Chapter Nine 1

Online File W9.1 Wireless Advertising in Action

The following are a few examples of wireless advertisement campaigns or trials currently underway. Vindigo (vindigo.com) has a large database of customers (over a million as of May 2004) who are willing to accept promo- tional materials on their wireless devices. This is known as permission marketing. The users download special software to their PDAs that allows Vindigo to deliver timely, accurate information about places to go and things to do in their area. Along with every listing, the company can deliver a customized message to the users at a time and place where it is of most interest to them and they are most likely to act on it. The company targets ads by city (New York, San Francisco, Los Angeles, etc.) and channel (Eat, Shop, or Play). Vindigo tracks which ads a user sees and selects, and even allows a user to request information from an advertiser via e-mail. Vindigo determines a user’s location through GPS or by asking which neighborhoods the user wants to be matched with. For example, an Italian restaurant chain could use Vindigo to send a message to anyone looking for Italian food within a few blocks of one of its locations. The restaurant could provide the user with directions to the restaurant and even offer a list of specials on the menu. MyAvantGo (avantgo.com) has several thousand content channels and over 8 million registered users (AvantGo 2004). The content is delivered to PDAs and handsets running Palm or PocketPC operating systems. MyAvantGo offers an m-business chan- nel and direct promotions, delivering advertising from some of the world’s top brands, including American Airlines, Chevy Trucks, the Golf Channel, CNN, the New York Times, and Yahoo! Hoping to become the king of location-based Web domains, Go2 (go2online.com) helps mobile travelers find everything from lodging (choose go2hotels) to Jiffy Lube stations. Partnering with Sprint, Nextel, , and BellSouth, Go2 makes its services available on every Web-enabled phone, Palm i705, and BlackBerry RIM pager in America. Entering “JiffyLube” or hundreds of other brand names into the Go2 system will bring up the nearest location where a shopper can find that product or service. Another aspect of wireless advertising is getting paid to listen to advertising. As in the wireline world, some consumers are willing to be paid for exposure to advertising. In most places where it was offered in the United States, this service was a flop and was discontinued. In Singapore, though, getting paid to listen to advertising works very well. Within a few months of offering the ads, more than 100,000 people subscribed to the free minutes in exchange for listening to the ads offered by SingTel Mobile (Eklund 2001). Subscribers to SingTel’s service fill out a personal questionnaire when they sign up. This information is fed into the Spotcast database and encrypted to shield subscribers’ identities—Spotcast cannot match phone numbers with names, for example. To collect their free minutes—1 minute per call, up to 100 minutes a month—subscribers dial a four-digit code, then the phone number of the person they want to talk to. The code prompts SingTel to forward the call to Spotcast and, in an instant, Spotcast’s software finds the best ad to send to the subscriber based on the subscriber’s profile.

Sources: Compiled from vindigo.com (accessed 2003); avantgo.com (accessed 2004); go2online.com (accessed 2003); and Eklund, B. “Wireless Advertising’s Home of the Free.” Red Herring, March 6, 2001. redherring.com/mag/issue94/650018065.html (accessed January 2003). 2 Part 4

ONLINE FILE W9.2 U.S. FLEET SERVICES AND WIRELESS NETWORKING Started in 1997, U.S. Fleet Services has grown to be the code attached to the customer’s truck. This provides the leading provider of mobile, onsite fueling in the United driver with the type of fuel required by the truck. After the States, with customers such as FedEx, Home Depot, Coca- truck is fueled, a meter on the delivery truck sends a wireless Cola, Nabisco, Office Max, and more. Using trucks that signal to the handheld. The handheld then syncs with the resemble home fuel-delivery vehicles, U.S. Fleet travels to meter, capturing the type and quantity of fuel delivered. The its customers, refueling the customers’ vehicles onsite, data are stored on the handheld’s CompactFlash memory usually during off-hours. Three years ago, U.S. Fleet con- card. When the driver returns to the home base, the data are sidered building a wireless network for its drivers, but unloaded over the Wi-Fi network to the central database. At decided against it. Managers considered the project to be this point, the data are available for U.S. Fleet and its cus- too hard and too expensive given the expected ROI. How- tomers to analyze. ever, toward the end of 2001, they changed their minds. Before the handheld computers were deployed, drivers Although a mobile wireless solution was the end goal, would record the data manually. The data were then faxed the first step in the project actually involved the implemen- from the branch offices to headquarters and entered by hand tation of an ERP system. This was followed by a Web-based into the system. Not only were there delays, but the data application built on top of the ERP that provided customers were also subject to entry errors at both ends of the line. The with information about their fuel consumption and taxes, company and its customers now have accurate data in a enabling them to do better fleet management. Finally, U.S. timely fashion, which provides the company with faster Fleet equipped its drivers with handheld devices that could invoicing and cash flow. On average, the new system has also communicate with the company’s intranet using Wi-Fi. enabled drivers to service six to seven more stops per shift. The handheld device U.S. Fleet selected was the Intermec 710 (intermec.com). According to the architect of Source: Ludorf, C. “U.S. Fleet Services and Wireless Networking.” the U.S. Fleet system, this device was selected for a number Transportation Technology Today, August 2002, pp. 12–15. of reasons. Besides having a built-in bar-code scanner, it also runs Microsoft’s Pocket PC operating system, supports Visual Questions Basic programs, handles CompactFlash cards, and has an inte- grated wireless radio for short range Wi-Fi communications. 1. What systems did U.S. Fleet have to put in place The device is fairly lightweight with a drop resistant case that before implementing its wireless solution? is sealed to protect against harsh weather conditions. 2. Why did U.S. Fleet select the Intermec 710 handheld The system works as follows: Branch managers enter a device? How does the device communicate with the delivery route and schedule for each driver into a centralized company’s intranet? database via the company’s intranet. Each driver starts the 3. What are the major benefits that U.S. Fleet has real- shift by downloading the route and schedule over the ized by combining handheld devices with Wi-Fi? company’s Wi-Fi network into a handheld. When the driver reaches a customer stop, the handheld is used to scan a bar- Chapter Nine 3

ONLINE FILE W9.3 WEARABLE DEVICES FOR BELL CANADA WORKERS For years mobile employees who had to climb trees, electrical So far, only a few companies make and sell wearables for poles, or tall buildings were unable to enjoy the new tech- mobile workers. Bell Canada’s system was developed by nologies designed to make employees more productive. That Xybernaut, a U.S. company that in 2002 had more than a thou- is beginning to change. sand of its units in use around the world, some in operation On a cold, damp November day in Toronto, Chris Holm- and others in pilot programs (see xybernaut.com). Meanwhile, Laursen, a field technician with Bell Canada (bell.ca), is out Bell Canada was impressed with the initial results and is equip- and about as usual, but this time with a difference: A small ping most of its technicians with wearable computing devices. but powerful computer sits in a pocket of his orange mesh Of course, a practical problem of wearable devices in vest, a keyboard is attached to the vest’s upper-left side, and many countries is the weather: What happens when the tem- a flat-panel display screen hangs by his waist. A video cam- perature is minus 50 degrees or the humidity is 99 percent? era attached to his safety hat enables him to take pictures Other potential problems also exist: If a worker is wearing without using his hands and send them immediately to the thick gloves, how can he or she use a keyboard? If it is pour- office. A cell phone is attached as well, connected to the ing rain, will the battery short circuit? Various solutions are computer. A battery pack to keep everything going sits being developed, such as voice input, tapping on a screen against his back. instead of typing, and rainproof electrical systems. Holm-Laursen and 18 other technicians on this pilot project were equipped like this for 10 weeks during fall 2000. Sources: Guernsey, L. “Wearable Computers for the Working Class.” By summer 2003 an increasing number of Bell Canada’s New York Times, December 14, 2000. nytimes.com/2000/12/14/ tech- employees had been equipped with similar devices. The wear- nology/14wear.htm (accessed February 2003); xybernaut.com (accessed 2004). able devices enabled the workers to work orders and repair manuals wherever they work. These workers are not typical of employees usually using Questions computers, that is, white-collar workers. The hands-free aspect and the ability to communicate anytime, anywhere, 1. What are some other industrial applications of similar represent major steps forward for these utility workers. A wearable devices? (Use .com to find additional wide variety of employees—technicians, medical practition- applications.) ers, aircraft mechanics, and contractors—are using or testing 2. How do you think wearable devices could be used in such devices. entertainment? 4 Part 4

