Welcome!

Bill Ray

Subscribe to Bill Ray: eMailAlertsEmail Alerts
Get Bill Ray via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Top Stories by Bill Ray

In Part 1 of this series (JDJ, Vol. 7, issue 6), I showed how I developed an MP3 player in Java, and then added the ability to control that player from a wireless handheld device using a PersonalJava application. While I could only stop, pause, adjust the volume, and select the next track to be played, I still found the application useful, but not yet perfect... The first problem to be addressed was the combinations you can get when listening to your entire music collection at random. When a nice relaxing Enya track fades out and you find yourself launching into the world of Eminem, the shock can be considerable, not to mention that sometimes I'm just not in the mood for Aztec Camera...but have no preference beyond that. So, some sort of weighting is needed. My next problem was the networking side of things. Wireless Ethernet is nice, but not ideal on the iPaq. In ad... (more)

21st Century Wireless Tools: Working in a Networked World…

Companies are always risking their business, betting on what will be happening next year, and how they can make money out of it. The trick is to get it right. We all know that we work in a fast-moving industry. Even before wireless communications raced ahead, the IT field was already moving too quickly for most industry commentators - fast enough in fact to make a fool of anyone rash enough to try to predict future developments. From the famous IBM statement that the total world market for computers amounted to no more than 20 units, to Bill Gates saying that no one could ever... (more)

Playing the Smart Card

Cryptography is a wonderful thing. Long keys and well-designed algorithms mean that even the most determined government is unlikely to be able to break your encrypted messages. However, every encryption system has one weak point: Where and how do you store your keys? Most encryption software will store your keys on your hard disk (if your device has one) or somewhere safe in memory, carefully encrypted so no one can read it. But the problem with this approach is that it denotes trust in the operating system, and secure applications frequently have to live in the most hostile of e... (more)

Q & A: Sun's New Testing Tool for OEMs and Java Service ProvidersNew product will ensure the quality of Java devices by testing

(February 28, 2003) - Bill Ray, editor-in-chief of Wireless Business & Technology, talks to Eric Chu, Group Marketing Manager, J2ME Platform, Sun Microsystems, Inc., about the recently announced Java Device Test Suite. WBT: Who will the test suite be made available to? Licensees, operators? It would be really good for someone like O2 to have access to such tests. Chu: Both: the test suite will be made available to any Java (CLDC/MIDP) Device manufacturers and operators launching Java-based services. WBT: How much will the test suite cost? Chu: This product will be priced to provide ... (more)

Games Without Frontiers

The games industry is a horrible place to find yourself, long hours working on projects that might just be the next big thing, but probably won't be. Very little recognition and not much money for the developers who can spend several years working on the same title, only to have the project pulled when a competitor comes out with something too similar or the customer's insane demands go too far. But the rewards can be huge, the market is obvious, and the revenue streams established, so it's no great surprise that the wireless world is poised to enter the games business with a ven... (more)