Showing posts with label capstar. Show all posts
Showing posts with label capstar. Show all posts

Cognitive Networks: Towards Self-Aware Networks Review

Cognitive Networks: Towards Self-Aware Networks
Average Reviews:

(More customer reviews)
There are several questions that immediately come to mind when contemplating the notion of a cognitive network. Some of these include:
1. In what sense are cognitive networks "intelligent", thus justifying the adjective "cognitive"? If these types of networks are intelligent, is there a methodology for quantifying the intelligence of these networks that would allow for example a partial or even well-ordering of cognitive networks according to their intelligence? Quantifying artificial intelligence is of both academic and practical interest, since in the former it will permit an ongoing assessment as to how far researchers have progressed in obtaining machine intelligence while in the latter it will allow network managers to assess the costs of deploying machine intelligence.
2. Do cognitive networks have an "artificial immune system", i.e. a strategy or collection of strategies for recognizing malicious attempts to disrupt or suppress the data flows in these networks or gain access to sensitive information that exists on them? And if so, is this artificial immune system aggressive in the sense that it will take action against intrusion or other forms of malicious activity? Or is it passive, i.e. merely alerting the system administrator to its presence? There are two articles in this book that address these questions, at least to some extent, although the expression "artificial immune system" is not used. 3. Do cognitive networks need the ability to "think in many domains", i.e. do they need to be capable of processing (and differentiating) information originating in my different contexts? This question is partially addressed in the article entitled "The Semantic Side of Cognitive Radio" wherein the authors discuss the need for a common language that radios will have to share in order to communicate effectively.
4. To what extent are cognitive networks able to recognize novel information that is presented to them? As an example, cognitive networks will need to think about network traffic, which of course is always changing. 5. What are the computational requirements of cognitive networks? What advantages do cognitive networks have over (non)-cognitive ones? For example, what performance hit will one take by deploying a cognitive structure over a wireless network?
6. Are cognitive networks able to troubleshoot themselves, i.e. find the cause(s) of problems or issues within the network itself? Are there any operational or commercial examples of cognitive networks that have this ability and how does it compare with networks whose problems are troubleshot with human engineers? The article entitled "Self-Managing Networks" addresses this question in the context of what its authors refer to as "self-healing". They define this as the ability to automatically detect, diagnose, and recover from faults. One would expect that a network that could troubleshoot itself would use some sort of inductive or abductive reasoning patterns in order to find out the cause(s) of problems on the network. The authors do not discuss induction or abduction in this article, but instead focus on what they call "design patterns". These are methods that emulate how humans deal with specific problems on a network. The authors also discuss inductive reasoning patterns in this article, which they define to be the ability to generate training instances using background knowledge or simply by providing explanations using regularities in the data. The rise of inductive logic programming in the last two decades has brought some of this discussion to fruition, and there are commercial systems that use hybrids of inductive and abductive reasoning patterns, although these systems are not discussed in this article or anywhere else in the book.
7. Are there any commercial examples of cognitive networks that are working out in the field right now? What kind of technology is required to implement and maintain a cognitive network in practice? This book does not include any discussion of commercially available cognitive networks, but it does include some discussion of the theoretical apparatus that has been developed for the design of such networks. 8. To what degree are existing networks "cognitive" in the sense that they have capabilities or properties that were not really intended to be "intelligent" by their designers but nevertheless deserve to be characterized as such? This question is not addressed in the book, but there are sound arguments that can be made that some characteristics of modern networks are intelligent without this being the intent of the designers.
9. Does the modeling and simulation of cognitive networks present any special challenges over and above that of ordinary networks? The answer to this question is relevant since, as is the case for ordinary networks, the decision to deploy cognitive networks will typically involve the use of modeling and simulation to a large degree. None of the articles in this book discuss the simulation and modeling of cognitive networks.10. Are cognitive networks more secure than ordinary ones, or does their complexity raise even more issues for security? There are two articles in this book that address the security issues in cognitive networks, both of them dealing with security in the abstract, with no real case studies given (although certain cognitive network architectures are discussed). One of the articles, entitled "Security Issues in Cognitive Networks" points to "spectrum handoff" as being a particular concern for security in these types of networks. Ordinary ad hoc mobile networks do not have this capability. Even though it does not discuss real cases studies of attacks on cognitive networks, this article is worth studying because it discusses those attacks that are unique to these kinds of networks. The other article that addresses security entitled "Intrusion Detection in Cognitive Networks" does not really point to any security weaknesses in cognitive networks that one could find in ordinary networks. If one is to deploy cognitive networks, one expects that their intelligence would make them very resilient to attacks, over and above what one would find in ordinary networks. If they are even more vulnerable to attacks, this would vitiate their utility in real-world applications.
11. How resistant will the network engineering and business community be to the implementation of cognitive networks? The incorporation of intelligent technology has met resistance in the last fifty years, but this resistance has decreased considerably as the technology is proved viable and profitable.

