To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
The i-mode™ ecosystem brings together skills, creativity, and resources in a vast range of fields and industries, in everything from content creation to phone manufacturing and service provision … What role does DoCoMo play in the i-mode ecosystem? We are a player, not a dominant force. If we were, for example, a carnivore that devoured all the herbivores, or a herbivore that ate all the plant life, the ecosystem balance would be lost and we too would fall into ruin.
(Natsuno, 2003)
As the largest wireless carrier in Japan when the original mobile app store, i-mode, was introduced in 1999, NTT DoCoMo's description of itself as just another player in i-mode's ecosystem is a bit disingenuous. DoCoMo was undeniably the dominant force behind i-mode. It is true, however, that in creating a new mobile content and service platform, DoCoMo deliberately resisted devouring all the revenue in sight. The DoCoMo business model allowed i-mode content and application providers to keep an unprecedented 91 percent share of the application revenue generated by i-mode subscribers. In addition, DoCoMo provided direct billing to its subscribers for all i-mode content, relieving content partners of the need to handle financial transactions. These business decisions made the ecosystem attractive to very small participants as well as to partners with well-established brands. Compared to the terms offered to application developers and content partners by wireless carriers in the USA and Europe at that time, DoCoMo's wireless data strategy was structured to encourage and reward widespread partner participation and innovation.
Attached to almost every house, apartment building, and office complex in the United States is a familiar and rather homely device. Inside its glass cover, a counter ticks off the kilowatts as the meter measures and records the amount of energy consumed by kitchen appliances, air conditioners, computers, light bulbs, and other electrically-powered devices inside the premises. For more than a hundred years the basic electric meter design focused on this mission of accurate measurement, providing utility companies with a reliable record of electricity usage that could be turned into a monthly bill for each customer.
When meters finally entered the digital age during the 1990s, the priority for utilities was automating the time-consuming and costly process of meter reading rather than giving their customers more information about their power usage. The possibility that the humble electric meter could cooperate with the average residential consumer in managing peak energy demand cycles and avoiding brown-outs was, at best, a far-fetched vision for the distant future. To the extent that records of monthly electric power consumption at the residential level were used to forecast future demand and power-generation needs, the utility's strategy was straightforward. The electric utilities simply planned for continued year-over-year increases in energy consumption. The historical data for electric power demand in the United States certainly supported the assumption that consumption and demand would continue to increase; according to the Department of Energy (DoE), the demand for power rose almost 30 percent between 1988 and 1998 (US Department of Energy, 2008a).
Approaching wireless Internet security from the position of system architecture, this text describes the cryptographic and protocol-based tools for Internet security with a focus on understanding the system architecture of existing Internet security, and on developing architectural changes for new security services. Introducing the topics of security threats in wireless networks, security services for countering those threats, and the process of defining functional architecture for network systems, the author also discusses examples of wireless Internet security systems such as wireless network access control, local IP subnet configuration and address resolution, and location privacy. Each chapter describes the basic network architecture and protocols for the system under consideration, the security threats faced, a functional architecture, and the important Internet protocols that implement the architecture. This is an ideal resource for graduate students of electrical engineering and computer science, as well as for engineers and system architects in the wireless network industry.
This updated textbook is an excellent way to introduce probability and information theory to new students in mathematics, computer science, engineering, statistics, economics, or business studies. Only requiring knowledge of basic calculus, it starts by building a clear and systematic foundation to the subject: the concept of probability is given particular attention via a simplified discussion of measures on Boolean algebras. The theoretical ideas are then applied to practical areas such as statistical inference, random walks, statistical mechanics and communications modelling. Topics covered include discrete and continuous random variables, entropy and mutual information, maximum entropy methods, the central limit theorem and the coding and transmission of information, and added for this new edition is material on Markov chains and their entropy. Lots of examples and exercises are included to illustrate how to use the theory in a wide range of applications, with detailed solutions to most exercises available online for instructors.
Optical Switching Networks describes all the major switching paradigms developed for modern optical networks, discussing their operation, advantages, disadvantages and implementation. Following a review of the evolution of optical WDM networks, an overview of the future trends out. The latest developments in optical access, local, metropolitan, and wide area networks are covered, including detailed technical descriptions of generalized multiprotocol label switching, waveband switching, photonic slot routing, optical flow, burst and packet switching. The convergence of optical and wireless access networks is also discussed, as are the IEEE 802.17 Resilient Packet Ring and IEEE 802.3ah Ethernet passive optical network standards and their WDM upgraded derivatives. The feasibility, challenges and potential of next-generation optical networks are described in a survey of state-of-the-art optical networking testbeds. Animations showing how the key optical switching techniques work are available via the web, as are lecture slides (www.cambridge.org/9780521868006).
Ensuring secure transmission and good quality of service (QoS) in ad hoc wireless networks are key commercial concerns. Focusing on practical potential solutions, this text covers security and QoS in these networks. Starting with a review of the basic principles of ad hoc wireless networking, coverage progresses to vulnerabilities, and the requirements and solutions necessary to tackle them. QoS in relation to ad hoc networks is covered in detail, with specific attention to routing, QoS support in unicast communication, and recent developments in the area. Secure routing, intrusion detection, security in WiMax networks and trust management are also covered, the latter being based on principles and practice of key management and authentication in distributed networks. Representing the state-of-the-art in ad hoc wireless network security, this book is a valuable resource for researchers in electrical and computer engineering, as well as practitioners in the wireless communications industry.
