rapid deployment of useful wireless-specific applications • Wireless users do not have the wealth and diversity of content they are accustomed to from other channels • Users are not content with the different pricing models for wireless Internet usage The lack of enthusiasm for wireless Internet services in North America seems to stem from mobile users not being able to access Internet applications as easily as they can on their home and office desktops. Presently in North America, most wireless personal communications services (PCS) carriers are delivering a weak imitation of the Internet experience to their subscribers. PCS carriers should use more restraint in the way they market the wireless Internet. Wireless users believe the hype and expect to experience similar processing speeds and the same range of 42 www.WBT2.com content they receive from wired access. Unfortunately, the reality of today’s wireless Internet in North America is that users cannot expect graphic-rich Web content; all they see is a compressed menu of text-based information. Today, North American PCS carriers strive to increase access speeds and require users to equip themselves with resource-intensive PDAs and mobile laptops in order to have full access to the Internet. I don’t look at this as a consumerfriendly long-term solution. In order to overcome the problems I just described, I believe it is necessary to focus on developing wireless-specific applications that can enable any wireless device to access any content, instead of content that can be seen only on more powerful devices. Instead of trying to duplicate the wired Internet experience, the focus should be on developing robust wireless-specific applications and offer content that is most useful and of greatest value to mobile users. In Japan, NTT DoCoMo has found that creating the most satisfying wireless Internet experience for their wireless customers is the only way to capture market share. Another problem in North America stems from PCS carriers trying to duplicate the wired Internet experience on wireless devices. In this respect, they fail to consider the fact that wireless Internet content is viewed differently and therefore will likely be used differently. For example, when wireless users are on the road, they are more likely to access e-mail, airline reservation schedules, and traffic information rather 3than apply for a mortgage loan or download graphic-rich Web content. Certain sites are inherently more useful to a mobile customer than others. Although North American PCS carriers try to approximate the wired Internet experience on wireless devices, they do not retain the wired Internet pricing structure of a monthly fee for unlimited Internet access. Per-minute user rates may not be the best pricing scheme when carriers don’t offer enough wireless-specific applications, desired content, and functionality to ensure a satisfying Internet experience. 1 Supply and demand: the m-commerce cycle J A N U A R Y 2 0 0 2 The Japanese Experience Powerful capabilities could finally drive a global standard for a wireless Internet by Junichi Threat J J A N U A R Y 2 0 0 2 www.WBT2.com 43 M-COMMERCE INTERNET NTT DoCoMo’s experience in developing the THIRD GENERATION FOMA TECHNOLOGY AND BLUEGRID i-mode service rested on their insight into customer requirements and their decision to merge wireless and Internet technology as opposed to building countless bridges between two distinct and mutually exclusive domains of techSuppliers/Customers Purchasing, Procurement, e-marketplace nology. From the first, NTT Sales, Maintenance, etc. DoCoMo recognized one imporExisting trading partners & customers tant fact about wireless Internet services and m-commerce: as is true Front office in the wired Internet arena, it was INTERSTAGE understood that when more people use Application Server the wireless Internet, the cost of Security, traffic control access should get cheaper, along with Front office the cost of doing business transacINTERSTAGE Middleware INTERSTAGE Network tions. Existing Online Portal Server Access Server System INTERSTAGE As a result, the products and servIntegration INTERSTAGE Server Application ices that wireless users buy should ERP/EDI Server INTERSTAGE become cheaper and, of course, profits Application Server from products and services sold by application and content providers should be higher as Mobile phone customer sales volumes increase. This cycle is illustrated in Figure 1. Of course, the most important reason for implementing NTT DoCoMo’s i-mode service was the potential revenue it was expected to add to the bottom line. Company executives were expecting declining prices for voice services, and wireless Internet services were simply another way to improve the bottom line. They wanted to prevent their wireless service from being reduced to a commodity along the lines of long-distance apan’s fascination with NTT DoCoMo’s mobile Internet service appears to have carriers. taken root as a cultural as well as commercial fixture. The demand among NTT DoCoMo had already invested substanJapanese consumers for next-generation wireless Internet services is the prime reatial amounts in their wireless infrastructure and son why NTT DoCoMo, Japan’s leading provider of mobile telecommunications and had a substantial base of existing customers; the data services, is bypassing the interim 2.5-generation level technology in favor of true more customers who could be persuaded to use third-generation commercial broadband CDMA services. their services, the better. NTT DoCoMo also As a result of their wholesale embrace of the mobile Internet, NTT DoCoMo is expectwanted to distinguish their services from the ed to lead the wireless market at least through 2003 and possibly beyond, due to a couple competition and give current and prospective of factors operating strongly in their favor. NTT’s Cyber Communications Laboratory customers better value for their money. Group, the R&D muscle behind the Japanese telecom and Internet boom, is currently According to Ryoichi Hosoya, NTT SOFT’s EVP developing the technology that will become the foundation of 4G and 5G mobile of R&D and marketing, NTT DoCoMo’s goal was telecommunications networks. The other asset in NTT DoCoMo’s corner is the aggressiveto encourage their current and prospective cusly innovative mindset that drives design and development in all areas of Japanese industry. tomers to use i-mode to conduct m-commerce As many of you already know, the latest offering transactions. There was a general consensus that from the group that created i-mode is a 3G mobile in order to spur m-commerce in their wireless communications platform called FOMA (Freedom of Internet services, they would have to: Mobile multimedia Access). FOMA promises users a • Reduce the cost of wireless Internet access panoply of benefits that target the shortcomings of the • Quickly develop robust, wireless-specific mobile phone/mobile computer. Built on the applications WCDMA system, and compliant with IMT-2000, an • Offer content that customers want to use international standard for 3G mobile communica• Offer a satisfying Internet experience tions, FOMA promises voice transmission clarity on a par with fixed-line terminals. It supports diverse multi“NTT DoCoMo developed a common set of media content designed to accommodate and enliven goals and carried out a focused strategy to DoCoMo’s i-mode package of mobile Internet access achieve them with a high level of discipline and and services. FOMA also pushes the envelope by intensity,” Mr. Hosoya explains. “The company offering a videophone and music-video content via had the foresight to create i-mode at a time when DoCoMo’s i-motion and M-stage services. the Japanese market for mobile phones was reaching maturity and users were in need of new —continued on page 47 services. These services could not be provided WIRELESS EDGE W W W.SYS-CON.COM 44 www.WBT2.com J A N U A R Y 2 0 0 2 WIRELESS EDGE W W W.SYS-CON.COM J A N U A R Y 2 0 0 2 www.WBT2.com 45 M-COMMERCE DR. SEISHIRO TSURUHO, PRESIDENT AND CEO, NTT SOFT MR. RYOICHI HOSOYA, EVP, R&D AND MARKETING, NTT SOFT 2 46 unless customers were given full access to the existing network of conventional Web servers to provide a seamless connection between mobile phones and the Internet.” With that in mind, NTT DoCoMo created a prominent wireless Internet portal similar to AOL in the wired Internet access arena. Yoshiki Mitani, NTT SOFT’s senior manager, Internet Solution Division, explains NTT DoCoMo’s approach to customer retention: “NTT DoCoMo provided so many services that the users had no conceivable reason to leave. The company wanted to own the wireless user’s experience from beginning to end. They encouraged loyalty and got wireless Internet service customers deeply involved in our services by providing customers with an easy add-on optional service to personalize their wireless portal experience.” NTT DoCoMo also targeted enterprise and corporate users by offering robust wireless applications that can access corporate systems and intranets. They designed wireless applications that allow subscribers to access corporate data from anywhere. Having built the foundation, NTT DoCoMo was in a unique position because they controlled the wireless gateway that linked the wireless Internet connections to the content providers and the product and service providers. A small portion of every m-commerce transaction added up to a very significant new revenue stream for NTT DoCoMo. Not satisfied with merely keeping pace with their competitors, senior management declared a corporate mission to surpass and lead the rest of the world in offering cutting edge wireless Internet services. To do that, NTT DoCoMo hopes to create a new “mobile culture” by integrating the Internet with the mobile phone. Mr. Hosoya explains that NTT DoCoMo embraced the Japanese people’s desire for highquality products and services. “NTT DoCoMo applied the inherent Japanese trait of adding innovative features and building in the quality that makes our products cheaper, faster, and better than any other products in the world.” Bridging cultures: Vuico will anchor NTT SOFT’s wireless campaign in North America www.WBT2.com NTT SOFT’s North American Strategy How will NTT SOFT reinvigorate wireless and mobile technology in North America? The answer lies in NTT SOFT’s Content Solution Suite. NTT SOFT immediately sensed that consumers in North America would welcome the same advantages as the Japanese. As Dr. Seishiro Tsuruho, president and CEO of NTT SOFT, explains, “We discussed the business opportunity of bringing NTT SOFT’s Content Solution Suite to North America and found the idea was well received by senior management. The first step in that process was to nominate a suitable technology partner in the U.S. market