Online File W9.1 Wireless Advertising in...

13
Chapter Nine 1 The following are a few examples of wireless advertisement campaigns or trials currently underway. Vindigo (vindigo.com) has a large database of customers (over a million as of May 2004) who are willing to accept promo- tional materials on their wireless devices. This is known as permission marketing. The users download special software to their PDAs that allows Vindigo to deliver timely, accurate information about places to go and things to do in their area. Along with every listing, the company can deliver a customized message to the users at a time and place where it is of most interest to them and they are most likely to act on it. The company targets ads by city (New York, San Francisco, Los Angeles, etc.) and channel (Eat, Shop, or Play). Vindigo tracks which ads a user sees and selects, and even allows a user to request information from an advertiser via e-mail. Vindigo determines a user’s location through GPS or by asking which neighborhoods the user wants to be matched with. For example, an Italian restaurant chain could use Vindigo to send a message to anyone looking for Italian food within a few blocks of one of its locations. The restaurant could provide the user with directions to the restaurant and even offer a list of specials on the menu. MyAvantGo (avantgo.com) has several thousand content channels and over 8 million registered users (AvantGo 2004). The content is delivered to PDAs and handsets running Palm or PocketPC operating systems. MyAvantGo offers an m-business chan- nel and direct promotions, delivering advertising from some of the world’s top brands, including American Airlines, Chevy Trucks, the Golf Channel, CNN, the New York Times, and Yahoo! Hoping to become the king of location-based Web domains, Go2 (go2online.com) helps mobile travelers find everything from lodging (choose go2hotels) to Jiffy Lube stations. Partnering with Sprint, Nextel, Verizon, and BellSouth, Go2 makes its services available on every Web-enabled phone, Palm i705, and BlackBerry RIM pager in America. Entering “JiffyLube” or hundreds of other brand names into the Go2 system will bring up the nearest location where a shopper can find that product or service. Another aspect of wireless advertising is getting paid to listen to advertising. As in the wireline world, some consumers are willing to be paid for exposure to advertising. In most places where it was offered in the United States, this service was a flop and was discontinued. In Singapore, though, getting paid to listen to advertising works very well. Within a few months of offering the ads, more than 100,000 people subscribed to the free minutes in exchange for listening to the ads offered by SingTel Mobile (Eklund 2001). Subscribers to SingTel’s service fill out a personal questionnaire when they sign up. This information is fed into the Spotcast database and encrypted to shield subscribers’ identities—Spotcast cannot match phone numbers with names, for example. To collect their free minutes—1 minute per call, up to 100 minutes a month—subscribers dial a four-digit code, then the phone number of the person they want to talk to. The code prompts SingTel to forward the call to Spotcast and, in an instant, Spotcast’s software finds the best ad to send to the subscriber based on the subscriber’s profile. Sources: Compiled from vindigo.com (accessed 2003); avantgo.com (accessed 2004); go2online.com (accessed 2003); and Eklund, B. “Wireless Advertising’s Home of the Free.” Red Herring, March 6, 2001. redherring.com/mag/issue94/650018065.html (accessed January 2003). Online File W9.1 Wireless Advertising in Action

Transcript of Online File W9.1 Wireless Advertising in...

Page 1: Online File W9.1 Wireless Advertising in Actionwps.prenhall.com/wps/media/objects/2519/2580469/...nel and direct promotions, delivering advertising from some of the world’s top brands,

Chapter Nine 1

The following are a few examples of wireless advertisement campaigns or trials currently underway.Vindigo (vindigo.com) has a large database of customers (over a million as of May 2004) who are willing to accept promo-

tional materials on their wireless devices. This is known as permission marketing. The users download special software to theirPDAs that allows Vindigo to deliver timely, accurate information about places to go and things to do in their area. Along withevery listing, the company can deliver a customized message to the users at a time and place where it is of most interest tothem and they are most likely to act on it.

The company targets ads by city (New York, San Francisco, Los Angeles, etc.) and channel (Eat, Shop, or Play). Vindigotracks which ads a user sees and selects, and even allows a user to request information from an advertiser via e-mail. Vindigodetermines a user’s location through GPS or by asking which neighborhoods the user wants to be matched with. For example, anItalian restaurant chain could use Vindigo to send a message to anyone looking for Italian food within a few blocks of one of itslocations. The restaurant could provide the user with directions to the restaurant and even offer a list of specials on the menu.

