Wednesday, June 15, 2005

Location tracking and the future


NETWORK WORLD NEWSLETTER: JOANIE WEXLER ON WIRELESS IN THE
ENTERPRISE
06/15/05
Today's focus: Location tracking and the future

Dear networking.world@gmail.com,

In this issue:

* Applying RFID technology appropriately
* Links related to Wireless in the Enterprise
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Oracle
SAN and SMP, Pooling or Provisioning - what does it all mean?

Find out with the Oracle Grid Computing Glossary! Like any
technology, grid computing is made up of a specialized set of
terms and acronyms. This comprehensive glossary provides a
definition of important grid-related terms.
http://www.fattail.com/redir/redirect.asp?CID=106763
_______________________________________________________________
Explore your best options in local- and wide-area wireless data
services ...

... discover strategies that implement mobile applications
effectively ... and develop a framework for implementing
enterprisewide mobile-networking. Qualify and you can attend
Wireless & Mobility: Commanding Broadband Everywhere FREE - it's
the new Network World Tech Tour and Expo event coming to *
Boston - June 21 and * Denver June 23.
http://www.fattail.com/redir/redirect.asp?CID=106311
_______________________________________________________________

Today's focus: Location tracking and the future

By Joanie Wexler

Many thanks to all of you who responded to last week's
newsletter, "RFID, presence and privacy," with opinions about
what lies in store with location-tracking and
biometric-identification applications.

Most of us seem to agree that there's a very delicate balance to
strike between productivity and privacy when you can identify
who people are, where they are and what they're doing at any
point in time. Achieving that balance will undoubtedly be a
thorny challenge, particularly in today's
ultra-security-conscious climes.

Those of us addicted to the forensics-themed TV show "CSI" and
programs like it can't help but feel that enterprising thieves
will nearly always find some way to spoof the safeguards that
honest technologists build into systems. And, as one reader, a
Certified Information Systems Auditor (CISA) and Certified
Information Systems Security Professional (CISSP), pointed out:

"With the lack of ethics displayed throughout our global
society, Big Brother applications will undoubtedly appear [that
make inappropriate use of RFID information]."

Another reader, from the RFID community, asked me: "The mobile
phone vendors can already track everyone carrying a mobile
phone. Do you feel [RFID] greatly expands that 'loss' of
privacy?"

My answer: It doesn't matter to me which location-tracking
technology is used, but, rather, how it is used. For example, I
don't personally feel the mobile operators' ability to track my
phone invades my privacy - yet. At least to my knowledge, the
capability hasn't been applied in such a way. Tracking me down
for purposes of my own safety is a positive application of the
technology.

But if a stalker (or telemarketer) can suddenly find me wherever
I am, that's a horse of a different color. Whether they lasso me
using triangulation or RFID technology is irrelevant.

Worry over simply being too accessible - for privacy, time
management, security or stress reasons - has been one of the big
objections to having a 411 directory of cellular subscribers.
Cellular phone owners haven't wanted to receive the
telemarketing calls (particularly on their own dime) that plague
them at home, spam in the form of short message service (SMS)
text and now mobile viruses once their contact information is
public.

On the other hand, having directories can also be quite handy
when used appropriately.

I think location tracking in general and perhaps RFID in
particular have the potential to become the most revolutionary
set of technologies since the cell phone itself, bringing us
truly into the Star Trek age. We are now wise to the foibles
that can arise with any communication and information
technology, so it makes sense to anticipate the potential abuses
up front so we can minimize the downsides.

It's not going to be easy, though. Much of that work boils down
to ethics, a topic that is very difficult for society to agree
upon.

RELATED EDITORIAL LINKS

RFID policy panel raises privacy concerns
IDG News Service, 04/06/05
http://www.networkworld.com/news/2005/0406rfidpolic.html?rl

Cisco releases Airespace WLAN location server
Network World Fusion, 05/05/05
http://www.networkworld.com/nlwir2611

Experts fear RFID strain on networks
Network World, 06/06/05
http://www.networkworld.com/news/2005/060605-reva.html?rl

Network-centric RFID draws near
Network World, 04/04/05
http://www.networkworld.com/nlwir1470

Wireless enables assembly lines
Network World, 06/13/05
http://www.networkworld.com/research/2005/061305sector.html?rl

Microsoft plans mobile push
Network World, 06/13/05
http://www.networkworld.com/nlwir2612
_______________________________________________________________
To contact: Joanie Wexler

Joanie Wexler is an independent networking technology
writer/editor in California's Silicon Valley who has spent most
of her career analyzing trends and news in the computer
networking industry. She welcomes your comments on the articles
published in this newsletter, as well as your ideas for future
article topics. Reach her at <mailto:joanie@jwexler.com>.
_______________________________________________________________
This newsletter is sponsored by Oracle
SAN and SMP, Pooling or Provisioning - what does it all mean?

Find out with the Oracle Grid Computing Glossary! Like any
technology, grid computing is made up of a specialized set of
terms and acronyms. This comprehensive glossary provides a
definition of important grid-related terms.
http://www.fattail.com/redir/redirect.asp?CID=106762
_______________________________________________________________
ARCHIVE LINKS

Archive of the Wireless in the Enterprise newsletter:
http://www.networkworld.com/newsletters/wireless/index.html

Wireless research center
Latest wireless news, analysis and resource links
http://www.networkworld.com/topics/wireless.html
_______________________________________________________________
FEATURED READER RESOURCE
VoIP SECURITY

For the latest in VoIP security, check out NW's Research Center
on this very topic. Here you will find a collection of the
latest news, reviews, product testing results and more all
related to keeping VoIP networks secure. Click here for more:
<http://www.networkworld.com/topics/voip-security.html>
_______________________________________________________________
May We Send You a Free Print Subscription?
You've got the technology snapshot of your choice delivered
at your fingertips each day. Now, extend your knowledge by
receiving 51 FREE issues to our print publication. Apply
today at http://www.subscribenw.com/nl2

International subscribers click here:
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail
newsletters, go to:
<http://www.nwwsubscribe.com/Changes.aspx>

To change your e-mail address, go to:
<http://www.nwwsubscribe.com/ChangeMail.aspx>

Subscription questions? Contact Customer Service by replying to
this message.

This message was sent to: networking.world@gmail.com
Please use this address when modifying your subscription.
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor,
at: <mailto:jcaruso@nww.com>

Inquiries to: NL Customer Service, Network World, Inc., 118
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of
Online Development, at: <mailto:sponsorships@nwfusion.com>

Copyright Network World, Inc., 2005

No comments:

Post a Comment