<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>ACM Queue - Mobile Computing</title>
    <link>http://queue.acm.org/listing.cfm?item_topic=Mobile Computing&amp;qc_type=topics_list&amp;filter=Mobile Computing&amp;page_title=Mobile Computing&amp;order=desc</link>
    <description />
    <item>
      <title>Mobile Devices in the Enterprise: CTO Roundtable Overview</title>
      <link>http://queue.acm.org/detail.cfm?id=2019556</link>
      <description>The CTO Roundtable on Mobile  Devices in the Enterprise focuses on the implications of the widespread  use of mobile devices, such as smartphones, in the enterprise computing  environment. These new personal devices have presented great challenges  and opportunities for the protection of valuable information assets  and creation of business value. What follows are the key points from that broader conversation.</description>
      <category>Mobile Computing</category>
      <pubDate>Fri, 12 Aug 2011 09:07:23 GMT</pubDate>
      <author>Mache Creeger</author>
      <guid isPermaLink="false">2019556</guid>
    </item>
    <item>
      <title>ACM CTO Roundtable on Mobile Devices in the Enterprise</title>
      <link>http://queue.acm.org/detail.cfm?id=2016038</link>
      <description>BlackBerry? iPhone? Android? Other? Thin client or fat client? Browser or Wi-Fi? Developers of mobile applications have many variables to consider in a rapidly changing environment. The mobile device market is growing quickly and fragmenting as it does so. Supporting mobile devices in the enterprise is getting much more complicated because of both this rapid growth worldwide and the diverse set of devices and networks.</description>
      <category>Mobile Computing</category>
      <pubDate>Wed, 03 Aug 2011 15:06:38 GMT</pubDate>
      <author>Mache Creeger</author>
      <guid isPermaLink="false">2016038</guid>
    </item>
    <item>
      <title>Mobile Application Development: Web vs. Native</title>
      <link>http://queue.acm.org/detail.cfm?id=1968203</link>
      <description>A few short years ago, most mobile devices were, for want of a better word, "dumb." Sure, there were some early smartphones, but they were either entirely e-mail focused or lacked sophisticated touch screens that could be used without a stylus. Even fewer shipped with a decent mobile browser capable of displaying anything more than simple text, links, and maybe an image. This meant if you had one of these devices, you were either a businessperson addicted to e-mail or an alpha geek hoping that this would be the year of the smartphone. Then Apple changed everything with the release of the iPhone, and our expectations for mobile experiences were completely reset.</description>
      <category>Mobile Computing</category>
      <pubDate>Tue, 12 Apr 2011 00:27:51 GMT</pubDate>
      <author>Andre Charland, Brian LeRoux</author>
      <guid isPermaLink="false">1968203</guid>
    </item>
    <item>
      <title>Like a Podcast in the Sea: Mean ol' LoTech Blues</title>
      <link>http://queue.acm.org/detail.cfm?id=1147540</link>
      <description>&lt;h2&gt;Like a Podcast in the Sea - Mean Ol' LoTech Blues&lt;/h2&gt;

&lt;h3&gt;Is it just a matter of semantics?&lt;/h3&gt;

&lt;h4&gt;Stan Kelly-Bootle, Author&lt;/h4&gt;

&lt;p&gt;Mache Creeger's general pessimism&lt;sup&gt;1&lt;/sup&gt; about IT's status quo rests on his perception that HiTech (the character- and tree-saving token for High Technology, somewhat, if not totally, vitiated by this long-winded, unnecessary explanation) is not quite Hi enough. IT relies too much on dreary, evolutionary gradualism rather than on the exciting Kuhnian discontinuities that spell revolution and paradigm shifts.&lt;sup&gt;2&lt;/sup&gt;&lt;/p&gt;
&lt;p&gt; I have no qualms about Creeger's observation that the marketeers, both commercial and academic (if such categories can be distinguished in these pursy PC times), are fond of paint jobs - coloring the most modest upgrades with claims of major, must-have breakthroughs. This is an ancient and, alas, effective promotional ploy in other trades. I recall one cornflake manufacturer who was forced to confess that what was "new" about its latest product was the bold slogan "NEW" on the package.&lt;/p&gt;</description>
      <category>Mobile Computing</category>
      <pubDate>Thu, 27 Jul 2006 10:33:08 GMT</pubDate>
      <author>Stan Kelly-Bootle</author>
      <guid isPermaLink="false">1147540</guid>
    </item>
    <item>
      <title>Java in a Teacup</title>
      <link>http://queue.acm.org/detail.cfm?id=1127868</link>
      <description>Few technology sectors evolve as fast as the wireless industry. As the market and devices mature, the need (and potential) for mobile applications grows. More and more mobile devices are delivered with the Java platform installed, enabling a large base of Java programmers to try their hand at embedded programming. Unfortunately, not all Java mobile devices are created equal, presenting many challenges to the new J2ME (Java 2 Platform, Micro Edition) programmer. Using a sample game application, this article illustrates some of the challenges associated with J2ME and Bluetooth programming.</description>
      <category>Mobile Computing</category>
      <pubDate>Tue, 02 May 2006 08:29:10 GMT</pubDate>
      <author>Stephen Johnson</author>
      <guid isPermaLink="false">1127868</guid>
    </item>
    <item>
      <title>Streams and Standards: Delivering Mobile Video</title>
      <link>http://queue.acm.org/detail.cfm?id=1066067</link>
      <description>&lt;h1&gt;Streams and Standards: Delivering Mobile Video&lt;/h1&gt;&#xD;&lt;h2&gt;The era of video served up to mobile phones has arrived and threatens to be&#xD;the next &amp;ldquo;killer app&amp;rdquo; after wireless calling itself. &lt;/h2&gt;&#xD;&lt;h3&gt;TOM GERSTEL, TURNER BROADCASTING SYSTEM&lt;/h3&gt;&#xD;&lt;p&gt;Don&amp;rsquo;t believe me? Follow along&amp;hellip; &lt;/p&gt;&lt;p&gt;&#xD;  Mobile phones are everywhere. Everybody has one. Think about the last time&#xD;    you were on an airplane and the flight was delayed on the ground. Immediately&#xD;    after the dreaded announcement, you heard everyone reach for their phones&#xD;    and start dialing.&lt;/p&gt;</description>
      <category>Mobile Computing</category>
      <pubDate>Tue, 07 Jun 2005 09:49:16 GMT</pubDate>
      <guid isPermaLink="false">1066067</guid>
    </item>
    <item>
      <title>Mobile Media: Making It a Reality</title>
      <link>http://queue.acm.org/detail.cfm?id=1066066</link>
      <description>&lt;h1&gt;Mobile Media Making it a Reality&lt;/h1&gt; &lt;h2&gt;Two prototype apps reveal the challenges in delivering mobile media services. &lt;/h2&gt; &lt;h3&gt;FRED KITSON, HP LABORATORIES&lt;/h3&gt; &lt;p&gt;Many future mobile applications are predicated on the existence of rich, interactive  media services. The promise and challenge of such services is to provide applications  under the most hostile conditions&amp;mdash;and at low cost to a user community  that has high expectations. Context-aware services require information about  who, where, when, and what a user is doing and must be delivered in a timely  manner with minimum latency. This article reveals some of the current state-of-the-art &amp;ldquo;magic&amp;rdquo; and the research challenges. &lt;/p&gt;&lt;p&gt;  In our research we are combining media systems and mobility systems to support  the creation, distribution, and consumption of rich media to mobile or nomadic  users. In this article we present two visions of future applications. The first  is an example of personal context-aware mobile services that leverage RFID  technology. The second is a highly collaborative interactive mobile gaming  system. This example in particular highlights some of the key technical challenges  we encountered while developing a prototype. We then focus on some of the broader  system and software issues that need to be addressed to fully realize commercially  viable mobile media systems. In particular, we summarize the complexities of  getting media anywhere, creating media anywhere, and securely delivering media anywhere.&lt;/p&gt;</description>
      <category>Mobile Computing</category>
      <pubDate>Tue, 07 Jun 2005 09:48:58 GMT</pubDate>
      <author>Fred Kitson</author>
      <guid isPermaLink="false">1066066</guid>
    </item>
    <item>
      <title>Enterprise-Grade Wireless</title>
      <link>http://queue.acm.org/detail.cfm?id=1066065</link>