ONLINE FILE W9.4 MOBILE WORKPLACE APPLICATIONS FOR CUSTOMER SUPPORT The following are two scenarios of wireless applications for tomers’ electromechanical control systems. To do so, he mobile employees. needs to know immediately when a customer’s system is fal- tering, what is malfunctioning, and what type of service con- Sales Support tract is in effect. Linda is a member of the field sales team at Theru Tools (a Michael does not need to carry all of this information in fictitious company). Each day she drives out to her cus- his head, but instead has it in the palm of his hand. With tomers in a van stocked with products. For each sale, she has only a few taps of a stylus, Michael accesses the mysap.com to note the customer name, the number and type of products Mobile Workplace for all the data he requires, including the sold, and any special discounts made. This record keeping name and address of the next customer he should visit, used to be done manually, and many errors were made, lead- equipment specifications, parts inventory data, and so forth. ing to customer complaints and lost sales. Once he has completed the job, he can report back on Theru implemented a system using low-cost but power- the time and materials he used, and these data can be ful hand-held wireless devices. Using Mobile Sales (an appli- employed for timely billing and service quality analysis. In cation for handhelds), accessed via the mysap.com Mobile addition, his company is able to keep track of his progress Workplace, Linda and her coworkers in the field now have and monitor any major fluctuations in activities. As a result, information at their fingertips, including updates on new both Michael and his supervisors are better informed and products and special promotions. Linda can place orders better able to serve their customers. without delay and get immediate feedback on product avail- ability and delivery times. What’s more, the system can Source: Compiled from “CRM and the mySAP.com Mobile Workplace” prompt Linda as she enters orders, and it also can make plau- (a publicly available brochure from SAP), 2000. sibility checks on the orders, eliminating many of the errors associated with the manual process. It also checks to see if she is giving the right discounts to the right customer, and Questions immediately triggers the invoicing process or prints out a 1. How has the introduction of handheld wireless devices receipt on the spot. changed sales support at Theru tools? Customer Service Support 2. What benefits does Euroblast receive from Mobile Michael works for Euroblast, Inc. (another fictitious com- Workplace? How does Michael benefit? What are the pany) as a service engineer. It is his job to provide time- benefits for Euroblast’s customers? critical maintenance and support for the company’s cus- Chapter Nine 5

Online File W9.5 Mobile Entertainment: Music, Pictures, and Videos

The availability of portable MP3 players has lead to the development of music devices integrated with mobile phones. All of the major handset vendors offer MP3 phones, including Samsung (SPH-M100), Nokia (5510), Ericsson (MP3 Handsfree), and Audiovox (CMP3). All of these handsets enable music titles to be stored and played locally on the mobile device. With higher bandwidth, music vendors will be able to offer instant delivery of songs from their music libraries for online purchase. Location-based services can even be integrated to target subscribers with location-sensitive streaming content such as audio jingles promoting offers at retail outlets in the vicinity or movie trailers for films showing at the nearest theater. The same handset vendors also have produced a new generation of cell phones that enable users to send pictures from one device to another. The Nokia 7650, Samsung A500, Sony Ericsson T300, and Sanyo SCP-5300 all have built-in digital cameras. These and a number of other cell phones can send and receive pictures through their MMP (multimedia messaging protocol) capabilities. As the 3G handsets hit the market, mobile devices will begin to support the downloading and real-time playback of audio and video clips. The U.S.–based Packet Video Corporation (packetvideo.com) is a pioneer in this area. The company already has demonstrated its new mobile-media software on Nokia’s 3650 and 7650 phones. This software enables content to be captured by the , viewed via streaming video, and shared via messaging and e-mail. Users can utilize the software to encode live video from the built-in device camera; stream favorite videos and other multimedia content across the wireless net- work to the handset; view news, sports, music videos, movie trailers, and other content; download content to the mobile device for forwarding to friends or storage for later retrieval; and view live cameras for travel, entertainment, security, and child or elderly monitoring (newstream.com 2002).

