Professional Documents
Culture Documents
Turban Online W9
Turban Online W9
Turban Online W9
Why would anyone pay $8 a day or $30 a month for Wi-Fi access when it is readily available in many locations for free? Because
it is relatively inexpensive to set up a wireless access point that is connected to the Internet, a number of businesses offer cus-
tomers Wi-Fi access without charging them for the service (Richtel 2004). In fact, one organization, FreeNetworks.org
(freenetworks.org) was founded to support the creation of free community wireless network projects around the globe.
In other cases, spillover signals and poor security measures allow users to surreptitiously make a connection to a WLAN. How?
First, to ensure adequate coverage throughout a building or home, a strong signal strength may be set. For example, if a wireless
access point is installed in the front of a home and the signal range is set to reach upper bedrooms and the back yard, the signal
will also be detectable from the street. Second, although Wi-Fi does have a built-in security system known as Wireless Encryption
Protocol (WEP), many small business owners and homeowners with WLANs never turn it on. Similarly, for their own convenience or
via an oversight, many WLAN owners do not employ password protection. As a result, they sponsor an open and free network
connection to anyone who happens to be in the range of connecting with a wireless device that can pick up the signal.
Knowing this, a small number of people have made a hobby out of war driving. War driving is the act of locating open
(unsecured) WLANs while driving around a city or other geographic area (see wardriving.com). To war drive, a person needs a
vehicle, a computer or PDA with a wireless card running in promiscuous mode (monitoring for unsecured wireless LAN signals),
software that will probe for access points, and an antenna that can be mounted on top of or positioned inside the car. A knowl-
edgeable war driver is able to detect a signal, intrude into the network, obtain a free Internet connection, and possibly gain
access to important data and other resources of the legal owner. The term war driving is derived from the term war dialing, a
technique in which a hacker programs his or her computer to call hundreds of phone numbers until a modem answers, which
indicates a dial-up connection to a computer. War dialing is demonstrated in the movie War Games, which features Matthew
Broderick performing the technique.
A related practice is war chalking. Once an open Wi-Fi connection is found, it can be identified by symbols on a sidewalk
or wall to indicate nearby wireless access. The term war chalking was inspired by the practice of hobos during the Great
Depression who used chalk marks to indicate which homes offered food or shelter.
One of the primary aims of people engaged in war driving is to highlight the lax security of Wi-Fibased networks. This
motivation seems warranted. In November 2003, Toronto police investigated a parked car and found that the driver was naked
from the waist down with a laptop computer on the front seat, playing a child pornography video that was being streamed from
an insecure residential hotspot. An attorney speculated that if homeowners are negligent in setting up proper security, they
could be held accountable for activities carried out on their networks, including criminal activities such as launching spam, dis-
tributing viruses, stealing data, or downloading child pornography (Shim 2003).
In Douglas County, Colorado, the Sheriffs department is establishing a Wi-Fi patrol; police cars will be equipped to war
drive and note down open Wi-Fi access points, with the goal of alerting owners (if they can be found) that they should lock
down their Wi-Fi networks.
Online File W9.3 WI-FI Mesh Networks, Google Talk, and Interoperability
Researchers in India have developed a protocol that will enable wide area coverage of Wi-Fi networks, which are called Wi-Fi
mesh networks. With the conventional Wi-Fi networks that are common in Internet cafes and airports, radio signals are
exchanged between portable devices and the base station, which has a wired connection to the Internet. Their range is only
100 meters or less. With a Wi-Fi mesh network, several nodes can exchange radio signals with each other as well as with the
devices. The range of a Wi-Fi mesh network is up to 40 kilometers and at speeds up to 20 times faster than traditional Wi-Fi.
This arrangement provides wider geographical Wi-Fi coverage at lower cost than a series of conventional Wi-Fi networks because
not all of the nodes have to be wired to the Internet.
Another development is Googles Google Talk service, which allows for voice connections and IM. In May 2006, Google
and Nokia launched a handheld Internet browsing device that contained Google Talk, which relies on Wi-Fi instead of cell phone
networks. As many as 300 municipalities, including San Francisco, Philadelphia, Suffolk County in Long Island, New York, and
the entire state of Connecticut plan to offer the Wi-Fi service free of charge. Initially, because of the different protocols, the
device cannot call regular phones. However, cell phone equipment manufacturers, including Avaya, Cisco Systems, and Motorola,
are testing devices that have both Wi-Fi and cell phone network capabilities. For example, Motorola partnered with eBays VoIP
provider, Skype. Customers with Wi-Fi-enabled mobile phones will have the option of using Skypes service in place of a landline
service as long as they are within range of a Wi-Fi signal. Once out of Wi-Fi range, the phone switches to cellular technology.
Sales of mobile phones with both cellular and Wi-Fi capability will be booming by 2010, according to a study by market
research company In-Stat.
EXHIBIT W9.5.1
Solo Services
Solo Services
14.03 53.00-
Accounts 13.03 1700.00-
Transfer 13.03 2456.55-
Solo New Payment 12.03 467.90-
Customer number Falling Due (2) 10.03 42.00-
(..) Abroad 10.03 567.05-
Tervenuloa Password Investments 9.03 15,411.00-
(..) Visa Inquiry 8.03 979.25
Merita Accept Mastercard Inquiry 5.03 54.55
Mail
Merita Bank Options Back Solo News 07.05 Options Back
Solo Instructions and terms
Solo Market Exit Solo
1abc 2abc 3 def
In English
4ghi 5 jklPa 6Svenska
mno Options Back
Solo Investments Solo Transfer
7 pq
rs 9 wx
8 tuvSupmeksl
yz
Source: Norrdeas WAP Solo from M-Commerce, 2002, Figure 1.4. Reprinted by permission of John Wiley & Sons, Inc.
Chapter Nine: Mobile Computing and Commerce and Pervasive Computing 5
The following are a few examples of wireless advertisement campaigns or trials currently underway.
Vindigo (vindigo.com) has a large database of customers (over a million as of May 2004) who are willing to accept promo-
tional materials on their wireless devices. This is known as permission marketing. The users download special software to their
PDAs that enables Vindigo to deliver timely, accurate information about places to go and things to do in their area. Along with
every listing, the company can deliver a customized message to the users at a time and place where it is of most interest to
them and they are most likely to act on it.
The company targets ads by city (New York, San Francisco, Los Angeles, etc.) and channel (Eat, Shop, or Play). Vindigo
tracks which ads a user sees and selects, and even allows a user to request information from an advertiser via e-mail.
Vindigo determines a users location through GPS or by asking which neighborhoods the user wants to be matched with.
For example, an Italian restaurant chain could use Vindigo to send a message to anyone looking for Italian food within a few
blocks of one of its locations. The restaurant could provide the user with directions to the restaurant and even offer a list of
specials on the menu.
MyAvantGo (avantgo.com) has several thousand content channels and over 8 million registered users (AvantGo 2004).
The content is delivered to PDAs and handsets running Palm or PocketPC operating systems. MyAvantGo offers an m-business
channel and direct promotions, delivering advertising from some of the worlds top brands, including American Airlines, Chevy
Trucks, the Golf Channel, CNN, the New York Times, and Yahoo!
Hoping to become the king of location-based Web domains, Go2 (go2online.com) helps mobile travelers find everything
from lodging (choose go2hotels) to Jiffy Lube stations. Partnering with Sprint, Nextel, Verizon, and BellSouth, Go2 makes its
services available on every Web-enabled phone, Palm i705, and BlackBerry RIM pager in America. Entering JiffyLube or
hundreds of other brand names into the Go2 system will bring up the nearest location where a shopper can find that product
or service.
Another aspect of wireless advertising is getting paid to listen to advertising. As in the wireline world, some consumers
are willing to be paid for exposure to advertising. In most places where it was offered in the United States, this service was a
flop and was discontinued.
In Singapore, though, getting paid to listen to advertising works very well. Within a few months of offering the ads, more
than 100,000 people subscribed to the free minutes in exchange for listening to the ads offered by SingTel Mobile (Eklund
2001). Subscribers to SingTels service fill out a personal questionnaire when they sign up. This information is fed into the
Spotcast database and encrypted to shield subscribers identitiesSpotcast cannot match phone numbers with names, for
example. To collect their free minutes1 minute per call, up to 100 minutes a monthsubscribers dial a four-digit code, then
the phone number of the person they want to talk to. The code prompts SingTel to forward the call to Spotcast and, in an
instant, Spotcasts software finds the best ad to send to the subscriber based on the subscribers profile.
The availability of portable MP3 players has led to the development of cell phones with music devices integrated into them. All
of the major handset vendors offer MP3 phones, including Samsung (SPH-M100), Nokia (5510), Ericsson (MP3 Handsfree), and
Audiovox (CMP3). All of these handsets enable music titles to be stored and played locally on the mobile device.
With higher bandwidth, music vendors will be able to offer instant delivery of songs from their music libraries for online
purchase. Location-based services can even be integrated to target subscribers with location-sensitive streaming content such
as audio jingles promoting offers at retail outlets in the vicinity or movie trailers for films showing at the nearest theater.
The same handset vendors also have produced a new generation of cell phones that enable users to send pictures from one
device to another. The Nokia 9300, Samsung SCH-1730, Sony Ericsson T300, and Treo G650 all have built-in digital cameras.
These and a number of other cell phones can send and receive pictures through their MMP (multimedia messaging protocol)
capabilities. In addition, GPS is available on the iPaq hw9320.
As 3G handsets hit the market, mobile devices will begin to support the downloading and real-time playback of audio and
video clips. The U.S.based Packet Video Corporation (packetvideo.com) is a pioneer in this area. The company already has
demonstrated its new mobile-media software on Nokias EG2 and 9300 phones. This software enables content to be captured by
the mobile phone, viewed via streaming video, and shared via messaging and e-mail. Users can utilize the software to encode
live video from the built-in device camera; stream favorite videos and other multimedia content across the wireless network to
the handset; view news, sports, music videos, movie trailers, and other content; download content to the mobile device for for-
warding to friends or storage for later retrieval; and view live cameras for travel, entertainment, security, and child or elderly
monitoring.
Providing location-based services requires the following location-based and network technologies:
GPS locator. A GPS locator is included in the mobile device to determine the location of the person carrying the mobile device.
Position-determining equipment (PDE). This equipment identifies the location of the mobile device (either through GPS or
by locating the nearest base station). The position information is sent to the mobile positioning center.
Mobile positioning center (MPC). The MPC is a server that manages the location information sent from the PDE.
Location-based technology. This technology consists of groups of servers that combine the position information with geographic-
and location-specific content to provide a service. For instance, location-based technology could present a list of addresses of
nearby restaurants based on the position of the caller, local street maps, and a directory of businesses organized by location.
Geographic content. Geographic content consists of streets, road maps, addresses, routes, landmarks, land usage, zip codes,
and the like. This information must be delivered in compressed form for fast distribution over wireless networks.
Location-specific content. Location-specific content is used in conjunction with the geographic content to provide the location
of particular services. Yellow-page directories showing the location of specific business and services exemplify this type of content.
The accompanying diagram shows how these technologies are used in conjunction with one another to deliver location-
based services.
GPS System
GPS
GPS Location
Handset Server
Cellular Phone Station
Internet
Service Contents
Center Center
Source: MapInfo Corporation. MapInfo EnvinsaTM mapinfo.com/industries/mobile (accessed June 2003). Used
with permission.
The Problem
Buses in certain parts of San Francisco have difficulty keeping up with the posted schedule, especially during rush hours.
Generally, buses are scheduled to arrive every 20 minutes, but at times passengers may have to wait 30 to 40 minutes. The
scheduled times become meaningless and passengers are unhappy because they waste time.
The Solution
San Francisco bus riders carrying an Internet-enabled wireless device, such as a cell phone or PDA, can quickly find out when a
bus is likely to arrive at a particular bus stop. The NextBus (nextbus.com) system tracks public transportation buses in real time.
Knowing where each bus is and factoring in traffic patterns and weather reports, NextBus calculates the estimated arrival time of
the bus to each bus stop on the route. Arrival times also are displayed on the Internet and on a public screen at each bus stop.
The NextBus system has been used successfully in several other cities around the United States, in Finland, and in several
other countries. The exhibit below shows how the NextBus system works. The core of the NextBus system is the set of GPS
satellites that let the NextBus information center know where a bus is located. Based on a buss location, the scheduled arrival
time at each stop can be calculated.
Currently, NextBus is an ad-free customer service, but in the near future advertising may be added. Because the system
knows exactly where riders are when they request information and how much time they have until their next bus, in the future,
the system may send riders to the nearest Starbucks for a cup of coffee, giving them an electronic discount coupon.
The Results
Passengers in San Francisco are happy with the system; worries about missing the bus are diminished. A similar system is used
in rural areas in Finland, where buses are infrequent and the winters are very cold; passengers can stay in a warm coffeehouse
not far from the bus stop rather than wait in the cold for a bus that may be an hour late. A bus company can also use the sys-
tem to improve scheduling, arrange for extra buses when needed, and improve its operations.
Information Center
1001010
World
Transit Wide Web
Management
Information
Wireless Phone
and Mobile Devices
Pole Signs
Source: Used with permission of NextBus Information Systems, Inc. Copyright 2005.
Chapter Nine: Mobile Computing and Commerce and Pervasive Computing 13
OnStar is a subscription-based communication, monitoring, and tracking service for safety and security operated by General
Motors (onstar.com). As of 2005, it is a standard feature for several General Motors vehicles, and it will be standard on all new
GM vehicles sold in North America by 2007. It also is available on the Acura RL and MDX. Other manufacturers offering OnStar
include Audi, Subaru, and Volkswagen. The service is available for all vehicles that have the factory-installed OnStar hardware.
The service consists of both communication through mobile phone networks and tracking by GPS technology. Drivers and
passengers can use its audio interface to contact OnStar representatives for concierge-like and emergency services that can
initiate an action when vehicle telemetry indicates an emergency (for instance airbag deployment). OnStars innovative three-
button system offers:
24-hour access to expertly trained, caring advisors
A connection to emergency assistance
Access to OnStar Hands-Free Calling
When a driver presses the red OnStar Emergency button or blue OnStar button, current vehicle data and the users GPS
location are immediately gathered. This information is then sent to OnStar. OnStar Emergency calls are routed to the OnStar
Center with the highest priority. As of 2006, three OnStar centers existed, located in Michigan, North Carolina, and Toronto.
SIM-BASED AUTHENTICATION
GSM and its 2.5G and 3.0G counterparts all include a subscriber identification module.
This module is usually implemented as a smart card that contains an authentication key
along with other vital information about the subscriber. The authentication key also is stored
on a home location registry, which can be thought of as a database that is part of the mobile
network. When the phone is turned on, the user is asked to enter a PIN number. This pro-
tects the cell phone against illegal use if it happens to be stolen or lost. If the PIN is correct,
the cell phone and the network engage in a challenge-response process of authentication. A
network authentication center sends a random number to the cell phones SIM. The SIM
computes a signed response by combining the random number with its authentication key.
The signed response is sent over the network to the authentication center, which performs
the same computation using a copy of the authentication key stored on the home-location
registry. If the signed response matches the value computed by the authentication center,
then the cell phone is authenticated. After that, communication takes place through sym-
metric encryption, using a key generated by both the authentication center and the SIM.
Although SIM cards protect against unauthorized use of a particular subscribers
account, they do not prevent the use of a stolen cell phone. If a thief steals a phone, the thief
can simply replace the existing SIM card with another one and sell it on the open market.
The police in Amsterdam employed an interesting method to thwart this practice. Using a
cell phones International Mobile Equipment Identity number, the police are able to track
down the mobile phone number being used on the stolen phone. Once the number is known,
the police employ a special computer program to send out an SMS message to the stolen
phone every 3 minutes. The message reads, This handset was nicked [stolen]; buying or
selling it is a crime. The Police. Obviously, this makes the stolen phone a lot less attractive to
prospective buyers (Evers 2001).
