> Healthcare analytics > Information-hiding malware > Approximate computing

JUNE 2015 www.computer.org GET MORE, FOR LESS! Interested in geing a digital subscription to another IEEE Computer Society magazine? With a digital subscription, you’ll get videos, podcasts, and interactive links to the latest articles—all delivered via email at the half- year member subscription price of just $19.50 per magazine. This rate expires 10 August 2015. You’ll also get free access in the Computer Society Digital Library to previous issues of the magazines you subscribe to.

Subscribe now by clicking “Subscription options” under the magazine titles at computer.org/subscribe. IEEE COMPUTER SOCIETY http://computer.org • +1 714 821 8380

STAFF

Editor Manager, Editorial Services Content Development Lee Garber Richard Park

Senior Manager, Editorial Services Contributing Editors Robin Baldwin Christine Anthony, Brian Brannon, Carrie Clark Walsh, Brian Kirk, Chris Nelson, Meghan O’Dell, Dennis Taylor, Bonnie Wylie Director, Products and Services Evan Butterfield Production & Design Carmen Flores-Garvey, Monette Velasco, Jennie Zhu-Mai, Senior Advertising Coordinator Mark Bartosik Debbie Sims

Circulation: ComputingEdge is published monthly by the IEEE Computer Society. IEEE Headquarters, Three Park Avenue, 17th Floor, New York, NY 10016-5997; IEEE Computer Society Publications Office, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720; voice +1 714 821 8380; fax +1 714 821 4010; IEEE Computer Society Headquarters, 2001 L Street NW, Suite 700, Washington, DC 20036. Postmaster: Send undelivered copies and address changes to IEEE Membership Processing Dept., 445 Hoes Lane, Piscataway, NJ 08855. Application to Mail at Periodicals Postage Prices is pending at New York, New York, and at additional mailing offices. Canadian GST #125634188. Canada Post Corporation (Canadian distribution) publications mail agreement number 40013885. Return undeliverable Canadian addresses to PO Box 122, Niagara Falls, ON L2E 6S8 Canada. Printed in USA. Editorial: Unless otherwise stated, bylined articles, as well as product and service descriptions, reflect the author’s or firm’s opinion. Inclusion in ComputingEdge does not necessarily constitute endorsement by the IEEE or the Computer Society. All submissions are subject to editing for style, clarity, and space. Reuse Rights and Reprint Permissions: Educational or personal use of this material is permitted without fee , provided such use: 1) is not made for profit; 2) includes this notice and a full citation to the original work on the first page of the copy; and 3) does not imply IEEE endorsement of any third-party products or services. Authors and their companies are permitted to post the accepted version of IEEE-copyrighted material on their own Web servers without permission, provided that the IEEE copyright notice and a full citation to the original work appear on the first scree n of the posted copy. An accepted manuscript is a version which has been revised by the author to incorporate review suggestions, but not the published version with copy-editing, proofreading, and formatting added by IEEE. For more information, please go to: http:// www.ieee .org/publications_standards/publications/rights/paperversionpolicy.html. Permission to reprint/republish this material for commercial, advertising, or promotional purposes or for creating new collective works for resale or redistribution must be obtained from IEEE by writing to the IEEE Intellectual Property Rights Office, 445 Hoes Lane, Piscataway, NJ 08854-4141 or pubs-permissions@ieee .org. Copyright © 2015 IEEE. All rights reserved. Abstracting and Library Use: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy for private use of patrons, provided the per-copy fee indicated in the code at the bottom of the first page is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. IEEE prohibits discrimination, harassment, and bullying. For more information, visit www.ieee.org/web/aboutus/whatis/policies/p9-26.html.

IEEE Computer Society Magazine Editors in Chief

Computer IEEE Micro IEEE MultiMedia Sumi Helal, University of Florida Lieven Eeckhout, Ghent University Yong Rui, Research

IEEE Software IEEE Computer Graphics and IEEE Annals of the History Diomidis Spinellis, Athens Applications of Computing University of Economics and L. Miguel Encarnação, ACT, Inc. Nathan Ensmenger, Indiana Business University Bloomington IEEE Pervasive Computing IEEE Internet Computing Maria Ebling, IBM T.J. Watson IEEE Cloud Computing M. Brian Blake, University of Research Center Mazin Yousif, T-Systems Miami International Computing in Science IT Professional & Engineering San Murugesan, BRITE George K. Thiruvathukal, Loyola Professional Services University Chicago IEEE Intelligent Systems IEEE Security & Privacy Daniel Zeng, University of Arizona Shari Lawrence Pfleeger, Dartmouth College

