This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
If you have an opportunity browse through the research projects going on at Microsoft Research. As the site states the research projects are not the ivory tower type but are focused on "turning ideas into reality". The overarching goals of the projects are "to enhance the user experience on computing devices, reduce the cost of writing and maintaining software, and invent novel computing technologies".
Here are a couple I found on the site focused on mobile technology:
SPACE:Secure Protocol for Address-Book based Connection Establishment
SPACE is focused on addressing the largely unrealized potential of peer-to-peer mobile applications, examples sited are collaboration and gaming. The research team provides 2 main reasons why the potential of peer-to-peer mobile applications remains "unrealized". First, the existing connection establishment protocols for Bluetooth and IEEE 802.11 have known security flaws which limit the categories of applications that can comfortably be deployed. Second, the protocols are do not provide automatic ad-hoc connections, they require explicit user interaction to initiate a connection, for example entering a passkey.
The solution, SPACE, a protocol for secure automatic ad-hoc connection-establishment between two devices based on the address book entries contained on the devices. The team's premise?, if two people have each other's contact details in their address books there is a basis for a trust relationship between their devices, and an automatic ad-hoc connection can be made without additional user intervention.
WiFiAds:A Novel Approach for Delivering Location-Sensitive Advertisements Using Wi-Fi Networks
WiFiAds has its foundation in an interesting augmentation of WiFi Access Point (AP) to device communication called "beacon stuffing". When a wireless client associates with an AP to begin wireless communications it can no longer communicate with other APs in the reachable area without using sophisticated software. The research team argues that this limitation in the wireless world is no better, if not similar, to the wired model where an ethernet cable connection needlessly limits the capabilities. Why limit a wireless client to simply hearing or being aware of other non-associated APs, why not enable the exchange useful information with them. If a wireless client were able to exchange information with non-associated APs it might be able to determine which AP has the lowest load or highest bandwidth, enabling clients to select and deselect APs based on this information.
This is where "beacon stuffing" comes in, a low bandwidth communication protocol for IEEE 802.11 networks that enables APs to communicate with clients without association. The concept is based on the fact that APs send beacons to clients that are not associated with them, and that it is possible to overload fields in the beacons and management frames to embed interesting data. The approach is complimentary to 802.11 association and works by overloading 802.11 management frames without breaking the standard, in fact the team claims that minor driver changes are required at the client and AP.
The team has come up with a number of new applications that are enabled by "beacon stuffing". One application we discussed above, is the ability of APs to embed network selection content into beacons to broadcast performance or pricing information about their wireless network. Another application is for APs to send location-specific advertisements or coupons to unassociated clients to advertise goods and services. For example you walk into a coffee shop and get a coupon to try the coffee of the day.
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
2019 State of DevOpsDevOps is needed in today's business environment, where improved application security is essential and users demand more applications, services, and features — fast. We sought to see where DevOps adoption and deployment stand, this report summarizes our survey findings. Find out what the survey revealed today.
A New World of IT Management in 2019This IT Trend Report highlights how several years of developments in technology and business strategies have led to a subsequent wave of changes in the role of an IT organization, how CIOs and other IT leaders approach management, in addition to the jobs of many IT professionals up and down the org chart.