secure smartphone authentication. prof. janne lindqvist's work

120
05.15 www.computer.org/computer jQuery’s Genesis, p. 7 Priming the PhD Pipeline, p. 76 Contents | Zoom in | Zoom out Search Issue | Next Page For navigation instructions please click here Contents | Zoom in | Zoom out Search Issue | Next Page For navigation instructions please click here

Upload: hoangcong

Post on 11-Feb-2017

233 views

Category:

Documents


9 download

TRANSCRIPT

  • 05.15

    www.computer.org/computer

    jQuerys Genesis, p. 7

    Priming the PhD Pipeline, p. 76

    Contents | Zoom in | Zoom out Search Issue | Next PageFor navigation instructions please click here

    Contents | Zoom in | Zoom out Search Issue | Next PageFor navigation instructions please click here

    http://www.qmags.com/clickthrough.asp?url=www.computer.org/computer&id=19390&adid=PCOVER 1E1

  • GET MORE, FOR LESS!Interested in getting a digital subscription to another IEEE Computer Society magazine? With a digital subscription, youll get videos, podcasts, and interactive links to the latest articlesall delivered via email at the half-year member subscription price of just $19.50 per magazine. This rate expires 10 August 2015. Youll also get free access in the Computer Society Digital Library to previous issues of the magazines you subscribe to.

    Subscribe now by clicking Subscription options under the magazine titles at computer.org/subscribe.

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    http://www.qmags.com/clickthrough.asp?url=www.computer.org/subscribe&id=19390&adid=PCOVER 2A1http://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • MAY 2015

    FEATURES 18The Web That

    Extends beyond the World

    VISHNU S. PENDYALA, SIMON S.Y. SHIM,

    AND CHRISTOPH BUSSLER

    14GUEST EDITORS INTRODUCTIONThe Web: The Next 25 YearsRON VETTER AND SAN MURUGESAN

    26The Web

    of Things: Challenges and

    Opportunities DAVE RAGGETT

    34Toward the Web of

    Things: Applying Web Technologies to the

    Physical WorldJRG HEUER, JOHANNES HUND,

    AND OLIVER PFAFF

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    MU

    LTIM

    ED

    IA

    http://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • MAY 2015

    CONTENTS

    FEATURES CONTINUED

    44 Roundtable Discussion: The Web We Look Forward To RON VETTER AND SAN MURUGESAN

    COMPUTING PRACTICES

    51 How Open Source Is Changing the Software Developers CareerDIRK RIEHLE

    RESEARCH FEATURE

    58 Tailoring Design for Embedded Computer Vision ApplicationsJASON SCHLESSMAN AND MARILYN WOLF

    COLUMNS

    7 COMPUTING CONVERSATIONS John Resig: Building jQueryCHARLES SEVERANCE

    9 COMPUTING AND THE LAW Important IP Cases in 2015, Part TwoBRIAN M. GAFF

    12 32 & 16 YEARS AGOComputer, May 1983 and 1999NEVILLE HOLMES

    64 INDISTINGUISHABLE FROM MAGICIs Secure and Usable Smartphone AuthenticationAsking Too Much?ALEXANDER DE LUCA AND JANNE LINDQVIST

    69 SCIENCE FICTION PROTOYPINGSix Insights about Science Fiction Prototyping ALIDA DRAUDT, JONJOZUF HADLEY, RYAN HOGAN, LETICIA MURRAY, GREGORY STOCK, AND JULIA ROSE WEST

    72 SOCIAL COMPUTINGOnline Product Rating Manipulation and Market PerformanceWENQI ZHOU AND YUHONG LIU

    76 COMPUTING EDUCATIONThe PhD PipelineSUSANNE HAMBRUSCH AND RAN LIBESKIND-HADAS

    80 CLOUD COVERA Cloud Visitation Platform to Facilitate Cloud Federation and Fog ComputingMARAT ZHANIKEEV

    84 OUT OF BANDWhat Makes a Good ColumnHAL BERGHEL

    88 SECURITYCyberhuman SecurityGEORGE HURLBURT

    92 STANDARDSThe Use of Standards on the LADEE MissionKAREN GUNDY-BURLET

    96 SOFTWARE TECHNOLOGIESRethinking Nonfunctional Software Requirements MANFRED BROY

    116 THE ERRANT HASHTAG The GitHub EffectDAVID ALAN GRIER

    Membership News

    68 IEEE Computer Society Information100 Call and Calendar

    Departments

    4 Elsewhere in the CS6 Spotlight on Transactions106 Career Opportunities

    ABOUT THIS ISSUE THE WEB:THE NEXT 25 YEARSIn its first 25 years, the Web disrupted every area it touched. So what should we expect in the next 25 years?

    See www.computer.org/computer-multimedia for multimedia content related to the features in this issue

    For more information on computing topics, visit the Computer Society Digital Library atwww.computer.org/csdl.

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    ________

    MU

    LTIM

    ED

    IA

    http://www.qmags.com/clickthrough.asp?url=www.computer.org/csdl&id=19390&adid=P2E2http://www.qmags.com/clickthrough.asp?url=www.computer.org/computer-multimedia&id=19390&adid=P2E1http://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • C O M P U T E R 0 0 1 8 - 9 1 6 2 / 1 5 / $ 3 1 . 0 0 2 0 1 5 I E E E P U B L I S H E D B Y T H E I E E E C O M P U T E R S O C I E T Y M AY 2 0 1 5 3

    IEEE COMPUTER SOCIETY http://computer.org // +1 714 821 8380 COMPUTER http://computer.org/computer // [email protected]

    EDITOR IN CHIEF Sumi Helal University of Florida [email protected] .edu

    ASSOCIATE EDITOR IN CHIEF, RESEARCH FEATURES Ying-Dar Lin National Chiao Tung University, [email protected] EDITOR IN CHIEF, SPECIAL ISSUESBill N. Schilit Google, [email protected]

    ASSOCIATE EDITOR IN CHIEF, COMPUTING PRACTICESRohit Kapur Synopsys, [email protected] ASSOCIATE EDITOR IN CHIEF, PERSPECTIVESBob [email protected]

    ASSOCIATE EDITOR IN CHIEF, MULTIMEDIA EDITOR Charles R. SeveranceUniversity of Michigan, [email protected] 2015 IEEE COMPUTER SOCIETY PRESIDENTThomas M. ConteGeorgia Tech, [email protected]

    AREA EDITORS BIG DATA AND DATA ANALYTICSNaren RamakrishnanVirginia TechRavi KumarGoogleCLOUD COMPUTINGSchahram DustdarTechnical University of ViennaCOMPUTER ARCHITECTURES David H. Albonesi Cornell University

    GREEN AND SUSTAINABLE COMPUTINGKirk CameronVirginia TechHEALTH INFORMATICS Upkar Varshney Georgia State University, Atlanta HIGH-PERFORMANCECOMPUTINGVladimir Getov University of Westminster

    IDENTITY SCIENCE AND BIOMETRICSKarl RicanekUniversity of North Carolina WilmingtonINTERNET AND WEB TECHNOLOGIES Simon Shim San Jose State University INTERNET OF THINGSRoy WantGoogle

    SECURITY AND PRIVACY Rolf Oppliger eSECURITY Technologies SOFTWARE Rene Bryce University of North Texas Jean-Marc Jzquel University of Rennes VISION, VISUALIZATION, AND AUGMENTATIONMike J. DailyHRL Laboratories

    COLUMN EDITORS CLOUD COVER San Murugesan BRITE Professional Services COMPUTING AND THE LAW Brian Gaff McDermott Will & Emery COMPUTING CONVERSATIONS Charles R. Severance University of Michigan COMPUTING EDUCATION Ann E.K. Sobel Miami University

    THE ERRANT HASHTAG David Alan Grier George Washington University INDISTINGUISHABLE FROM MAGICAntt i OulasvirtaAalto UniversityOUT OF BAND Hal Berghel University of Nevada, Las Vegas

    SCIENCE FICTION PROTOTYPING Brian David Johnson Intel SECURITYJeff rey M. Voas NIST SOCIAL COMPUTING Christian Timmerer Alpen-Adria-Universitt Klagenfurt

    SOFTWARE TECHNOLOGIES Mike Hinchey Lerothe Irish Soft ware Research Centre STANDARDS Charlene (Chuck) Walrad Davenport Consulting STUDENT DESIGN SHOWCASEGreg Byrd North Carolina State University 32 & 16 YEARS AGO Neville Holmes

    ADVISORY PANEL Doris L. Carver, Louisiana State UniversityCarl K. Chang, Iowa State University Theresa-Marie Rhyne, ConsultantSavitha Srinivasan, IBM Almaden Research Center Ron Vett er, University of North Carolina WilmingtonAlf Weaver, University of Virginia

    2015 PUBLICATIONS BOARD Jean-Luc Gaudiot (VP for Publications), Forrest Shull, Ming C. Lin, Alfredo Benso, David S. Ebert, Alain April, Laxmi Bhuyan, Greg Byrd, Robert Dupuis, Linda I. Shafer, H.J. Siegel

    2015 MAGAZINE OPERATIONS COMMITTEE Forrest Shull (chair), Nathan Ensmenger, Mazin Yousif, Miguel Encarnacao, George K. Thiruvathukal, Sumi Helal, Brian Blake, Daniel Zeng, San Murugesan, Lieven Eeckhout, Yong Rui , Maria Ebling, Shari Lawrence Pfl eeger, Diomidis Spinellis

    EDITORIAL STAFF Carrie ClarkManaging [email protected] NelsonSenior EditorMark GallaherStaff EditorLee GarberStaff Editor

    Contributing EditorsChristine AnthonyMeghan ODellStaff Multimedia EditorsBrian BrannonErica HardisonBen JonesDesign and ProductionMonett e Velasco, Lead Jennie Zhu-Mai, LeadMark Bartosik

    Erica HardisonAlex TorresCover DesignAndrew BakerProducts and Services DirectorEvan Butt erfi eld Membership Director Eric Berkowitz Senior Manager, Editorial Services Robin Baldwin

    Manager, Editorial Services Content DevelopmentRichard ParkSenior Business Development ManagerSandy BrownSenior Advertising CoordinatorsMarian Anderson Debbie Sims

    Permission to reprint/republish this material for commercial, advertising, or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to the IEEE Intellectual Property Rights Offi ce, 445 Hoes Lane, Piscataway, NJ 08854-4141 or [email protected]. Copyright 2015 IEEE. All rights reserved.

    IEEE prohibits discrimination, harassment, and bullying. For more information, visit www.ieee.org/web/aboutus/whatis/policies/p9-26.html.

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    _____________

    _________

    ___________

    ______________

    _________________________

    _____________________

    ____________

    ____________

    ____

    http://www.qmags.com/clickthrough.asp?url=www.ieee.org/web/aboutus/whatis/policies/p9-26.html&id=19390&adid=P3E4http://www.qmags.com/clickthrough.asp?url=http://computer.org/computer&id=19390&adid=P3E2http://www.qmags.com/clickthrough.asp?url=http://computer.org&id=19390&adid=P3E1mailto:[email protected]://www.qmags.com/clickthrough.asp?url=www.sfiprogram.org&id=19390&adid=P3E3mailto:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]:[email protected]://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • 4 C O M P U T E R P U B L I S H E D B Y T H E I E E E C O M P U T E R S O C I E T Y 0 0 1 8 - 9 1 6 2 / 1 5 / $ 3 1 . 0 0 2 0 1 5 I E E E

    ELSEWHERE IN THE CSEDITOR LEE [email protected]

    Computer Highlights Society MagazinesThe IEEE Computer Societys lineup of 13 peer-reviewed technical magazines covers cutting-edge topics in comput-ing, including scientifi c applications, Internet computing, machine intelligence, pervasive computing, security and privacy, digital graphics, cloud computing, and computer history. Here, we highlight recent issues of other Computer Society magazines.

    The Internet of Things (IoT) will connect billions of devices to the Internet and create a dynamic, heterogeneous envi-ronment. In Thingsonomy: Tackling Variety in Internet of Things Events from IEEE Internet Computings March/April 2015 issue, Souleiman Hasan and Edward Curry of the National University of Ireland, Galway, write about a system that enables the approximate semantic matching of events for building software that can tackle heteroge-neous IoT events.

    As device scalings benefi ts for dynamic RAM slow, enabling memory capacities to keep up with next-generation proces-sors growing computational rates will become increas-ingly diffi cult. In Opportunities for Nonvolatile Memory Systems in Extreme-Scale High-Performance Computing from CiSEs March/April 2015 issue, Oak Ridge National Laboratorys Jeff rey S. Vetter and Sparsh Mittal discuss sev-eral nonvolatile memoryrelated technologies emerging as alternatives to DRAM.

    Java build processes are typically slow, with much of the build time spent executing tests. Researchers are thus devising new approaches to speed up Java testing. In Vroom: Faster Build Processes for Java, from IEEE Soft-wares March/April 2015 issue, researchers from Colum-bia University and Electric Cloud describe two such

    approaches. One, known as VMVM (virtual machine in the virtual machine) or vroom vroom, avoids the need to inef-fi ciently restart the Java virtual machine before every test by reusing the JVM and reinitializing only the small part of memory needed by the next test. The other approach, called VMVMVM (virtual machine in a virtual machine on a vir-tual machine) or vroom vroom vroom, distributes testing jobs among OS-level VMs and speeds up build times by an average of 51 percent.

    Organizations that rely on cyberspace as a mission- critical asset require advanced situational awarenessto cope with emerging threats. Gaining an Advantage in Cyberspace with Advanced Situational Awareness, from IEEE S&Ps March/April 2015 issue, discusses a new framework that relies on an automated OODA (observe, orient, decide, act) cycle to provide awareness in corpo-rate environments.

    Cloud computingbased traffi c has been rapidly grow-ing in recent years, raising concern about the increasing amount of energy the technology uses. Traffi c-Aware Resource Provisioning for Distributed Clouds, from IEEE Cloud Computings January/February 2015 issue, examines important cloud-traffi c characteristics and optimizations, and the development of fi ne-grained traffi c-awareness approaches that reduce energy costs for distributed clouds with dynamic, diverse traffi c.

    Supercomputing systems can now accurately compute the results of important scientifi c simulations. Additional pro-cessing power will provide even more capabilities but will also create challenges because of power and storage lim-itations. James Ahrens of Los Alamos National Laboratory

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    ____________

    mailto:[email protected]://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • M AY 2 0 1 5 5

    discusses sampling and automated selection techniquesthat could address these issues in Increasing Scientific Data Insights about Exascale Class Simulations under Power and Storage Constraints, which appears in IEEE CG&As March/April 2015 issue.

    Past election-prediction research relying only on Twitter communications data have proven ineffective. Other work based on polls raised questions about the potential contri-butions that Twitter data could make to the process. The authors of Predicting Elections for Multiple Countries Using Twitter and Polls, from IEEE Intelligent Systems March/April 2015 issue, describe how they used polls, tweet-related data, and multiple predictive algorithms to forecast the 2014 Euro-pean Union elections in three countries more accurately than some research and commercial efforts.

    As part of their Teaching Privacy project, researchers at the International Computer Science Institute and the Univer-sity of California, Berkeley, are developing tools to help students make informed choices about privacy. In their article Teaching Privacy: Multimedia Making a Differ-ence from IEEE MultiMedias JanuaryMarch 2015 issue, the researchers describe their interdisciplinary approach to developing and disseminating engaging, accessible, inter-active, multimedia-focused apps that demonstrate what happens to information on the Internet.

    In Augmentative, Alternative, and Assistive: Reimagining the History of Mobile Computing and Disability, the Uni-versity of Southern Californias Meryl Alper explores the linked histories and sociocultural implications of Texas

    Instruments Vocaid and Apples iPad. People with speech disabilities have used these two consumer technologies as assistive devices. Through this brief case study, from IEEE Annalss JanuaryMarch 2015 issue, the author argues that developments in mobile computing and advancements in electronic communication aids are inherently connected throughout their research, development, commercializa-tion, and use.

    Combining cloud computing and telemedicine introduces new opportunities for transforming healthcare delivery. Cloud-based telemedicine also faces challenges, includ-ing high assurance, interoperability, security, privacy, and storage adaptability. The JanuaryMarch 2015 IEEE Perva-sive Computing article Telemedicine in the Cloud Era: Pros-pects and Challenges by Zhanpeng Jin and Yu Chen of Bing-hamton University, State University of New York, discusses these issues.

    IT-enabled business innovation can generate significant competitive advantage for companies. The March/April 2015 special issue of IT Pro focuses on understanding this type of innovations key issues and future opportunities.

    Short development cycles and insufficient security devel-opment guidelines have led to vulnerabilities in many Android apps. In VulHunter: Toward Discovering Vulnera-bilities in Android Applications from IEEE Micros January/February 2015 issue, researchers from Hong Kong Polytech-nic University and Texas A&M University propose a new static-analysis framework for detecting vulnerabilities in Android apps that has proven effective in testing.

    Circulation: Computer (ISSN 0018-9162) is published monthly by the IEEE Computer Society. IEEE Headquarters, Three Park Avenue, 17th Floor, New York, NY 10016-5997; IEEE Computer Society Publications Office, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720; voice +1 714 821 8380; fax +1 714 821 4010; IEEE Computer Society Headquarters, 2001 L Street NW, Suite 700, Washington, DC 20036. IEEE Computer Society membership includes a sub-scription to Computer magazine.

    Postmaster: Send undelivered copies and address changes to Computer, IEEE Membership Processing Dept., 445 Hoes Lane, Piscataway, NJ 08855. Periodicals Postage Paid at New York, New York, and at additional mailing offices. Cana-dian GST #125634188. Canada Post Corporation (Canadian distribution) pub-lications mail agreement number 40013885. Return undeliverable Canadian addresses to PO Box 122, Niagara Falls, ON L2E 6S8 Canada. Printed in USA.

    Editorial: Unless otherwise stated, bylined articles, as well as product and service descriptions, reflect the authors or firms opinion. Inclusion in Com-puter does not necessarily constitute endorsement by the IEEE or the Computer Society. All submissions are subject to editing for style, clarity, and space

    Reuse Rights and Reprint Permissions: Educational or personal use of this material is permitted without fee, provided such use: 1) is not made for

    profit; 2) includes this notice and a full citation to the original work on the first page of the copy; and 3) does not imply IEEE endorsement of any third-party products or services. Authors and their companies are permitted to post the accepted version of IEEE-copyrighted material on their own web-servers without permission, provided that the IEEE copyright notice and a full citation to the original work appear on the first screen of the posted copy. An accepted manuscript is a version which has been revised by the author to incorporate review suggestions, but not the published version with copy-editing, proofreading, and formatting added by IEEE. For more information, please go to: http://www.ieee.org/publications_standards/publications/rights/paperversionpolicy.html. Permission to reprint/republish this material for commercial, advertising, or promotional purposes or for creat-ing new collective works for resale or redistribution must be obtained from IEEE by writing to the IEEE Intellectual Property Rights Office, 445 Hoes Lane, Piscataway, NJ 08854-4141 or [email protected]. Copyright 2015 IEEE. All rights reserved.

    Abstracting and Library Use: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy for private use of patrons, provided the per-copy fee indicated in the code at the bottom of the first page is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923.

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    _________________

    ______________

    http://www.qmags.com/clickthrough.asp?url=http://www.ieee.org/publications_standards/publications/rights/paperversionpolicy.html&id=19390&adid=P5E1mailto:[email protected]://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • 6 C O M P U T E R P U B L I S H E D B Y T H E I E E E C O M P U T E R S O C I E T Y 0 0 1 8 - 9 1 6 2 / 1 5 / $ 3 1 . 0 0 2 0 1 5 I E E E

    SPOTLIGHT ON TRANSACTIONS

    Enhancing Cloud Services through Multitier Workload AnalysisLing Liu, Georgia Tech

    This installment of Computers series highlighting the

    work published in IEEE Computer Society journals comes

    from IEEE Transactions on Services Computing.

    Services computing is pen-etrating IT and computing technology at every level, encompassing the Web, the cloud, big data, business process modeling, and more. One feature that distinguishes cloud computing from conventional distributed computing is its hierarchical organization of com-puting capabilities as services, repre-sented by infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS).

    In Variations in Performance and Scalability: An Experimental Study in IaaS Clouds Using Multitier Work-loads (IEEE Trans. Services Computing,vol. 7, no. 2, 2014, pp. 293306), Deepal Jayasinghe and his colleagues describe an approach to enhancing IaaS cloud services through multitier workload analysis.

    IaaS promises considerable eco-nomic benefit because applications can be encapsulated in their own vir-tual machines and run anywhere. This application portability across many clouds theoretically enables us-ers to choose the most cost-effective IaaS service provider. Several produc-tion cloud environments can achieve portability very quickly, with typical whole system setup times on the order

    of hours instead of the days required in nonvirtualized environments.

    Although typical applications can be brought up quickly in computing clouds, the complexity of modern n-tier applications cant be completely masked by a single virtualization layer. Several macro-level indicators reveal serious challenges in making large-scale, mission-critical applications run equally well in different clouds. First, average datacenter utilization has been reported at very low levels over the years, with a Gartner survey reporting 18 percent average utiliza-tion; Google reports about 30 percent for a mixed workload combining long-running batch jobs with Web-facing ap-plications. Second, unexpectedly long response-time requests (several sec-onds), at a relatively low average of 50 to 60 percent CPU utilization, have been associated with very short bottlenecks that last only a fraction of a second.

    Based on extensive experimental analysis, the authors report on the differences theyve found among six IaaS virtualized cloud environments by running standard benchmark applicationssuch as RUBBoS and CloudStonewith similar or the same configuration settings. They com-pared performance and scalability

    variations in three representative public cloud infrastructures: EC2, Open Cirrus, and Emulab. An inter-esting discovery from large-scale experiments is that for the RUBBoS n-tier application benchmark, the best-performing configuration in Em-ulab can become the worst-performing configuration in EC2 due to a com-bination of hardware and software component differences, even though the RUBBoS implementation has been ported with minimized changes. The authors also compared the nontrivial differences among three mainstream hypervisorsXen, VMware, and KVMin a controlled environment. Their discoveries show significant differ-ences among six modern IaaS cloud infrastructures and providers. Specif-ically, functional portabilitywhich is routinely demonstrateddoesnt necessarily imply performance porta-bility; the latter requires careful study, measurement, and analysis.

    This work is just one effort in experimental analysis toward providing more efficient and ef-fective cloud services. The differences it reveals in IaaS for six cloud comput-ing environments demonstrate the value of such experimental measure-ments in gaining an in-depth under-standing of cloud services and cloud service provisioning. Furthermore, it suggests that concrete measurement of standard benchmarks is necessary to help both cloud service providers and consumers better understand the performance impact of configuration settings in their clouds.

    LING LIU is a professor in the School of Computer Science at Georgia Tech, and directs the research programs in the Distributed Data Intensive Systems Lab (DiSL). Contact her at [email protected].

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    _____________

    mailto:[email protected]://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • _________COMPUTING CONVERSATIONSEDITOR CHARLES SEVERANCE

    University of Michigan; [email protected]

    C O M P U T E R 0 0 1 8 - 9 1 6 2 / 1 5 / $ 3 1 . 0 0 2 0 1 5 I E E E P U B L I S H E D B Y T H E I E E E C O M P U T E R S O C I E T Y M AY 2 0 1 5 7

    Over the past 15 years, JavaScript has evolved from a toy language to a mainstream pro-gramming one that powers Web browsers, games, and server applications. Perhaps the most significant development that led to JavaScripts ubiquitous use was the emergence of the jQuery library. In many development shops, jQuery is the core library upon which all other application code is developed.

    I spoke with jQuery creator John Resig, currently of Khan Academy, which offers instructional videos and learning tools for math, science, computer programming, history, and more. You can see the entire interview with John at www.computer.org/computingconversations.

    BUILDING AN ELEGANT LIBRARYJohn started developing what would become jQuery in 2005 as an un-dergraduate student in computer

    science at Rochester Institute of Technology. Like many undergraduate students, John was involved in several Web development projects that were exploring emerging browser-based technologies. One of the early libraries he encountered was Prototype, which was bundled in Ruby on Rails:

    The most popular JavaScript library back then was Prototype. It was the first time I had seen a JavaScript library written in a nice, clean, object-oriented man-ner. Up to that point, I didnt realize that JavaScript code could be beautiful and elegant. Looking at Prototype inspired me to want to build something even better and add capabilities like manipulating HTML in the Document Object Model [DOM].

    Over time, as John looked at emerging JavaScript li-braries and started building his own, he felt it was import-ant to simplify development in the browser:

    John Resig: Building JQueryCharles Severance, University of Michigan

    John Resig discusses the birth of the JavaScript

    library jQuery and how it came to play a key role

    in the browser software ecosystem.

    See www.computer.org/computer-multimediafor multimedia content related to this article.

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    VI

    DE

    OV

    ID

    EO

    AU

    DI

    O

    http://www.qmags.com/clickthrough.asp?url=www.computer.org/computer-multimedia&id=19390&adid=P7E2http://www.qmags.com/clickthrough.asp?url=www.computer.org/computingconversations&id=19390&adid=P7E1mailto:[email protected]://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://online.qmags.com/media/CMG/2015/may/video_cmg0515_07v1.swf

  • 8 C O M P U T E R W W W . C O M P U T E R . O R G / C O M P U T E R

    COMPUTING CONVERSATIONS

    I saw a usability chasm, so I started to build different tools and libraries, and eventually these all glommed together into a single library, which I ended up calling jQuery. I was originally going to call it jSelect, but that domain was taken. I released it January 2006. At the time, I was in college working on all these different side projects. jQuery just spun out of these side projectsnone of which exist anymore, except for jQuery.

    Initially, John designed jQuery to achieve two goals. The first was to de-velop an elegant and powerful selec-tor syntax that would allow program-mers to access and modify the DOM:

    I found the selector pattern in a library called css_selector written by Simon Willison. He created a method that allowed you to write a simple CSS [Cascading style Sheets] selector and find some elements. It was very primitive: you could only do the most basic of queries, and it didnt have support for CSS2 and CSS3.

    The second goal John wanted to achieve was for JavaScript develop-ers to be able to add events to various places in the DOM:

    When youre building an interactive JavaScript appli-cation, you need to be able to detect and react to the user doing certain things. I wanted to optimize the library for finding an HTML element and attaching an event to it.

    Once jQuery was released and users began to adopt it, they started requesting new features and build-ing plugins like animations and Ajax support. jQuery was released early in 2006 and experienced rapid up-take that year. Several features led to jQuerys success:

    Even in the very first release, I provided a plugin architecture so that people could write plugins and add them into the jQuery library so they could get the full advan-tage of this framework. I had also written complete documentation on the first day it was released.

    Although there were other JavaScript developer libraries vying for attention in 2006, jQuery was the only library that was fully documented. The other libraries were powerful and effective, but you often needed to read source code or example code to figure out how to use the library. John also started to build an open source community around jQuery:

    When youre trying to manage an open source project, the code is only a small portion of the total effort. You have to make sure you have a clear website and a very nice Getting Started guide. The very first person I added to the jQuery team was someone to help manage the community. I wanted to make sure that if anyone was having a problem with jQuery, their needs were going to be taken into account, and we could fix whatever issue they encountered.

    In summer 2006, John and several of his friends were part of the seed accelerator Y Combinator and moved to Boston to turn their idea into a start-up. His work on jQuery was still just a side project. The start-up didnt thrive, so John decided to work at the Mozilla Foundation as a JavaScript evangelist:

    My job at the Mozilla Foundation was to promote JavaScript spec-ification activities and improve-ments to JavaScript. I still wasnt actually working on jQuery as part of my job. In my spare time, I would work on mailing lists and bug fixes in jQuery. It wasnt until my last year at Mozilla

    [20102011] that I was allowed to work on jQuery full time.

    John spent his last year at Mozilla strengthening the jQuery community:

    During that time, I put a lot of effort into making sure there was infrastructure in place so that if I wasnt there on a day-to-day basis, it could continue to exist. Part of that was setting up a nonprofit and making sure there were enough people working on every aspect of it. When I joined Khan Academy, I stepped down from technical involvement in the jQuery project, and everything has been running very well since then. I can just use jQuery now as a happy consumer.

    Over the past decade, thanks to the work of John Resig and many others in building and evolving high-quality JavaScript li-braries, moving application function-ality into browsers is increasingly be-coming a reality. The jQuery library provided a base level of functionality, almost like an operating system for browser applications that provided a solid foundation to move the entire industry forward. It will be interesting to see how the following generations of JavaScript libraries will build on this innovative work.

    CHARLES SEVERANCE, Computing Conversations column editor and Computers multimedia editor, is a clinical associate professor and teaches in the School of Information at the University of Michigan. Follow him on Twitter @drchuck or contact him at [email protected].

    Selected CS articles and columns are also available for free at http://ComputingNow.computer.org.

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    __________

    ___________________

    http://www.qmags.com/clickthrough.asp?url=http://ComputingNow.computer.org&id=19390&adid=P8E1mailto:[email protected]://www.qmags.com/clickthrough.asp?url=www.computer.org/computer&id=19390&adid=P8E2http://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • EDITOR BRIAN M. GAFFMcDermott Will & Emery, LLP; [email protected] AND THE LAW

    EDITOR BRIAN M. GAFFMcDermott Will & Emery, LLP; [email protected]

    C O M P U T E R 0 0 1 8 - 9 1 6 2 / 1 5 / $ 3 1 . 0 0 2 0 1 5 I E E E P U B L I S H E D B Y T H E I E E E C O M P U T E R S O C I E T Y M AY 2 0 1 5 9

    Over the past few years, US courts have been busy deciding fundamental issues in intellec-tual property law. The Supreme Court in par-ticular has considered and issued decisions on an unusually large number of IP-related cases.

    A handful of recent IP cases are of particular interest because their decisions could have wide-ranging impacts on business. Last months column discussed those cases that are patent lawrelated, and this month the focus is on trademark and copyright cases.

    For an expanded discussion on this topic, listen to the podcast that accompanies this column at www.computer.org/computing-and-the-law.

    TRADEMARKSOn 24 March 2015, the Supreme Court issued its decision in B&B Hardware, Inc. v. Hargis Industries, Inc. This case dealt with two companies that sold self-drilling screws. In 1993, B&B reg-istered the trademark Sealtight as

    the name for its screws, which are used in the aerospace in-dustry. In 1996, Hargis applied to the US Patent and Trade-mark Office (USPTO) to register the name Sealtite for its screws, which are used in the construction industry.

    B&B opposed Hargiss application for the Sealtite trademark, saying, in effect, that it was confusingly simi-lar to B&Bs preexisting Sealtight trademark. Both com-panies argued over this issue through the USPTO, which eventually sided with B&B and refused to grant Hargiss application. Hargis didnt appeal that decision.

    During this time, B&B sued Hargis in US federal court for trademark infringement. Notwithstanding the USPTOs ruling for B&B, the jury decided in Hargiss favor. They con-cluded that there was no likelihood of confusion between Sealtight and Sealtite, so Hargis didnt infringe.

    This set the stage for an interesting dilemma. On one hand, the USPTO said confusion between the names was likely. On the other, the jury came to the opposite

    Important IP Cases in 2015, Part TwoBrian M. Gaff, McDermott Will & Emery, LLP

    Several intellectual property cases this

    year raise important patent, copyright, and

    trademark legal questionsthe second part of

    this two-part series focuses on the trademark

    and copyright cases.

    See www.computer.org/computer-multimediafor multimedia content related to this article.

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    _________

    AU

    DI

    O

    http://www.qmags.com/clickthrough.asp?url=www.computer.org/computer-multimedia&id=19390&adid=P9E2http://www.qmags.com/clickthrough.asp?url=www.computer.org/computing-and-the-law&id=19390&adid=P9E1mailto:[email protected]://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • 10 C O M P U T E R W W W . C O M P U T E R . O R G / C O M P U T E R

    COMPUTING AND THE LAW

    conclusion. To reconcile this, the ques-tion that needed to be answered was whether the confusion issue should have been litigated at all because the USPTO already addressed it and ren-dered a decision. This is called issue preclusion, which is a doctrine that helps prevent re-litigating disputes that have already been resolved.

    On 2 December 2014, the Supreme Court heard oral arguments on this question, and on 24 March 2015 it ruled that the USPTOs decision precluded the jurys decision. The Supreme Court held that as long as the parties had an

    adequate opportunity to argue their positions at the USPTO, and as long as the USPTO resolved the issue properly, the issue couldnt be re-litigated. So, Hargiss victory was short-lived.