MyAvantGo (avantgo.com) has several thousand content channels and over 8 million registered users (AvantGo 2004). Thecontent is delivered to PDAs and handsets running Palm or PocketPC operating systems. MyAvantGo offers an m-business chan-nel and direct promotions, delivering advertising from some of the world’s top brands, including American Airlines, ChevyTrucks, the Golf Channel, CNN, the New York Times, and Yahoo!

Hoping to become the king of location-based Web domains, Go2 (go2online.com) helps mobile travelers find everything fromlodging (choose go2hotels) to Jiffy Lube stations. Partnering with Sprint, Nextel, Verizon, and BellSouth, Go2 makes its servicesavailable on every Web-enabled phone, Palm i705, and BlackBerry RIM pager in America. Entering “JiffyLube” or hundreds ofother brand names into the Go2 system will bring up the nearest location where a shopper can find that product or service.

Another aspect of wireless advertising is getting paid to listen to advertising. As in the wireline world, some consumersare willing to be paid for exposure to advertising. In most places where it was offered in the United States, this service was aflop and was discontinued.

In Singapore, though, getting paid to listen to advertising works very well. Within a few months of offering the ads, morethan 100,000 people subscribed to the free minutes in exchange for listening to the ads offered by SingTel Mobile (Eklund2001). Subscribers to SingTel’s service fill out a personal questionnaire when they sign up. This information is fed into theSpotcast database and encrypted to shield subscribers’ identities—Spotcast cannot match phone numbers with names, forexample. To collect their free minutes—1 minute per call, up to 100 minutes a month—subscribers dial a four-digit code, thenthe phone number of the person they want to talk to. The code prompts SingTel to forward the call to Spotcast and, in aninstant, Spotcast’s software finds the best ad to send to the subscriber based on the subscriber’s profile.

Sources: Compiled from vindigo.com (accessed 2003); avantgo.com (accessed 2004); go2online.com (accessed 2003); and Eklund, B. “WirelessAdvertising’s Home of the Free.” Red Herring, March 6, 2001. redherring.com/mag/issue94/650018065.html (accessed January 2003).

Online File W9.1 Wireless Advertising in Action

Page 2: Online File W9.1 Wireless Advertising in Actionwps.prenhall.com/wps/media/objects/2519/2580469/...nel and direct promotions, delivering advertising from some of the world’s top brands,

2 Part 4

ONLINE FILE W9.2

U.S. FLEET SERVICES AND WIRELESS NETWORKINGStarted in 1997, U.S. Fleet Services has grown to be theleading provider of mobile, onsite fueling in the UnitedStates, with customers such as FedEx, Home Depot, Coca-Cola, Nabisco, Office Max, and more. Using trucks thatresemble home fuel-delivery vehicles, U.S. Fleet travels toits customers, refueling the customers’ vehicles onsite,usually during off-hours. Three years ago, U.S. Fleet con-sidered building a wireless network for its drivers, butdecided against it. Managers considered the project to betoo hard and too expensive given the expected ROI. How-ever, toward the end of 2001, they changed their minds.

Although a mobile wireless solution was the end goal,the first step in the project actually involved the implemen-tation of an ERP system. This was followed by a Web-basedapplication built on top of the ERP that provided customerswith information about their fuel consumption and taxes,enabling them to do better fleet management. Finally, U.S.Fleet equipped its drivers with handheld devices that couldcommunicate with the company’s intranet using Wi-Fi.

The handheld device U.S. Fleet selected was theIntermec 710 (intermec.com). According to the architect ofthe U.S. Fleet system, this device was selected for a numberof reasons. Besides having a built-in bar-code scanner, it alsoruns Microsoft’s Pocket PC operating system, supports VisualBasic programs, handles CompactFlash cards, and has an inte-grated wireless radio for short range Wi-Fi communications.The device is fairly lightweight with a drop resistant case thatis sealed to protect against harsh weather conditions.

The system works as follows: Branch managers enter adelivery route and schedule for each driver into a centralizeddatabase via the company’s intranet. Each driver starts theshift by downloading the route and schedule over thecompany’s Wi-Fi network into a handheld. When the driverreaches a customer stop, the handheld is used to scan a bar-

code attached to the customer’s truck. This provides thedriver with the type of fuel required by the truck. After thetruck is fueled, a meter on the delivery truck sends a wirelesssignal to the handheld. The handheld then syncs with themeter, capturing the type and quantity of fuel delivered. Thedata are stored on the handheld’s CompactFlash memorycard. When the driver returns to the home base, the data areunloaded over the Wi-Fi network to the central database. Atthis point, the data are available for U.S. Fleet and its cus-tomers to analyze.

Before the handheld computers were deployed, driverswould record the data manually. The data were then faxedfrom the branch offices to headquarters and entered by handinto the system. Not only were there delays, but the datawere also subject to entry errors at both ends of the line. Thecompany and its customers now have accurate data in atimely fashion, which provides the company with fasterinvoicing and cash flow. On average, the new system has alsoenabled drivers to service six to seven more stops per shift.

Source: Ludorf, C. “U.S. Fleet Services and Wireless Networking.”Transportation Technology Today, August 2002, pp. 12–15.

Questions1. What systems did U.S. Fleet have to put in place

before implementing its wireless solution?

2. Why did U.S. Fleet select the Intermec 710 handhelddevice? How does the device communicate with thecompany’s intranet?

3. What are the major benefits that U.S. Fleet has real-ized by combining handheld devices with Wi-Fi?

Page 3: Online File W9.1 Wireless Advertising in Actionwps.prenhall.com/wps/media/objects/2519/2580469/...nel and direct promotions, delivering advertising from some of the world’s top brands,

Chapter Nine 3

ONLINE FILE W9.3

WEARABLE DEVICES FOR BELL CANADA WORKERSFor years mobile employees who had to climb trees, electricalpoles, or tall buildings were unable to enjoy the new tech-nologies designed to make employees more productive. Thatis beginning to change.

On a cold, damp November day in Toronto, Chris Holm-Laursen, a field technician with Bell Canada (bell.ca), is outand about as usual, but this time with a difference: A smallbut powerful computer sits in a pocket of his orange meshvest, a keyboard is attached to the vest’s upper-left side, anda flat-panel display screen hangs by his waist. A video cam-era attached to his safety hat enables him to take pictureswithout using his hands and send them immediately to theoffice. A cell phone is attached as well, connected to thecomputer. A battery pack to keep everything going sitsagainst his back.

Holm-Laursen and 18 other technicians on this pilotproject were equipped like this for 10 weeks during fall 2000.By summer 2003 an increasing number of Bell Canada’semployees had been equipped with similar devices. The wear-able devices enabled the workers to access work orders andrepair manuals wherever they work.

These workers are not typical of employees usually usingcomputers, that is, white-collar workers. The hands-freeaspect and the ability to communicate anytime, anywhere,represent major steps forward for these utility workers. Awide variety of employees—technicians, medical practition-ers, aircraft mechanics, and contractors—are using or testingsuch devices.

So far, only a few companies make and sell wearables formobile workers. Bell Canada’s system was developed byXybernaut, a U.S. company that in 2002 had more than a thou-sand of its units in use around the world, some in operationand others in pilot programs (see xybernaut.com). Meanwhile,Bell Canada was impressed with the initial results and is equip-ping most of its technicians with wearable computing devices.

Of course, a practical problem of wearable devices inmany countries is the weather: What happens when the tem-perature is minus 50 degrees or the humidity is 99 percent?Other potential problems also exist: If a worker is wearingthick gloves, how can he or she use a keyboard? If it is pour-ing rain, will the battery short circuit? Various solutions arebeing developed, such as voice input, tapping on a screeninstead of typing, and rainproof electrical systems.

Sources: Guernsey, L. “Wearable Computers for the Working Class.”New York Times, December 14, 2000. nytimes.com/2000/12/14/ tech-nology/14wear.htm (accessed February 2003); xybernaut.com(accessed 2004).

Questions1. What are some other industrial applications of similar

wearable devices? (Use google.com to find additionalapplications.)

2. How do you think wearable devices could be used inentertainment?

Page 4: Online File W9.1 Wireless Advertising in Actionwps.prenhall.com/wps/media/objects/2519/2580469/...nel and direct promotions, delivering advertising from some of the world’s top brands,

4 Part 4

ONLINE FILE W9.4

MOBILE WORKPLACE APPLICATIONS FOR CUSTOMERSUPPORTThe following are two scenarios of wireless applications formobile employees.

Sales SupportLinda is a member of the field sales team at Theru Tools (afictitious company). Each day she drives out to her cus-tomers in a van stocked with products. For each sale, she hasto note the customer name, the number and type of productssold, and any special discounts made. This record keepingused to be done manually, and many errors were made, lead-ing to customer complaints and lost sales.

Theru implemented a system using low-cost but power-ful hand-held wireless devices. Using Mobile Sales (an appli-cation for handhelds), accessed via the mysap.com MobileWorkplace, Linda and her coworkers in the field now haveinformation at their fingertips, including updates on newproducts and special promotions. Linda can place orderswithout delay and get immediate feedback on product avail-ability and delivery times. What’s more, the system canprompt Linda as she enters orders, and it also can make plau-sibility checks on the orders, eliminating many of the errorsassociated with the manual process. It also checks to see ifshe is giving the right discounts to the right customer, andimmediately triggers the invoicing process or prints out areceipt on the spot.

