to wap or not to wap? [letters]

2
4 Computer LETTERS To the Editor: I just recommended WAP to the Navy, and then I saw Ted Lewis’s article (“Why WAP May Never Get off the Ground, Aug. 2000, pp. 112, 110-111). But I’m sticking to my guns that it’s a good protocol to look at for defense pur- poses. The problems of mobility, fractured access, low bandwidth, and limited client processing are similar, and WAP has at least taken a good look-see at such issues. The XML link doesn’t hurt much either. I’m surprised that Lewis invoked lack of GPRS and 3G services as killers, though, and I’m not sure why the empha- sis on audio. I have this peculiar feeling that the Internet is coming to mobile no matter what, and WAP still looks like a better “well, I guess we could use this” alternative than other choices like MExE or the Java stuff. I’m betting that “sort of adequate and it’s there” will be the real driver as the Internet mobilizes. So... I’ll bet Lewis a wooden nickel or a chance to sub for him in the Binary Critic column on a topic of my choice that by the start of 2002 WAP will be in place and in use in more devices than any alternatives. (Actually, I’m not sure if I’m proposing that for “winning” or “los- ing,” but whatever...) Terry Bollinger [email protected] Ted Lewis replies: Thanks for your alternative view. I am sure most of Computer’s readers will agree with you. But, the killer app for telephones is voice, in my view. I want my PT Cruiser to vocalize my e-mail, sports, and news, and alert me to traffic jams...all while I am keeping both hands on the steering wheel. As for mobile phones, so far they have been designed for ears, not eyes. Okay, so PIMS like the PalmPilot will merge with handys such as I-MODE from DoCoMo, but my guess is that the resulting hybrid will talk to me rather than try to replace my desktop browser. To the Editor: Ted Lewis’s comments about WAP (“Why WAP May Never Get off the Ground,” Aug. 2000, pp. 112, 110-111) bring up a number of questions: How are companies going to develop voice-based Web transactions? If either WAP or VXML is the answer, how many billions of Web pages can be converted to either technology, and who would do that? What would the cost be, and who would pay for it? (Obviously, not the con- sumers.) The latest breakthrough technology in the area of voice-based Internet access is an intelligent agent that uses artificial intelligence and doesn’t require the cre- ation of VXML or WAP pages. It can read any page, convert text to speech, send and receive e-mails, browse the Web, or perform stock trades and other commercial transactions anytime, any- where, using an ordinary phone and sim- ple voice commands. This technology will change the e-busi- ness rules, and early adopters will have a tremendous competitive advantage. Amit Sarkar Internet Speech [email protected] Ted Lewis replies: Many new companies have the right idea. VXML will be bigger than WAP, and we will see many attempts to scrape the Web for text-to-speech. In addition, there will be new businesses with VXML content based purely on audio. For example, Audible.com and Command Audio go directly to VXML, thereby bypassing text altogether. I am skeptical that anyone will make much of a business out of converting text to voice by automating the process of converting Web pages—the visual para- digm doesn’t match the aural paradigm. Better to rethink Web businesses from the point of view of radio rather than TV. GLOBAL RESPONSE INFRASTRUCTURE CRUCIAL FOR WEB SECURITY To the Editor: The Internet’s explosive growth and its distributed access points have made it vulnerable to security breaches. In addi- tion to placing the assets and privacy of individuals at risk, the increasing depen- dence on the Internet and the intercon- nectivity it offers raises concerns about the vulnerability of the critical infra- structure. From a mere six attacks on the Internet reported to CERT (Computer Emergency Response Team) in 1988, the number increased to 9,859 in 1999. During the first quarter of 2000, more than 4,000 incidents were reported (http://www.cert.org/stats/cert_stats.html [accessed 08 June 2000]). Although CERT does not publish statistics on the international nature of Internet attacks, an attack originated in any country can rapidly spread worldwide. Traditionally, CERT and FIRST (For- um of Incident Response and Security Teams)—a group of security practition- ers who respond to computer security To WAP or Not to WAP? Continued on page 6 We welcome your letters. Send them to Letters, Computer, 10662 Los Vaqueros Cir., PO Box 3014, Los Alamitos, CA 90720-1314; fax +1 714 821 4010; computer@computer. org. Letters are subject to editing for style, clarity, and length.

Upload: r

Post on 22-Sep-2016

237 views

Category:

Documents


8 download

TRANSCRIPT

Page 1: To WAP or not to WAP? [Letters]

4 Computer

L E T T E R S

To the Editor:I just recommended WAP to the Navy,

and then I saw Ted Lewis’s article (“WhyWAP May Never Get off the Ground,Aug. 2000, pp. 112, 110-111).

But I’m sticking to my guns that it’s agood protocol to look at for defense pur-poses. The problems of mobility, fracturedaccess, low bandwidth, and limited clientprocessing are similar, and WAP has atleast taken a good look-see at such issues.The XML link doesn’t hurt much either.

I’m surprised that Lewis invoked lackof GPRS and 3G services as killers,though, and I’m not sure why the empha-sis on audio. I have this peculiar feelingthat the Internet is coming to mobile nomatter what, and WAP still looks like abetter “well, I guess we could use this”alternative than other choices like MExEor the Java stuff. I’m betting that “sortof adequate and it’s there” will be the realdriver as the Internet mobilizes.

So... I’ll bet Lewis a wooden nickel ora chance to sub for him in the BinaryCritic column on a topic of my choicethat by the start of 2002 WAP will be inplace and in use in more devices than anyalternatives. (Actually, I’m not sure if I’mproposing that for “winning” or “los-ing,” but whatever...)Terry [email protected]

Ted Lewis replies:Thanks for your alternative view. I am

sure most of Computer’s readers willagree with you. But, the killer app fortelephones is voice, in my view. I want

my PT Cruiser to vocalize my e-mail,sports, and news, and alert me to trafficjams...all while I am keeping both handson the steering wheel. As for mobilephones, so far they have been designedfor ears, not eyes.

Okay, so PIMS like the PalmPilot willmerge with handys such as I-MODEfrom DoCoMo, but my guess is that theresulting hybrid will talk to me ratherthan try to replace my desktop browser.

To the Editor:Ted Lewis’s comments about WAP

(“Why WAP May Never Get off theGround,” Aug. 2000, pp. 112, 110-111)bring up a number of questions: How arecompanies going to develop voice-basedWeb transactions? If either WAP orVXML is the answer, how many billionsof Web pages can be converted to eithertechnology, and who would do that?What would the cost be, and who wouldpay for it? (Obviously, not the con-sumers.)

The latest breakthrough technology inthe area of voice-based Internet access isan intelligent agent that uses artificialintelligence and doesn’t require the cre-ation of VXML or WAP pages. It canread any page, convert text to speech,send and receive e-mails, browse theWeb, or perform stock trades and other

commercial transactions anytime, any-where, using an ordinary phone and sim-ple voice commands.

This technology will change the e-busi-ness rules, and early adopters will have atremendous competitive advantage. Amit Sarkar Internet Speech [email protected]

Ted Lewis replies:Many new companies have the right

idea. VXML will be bigger than WAP,and we will see many attempts to scrapethe Web for text-to-speech. In addition,there will be new businesses with VXMLcontent based purely on audio. Forexample, Audible.com and CommandAudio go directly to VXML, therebybypassing text altogether.

I am skeptical that anyone will makemuch of a business out of converting textto voice by automating the process ofconverting Web pages—the visual para-digm doesn’t match the aural paradigm.Better to rethink Web businesses from thepoint of view of radio rather than TV.

