TITLE

the MMS interoperability challenge

AUTHOR(S)
Wickham, Rhonda
PUB. DATE
August 2003
SOURCE
Wireless Week;8/15/2003, Vol. 9 Issue 17, p26
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
Focuses on standardizing multimedia messaging services (MMS) interoperability. Characteristics of the MMS Interoperability Release 4 standards; Companies involved in the Multimedia Messaging Service Center vendor space; Challenges facing MMS interoperability; Technical requirements for network interoperability that were resolved; Details on the MMS message process.
ACCESSION #
10584450

 

Related Articles

  • Competition's Final Obstacle. Meyers, Jason // Wireless Review;Sep2003, Vol. 20 Issue 9, p9 

    Comments on the arrival of local number portability (LNP) in the wireless communications industry. Challenges posed by the imminence of wireless LNP to the business of mobile carriers; Action taken by carriers in response to wireless LNP.

  • AODV-HM: A Hybrid Mesh Ad-hoc On-demand Distance Vector Routing Protocol. Pirzada, Asad Amir; Portmann, Marius; Indulska, Jadwiga // Journal of Research & Practice in Information Technology;2009, Vol. 41 Issue 1, p65 

    Wireless Mesh Networks (WMNs) have recently gained increasing attention and have emerged as a technology with great potential for a wide range of applications. WMNs can be considered as a superset of traditional mobile ad-hoc networks (MANETs), where the network is comprised of mobile client...

  • UMA/GAN CAPABILITIES ENABLING FIXED MOBILE CONVERGENCE. Medo, Phil // Electronics World;Mar2008, Vol. 114 Issue 1863, p26 

    The article provides background information on generic access networks (GAN) and unlicensed mobile access (UMA) and their applications in enabling fixed mobile convergence in mobile communications. GAN and UMA will allow consumers to use a single handset for their office, mobile and home...

  • Seamless Handover For Unidirectional Broadcast Access Networks In Mobile IPv6. Miloucheva, Ilka; Mödeker, Jens; Jonas, Karl; Hetzer, Dirk // Journal of Communications;Nov2007, Vol. 2 Issue 6, p46 

    Mechanisms and protocol interactions for seamless handover of mobile multicast/broadcast services using unidirectional access networks in heterogeneous Mobile IP infrastructures are discussed and proposed. QoS based applications, such as content delivery, mobile TV, carousel and reliable...

  • LOCATION TRACKING USING DIFFERENTIAL RANGE MEASUREMENTS. Edwards, G.; Jayne, R. // International Journal of Computers & Applications;2005, Vol. 27 Issue 3, p199 

    Automatic vehicle location and automatic vehicle monitoring systems were developed originally to track fleet vehicles such as bus lines, truck lines, taxicabs, police patrol cars, and delivery vehicles. In a bus system, individuals known as "point men" were situated at certain places in the bus...

  • Personalization: Bigger Than Games? Smith, Brad // Wireless Week;1/15/2004, Vol. 10 Issue 2, p15 

    Focuses on the personalization trend in the wireless industry. Outlook of Jason Devitt, CEO of Vindigo Studios, on the trend; Overview of the personalization features; Features of the SmartSkin technology developed by Wildseed.

  • Investigating mobile wireless technology adoption: An extension of the technology acceptance model. Kim, Sanghyun; Garrison, Gary // Information Systems Frontiers;Jul2009, Vol. 11 Issue 3, p323 

    This research represents a theoretical extension of the Technology Acceptance Model (TAM), which IS researchers have used to explain technologies’ perceived usefulness and individuals intention to use it. The authors developed a model, referred to as the Mobile Wireless Technology...

  • A Little Q and A.  // PS: Preventive Maintenance Monthly;Jul2005, Issue 632, p40 

    Presents a comic strip featuring a question and answer advisory regarding the new AN/PRC-127EF handheld squad radio.

  • Should firms strictly control employee use of mobile devices? Yes. Lowenstein, Mark // Network World;8/1/2005, Vol. 22 Issue 30, p35 

    Argues that companies should control employees' use of mobile devices. Threats to the security of company data posed by cellular telephones and other mobile devices; Need for businesses to establish a mobile device management policy within the work area; Factors that should be considered by...

Share

Read the Article

Courtesy of NEW JERSEY STATE LIBRARY

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics