Professional Documents
Culture Documents
The Right Wireless For The Job GSM-3G Central and Eastern Europe
The Right Wireless For The Job GSM-3G Central and Eastern Europe
WEB
SITES
CONFERENCES
BOOKS
WEB
SITES
CONFERENCES
BOOKS
WIRELESS
Next-Generation Wireless
ext Generation Wireless Systems and Networks, Hsiao-Hwa Chen and Mohsen Guizani. This book covers wireless systems and networks. Chapter topics include wireless communications fundamentals, 2G and 3G mobile cellular systems, and MIMO/ multi-user signal processing in Beyond-3G wireless. Although the book is aimed at specialists, it includes essential background information as well. For example, the text discusses basics of wireless communications such as 3G wireless standards, spread spectrum and CDMA systems, It goes on to introduce 3G standards, such as W-CDMA, CDMA2000 and TD-SCDMA. Beyond that, it looks at more futuristic topics, including cognitive radio technology and 3GPP E-UTRA technology. Further, the book addresses emerging wireless communication systems and networks such as Super-3G technology, 4G wireless, UWB, OFDMA and MIMO.
John Wiley & Sons; ISBN 0470024348; 512 pp.; $120.
he two-day GSM-3G conference will explore Central and Eastern Europe market developments, as well as how to sustain profitability in the competitive CEE market. Topics of discussion include driving growth in the CEE, CEE forecast analysis, and simplifying regulations. Regional overview discussions will cover case studies such as Vodafone Romanias 3G rollout, and Vipnets HSDPA rollout in Croatia. Also, the conference will explore integrating 3G and DVB-H TV services, and options for 3G VAS. Event visitors can listen to development-strategy presentations such as those on 3G-to-4G standardization and xed-mobile convergence. The conference will also assess potentially disruptive technologies, covering topics such as the expansion of Wi-Fi in Europe, strategies for communicating and pricing the WiMax value proposition, and a panel discussion of WiMax versus 3G. According to conference organizers, Informa Telecoms & Media says that the total number of Central and Eastern European GSM subscribers passed 250 million at the start of November 2005. Fueled by continued strong growth in developing marketsparticularly in Russia, Ukraine, and Polandthe milestone was reached six to seven months after the region passed the 200 million subscriber mark. Growth still remains strong in 2006, and Informa forecasts indicate that the region is on track to pass 300 million subscriptions in 2007. Consequently, conference organizers believe the region offers good long-term growth prospects. As of March 2006, a total of 13 W-CDMA networks had been launched commercially in the CEE region, and four more were pre-commercial. There are 18 additional regional W-CDMA networks in the planning/deployment phase, including largest-market networks in Poland, Hungary, and the Czech Republic.
http://www.gsm-3gworldseries.com/cee/
53
BOOKS
WEB
SITES
CONFERENCES
BOOKS
WEB
SITES
CONFERENCES
BOOKS
WEB
SITES
WIRELESS
EE Mobility Conference and Exhibition is a mobiletechnologies event that features a three-day menu of keynote speeches, symposiums, technical presentations, and industry updates. Each day, keynote speakers will provide mobile-industry updates on topics such as technologies, standards, applications, and mobile devices. Industry presentations are technology-specic howto sessions for developers and system integrators. The industry tracks cover areas including Palm OS, Windows, Java, and Symbian application development environments, network integration to a mobile (General Packet Radio Service and 802.11 wireless local area networks) environment, and working with mobile-device platforms. Oral technical-presentation tracks discuss research on next-generation systems, latest operating systems, software development platforms, networking technologies, and mobile device capabilities. Also included are research papers that provide glimpses of near- and long-term trends. Special sessions cover topics such as trends and technical challenges of next-generation mobile communication systems, ad hoc and sensor networks, IP mobility, and user interface design. Mobile-realm usability-engineering topics will include the human-computer interaction perspective, parallelprocessing improvement over wireless communication, and location discovery and mobility modeling/forecasting in wireless networks.
http://www.mobilityconference.org
Unlicensed Bands
oexistence in Wireless Networks: Challenges and System-Level Solutions in the Unlicensed Bands, Nada Golmie.The increasing popularity of wireless networks makes interference and crosstalk between multi- ple systems inevitable. Set for publication in September, this book describes techniques for quantifying these disruptions and their performance effects on unlicensed-band wireless networks. It also presents system-level solutions, advocating
54 IT Pro July August 2006
the need for new hardware implementations. The book starts with basic concepts and wireless protocols before moving on to interference-performance evaluation, interference modeling, and coexistence solutions. It concludes with common misconceptions and pitfalls.The author illustrates her theory by referencing real-world systems such as Bluetooth and Wi-Fi. Case studies and illustrations should make this book interesting for electrical engineering and computer science graduate students, WLAN and WPAN systems designers, practitioners developing new interference suppression techniques, and general users of merging wireless technology.
Cambridge University Press; ISBN 0521857686; 192 pp.; $70.
CONFERENCES
BOOKS
WEB
SITES
CONFERENCES
BOOKS
WEB
SITES
CONFERENCES
IT Worlds Wireless
http://wireless.itworld.com
This site, managed by IT World, provides information on wireless technology. Links are organized in news and topic sections along the left side of the page. The news section contains a sampling of breaking wireless news headlines. The topics section is divided into areas including application development, network management, products and services, standards and regulations, and trends and technologies. The home page also contains links to webcasts, analyst briengs, white papers, and newsletters. One of the offerings in the white papers section is on benchmarking voice over IP over Wi-Fi (Vo-Fi). The paper claims that benchmarking wireless systems is difficult, with many variables and elements. This Technology Note documents the results of a voice benchmark run on a properly instrumented test conguration.
WIRELESS
IT Pro Resources
If you have a book, event, or Web site youd like IT Professional to include in Resources, send information to itproducts@ computer.org for consideration. We cant promise to include all submissions, but we will review them.
55
BOOKS
WEB
SITES
CONFERENCES
BOOKS
WEB
SITES
CONFERENCES
BOOKS
WEB
SITES
UNIX/LINUX
his conference targets several kinds of IT workers: those looking to leverage open source into a business; those seeking to understand and mitigate open source legal risks;and those interested in talking to the industrys open source startups and learning about business models. One of this conferences tracks is Stacking the Enterprise Deck: The Rise of LAMP/J and its Implications for Enterprise Infrastructure. Among Java, .Net, LAMP, LAMJ, and J2EE the question remains:Which open source stack, or combination thereof, is the best t for the enterprise? The tracks panel will tackle the choice. Attendees will hear industry leaders sound off with their views about what to consider when implementing, integrating, and deploying a collection of open source components into an enterprises infrastructure. Another track, Technology and Decentralization, is a keynote presented by Peter Thiel, cofounder of PayPal.Thiel believes that in the second half of the 20th century, technological innovation was a major driver of the world economys decentralization, enabling small businesses to compete with larger organizations.The globalization of information tended to diversify power and enable people to act much more locally than before. Thiel will explore the question of whether this trend towards decentralization will continue, culminating in worldwide anarchocapitalism, or whether technological innovative forcesespecially in the IT industrymight cause the pendulum to reverse toward some kind of economic or political centralization. The Open Source: Moving Beyond Just Software track will feature Sun Microsystems president and COO Jonathan Schwartz discussing open source repercussions. Many think of open source merely as software bits and bytes. Sun, a contributor of open source code, sees a world in which open source also means commercially viable communities, innovative Internet services, hardware, and devices, and, ultimately, massive economic opportunity.
http://www.osbc.com/live/13/
Do You Do Ubuntu?
Grant Ubuntu is a new version of Linux intended specically for novice users. No Starch Press brings these characteristics together with Rickford Grant, a teacher and author experienced in explaining technical concepts to novices. That makes this book a handson, project-based, take-it-slow, guidebook intended for those interested inbut nervous aboutentering the Linux world. Using immersion-learning techniques favored by language courses, step-by-step projects build upon earlier tutorial concepts, helping readers absorb and apply what theyve learned. Topics covered include how to download and install free applications, games, and utilities; connect to the Internet and wireless networks; congure hardware, including printers, scanners, and removable storage devices; watch DVDs, listen to music, and sync an iPod; and tackle more advanced tasks, such as compiling software from source, and handling software based on Java, Python, and Tcl/Tk.
No Starch Press; ISBN 1-59327-118-2; 360 pp. with CD; $34.95.
56
CONFERENCES
BOOKS
WEB
SITES
CONFERENCES
BOOKS
WEB
SITES
CONFERENCES
UNIX/LINUX
nstructors will lead attendees in tracks focusing on Linux and open source. Conference tracks include mobile and embedded Linux, kernel and system development, high-performance computing and virtualization, the Linux desktop, network management and interoperability, security, open source best practices, open source and your business, and open source development. Half-day tutorials will train IT solutions decision-makers on relevant issues and technologies. From a single server to a network of workstations, the Linux environment can be a daunting one for administrators knowledgeable in other platforms. To help ease the transition, the Linux Systems and Administration tutorial will provide information about using Linux in the real world. Starting with a single server and nishing with a multi-server, 1,000-plus user environment, the course will also accommodate question-and-answer interruption. Conference organizers expect attendees who complete the course to feel condent in their ability to set up and maintain a secure Linux server with services. Administrators and users are both concerned with redundant protection of critical data. RAID (Redundant Array of Independent Discs) is a mechanism for ensuring that protection, which Linux natively offers through software offered as an alternative to the expensive hardware typically associated with building a RAID. The tutorial, How to Create, Destroy, and Recover Software RAIDS under Linux will explain how to ensure RAID1 and RAID5 protection of Linux systems. Watch
tutorial leaders create software RAID partitions, construct RAID arrays, install Linux directly to the RAID, and destroy one of the disks; witness the continued operation and booting of the system followed by a complete recovery of the RAID to fully synchronized protection again. Hands-on labs will feature applications and tools training. For example, Write a Real Working Linux Driver gives attendees a device for which they must write a working Linux kernel driver that is acceptable in the main Linux kernel tree. Instruction topics include understanding the kernel build process, understanding the module load process, driver-author basics of the kernel driver and device model, how to interact with a kernel driver from userspace, understanding how to talk to the hardware, and proper kernel coding guidelines. Participants must have the ability to build, install, and run a standard kernel.org kernel, as well as an intermediate understanding of the C language. They must also bring a laptop with a working USB connection running the latest version of the 2.6 kernel from kernel.org. Healthcare Day and Financial Services Day are one-day programs in which IT professionals from the nancial and healthcare industries interface directly with their peers who are already using Linux and open source. OSDL Kernel Sessions feature Linux kernel engineers including Greg Kroah-Hartman and otherswho will explain the kernel development process, how to contribute to the process, and what it takes to submit new device drivers into the machine kernel. This conference also offers free Linux certification testing from the Linux Professional Institute to all paid conference attendees.
http://www.linuxworldexpo.com/live/12/events/12SFO06A
A Window to Unix
ntroduction to Unix/Linux, Christopher Diaz. The author believes that Unix system has steadily gained in popularity over the years. Many businesses and educational institutions as well as individuals have begun using Unix/ Linux, believing in its power, stability, reliability, and flexibility. This book serves as a guide to Windows users interested in the conversion to Unix. The author provides some background and knowledge needed to become familiar with the Unix/Linux environment and operations. For educational institutions, the book presents a broad Unix background for courses in comput-
ers, business, engineering, mathematics, and education.The author also supplies basic user information to assist readers who wish to learn Unix independently. A reader using any Unix version will nd this book helpful, as many of the concepts apply universally to all Unix/Linux systems. The book explores le creation and editing as well as how to develop professional-looking typeset documents. Other programming-related topics include writing code that processes les and increases user convenience, and how to build, run, debug, measure, and analyze C++ program performance. This book can serve as a resource for the student who wants to learn more about the Unix system, as well as a guide for the individual making the transition to Unix.
Charles River Media; ISBN 1584504498; 448 pp.; $31.47.
July August 2006 IT Pro 57
BOOKS
WEB
SITES
CONFERENCES
BOOKS
WEB
SITES
CONFERENCES
BOOKS
SITES
CON
UNIX/LINUX
27 November 1 December 2006 Melbourne, Australia he Middleware Conference invites discussion about recent advances in middleware design and construction. This year, the conferences scope is the design, implementation, deployment, and evaluation of distributed-systems platforms and architectures for future computing environments. Middleware is distributed-systems software that resides between applications and underlying operating systems, network protocol stacks, and hardware. Its primary role is to coordinate application-component connection and interoperability by bridging the gap between application programs and lower-level hardware and software infrastructure. Conference workshops include International Workshop on Middleware for Sensor Networks, First International Workshop on Advanced Data Processing in Ubiquitous Computing,
Middleware for Service Oriented Computing, Model Driven Development for Middleware, Fourth International Workshop on Middleware for Grid Computing, Fifth Workshop on Adaptive and Reective Middleware, and Fourth International Workshop on Middleware for Pervasive and Ad-hoc Computing. The Middleware Doctoral Symposium will be held in conjunction with Middleware 2006. MDS 2006 is a forum where doctoral students can present their work. The symposiums goals are to expose students to helpful criticism before they defend their theses, and to foster discussions on future career directions. Topics of the conference will include discussions on platforms and architecture, middleware for Web services and Web-service composition, middleware for cluster and grid computing, peer-to-peer middleware solutions, and event-based, publish/subscribe message-oriented middleware. Systems-issues tracks will look at reliability, fault tolerance, general quality-of-service, and middleware scalability.
http://2006.middleware-conference.org
CONFERENCES
SECURITY
Security from A to Z
ictionary of Information Security, Robert Slade. According to Hal Tipton CISSP (Certified Information Security Professional), ISSAP (Information Systems Security Architecture Professional), ISSMP (Information Systems Security Management Professional), and author of the books foreword, What is needed now in the world of information security is a single glossary of terms using the preferred denition for each term to be published and used throughout the world. I personally have come face to face with this denition problem as the chief instructor over the past dozen years for the International Information Systems Security Certication Consortium (ISC)2. In that role, I have developed several courses that addressed topics contained in the Common Body of Knowledge for the information security eld that dealt with concepts and definitions. I struggled continuously to select the most appropriate denition for many of the most important terms.As a result, I am supportive of the idea of publishing an ofcial glossary of terms for information security professionals and related personnel. Rob Slade has undertaken this difcult task, and his Dictionary should prove to be one of the most helpful additions to the professional library of every one of us working in the eld of information security.
Syngress Publishing; ISBN 1597491152; 300 pp.; $29.95.
Baltimore, Maryland 19-21 September 2006 ponsored by several US government agencies, including the National Institute of Standards and Technology and the National Security Agency (NSA), this conference discusses recent technology advances, new initiatives, as well as biometric business models and market strategies. It also addresses trends in biometrics research; the development and application of biometric technologies; and the use of biometrics in government programs and commercial applications. The conference has three major tracks, one of which is information/industry. This tracks first day starts with an Introduction to Biometrics session and ends with a panel on commercial biometrics solutions. Other sessions later in the week focus on standards, system vulnerabilities, and remote authentication.
http://www.biometrics.org/bc2006/index.htm
59