      <description>&lt;h1&gt;Enterprise-Grade Wireless&lt;/h1&gt;&#xD;&lt;h2&gt;Wireless technology has come a long way, but is it robust enough for today&amp;rsquo;s&#xD;enterprise? &lt;/h2&gt;&#xD;&lt;h3&gt;BRUCE ZENEL AND ANDREW TOY, MORGAN STANLEY&lt;/h3&gt;&#xD;&lt;p&gt;We have been working in the wireless space in one form or another in excess&#xD;  of 10 years and have participated in every phase of its maturation process.&#xD;  We saw wireless progress from a toy technology before the dot-com boom, to&#xD;  something truly promising during the boom, only to be left wanting after the&#xD;  bubble when the technology was found to be not ready for prime time. Fortunately,&#xD;  it appears that we have finally reached the point where the technology and&#xD;  the enterprise&amp;rsquo;s expectations have finally converged. Even with the current&#xD;  level of maturity in this space, creating and managing a cohesive wireless&#xD;  strategy within an enterprise is difficult. There are technological hurdles,&#xD;  cost/efficiency trade-offs to be considered, and obtaining buy-in/acceptance&#xD;  at all levels of the company. To identify and overcome these issues, we have&#xD;  developed a model called enterprise-grade wireless. This article is a discussion&#xD;  of the model itself, the context in which it exists, and a justification of&#xD;its criticality to the enterprise.&lt;/p&gt;&#xD;&lt;h3&gt;WIRELESS IN THE ENTERPRISE DEFINED&lt;/h3&gt;&#xD;&lt;p&gt;It is important that we first define the&#xD;    context of this article. We have a specific view of what constitutes wireless&#xD;    in the enterprise; note that we are not espousing that this is the only view,&#xD;    just defining the perimeter of the space to improve the applicability of&#xD;  the various points we make in the discussion that follows.&lt;/p&gt;</description>
      <category>Mobile Computing</category>
      <pubDate>Tue, 07 Jun 2005 09:48:40 GMT</pubDate>
      <author>Bruce Zenel</author>
      <guid isPermaLink="false">1066065</guid>
    </item>
    <item>
      <title>A Conversation with Teresa Meng</title>
      <link>http://queue.acm.org/detail.cfm?id=984469</link>
      <description>&lt;h3&gt;A Conversation with Teresa Meng&lt;/h3&gt;&#xD;&lt;p&gt;In 1999, Teresa Meng took a leave of absence from Stanford University and with&#xD;  colleagues from Stanford and the University of California, Berkeley, founded&#xD;  Atheros Communications to develop and deliver the core technology for wireless&#xD;  communication systems. Using a combination of signal processing and CMOS RF technology,&#xD;  Atheros came up with a pioneering 5 GHz wireless LAN chipset found in most 802.11a/b/g&#xD;  products, and continues to extend its market as wireless communications evolve.&#xD;  &lt;/p&gt;&#xD;&lt;/p&gt;</description>
      <category>Mobile Computing</category>
      <pubDate>Fri, 16 Apr 2004 10:01:25 GMT</pubDate>
      <author>Robert Broderson</author>
      <guid isPermaLink="false">984469</guid>
    </item>
    <item>
      <title>Wireless Networking Considered Flaky</title>
      <link>http://queue.acm.org/detail.cfm?id=957735</link>
      <description>&lt;h3&gt;Wireless Networking Considered Flaky&lt;br&gt;&#xD;  &lt;em&gt;Eric Allman, Sendmail&lt;/em&gt;&lt;/h3&gt;&#xD;&lt;p&gt;&#xD;  You know what bugs me about wireless networking? Everyone thinks it&amp;#8217;s&#xD;  so cool and never talks about the bad side of things. Oh sure, I can get on&#xD;  the &amp;#8217;net from anywhere at Usenix or the IETF (Internet Engineering Task&#xD;  Force), but those are _hostile_ _nets_. Hell, all wireless nets are hostile.&#xD;  By their very nature, you don&amp;#8217;t know who&amp;#8217;s sharing the ether with&#xD;  you. But people go on doing their stuff, confident that they are OK because&#xD;  they&amp;#8217;re behind the firewall.&lt;/p&gt;&lt;p&gt;&#xD;  Let&amp;#8217;s face it: WEP (Wired Equivalent Privacy) is a joke. There&amp;#8217;s&#xD;  no privacy on a wireless net. When you type your password, it&amp;#8217;s there&#xD;  for the world to see&amp;#8212;and take, and abuse. A lot of places don&amp;#8217;t&#xD;  even bother with WEP, even behind firewalls. You want free &amp;#8216;net access?&#xD;  Drive into a random parking lot in Silicon Valley and pull up next to one of&#xD;  those big, two-story &amp;#8220;ranch house&amp;#8221; style buildings that seem to&#xD;  be ubiquitous there. You&amp;#8217;ll have a shockingly good chance of being on&#xD;  the &amp;#8216;net. But not just the Internet: their _internal_ network. And if&#xD;  you sniff that network you might just get a password or two. Or maybe several&#xD;  dozen. You&amp;#8217;ll probably even trip over some root passwords.&lt;/p&gt;</description>
      <category>Mobile Computing</category>
      <pubDate>Fri, 05 Dec 2003 10:56:22 GMT</pubDate>
      <author>Eric Allman</author>
      <guid isPermaLink="false">957735</guid>
    </item>
  </channel>
</rss>