GLOBAL RESPONSE INFRASTRUCTURECRUCIAL FOR WEB SECURITY To the Editor:

The Internet’s explosive growth and itsdistributed access points have made itvulnerable to security breaches. In addi-tion to placing the assets and privacy ofindividuals at risk, the increasing depen-dence on the Internet and the intercon-nectivity it offers raises concerns aboutthe vulnerability of the critical infra-structure. From a mere six attacks on theInternet reported to CERT (ComputerEmergency Response Team) in 1988, thenumber increased to 9,859 in 1999.During the first quarter of 2000, morethan 4,000 incidents were reported(http://www.cert.org/stats/cert_stats.html[accessed 08 June 2000]). AlthoughCERT does not publish statistics on theinternational nature of Internet attacks,an attack originated in any country canrapidly spread worldwide.

Traditionally, CERT and FIRST (For-um of Incident Response and SecurityTeams)—a group of security practition-ers who respond to computer security

To WAP or Not to WAP?

Continued on page 6

We welcome your letters. Send them to Letters, Computer, 10662 Los Vaqueros Cir.,PO Box 3014, Los Alamitos, CA 90720-1314;fax +1 714 821 4010; [email protected]. Letters are subject to editing for style,clarity, and length.

Page 2: To WAP or not to WAP? [Letters]

L e t t e r sContinued from page 4

incidents that has neither an operationalmission nor funding—are the two orga-nizations that have played a major rolein addressing Internet security responseand management issues by supportingawareness, response, and preventionactivities. However, there is no globalincidence response infrastructure.

Although international cooperationexists at the diplomatic or national intel-ligence level, cooperation is needed at thecybertechnical level. We need to estab-lish a global response team to help set upguidelines for handling internationalInternet attacks. Technical cooperationwill help pinpoint the source, identify theenvironment, aid in tracing the machinesand individuals at the source of theattacks, and determine the appropriateresponse.

Conducting a systematic study todevelop a common taxonomy and lan-guage for the Internet security field is anessential step. This process will facilitatethe sharing of information between organizations and across internationalboundaries. A proper classification andimproved cataloging of attacks will assistin the development of appropriate cor-rective measures when Internet attacksoccur.

The time is now ripe to take someaction in this area. Governments andinternational professional technical orga-nizations such as the IEEE should takethe initiative in setting up global teams,research centers, and response centers todevelop a means of protecting Internetsecurity.Vir V. PhohaCollege of Engineering and ScienceLouisiana Tech UniversityRuston, La.andRekha BangaloreMotorola Corp.Austin, [email protected]

AREA EDITORS

ARTIFICIAL INTELLIGENCE: BILL MARK, SRI INTERNATIONAL; [email protected]

BINARY CRITIC: TED G. LEWIS, DAIMLERCHRYSLERRESEARCH & TECHNOLOGY; [email protected]

COMMUNICATIONS: UPKAR VARSHNEY, GEORGIASTATE UNIV.; [email protected]

DATABASES/SOFTWARE: MICHAEL BLAHA, OMT ASSOCIATES INC.; [email protected]

ENTERTAINMENT COMPUTING: MICHAEL R. MACEDONIA, US ARMY SIMULATION TRAINING ANDINSTRUMENTATION COMMAND; [email protected]

HIGH-PERFORMANCE COMPUTING: BILL MANGIONE- SMITH, UNIV. OF CALIFORNIA AT LOS ANGELES;[email protected]

INTEGRATED ENGINEERING: JERZY ROZENBLIT, UNIV. OF ARIZ., TUCSON; [email protected]; AND SANJAYA KUMAR, HONEYWELL TECHNOLOGYCENTER; [email protected]

INTERNET WATCH: RON VETTER, UNIV. OF NORTHCAROLINA AT WILMINGTON; [email protected]

MULTIMEDIA AND DATABASES: SHUNSUKE UEMURA,NARA INST. OF SCIENCE AND TECHNOLOGY;[email protected]

NETWORKING: JONATHAN M. SMITH, UNIV. OF PENNSYLVANIA; [email protected]

NETWORKING AND E-COMMERCE: ALFRED C. WEAVER;UNIV. OF VIRGINIA; [email protected]

THE PROFESSION: NEVILLE HOLMES, UNIV. OFTASMANIA; [email protected]