Source: PacketVideo Corporation. “PacketVideo Demonstrates Mobilemedia on Nokia Series 60 Devices.” November 2002, packetvideo.com/press/ 2002-10-19.html (accessed May 2005). 6 Part 4

Online File W9.6 Location-Based Technologies

Providing location-based services requires the following location-based and network technologies: ◗ GPS locator. A GPS locator is included in the mobile device to determine the location of the person carrying the mobile device. ◗ Position-determining equipment (PDE). This equipment identifies the location of the mobile device (either through GPS or by locating the nearest base station). The position information is sent to the mobile positioning center. ◗ Mobile positioning center (MPC). The MPC is a server that manages the location information sent from the PDE. ◗ Location-based technology. This technology consists of groups of servers that combine the position information with geo- graphic- and location-specific content to provide a service. For instance, location-based technology could present a list of addresses of nearby restaurants based on the position of the caller, local street maps, and a directory of businesses organized by location. ◗ Geographic content. Geographic content consists of streets, road maps, addresses, routes, landmarks, land usage, zip codes, and the like. This information must be delivered in compressed form for fast distribution over wireless networks. ◗ Location-specific content. Location-specific content is used in conjunction with the geographic content to provide the loca- tion of particular services. Yellow-page directories showing the location of specific business and services exemplify this type of content. The accompanying diagram shows how these technologies are used in conjunction with one another to deliver location- based services.

GPS System

S GP

GPS Location Handset Server Cellular Phone Station

Internet

Service Contents Center Center

Source: MapInfo Corporation. MapInfo Envinsa™. mapinfo.com/industries/mobile (accessed June 2003). Used with permission. ONLINE FILE W9.7 NEXTBUS: A SUPERB CUSTOMER SERVICE

The Problem Buses in certain parts of San Francisco have difficulty keeping up with the posted schedule, especially during rush hours. Generally, buses are scheduled to arrive every 20 minutes, but at times passengers may have to wait 30 to 40 minutes. The scheduled times become meaningless and passengers are unhappy because they waste time.

The Solution other countries. The exhibit below shows how the NextBus sys- tem works. The core of the NextBus system is the set of GPS San Francisco bus riders carrying an Internet-enabled wireless satellites that let the NextBus information center know where a device, such as a cell phone or PDA, can quickly find out when a bus is located. Based on a bus’s location, the scheduled arrival bus is likely to arrive at a particular bus stop. The NextBus time at each stop can be calculated. (nextbus.com) system tracks public transportation buses in real Currently, NextBus is an ad-free customer service, but in time. Knowing where each bus is and factoring in traffic pat- the near future advertising may be added. Because the system terns and weather reports, NextBus calculates the estimated knows exactly where a rider is when they request information arrival time of the bus to each bus stop on the route. Arrival and how much time they have until their next bus, in the future, times also are displayed on the Internet and on a public screen the system may send the rider to the nearest Starbucks for a cup at each bus stop. of coffee, giving them an electronic discount coupon. The NextBus system has been used successfully in several other cities around the United States, in Finland, and in several

NextBus Operational Model

GPS Satellites Real-Time Arrival Next Bus Predictions 01001000100100 10101101010110 Wireless Information 11001001100100 10110101011010 Communication 10010101001010 Location and Center 01001000100100 Real-Time 10101101010110 Bus ID reported 11001001100100 10110101011010 Passenger to Automatic 10010101001010 Messages 01001000100100 Vehicle Location 10101101010110 11001001100100 10110101011010 (AVL) at NextBus 10010101001010 Information Center World Transit Wide Web Management Information

Wireless Phone and Mobil Devices

Wireless 2222 FillmoreFillmore Shelter Signs Communication 7 minmin & 1122 mminin and Public Displays

Pole Signs

Source: Used with permission of NextBus Information Systems, Inc. Copyright © 2005. 8 Part 4

The Results Sources: Murphy, P. “Running Late? Take the NextBus.” Environmental News Network, September 7, 1999. enn.com/enn-features-archive/ Passengers in San Francisco are happy with the system; worries 1999/09/090799/nextbus_4692.asp (accessed January 2003); about missing the bus are diminished. A similar systems is used nextbus.com (accessed January 2003); ITS America. ”NextBus Expands in rural areas in Finland, where buses are infrequent and the Real-Time Transit Information in the Bay Area with AC Transit.” ITS winters are very cold; passengers can stay in a warm coffeehouse America, August 9, 2001. itsa.org/ITSNEWS.NSF/0/34c13fd8352c4c3f not far from the bus stop rather than wait in the cold for a bus 85256aa400497aad?OpenDocument (accessed May 2004). that may be an hour late. A bus company can also use the sys- tem to improve scheduling, arrange for extra buses when needed, and improve its operations. Chapter Nine 9 ONLINE FILE W9.8

