Blunder Dome Sighting  
privacy 
 
 
 

Hangout for experimental confirmation and demonstration of software, computing, and networking. The exercises don't always work out. The professor is a bumbler and the laboratory assistant is a skanky dufus.



Click for Blog Feed
Blog Feed

Recent Items
 
Republishing before Silence
 
Command Line Utilities: What Would Purr Do?
 
Retiring InfoNuovo.com
 
Confirmable Experience: What a Wideness Gains
 
Confirmable Experience: Consider the Real World
 
Cybersmith: IE 8.0 Mitigation #1: Site-wide Compat...
 
DMware: OK, What's CMIS Exactly?
 
Document Interoperability: The Web Lesson
 
Cybersmith: The IE 8.0 Disruption
 
Cybersmith: The Confirmability of Confirmable Expe...

This page is powered by Blogger. Isn't yours?
  

Locations of visitors to this site
visits to Orcmid's Lair pages

The nfoCentrale Blog Conclave
 
Millennia Antica: The Kiln Sitter's Diary
 
nfoWorks: Pursuing Harmony
 
Numbering Peano
 
Orcmid's Lair
 
Orcmid's Live Hideout
 
Prof. von Clueless in the Blunder Dome
 
Spanner Wingnut's Muddleware Lab (experimental)

nfoCentrale Associated Sites
 
DMA: The Document Management Alliance
 
DMware: Document Management Interoperability Exchange
 
Millennia Antica Pottery
 
The Miser Project
 
nfoCentrale: the Anchor Site
 
nfoWare: Information Processing Technology
 
nfoWorks: Tools for Document Interoperability
 
NuovoDoc: Design for Document System Interoperability
 
ODMA Interoperability Exchange
 
Orcmid's Lair
 
TROST: Open-System Trustworthiness

2005-07-02

 

Is Distributed Trustworthiness Soup Yet?

ACM News Service: T-Engine – Japan’s Ubiquitous Computing Architecture Is Ready for Prime Time.  Out of Japan’s T-Engine Forum arrives a scaled hardware/software platform for ubiquitous computing.  T-Engines scale from standard (phone and PIM sized) through Micro (home appliances) to Nano (small electronics) to Pico (valves, switches, maybe smart RFIDs).

The promises of the standardized and licensed family include software resource distribution and tamper-proof network security.  The T-Kernel operating system is a carefully standardized and normalized derivative of ITRON, a real-time embedded-system OS in turn based on the TRON Project (including eTRON security, based on a secure digital-entity and identity scheme).  Although there is reference to an open-source T-Kernel, the license for the source code is compatible with neither the GPL nor the broader Open Source Definition. Redistribution is seriously constrained in favor of preserving code reusability atop T-Kernel implementations.

What caught my eye in the blurb is the reliance on ucode, a tagging system that appears to rely on a centralized database system of the Ubiquitous ID (UID) Center and Ubiquitous Communicator functions.  There are documents on uID and its relationship with eTRON worthy of exploring further.  I tend to seek decentralized distributed systems, such as P2P overlays, that provide some degree of secure entity identification.  I am not sure this model fits, though it certainly works with product identification in the manner of RFID tagging.

Jan Krikke’s June 2005 IEEE Pervasive Computing article on the subject is available on-line as a downloadable PDF [one that seems to crash Acrobat on my computer].

{tags: }

 
Construction Structure (Hard Hat Area) You are navigating Orcmid's Lair.

template created 2004-06-17-20:01 -0700 (pdt) by orcmid
$$Author: Orcmid $
$$Date: 10-04-30 22:33 $
$$Revision: 21 $