    Businesses need to take note of this case because it increases the impor-tance of USPTO procedures. The stakes are now higher for parties challenging IP rights in USPTO proceedings. For example, the losing party in a USPTO proceeding might find it difficult or impossible to get a different decision in court. Consequently, businesses em-broiled in certain USPTO challenges might need to increase their efforts there to ensure that they get the result they wantbecause a second chance might be unavailable.

    The second trademark case of inter-est is actually a series of lawsuits that Converse (a Nike, Inc. subsidiary) filed in fall 2014. Converse sued 31 compa-nies for infringement of specific trade-marks relating to the Chuck Taylor sneaker. The trademarked features on the sneaker that are at issue are the rubber toe cap, the bumper on the front, and the lines on the sides. Converse said it has been selling sneakers with these features since 1932, and claimed that several companies were selling sneak-ers with confusingly similar features.

    Trademark protection for design and fashion elements has become more important in recent years as compa-nies have sought to distinguish their products from those of their competi-tors. For example, recent litigation be-tween Apple and Samsung included a dispute over the design of the rounded corners on smartphones. In another footwear case, Christian Louboutin shoes red soles were deemed to be a protectable logo.

    Some defendants in the Converse litigation have countered by saying that these features are functional so

    they cant be protected as trademarks. Another issue that has been raised is that Converse waited too long to sue. In any event, the large number of re-lated lawsuits should be interesting to watch, if only because of the myr-iad products accused of infringement and the defenses that might be used in each case. Of course, many of these cases might settle and never go to trial; in fact, Converse has already settled at least three.

    COPYRIGHTSThere are a few interesting copyright cases as well. Like the trademark cases, some of these deal with determining how to apply existing copyright laws to new technologies that werent around when the laws were enacted.

    US federal copyright law has been revised several times over the years. In 1972, it was revised to include protec-tion for sound recordings. Before the revision, individual state laws dictated what rights owners had with respect to pre-1972 sound recordings. These laws varied from state to state, and copy-right owners needed to look to those laws for infringement remedies.

    A few years ago, the 1960s rock band The Turtles sued SiriusXM in California, New York, and Florida for

    more than US$100 million. The Tur-tles alleged they were due royalties for their pre-1972 songs that SiriusXM played on its subscription satellite ra-dio service. Generally speaking, Siri-usXMs position is that it doesnt owe royalties on those songs because they arent subject to a copyright that lim-its SiriusXMs ability to play them. But courts have ruled in The Turtles favor, saying that New York and California state laws give the owners of the pre-1972 songs the exclusive right to con-trol public performances of those songs. An open question, however, is whether broadcasting by satellite ra-dio is considered a public performance.

    Typically, radio stations and others required to pay royalties for playing music do so using a well-established blanket licensing system thats man-aged by performance rights organiza-tions, such as ASCAP. These organi-zations monitor public performances, collect royalties, and distribute them to the recording artists. However, digital service providers, like Internet and satellite radio stations, pay their required royalties using a separate and distinct system. Although com-plicated, its based on uniform fed-eral copyright law, not a patchwork of state laws.

    This dispute is another instance where old, existing state copyright laws are being appliedwith difficultyto new technology; in this case, satel-lite radio. Whether the laws do apply might depend on the interpretation of the phrase public performances. Does that include digital transmis-sion by satellite? If the courts deter-mine that it does, and if royalties become due, then the logistics of royalty collection will become more complicated.

    Unless the parties settle, this dis-pute will likely remain unresolved for some time. Indeed, the dollars implicated in The Turtles lawsuits, combined with the possibility of more litigation on behalf of other artists with pre-1972 recordings, puts signif-icant money at stake. Because theres

    The stakes are now higher for parties challenging IP rights in USPTO proceedings.

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    ___________________

    http://www.qmags.com/clickthrough.asp?url=www.computer.org/computer&id=19390&adid=P10E1http://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • M AY 2 0 1 5 11

    so much to gain or lose, the battle will likely be vigorous.

    Two other copyright lawsuits are interestingand not just because Google is involved. The fi rst case is The Authors Guild, Inc. v. Google, Inc., in which the plaintiff accused Google of copyright infringement relating to its large-scale scanning and digitization of books in academic libraries. Goo-gles endeavor aims to improve search and accessibility for the knowledge stored in diff erent libraries.

    The scanning and digitization of books that arent protected by copyright because theyre in the public domainisnt the issue. The Authors Guild contends that by scan-ning and digitizing a copyrighted book such that small portions of it are displayed as search results, Google is infringing the copyright. Google contends, however, that this is per-missible under the fair use doctrine in copyright law. This doctrine allows a person to use a limited amount of a copyrighted work without permission and without paying a royalty under certain circumstances; for exam-ple, if the use is educational and not commercial.

    In late 2013, the district court dis-missed the lawsuit, saying that what Google was doing was fair use. Not unexpectedly, The Authors Guild ap-pealed, and the appeals court heard oral arguments in early December 2014. A decision is expected shortly. Theres some speculation that if the party who loses the appeal asks the Su-preme Court to resolve the case, the Su-preme Court will take it to set clearer boundaries on what isand what isntfair use.

    The second case is Oracle America, Inc. v. Google, Inc., which began in 2010. Oracle alleges that Googles Java APIs infringed certain Oracle patents and copyrights. On the copyright issue, the jury determined that there was in-fringement. But the district court set aside that fi nding and concluded that the API structure that Oracle claimed was copyrighted wasnt eligible for

    copyright protection because it was a system or method of operation.

    Oracle appealed, and the Court of Appeals for the Federal Circuit re-versed the district courts decision, saying that API structure and orga-nization is copyrightable, and the district court was told to consider whether Googles copying was permit-ted fair use. In late 2014, Google asked the Supreme Court to take the case. The Supreme Court hasnt yet decided whether to take the case, but on 12 Jan-uary 2015 it asked for the US Solicitor Generals opinion on the issue. The Court will likely decide whether to take the case in the next few months.

    A fi nal decision on this dispute will be important because of the essential role APIs play in promoting interoper-ability. For example, to the extent that APIs are subject to restrictions on their use because of copyright or other lim-itations, developers might be forced to limit their use of APIs. This, in turn,

    would cause developers to create more code independently, increasing ex-pense and the time to market.

    These are just a few of the IP cases pending in 2015. Many have been in litigation for years, and its unclear when some of them might be fi nally resolved. Its important to keep an eye on these cases, because how theyre resolved will likely aff ect how companies do business.

    BRIAN M. GAFF is a senior mem-ber of IEEE and a partner at the McDermott Will & Emery, LLP law fi rm. Contact him at bgaff @mwe.com.

    NEXT ISSUEWEARABLE COMPUTING

    Selected CS articles and columns are also available for free at http://ComputingNow.computer.org.

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    __________

    http://www.qmags.com/clickthrough.asp?url=http://ComputingNow.computer.org&id=19390&adid=P11E1mailto:bgaff @mwe.comhttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • 12 C O M P U T E R P U B L I S H E D B Y T H E I E E E C O M P U T E R S O C I E T Y 0 0 1 8 - 9 1 6 2 / 1 5 / $ 3 1 . 0 0 2 0 1 5 I E E E

    32 & 16YEARS AGO

    EDITOR NEVILLE [email protected]

    MAY 1983www.computer.org/csdl/mags/co/1983/05/index.html

    Special Message I (p. 8) Publishing is probably the most important activity of the IEEE Computer Society. Our fi rst periodicals, the prestigious and successful IEEE Transac-tions on Computers and Computer, are now in their 32nd and 16th year of publication, respectively.

    Special Message II (p. 9) Normally, we publish one or two nontheme articles in each special issue of Computer, and to accommodate more independently submitted articles, we plan at least two nontheme issues per year. Thus, since we no longer have a serious backlog of accepted manuscripts, nontheme articlesonce acceptedare often published within three to four months.

    Optical Scanning (p. 15) In short, we have a bewildering array of potential applications for scanners, in addition to the many well-established uses. The purpose of this article is to give information on the mode of operation, specifi cation, evalua-tion, and limitations of various automatic digitizers, with an eye towards providing some kind of selection criteria.

    Automated Programming (p. 48) With some notable exceptions, the most sophisticated automated tool seen by most programmers is the diagnostic compiler. Part of the reason for this lack of computer aid is the intelligence and data handling capabilities needed to describe and maintain computer software. One solution is to use current develop-ments in pattern recognition and database management to produce automated tools for the development and mainte-nance of large software systems.

    Interactive Simulation (p. 62) Early Desire is a new fl oat-ing point equationlanguage system for interactive dynamic system simulation. It runs 1.3 to fi ve times faster than threaded Fortran and executes immediately on a RUN com-mand without any external compiler or linker. An experi-menter thus obtains results of model changes at once.

    Software Tools (p. 63) This article reports the results of this [software tool information] collection eff ort by

    analyzing the information obtained. Various categoriza-tions of the tools are presented, with classes listed by their characteristics.

    CAD Workshop (p. 77) Hardware solutions can address the workstation issuesmore power, memory, bandwidth, etc.and improve usability, acceptance, and applicabil-ity. Price, as much as any other factor, determines how fast companies will accept engineering workstations. Special-purpose hardware, however, still has its place within our general-purpose design systems.

    NSF Workshop (p. 80) To defi ne the research directions for computer engineering, the group had to cope fi rst with such issues as what computer engineering really encom-passed, where it fi t in modern industrial society, and what its goals should be.

    Neo-Esperanto (p. 84) A new artifi cial language could serve two purposescondensing information and facilitat-ing international communication. As a result of my prelim-inary research, Ive come to think of this language as being compact, universal, and suitable for gradual adoption.

    Diskettes (p. 86) A desktop media converter that permits 20 leading models of word processors and personal com-puters to become diskette compatible has been introduced by the OEM systems group of Itek Corporations Composi-tion Systems Division. The Converter can read single- and double-density diskettes, hard- or soft-sectored, single- or double-sided.

    CAD Station (p. 92) CAE Systems is marketing an inter-active computer-aided engineering design station that reportedly cuts design time by at least half. The CAE 2000 addresses the entire design cycle, from behavioral defi ni-tion through physical layout and testing.

    Interactive Education (p. 104) A patient care education program, developed by Ortho Pharmaceutical, enables doc-tors and healthcare workers to use their skills in simulated role-playing situations that focus on nine challenging med-ical problems.

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    ______________

    http://www.qmags.com/clickthrough.asp?url=www.computer.org/csdl/mags/co/1983/05/index.html&id=19390&adid=P12E1mailto:[email protected]://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • M AY 2 0 1 5 13

    MAY 1999www.computer.org/csdl/mags/co/1999/05/index.html

    Letter (p. 4) It is my impression that many patents are granted for software that was created using standard practices and that exhibits no greater insight than that employed by ordinary software developers. So, while soft-ware patents may generate more adverse consequences than patents on mechanical inventions, the problem could be greatly reduced by educating those in charge of granting patents about the difference between true innovation and ordinary software development.

    Distributed Computing (p. 11) Kenneth L. Thompson, a researcher for more than 30 years at Bell Laboratories (now a division of Lucent Technologies), was named the first recipient of the Computer Societys Tsutomu Kanai Award for contributions in the area of distributed com-puting systems.

    RISC Computing (p. 11) In an awards ceremony at SC 99 in November, IBMs John Cocke will be the first to receive the Computer Societys Seymour Cray Computer Science and Engi-neering Award for high-performance computing systems established by an endowment from Silicon Graphics Inc.

    Converging Networks (p. 14) The networking industry is undergoing a sweeping change that can be summed up in one word: convergence. Convergence represents the merger of voice and data onto a unified network. Traditionally, companies have run voice over a circuit-switched telephone network and data over a packet-based network.

    Middleware (p. 17) Middleware has become critical because its capacity to unite computing resources across disparate environments lets networks effectively link users and applications across multiple platforms and communi-cations protocols.

    Linux (p. 20) Three recent trends should ensure that Linux retains momentum: an emphasis on improving the user interface, the release of the Linux 2.2 kernel, and support from IBM and Intel.

    Wide-Area Computing (p. 29) Five years ago, the authors set out to design and build a wide-area operating system that would allow multiple organizations with diverse plat-forms to share and combine their resources. This system, Legion, is a network-level operating system designed from scratch to target wide-area computing demands.

    Global Software (p. 38) Although many large orga-nizations have established enterprise infrastructures on the Internet, few publications have discussed the

    issues involved in constructing an Internet-based, global software-engineering environment. This article reports Fujitsus innovative work in this arena.

    Unix and Beyond (p. 58) Computer visited [Tsutomu Kanai Award] recipient Ken Thompson at Lucents Bell Labs. We were interested in learning about Thompsons early work on Unix and his more recent work in distributed computing. We were especially interested in learning about the creative pro-cess within Bell Labs and his sense of where computer science is heading.

    Program Transformation (p. 65) As our society becomes more technologically complex, computer systems are find-ing an alarming number of uses in safety-critical applica-tions. In many such systems, the software components reliability is essential to the systems safe operation, so it becomes natural to ask, How can software be made to behave correctly when executed?

    Geographical Data (p. 74) An understanding of GIS data-bases will clarify some of the inherent problems in access-ing and managing spatiotemporal data. Based on this anal-ysis, we have developed a semantic model that explicitly captures the spatial and temporal characteristics of GIS data and their interrelationships. This model is part of an overall system that can be used to solve some of the prob-lems in accessing data from heterogeneous GIS sources.

    Wearable Computing (p. 82) Historical search suggests the first wearable computer was conceived in 1955 to pre-dict roulette and was prototyped in 1961 by Edward Thorp and Claude Shannon at MIT. Subsequent experimentation produced more sample systems. By 1991, a research group at Carnegie Mellon University coined the term wearable com-puter, and a research community started to emerge.

    Web-Based Enterprises (p. 112) Web-based enterprise computing allows corporate IT to integrate disparate sys-tems into a single, coherent environment. This shift from a traditional Web server with database connectivity to inte-grated systems that support the use of Web technologies facilitates business processes and allows corporations to service both internal and external customers effectively.

    Networked Consumerism (p. 120) In an era of online shopping, where perfect pricing is an everyday occurrence, the best strategy is to offer something for nothing, even when it sacrifices profits. E-commerce companies are using several strategies to profit from something for nothing.

    Selected CS articles and columns are also available for free at http://ComputingNow.computer.org.

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    http://www.qmags.com/clickthrough.asp?url=http://ComputingNow.computer.org&id=19390&adid=P13E2http://www.qmags.com/clickthrough.asp?url=www.computer.org/csdl/mags/co/1999/05/index.html&id=19390&adid=P13E1http://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • 14 C O M P U T E R P U B L I S H E D B Y T H E I E E E C O M P U T E R S O C I E T Y 0 0 1 8 - 9 1 6 2 / 1 5 / $ 3 1 . 0 0 2 0 1 5 I E E E

    Ron Vetter, University of North Carolina Wilmington

    San Murugesan, BRITE Professional Services and University of Western Sydney

    COVER FEATURE GUEST EDITORS INTRODUCTION

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    http://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • M AY 2 0 1 5 15

    Share your thoughts on the future of the Web and how it might influence us, as well as what we as computing professionals could do to help shape the future Web to be more exciting and serve society still better. Join the discussion at http://linkd.in/1GlSWFh.

    In its first 25 years, the Web exhibited an impres-sive evolution from a niche information man-agement system1 to a platform so ubiquitous and universal that it drives and empowers our digital lives.2 Redefining the way we live, communi-cate, socialize, and transact, Web tools and services enable us to gain and share knowledge and infor-mation in new ways. And Web-enabled applica-tions continue to transform businesses, education, healthcare, banking, government, and many other key sectors. So what about the Webs next 25 years? As George Burns once said, I look to the future because thats where Im going to spend the rest of my life. Of course, as we examine what the new Web landscape will look like, we recognize that the Web is a means to an end rather than the end itself.

    In this special issue of Computer, we explore a variety of perspectives on the Webs evolution and advancement in the coming quarter-century. By exploring important issues including privacy, security, equal access, Net neutrality, and Web reg-ulation, this issues three feature articles and an expert roundtable give us insight into the antici-pated advances and features that the future Web will bring, as well as the influence it will have on our society.

    A VISION FOR THE FUTURE The Web is poised for significant further develop-ment, and it will become an even more dominant and exciting platform than it is today. This is in no small part due to the Webs potential for reaching billions of people at the bottom of the socioeco-nomic pyramid who have not yet had the opportu-nity to embrace it and benefit from it. The new era

    of the Web is being driven by growth in a multitude of areas:

    advances such as Web 3.0, the Semantic Web, the 3D Web, and the Real-Time Web;

    open standards, open data, and open source software;

    the Internet of Things (IoT); multimodal access and multilingual

    presentation; the growing use of Internet-enabled smart-

    phones, gadgets, and consumer electronics; smarter search engines and question-

    answering systems; integrated, context-aware, collaborative

    apps; cloud computing and cloudlets; and the demand for an open, neutral, equal-

    access Internet, and for it to be declared a public utility.

    Although the Webs future seems bright and promising, realizing its full potential remains a bit uncertain. What do we want the Web to be? To answer this with any clarity, we must address a range of technical, developmental, operational, organizational, political, and societal issues and challenges. They include:

    interoperability of Web applicationsintegration of data, knowledge, and apps to make the Web a more meaningful and col-laborative platform;

    cybersecuritysecuring data on the Web and in Web applications remains a major

    The disruption is not overthe Webs transformation

    of the world as we know it has only just begun.

    YOUR

    THOUGHTS?

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    http://www.qmags.com/clickthrough.asp?url=http://linkd.in/1GlSWFh&id=19390&adid=P15E1http://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • 16 C O M P U T E R W W W . C O M P U T E R . O R G / C O M P U T E R

    GUEST EDITORS INTRODUCTION

    challenge due to increasing and sophisticated attacks;

    a smarter Webrealization of a fully Semantic Web in which programs can analyze and syn-thesize Web-based information;

    information overloadbetter context awareness, easier nav-igation, and smarter search engines for all kinds of data and information on the Web;

    an open Webfostering open data, open standards, and an open/neutral Internet; and

    societal and social issuesaddressing the Webs dark side, such as insufficient privacy controls and incorrect or poor information quality.

    To better understand the Webs eco-system from technical, societal, and other perspectives, we need coherent and comprehensive interdisciplinary studies. A new discipline, known as Web science, focuses on the Webs evo-lution and impact on society, business, and government. As Tim OReilly and John Battelle wrote in their white paper Web Squared: Web 2.0 Five Years On:

    The Web is no longer an indus-try unto itselfthe Web is now the world. And the world needs our help. If we are going to solve the worlds most pressing prob-lems, we must put the power of the Web to workits technol-ogies, its business models, and

    perhaps most importantly, its philosophies of openness, collec-tive intelligence, and transpar-ency. And to do that, we must take the Web to another level.3

    Bringing this about will require coor-dination among the Webs different stakeholders.

    IN THIS ISSUEIn the first article, The Web That Extends beyond the World, Vishnu S. Pendyala, Simon S.Y. Shim, and Christoph Bussler describe the Webs evolution from an interconnection of static information to a dynamic com-munication infrastructure for people, communities, things, and, eventually, planets. The authors anticipate an explosion of applications based on the Web of Things that includes machine-to-machine interactions and advanced machine learning that would bring growth in applications, humanitarian activities, interplanetary Web proj-ects, politics, and augmented reality.

    In The Web of Things: Challenges and Opportunities, Dave Raggett postulates that there will be a range of really simple things to really smart things connected on the Web. These things are proxies for physical or abstract realities, and the Web infers that these things are accessible via Web technologies. As Web services become smarter, we can expect that the things will have a near-humanlevel under-standingso such things can bet-ter relate to and serve the people who use them. Achieving this will require interdisciplinary effortsincluding cognitive psychology, linguistics, and facial recognition, among othersbut will lead to the realization of many new ideas and applications in an immersive 3D Web. Raggett concludes by inviting

    ABOUT THE AUTHORS

    RON VETTER, Computers editor-in-chief emeritus, is a professor of computer

    science, the associate provost for research, and dean of the Graduate School

    at the University of North Carolina Wilmington. He is also cofounder of Mobile

    Education, LLC (www.mymobed.com), a technology company specializing in

    developing interactive short message service applications. Vetter received a

    PhD in computer science from the University of Minnesota, Minneapolis. He

    is a member of the IEEE Computer Society and ACM. Contact him at vetterr@

    uncw.edu.

    SAN MURUGESAN is director of BRITE Professional Services and an adjunct

    professor at the University of Western Sydney, Australia. His research interests

    include cloud computing, green IT, the Internet of Things, and IT applications.

    Murugesan is the editor in chief of IT Professional, an editorial board member

    of Computer, a co-editor of the forthcoming Encyclopedia of Cloud Computing

    (Wiley, 2015), and the editor of Computers Cloud Cover column. He received a

    PhD in computer science and automation from the Indian Institute of Science,

    Bangalore. He is a fellow of the Australian Computer Society and the Institution

    of Electronics and Telecommunication Engineers (IETE), and a Distinguished

    Visitor of the IEEE Computer Society. Contact him at [email protected], or visit

    http://bitly.com/sanprofile.

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    ____________

    ___________________

    _____

    ______

    ___________

    http://www.qmags.com/clickthrough.asp?url=http://bitly.com/sanprofile&id=19390&adid=P16E2http://www.qmags.com/clickthrough.asp?url=www.mymobed.com&id=19390&adid=P16E1http://www.qmags.com/clickthrough.asp?url=www.computer.org/computer&id=19390&adid=P16E3mailto:[email protected]:[email protected]:[email protected]://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • M AY 2 0 1 5 17

    readers to think about the societal ramifications of the envisaged Web.

    In the next article, Toward the Web of Things: Applying Web Technologies to the Physical World, Jrg Heuer, Johannes Hund, and Oliver Pfaff describe a future based on the inter-action among devices, systems, users, and applications. In this vision of the Web, new applications and access pat-terns are based on applying Web tech-nologies to physical devices enabled with multiple processors and commu-nication interfaces. The authors pre-dict that the Web will reach into the physical world, allowing for the cre-ation of new applications that will har-ness physical devices and cause funda-mental changes to the physical world and our interaction with the cyber-physical world.

    Finally, in Computers roundtable with panelists David Alan Grier from George Washington University, Jeff Jaffe from the World Wide Web Con-sortium, and Lee Rainie from the Pew

    Research Center, we explore the Webs potential evolution and where it might lead us over the next 25 years. The pan-elists discuss key issues such as Net neutrality, accessibility, and govern-ment regulations, as well as what we as computer professionals can do to shape the future of the Web, ensuring that future developments make the world a better place.

    The Web will continue its evolu-tion, offer new capabilities, and extend its reach and utility. As it becomes even more ubiquitous and embedded in our lives and goods, the Webs influence will be even more sig-nificant and widespread in the years to come. The opportunities it presents will continue to outweigh associated risks and limitations. It certainly has not reached its zenith, so we must rec-ognize and harness its full potential.

    As a community, we must build a better, safer, more open Web that

    addresses the needs of all segments of society. With the help of the Web and our coordinated efforts, we can address the coming technical, opera-tional, organizational, political, and societal issues and challenges. We hope the articles in this issue will inspire you to think about what the Web could and should be, and that you will join us in working toward realiz-ing the Web that we want.

    REFERENCES1. T. Berners-Lee, Information Man-

    agement: A Proposal, Mar. 1989; http://info.cern.ch/Proposal.html.

    2. S. Murugesan, The Web @ 25 and Beyond, Computing Now, vol. 7, no. 7, Jul. 2014; www.computer.org/web/computingnow/archive/july2014.

    3. T. OReilly and J. Battelle, Web Squared: Web 2.0 Five Years On, white paper, OReilly Media, 2009; http://assets.en.oreilly.com/1/event/28/web2009_websquared-whitepaper.pdf.

    Preserving Smartphone Privacy

    Want more know more about the Internet?This magazine covers all aspects of Internet computing,

    from programming and standards to security and networking.

    www.computer.org/internet

    Selected CS articles and columns are also available for free at http://ComputingNow.computer.org.