Click Here to see more reviews about: Cognitive Networks: Towards Self-Aware Networks

Cognitive networks can dynamically adapt their operational parameters in response to user needs or changing environmental conditions. They can learn from these adaptations and exploit knowledge to make future decisions.
Cognitive networks are the future, and they are needed simply because they enable users to focus on things other than configuring and managing networks. Without cognitive networks, the pervasive computing vision calls for every consumer to be a network technician. The applications of cognitive networks enable the vision of pervasive computing, seamless mobility, ad-hoc networks, and dynamic spectrum allocation, among others.

In detail, the authors describe the main features of cognitive networks clearly indicating that cognitive network design can be applied to any type of network, being fixed or wireless. They explain why cognitive networks promise better protection against security attacks and network intruders and how such networks will benefit the service operator as well as the consumer.
Cognitive Networks
Explores the state-of-the-art in cognitive networks, compiling a roadmap to future research.
Covers the topic of cognitive radio including semantic aspects.
Presents hot topics such as biologically-inspired networking, autonomic networking, and adaptive networking.
Introduces the applications of machine learning and distributed reasoning to cognitive networks.
Addresses cross-layer design and optimization.
Discusses security and intrusion detection in cognitive networks.

Cognitive Networks is essential reading for advanced students, researchers, as well as practitioners interested in cognitive & wireless networks, pervasive computing, distributed learning, seamless mobility, and self-governed networks.

With forewords by Joseph Mitola III as well as Sudhir Dixit.

Buy Now

Click here for more information about Cognitive Networks: Towards Self-Aware Networks

Read More...

Ad Hoc & Sensor Networks: Theory and Applications Review

Ad Hoc and Sensor Networks: Theory and Applications
Average Reviews:

(More customer reviews)
The concept of as Ad-Hoc, especially a Mobile Ad hoc NETwork - MANET is of a set of devices with communications needs that are not tied to fixed base stations. Rather like the cellular phone network if the base stations were also mobile. This obviously requires that all communications be wireless. The network gets more complex as the devices move, perhaps at different speeds and directions, and as the communications links may not be symetrical, or equivalent speed. An obvious application for a MANET is a modern rapidly moving battlefield such as that in the Iraq wars. Other applications include disaster recovery where a MANET might be set up in hours rather than days -- note the time to re-establish communications in New Orleans after Hurricane Katrina.
This book is the result of research that covers vertually every aspect of MANETs included Routing, Scability, Quality of Service, Security, Energy Conservation, Topology, Standards, and Implementation.

Click Here to see more reviews about: Ad Hoc & Sensor Networks: Theory and Applications

This book introduces a new explanatory cross-layer model specifically designed to understand all aspects of ad hoc and sensor networking, from design through performance issues to application requirements. Future directions, challenges and potential simulation projects are also discussed.The topics included represent a significant portion of what is going on in academia and industry. The vast materials provided will enable readers to not only understand and position themselves in this hot area, but also to develop new capabilities, enhance skills, share expertise, consolidate knowledge and design future solutions. Thus, the book is useful for researchers and engineers, and anyone who seeks a deeper understanding of this growing field and wishes to pursue it as a future research topic.--This text refers to an out of print or unavailable edition of this title.

