11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

embedded system 177Instead, companies such as Micros<strong>of</strong>t <strong>and</strong> Google competeto <strong>of</strong>fer full-featured e-mail programs that include grouporientedfeatures such as task lists <strong>and</strong> scheduling (see alsopersonal information manager).Transmission <strong>of</strong> an e-mail message depends on widely used protocolssuch as SMTP, which controls message format <strong>and</strong> processing,<strong>and</strong> POP3, which h<strong>and</strong>les interaction between mail servers <strong>and</strong>client programs. As long as the formats are properly followed, userscan employ a wide variety <strong>of</strong> mail programs (agents), <strong>and</strong> serviceproviders can use a variety <strong>of</strong> mail server programs.system, open the file, <strong>and</strong> look for messages. In 1971, however,the ARPANET (ancestor <strong>of</strong> the Internet—see internet)was used by researchers at Bolt Beranek <strong>and</strong> Newman(BBN) to send messages from a user at one computer to auser at another. The availability <strong>of</strong> e-mail helped fuel thegrowth <strong>of</strong> the ARPANET through the 1970s <strong>and</strong> beyond.As e-mail use increased <strong>and</strong> new features were developed,the question <strong>of</strong> a st<strong>and</strong>ardized protocol for messagesbecame more important. By the mid-1980s, the world <strong>of</strong>e-mail was rather fragmented, much like the situation inthe early history <strong>of</strong> the telephone, where users <strong>of</strong>ten had tochoose between two or more incompatible systems. Apranet(or Internet) users used SMTP (Simple Mail Transport Protocol)while a competing st<strong>and</strong>ard (OSI MHS, or MessageH<strong>and</strong>ling System) also had its supporters. Meanwhile, thedevelopment <strong>of</strong> consumer-oriented online services such asCompuServe <strong>and</strong> America Online threatened a further balkanization<strong>of</strong> e-mail access, though systems called gatewayswere developed to transport messages from one system toanother.By the mid-1990s, however, the nearly universal adoption<strong>of</strong> the Internet <strong>and</strong> its TCP/IP protocol had establishedSMTP <strong>and</strong> the ubiquitous Sendmail mail transport programas a uniform infrastructure for e-mail. The extension <strong>of</strong> theInternet protocol to the creation <strong>of</strong> intranets has largelyeliminated the use <strong>of</strong> proprietary corporate e-mail systems.E-mail TrendsThe integration <strong>of</strong> e-mail with HTML for Web-style formatting<strong>and</strong> MIME (for attaching graphics <strong>and</strong> multimediafiles) has greatly increased the richness <strong>and</strong> utility <strong>of</strong>the e-mail experience. E-mail is now routinely used withinorganizations to distribute documents <strong>and</strong> other resources.However, the addition <strong>of</strong> capabilities has also opened securityvulnerabilities. For example, Micros<strong>of</strong>t Windows <strong>and</strong>the popular Micros<strong>of</strong>t Outlook e-mail client together providethe ability to run programs (scripts) directly fromattachments (files associated with e-mail messages). Thismeans that it is easy to create a virus program that will runwhen an enticing-looking attachment is opened. The viruscan then find the user’s mailbox <strong>and</strong> mail copies <strong>of</strong> itself tothe people found there. E-mail has thus replaced the floppydisk as the preferred medium for such mischief. (See computervirus.)Beyond security issues, e-mail is having considerablesocial <strong>and</strong> economic impact. E-mail has largely replacedpostal mail (<strong>and</strong> even long-distance phone calls) as a wayfor friends <strong>and</strong> relatives to keep in touch. As more companiesbegin to use e-mail for providing routine bills <strong>and</strong>statements, government-run postal systems are seeing theirfirst-class mail revenue drop considerably. Despite the risk<strong>of</strong> viruses or deception <strong>and</strong> the annoyance <strong>of</strong> electronicjunk mail (see spam), e-mail has become as much a part <strong>of</strong>our way <strong>of</strong> life as the automobile <strong>and</strong> the telephone.Further ReadingCostales, Bryan, <strong>and</strong> Eric Allman. Sendmail. 3rd ed. Sebastapol,Calif.: O’Reilly, 2002.Sendmail Consortium. Available online. URL: http://www.sendmail.org/. Accessed July 22, 2007.Shipley, David, <strong>and</strong> Will Schwalbe. Send: The Essential Guide toEmail for Office <strong>and</strong> Home. New York: Knopf, 2007.Song, Mike, Vicki Halsey, <strong>and</strong> Tim Burress. The Hamster Revolution:How to Manage Your Email Before It Manages You. SanFrancisco: Bennett-Koehler, 2007.embedded systemWhen people think <strong>of</strong> a computer, they generally think <strong>of</strong>a general-purpose computing system housed in a separatebox, for use on the desk or as a laptop or h<strong>and</strong>-held device.However, the personal computer <strong>and</strong> its cousins are only thesurface <strong>of</strong> a hidden web <strong>of</strong> computing capability that reachesdeep into numerous devices used in our daily lives. Moderncars, for example, <strong>of</strong>ten contain several specialized computersystems that monitor fuel injection or enhance the car’s gripon the road under changing conditions. Many kitchen appliancessuch as microwaves, dishwashers, <strong>and</strong> even toasterscontain their own computer chips. Communications systemsranging from cell phones to TV satellite dishes includeembedded computers. Most important, embedded systemsare now essential to the operation <strong>of</strong> critical infrastructure

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!