SOFTWARE: H. DIETER ROMBACH, AG SOFTWAREENGINEERING; [email protected];BILL N. SCHILIT, FX PALO ALTO LABORATORY;[email protected]. COM

SOFTWARE MANAGEMENT: BARRY BOEHM, UNIV. OFSOUTHERN CALIFORNIA; [email protected]

SOFTWARE TECHNOLOGIES/NEW BOOKS:MICHAEL J. LUTZ, ROCHESTER INSTITUTEOF TECHNOLOGY; [email protected]

STANDARDS: GARY ROBINSON; [email protected]

CONTRIBUTING EDITORHOWARD RUBIN, HUNTER COLLEGE;[email protected]

COMPUTER ADVISERSEDWARD A. PARRISH, WORCESTER

POLYTECHNIC INSTITUTE; [email protected] CAVIN, SEMICONDUCTOR RESEARCH CORP.;

[email protected] COLWELL, INTEL CORP.; BCOLWELL@ICHIPS.

INTEL.COM

CS MAGAZINE OPERATIONS COMMITTEESOREL REISMAN (CHAIR), JAMES H. AYLOR, JEANBACON, THOMAS J. BERGIN, WUSHOW CHOU,GEORGE CYBENKO, WILLIAM I. GROSKY, STEVEMCCONNELL, DANIEL E. O’LEARY, KEN SAKAMURA,MUNINDAR P. SINGH, JAMES J. THOMAS, YERVANTZORIAN

CS PUBLICATIONS BOARDSALLIE SHEPPARD (CHAIR), JAKE AGGARWAL, LAXMI BHUYAN, JON BUTLER, LORI CLARKE, ALBERTO DEL BIMBO, LAUREL KALEDA, RANGACHARKASTURI, MIKE T. LIU, SOREL REISMAN, MIKEWILLIAMS, ZHIWEI XU

EDITOR-IN-CHIEF:JAMES H. AYLOR, UNIV. OF VIRGINIA; [email protected]

ASSOCIATE EDITOR-IN-CHIEF:DORIS CARVER, LOUISIANA STATE UNIV.;[email protected]

COMPUTING PRACTICES: THOMAS CAIN, UNIV. OF PITTSBURGH;[email protected]

PERSPECTIVES: RONALD HOELZEMAN, UNIV. OF PITTSBURGH;[email protected]

SPECIAL ISSUES:KATHLEEN SWIGGER, UNIV. OF NORTH TEXAS;[email protected]

2000 PRESIDENT: GUYLAINE [email protected]

EDITORIAL STAFF

SCOTT HAMILTONSENIOR ACQUISITIONS [email protected]

JANET WILSONSENIOR ACQUISITIONS [email protected]

JUDITH PROWMANAGING EDITOR

LEE GARBERNEWS [email protected]

CHRISTINE MILLERPRODUCTION [email protected]

STEPHANIE KAWADAASSOCIATE EDITOR

JAMES SANDERSASSOCIATE EDITOR

MARY-LOUISE G. PINERSTAFF EDITOR, MEMBERSHIP NEWS

THOMAS J. CENTRELLASTAFF EDITOR

ORREN MERTONSTAFF EDITOR

JASON SEABORNEDITORIAL ASSISTANT

BRYAN SALLISMANUSCRIPT ASSISTANT

ACTING EXECUTIVE DIRECTORANNE MARIE KELLY

PUBLISHERANGELA [email protected]

MEMBERSHIP & CIRCULATIONMARKETING MANAGERGEORGANN CARTER

SALES REPRESENTATIVESANDY AIJALA

ADVERTISING COORDINATORMARIAN ANDERSON

DESIGNLARRY BAUERDIRK HAGNER

PRODUCTIONCHRISTOPHER A. PATTERSONLARRY BAUERKEN DUCKWORTH

Members save 25%on all conferences sponsored by the IEEE Computer Society.

Not a member? Join online today!

Members save 25%on all conferences sponsored by the IEEE Computer Society.

Not a member? Join online today!

computer.org/join/