Buy Now

Click here for more information about Ad Hoc & Sensor Networks: Theory and Applications

Read More...

How To Shop For A Cell Phone: One Quick, Easy Read Could Save You Thousands Review

How To Shop For A Cell Phone: One Quick, Easy Read Could Save You Thousands
Average Reviews:

(More customer reviews)
Unlike other books which bore you with long winded discussions, this book gets right to the point with plain and simple language and illustrations. Herbie the Cell Phone (the main character in the book) points out pitfalls and things to look for with cellular contracts, phones, and accessories. Both new and experienced users can profit from this book. A MUST READ !

Click Here to see more reviews about: How To Shop For A Cell Phone: One Quick, Easy Read Could Save You Thousands

Shopping for a cellular phone has never been this easy!In simple, readable language, Herbie's Guide through the Cellular Maze tells you everything you need to know!Herbie the Cell Phone is the "couch potato's " answer to shopping for a cellular phone!This book covers:Coverage Areas,Calling Plans, Roaming, Long Distance Charges, How To Buy, Where To Buy, Cellular Contracts, Cellular Standards,Cell Phone Security, Satellite and Smart Phones, Batteries and Chargers

Buy Now

Click here for more information about How To Shop For A Cell Phone: One Quick, Easy Read Could Save You Thousands

Read More...

Mobile World: Past, Present and Future (Computer Supported Cooperative Work) Review

Mobile World: Past, Present and Future (Computer Supported Cooperative Work)
Average Reviews:

(More customer reviews)
The book is a good attempt at peering into the future of mobile computing. In part, it does this by looking at the recent past, and the various projections made then about upcoming mobile trends. These predictions are evaluated against what actually happened. A sobering comparison. A lot of hype happened in the 90s dot com and telecom era. And mobile computing spanned both fields. Resulting in massive overbuilding of telecom networks and overbidding for 3G licenses. Billions of dollars, euros and yen were squandered in those efforts.
So one lesson from the book is that predictions are always fraught with uncertainty. Hopefully, this engenders some caution and humility amongst the authors of the book's papers, and in the reader.
The book studies future mobile technologies and wonders how these might turn out. Useful research ideas. Though nothing I read here really seemed to be a gripping, Eureka-type vision.

Click Here to see more reviews about: Mobile World: Past, Present and Future (Computer Supported Cooperative Work)



Buy Now

Click here for more information about Mobile World: Past, Present and Future (Computer Supported Cooperative Work)

Read More...

Grid Networks: Enabling Grids with Advanced Communication Technology Review

Grid Networks: Enabling Grids with Advanced Communication Technology
Average Reviews:

(More customer reviews)
The book defines the state of the art of grid networks. It shows the progress made in recent years. No longer is a grid network mostly a conceptual idea or just an implementation that proves such a network is possible.
Instead, much of the book is devoted to showing how to design and manage in some optimal manner a grid network. Definite progress. Another plus is a section that discusses how to integrate such a network with the distributed Web Services. Something that plays naturally to the distributed nature of the grid. There are simple examples using Web Services Description Language and UDDI. Nothing too sophisticated yet, unfortunately. But maybe in later editions of this book, we'll see some nontrival Web Services explained.

Click Here to see more reviews about: Grid Networks: Enabling Grids with Advanced Communication Technology

A book that bridges the gap between the communities of network and Grid experts.
Grid Networks describes the convergence of advanced networking technologies and Grid technologies, with special focus on their symbiotic relationship and the resulting new opportunities. Grid technology is applicable to many implementations, Computational Grids, Data Grids, Service Grids, and Instrumentation Grids.
The authors cover a breadth of topics including recent research, featuring both theoretical concepts and empirical results. Beginning with an overview of Grid technologies, an analysis of distinguishing use cases and architectural attributes, and emerging standards. Travostino et al. discuss new directions in multiple networking technologies that are enabling enhanced capabilities for Grids. An appendix also provides an overview of experimental research test-beds and prototype implementations.
These topics will enable network experts to design networks to best match Grid requirements, while Grid experts will learn how to effectively utilize network resources.
Grid Networks: Enabling Grids with Advanced Communication Technology:
Bridges the gap between the communities of network and Grid experts.
Covers new network requirements posed by the Grid, and the paradigm shifts prompted by Grid applications.
Discusses basic architectural concepts and directions related to the integration of Grid and networking technologies, especially those that elevate network resources to first class entities within Grid environments.
Details new directions in networking technologies for the Grid, including Network Infrastructure & Management, Service Provisioning, High Performance Data Transport, Performance Monitoring, Reliability, and Network-Assisted Service Frameworks.
Provides an overview of advanced research testbeds and innovative early implementations of emerging architecture and technology.

Many communities will find this book an invaluable resource, including engineers and product managers, research scientists within academia, industry, and government agencies, advanced students and faculty in distributed systems courses, network and systems architects, CIOs, administrators of advanced networks, application developers, and providers of next generation distributed services.

Buy NowGet 16% OFF

Click here for more information about Grid Networks: Enabling Grids with Advanced Communication Technology

Read More...

Pervasive Computing Handbook Review

Pervasive Computing Handbook
Average Reviews:

(More customer reviews)
This book explains new technologies in a very simple and informative way. It would have been nice to find some more links to business, but this seems not to be the target market. Ideal for engineers that need to get an update on technologies.

Click Here to see more reviews about: Pervasive Computing Handbook

This book is a guide for the world of pervasive computing. It covers a variety of front-end devices and their opening systems as well as the back-end systems which have to integrate the pervasive components into a seamless IT world. A strong emphasis is placed on the underlying technologies and standards applied when building up pervasive solutions. These fundamental topics include commonly used terms such as XML, WAP, transcoding, and cryptography, to mention just a few. The book presents an overview of the different development strategies and tools for different pervasive platforms. In order to ease the planning and development of new solutions, concepts and considerations specific to a variety of different target environments, such as e-Business, private home, finance, and travel, are explained. Case studies of pervasive computing in upcoming real-life solutions are comprehensive

Buy Now

Click here for more information about Pervasive Computing Handbook

Read More...

Security Cottage: a Secure Environment for IEEE 802.15.4 Devices (Volume 1) Review

Security Cottage: a Secure Environment for IEEE 802.15.4 Devices (Volume 1)
Average Reviews:

(More customer reviews)
Perhaps not, but at $365 for 108 pages, Usman's "book" is a completely ridiculous product. Normally, such publications (generally called "theses" by PhD candidates) are published by the school at cost, or barely above (perhaps $20 for a binding and distribution fee).
With the advent of on-demand printing services, certainly that cost has come down to the point of being comparable to the cost of manually photocopying pages and then stapling them together.
Skip Usman's book, and instead read any of a host of other, far less expensive and more in-depth, books available.

Click Here to see more reviews about: Security Cottage: a Secure Environment for IEEE 802.15.4 Devices (Volume 1)

Ubiquitous wireless sensor networks are networks consisting of several small computers operational with sensors to discover events like human movement with infrared sensors or resolve the existing state of certain parameters like temperature. These sensor nodes are assembled with a radio to commune with each other and to broadcast data to a central computer where this data can be analyzed. These new sensing computing machines come with new challenges. To eliminate the limitations imposed by wires, sensors possess limited energy sources and correspond with neighboring nodes using wireless networks. Due to critical nature of applications, securing data generated in sensor field by sensors is important. While data security is necessary, the functionality cost in terms of routing and energy needs to be assessed carefully. Limited bandwidth and memory pull the trigger to make more sophisticated and light weight cryptography models. Moreover, deployment of tiny devices like sensor nodes in hostile environment, make it easier for intruder to budge in, plant attack node or control over the legitimate node to launch an attack. In this book, we have analyzed the basic threat model in ubiquitous wireless sensor network (USWN), and presented a quad tree based network portioning scheme, which ensure data accuracy at primary level. Each sensor node maintains neighboring table which stores the node information, our neighbor voting based defense solution helps to authenticate clear text broadcast of control packets. Once we have identified malicious node, our localization scheme can highlight the vulnerable node locality, even most of anchors are compromised. Localization scheme also helped us to strengthen defense against Sybil attack and wormhole attack. We analyze security of proposed scheme against Hello flood, data authentication attacks, node cloning attack and routing attacks.In the existing scenarios, where diverse security services are independent from each other, each service adds an additive communication overhead. By incorporating energy-concentrated security services that are regularly required in sensor network applications, we considerably decrease the energy.