Customer Service SupportMichael works for Euroblast, Inc. (another fictitious com-pany) as a service engineer. It is his job to provide time-critical maintenance and support for the company’s cus-

tomers’ electromechanical control systems. To do so, heneeds to know immediately when a customer’s system is fal-tering, what is malfunctioning, and what type of service con-tract is in effect.

Michael does not need to carry all of this information inhis head, but instead has it in the palm of his hand. Withonly a few taps of a stylus, Michael accesses the mysap.comMobile Workplace for all the data he requires, including thename and address of the next customer he should visit,equipment specifications, parts inventory data, and so forth.

Once he has completed the job, he can report back onthe time and materials he used, and these data can beemployed for timely billing and service quality analysis. Inaddition, his company is able to keep track of his progressand monitor any major fluctuations in activities. As a result,both Michael and his supervisors are better informed andbetter able to serve their customers.

Source: Compiled from “CRM and the mySAP.com Mobile Workplace”(a publicly available brochure from SAP), 2000.

Questions1. How has the introduction of handheld wireless devices

changed sales support at Theru tools?

2. What benefits does Euroblast receive from MobileWorkplace? How does Michael benefit? What are thebenefits for Euroblast’s customers?

Page 5: Online File W9.1 Wireless Advertising in Actionwps.prenhall.com/wps/media/objects/2519/2580469/...nel and direct promotions, delivering advertising from some of the world’s top brands,

Chapter Nine 5

The availability of portable MP3 players has lead to the development of music devices integrated with mobile phones. All of themajor handset vendors offer MP3 phones, including Samsung (SPH-M100), Nokia (5510), Ericsson (MP3 Handsfree), andAudiovox (CMP3). All of these handsets enable music titles to be stored and played locally on the mobile device.

With higher bandwidth, music vendors will be able to offer instant delivery of songs from their music libraries for onlinepurchase. Location-based services can even be integrated to target subscribers with location-sensitive streaming content suchas audio jingles promoting offers at retail outlets in the vicinity or movie trailers for films showing at the nearest theater.

The same handset vendors also have produced a new generation of cell phones that enable users to send pictures from onedevice to another. The Nokia 7650, Samsung A500, Sony Ericsson T300, and Sanyo SCP-5300 all have built-in digital cameras.These and a number of other cell phones can send and receive pictures through their MMP (multimedia messaging protocol)capabilities.

As the 3G handsets hit the market, mobile devices will begin to support the downloading and real-time playback of audioand video clips. The U.S.–based Packet Video Corporation (packetvideo.com) is a pioneer in this area. The company already hasdemonstrated its new mobile-media software on Nokia’s 3650 and 7650 phones. This software enables content to be capturedby the mobile phone, viewed via streaming video, and shared via messaging and e-mail. Users can utilize the software toencode live video from the built-in device camera; stream favorite videos and other multimedia content across the wireless net-work to the handset; view news, sports, music videos, movie trailers, and other content; download content to the mobile devicefor forwarding to friends or storage for later retrieval; and view live cameras for travel, entertainment, security, and child orelderly monitoring (newstream.com 2002).

Source: PacketVideo Corporation. “PacketVideo Demonstrates Mobilemedia on Nokia Series 60 Devices.” November 2002, packetvideo.com/press/2002-10-19.html (accessed May 2005).

Online File W9.5 Mobile Entertainment: Music, Pictures, and Videos

Page 6: Online File W9.1 Wireless Advertising in Actionwps.prenhall.com/wps/media/objects/2519/2580469/...nel and direct promotions, delivering advertising from some of the world’s top brands,

6 Part 4

Providing location-based services requires the following location-based and network technologies:

◗ GPS locator. A GPS locator is included in the mobile device to determine the location of the person carrying the mobile device.◗ Position-determining equipment (PDE). This equipment identifies the location of the mobile device (either through GPS or

by locating the nearest base station). The position information is sent to the mobile positioning center.◗ Mobile positioning center (MPC). The MPC is a server that manages the location information sent from the PDE.◗ Location-based technology. This technology consists of groups of servers that combine the position information with geo-

graphic- and location-specific content to provide a service. For instance, location-based technology could present a list ofaddresses of nearby restaurants based on the position of the caller, local street maps, and a directory of businesses organizedby location.