to provide localization and marketing insight into what we perceived as a dramatically different landscape with altogether different challenges to overcome.” “We selected Vuico, Inc., a Houston-based wireless and mobile computing software development company, because the management team has the experience to adapt and market NTT SOFT’s Content Solutions Suite to the target market that NTT SOFT was most comfortable with,” Dr. Tsuruho says “We believe that with Vuico as our partner, we can reinvigorate the wireless and mobile computing landscape in North America by promoting the technology and standards pioneered by NTT SOFT.” NTT SOFT expects Vuico to achieve rapid penetration into the North American market and provide optimum value for consumers. Their first step will be to customize BlueGrid products for the OEM and carrier markets and to deliver these products through licensing agreements and annual contracts (see Figure 2). BlueGrid is a client-server software foundation that facilitates the connectivity and communication of wireless devices, such as cellular phones and PDAs, to server-side applications. This enables wireless devices to perform true mobile computing. As Dr. Tsuruho puts it, “Right now, mobile devices can only imitate the features and functionality of a desktop. We want to close the gap and BlueGrid is a big step in that direction. It’s the link between mobile devices and servers and the means to accelerate the development of mobile applications.” For the handset and PDA OEMs, Vuico products feature preinstalled BlueGrid and complementary applications and content. For ISHVs, BlueGrid products offer a comprehensive end-toend wireless solution involving client, server, and wireless services. In similar licensing arrangements to serve wireless subscribers, Vuico offers bundles of customized applications, tools, and games that enable carriers to drive more bandwidth usage. By targeting the OEMs and wireless carriers first, Vuico will be building the fundamental client-server infrastructure for their applicationconnectivity software in North America. This proposed infrastructure is fully compliant with J A N U A R Y 2 0 0 2 J A N U A R Y 2 0 0 2 THIRD GENERATION FOMA TECHNOLOGY AND BLUEGRID —continued from page 45 With FOMA and i-mode gaining more attention in markets outside Japan, NTT DoCoMo is focusing on the work of developing the applications that will turn their latest smart mobile device into an all-purpose accessory as indispensable and universal as an electronic wallet. One giant leap in that direction occurred with the introduction of the Java-enabled cell phone. Java extended the range of applications available to cell phone users to include the full range of the most popular entertainment and business programs. These applications require a close and reliable collaboration between the SHD (smart handheld device) and server-side applications through a network. That means communication becomes the key issue for improving the flexibility and interactive qualities of mobile applications on platforms that operate on a wireless network. Developing wireless-specific applications is a process that is mined with formidable technical challenges that can limit scalability and reliability and delay time to market for new applications. To overcome this hurdle, NTT SOFT, a sister company and key technology partner of NTT DoCoMo, created a specialized developmental tool called “BlueGrid.” BlueGrid is an advanced mobile communications middleware that supports easy development and scalable execution by enabling the collaboration of J2ME CLDC (connected limited device configuration) and J2EE. To developers of applications for wireless-specific devices, that means: • Minimum development costs and reduced time to market • Scalability and high reliability of applications Java currently leads the pack as a preferred wireless middleware platform programming language. In a chaotic market in need of global versus regional standards, Java’s growing dominance at least gives wireless markets a foot in the door toward the distant beacon of a seamless global wireless device. To further enhance the power of FOMA, i-mode, and all other Javaenabled wireless devices, NTT SOFT made significant enhancements to BlueGrid. The new version of BlueGrid is called “BlueGrid for Web Services” and is far more powerful than the current version and much more advanced than any similar technology on the market. NTT SOFT and their key technology partners in Japan and the U.S. are convinced that this new product is equally suited to the U.S. market. They are also convinced it will solve many of the problems that are keeping the North American market from adopting the kind of next-generation wireless solution that is already available in Japan. Although BlueGrid for Web Services has already passed all final beta tests, it will not be available until April 2002. The new product is now being localized for the North American market and will be simultaneously available in Japan and in the U.S. Detailed technical data on BlueGrid for Web Services is not yet available in English. NTT SOFT believes that wireless technologies will continue to evolve and compete in the next few years. In the meantime, they are concentrating on building strategic partnerships as the key to long-term survival. One of NTT SOFT’s chief BlueGrid architects commented: “Wireless technologies will slowly begin to unify in years to come, but for now we are focused on choosing the most advantageous business alliances. Naturally, we would like FOMA and BlueGrid to be as popular in, say, North America and Europe as they are in Japan, and that will depend on finding the right partners to localize and position these products to appeal to a very different kind of market than what we have here.” The FOMA/BlueGrid combination presents an attractive alternative to the patchwork technologies competing for regional market share. How the market responds will depend on the willingness of wireless executives to broaden their view beyond their own fixed horizons. For a general overview of BlueGrid, see http://www.ntts.co.jp/java/bluegrid/en/web-services_en.html www.WBT2.com 47 M-COMMERCE the global standards set forth by NTT DoCoMo and NTT SOFT. Vuico’s next step will be to deliver a software development kit (SDK) to content providers, including applications developers, and vendors, consultants, and system integrators. Vuico’s SDK will enable all types of wireless devices and appliances to gain access to server-side applications by facilitating the rapid development and deployment of applications created by Web developers, as well as traditional programmers. Vuico also intends to develop key sales channels to the enterprise with system integrators, alliances, partnerships, and resellers. Vuico’s approach to the enterprise will be that of traditional vertical market development in which vertical specialists will be authorized to offer Vuico products and services aimed at specific vertical industries. Currently Vuico is in the funding stage in which key business development efforts are designed to leverage the current leadership position of NTT SOFT. Upon completion of the funding round, Vuico will develop a world-class management team that will guide further development and delivery of wireless software, including Vuico MX (Mobile Expansion Pack), wireless application servers, and 3G- and 4G-specific applications. While BlueGrid will be an effective tool for Web developers and content owners to extend Web applications into a wireless environment without prohibitive development costs, MX will give hardware and software OEMs and wireless carriers the benefit of rapid mass-personalization of content. Together, BlueGrid and MX will give Web developers a wireless software infrastructure that paves the way for the rapid development and deployment of wireless applications. This in turn will make smart phones more appealing to consumers who want all the benefits of m-commerce. This is proven technology built to standards that have been well tested in Japan. Looking ahead, NTT SOFT and Vuico will remain focused on the consumer. Ultimately, NTT SOFT’s North American venture will depend on the customer’s perception of the value that these products add to their lives. Dr. Tsuruho’s direct approach to marketing NTT SOFT’s technology in Japan will continue to guide NTT SOFT’s efforts to build a following for their wireless solutions in the U.S. and Canada. “If the value is there, then success, no matter how elusive, will follow in time.” FOCUS ON TECHNOLOGY PRODUCT REVIEW Pocket PC 2002 Is Enterprise-Ready with a Built-in VPN Client ith the release of Pocket PC 2002, built-in VPN client support is now available. That’s the great news for wireless enterprise users; the not-so-good news is that it is a Microsoft-centric PPTP VPN implementation. Furthermore, the VPN has been internally configured to launch only when accessing any of the following Windows network resources that might be available on the enterprise network: • Windows network share (\\servername\share\) • Microsoft Exchange server Inboxes • Internet proxy server (using the http://servername/ form; Internet addresses containing periods will not initiate a VPN session) W When any of these network resources are requested, a PPTP VPN session is first created before any network application data is transferred as part of the overall request. Pocket PC 2002 VPN Configuration To configure the VPN client, first navigate to “Settings” which is found on the “Start Menu” and select it. Next, find and select the “Connections” tab found in the horizontal tab menu set located along the bottom of the screen. Locate the “Connections” icon and select it. The Connections Manager tab form (see Figure 1) will contain three selection groups, with the first two having associated “Modify” and “Connect” buttons. The first group specifies the Internet connection and will factory default to “Internet Settings,” the second group controls work network connection properties and will default to “Work Settings,” and the third group determines what network card (i.e., Ethernet card, dial-up modem, or wireless RF modem) will be used. This option will default to “The Internet.” The Internet connection group allows you to define the remote access account. Settings associated with this particular group include connection name, modem, and baud rate. Additional advanced tabs available as a part of this group include port and TCP/IP settings. The work network connection properties allow you to define multiple connection properties, and also include a VPN connection tab (see Figure 2). The VPN connection form is very simple, allowing you to specify the name and IP address of the PPTP-friendly VPN gateway system of your corporate IT infrastructure. In addition to the VPN tab, you can also specify a network proxy configuration under the “Proxy” tab. To automatically connect to the Internet using work property settings, check the “This network connects to the Internet” found in the “Proxy Settings” tab. A detailed overview of the Connection Manager is available on Microsoft’s Web site: www.microsoft.com/mobile/pocketpc/tutorials/connectionmanager/article6.asp 48 www.WBT2.com 1 The Connections Manager tab 2 The Work Settings VPN tab Finally, it is important to note that the configuration of the VPN server ideally requires using the VPN software component included in Windows NT or 2000. If a non-Microsoft Internet security system is being used, then be sure to specify a PPTP VPN gateway type using PPTP tunneling coming across port TCP/1723 and using MSCHAP for extended authentication. The primary and secondary DNS assignments should also be set for automatic assignment. Pocket PC 2002 VPN Testing Bed To establish a quick test bed for testing the Pocket PC 2002 VPN client, configure the single dial-in user account that is available with any instance of Windows 2000 Professional. This single dial-in account can be configured to host a single remote VPN session. Once this has been configured, manually initiate a VPN connection on the Pocket PC 2002 by completing the following steps: 1. Configure the wireless modem, and verify that the modem can establish an RF link using the device driver’s software. 2. In the Connections tab form, set the first list box to “Internet Settings,” and then select the “Connect” button. (Perform this step to establish the Internet connection.) 3. Make sure “Work Settings” is selected in the second list box, and select the “Connect” button here as well. (Perform this step to establish the VPN session.) If network path resolution continually fails during testing, one important troubleshooting tip is to determine which WINS server IP addresses the VPN client is obtaining, and verify these against what you are expecting to see. Summary The Pocket PC 2002 VPN client is a free PPTP Microsoft-centric VPN solution. If your Internet security device supports a different VPN protocol such as IPSEC, then consider investigating other vendors’ VPN client solutions. The list of third-party VPN clients includes Certicom (www.moviansecurity.com), ColumbiTech (www.columbitech.com), NetMotionwireless (www.netmotionwireless.com), and V-One (www.v-one.com). Company Info: Microsoft Corporation One Microsoft Way Redmond, WA 98052-6399 Telephone: 425 882-8080 Product Information: www.microsoft.com/mobile/pocketpc/software/features/vpn.asp Pricing: Included free with the Pocket PC 2002 OS Overview: A built-in PPTP VPN client that has been optimized for providing a secure session when accessing Microsoft-specific network resources. Supported connection devices include dialup, Ethernet (both wired and wireless), and cellular modems. J A N U A R Y 2 0 0 2 ICONVERSE W W W.ICONVERSE.COM SYS-CON MEDIA W W W.SYS-CON.COM/SUBOFFER.CFM J A N U A R Y 2 0 0 2 www.WBT2.com 49 GLOBAL SERVICES You feel like an emasculated geek; you have to feel that low when you get off the plane in Hong Kong or London or Cape Town and suddenly, your wireless devices do not work. They just sit in your pockets, useless, and bigger than the loss of any cool, is that you are simply out of touch, unreachable. Big deals may be pending – clients may be screeching for attention – but none of this will come your way because the probability is enormous that, abroad, your wireless devices are so much inert plastic. 50 www.WBT2.com J A N U A R Y 2 0 0 2 GLOBAL SERVICES A nd that is definitely not the promise of wireless. Business travelers accordingly feel let down, betrayed even, when they travel abroad, and nowadays this message is hitting home. “There’s a need for seamless telephony for global travelers that carriers recognize,” says Andrew Cole, leader of the global wireless practice at consulting firm Adventis. Increasingly, too, carriers are taking steps to satisfy this need: “Carriers now are seeking to meet the demand for world phones,” says Cole. How? Two years ago there were no easily available global roaming options for U.S. customers, but that changed in April 2000 when Nextel “was the first to come out with global roaming,” says Gary Jankowski, a Nextel senior marketing manager. What Nextel offered was a one-phone, one-number solution that meant a Newark, New Jersey executive could get off the plane in Heathrow or Frankfurt and his cell phone would work, both for making outgoing calls and receiving incoming ones. The system wasn’t perfect – coverage in foreign countries wasn’t necessarily flawless – but it pretty much delivered worldwide voice roaming, and right there Nextel had launched a revolution. The Nextel announcement in turn triggered an avalanche of competing offerings – VoiceStream, Cingular and AT&T all market some form of world phone service – but there are facts to know here and a first fact is that, wishes aside, we are nowhere near a world of seamless interconnectivity for wireless devices. What works conveniently and affordably in New York and London may not work in Santiago, Chile, almost certainly will not work in Tokyo, and definitely won’t function at all in Argentinian Patagonia (although there are options there – stay tuned). In most places, most of the time, however, global roaming for voice works well, and the fact is, there isn’t much that’s complicated in setting up such services. Three components are needed, says Blake Svensrud, CEO of WorldCell, a provider of global wireless services. Svensrud ticks off the building blocks: J A N U A R Y 2 0 0 2 by Robert McGarvey Robert McGarvey has covered the Web since 1994 for magazines ranging from Technology Review to Upside. He is the author of the best-selling book How To Dotcom and a contributing writer to various SYS-CON publications, including Wireless Business & Technology and Web Services Journal. @ [email protected] www.WBT2.com 51 GLOBAL SERVICES • Bilateral, intercarrier roaming agreements. • Data clearing between the visited and host network. This involves both validating that the visitor has a right to use the network and also providing the user’s home carrier with data for use in billing. • Financial settlements (where visited networks are compensated for use of their facilities). 1 2 52 Front view of interWAVE’s Network-In-A-Box (NIB) solution (complete GSM network in the size of a PC tower) Back view of interWAVE’s NIB solution, including the SMC, BSC, BTS www.WBT2.com None of that is new, all of it has been thoroughly demonstrated, and so – quite realistically – world travelers have a right to expect cell phone service in large parts of the world. A fourth necessity mentioned by many analysts is the need for reliable fraud prevention tools, and this is a hitch that sometimes blocks users from accessing the cell phone services they feel entitled to. As digital technologies have spread, worries about fraud have diminished but they have not vanished, and the upshot is that sometimes cellular network access will be denied legitimate visitors because the system has detected the possibility of fraud. This is an understandably huge aggravation to travelers but there are no predictions about when fraud will become so inconsequential that there will be no more denials of service. For now, the clear message is: “work with your carrier before you leave to ensure you get the service you expect,” says Audrey Schaefer, director of corporate communications for Nextel. Even when a user does that, however, it doesn’t mean world phone service has reached a reliable level of usability. Here’s why: “The technology for providing a world phone for voice is adequate,” says Cole, “but very inadequate for data. It is proving difficult to have data services roam with world travelers.” Stay tuned for more on that because this may be the thorniest and ugliest issue in today’s global wireless world. no handset maker is backing off world phone development, either. Still, one problem that plagues all world phones is that their existence may be unknown to possible buyers. Carrier support for high-end phones has been slender. Most carriers are preoccupied with driving up subscriber numbers, and the usual bait is a free or very low-cost plain-Jane phone. Pricier models are left to languish, frequently with little visibility, in retail shops. One upshot: all handset makers realize that to sell world phones, they themselves will have to carry a heavier marketing burden and so far, with overall sales proving sluggish in the recessionary economy, the big handset makers are hanging back from spending these dollars. Even so, at Siemens for instance, development of world phones remains aggressive, according to Seiche. The company offers several models (including the spiffy S40, supported by Cingular). Going forward, Seiche and Siemens are convinced this market can only get bigger and the reasoning is scrupulously bottomline oriented. “Carriers need new ways to generate revenues and global roaming will do that,” says Seiche. This is all the more critical because no analyst thinks the carriers’ current strategy of recruiting subscribers by dangling very low-cost plans will result in near-term profit improvements. Carriers need to be hunting for products and services to sell to high-end customers, and featured on any list of high-end products is global roaming. That is a big reason why optimism continues to reign in this niche. GSM Rules Another issue fueling the spread of global roaming: international cell phone carriers have aggressively penetrated the U.S. market. “Global alliances among carriers will make global roaming easier,” says Seiche, who points to Deutsche The Globe in Your Hands Telekom’s acquisition of VoiceStream in June First, feast on the good news, and a bright spot 2001. “The future is getting brighter for global is that handset makers are racing to give road roaming,” says Seiche. warriors dependable wireless What is the present? Pretty tools. “The market for world good, if the user carries a GSM phones is definitely growing,” phone, says Priscilla Lu, CEO of says Florian Seiche, vice presiSanta Clara, California-based dent and general manager of interWAVE Communications, a mobile phones at Siemens. developer of software and hardBuyers will be traveling business ware for cellular networks. professionals or “those who “GSM has a clear lead that will want the latest in technology, only widen,” says Lu, who indiwhether they travel extensively cates that GSM bands claim or not,” says Seiche, who indi70% of global digital subscribers cates that these are small but (and 65% of all cellular substill significant target groups. scribers). “GSM is the closest to Siemens isn’t alone. Nokia, being a global standard,” agrees Motorola, and Ericsson are all Roger Quayle, CTO of steaming forward with world IPWireless, a developer of phone development programs. Dr. Priscilla Lu broadband wireless data soluNobody, frankly, seems to be interWAVE chairman and CEO tions. recording substantial sales, but J A N U A R Y 2 0 0 2 The Accompli 009 is a tri-band device that features a speakerphone. But the unit’s core function is data. building out domestic GSM networks. Nobody predicts that GSM will soon surpass competing technologies in the U.S., but even for customers who use different networks, there’s an easy solution: multiband phones that also feature GSM. “That’s how we provide our users with global roaming,” says Nextel’s Jankowski, who explains that subscribers carry a phone equipped to operate both on the Nextel iDEN network and GSM networks. “For our subscribers that’s the easiest solution,” says Jankowski. Service Face-Offs Brief looks at four competing programs give quick insight into how these services work: • Nextel: Nextel’s Worldwide Service lets subscribers (numbering around 100,000, according to Nextel’s Schaefer, use one phone, one number in 80+ countries around the globe. Rates range from 20¢ per minute in much of Canada to $1.29 per minute in most of Mexico and western Europe, and rarely top $2.99 (India). “A call that might cost $6 from a London hotel would cost only $1.29 using our phone,” says Schaefer. “We offer maximum convenience at a good price,” says Jankowski, who indicates that the Nextel world phone (a Motorola i2000plus) operates on the 900MHz GSM band. A hitch for Nextel – one that all carriers face in one way or another – involves SMS messages. “You’ll receive your messages when overseas, but you won’t be able to reply or initiate new messages,” says Jankowski. Note this, however: no carrier can offer better, for reasons revealed below. • VoiceStream: “With our ownership, global roaming is very important to VoiceStream,” says communications director Kim Thompson, who indicates that from the get-go VoiceStream and its parent, Deutsche Telekom, have J A N U A R Y 2 0 0 2 planned to offer subscribers competitively priced international calling. Simplifying matters: VoiceStream is a GSM network. Service is available in about 80 countries and per-minute rates vary from 99¢ (in 26 European countries) to $4.99 (Indonesia, Russia and a few other exotic locations). The only requirement for subscribers to access VoiceStream’s global calling capabilities: they have to buy a designated world phone, either an Ericsson T28 or Motorola’s P280. What about wireless data abroad? Thompson acknowledges it’s not yet a reality and she also says “we do not yet have a time frame of when it might be available.” • Cingular: “Global roaming is a critical service for a segment of our business customers,” says Tim Hogan, vice president for business marketing with Cingular. Cingular’s rates are stiffer than their competitors’: $2.49 per minute for outgoing calls, $3.99 per minute for incoming, and prices are applied to all 67 countries where Cingular has roaming agreements. But, according to Hogan, the users who want world phone services tend not to be especially price-sensitive. The usual must-have is a world phone capable of operating on three GSM bands (1900MHz in the U.S., and 900 and 1800 MHz abroad). Cingular customers can choose between an Ericsson T28 or a Nokia 8890. With somewhat more optimism than other carriers, Cingular admits that wireless data abroad is a problem but, insists Hogan, “we are working on solving this with our international partners. For our customers, wireless data goes hand-in-hand with voice. We see reliable data roaming as a paramount need and we will offer it abroad.” When? Hogan is less explicit about the time frame but, he promises, for Cingular this is a high priority. “We need to tweak our international roaming agreements to cover data and that is a process we are beginning.” • AT&T: AT&T’s WorldConnect is the only major carrier that imposes an extra monthly fee for users of their global roaming service ($7.99), and calls are charged at 99¢ per minute plus applicable international long distance charges (which vary from 35¢ per minute in western Europe to 95¢ in Africa). AT&T Wireless customers can use any of nine phones (handsets from Ericsson, Nokia, or Motorola) for international roaming. 3 interWAVE’s operation and management system with a NIB including the SMC, BSC, BTS 4 5 www.WBT2.com 53 GLOBAL SERVICES Globally, GSM is especially strong in Western Europe (where it claims about 365million subscribers, according to GSM Association data); Asia Pacific (203-million subscribers); and Africa (28-million subscribers). Paradoxically, it is weakest in the U.S. (13-million subscribers in the U.S. and Canada), but that number may be vaulting upward as VoiceStream, Cingular, and AT&T all throw dollars at GLOBAL SERVICES What about the others? Virtually all U.S. carriers offer some kind of global roaming – and analysts believe that going forward, offerings will get richer, costs will drop, and eventually callers will truly experience something near a seamless network where one phone will in fact work pretty much universally. By when? “I’d say within three years,” says IPWireless’s Quayle. Data Busters So, why is data proving to be the global sore spot? While the mechanics of voice roaming are well-understood – the industry has over a decade of experience administering voice roaming pacts and there’s plentiful technology for validating users and billing for time – there is no history with data roaming. Case in point: How is data charged? By time (as with voice), or by byte? How are systems established to have data follow the user as he or she travels from country to country? How are visitors validated? Nobody knows the answers yet and the upshot is that, in most cases, data doesn’t figure into current global roaming plans. This isn’t strictly a U.S. issue, either. Rollouts of GPRS data networks in western Europe, for instance, have been hindered by substantial incompatibilities between networks and – although western European users are much more reliant on wireless data than U.S. users – data roaming there is proving to still be the stuff of fantasy. Systems simply aren’t in place and while analysts speculate that markets could be huge – for example, Katrina Bond, an analyst with Analysys, has predicted 6-million GPRS subscribers in Europe by year-end 2002 – those same analysts aren’t optimistic that the intercarrier kinks will be ironed out anytime soon. The result: global wireless data roaming simply is on hold, for now. Is it in fact possible to deliver global wireless data? A vivid proof comes from Inmarstat, a UKbased satellite communications company that offers a genuinely global service. “We cover 98% of the globe,” says Stephen Rogers, the company’s director of marketing communications. “The 2% we don’t cover are the North and South Poles.” Initially founded to serve an ocean-going clientele, Inmarstat – which offers both voice and data services – lately has begun selling into enterprise and it’s been put into service everywhere from Afghanistan (where war correspondents use it to connect with home offices in the U.S. and UK) to North Sea oil rigs. Voice pricing is a competitive $2 per minute and data – which can be anything from digitized news footage to faxes to computer documents – is $7 per minute, says Rogers, who points out that while the data price may seem hefty, Inmarstat can actually connect (via its own satellite network) pretty much wherever world travelers go and, importantly, “our transmission rate is 64K, much faster 6 7 54 www.WBT2.com than the 9.6 offered by cell phones, when they can connect,” says Rogers. “We launched the world’s first global, wireless packet data service and we still are unrivaled.” One hitch with Inmarstat: users need a proprietary, pricey (about $2500, says Rogers), and bulky (about five pounds) unit that does multiple duty as a voice phone, fax, and data terminal. “This is a B2B product,” concedes Rogers and, fact is, at that pricing, only well-heeled companies with a keen need to communicate everywhere will likely loom as significant Inmarstat targets. Mass Market Movers For most users, Inmarstat plainly is not a viable alternative, but just when the goal of worldwide wireless data seems elusive, Motorola is now entering the scene with its Accompli 009 phone pictured earlier (about $650), a tri-band GSM device that features a speakerphone. But this unit’s core function is data. “It was designed as a data device; we added phone functionality later,” says Motorola marketing manager Allan Spiro. “Tremendous buzz” surrounds this product, according to Spiro, who says Motorola found it for sale on eBay months before it hit the market. “People want it because it truly solves a need,” says Spiro, and that need, of course, is for affordable data globally. Does the Accompli 009 deliver? Not exactly, at least not yet, Spiro admits. Users will have access to wireless e-mail, WAP browsing, and other data services, but global SMS, for instance, will remain on the not-yet list. When will all data services be available globally? Sooner than you might think, says Spiro. “We believe the networks will be built out soon. Demand is already there, and devices like the Accompli are getting into users’ hands.” Global wireless data, he adds, is a solvable problem – and “corporate customers definitely want it,” he says. That’s why he and Motorola are optimistic that – in the near-term – a full slate of wireless data services will become available to satisfy the demands of customers who are already lining up. Is Motorola right? Nobody knows just yet – but keep a close watch on how the Accompli 009 phone fares in the weeks after its debut, around the beginning of 2002. If demand matches Motorola’s high expectations, this will be a big sign that, finally, corporate customers are indeed demanding global access to wireless data. And carriers likely won’t be long in meeting that demand. “A large concern for us is meeting the demand of our business customers,” says Cingular’s Hogan – and you can bet that when enough business customers line up for wireless data services, the carriers will line up briskly to make some of their best customers happy. J A N U A R Y 2 0 0 2 SYS-CON MEDIA W W W.SYS-CON.COM J A N U A R Y 2 0 0 2 www.WBT2.com 55 VENTURE CAPITAL SP SE CS MC FT GS VC WF DJ Boingo Jumps In The killer network of the future may be a combination of Wi-Fi and 3G Just before the clock ran out on a disastrous year for wireless Internet investments, a $15-million wager was placed on the nearterm wireless future – in the name of Santa Monica, CA startup by Tim Bresien Tim Bresien is a freelance writer covering investments in the wireless communications sector. He is a former research analyst with the telecommunications consulting firm of Bond & Pecaro, Inc., Washington, DC, and a cofounder of the Telecom Investor Forum, held annually at SUPERCOMM. @ [email protected] 56 www.WBT2.com Boingo Wireless. b y this time next year many of you will be Boingo subscribers, accessing the Internet at multimegabit speeds from your laptops, from thousands of hot spot locations in airports, coffee shops, and public gathering places all across the country. The alternate reality is that Boingo will become just the latest addition to the broadband scrap heap, but I’m betting on the former scenario. This company has what it takes to kick-start the Wi-Fi service industry, and to carve out a leadership position for themselves in the process. In my last column (WBT, v.1, n.9) I presented a collection of industry opinions in an attempt to find consensus among the internal flaws and external factors that contributed to the 2001 demise of Metricom. The rise of the IEEE standard (802.11b) for wireless Ethernet, also known as Wi-Fi, and increasing hot spot network buildouts were cited as factors that would rob Ricochet of their nomadic demographic. Unlike Metricom’s proprietary microcellular technology, the 802.11b standard has led dozens of manufacturers to the edge of a newborn industry, driving equipment costs ever downward. Wireless hot spot networks are being deployed by businesses, neighborhood cooperatives, and even individuals for less money than a year’s worth of coffee at Starbucks. Of course there’s also the case of Metricom apples versus Wi-Fi oranges in this debate, as 802.11 networks can deliver T1 speeds in common areas for essentially the same cost to the subscriber. Sky Dayton, Boingo’s founder and CEO, identified this market as many others have – while assembling a WiFi network in his home. What his company will attempt to do is to link the laptop road warriors of today with a wide choice of service providers and three billable Boingo service levels. Laptop users will find that they are increasingly equipped with standard wireless Ethernet cards for use in the office and at home. Thanks to the 802.11 standard, these same cards will be their keys to wireless access on the go. “Just as TCIP/IP served as a catalyst for the wired Internet, I think that Wi-Fi can serve as a catalyst for the wireless Internet,” said Dayton. “One unifying standard that brings it all together.” Using Boingo’s software, which is available in downloadable beta form, businesspeople in the field (or the airport or the coffee shop or the library) can use their laptops to “sniff” for service providers when they are within a designated coverage area. Earlier wireless Internet providers have been limited to only the most technically sophisticated customer base, both in the coffeehouse and in the field. This surely reduced the size of their intended markets. Metricom found that cost and speed weren’t the only limiting factors that topped their subscribership at just over 50,000. Many of the former Metricom users I know are BSEEs or similarly knowledgeable computer professionals. Ease of use is the bridge that will enable providers to move into a mass-market opportunity. The public beta software for the Boingo Wireless service includes a profile manager so J A N U A R Y 2 0 0 2 customers can connect to favorite Wi-Fi signals quickly and easily. The company claims that their full release software will also include a searchable database of hundreds of Boingo hot spots so customers can find locations whether or not they are online. It will also feature an integrated authentication mechanism to make it simple to log on to the Boingo Wireless network. A one-click “Personal VPN” will resolve the issues that corporate MIS managers may have with Wi-Fi security. Another point of departure for Boingo is that they will serve this nascent market with insights gained from the early days of the commercial Internet industry, both in the field and from the boardroom. EarthLink Potential Dayton is the enterprising upstart who founded EarthLink (Nasdaq: ELNK) in 1994 and helped lead its growth to 5-million customers, 6000 employees, and over $1 billion in annual revenue. He still serves as chairman of the company, which is the largest independent Internet service provider in the United States today. “I’ve spent many years looking for another idea with EarthLink potential,” said Dayton. “Last year I set up a Wi-Fi network in my house, and I realized I was looking at the next stage of the Internet. I knew I had to make the leap and be a CEO again. With WiFi, the wireless Internet is now affordable and easy to build and use. “I see a world where thousands of entrepreneurs and companies build millions of wireless broadband hot spots using Wi-Fi, blanketing cities with wireless broadband. These networks will be popping up everywhere, and it will be chaos. Boingo’s mission is to organize that chaos and to J A N U A R Y 2 0 0 2 make it easy to find and connect to the wireless Internet wherever you are.” Therein lies one of the key differentiators for the company. They aren’t building a nationwide wireless network. But stay tuned. They will market one. Dayton will serve as chairman of Boingo. Joining him on the board are Austin Beutner, president of Evercore Ventures; John Sidgmore, the former CEO of UUNET; Peter Barris, managing general partner of New Enterprise Associates (NEA); and Stewart Alsop, general partner at NEA. Sprint PCS joined Evercore and NEA in Boingo’s $15-million first round of funding, which was announced on December 20. “Sky Dayton is a great entrepreneur, and Wi-Fi is the biggest opportunity in technology today,” says Alsop. “In the past 24 years, we've learned that the combination of the two always leads to a great investment.” NEA also counts Wayport among their portfolio of investments. The company, based in Austin, TX, may be considered one of the de facto leaders of the Wi-Fi industry, due to the financial troubles that other early-mover service providers have encountered. They are also one of Boingo’s first strategic partners. Ironically, John Sidgmore joined UUNET Technologies as president and CEO the same year that Dayton launched EarthLink. Independently they grew companies that played critical roles in the commercial development of the Internet. UUNET, which is now a WorldCom Company, has become the world’s largest Internet access provider with more than 70,000 business customers and 6,500 employees worldwide. “Wi-Fi has the potential to turn the communications Just some of the many distinguished wireless movers and shakers we’re honored to have sitting on WBT’s International Advisory Board or Technical Advisory Board Simon Phipps Chief Software Evangelist, Sun Microsystems, responsible for expounding and explaining the “big picture” of software development. (www.sun.com) Anita Osterhaug Director of Knowledge Products for Brokat AG, headquartered in Stuttgart, Germany, and San Jose, California. (www.brokat.com) James Pearce Director of Encerca, the new name for AnywhereYouGo.com's Wireless Internet Lab, which now has its own Web site – an expansion of AYG's WAP testing, monitoring, and consultancy services. (www.encerca.com) James Gosling Cocreator of the Java programming language, currently Vice President and Fellow at Sun Microsystems working at Sun Labs where his primary interest is software development tools. (www.sun.com) Peter Roxburgh A Mobile Solutions developer with Secure Trading Ltd., the foremost service for processing Internet-based credit card payments in the United Kingdom. (www.securetrading.com) Larry Mittag VP and Chief Technologist of Stellcom, Inc., he has more than 25 years of technical and strategic expertise with wireless systems integration and embedded systems design and development. (www.stellcom.com) Rajiv Gupta Worldwide champion of “E-Speak” and Hewlett Packard’s Chief Architect of E-services. (www.hp.com) Douglas Lamont Visiting professor of marketing at DePaul University in Chicago, Illinois. The author of Conquering the Wireless World: The Age of M-Commerce, and six other international marketing books, he holds a PhD in business administration with a major in marketing. Ron Dennis Cofounded Livemind, Inc., led the thirdparty developers group at AOL, and created AOL’s Web Hosting Service and Software Greenhouse. Ron has guided several Internet start-ups. (www.livemind.com) Andrea Hoffman Editor-in-Chief and Technical Director of Mobile Media Japan, an Internet portal for information on the Japanese wireless industry. (www.MobileMediaJapan.com) www.WBT2.com 57 VENTURE CAPITAL BOINGO WIRELESS AT A GLANCE SKY DAYTON FOUNDER, CHAIRMAN, AND CEO URL: www.boingo.com FOUNDED: February 2001 HEADQUARTERS: Santa Monica, CA CHIEF EXECUTIVE: Sky Dayton founder, chairman, and CEO EMPLOYEES: 27 INDUSTRY: Wireless (Wi-Fi) Internet Access PRIMARY MARKETS: Mobile laptop users, "road warriors" FULL RELEASE SOFTWARE AND SERVICE AVAILABILITY: Later this year SERVICE LEVELS: Boingo As-You-Go no monthly fee, $7.95 per 24 hour connect per venue Boingo Pro $24.95 per month for up to 10 24-hour connects; each additional connect is $4.95 Boingo Unlimited $74.95 per month for unlimited access SOFTWARE: Free beta software available today for download CAPITAL RAISED: $15 million INVESTORS: New Enterprise Associates, Sprint PCS, Evercore Ventures 58 www.WBT2.com SP SE CS industry on its head,” said Sidgmore, currently vice chairman of WorldCom. “Boingo has tapped into the most exciting thing happening in telecom right now.” The executive team seems similarly loaded with management expertise and Internet industry know-how. Complementing them are the first two members of Boingo’s Advisory Board: Michael O’Dell, former chief scientist at UUNET, and Dave Farber, professor of telecommunications at the University of Pennsylvania and the former CTO of the FCC. Having had the opportunity to attend one of Farber’s presentations on the role of unlicensed spectrum at the FCC in early 2000, I can understand the value of his association with Boingo. There are few peo- MC FT GS many companies in this industry.” He acknowledges the “important and vibrant community of single access points,” some of which are seen as controversial for sharing their DSL and cable modem connections within their neighborhoods. Yet they will all contribute to the growth of Wi-Fi. On the subject of what Boingo can offer the independent provider, he reached back into his own history: “We have the whole backend system here for the industry. If you’re a small operator and you can put up an access point, we’ll add you to our system. “They don’t have to build a billing system,” Dayton continued. “They don’t have to build an authentication system. They don’t have to create a tech sup- VC WF DJ where companies could concentrate on any one layer and be successful, as opposed to trying to vertically integrate.” Have the stars aligned for Boingo? Well, every first-round startup is born with more potential than they may ever have in the future. They don’t all enter the world with Boingo’s pedigree however. Nor do they arrive with an important and often overlooked asset: good timing. Wi-Fi as an “industry” is only further legitimized by Boingo’s entry. Only those who would romanticize the short-lived era of shared wireless networks, boosted with antennas made from Pringles cans, could be disappointed as new money and expertise moves in. According to technology think tank Allied Business “Boingo’s mission is to organize that chaos and to make it easy to find and connect to the wireless Internet wherever you are” ple involved in the wireless industry today that are closer to the cutting edge, technologically speaking. The Year Ahead Just before New Year’s, I asked about the Boingo future view as it pertained to the coming year. “Wi-Fi will be built from the bottom up by entrepreneurs and individuals,” said Dayton. “It’s a mix of small networks with several POPs and carrierclass businesses like Wayport, that have hundreds. That’s also how the ISP business was built. Ultimately it’s my hope and my belief that there will be many, port group, they don’t have to do the marketing. For a small operator that makes for a much more streamlined business model. This is very similar to what happened in the ISP space. EarthLink was the first company to go out and say ‘instead of building a nationwide network of POPs we’re going to work with infrastructure providers in cities around the country and around the world that do that work. Instead we’re going to focus our energies on software, billing systems, tech support, authentication, and marketing.’ As a result, what evolved were several layers of an ecosystem Intelligence of Oyster Bay, New York, subscriber revenue from North American hot spots was a mere $1.1 million last year. The firm predicts that it will grow to $868 million in 2006. Dayton can appreciate steady growth, remembering the formative stages of EarthLink, when he would take his wife out to dinner to celebrate the signing of 30 new customers. This time he is armed with both prescience and patience, as well as an experienced management team. And the belief that “the killer network of the future is a combination of WiFi and 3G.” J A N U A R Y 2 0 0 2 JAVAONE HTTP://JAVA.SUN.COM/JAVAONE/ J A N U A R Y 2 0 0 2 www.WBT2.com 59 WIRELESS FUTURES SP SE CS MC FT GS VC WF DJ Wearable and Wireless Computing Converge Welcome to the world of wireless wallets, “smart spaces,” and “interactive clothing” Even before the present wireless boom, the field of wearable computers was developing rapidly. Now it’s poised to explode into the by Scott Stemberger marketplace of unwired must-have technology, with companies such as Levi Strauss already offering a line of jackets that incorporate a hidden MP3 player and mobile phone connected to a remote control and microphone in the collar. Although other technologies must continue to evolve in order to enable true pervasive computing, wearable devices clearly bring with them the greatest amount of value and are likely the final piece of the puzzle. w Scott Stemberger has several years of experience managing large software, Internet, and wireless implementation projects. He’s currently a manager at Etensity, an e-business consulting firm based in Vienna, VA, where he cofounded the company’s wireless solution practice. Prior to joining Etensity, Scott worked in the engineering services division of Boeing. @ [email protected] 60 www.WBT2.com earable computing” represents the next big frontier in the push for the always-on, alwaysactive, always-connected environment of the future. Envisioned by some as a small hidden device with transmission and storage capabilities that’s wirelessly connected to an ear-mounted speaker/ microphone, most people think of wearable computers as more suited for Star Trek than for a shopping mall. But we’re seeing the emergence now of a new paradigm for how wearable technology can create value for consumers and enterprises. future. The term refers to a highly integrated and complex network of people and computers in which there exists a continuous stream of content and services provided to all members of society. Active and pas- sive transactions are simultaneously executed based on user preferences, user location, and other designated data points that define what information should be presented to the user at precise times and locations. Some organizations, such as Gartner, see the wearable trend as an integral part of society. Gartner predicts that by 2010, 40% of adults and 75% of teenagers will utilize wearable devices, and 70% of the population will spend 10 times longer per day interacting with people in the e-world than in the physical world. Other organizations have echoed similar sentiments, citing the benefits of wearable devices as too great a value to ignore. For instance, in the future, a “digital persona” (i.e., your electronic profile, that manages First, the Big Picture The term “pervasive/ubiquitous computing” is thrown around fairly often by businesses and research organizations attempting to describe what’s in store for the society of the Acceleration Sensor Receiver Electrodes Piezo Actuator Transmitter Electrodes J A N U A R Y 2 0 0 2 * f f %O % Off and defines your interactions with other computers and systems) may choose to allow you to snooze an extra 30 minutes because you received an update to your calendar stating that an 8:00 a.m. sales meeting has been postponed. Of course, this was done after checking the traffic report along your daily route to ensure that you can arrive at work at your regular time of 8:30 a.m., and that no other new tasks that would require you to arrive early had fallen on your plate in the interim. On your way to work, you’re informed of gas and coffee specials available from vendors along your route. You choose to get only coffee now because you have enough gas and can fill your tank after work. Once at work, you begin refining your sales presentation that’s now been rescheduled for 11:00 a.m. at another building. Reviewing your presentation while walking to the other building, you notice a spelling error and fix it immediately. Upon arriving at the meeting, you prepare to deliver your presentation by uploading it into the computer attached to the projector. As you begin, you’re informed via instant message that some members in the room aren’t being acknowledged by the face recognition system. Your digital persona suggests removing a later slide with sensitive pricing information; you agree, and the slide is instantly removed, all done behind-the-scenes while you continue speaking. Upon completing the presentation, you’re packing up when an urgent e-mail arrives from your boss regarding a client emergency. You quickly finish and rush to his office, reading the e-mail while simultaneously calling his secretary to let the boss know you’ll be at his office in 10 minutes. J A N U A R Y 2 0 0 2 What Exactly Are ‘Wearable’ Devices? The scenario described above is more of a reality today than many people realize. One example: the concept of “smart spaces,” or physical locations that react differently as various people move in and out of them, already exists to some degree. A smart space combines building and technology infrastructure, allowing things such as temperature to be adjusted in a room based on an individual’s physical presence and associated digital persona. In the future, personalized physical attributes will be augmented by an individual’s information needs. Increasingly, localized interactions with the space around you will create value and efficiency for corporate citizens, while improving the quality of life for society at large. Although other technologies must continue to evolve in order to enable true pervasive computing, wearable devices clearly bring with them the greatest amount of value and are likely the final piece of the puzzle. Today’s handheld computers and other assortments of mobile devices (pagers, phones, PDAs, PDA watches, and so on) offer a glimpse of where the industry is moving as the devices continue to decrease in size, while seemingly improve in functionality. Ultimately, these devices will become integrated in such a manner as to provide minimal distraction to the users by not preventing them from performing other tasks (cooking, for instance), even as they utilize the device (reading e-mail). Wearable computers are miniature devices that enable a user to conduct computerized tasks with 100% portability and freedom, all nearly transparently. Wearable computers are integrated into our wardrobe and lifestyle so as to appear invisible, offering a multitude of input SAAVVEE3330 S the annual cover rate ANNUAL COVER PRICE ANNUAL SUBSCRIPTION RATE $71.88 YOU PAY Receive12 issues of $49.99 Wireless Business & YOU SAVE the Technology for only 30% Off Cover Price $49.99! That’s a savings of 30% off the cover price. Visit our site at www.wbt2.com or call 1-800-513-7111 and subscribe today! OFFER EXPIRES: FEBRUARY 28, 2002 www.WBT2.com 61 WIRELESS FUTURES SP SE CS MC FT GS GESTUREPAD PROTOTYPE and output mechanisms that allow a user to continue with other tasks even as they interact with the computer and environment around them. Additionally, while the advanced functionality of today’s handheld devices has severe form factor implications, wearable devices of the future will likely function more as thin clients, providing device manufacturers more latitude in the absence of the excessive battery and processing power requirements associated with today’s devices. Current Research Thrusts In order for wearable devices to gain critical mass, the concept of pervasive computing must continue to evolve, allowing wearable and nonwearable fixed devices to interact in a seamless fashion. For this to happen, industry players must continue to perform advanced R&D and strike partnerships for combining efforts and making advances. What follows is a description of three areas in which considerable progress is being made. ‘SMART SPACES’ Smart spaces, such as an enclosed meeting room, store, corporate building, or shopping mall, will bring with them increased usability and functionality for all wirelessly connected mobile devices, including wearable computers. As business- 62 www.WBT2.com and consumer-focused organizations integrate smart spaces, mobile device owners will feel more inclined to utilize mobile and wearable devices, which allow them to seamlessly interact while at work and at the grocery store. The value proposition inherent to smart spaces – thin clients, interactive digital persona, location, and time-sensitive data – are not novel concepts, yet are much more realizable with the use of smart spaces and their ability to easily deliver highly prioritized localized interactions that will motivate the mobile user of the future. As an example, 802.11b offers this capability today to corporations deploying WLAN stations in strategic locations. WLAN stations can be configured to restrict access to sensitive content in certain physical locations, and to restrict user access altogether. Streetbeam is an outdoor solution; their Remote Access Mobile Point (RAMP) continuously beams out a message prompting users to accept advertising information. This information, typically location-specific, is transmitted via infrared to the device once the supporting display application has been downloaded. INPUT/OUTPUT (I/O) MECHANISMS I/O mechanisms are a key component to the success of VC WF DJ wearable devices. The ability to easily and unobtrusively interact with a device and the surrounding environment is paramount for wearable devices, in terms of differentiating them from nonwearables. For example, Sony Computer Science Laboratories has been performing cutting-edge research on input technologies and two of their ideas, called GestureWrist and GesturePad, could be something we’re all using by the end of this decade. With the goal being to make inputs to your wearable device as conceptually unnoticeable as possible, GestureWrist is a wristwatch-type input device that recognizes human gestures by measuring changes in wrist shape and forearm movements. Networked to a visual display, GestureWrist could serve as the user’s virtual mouse. Companies such as Xybernaut have produced wearable devices capitalizing on more traditional I/O vehicles. Xybernaut, whose core customer is Bell Canada, offers a handsfree wearable computer that includes a body-worn, voice-activated, high-power processor and a VGA color flat panel or head-mounted color display with microphone and eyepiece, through which the user sees a video display. The batterypowered central computer weighs less than two pounds, and clips onto a vest or belt. The 1.1in. head-mount display has an optional miniature video camera or palm-size color touch screen that straps onto the arm. (Bell Canada trial users claimed to have saved nearly an hour a day.) A key advantage of wearable visual displays is their ability to project an image that appears similar to that of a PC from the user’s vantage point. This output mechanism will likely become very popular as it continues to evolve and better integrate with current eyewear. Voice remains a prospective option in both input and output technology, as well. J A N U A R Y 2 0 0 2 To be adopted by mass markets, wearable devices must become completely integrated with the user, so as not to appear unusual or prevent standard physical interactions – such as shaking hands. By integrating with eyeglasses, watches, and shirts, wearable devices become nearly invisible, allowing the user to conveniently multitask while not impeding physical activity or interrupting other personal interactions. The other Sony prototype mentioned – GesturePad – is an exploration into “interactive clothing,” which is certainly a step in the right direction. GesturePad is a small pad that can be inserted into traditional clothing, thus transforming the clothes into interactive devices. GesturePad is actually a thin layer of sensor electrodes that can detect finger motions applied to the outside of clothing fabric. A GesturePad inserted into the lapel of a sports coat could control a PowerPoint presentation, the volume of an MP3 player, or the scroll bar of a Web page being projected from a person’s eyewear. Furthermore, multiple sensors could be inserted into any individual clothing item, each having a specific function. Watches provide a clear avenue into which wearable computers have already begun to infiltrate. Fossil, one of America’s leading watch companies, recently announced a new Wrist PDA, featuring both Palm and PocketPC versions. The watch provides read-only content, with current support for infrared beaming as the transfer technology between handheld PDAs and the Wrist PDA. The watch can store up to 190K of primarily PIM-type (Personal Information Management) data such as contacts, schedule, todo’s, and memos. J A N U A R Y 2 0 0 2 IBM and Citizen Watch Co. recently joined forces to deliver IBM’s WatchPad, a prototype wearable computer. The WatchPad features a 320x240 monochrome VGA display, Bluetooth and infrared wireless connectivity, and speaker, microphone, and fingerprint-sensor functions. The goal of WatchPad is to begin delivering new human-computer interactions – such as using a watch to control a presentation or other nearby devices – and to receive, deliver, or store pertinent information. Hypercom Corporation and WearLogic have recently announced an alliance to allow consumers to use WearLogic’s leather pocket wallets for wireless payments at checkout counters using Hypercom terminals. WearLogic claims to have proprietary technology that can transform a traditional leather wallet into a mobile financial device containing a flexible screen, ATM-like soft keys, and an intuitive keyboard. Users can track financial account information, purchase products in physical and electronic environments, and download and store Web-based information such as addresses or driving directions. Future Challenges While research and commentary often focus on the physical attributes of wearable devices, many challenges come from both the hardware and software perspectives. THICK OR THIN? The debate continues as to how thick or thin a wearable client should be, as we’ve no idea what our functional requirements or hardware limitations will be in the future. Today, a thick client represents more CPU power, memory, and disk capacity, which translates to a larger, heavier device that WIRELESS CHECKS IN TO HOSPITALITY Wireless is transforming the hotel experience for guests and employees alike. IS WORLDWIDE WIRELESS BROADBAND BARRELLING OUR WAY? As wireless broadband connectivity spreads around the globe, what technologies are taking us there? How close are we? What are the obstacles? MAKING MONEY FROM MESSAGES SMS might be the solution to the growing debt problem faced by companies that massively overbid for 3G licenses, at least until 3G starts making money. MOBILE OPERATORS SEEK INCREMENTAL REVENUE FROM THE MOBILE INTERNET a look ahead... INVISIBILITY AND SOCIAL ACCEPTANCE What you’ll see Next Month in WBT... Leveraging new and existing infrastructure for immediate and long-term ROI. THE WIRELESS WEB MATTERS There’s plenty of opportunities for all involved, but the public will buy in only if they see indispensable tools that enable greater productivity, entertainment,and, of course, mobility. MOBILE WEATHER TECHNOLOGY FOR THE ARMY Weather affects not only personnel, but nearly every military weapon system and operation. Mobile computing technology can play a significant role in dealing with the impact of weather systems. www.WBT2.com 63 WIRELESS FUTURES SP SE CS requires a bigger battery and dissipates more heat – all negatives when conceptualizing a wearable device that, ideally, is invisible to the casual eye. Over time, as it’s rationalized, packaging and other technological advancements can and will reduce the physical size and weight of a thick client. However, thin-client enthusiasts argue that these same advancements can be extrapolated to a thin-client device, making the device even lighter and smaller. Ultimately, there’s no such thing as a device being too small or too light for a mobile user interested in a wearable device. However, the user must take into account the worstcase scenario of no network connectivity, and determine what functionality is absolutely essential 100% of the time, even in nonconnected states. BATTERY POWER The proactive and self-tuning nature of wearable devices will increase the energy demand of software on that device. In contrast, the pressure to make wearable devices as small, light, and unnoticeable as possible places severe constraints on battery capacity. There’s a growing sentiment that advances in battery technology and circuit design cannot overcome these two opposing issues, and that higher levels of system management must become involved. One idea proposed by researchers at Carnegie Mellon is energy-aware adaptation, in which individual applications switch to modes of operation with lower fidelity and energy demand under OS control. Another possibility is an OS that can dynamically control the amount of physical memory that has to be refreshed. Finding high-level energy management techniques will be an ongoing and interesting challenge to watch. 64 www.WBT2.com MC FT GS USABILITY Another key challenge for wearable computer enthusiasts will be usability. The user experience in the wearable industry will be defined by multiple facets: consistency, adaption, and contextual awareness. Consistency refers to an identical experience across different environments and locations. If users are accustomed to receiving certain alerts and information pushed to them when in certain locations, what happens when they visit another similar location that lacks the smart spaces or other infrastructure to deliver the same experience? Adaptation refers to the environment’s ability to detect a lapse in service or service unavailability, and adapt to the situation by recommending an alternative solution where resources or services exist and are more plentiful. Finally, contextual awareness refers to the user’s digital persona, and the ability to obtain and store rich user information beyond preferences and location. This includes traits such as physiological (heart rate, body temperature) and emotional states, and how those attributes can be used in conjunction with other location- and time-specific data to determine a course of action or to guide an interaction. Should the device be proactive or transparent right now? Does the user want to receive this phone call? Is this message important? What is the user’s intent during this task right now? A wearable device’s ability to handle these types of inquiries while delivering a consistent user experience is what will truly drive wearable devices to reach critical mass. PRIVACY AND SECURITY Naturally, privacy and protection of personal information remain at the top of the list of challenges facing the intelli- VC WF DJ gent, ubiquitously connected society. As stated previously, pervasive computing requires proactive interactions by mobile and wearable devices, based upon location tracking, smart spaces, movements, behavior patterns, and general habits. This information must be monitored on a continual basis, causing severe security concerns and implications for the user. Users may fear that this information could get into the wrong hands and be put to foul use, resulting in their choosing not to rely on a pervasive computing system for fear of a violation in trust and privacy. As with the energy issue, there are contradictions here as well. Reliance on the pervasive environment around the user requires greater trust by users in the devices and infrastructure composing that environment. Whereas some users today feel uncomfortable using their credit cards online, the pervasive environment needs much more information about users in order to ascertain a user’s identity and authorization, and this level of information is more than users are providing today. Gaining confidence and mutual trust between the user and system will be challenging, to say the least, and ultimately may prove to be the biggest barrier to wide-scale adoption of intelligent wearable devices. Conclusion “Pervasive computing” remains our technology pinnacle, a utopia of sorts where users are always on, always active, and always aware. Wearable devices will be a key component in enabling pervasive computing to transform our society into a networked one in which a digital persona —continued on page 37 J A N U A R Y 2 0 0 2 Our comprehensive reports offer insight and strategy to guide your most critical business decisions in today's fastest growing technologies… Establish your product and marketing strategy Understand your customer's needs Evaluate Technology & Trends Preview and order reports at www.engindata.com engindata.com WBT COMPANYINDEX COMPANY URL PAGE AT&T AUDIOVOX BOINGO CERTICOM CERTICOM CINGULAR WIRELESS COLUMBITECH DANACELL DANGER DISNEY ENTRUST EPIHAN CONSULTING ERICSSON FOSSIL IBM ICONVERSE METRICOM MICROSOFT MOTOROLA NETMOTIONWIRELESS NEXTEL NOKIA NTT DOCOMO PALM SANYO SIEMENS SONA SONY SPRINT PCS TEXAS INSTRUMENTS VERIZON VOICESTREAM V-ONE VUICO WHERIFY WORLDCELL WWW.ATT.COM WWW.AUDIOVOX.COM WWW.BOINGO.COM WWW.CERTICOM.COM WWW.MOVIANSECURITY.COM WWW.CINGULAR.COM WWW.COLUMBITECH.COM WWW.DANACELL.COM WWW.DANGER.COM WWW.DISNEY.COM WWW.ENTRUST.COM WWW.EPIPHAN.COM WWW.ERICSSON.COM WWW.FOSSIL.COM WWW.IBM.COM WWW.ICONVERSE.COM WWW.METRICOM.COM WWW.MICROSOFT.COM WWW.MOTOROLA.COM WWW.NETMOTIONWIRELESS.COM WWW.NEXTEL.COM WWW.NOKIA.COM WWW.NTTDOCOMO.COM WWW.PALM.COM WWW.SANYO.COM WWW.SIEMENS.COM WWW.SONAINNOVATIONS.COM WWW.SONY.COM WWW.SPRINTPCS.COM WWW.TI.COM WWW.VERIZONWIRELESS.COM WWW.VOICESTREAM.COM WWW.V-ONE.COM WWW.VUICO.COM WWW.WHERIFY.COM WWW.WORLDCELL.COM 51, 53 15 56-58 32 48 16, 51, 53 48 15 11 15 32 32, 48 52 63 63 14 56 11, 32, 36, 48 26, 52, 54 48 51, 53 52 14, 41-43, 47-48, 60 15 17 52 22,24 26, 28, 63 16-17 14-15 16 51, 53 32 47-48 11 51 WBT ADVERTISERINDEX ADVERTISER APRIVA AT&T WIRELESS URL PHONE PAGE WWW.APRIVA.COM/X57 877-233-9702 2 WWW.ATTWIRELESS.COM/BUSINESS/DATA 877-400-1080 68 COMPAQ WWW.COMPAQ.COM/MOBILE 800-888-5846 7 CTIA WWW.CTIASHOW.COM 202-785-0081 29 HIDDENMIND WWW.HIDDENMIND.COM 866-242-4866 9 IANYWHERE (SYBASE) WWW.IANYWHERE.COM/SOAR 800-801-2069 4,5 ICONVERSE WWW.ICONVERSE.COM 781-622-5050 49 IMARK COMMUNICATIONS WWW.EXPO4MOBILE.COM 888-827-6699 39 JAVAONE HTTP://JAVA.SUN.COM/JAVAONE/ 888-886-8769 59 KADA SYSTEMS WWW.KADASYSTEMS.COM 781-825-4000 19 LSSI WWW.LSSI.NET 800-210-9021 23 QUALCOMM HTTP://BREW.QUALCOMM.COM/ZWBT3 858-587-1121 67 QUICKOFFICE WWW.QUICKOFFICE.COM 800-991-7360 13 SOFTWIRED WWW.SOFTWIRED-INC.COM 44 1 445 23 70 3, 27 SYS-CON EVENTS WWW.SYS-CON.COM 201-802-3069 34,35 SYS-CON MEDIA WWW.SYS-CON.COM/SUBOFFER.CFM 800-513-7111 49 SYS-CON MEDIA WWW.SYS-CON.COM 201-802-3020 55 WEB SERVICES EDGE WWW.SYS-CON.COM 201-802-3069 24,25 WIRELESS BUSINESS & TECHNOLOGY WIRELESS EDGE WWW.WBT2.COM 800-513-7111 61 WWW.SYS-CON.COM 201-802-3069 44,45 General Conditions: • The Publisher reserves the right to refuse any advertising not meeting the standards that are set to protect the high editorial quality of Wireless Business & Technology. All advertising is subject to approval by the Publisher. • The Publisher assumes no liability for any costs or damages incurred if for any reason the Publisher fails to publish an advertisement. In no event shall the Publisher be liable for any costs or damages in excess of the cost of the advertisement as a result of a mistake in the advertisement or for any other reason.• The Advertiser is fully responsible for all financial liability and terms of the contract executed by the agents or agencies who are acting on behalf of the Advertiser.• Conditions set in this document (except the rates) are subject to change by the Publisher without notice. No conditions other than those set forth in this “General Conditions Document” shall be binding upon the Publisher. • Advertisers (and their agencies) are fully responsible for the content of their advertisements printed in Wireless Business & Technology. • Advertisements are to be printed at the discretion of the Publisher. This discretion includes the positioning of the advertisement, except for “preferred positions” described in the rate table.• Cancellations and changes to advertisements must be made in writing before the closing date. • “Publisher” in this “General Conditions Document” refers to SYS-CON Publications, Inc. J A N U A R Y 2 0 0 2 www.WBT2.com 65 DATELINE JAPAN by Michiyo Nakamoto Launched in October, DoCoMo’s 3G FOMA service Lessons from the Past Nonetheless DoCoMo plans to spend massively over the next three years on their 3G service, continuing to believe in the benefits to consumers. There’s no guarantee that 3G will be a success to rival Kouji Ohboshi, DoCoMo chairman and the driving force behind the development of i-mode, likes to tell the i-mode, or even catch on in a significant way. story of how Japan’s most admired new service was born amid widespread skepticism. Ohboshi, who was then DoCoMo’s president, gave the CCORDING TO go-ahead to develop and market Yoshinori Uda, NTT i-mode in spite of widespread DoCoMo’s EVP, the doubts as to whether such a Japanese pioneer of the world’s service would succeed. first third-generation W-CDMA When handset prices mobile phone service may not declined sharply in 1996, indimeet their target of 150,000 subvidual usage began to spread scribers by the end of this comCan FOMA Attract 1,500,000 Users by March 2003? and the market looked as if it ing March. was headed toward saturation, Uda openly conceded to an so Ohboshi decided DoCoMo needed to shift from voice to data audience this month in Scottsdale, Arizona, that DoCoMo could find services. “It was a (handset) dumping hell,” he recalls. “So I decided it difficult to sign up 150,000 users to FOMA (Freedom of Mobile multhat relying on voice alone would not enable us to differentiate our timedia Access) by the end of the fiscal year, as previously targeted by services.” the company. Achieving that target “is very difficult,” he admitted. According to Ohboshi, DoCoMo met this challenge with a deep Although Uda added that DoCoMo was still confident they could sense of uncertainty, but this nurtured an entrepreneurial spirit meet their target of 1.5-million subscribers by the end of March and drive that has been at the root of the group’s success ever 2003, the 3G service DoCoMo launched in October has managed to since. When DoCoMo was split off from NTT, their parent compasign up only 30,000 subscribers in its first three months. The small ny, it was a very small organization. “NTT would never fail,” says number is being blamed on the narrow area coverage and expenOhboshi, “but DoCoMo could have collapsed.” Instead, the i-mode sive handsets. FOMA services were initially available only in the team conducted meticulous research into what consumers wanted Tokyo area and were just recently extended to Osaka and Nagoya. from the service and tailored it accordingly. “We had to survive on In the meantime J-Phone, Japan’s third-largest mobile operator, our own. We struggled,” he recalls. has announced a capital spending cut of about 50%, from $4.5 billion to just over $2.3 billion, largely by scaling back on current 2G investment. The spending cuts, which will come in the current financial Tachikawa: ‘We’re Going to Create Demand’ year to the end of March, reflect the strong influence of Vodafone, “It is impossible to know whether 3G will succeed until you do which last year gained control of J-Phone. Darryl Green, J-Phone’s it,” says Keiji Tachikawa, DoCoMo’s president. “Everyone says there new president, said the spending cuts wouldn’t affect J-Phone’s own is no demand (for certain advanced services), but you can create scheduled rollout of next-generation 3G services at the end of June. demand. So, we are going to do it,” he states emphatically. According to Kirk Boodry, telecoms analyst at Dresdner DoCoMo’s faith in the benefits of their services has been their Kleinwort Wasserstein in Tokyo, the spending cuts also highlight strength. But it can also be a liability. Some products born of this the increasingly difficult business climate mobile phone compaconfidence have been market flops. For example, a mobile camera nies face even in Japan, where penetration rates are still below unit marketed by DoCoMo, which must be attached to a mobile those of some European countries and reflect a pragmatic recogniphone, has been overshadowed by rival J-Phone’s camera phones, tion that J-Phone can’t afford to compete head-on with market which have a camera embedded in the phone. giant DoCoMo, which is three times its size. There’s no guarantee that 3G will be a success to rival i-mode, or Vodafone believes dual-mode handsets that can access both 2G even catch on in a significant way. The new service will require and 3G networks are essential for the spread of the new service. huge investments of human and financial resources. Whether However, analysts warn that the technical difficulties of producing DoCoMo can confound the critics again depends on their ability to reliable dual-mode handsets small enough to satisfy users could be as sensitive and responsive to consumer needs as they were delay the widespread take-up of 3G. when they were a struggling upstart fighting for survival. signed up only 30,000 subscribers in its first three months. A 3G Crunch Time for DoCoMo and J-Phone Michiyo Nakamoto Tokyo correspondent of the Financial Times, regularly monitors DoCoMo and their suppliers, who, between them, have developed the world's first W-CDMA service, FOMA. Her industry sources range from companies such as Matsushita Communications Industrial, which has been working on W-CDMA for 10 years, and NEC – its arch-rival in the mobile phone industry – to high-level executives in NTT DoCoMo itself, and in Japan's number 3 mobile telco, J-Phone. 66 www.WBT2.com [email protected] J A N U A R Y @ 2 0 0 2 QUALC O M M HTTP://BREW.QUALCOMM.COM/ZWBT3 J A N U A R Y 2 0 0 2 www.WBT2.com 67 AT&T WIRELESS W W W.AT TWIRELESS.COM/BUSINESS/DATA 68 www.WBT2.com J A N U A R Y 2 0 0 2