Chapter Nine: Mobile Computing and Commerce and Pervasive Computing 15
Pervasive Ubiquitous
High computing computing
Degree of
Embeddedness
Desktop Mobile
Low computing computing
Low High
Degree of Mobility
Source: Lyytinen, K., and Y. Yoo Issues and Challenges in Ubiquitous Computing. Communications of the
ACM 45, no. 12 (2002): 6365. 2002 ACM, Inc. Used with permission.
16 Part 4: Other EC Models and Applications
Being invisible is only one of the properties of pervasive computing. The following is a short list of its major characteristics
(Amor 2001):
Invisible devices. Numerous and casually accessible, these devices often are invisible.
Embedded microchips. Microchip intelligence is embedded into everyday devices and objects.
Always on. Users have continuous access to information, entertainment, and communication with anyone, anytime, anywhere.
Pervasive network. Everyone and everything is connected to an increasingly pervasive network structure.
Life-enhancing applications. The technology will penetrate the mainstream mass market through a variety of life-enhancing
applications.
Consumer-centric solutions. The technology offers gadgetry for simple and practical consumer-centric solutions.
Increasing productivity. The technology offers mainstream-market value propositions that enable consumers to save time or
money and enhance leisure and entertainment.
Long-term vision. In the long-term, the technology will enable people to work, live, and play more effectively.
As the list suggests, three major technical requirements underlie pervasive computing. First, everyday objects will have to
contain embedded microprocessors. Second, a pervasive network is needed to connect these microprocessors. Finally, the micro-
processors must be able to communicate with the pervasive network. The day when these technical requirements all meet is not
that far off.
According to Harbor Research (Edgington 2001), approximately 5 billion microprocessors were sold in 2000, and only
120 million of them (roughly 2.5 percent) were intended for PCs. It is estimated that in 5 years, the number of processors in
the average home could grow from 40 to 280, the number of processors in the average car (now about 20) will increase sub-
stantially over the same time period, and the number of embedded chips sold to support increasingly intelligent devices could
grow to over 9 billion (Edgington 2001). Intelligence and connectivity will be designed into almost every electronic device. The
pervasive network environment over which these devices will communicate will, for the foreseeable future, be the Internet.
The way in which embedded devices will attach to or communicate with the Internet will vary. Some will be wired into the
Internetthrough broadband or dial-upin the same way that the average desktop computer is connected. Others will con-
nect through mobile or wireless networks in the same way that a cellular phone does. Finally, others, such as the RFID tags
used by Prada, will link in through small antennas that can send and receive messages in a wireless environment (e.g., Wi-Fi or
Bluetooth).
Like most areas of new technological development, pervasive computing has been accompanied by a great deal of hype. In
the last few years, people have talked about refrigerators that can tell a person when to order milk, TVs that provide entertain-
ment on demand, gas pumps with Web connections, and a whole array of amazing gadgets. For instance, 3COM promoted
Audrey, a small, wireless Internet appliance for the entire family. This tablet-like device offered e-mail, Web access, and calen-
daring. Despite a $20-million marketing campaign, Audrey was a resounding flop that was pulled from the market. The same has
been true for most of the other ideas that cropped up during the dot-com heyday. Instead of looking at solutions to problems,
many manufacturers have focused on connectivity as an end in itself, and so have not yet produced commercially successful
products.
Context Server
Preferences and
Permission Profile Wired LAN Wireless
LAN
Content
Servers
(continued)
20 Part 4: Other EC Models and Applications
RFID in health care. IBM developed a system to prevent counterfeiting of drugs. The tags are attached to the drug containers.
MedTrack offers inventory tracking for hospitals. Next GENeSYS specializes in e-pharmacy and RFID. An RFID chip with patient
information (called SurgiChip) that will go with a patient into surgery (to help prevent errors) has been approved by the FDA.
RFIDs are also used for patient identification in hospitals.
Bookseller boosts sales. A Dutch book seller (Boekhandels Group) tags all books in its stores. Time spent taking inventory has
been reduced from 4 minutes per box to just seconds. Misplaced books are found quickly. The system also links to in-store
kiosks. Sales have increased by 12 percent.