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    _________________

    _____________________

    http://www.qmags.com/clickthrough.asp?url=http://assets.en.oreilly.com/1/event/28/web2009_websquared-whitepaper.pdf&id=19390&adid=P17E4http://www.qmags.com/clickthrough.asp?url=www.computer.org/web/computingnow/archive/july2014&id=19390&adid=P17E3http://www.qmags.com/clickthrough.asp?url=http://info.cern.ch/Proposal.html&id=19390&adid=P17E2http://www.qmags.com/clickthrough.asp?url=www.computer.org/internet&id=19390&adid=P17A1http://www.qmags.com/clickthrough.asp?url=http://ComputingNow.computer.org&id=19390&adid=P17E1http://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • 18 C O M P U T E R P U B L I S H E D B Y T H E I E E E C O M P U T E R S O C I E T Y 0 0 1 8 - 9 1 6 2 / 1 5 / $ 3 1 . 0 0 2 0 1 5 I E E E

    COVER FEATURE THE WEB: THE NEXT 25 YEARS

    The Web That Extends beyond the WorldVishnu S. Pendyala, Santa Clara University

    Simon S.Y. Shim, San Jose State University

    Christoph Bussler, Oracle

    The Web evolved much more rapidly than was

    probably envisioned when it was invented two decades

    ago. The authors present their vision for the Webs

    next two decades by identifying important research

    directions that can help extend its reach further.

    The Internet will disappear. Eric Schmidt, executive chairman of Google

    A lthough it didnt exist 25 years ago, the World Wide Web is now an indispensable part of life for many. But in the near future, as Goo-gles executive chairman Eric Schmidt pre-dicted at the World Economic Forum in January 2015, the Web and its applications will be so well integrated into our daily lives that we will no longer notice their presence. The same happened with electronic devices. From toasters and alarm clocks to the cars we drive, electronic chips control behavior all around us; we are so used to these devices that they are now almost invisi-ble to our consciousness.

    The Web has even greater potential than electronic devices to impact the world, due to its ability to connect and expose those devices services to bring about great synergy. With the advent of wearables and the Internet of Thingsand their applicationsthe Web is set to per-meate every nook and cranny of the world. Web interac-tions will no longer be limited to the browserusers will be able to speak into devices and hear back from them seamlessly. The Web will also significantly extend its outreach into space.

    In this article, we examine some of the enabling factors, trends, and requirements that will make these predic-tions come true. These new features might need protocol, application, or infrastructure changesconsiderations we leave for future research. The Webs underlying infra-structure shapes its applications, and these applications

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    VI

    DE

    O

    http://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://online.qmags.com/media/CMG/2015/may/video_cmg0515_18v1.swf

  • M AY 2 0 1 5 19

    give the Web its character. Thus, we take a conflated view of the Web when discussing its future.

    THE EVOLVING WEBThe Web changes rapidly and has the potential to serve as a conduit for tremendous computing power from almost anywhere. We discussed this vision of the Web as a ubiquitous com-puter in the September 2009 issue of this magazine.1 As depicted in Figure 1, the Web is evolving from an intercon-nection of static information sources to a programmable interconnection of static and dynamic information, peo-ple, communities, things, andeven-tuallyplanets. This evolution is a tes-tament to the amount of research focus the Web has received over the past two decades and will continue to receive.

    There is still plenty of scope for evolving the Web. Knowledge

    representation is key to building intel-ligent Web applications. As the need for machine-to-machine communica-tion grows with the increasing ubiq-uity of the WoT, machine-readable representations such as XML, JSON, and the Semantic Web are heading in the right direction, but there is sub-stantially more reasoning necessary to align the Web more closely with the real world. The real world is character-ized by uncertainty, but so far, the Web does not reflect this fact.

    Reasoning under uncertain cir-cumstances is an important research goal. The current knowledge repre-sentations available to Web protocols are incapable of meeting this require-ment. The underlying assumption of the processing done on the Web is that the information available to it is all true. In Streaming the Web: Reason-ing over Dynamic Data, Alessandro

    Margara and his colleagues discuss the importance of handling uncer-tainty in streaming data on the Web and conclude that current systems for doing so are inadequate.2 Dealing with uncertainty in the information repre-sented on the Web will be a notable milestone in its evolution.

    Multiple zettabytes of data on the Web are locked up in suboptimal struc-tures. An important project would be to construct a knowledge base from that data; an appropriate representa-tion of such knowledge could facili-tate the creation of Web applications that can reason and draw conclusions. Advances in text mining and knowl-edge representation could make this possible. Knowledge representation has been a formidable challenge for computer scientists, owing to what is currently possible versus what is poten-tially possible. Significant innovation

    The invisible Web ofeverythingeverywhere

    Interplanetary Web(2020TBD)

    Linking information sources(19902000)

    Connecting communities and individuals(20002010)

    The Web of Things(20102020?)

    TweetsConnections

    BlogsPosts

    Shares

    FIGURE 1. Evolution of the Web. The Web is evolving from an interconnection of static information sources to a programmable inter-connection of static and dynamic information, people, communities, things, andeventuallyplanets.

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next PageComputerComputer

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    qqM

    Mq

    qM

    MqM

    QmagsTHE WORLDS NEWSSTAND

    http://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=www.qmags.com&id=19390&adid=logohttp://www.qmags.com/clickthrough.asp?url=http://www.computer.org&id=19390&adid=logo

  • 20 C O M P U T E R W W W . C O M P U T E R . O R G / C O M P U T E R

    THE WEB: THE NEXT 25 YEARS

    in this area will be disruptive, partic-ularly regarding the vast amounts of data that will be automatically gen-erated from the innumerable sensors embedded in the Web of Things (WoT).

    Developments in augmented real-ity (see the Augmented Reality side-bar), machine learning, and natural language processing will transform the Web into a medium that seam-lessly permeates into our social fab-ric. To become ubiquitous, the Web should speak the language of the user and be able to communicate in ways that are best suited to the user. Speech recognition logic is already built into the Chrome browserit should be

    possible in the near future for the Web I/O to happen in audio and video, in the users native language, without having to use a keyboard.

    User experience will continue to drive the Webs evolution. Web proto-cols might need to change to accom-modate the various IO channelssuch as speechwhich could obviate the need for users to type URLs. Machines might continue to use URLs or URIs to access Web resources, but the internal mechanism should be abstracted away from users. The way to access informa-tion needs to evolve, as does the way in which information is harnessed.

    An emerging breed of applications

    aggregates, summarizes, and anno-tates information on the Web. This category of machine-generated infor-mation could result in entire multime-dia magazines produced without any human involvement. Summlyan app that delivers short summaries of news stories and was recently acquired by Yahooand Googles translation tool prove that statistical techniques can perform better than semantic techniques when it comes to text pro-cessing. With the wealth of statisti-cal techniques at our disposal, it is very possible that machine-generated information on the Web could be much better than information written by humans. Big data analytics, which uses statistical toolkits to process information, holds huge promise here.

    Another important aspect of the intelligent Web is its ability to learn. Current Web applications like search engines already learn from user behav-ior: search queries are predicted based on past queries, and advertisements are displayed based on usage. But this is minimal compared to the learning that happens in the real world. Web applications should be able to quickly learn patterns from the knowledge made available to them and use these patterns to predict the future. For example, Google X created a network of 16,000 computers that learned to recognize videos of cats on YouTube (w w w.w i red.com/ 2012/06/goog le-x-neural-network). This ability could detect and prevent malicious Web activity or help with everyday sit-uations; for instance, a cars com-puter could predict when a freeway is clogged and reroute the driver.

    THE WEB OF THINGSThe number of devices connected on the Internet already exceeds the

    AUGMENTED REALITY

    Augmented reality (AR) will be a major enabler in the Webs evolution. Its applications promise to take quality of life to the next level. Thus, it is no surprise that Microsoft is projecting HoloLens as the next wave in personal computing (www.microsoft.com/microsoft-hololens). Google Glass popularized AR and continues to do so. AR technology augments the real world by projecting virtual information in a users vicinity. The information is mostly visual at this time but can include smell, touch, and hearing. HoloLens augments reality by creating holo-grams, combining the real and virtual worlds.

    In conjunction with paradigms like the WoT and the interplane-tary Internet, Web-based AR applications could offer a very differ-ent way of experiencing the universe. Users could get a near- real-life visualization of the structures in outer space and on other planets. Cosmic activity could be replayed through AR. Prototypes could be built and experimented with to gain better insights or even control cosmic entities. For more lasting prototypes, a virtual object could eve