Pages: pp. 4-5
The IEEE Computer Society offers a lineup of 13 peer-reviewed technical magazines that cover cutting-edge topics in computing including scientific applications, design and test, security, Internet computing, machine intelligence, digital graphics, and computer history. Select articles from recent issues of Computer Society magazines are highlighted below.
Two well-known authors in software engineering, Barry Boehm and Kent Beck, offer their complementary perspectives on software evolution in "Perspectives on Software Evolution: Its Changing Nature, and Its Inevitability' in the July/August 2010 issue of Software.
Boehm argues that the time of "one software evolution process fits all" is over and provides guidelines on selecting the most appropriate evolution-friendly process under various circumstances. Beck acknowledges the difficulty of evolving a software design. He reminds us of the factors that software developers and managers must consider when evolving systems (such as cost, time, and risk), including the need to keep a system operational during its actual evolution, which is particularly relevant for some critical applications.
The 16th Asian Games in Guangzhou, China, in November, will involve 42 sports and more than 100,000 people—the largest such games ever. A parallel event for disabled Asian athletes will start two weeks later.
Transportation is a major challenge facing the 2010 Asian Games. Since the events will use 58 existing facilities and 12 new stadiums located widely across the metropolitan area, safe, effective transportation management will be essential. Read about Guangzhou's intelligent transportation systems approach, designed to make the games a success, in "Parallel Traffic Management for the 2010 Asian Games," in the May/June 2010 issue of IS.
Organizations that have typically attempted to effect strategic change through initiatives aimed at people, processes, or technology are discovering that more meaningful and lasting change is achieved through a focus on culture, organization, and governance. IT, as the "enabler," has a unique view across and through the enterprise and can provide the best input to executive leadership on opportunities for change.
CIO Corner contributor Tom Costello of UpStreme looks at the role of IT in governance in "COG vs. PPT: Models for Organizational Change" in the July/August 2010 issue of ITPro.
The world as we know it has collapsed into custom-sized computer screens with Mercator-projected maps, satellite images, aerial photos, and graphics showing us where everything is, what every location looks like, and why we would want to go there. Bing Maps combines route information with aerial and street-level photography to provide a seamless, interactive canvas for visualizing location information. Chris Pendleton of Microsoft explores Bing Maps in "The World According to Bing" in the July/August 2010 issue of CG&A.
The July/August 2010 issue of CiSE is based on work presented at the US National Science Foundation workshop Path to Petascale: Adapting Geo/Chem/Astro Applications for Accelerators and Accelerator Clusters, held at the US National Center for Supercomputing Applications in early 2009. The workshop was designed to raise awareness about the emergence of accelerator-based high-performance computing resources among computational scientists from the geosciences, computational chemistry, and astronomy and astrophysics communities and to help them get started in using these resources.
"High-Performance Computing with Accelerators" in the July/August 2010 issue of CiSE looks at recent developments in the field.
Tracking organizations such as US-CERT report a continuing rise in security vulnerabilities in software. But not all discovered vulnerabilities are equal—some could cause much more damage to organizations and individuals than others. In the inevitable absence of infinite resources, software development teams must prioritize security fortification efforts to prevent the most damaging attacks. Protection Poker is a collaborative means of guiding this prioritization. "Protection Poker: The New Software Security 'Game'" in the May/June 2010 issue of S&P is a case study of how a Red Hat IT software maintenance team demonstrates Protection Poker's potential for improving software security practices and team software security knowledge.
Mobile devices and social media have considerable potential for facilitating learning, from both the individual-skills and socialization perspectives. However, acceptable-use policies have limited the use of mobile devices on school campuses as a response to the risks schools face in dealing with disruptive or harmful speech.
In "Acceptable Use of Technology in Schools: Risks, Policies, and Promises" in the July-September 2010 issue of PvC, authors Meg Cramer and Gillian Hayes of the University of California, Irvine, ask why mobile devices and social media applications are much less pervasive in the classroom than in other parts of youth life. Educators, researchers, and designers may need to work together to increase understanding of youth's experience with pervasive computing technologies and provide greater access to these systems and applications in a formal school context.
Information and communication technology (ICT) is a crucial driver of economic growth. Authors Stephen Ezell and Scott Andes of the Information Technology and Innovation Foundation look at current and future investments in ICT around the world in "ICT R&D Policies: An International Perspective" in the July/August 2010 issue of IC.
While the US still performs the most ICT R&D in the world, competition has intensified as US ICT R&D investments as a percentage of GDP have fallen noticeably and have been surpassed by competitors in the past decade. A Web extra sidebar explains ICT R&D intensity, which measures a country's performance based on its R&D investment compared with the size of its economy.
Micro's May/June 2010 issue captures two debates from 2009 Computer Architecture Research Directions, a workshop at the 36th International Symposium on Computer Architectures. In "The Future of Architectural Simulation," Intel's Joel Emer and Microsoft Research's Doug Burger spearhead a debate on architectural simulation's future in computer research. In "Programming Multicores: Do Application Programmers Need to Write Explicitly Parallel Programs?," Princeton University's David August debates Keshav Pingali from the University of Texas at Austin.
In "Real-Time Environmental Monitoring and Notification for Public Safety" in the April–June 2010 issue of MultiMedia, Kean University researchers describe a low-cost system that combines environmental monitoring and Web-based real-time data reporting. The Wireless Integrated Network Sensors database application provides access to and visualization support for both real-time and archived data. The WiNS prototype samples environmental voltage, humidity percentage, temperature, atmospheric pressure, barometric pressure, and light. Learning functions are part of further development under way.
In a special July/August issue of D&T, "Emerging Interconnect Technologies for Gigascale Integration" highlights recent investigations of revolutionary interconnect paradigms for future SoCs and other computing platforms. Guest editors Partha Pratim Pande of Washington State University and Sriram Vangal of Intel have selected five articles representing a wide range of emerging interconnects—from carbon nanotubes to optical, RF, and on-chip wireless communications.
In "Unraveling Algol: US, Europe, and the Creation of a Programming Language" in the latest issue of Annals, David Nofre from the University of Amsterdam revisits the early development of Algol (1955–1960). He takes issue with the American-European and academic-commercial polarities that usually characterize the demise of a universal programming language and concludes, "If the history of Algol calls for a dichotomous interpretation, it was a matter of uniformity versus diversity."