This article Thoughts on IPv6 Day (By James Seng) discusses the proposal to have a national IPv6 Flag Day where all Internet machines switch over to mandated support of IPv6. It is a good summary of the arguments of why this is not such a good idea just now. However, James is still advocating the deployment of IPv6 especially to enable p2p end-to-end applications and services. If we can demonstrate a certain level of IPv6 penetration, and good hardware support in routers, the switch over could be closer than we think.
A group of six of us TSSG folks (Willie Donnelly, Mícheál Ó Foghlú, Miguel ponce de Leon, Kevin Doolin, Chris Chedgey, John Ronan, and Micheál Crotty) are here in The Hauge at the IST Event 2004 (Mon 15th November to Wednesday 17th November 2004) .
The TSSG have three demonstrations on two stands in the exhibition, and a number of contributions to Networking Sessions as well as planned formal and informal meetings:
F4.3 Touching Mobile Research
TSSG & Testbed Botnia
W4.1 Towards matching e-Europe 2005: IPv6, Broadband and 3G' IPv6 Cluster & 6POWER [6POWER]
IPv6 Cluster: SEINIT & Daidalos project controbutions from the TSSG
N16
Towards a global dependability and security framework in WP 2005-2006: paving the way for FP7
N26
Emerging security technologies
N70
LivingLabs - making technology relevant!
John Battelle presents an excellent scenarion for how mobile devices and shopping can be integrated: John Battelle's Searchblog: The Transparent (Shopping) Society. The article also highlights what appraoches are addressing different aspects of the problem of developing solution for this scenario.
In an interesting article on InfoWorld Telcos' convergence strategies diverge Peter Sayer argues that BT has more flexibility in their approach as they do not have a mobile arm to support, and this may lead to innovative new services. He describes the idea of a mobile handset that can make calls via a wireline connection in preference to GSM (using bluetooth to create a local network) and thus save the customer money. They call this a "Bluephone".
I have just read up on XML Security: Control information access with XACML
by Manish Verma of Second Foundation. One of our MSc students, Mike White, is working on applying these techniques to an integrated Smart Space management system we're specifying and developing in the TSSG. It looks very interesting.