◗ Geographic content. Geographic content consists of streets, road maps, addresses, routes, landmarks, land usage, zip codes,and the like. This information must be delivered in compressed form for fast distribution over wireless networks.

◗ Location-specific content. Location-specific content is used in conjunction with the geographic content to provide the loca-tion of particular services. Yellow-page directories showing the location of specific business and services exemplify this type ofcontent.

The accompanying diagram shows how these technologies are used in conjunction with one another to deliver location-based services.

Source: MapInfo Corporation. MapInfo Envinsa™. mapinfo.com/industries/mobile (accessed June 2003). Used with permission.

Online File W9.6 Location-Based Technologies

GPS

Cellular Phone Station

GPSHandset

Internet

ServiceCenter

ContentsCenter

LocationServer

GPS System

Page 7: Online File W9.1 Wireless Advertising in Actionwps.prenhall.com/wps/media/objects/2519/2580469/...nel and direct promotions, delivering advertising from some of the world’s top brands,

The SolutionSan Francisco bus riders carrying an Internet-enabled wirelessdevice, such as a cell phone or PDA, can quickly find out when abus is likely to arrive at a particular bus stop. The NextBus(nextbus.com) system tracks public transportation buses in realtime. Knowing where each bus is and factoring in traffic pat-terns and weather reports, NextBus calculates the estimatedarrival time of the bus to each bus stop on the route. Arrivaltimes also are displayed on the Internet and on a public screenat each bus stop.

The NextBus system has been used successfully in severalother cities around the United States, in Finland, and in several

other countries. The exhibit below shows how the NextBus sys-tem works. The core of the NextBus system is the set of GPSsatellites that let the NextBus information center know where abus is located. Based on a bus’s location, the scheduled arrivaltime at each stop can be calculated.

Currently, NextBus is an ad-free customer service, but inthe near future advertising may be added. Because the systemknows exactly where a rider is when they request informationand how much time they have until their next bus, in the future,the system may send the rider to the nearest Starbucks for a cupof coffee, giving them an electronic discount coupon.

ONLINE FILE W9.7NEXTBUS: A SUPERB CUSTOMER SERVICE

The ProblemBuses in certain parts of San Francisco have difficulty keeping up with the posted schedule, especially during rush hours. Generally, busesare scheduled to arrive every 20 minutes, but at times passengers may have to wait 30 to 40 minutes. The scheduled times becomemeaningless and passengers are unhappy because they waste time.

Source: Used with permission of NextBus Information Systems, Inc. Copyright © 2005.

GPS Satellites

Next BusInformation

Center

WorldWide Web

Real-TimeArrival

Predictions

Location andBus ID reported

to AutomaticVehicle Location(AVL) at NextBus

Information Center

01001000100100

10101101010110

11001001100100

10110101011010

10010101001010

01001000100100

10101101010110

11001001100100

10110101011010

10010101001010

01001000100100

10101101010110

11001001100100

10110101011010

10010101001010

Real-TimePassengerMessages

TransitManagementInformation

Wireless Phoneand Mobil Devices

Shelter Signsand Public Displays

Pole Signs

WirelessCommunication

WirelessCommunication

22 Fillmore22 Fillmore

7 min & 12 min7 min & 12 min

NextBus Operational Model

Page 8: Online File W9.1 Wireless Advertising in Actionwps.prenhall.com/wps/media/objects/2519/2580469/...nel and direct promotions, delivering advertising from some of the world’s top brands,

8 Part 4

The ResultsPassengers in San Francisco are happy with the system; worriesabout missing the bus are diminished. A similar systems is usedin rural areas in Finland, where buses are infrequent and thewinters are very cold; passengers can stay in a warm coffeehousenot far from the bus stop rather than wait in the cold for a busthat may be an hour late. A bus company can also use the sys-tem to improve scheduling, arrange for extra buses whenneeded, and improve its operations.

Sources: Murphy, P. “Running Late? Take the NextBus.” EnvironmentalNews Network, September 7, 1999. enn.com/enn-features-archive/1999/09/090799/nextbus_4692.asp (accessed January 2003);nextbus.com (accessed January 2003); ITS America. ”NextBus ExpandsReal-Time Transit Information in the Bay Area with AC Transit.” ITSAmerica, August 9, 2001. itsa.org/ITSNEWS.NSF/0/34c13fd8352c4c3f85256aa400497aad?OpenDocument (accessed May 2004).

Page 9: Online File W9.1 Wireless Advertising in Actionwps.prenhall.com/wps/media/objects/2519/2580469/...nel and direct promotions, delivering advertising from some of the world’s top brands,

ONLINE FILE W9.8

SECURITY APPROACHES FOR MOBILE COMPUTINGWEP (WIRED EQUIVALENT PRIVACY)WEP is a security protocol for Wi-Fi networks that encrypts the communications between amobile device (e.g., a laptop, tablet PC, PDA) and the wireless access point. WEP provides weakencryption, meaning that it is secured against casual hacking as long as the person setting upthe network turns on the encryption. Unfortunately, many small business owners and home-owners operating a WLAN fail to do just that.

Although WEP offers a measure of security, the tradeoff is inconvenience. In order toemploy WEP, all Wi-Fi users must be educated on how it works, their computers must bereconfigured to connect to the network, and the encryption code must be changed frequently.Additionally, every authorized user must be given the encryption key, which means that a lotof people will be carrying around the keys to the network. In larger companies, if a hacker cangain access to the encryption key or can get through the WEP security in some other way—which is easily done with readily available software like AirSnort (airsnort.shmoo.com) orWEPCrack (wepcrack.sourceforge.net)—the damage is often greater because companies havea habit of installing their wireless access points behind their firewalls.

There are alternatives to WEP. If a company is concerned about the security of wirelessdata communications, it can use virtual private networking (VPN) technology to create asecure connection over the wireless link. There also is a new Wi-Fi security standard, calledWi-Fi Protective Access (WPA), under development. This standard has the backing of theWireless Fidelity Alliance and the Institute of Electrical and Electronics Engineers (IEEE).WPA provides enhanced encryption and supports user authentication, something that wasmissing from WEP. The alliance has already begun certifying Wi-Fi products with WPAsecurity. This enhanced security may encourage more business to experiment with Wi-Fiover the coming years. For details, see Fikes (2003).

SIM-BASED AUTHENTICATIONGSM and its 2.5G and 3.0G counterparts all include SIM. This module is usually imple-mented as a smart card containing an authentication key along with other vital informationabout the subscriber. The authentication key also is stored on a “home location registry,”which can be thought of as a database that is part of the mobile network. When the phone isturned on, the user is asked to enter a PIN number. This protects the cell phone against ille-gal use if it happens to be stolen or lost. If the PIN is correct, the cell phone and the networkengage in a “challenge-response” process of authentication. A network authentication centersends a random number to the cell phone’s SIM. The SIM computes a “signed response” bycombining the random number with its authentication key. The signed response is sent overthe network to the authentication center, which performs the same computation using a copyof the authentication key stored on the home-location registry. If the signed responsematches the value computed by the authentication center, then the cell phone is authenti-cated. After that, communication takes place through “symmetric encryption,” using a keygenerated by both the authentication center and the SIM.

Although SIM cards protect against unauthorized use of a particular subscriber’s account,they do not prevent the use of a stolen cell phone. If a thief steals a phone, he or she can simply re-place the existing SIM card with another one and sell it on the open market. The police in Am-sterdam employed an interesting method to thwart this practice. Using a cell phone’s InternationalMobile Equipment Identity number, the police were able to track down the mobile phone num-ber being used on the stolen phone. Once the number was known, the police employed a specialcomputer program to send out an SMS message to the stolen phone every 3 minutes. The mes-sage read, “This handset was nicked [stolen]; buying or selling it is a crime. The Police.” Ob-viously, this made the stolen phone a lot less attractive to prospective buyers (Evers 2001).

Chapter Nine 9

Page 10: Online File W9.1 Wireless Advertising in Actionwps.prenhall.com/wps/media/objects/2519/2580469/...nel and direct promotions, delivering advertising from some of the world’s top brands,

WTSL AND WIMThe transmissions between the WAP gateway and the Web server (see Exhibit 9.4 in the book)can be secured through the wired Internet security protocols discussed in Chapter 11 (e.g., PKI,SSL, and TSL). These protocols cannot be used on the mobile side of the gateway. Instead,WAP relies on the Wireless Transport Layer Security (WTLS). Like its wired counterpart(TSL), WTLS enables encrypted communications between a mobile device and the WAP gate-way. Additionally, WTLS supports the key elements of PKI—public and private encryptionkeys, digital certificates, digital signatures, and the like.

A wireless identity module (WIM) can also be used in combination with WTLS. AWIM is a smart card device, much like a SIM (and in fact can be implemented on a SIM).It is designed to hold the security keys and digital certificates used by the gateway and theWeb server to encrypt/decrypt communications. One of the advantages of a WIM is thatcan be issued by a bank or other financial institution to handle m-commerce payments andtransactions.

Sources: Evers, J. “Dutch Police Fight Cell Phone Theft with SMS Bombs.” IDG News Service, March 27, 2001.edition.cnn.com/2001/TECH/industry/08/30/sms.crime.fighter.idg/ (accessed March 2005); Fikes, B.“Unguarded Wireless Networks a Snap for ’Stumbling.’” Californian North County Times, January 12, 2003.nctimes.net/news/2003/20030112/53511.html (accessed May 2004).

10 Part 4

Page 11: Online File W9.1 Wireless Advertising in Actionwps.prenhall.com/wps/media/objects/2519/2580469/...nel and direct promotions, delivering advertising from some of the world’s top brands,

Chapter Nine 11

Being invisible is only one of the properties of pervasive computing. A short list of its major characteristics (Amor 2001) follows.

◗ Invisible devices. Numerous and casually accessible, these devices often are invisible.◗ Embedded microchips. Microchip intelligence is embedded into everyday devices and objects.◗ Always on. Users have continuous access to information, entertainment, and communication with anyone, anytime, anywhere.◗ Pervasive network. Everyone and everything is connected to an increasingly pervasive network structure.◗ Life-enhancing applications. The technology will penetrate the mainstream mass market through a variety of life-enhancing

applications.◗ Consumer-centric solutions. The technology offers “gadgetry” for simple and practical consumer-centric solutions.◗ Increasing productivity. The technology offers mainstream-market value propositions that enable consumers to save time or

money and enhance leisure and entertainment.◗ Long-term vision. In the long-term, the technology will enable people to work, live, and play more effectively.

As the list suggests, three major technical requirements underlie pervasive computing. First, everyday objects will have tocontain embedded microprocessors. Second, a pervasive network is needed to connect these microprocessors. Finally, the micro-processors must be able to communicate with the pervasive network. The day when these technical requirements all meet is notthat far off.

According to Harbor Research (Edgington 2001), approximately 5 billion microprocessors were sold in 2000, and only120 million of them (roughly 2.5 percent) were intended for PCs. It is estimated that in 5 years, the number of processors inthe average home could grow from 40 to 280, the number of processors in the average car (now about 20) will increase sub-stantially over the same time period, and the number of embedded chips sold to support increasingly intelligent devices couldgrow to over 9 billion (Edgington 2001). Intelligence and connectivity will be designed into almost every electronic device. Thepervasive network environment over which these devices will communicate will, for the foreseeable future, be the Internet.

The way in which embedded devices will attach to or communicate with the Internet will vary. Some will be wired into theInternet—through broadband or dial-up—in the same way that the average desktop computer is connected. Others will con-nect through mobile or wireless networks in the same way that a cellular phone does. Finally, others, such as the RFID tagsused by Prada, will link in through small antennas that can send and receive messages in a wireless environment (e.g., Wi-Fi orBluetooth).

Like most areas of new technological development, pervasive computing has been accompanied by a great deal of hype. Inthe last few years, people have talked about refrigerators that can tell a person when to order milk, TVs that provide entertain-ment on demand, gas pumps with Web connections, and a whole array of amazing gadgets. For instance, 3COM promotedAudrey, a small, wireless Internet appliance for the entire family. This tablet-like device offered e-mail, Web access, and calen-daring. Despite a $20-million marketing campaign, Audrey was a resounding flop that was pulled from the market. The same hasbeen true for most of the other ideas that cropped up during the dot-com heyday. Instead of looking at solutions to problems,many manufacturers have focused on connectivity as an end in itself, and so have not yet produced commercially successfulproducts.

Sources: Amor, D. Internet Future Strategies: How Pervasive Computing Services Will Change the World. Upper Saddle River, NJ: Prentice Hall,2001; Edgington, C. “How Internet Gateways and Smart Appliances Will Transform Our Homes.” TNTY Futures, 2001.tnty.com/newsletter/futures/technology.html (accessed February 2003).

Online File W9.9 Technical Foundations of Pervasive Computing

Page 12: Online File W9.1 Wireless Advertising in Actionwps.prenhall.com/wps/media/objects/2519/2580469/...nel and direct promotions, delivering advertising from some of the world’s top brands,

12 Part 4

ONLINE FILE W9.10

THE HIGHWAY 91 PROJECTRoute 91 is a major eight-lane, east-west highway near LosAngeles. Traffic is especially heavy during rush hours.California Private Transportation Company (CPT) built sixexpress toll lanes along a 10-mile stretch in the median ofthe existing Highway 91. The express lane system has onlyone entrance and one exit, and it is totally operated with ECtechnologies. The system works as follows.

