18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1<br />

Wireless Technologies 367<br />

GSM h HSCSD h GPRS fc EDGE fc UTR.A WCDMA<br />

9,6 - 14.4 - *" 57.6 Kbps - "*" 176 Kbps - "^ 768 Kbps - r 2 Mbps<br />

Kbps I JL<br />

1999 2000 2001 2002<br />

Figure 12.7. — The migration <strong>to</strong> 3G networks<br />

way <strong>to</strong> address this shortcoming is through enhanced user authentication<br />

and location profiling which is a byproduct of real-time call rating.<br />

Still another set of latency issues arise in the transcoding (i.e.,<br />

presentation and adaptation) of Internet data for display and processing<br />

on wireless devices. Websites combine presentation and content data<br />

using HTML, which must be transcoded for wireless device use. Use of<br />

XML gets around that problem. Widespread adoption of the WAP with<br />

its XML-compliant WML has provided an interim solution. However,<br />

conversion of WAP at a carrier's gateway poses a security risk for the<br />

enterprise. While 3G wireless and wired broadband networks will<br />

ultimately use end-<strong>to</strong>-end IP (Internet Pro<strong>to</strong>col), enterprise solutions in<br />

the near term are likely <strong>to</strong> require middleware <strong>to</strong> ensure security and<br />

high throughput for transactions. Figure 12.7 outlines the migration <strong>to</strong><br />

3G networks.<br />

As wireless devices become smarter, faster and more powerful, they<br />

will undoubtedly pose a new enterprise security risk. It is anticipated<br />

that these devices will exchange not only voice and data, but also<br />

executable code. Distributed object frameworks support remote invocation<br />

of code. As mobile IP, distributed object frameworks and mobile code<br />

technologies, such as Java and Jini, merge in the future, it is safe <strong>to</strong><br />

assume that we will have new security and privacy risks.<br />

If a company is looking <strong>to</strong> deploy some kind of wireless business-<strong>to</strong>business<br />

solution, there are three basic, but very important things one<br />

can do <strong>to</strong> protect one's data now and limit the impact of IP theft:<br />

1. The more network-centric solutions designed a priori, with the least<br />

amount of sensitive data residing in the handheld, the better off one<br />

X

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!