Buy Now

Click here for more information about Security Cottage: a Secure Environment for IEEE 802.15.4 Devices (Volume 1)

Read More...

Telecom Convergence, 2/e: How to Bridge the Gap Between Technologies and Services Review

Telecom Convergence, 2/e: How to Bridge the Gap Between Technologies and Services
Average Reviews:

(More customer reviews)
If you work in the telecommunications industry, you'll want to read this book. Even if you don't, this book could help you understand some the the leading trends, technologies and companies that could help you develop a profitable investment strategy in this hot constantly changing industry.
It is an excellent blend of technological descriptions and business insight with a touch of prognostication from industry leaders, thinkers and innovators. The book is divided into three main parts: 1) the main technologies feeding convergence, 2) company convergence, and 3) services convergence. A veteran technologist may want to skip the first part, but not knowing much about wireless or DSL I found it very informative and a good refresher on T-1. Each part ends with a bibliography containing references to books, web resources and articles, but the real payoff is the information gleaned from the author's extensive interviews.
I love the multipurpose feel to this book. It is labeled as the first of the "Portable Consultant" series and is worthy of that tag. This is not just a technical book and it is not just a business book, it is both, not an easy thing to do. Like a good consultant it is packed full of useful information and easy to understand explanations.

Click Here to see more reviews about: Telecom Convergence, 2/e: How to Bridge the Gap Between Technologies and Services



Buy Now

Click here for more information about Telecom Convergence, 2/e: How to Bridge the Gap Between Technologies and Services

Read More...

A Practical Guide to Securing and Managing the Wireless Network Review

A Practical Guide to Securing and Managing the Wireless Network
Average Reviews:

(More customer reviews)
Mr. Mitchell has produced a comprehensive yet easily understood guide to wireless security. Recommended for anyone entering the world of wireless networks.

Click Here to see more reviews about: A Practical Guide to Securing and Managing the Wireless Network



Buy Now

Click here for more information about A Practical Guide to Securing and Managing the Wireless Network

Read More...

Hitchhiker's Guide to the Wireless Web eBook Review

Hitchhiker's Guide to the Wireless Web eBook
Average Reviews:

(More customer reviews)
I just read that the digital version is the first digital book admitted into in the Library of Congress. Anyway, The Hitchhiker's Guide to the Wireless Web is a guide for ebusiness executives with an emphasis on practical results. It shows how to execute a wireless Web strategy. I liked that it covered what the obstacles are and especially how to overcome them. Highly recommended!

Click Here to see more reviews about: Hitchhiker's Guide to the Wireless Web eBook

This concise, hands-on E-book introduces tools and techniques for easing a company's existing E-business into the wireless Web environment. It explains how to seamlessly blend wireless technologies into existing operations while overcoming common difficulties and constraints.

Buy Now

Click here for more information about Hitchhiker's Guide to the Wireless Web eBook

Read More...

System-in-Package RF Design and Applications Review

System-in-Package RF Design and Applications
Average Reviews:

(More customer reviews)
Gaynor does a very good job of explaining the practical details for SIP. The book covers the RF design aspects quite well, but is also very "hands on" by showing many practical examples. It also gives a great perspective on manufacturing considerations & techniques. This is a great book for an RF designer at any level to keep on the shelf.


Click Here to see more reviews about: System-in-Package RF Design and Applications

In the past few years, System in Package (SiP) design has fueled a revolution in the use of modules in wireless devices due its effectiveness in meeting the increasingly demanding requirements for reliability, shielding, performance, size, and cost. Here's the first comprehensive resource on SiP design techniques that offers designers state-of-the-art packaging know-how. Moreover, the book provides numerous examples that illustrate real-world capabilities, constraints, trade-offs, and options at every step.

Buy NowGet 10% OFF

Click here for more information about System-in-Package RF Design and Applications

Read More...

The Future of Mobile Communications: Awaiting the Third Generation Review

The Future of Mobile Communications: Awaiting the Third Generation
Average Reviews:

(More customer reviews)
It is very difficult keeping track of what is going on in mobile communications, especially if you are interested in the politics and economics rather than the technology as such which is covered in a number of other books listed on Amazon. Curwen is the first author to try and make sense of it all in book form, and he has overall done a very good job, covering the history of mobile from 2G through GPRS etc to 3G, introduing a short case study of every country that has licensed 3G, an analysis of all of the issues raised and a detailed look at Vodafone and Orange as representative operators. There's lots of wrong numbers out there in the media and websites, and great care has obviously been taken to check the data although the author admits the possibility of errors. The book's greatest virtue is that it is up to date, with the final draft of the text only months old. This isn't one for the techies, but for those interested in the wider ramifications of mobile communications it will prove a valuable - and commendably brief - read.

Click Here to see more reviews about: The Future of Mobile Communications: Awaiting the Third Generation



Buy Now

Click here for more information about The Future of Mobile Communications: Awaiting the Third Generation

Read More...

Residential Broadband Networks Review

Residential Broadband Networks
Average Reviews:

(More customer reviews)
There are about two or three must-reads out there if you want to understand broadband access at a high level. This is one of them.
Kim Maxwell's "Residential Broadband" is fantastic but a bit opinionated -- it doesn't even mention ANY wireless local loop solutions, for example. And it doesn't cover passive optical networks. Mr. Black's text is more comprehensive. It's an easy-to-read survey text which is an excellent introduction to the field.
It does use some technical lexicon and is not for the innumerate; go read books in the Microsoft Library if you want a "for Dummies" type book. Mr. Black defines the terms he uses very clearly, but does not pause to provide context for the reader. If you're an engineer or just a geek, you'll love this.

Click Here to see more reviews about: Residential Broadband Networks



Buy Now

Click here for more information about Residential Broadband Networks

Read More...

Essential WAP for Web Professionals Review

Essential WAP for Web Professionals
Average Reviews:

(More customer reviews)
I really liked this book. most of the other WAP / WML titles either just talked about WML or low level-WAP protocols. Thhis book covers key concepts like security and has a lot of code examples. I have even used the JDeck wap library at work. I have never seen anyone use the multi-part MIME stuff with WML before. very cool, bleeding edge stuff.

Click Here to see more reviews about: Essential WAP for Web Professionals

By 2004, over a billion wireless devices will access the Internet -- and most will use WAP, the #1 solution for delivering wireless and e-commerce content. In this compact, example-rich guide, Web developers will discover exactly how to build practical applications with WAP -- and join the wireless Internet revolution. Essential WAP for Web Professionals offers no-nonsense, practical introductions to the key elements of WAP systems, and the key techniques of WML/WMLScript development. It also contains complete WAP server-side applications built with four leading tools: ASP, Perl, JSP, and Servlets -- all viewable and downloadable on the Web. The authors demonstrate how to set up a WAP development environment, then introduce the key network, software, and hardware modules that comprise WAP. They cover the most commonly used WML elements, attributes, variables, task and event elements; show how to use graphics effectively in wireless applications; and present practical techniques for maximizing WAP security. The book concludes with a preview of WAP's future -- a future of richer content, and more interactive applications.

Buy Now

Click here for more information about Essential WAP for Web Professionals

Read More...