One of the most promising technologies to resolve the bottlenecks in traffic capacity of future wireless networks is multiple-input multiple-output (MIMO) communications and space-time processing. MIMO wireless technology has progressed from the stage of fundamental research to commercially available products within a decade. With over sixty contributors from the field, this book provides an extensive overview of the state-of-the-art in MIMO communications, ranging from its roots in antenna array processing to advanced cellular communication systems. A balanced treatment of three key areas -information theory, algorithms and systems studies, and implementation issues - has been assembled by four editors with a broad range of academic and industry experience. This comprehensive reference will appeal to practitioners, researchers, and graduate students in wireless communications.
The advent of fiber optic transmission systems and wavelength division multiplexing (WDM) have led to a dramatic increase in the usable bandwidth of single fiber systems. This book provides detailed coverage of survivability (dealing with the risk of losing large volumes of traffic data due to a failure of a node or a single fiber span) and traffic grooming (managing the increased complexity of smaller user requests over high capacity data pipes), both of which are key issues in modern optical networks. A framework is developed to deal with these problems in wide-area networks, where the topology used to service various high-bandwidth (but still small in relation to the capacity of the fiber) systems evolves toward making use of a general mesh. Effective solutions, exploiting complex optimization techniques, and heuristic methods are presented to keep network problems tractable. Newer networking technologies and efficient design methodologies are also described.
Many aspects of the internal and external workings of computers can be viewed as a series of communication processes. Communication complexity is the mathematical theory of such communication processes. It is also often used as an abstract model of other aspects of computation. This book surveys this mathematical theory, concentrating on the question of how much communication is necessary for any particular process. The first part of the book is devoted to the simple two-party model introduced by Yao in 1979, which is still the most widely studied model. The second part treats newer models developed to deal with more complicated communication processes. Finally, applications of these models, including computer networks, VLSI circuits, and data structures, are treated in the third part of the book. This is an essential resource for graduate students and researchers in theoretical computer science, circuits, networks and information theory.
People underestimate the value of what they do not know, and overestimate the value of what they do know.
(Bates 2005, p. 5)
Information has always been a source of power, but it is now increasingly a source of confusion. In every sphere of modern life, the chronic condition is a surfeit of information, poorly integrated or lost somewhere in the system.
(Wilensky 1968, p. 331)
Simply proposing more or better communication is the oldest consulting recommendation in the book – and no one today really needs more meetings.
(Cross et al. 2004, p. 67)
In this chapter I bring together my central themes and point to the future. A compelling feature of research on KN is that it stands at the intersection of so many important theoretical and policy issues such as the converging trends surrounding globalization and the “flattening” of our world; the increasing complexity and blurring boundaries represented in new organizational forms; difficult individual challenges selecting career paths and loyalty, or the lack thereof, on everyone's part, cited in Chapter 1. These trends lead to dilemmas, for both individuals and organizations, in the development and sharing of knowledge in KN.
I discussed the fundamental concepts, the building blocks of KN, in Chapters 2 and 3. In Chapter 2 I defined knowledge, distinguishing it from such common terms as information and wisdom. This chapter also discussed the various forms that knowledge can take within organizations, thus making critical distinctions that can be used in defining relationships.
The major downfall of the network approach is that they are such sparse social structures that it is difficult to see how they can account for what we observe.
(Fligstein and Mara-drita 1992, p. 20, quoted in Swedberg 1994, p. 270)
…the exact contribution of communication processes towards outcomes is often hard to assess, and the connection is more intuitive than demonstrated or empirically proven.
(Downs, Clampitt, and Pfeiffer 1988, p. 171)
…the chain of conditions between amount of communication in the workplace and outcomes such as satisfaction, effectiveness, or other effects may be quite lengthy.
(Zimmerman, Sypher, and Haas 1996, p. 200)
I will use productivity in its broadest sense here, focusing on the generation of wealth in organizations in a variety of forms entailing social as well as economic capital, which also suggests some degree of efficiency and of effectiveness. Since these terms are closely interrelated I will begin with some basic definitional issues. As the colon in the chapter title implies, productivity is a function of both effectiveness and efficiency, with the former term somewhat more difficult to define concretely.
Effectiveness details a desired outcome or result. It therefore implies some degree of rationality, intention, and purpose and could be closely associated in this sense with more functional approaches to organizations. It implies some martialing or matching of organizational outputs to particular goals that here I will discuss primarily in terms of contingency impacts and resource-based views of strategy.
In this and the following chapter on network analysis I will concentrate on building a foundation for what is to follow. I start this work by defining the key concepts associated with knowledge, drawing careful distinctions between them. Needless to say these terms are at times used interchangeably and at times are taken to be quite different things in the burgeoning literature in this area. I then move on to a discussion of various classifications of types of knowledge, starting with the foundational one between tacit and explicit knowledge. These types could serve as the starting point for the definition of relationships in network analysis, the most critical move in any project relating to it. Finally, in part to serve as counterpoint but also to focus on critical dilemmas and questions of balance in organizations, to which managerial judgment must be applied, I discuss ignorance and the positive role it plays in organizations.
What is knowledge?
Knowledge runs the gamut from data, to information, to wisdom, with a variety of distinctions being made between these terms in the literature. While there is a generally recognized ordering among these terms (see Figure 2.1), with wisdom having the least coverage of any of the sets in the figure, they are often used interchangeably and in conflicting ways in the literature, resulting in some confusion (Boahene and Ditsa 2003).