If you have an opportunity browse through the research projects going on at Microsoft Research. As the site states the research projects are not the ivory tower type but are focused on "turning ideas into reality". The overarching goals of the projects are "to enhance the user experience on computing devices, reduce the cost of writing and maintaining software, and invent novel computing technologies".
Here are a couple I found on the site focused on mobile technology:
SPACE:Secure Protocol for Address-Book based Connection Establishment
SPACE is focused on addressing the largely unrealized potential of peer-to-peer mobile applications, examples sited are collaboration and gaming. The research team provides 2 main reasons why the potential of peer-to-peer mobile applications remains "unrealized". First, the existing connection establishment protocols for Bluetooth and IEEE 802.11 have known security flaws which limit the categories of applications that can comfortably be deployed. Second, the protocols are do not provide automatic ad-hoc connections, they require explicit user interaction to initiate a connection, for example entering a passkey.
The solution, SPACE, a protocol for secure automatic ad-hoc connection-establishment between two devices based on the address book entries contained on the devices. The team's premise?, if two people have each other's contact details in their address books there is a basis for a trust relationship between their devices, and an automatic ad-hoc connection can be made without additional user intervention.
WiFiAds:A Novel Approach for Delivering Location-Sensitive Advertisements Using Wi-Fi Networks
WiFiAds has its foundation in an interesting augmentation of WiFi Access Point (AP) to device communication called "beacon stuffing". When a wireless client associates with an AP to begin wireless communications it can no longer communicate with other APs in the reachable area without using sophisticated software. The research team argues that this limitation in the wireless world is no better, if not similar, to the wired model where an ethernet cable connection needlessly limits the capabilities. Why limit a wireless client to simply hearing or being aware of other non-associated APs, why not enable the exchange useful information with them. If a wireless client were able to exchange information with non-associated APs it might be able to determine which AP has the lowest load or highest bandwidth, enabling clients to select and deselect APs based on this information.
This is where "beacon stuffing" comes in, a low bandwidth communication protocol for IEEE 802.11 networks that enables APs to communicate with clients without association. The concept is based on the fact that APs send beacons to clients that are not associated with them, and that it is possible to overload fields in the beacons and management frames to embed interesting data. The approach is complimentary to 802.11 association and works by overloading 802.11 management frames without breaking the standard, in fact the team claims that minor driver changes are required at the client and AP.
The team has come up with a number of new applications that are enabled by "beacon stuffing". One application we discussed above, is the ability of APs to embed network selection content into beacons to broadcast performance or pricing information about their wireless network. Another application is for APs to send location-specific advertisements or coupons to unassociated clients to advertise goods and services. For example you walk into a coffee shop and get a coupon to try the coffee of the day.
InformationWeek Elite 100Our data shows these innovators using digital technology in two key areas: providing better products and cutting costs. Almost half of them expect to introduce a new IT-led product this year, and 46% are using technology to make business processes more efficient.
The UC Infrastructure TrapWorries about subpar networks tanking unified communications programs could be valid: Thirty-one percent of respondents have rolled capabilities out to less than 10% of users vs. 21% delivering UC to 76% or more. Is low uptake a result of strained infrastructures delivering poor performance?
Top IT Trends to Watch in Financial ServicesIT pros at banks, investment houses, insurance companies, and other financial services organizations are focused on a range of issues, from peer-to-peer lending to cybersecurity to performance, agility, and compliance. It all matters.
Join us for a roundup of the top stories on InformationWeek.com for the week of September 18, 2016. We'll be talking with the InformationWeek.com editors and correspondents who brought you the top stories of the week to get the "story behind the story."