dtalbot wrote:
>
> > However I do agree that a malicious agent could theoretically connect for
> >hours on
> > end (say when you're sleeping) and cause some financial damage.
>
> What about the fact that in the spec it says the application manager (the
> JAM) is separate from the KVM and therefore can't be controlled from an
> application? (No automatic i-app loading, running or renewal via the
> network?)
Yes but the MIDlet app itself could be running as an agent that, as long
as activated, connected to the network and downloaded data. For example
if it's possible to make a portfolio app that can update prices every
few seconds from the network, technically it's the same thing.
r e n
--
ascii: r e n f i e l d
octal: \162 \145 \156 \146 \151 \145 \154 \144
hex: \x72 \x65 \x6e \x66 \x69 \x65 \x6c \x64
e-business technology | engineering & strategy | wireless
[ Did you check the archives? http://www.appelsiini.net/keitai-l/ ]
Received on Mon Jan 22 11:54:09 2001