2007 No.210 Special Edition on Ubiquitous Services/Reports on Exhibits at Telecom 2006
OKI aims to create an "e-Society®" filled with an abundance of ubiquitous services. Introduced in this paper are the prospective features required for information and communication systems to realize such ubiquitous services, as well as the ubiquitous service infrastructure under consideration by OKI.
Kei Kato, Shugo Shiba
Seamless communications between terminals become essential for next generation networks, due to the penetration of ubiquitous services. This paper introduces the prototype of a network device equipped with a "high-speed address hiding function", essential for seamless communications and the necessity of such a function for networks of the future.
Osamu Nakazawa, Haruo Fukuda, Kenji Matsuyama
The image of the IMS world we aim to attain is herein presented, with descriptions regarding the "Terminal Application Platform for Realization of IMS Services" offered by OKI ACCESS Technologies Co., Ltd., which is a joint venture between OKI and ACCESS.
"eVideo" is a general term used for video transmission technologies, primarily MPEG4-AVC/H.264, an advanced IP video transmission standard from OKI, which realizes the transmission of high quality video images over low bandwidths. This paper describes eVideo, a high quality video transmission technology, with an introduction and examples regarding the incorporation of eVideo in mobile terminals.
Hirohiko Nakazato, Makoto Ogawa, Yasunori Sato, Yasushi Kobayashi, Kaoru Mihara
A variety of ubiquitous printers introduced in this paper have been created through the embedding of Java applications.
Katsumasa Shinozuka, President and CEO
This paper offers an overview of the ubiquitous services in the ubiquitous network society and describes the "Ubiquitous Security" that overcomes the threats and anxieties, which lurk behind the convenience, for safe and secure services. The autonomous security control for mobile phones, developed by OKI, is introduced as an example of Ubiquitous Security applications. This paper was presented at the ITU Telecom World 2006 ("Telecom 2006") Forum.