Protecting secure areas. FedEx uses RFID-tagged wristbands to give drivers access to their vehicles, reducing theft and speed-
ing delivery time. The New York Police Department uses RFID tags embedded in ID tags to track visitors.
Improving supply chains. This is probably one of the most promising uses of RFID, as is illustrated in Chapter 7 and Fitzgerald
(2005).
Financial applications. RFID-embedded cell phones will soon replace your credit cards, cash, train passes, keys to your car and
home, business cards, and more (see Kharif 2006). DoCoMo of Japan introduced such a cell phone in 2004 (see Mann 2004).
A major privacy concern regarding the use of RFIDs is that when individual items are tagged and then taken by customers from
the store it will be possible to track the customers movement (i.e., remote surveillance). Some consumer advocates recommend
that RFID tags be removed before a sale is recorded. However, this increases the cost to the store. It is currently very difficult
to track customers with RFID-tagged merchandise because the RFID readers have a very limited range from which they can
be read.
Neumann and Weinstein (2006) reviewed the potential dangers of RFID to privacy and examined other RFID-related con-
cerns regarding data integrity, personal well-being, and privacy. They claim that RFID tags may be counterfeited, duplicated,
swapped, damaged, intentionally disabled, or otherwise misused. The encryption protocols may be weak. In addition to the tags
themselves, their supporting databases can be misused, providing an opportunity for identity theft, fraud, harassment, and
blackmail. All these must be considered prior to implementation of an RFID system. For an RFID failure story, see Reda (2004).
RFID vendors already include a number of security features designed to address issues of consumer privacy. For example:
In most applications, RFID safety tags placed on cargo pallets or ID cards contain nothing more than a unique identifying num-
ber, much like a license plate on a car. Sensitive information is maintained in a separate database and protected by firewalls
and other security features.
To guard against unauthorized access, transmissions between RFID readers and safety tags can be protected by encryption and
authentication protocols. Generally, transmissions between an RFID reader and a back-end database also are encrypted to pro-
tect confidential and personal information.
Numerous states have pending legislation regarding privacy issues about RFID tags in retail goods. Most legislation is
RFID right to know. Such legislation requires disclosure of the use of RFID devices and personal information that is
gathered; labeling of retail products or packages containing RFID tags; point-of-sale removal of RFID tags; restrictions on
the aggregation and disclosure of personal information; and provisions for enforcement by a legal agency (RFID Public
Information Center, 2006).
Smart Appliances
One of the key components of the smart home initiative is the smart appliance, an Internet-ready appliance that can be con-
trolled by a small handheld device or desktop computer via a home intranet or the Internet.
One organization that is setting standards for smart appliances is the Internet Home Alliance (caba.org/iha). The alliances
mission is to accelerate the process of researching, developing, and testing new home products and services that require a
broadband or persistent connection to the Internet.
Appliance companies also are interested in capturing more information about the service life of the appliances they manu-
facture. In most cases, when an appliance is purchased and taken home, the manufacturer loses touch with the appliance
unless the customer registers the product for warranty purposes. A networked appliance potentially could provide the manufac-
turer, as well as the owner of the appliance, with information that could be used to monitor the appliances operation, perfor-
mance, and usage. In addition, the networked appliance could provide information for diagnostic purposes, such as for repairs
and troubleshooting (Lai 2006).
To date, however, consumers have shown little interest in smart appliances. As a result, manufacturers of these appliances
are focusing on improving peoples lives by eliminating repetitive, low-attention tasks.
Whether offerings of this sort will prove any more successful than the earlier generations of smart appliances is an open
question. In the near term, one of the biggest technical barriers to widespread adoption of smart appliances will continue to be
the fact that most homes lack a broadband connection to the Internet. The following example describes the commercial use of
smart appliances.
Imagine hooking up your washer and dryer to the Internet. To most homeowners, this would make as much sense as net-
working their refrigerators or microwaves. But what about hooking up washers and dryers in a laundromat? Would the payoff or
acceptance be any greater? For a few Internet laundry companies, the answer is yes.
USA Technologies (usatech.com) has teamed up with IBM to create a system called eSuds.net that eliminates a number of
the hassles and tedium associated with doing laundry. The system was tested at Boston College in 2002 and is currently avail-
able at Carnegie Mellon University, Cedarville University, and others. eSuds.net provides students with the following services:
Coin-free transaction options. Washing and drying can be paid for with a student ID or PIN card and charged to the students
account.
E-mail cell phone, PDA, or pager notification. When the washing or drying is done, the system notifies the student. Students
also can request notification when a specific washer and/or dryer becomes available.
A virtual view of the laundry room. Students can access a Web site that indicates which machines are available and the
status of each machine (i.e., number of minutes remaining).
Detergent and fabric softener injectables. Students do not need to provide detergent or fabric softener. These can be
purchased as part of the washing/drying service and injected directly from the machines into the students wash.
The e-Suds.net system also eliminates a number of the maintenance headaches encountered by the owner and operator of
a laundromat. With e-Suds.net, the laundromat operator can conduct virtually coin-free transactions (eliminating jammed
machines and reducing vandalism), monitor machine usage and performance, and service machines on an as-needed basis,
reducing service costs and machine down time. In addition, operators can better control costs by holding service employees
accountable for cash and inventory and can boost revenue by selling injected detergent and fabric softener as part of a wash.
Washing machine manufacturers are now offering similar services. Wash Alert (marketed by Alliance Laundry Systems for
Speed Queen machines) is being used at the Illinois Institute of Technology, Ohio University, and Ball State University.
LaundryView (marketed by Mac-Gray for Maytag machines) is being used at the University of Massachusetts and Morgan State
University (see a demonstration at demo.laundryview.com). All three companies are planning to market their systems to large
apartment complexes, a much larger but not as technologically sophisticated, market.
Some in the industry are skeptical as to just how successful these programs can be. They wonder, for example: What real,
perceivable benefits will the technology provide? Will consumers see smart washing machines as a justification for price
increases? According to Bonnema (2004), it has to be a benefit beyond the gee whiz factor that were seeing today.
Smart Clothes
Wearable computer devices were discussed in Section 9.6. In those examples, mobile computing devices were attached to cloth-
ing and safety gear. But what happens when computing technology is embedded in clothing?
One technique to make clothes smarter is to use RFID. For example, RFID tags are attached to clothing items for sale at
Pradas Epicenter stores in New York, San Francisco, and Los Angeles (Duan 2002). If a customer wants to know about a particu-
lar item, she can take the item toward one of the displays in the store. The RFID reader installed in the display automatically
reads the ID information on the tag and provides sketches, video clips of models wearing the item, and information about the
item (color, cut, fabric, materials, and availability). If a customer takes a garment into one of the dressing rooms, the tag is
(continued)
24 Part 4: Other EC Models and Applications
automatically scanned and, again, information about the item will be displayed on an interactive touch screen in the dressing
room. The dressing rooms also have a video-based Magic Mirror. When the customer tries on the garment and turns around in
front of the mirror, images are captured and played back in slow motion. Incidentally, RFID tags attached to clothes can be
washed, ironed, and pressed (ITWorld.com 2006).
A similar application of RFID technology in clothes is on display at the Microsoft Home, a demonstration home in
Redmond, Washington. An RFID tag in a shirt can be read by a smart mirror and complementary ties and pants in the
wardrobe are identified. For children, the suitability of the item for a school dress code or a parental code can be displayed. On
laundry day, the tag provides cleaning instructions (Barron 2004).
Other initiatives are embedding the technology in the clothes rather than simply putting an RFID tag on the item. A wire-
less jacket from German clothier Rosner GmbH includes an MP3 player and hands-free cell phone with headphones and a micro-
phone built into the collar and a fabric control panel on the left sleeve. Other ideas recently introduced or under development
include smart socks (conductive wire in wool socks to warm up cold toes), electrotextiles (antennas sewn into soldiers vests for
communication), and body-sensing fabrics (a cotton T-shirt that can monitor the wearers heart rate, body temperature, and
other vital signs) (Eisenberg 2003).