| | Copyright |
| | IBM Press |
| | | On Demand Computing Books |
| | | WebSphere Books |
| | | More Books from IBM Press |
| | | DB2® Books |
| | Foreword |
| | Preface |
| | | Overview |
| | | Intended Audience |
| | | The Interviews as a Foundation |
| | Acknowledgments |
| | About the Authors |
| | Chapter One. The Inescapable Data Vision |
| | Chapter Two. The Connectivity Divide |
| | | Introduction |
| | | Wireless and WiFi: From Confusion and Competition to Possible Synergy |
| | | Nokia and DoCoMo Versus the Old Guard |
| | | Connecting You |
| | | Connected and Truckin' |
| | | Staying Connected Down on the Farm |
| | | Connected Camping |
| | | Untethered Displayable Data |
| | | Religion and the Connected |
| | | Summary |
| | Chapter Three. Inescapable Data Fundamentals |
| | | Introduction |
| | | What Is Important in Communication? |
| | | From Postal Mail to Voicemail to E-Mail to IM and Beyond |
| | | Data-Everywhere Devices |
| | | Enabling Pervasive Networking |
| | | XML...Describing It All |
| | | Summary: The Final Blend of Ingredients |
| | Chapter Four. FromWarfare to Government, Connectivity Is Vitality |
| | | Introduction |
| | | Instant Messaging: Changing Command and Control in War |
| | | Battlefield Connectivity |
| | | A "Connected" Homeland |
| | | Pervasive Public Surveillance |
| | | Connecting State Governments...Together |
| | | Summary |
| | Chapter Five. Pervading the Home |
| | | Introduction |
| | | Key Foundation Technologies |
| | | RFID, Wireless, and XML |
| | | For Example, Refrigerators |
| | | From Laundry and Home Inventory to Energy Systems |
| | | Home Security: Video |
| | | GPSTracing Our Steps |
| | | Summary |
| | Chapter Six. Connecting Medicine |
| | | Introduction |
| | | DNAMassive Data, Massive Value |
| | | Bioinformatics/Pharmaceuticals |
| | | Radiology |
| | | Hospitals |
| | | Scheduling Care Delivery |
| | | Pediatric and Personal Health Care |
| | | Summary |
| | Chapter Seven. Work Life: Oxymoron No Longer |
| | | Introduction |
| | | Converged ConnectionsOf Conference Calls, Cell Phones, and WiFi-Enabled Laptops |
| | | Work@Home |
| | | Instant Messaging |
| | | Groupware and Virtual Office |
| | | Text Messaging and Convergence |
| | | The New Employee: Independent Consultant |
| | | Social Implications |
| | | Summary |
| | Chapter Eight. Real-Time Manufacturing |
| | | Introduction |
| | | The Changing Manufacturing Landscape |
| | | Value Stream Mapping |
| | | RFID and Real-Time Insight into the Supply Chain |
| | | New Computing Architectures Driven by RFID-Type Sources |
| | | The Shipping Business |
| | | Customized Through to Consumer |
| | | Video-Controlled Production |
| | | Summary |
| | Chapter Nine. Sports and Entertainment: Energizing Our Involvement |
| | | Introduction |
| | | Auto Racing by Numbers |
| | | Heads-Up Sports |
| | | Inescapable Data and the Individual Athlete |
| | | The Inescapable Data Racquet |
| | | Teams and Fans: Real-Time Participation |
| | | Player Tracking and Analysis |
| | | Participatory Games |
| | | TV: Yielding to User-Designed Viewing |
| | | Video Business, Connected Style |
| | | Summary |
| | Chapter Ten. Connecting to Retail |
| | | Introduction |
| | | RFID and the Grand Retail Vision |
| | | Mining Retail E-Commerce |
| | | Charting the Course of Customers |
| | | Watching Store Operations |
| | | Metro's Future Store: A Look at Where It All Comes Together |
| | | Buying ShoesHow Extreme Customization Is Possible |
| | | Summary |
| | Chapter Eleven. Computer Storage Impacted by Inescapable Data |
| | | Introduction |
| | | Data Classification |
| | | Store Everything? |
| | | The Data Preservation Challenge |
| | | Breakthrough Compression |
| | | Video and Media Driving Storage Growth |
| | | From Blocks to Files to Objects |
| | | Data Protection |
| | | Storage Utility |
| | | Summary |
| | Chapter Twelve. Super Computers, Visualization, and Networks |
| | | Introduction |
| | | Super Computers |
| | | Visualization and 3D Graphics |
| | | XML and New CPUs? |
| | | Intelligent Networking |
| | | Internet Enterprise |
| | | Motes |
| | | Summary |
| | Chapter Thirteen. Inescapable Data in Perspective |
| | | What Is Inescapable Data? |
| | | Venture and Investment |
| | | Should I Worry About Too Much Data and Connectivity? |
| | | What Should I Be Doing to Exploit the New World? |
| | | Predictions |
| | | Summary |
| | This Book Is Based On In-Depth Interviews With These Industry Thinkers |
| | Index |