SECURITY APPROACHES FOR MOBILE COMPUTING WEP (WIRED EQUIVALENT PRIVACY) WEP is a security protocol for Wi-Fi networks that encrypts the communications between a mobile device (e.g., a laptop, tablet PC, PDA) and the wireless access point. WEP provides weak encryption, meaning that it is secured against casual hacking as long as the person setting up the network turns on the encryption. Unfortunately, many small business owners and home- owners operating a WLAN fail to do just that. Although WEP offers a measure of security, the tradeoff is inconvenience. In order to employ WEP, all Wi-Fi users must be educated on how it works, their computers must be reconfigured to connect to the network, and the encryption code must be changed frequently. Additionally, every authorized user must be given the encryption key, which means that a lot of people will be carrying around the keys to the network. In larger companies, if a hacker can gain access to the encryption key or can get through the WEP security in some other way— which is easily done with readily available software like AirSnort (airsnort.shmoo.com) or WEPCrack (wepcrack.sourceforge.net)—the damage is often greater because companies have a habit of installing their wireless access points behind their firewalls. There are alternatives to WEP. If a company is concerned about the security of wireless data communications, it can use virtual private networking (VPN) technology to create a secure connection over the wireless link. There also is a new Wi-Fi security standard, called Wi-Fi Protective Access (WPA), under development. This standard has the backing of the Wireless Fidelity Alliance and the Institute of Electrical and Electronics Engineers (IEEE). WPA provides enhanced encryption and supports user authentication, something that was missing from WEP. The alliance has already begun certifying Wi-Fi products with WPA security. This enhanced security may encourage more business to experiment with Wi-Fi over the coming years. For details, see Fikes (2003).

SIM-BASED AUTHENTICATION GSM and its 2.5G and 3.0G counterparts all include SIM. This module is usually imple- mented as a smart card containing an authentication key along with other vital information about the subscriber. The authentication key also is stored on a “home location registry,” which can be thought of as a database that is part of the mobile network. When the phone is turned on, the user is asked to enter a PIN number. This protects the cell phone against ille- gal use if it happens to be stolen or lost. If the PIN is correct, the cell phone and the network engage in a “challenge-response” process of authentication. A network authentication center sends a random number to the cell phone’s SIM. The SIM computes a “signed response” by combining the random number with its authentication key. The signed response is sent over the network to the authentication center, which performs the same computation using a copy of the authentication key stored on the home-location registry. If the signed response matches the value computed by the authentication center, then the cell phone is authenti- cated. After that, communication takes place through “symmetric encryption,” using a key generated by both the authentication center and the SIM. Although SIM cards protect against unauthorized use of a particular subscriber’s account, they do not prevent the use of a stolen cell phone. If a thief steals a phone, he or she can simply re- place the existing SIM card with another one and sell it on the open market. The police in Am- sterdam employed an interesting method to thwart this practice. Using a cell phone’s International Mobile Equipment Identity number, the police were able to track down the mobile phone num- ber being used on the stolen phone. Once the number was known, the police employed a special computer program to send out an SMS message to the stolen phone every 3 minutes. The mes- sage read, “This handset was nicked [stolen]; buying or selling it is a crime. The Police.” Ob- viously, this made the stolen phone a lot less attractive to prospective buyers (Evers 2001). 10 Part 4 WTSL AND WIM The transmissions between the WAP gateway and the Web server (see Exhibit 9.4 in the book) can be secured through the wired Internet security protocols discussed in Chapter 11 (e.g., PKI, SSL, and TSL). These protocols cannot be used on the mobile side of the gateway. Instead, WAP relies on the Wireless Transport Layer Security (WTLS). Like its wired counterpart (TSL), WTLS enables encrypted communications between a mobile device and the WAP gate- way. Additionally, WTLS supports the key elements of PKI—public and private encryption keys, digital certificates, digital signatures, and the like. A wireless identity module (WIM) can also be used in combination with WTLS. A WIM is a smart card device, much like a SIM (and in fact can be implemented on a SIM). It is designed to hold the security keys and digital certificates used by the gateway and the Web server to encrypt/decrypt communications. One of the advantages of a WIM is that can be issued by a bank or other financial institution to handle m-commerce payments and transactions.

Sources: Evers, J. “Dutch Police Fight Cell Phone Theft with SMS Bombs.” IDG News Service, March 27, 2001. edition.cnn.com/2001/TECH/industry/08/30/sms.crime.fighter.idg/ (accessed March 2005); Fikes, B. “Unguarded Wireless Networks a Snap for ’Stumbling.’” Californian North County Times, January 12, 2003. nctimes.net/news/2003/20030112/53511.html (accessed May 2004). Chapter Nine 11

Online File W9.9 Technical Foundations of Pervasive Computing

Being invisible is only one of the properties of pervasive computing. A short list of its major characteristics (Amor 2001) follows. ◗ Invisible devices. Numerous and casually accessible, these devices often are invisible. ◗ Embedded microchips. Microchip intelligence is embedded into everyday devices and objects. ◗ Always on. Users have continuous access to information, entertainment, and communication with anyone, anytime, anywhere. ◗ Pervasive network. Everyone and everything is connected to an increasingly pervasive network structure. ◗ Life-enhancing applications. The technology will penetrate the mainstream mass market through a variety of life-enhancing applications. ◗ Consumer-centric solutions. The technology offers “gadgetry” for simple and practical consumer-centric solutions. ◗ Increasing productivity. The technology offers mainstream-market value propositions that enable consumers to save time or money and enhance leisure and entertainment. ◗ Long-term vision. In the long-term, the technology will enable people to work, live, and play more effectively. As the list suggests, three major technical requirements underlie pervasive computing. First, everyday objects will have to contain embedded microprocessors. Second, a pervasive network is needed to connect these microprocessors. Finally, the micro- processors must be able to communicate with the pervasive network. The day when these technical requirements all meet is not that far off. According to Harbor Research (Edgington 2001), approximately 5 billion microprocessors were sold in 2000, and only 120 million of them (roughly 2.5 percent) were intended for PCs. It is estimated that in 5 years, the number of processors in the average home could grow from 40 to 280, the number of processors in the average car (now about 20) will increase sub- stantially over the same time period, and the number of embedded chips sold to support increasingly intelligent devices could grow to over 9 billion (Edgington 2001). Intelligence and connectivity will be designed into almost every electronic device. The pervasive network environment over which these devices will communicate will, for the foreseeable future, be the Internet. The way in which embedded devices will attach to or communicate with the Internet will vary. Some will be wired into the Internet—through broadband or dial-up—in the same way that the average desktop computer is connected. Others will con- nect through mobile or wireless networks in the same way that a cellular phone does. Finally, others, such as the RFID tags used by Prada, will link in through small antennas that can send and receive messages in a wireless environment (e.g., Wi-Fi or Bluetooth). Like most areas of new technological development, pervasive computing has been accompanied by a great deal of hype. In the last few years, people have talked about refrigerators that can tell a person when to order milk, TVs that provide entertain- ment on demand, gas pumps with Web connections, and a whole array of amazing gadgets. For instance, 3COM promoted Audrey, a small, wireless Internet appliance for the entire family. This tablet-like device offered e-mail, Web access, and calen- daring. Despite a $20-million marketing campaign, Audrey was a resounding flop that was pulled from the market. The same has been true for most of the other ideas that cropped up during the dot-com heyday. Instead of looking at solutions to problems, many manufacturers have focused on connectivity as an end in itself, and so have not yet produced commercially successful products.

Sources: Amor, D. Internet Future Strategies: How Pervasive Computing Services Will Change the World. Upper Saddle River, NJ: Prentice Hall, 2001; Edgington, C. “How Internet Gateways and Smart Appliances Will Transform Our Homes.” TNTY Futures, 2001. tnty.com/newsletter/futures/technology.html (accessed February 2003). 12 Part 4

ONLINE FILE W9.10 THE HIGHWAY 91 PROJECT Route 91 is a major eight-lane, east-west highway near Los ◗ Surveillance cameras record the license numbers of cars Angeles. Traffic is especially heavy during rush hours. without AVIs. These cars can be stopped by police at the California Private Transportation Company (CPT) built six exit or fined by mail. express toll lanes along a 10-mile stretch in the median of ◗ Video cameras along the tollway also enable managers to the existing Highway 91. The express lane system has only keep tabs on traffic; for example, sending a tow truck to help one entrance and one exit, and it is totally operated with EC a stranded car. Also, through knowledge of the traffic vol- technologies. The system works as follows. ume, pricing decisions can be made. Raising the price as traf- ◗ Only prepaid subscribers can drive on the road. Subscribers fic increases ensures that the tollway will not be jammed. receive an automatic vehicle identification (AVI) device The system saves commuters between 40 and 90 min- that is placed on the rearview mirror of the car. The device, utes each day, so it is in high demand. about the size of a thick credit card, includes a microchip, An interesting extension of the system is the use of the an antenna, and a battery. A large sign over the tollway same AVIs for other purposes. For example, they can be used in tells drivers the current fee for cruising the express lanes. paid parking lots. Someday you may even be recognized when In a recent year, it varied from $0.50 in slow traffic hours you enter the drive-through lane of McDonald’s, and a voice will to $3.25 during rush hours. ask you, “Mr. Smart, do you want your usual meal today?” ◗ Sensors in the pavement let the tollway computer know that a car has entered; the car does not need to slow or Source: 91expresslanes.com (accessed May 2002). stop. The AVI makes radio contact with a transceiver installed above the lane. The transceiver relays the car’s Questions identity through fiber-optic lines to the control center, where a computer calculates the fee for that day’s trip. The 1. What is the role of the wireless component of this system accesses the driver’s prepaid account and the fare is system? automatically deducted. A monthly statement is sent to the 2. What are the advantages of the system to commuters? subscriber’s home. Chapter Nine 13

ONLINE FILE W9.11 EMPOWERING ASSISTED-LIVING PATIENTS The elderly residents in assisted-living facilities have various ◗ Length of absence from bed (indicating that the patient needs that require differing levels of care. Some residents may have fallen or be incapacitated in other ways) require minimal assistance, others have short-term memory ◗ General location (indicating whether the resident is in an problems and other health issues, and others have more acceptable area of the facility) severe problems such as Alzheimer’s disease. At Elite Care’s One of the initial concerns with these monitors is that Estates Cluster Residential Care Facility in Milwaukie, Oregon, the privacy of the residents will be unnecessarily invaded. To pervasive computing is being used to increase the autonomy alleviate this concern, residents and their families are given of all of its residents, regardless of their individual needs. the choice of participating or not. Most of them choose to Elite Care (elite-care.com) is a family-owned business. It participate because the families believe that these monitors has been built from the ground up with the intent of pro- provide better tracking and care. The monitors also increase viding “high tech, high touch” programs. Members of the the autonomy of all the patients because it reduces the need facility’s advisory committee, which includes representatives for staff to constantly monitor residents in person, especially from the Mayo Clinic, Harvard University, the University of those with more acute care needs. Michigan, the University of Wisconsin, and Sandia National All of these sensors and systems are connected through Laboratory, have contributed a number of ideas that have a high-speed Ethernet. The data produced by the sensors and been put into practice. systems are stored in an SQL database and can be used to The entire facility is wired with a network of unobtru- alert the staff in real-time if necessary. Although the data sive sensors that include biosensors (e.g., weight sensors) are not being used at the present time for analytical pur- attached to each resident’s bed; movement sensors embed- poses or to develop individualized programs, the facility ded in badges worn by the residents and staff; panic buttons plans to work on these sorts of applications in the future. used to call for help; Internet access via touch screens in each room; and climate control, lights, and other regulated Source: Stanford, J. “Using Technology to Empower Assisted Living appliances. The biosensors and movement sensors enable the Patients.” Healthcare Review, July 2, 2002. Used with permission. staff to determine the following conditions and activities in caring for patients: Questions ◗ Weight loss (indicating conditions such as impending con- gestive heart failure) 1. What are some of the pervasive devices used in the ◗ Restlessness at night (indicating conditions such as insuffi- Elite Care facility? What types of data do these devices cient pain medication) provide? ◗ Frequency of trips to the bathroom (indicating medical prob- 2. In what ways do these devices encroach upon the pri- lems such as infection) vacy of the residents?