◗ Only prepaid subscribers can drive on the road. Subscribersreceive an automatic vehicle identification (AVI) devicethat is placed on the rearview mirror of the car. The device,about the size of a thick credit card, includes a microchip,an antenna, and a battery. A large sign over the tollwaytells drivers the current fee for cruising the express lanes.In a recent year, it varied from $0.50 in slow traffic hoursto $3.25 during rush hours.

◗ Sensors in the pavement let the tollway computer knowthat a car has entered; the car does not need to slow orstop. The AVI makes radio contact with a transceiverinstalled above the lane. The transceiver relays the car’sidentity through fiber-optic lines to the control center,where a computer calculates the fee for that day’s trip. Thesystem accesses the driver’s prepaid account and the fare isautomatically deducted. A monthly statement is sent to thesubscriber’s home.

◗ Surveillance cameras record the license numbers of carswithout AVIs. These cars can be stopped by police at theexit or fined by mail.

◗ Video cameras along the tollway also enable managers tokeep tabs on traffic; for example, sending a tow truck to helpa stranded car. Also, through knowledge of the traffic vol-ume, pricing decisions can be made. Raising the price as traf-fic increases ensures that the tollway will not be jammed.

The system saves commuters between 40 and 90 min-utes each day, so it is in high demand.

An interesting extension of the system is the use of thesame AVIs for other purposes. For example, they can be used inpaid parking lots. Someday you may even be recognized whenyou enter the drive-through lane of McDonald’s, and a voice willask you, “Mr. Smart, do you want your usual meal today?”

Source: 91expresslanes.com (accessed May 2002).

Questions1. What is the role of the wireless component of this

system?

2. What are the advantages of the system to commuters?

Page 13: Online File W9.1 Wireless Advertising in Actionwps.prenhall.com/wps/media/objects/2519/2580469/...nel and direct promotions, delivering advertising from some of the world’s top brands,

Chapter Nine 13

ONLINE FILE W9.11

EMPOWERING ASSISTED-LIVING PATIENTSThe elderly residents in assisted-living facilities have variousneeds that require differing levels of care. Some residentsrequire minimal assistance, others have short-term memoryproblems and other health issues, and others have moresevere problems such as Alzheimer’s disease. At Elite Care’sEstates Cluster Residential Care Facility in Milwaukie, Oregon,pervasive computing is being used to increase the autonomyof all of its residents, regardless of their individual needs.

Elite Care (elite-care.com) is a family-owned business. Ithas been built from the ground up with the intent of pro-viding “high tech, high touch” programs. Members of thefacility’s advisory committee, which includes representativesfrom the Mayo Clinic, Harvard University, the University ofMichigan, the University of Wisconsin, and Sandia NationalLaboratory, have contributed a number of ideas that havebeen put into practice.

The entire facility is wired with a network of unobtru-sive sensors that include biosensors (e.g., weight sensors)attached to each resident’s bed; movement sensors embed-ded in badges worn by the residents and staff; panic buttonsused to call for help; Internet access via touch screens ineach room; and climate control, lights, and other regulatedappliances. The biosensors and movement sensors enable thestaff to determine the following conditions and activities incaring for patients:

◗ Weight loss (indicating conditions such as impending con-gestive heart failure)

◗ Restlessness at night (indicating conditions such as insuffi-cient pain medication)

◗ Frequency of trips to the bathroom (indicating medical prob-lems such as infection)

◗ Length of absence from bed (indicating that the patientmay have fallen or be incapacitated in other ways)

◗ General location (indicating whether the resident is in anacceptable area of the facility)

One of the initial concerns with these monitors is thatthe privacy of the residents will be unnecessarily invaded. Toalleviate this concern, residents and their families are giventhe choice of participating or not. Most of them choose toparticipate because the families believe that these monitorsprovide better tracking and care. The monitors also increasethe autonomy of all the patients because it reduces the needfor staff to constantly monitor residents in person, especiallythose with more acute care needs.

All of these sensors and systems are connected througha high-speed Ethernet. The data produced by the sensors andsystems are stored in an SQL database and can be used toalert the staff in real-time if necessary. Although the dataare not being used at the present time for analytical pur-poses or to develop individualized programs, the facilityplans to work on these sorts of applications in the future.

Source: Stanford, J. “Using Technology to Empower Assisted LivingPatients.” Healthcare Review, July 2, 2002. Used with permission.

Questions1. What are some of the pervasive devices used in the

Elite Care facility? What types of data do these devicesprovide?

2. In what ways do these devices encroach upon the pri-vacy of the residents?