Radio Propagation in Cellular Networks (Artech House Mobile Communications Library) Review

Radio Propagation in Cellular Networks (Artech House Mobile Communications Library)
Average Reviews:

(More customer reviews)
This books starts from the beginning of electromagnetics fundamentals to the essential rules of deploying a wireless or cellular network. It is a must reading material for every RF engineer or a wireless network system architect. This book is also ideal for an advance course in a masters program. Each chapter is dedicated to another area of wave propagation: from urban to rural.

Click Here to see more reviews about: Radio Propagation in Cellular Networks (Artech House Mobile Communications Library)

A description of propagation phenomena in urban, suburban and rural environments to help readers improve the efficiency of wireless communication systems. It considers the full algorithm for radio coverage prediction and cellular characteristic prediction to increase performance of radio and cellular map design. The book is designed to help wireless local hoop, stationary and wireless system designers construct radio coverage maps, predict cellular characteristics in communications channels, design and split cellular maps, and predict cellular systems performance in complex, urban environments. It includes analysis of free space propagation over regular and irregular terrain, reflection and diffraction by various obstacles, including hills, buildings and trees, as well as the effects of scattering due to such obstacles and terrain. It emphasizes behaviour of waves in the UHF/L-frequency band throughout.

Buy Now

Click here for more information about Radio Propagation in Cellular Networks (Artech House Mobile Communications Library)

Read More...

I-Mode: A Primer Review

I-Mode: A Primer
Average Reviews:

(More customer reviews)
I like to explore new topics and areas within computers to see what other things are out there. This book is an insight into a whole new arena for me. Judging from the content and the detail of the content, this author has certainly has shown me that he is one the foremost experts on the topic of i-mode.

Over 480 pages make up this manual which covers the model that Japan has found to be the best cash-for content model out there. In part 1 of the book you have the opportunity to look into the history of the i-mode as well as the hardware and software beginnings.

Part 2 is the i-mode environment, who would use the product, what type of audience can and do you target. Making it work so you can enhance the revenue. Finally part 3 is how to develop in i-mode. What application are used for development and the language used to create i-mode pages.

While most of the concepts are still a little beyond my understanding with the cd included , which has Java SDK, Forte for Java, a demo of Adobe Go Live and several other applications, I am beginning to understand what it takes.

Overall the author has spent a great deal of time and effort inputting together a seriously complete reference manual - well done.

Click Here to see more reviews about: I-Mode: A Primer

I-Mode: A Primer is the first book to hit the English market on this fast-growing wireless technology. This book includes an explanation of I-mode; it's history, technology, features and services available, and discussion of how it is being used, followed by a developer's guide to show how to begin building I-Mode applications. The book also includes some case studies illustrating various implementations including what has worked and what has not. Readers will gain a very clear picture of both the hardware and software involved with this very successful implementation of a mobile phone-based Internet service, the cultural milieu that it occurred in, and how to develop for I-mode and the mobile Internet. Specific coverage includes: exploring handsets, deployment, 3G network plans, packet-switching, CHTML and programming I-Applis, the I-Mode version of Java.

Buy Now

Click here for more information about I-Mode: A Primer

Read More...

Building Dynamic WAP Applications with MobileDev Review

Building Dynamic WAP Applications with MobileDev
Average Reviews:

(More customer reviews)
This book is of little use if you're not using MobileDev, but after registering 3 times, emailing and calling the company I still haven't received the "key" that's needed to get the software to run.
The version on the included CDROM is also out of date, as is the Nokia SDK.
Save yourself the hassle.

Click Here to see more reviews about: Building Dynamic WAP Applications with MobileDev

This book contains basic information necessary for WAP development as well as the first professional GUI tool for building WAP applications. It presents a proven methodology for building WAP applications and includes two of the major SDKs will allow the reader to test their applications in the environment where they will be used.

Buy NowGet 24% OFF

Click here for more information about Building Dynamic WAP Applications with MobileDev

Read More...