Issue No.02 - Feb. (2014 vol.47)
Published by the IEEE Computer Society
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MC.2014.31
A round-up of highlights from other Computer Society magazines.
The IEEE Computer Society's lineup of 12 peer-reviewed technical magazines cover cutting-edge topics in computing, including scientific applications, Internet computing, machine intelligence, pervasive computing, security and privacy, digital graphics, and computer history. Select articles from recent issues of other Computer Society magazines are highlighted below.
The growth of healthcare social networking sites (HSNNs) such as Sermo and PatientsLikeMe has facilitated communication to improve personal and public health, allowing consumers to educate, support, and inspire one another and offering a forum for healthcare providers to share clinical insights, observations, and medical knowledge. But these vast repositories of sensitive health-related data, which users cherish for their openness, provide an attractive target for malicious attacks that could result in unauthorized disclosure and commercial exploitation. In "Data Protection in Healthcare Social Networks," part of IEEE Software's January/February 2014 special issue on software quality, Jingquan Li of Texas A&M UniversitySan Antonio proposes a set of system requirements that can help tackle crucial security problems on these sites.
IEEE Computer Graphics and Applications
Researchers conducting a geophysical landfill study to discover potential contamination sought an alternative to chemically analyzing continuous subsoil samples, a time-consuming and expensive process. The authors of "Investigating Landfill Contamination by Visualizing Geophysical Data," in the January/February 2014 issue of IEEE CG&A, developed an application that analyzes and visualizes 2D electrical resistivity (ER) landfill data, provides a volumetric representation of the subsoil, and then uses statistical criteria coupled with 3D visualization to represent landfill areas with a high probability of contamination.
IEEE Internet Computing
Their smaller display area and limited interface make accessing information on mobile devices relatively difficult—a problem mitigated by personalization technology, apps that selectively recommend and provide personalized information to users. In "EPE: An Embedded Personalization Engine for Mobile Users" from IEEE Internet Computing's January/February 2014 issue, JongWoo Ha, Jung-Hyun Lee, and SangKeun Lee of Korea University propose a powerful privacy-preserving mobile personalization engine architecture that relies on valuable in-device usage data to infer mobile users' interests but does so without sending data to a server.
IT employees of the baby boomer generation will soon be retiring in large numbers (the oldest turned 65 in 2011), presenting some serious problems for many IT departments—especially in organizations with complex business practices and significant legacy systems that will need future maintenance and, worse, may unexpectedly fail. IT Pro's November/December 2013 IT Workforce feature, "Countdown to Y2Gray" by Stacie Petter and Kerry Ward of the University of Nebraska at Omaha, offers some strategies for accepting and addressing the "Y2Gray" phenomenon.
Low-power, high-speed chips (or "cool chips," as IEEE Micro's November/December special issue editors Makoto Ikeda of the University of Tokyo and Fumio Arakawa of Nagoya University call them) encompass a broad range of architectures, applications, methodologies, and usage models—technologies that all aim to reduce power consumption and enhance chip performance. Here, Ikeda and Arakawa present three articles culled from Cool Chips XVI, a 2013 conference focusing on all aspects of cool technology.
IEEE Security & Privacy
Electronic medical records are increasingly the norm for physicians' offices, hospitals, public and private clinics, and other healthcare provider environments. These obviously represent a critical tool for improving communication within the healthcare system—but does suspicion of technological record-keeping, oversight of which clients feel they have no control, drive people to avoid treatment or hide information? In IEEE S&P's November/December 2013 Point/Counterpoint feature, Deborah C. Peel, founder of Patient Privacy Rights, and Deven McGraw, director of the Health Privacy Project at the Center for Democracy and Technology, debate questions of patient consent and fair information practices for electronic health records.
Computing in Science & Engineering
Exascale systems present programmers with many challenges. In "Programming for Exascale Computers" from CiSE's November/December 2013 issue, William Gropp of the University of Illinois at Urbana-Champaign and Marc Snir of Argonne National Laboratory review appropriate exascale parallel programming models and offer insight into the feasibility of using existing systems, thus preserving investment in legacy applications, as well as the potential benefits of new programming models and systems.
IEEE Pervasive Computing
The number of people worldwide living with Alzheimer's disease or a related dementia is expected to double in the next 20 years. Pervasive computing technologies provide a critical part of the evolving care model for individuals with Alzheimer's—particularly systems for telemedicine, home monitoring, ambient assisted living, social networking, and informatics. In "Everyday Patient-Care Technologies for Alzheimer's Disease," IEEE Pervasive Computing's OctoberDecember 2013 Pervasive Health feature, a team of specialists discuss some related projects for early diagnosis, monitoring, treatment, and assistance presented at the first Technology & Dementia Symposium of the 2013 Alzheimer's Association International Conference.
Microsoft Kinect technology has opened a new era for more advanced and natural humancomputer interaction (HCI) in fields ranging from gaming to medicine. "A New Writing Experience: Writing in the Air Using a Kinect Sensor" by Wenjung Zeng of the University of Missouri, IEEE MultiMedia's OctoberDecember 2013 Multimedia at Work feature, presents a potential finger-writing system that recognizes characters written in the air without the need for an extra handheld device. The technology could allow remote signatures, provide a fun way of teaching children to write, and become an essential component for the next generation of HCI.
IEEE Annals of the History of Computing
The late 1970s were a golden age for account management and mainframe sales at IBM. In "'Carrying a Bag': Memoirs of an IBM Salesman, 19741981," from IEEE Annals' OctoberDecember 2013 issue, James W. Cortada, now of the University of Minnesota, discusses his time as a sales rep in the IBM Data Processing Division over this period—during which IBM faced a major antitrust suit—and provides insight into the operation and culture of IBM's sales history.
IEEE Intelligent Systems
To fully realize the potential of IT governmental services, or T-Government, proponents must enhance and encourage active citizen involvement. In "A Web 2.0 Citizen-Centric Model for T-Government Services," featured in IEEE Intelligent Systems' September/October 2013 issue, Alexandros Dais, Mara Nikolaidou, and Dimosthenis Anagnostopoulos of Harokopio University of Athens present a citizen-centric interaction model that uses the Web 2.0 paradigm to better help citizens control their private data through profiles, combining services provided by government agencies or third-party entities.
CS president emeritus Sorel Reisman's blog on computer science education topics, "Musings from the Ivory Tower," is online at www.computer.org/portal/web/Musings-from-the-Ivory-Tower. The blog is a feature of the Computing Now Education page (www.computer.org/portal/web/computingnow/education). Also included here are a range of instructional materials on a growing set of technical topics drawn from CS conference tutorials, extracts from CS e-Learning courses, book reviews, audio and video presentations, and interviews with leading computer science experts and technology innovators.