Major Internet events such as the IETF meetings, the Regional Internet Registry meetings, APRICOT, SIGCOMM, and NetWorld+Interop to
name a few, all provide Internet access for attendees. Commonly referred to as the "Terminal Room," these facilities have evolved
into complex high-speed networks with redundant paths, IPv6 routing, multicast, and more. In the last five years or so, these
networks have also been providing wireless access using various flavors of the IEEE 802.11 standard. As I write this, I am sitting in
the lobby of the Minneapolis Hilton Hotel, where the 53rd IETF meeting is being held. The lobby area and two floors of meeting rooms
have IEEE 802.11 coverage, and a directional high-gain antenna provides access in the pub across the street. Wireless Internet
computing is a reality, at least when you have a large gathering of engineers such as an IETF meeting. In our first article, Edgar
Danielyan takes a closer look at this technology, its applications and evolution.
More and more software is being distributed via the Internet rather than through the use of conventional media such as CD ROMs or
floppy disks. Downloading software via the Internet is very convenient, especially if you have reasonably high bandwidth. However,
with this convenience comes a certain risk that you may be receiving a modified copy of the software, perhaps one that contains a
virus. Code signing is a method wherein software is cryptographically signed and later verified. Eric Fleischman explains the details
of code signing.
I should have known better than to announce the imminent availability of our online subscription system in the previous issue. We are
working on it, but it isn't ready yet, so please continue to send your subscription requests and updates to: