Home
2008:
January
February
March
April
May
June
July
August
2007:
January
February
March
April
May
June
July
August
September
October
November
December
2006:
January
February
March
April
May
June
July
August
September
October
November
December
2005:
January
February
March
April
May
June
July
August
September
October
November
December
2004:
January
February
March
April
May
June
July
August
September
October
November
December
2003:
January
February
March
April
May
June
July
August
September
October
November
December
2002:
January
February
March
April
May
June
July
August
September
October
November
December
2001:
January
February
March
April
May
June
July
August
September
October
November
December
2000:
April
May
June
July
August
September
October
November
December

(keitai-l) Clossing Walled Gardens and Java vs. NativeApplications - And Sun JINI??

From: Giovanni Bertani <giovanni.bertani_at_exsense.com>
Date: 05/14/03
Message-Id: <F38585CC-85F1-11D7-A80D-003065BA6D3A_at_exsense.com>
Sorry Jon if I abuse of your "sun.com" suffix.  ;-)

There is any plan at SUN for any Jini integration with mobile phones?

By reading Sun.com faq:

"Jini is a network architecture for the construction of distributed
systems where scale, rate of change and complexity of interactions
within and between networks are extremely important and cannot
be satisfactorily addressed by existing technologies. Jini
technology provides a flexible infrastructure for delivering
services in a network and for creating spontaneous
interactions between clients that use these services
regardless of their hardware or software implementations."

Looks like a technology perfectly suited for heterogeneous
network technologies connections, hardware devices
and software running the applications.

Cheers

Giovanni


Mercoled=EC, 14 mag 2003, alle 04:15 Europe/Rome, Jon Ellis ha scritto:

>
> Shawn wrote:
>>
>> Ok MIDP 2.0 will still run things in a sandbox if they =
are"untrusted".
>> Public Key Infrastructure (PKI)  is utilized by MIDP 2.0 to provide=20=

>> secure
>> connections and digital signatures for "trusted" MIDP application=20
>> packages
>> (also known as MIDlets).
>
> This is probably an abuse of the term "sandbox", all
> byte-code is executed in a sandbox. It would probably be
> clear to say that a MIDP 2.0 midlet that is trusted runs
> with a less prohibitive security policy. Which is exactly
> what you describe :-)
>
> j.
>
>
> This mail was sent to address giovanni.bertani_at_exsense.com
> Need archives? How to unsubscribe? http://www.appelsiini.net/keitai-l/
>
Received on Wed May 14 12:55:57 2003