www.computer.org 1 JUNE 2015 • VOLUME 1, NUMBER 6

THEME HERE 8 22 31 Keeping Up Flexible Where is with Intelligent Displays, Rigid Everywhere: Technology Designs Bringing Location to the Web 4 Spotlight on Transactions: Enhancing Cloud Services through Multitier Workload Analysis LING LIU 7 Editor’s Note: Technology Trends and Outlooks 8 Keeping Up with Intelligent Technology PETER A. HANCOCK AND ROBERT R. HOFFMAN 12 Processing Distributed Internet of Things Data in Clouds LIZHE WANG AND RAJIV RANJAN 17 Information Hiding as a Challenge for Malware Detection WOJCIECH MAZURCZYK AND LUCA CAVIGLIONE 22 Flexible Displays, Rigid Designs? KASPER HORNBÆK 27 The Promise of Healthcare Analytics SETH EARLEY 31 Where is Everywhere: Bringing Location to the Web KERRY TAYLOR AND ED PARSONS 37 Approximate Computing: Making Mobile Systems more Efficient THIERRY MOREAU, ADRIAN SAMPSON, AND LUIS CEZE

43 The Importance of Being … Bored MARIA R. EBLING 47 Of Boilers, Bit, and Bots GRADY BOOCH 50 Email Address Internationalization:

ARNT GULBRANDSEN AND JIANKANG YAO 72 Life and Tech: The Word on Apps BRIAN KIRK 47 Departments Of Boilers, 5 Magazine Roundup Bit, and Bots 54 Career Opportunities 70 Computer Society: Bring Your Child to Work Day SPOTLIGHT ON TRANSACTIONS

variations in three representative Enhancing Cloud public cloud infrastructures: ECˆ, Open Cirrus, and Emulab. An inter- esting discovery from large-scale Services through Multitier experiments is that for the RUBBoS n-tier application benchmark, the best- performing con•guration in Em- Workload Analysis ulab can become the worst- performing con•guration in ECˆ due to a com- bination of hardware and software Ling Liu, Georgia Tech component di–erences, even though the RUBBoS implementation has been This installment highlighting the work published in ported with minimized changes. The authors also compared the nontrivial IEEE Computer Society journals comes di–erences among three mainstream hypervisors— Xen, VMware, and KVM— from IEEE Transactions on Services Computing. in a controlled environment. Their discoveries show signi•cant di–er- ervices computing is pen- of hours instead of the days required in ences among six modern IaaS cloud etrating IT and computing nonvirtualized environments. infrastructures and providers. Specif- technology at every level, Although typical applications can ically, functional portability—which encompassing the Web, be brought up quickly in computing is routinely de monstrated—doesn’t Sthe cloud, big data, business process clouds, the complexity of modern necessarily imply performance porta- modeling, and more. One feature that n-tier applications can’t be completely bility; the latter requires careful study, distinguishes cloud computing from masked by a single virtualization layer. measurement, and analysis. conventional distributed computing Several macro-level indicators reveal is its hierarchical organization of com- serious challenges in making large- puting capabilities as services, repre- scale, mission-critical applications his work is just one e–ort in sented by infrastructure as a service run equally well in di–erent clouds. experimental analysis toward (IaaS), platform as a service (PaaS), and First, average datacenter utilization Tproviding more e¦cient and ef- software as a service (SaaS). has been reported at very low levels fective cloud services. The di–erences In “Variations in Performance and over the years, with a Gartner survey it reveals in IaaS for six cloud comput- Scalability: An Experimental Study reporting Š› percent average utiliza- ing environments demonstrate the in IaaS Clouds Using Multitier Work- tion; Google reports about Ž‰ percent value of such experimental measure- loads” (IEEE Trans. Services Computing, for a mixed workload combining long- ments in gaining an in-depth under- vol. ‡, no. ˆ, ˆ‰Š‹, pp. ˆŒŽ–Ž‰’), Deepal running batch jobs with Web-facing ap- standing of cloud services and cloud Jayasinghe and his colleagues describe plications. Second, unexpectedly long service provisioning. Furthermore, it an approach to enhancing IaaS cloud response-time requests (several sec- suggests that concrete measurement services through multitier workload onds), at a relatively low average of Ÿ‰ to of standard benchmarks is necessary analysis. ’‰ percent CPU utilization, have been to help both cloud service providers IaaS promises considerable eco- associated with very short bottlenecks and consumers better understand the nomic bene•t because applications that last only a fraction of a second. performance impact of con•guration can be encapsulated in their own vir- Based on extensive experimental settings in their clouds. tual machines and “run anywhere.” analysis, the authors report on the This application portability across di–erences they’ve found among six many clouds theoretically enables us- IaaS virtualized cloud environments ers to choose the most cost-e–ective by running standard benchmark LING LIU is a professor in the School of at Georgia IaaS service provider. Several produc- applications— such as RUBBoS and Tech, and directs the research tion cloud environments can achieve CloudStone—with similar or the same programs in the Distributed Data portability very quickly, with typical con•guration settings. They com- Intensive Systems Lab (DiSL). whole system setup times on the order pared performance and scalability Contact her at [email protected].

4 June 2015 Published by the IEEE Computer Society 2376-113X/15/$31.00 © 2015 IEEE 6 COMPUTER PUBLISHED BY THE IEEE COMPUTER SOCIETY 0018-9162/15/$31.00 © 2015 IEEE

r5tra.indd 6 4/23/15 5:48 PM CS FOCUS

Magazine Roundup

knowledge from the physical, cyber, and social worlds for analysis. It is becoming increas- ingly important as mobile tech- nology, social media, and the Internet of Things become more popular and connect physical and social elements with tradi- tional cyber entities.

he IEEE Computer Soci- IEEE Software Computing in Science & ety’s lineup of 13 digi- Engineering Ttal magazines covers Software companies frequently cutting-edge computing topics must create multiple versions The US National Energy ranging from software design of products for diff erent cus- Research Scientifi c Comput- and computer graphics to Inter- tomers. However, the number ing Center (NERSC)―a state- net computing and security, of changes necessary for each of-the-art facility that serves from scientifi c applications and version and the dependencies government, industry, and aca- machine intelligence to cloud between variation points can demic users―celebrated its migration and microchip manu- skyrocket and create problems. 40th anniversary in 2014. CiSE’s facturing. Here are some high- Facing these challenges is the May/June 2015 special issue lights from recent issues. topic of a special section― includes articles that document “Trends in Systems and Soft- NERSC’s history and discuss Computer ware Variability”―in IEEE some of its major contributions. Software’s May/June 2015 issue. Manipulating a product’s IEEE Security & Privacy online ratings might infl uence IEEE Internet Computing market performance but might Policymakers are focusing on not maximize profi ts, accord- Physical-cyber-social (PCS) informed consent as a way ing to “Online Product Rating computing is the subject of to defend privacy. However, Manipulation and Market Per- IEEE Internet Computing’s May/ behavioral studies cast doubt on formance” in Computer’s May June 2015 special section. PCS this approach’s eff ectiveness, as 2015 issue. computing integrates data and many people tend to agree with

2376-113X/15/$31.00 © 2015 IEEE Published by the IEEE Computer Society June 2015 5 CS FOCUS almost any request they see on on footsteps remains challeng- editors of IEEE Pervasive Comput- their screens. A related technique ing. “Footstep-Identifi cation Sys- ing’s April–June 2015 special issue that promises improvement is tem Based on Walking Interval,” on smart spaces, pervasive com- addressed in “Informed Consent: which appears in IEEE Intelligent puting in physical spaces could We Can Do Better to Defend Pri- Systems’ March/April 2015 issue, provide many business and social vacy,” in IEEE S&P’s March/April describes a novel system. opportunities that are currently 2015 issue. being missed. The articles in this IEEE MultiMedia special issue consider new tech- IEEE Cloud Computing nologies and approaches for devel- Traditionally, multimedia has oping pervasive smart spaces. Much of the huge and growing been associated with video, audio, amount of data produced daily or other media content. Recently, IT Professional will be generated from Internet of however, its defi nition has Things devices and sensors, and expanded to include media-related “Could What Happened to Sony will be stored in cloud-accessible context such as video motion fea- Happen to Us?” from IT Pro’s datacenters. The article “Process- tures or time stamps, and media March/April 2015 issue says that ing Distributed Internet of Things connectivity features such as the until there are cybersecurity stan- Data in Clouds,” from IEEE Cloud degree of friendship between two dards of practice, Internet com- Computing’s January/February social-media participants. This merce will experience problems 2015 issue, discusses the capa- is the basis of IEEE MultiMedia’s like 2014’s Sony exploit. bilities and limitations of big data April–June 2015 special issue technologies for collecting and titled “Multimedia Goes beyond IEEE Micro analyzing distributed big datasets Content.” across multiple datacenters. IEEE Micro’s March/April 2015 IEEE Annals of the History of special issue contains articles IEEE Computer Graphics and Computing about a set of processors presented Applications at 2014’s Hot Chips 26 conference. In “The Production and Interpre- Over the years, Hot Chips has con- Historically, most attention in tation of ARPANET Maps” from sistently provided an early look at visual analytics (VA) has been IEEE Annals’ January–March 2015 trends in the processor industry. given to developing machine issue, the University of California, capabilities. But it is also essen- Los Angeles’ Bradley Fidler and Computing Now tial to develop the abilities of the Morgan Currie explore a series of visual analysts themselves. The network topology maps that the The Computing Now website University of British Columbia has fi rm Bolt Beranek and Newman (http://computingnow.computer. experimented with ways to do this. (now BBN Technologies) produced org) features up-to-the-minute Details are in “Preparing Undergrad- in the 1960s, 1970s, and 1980s. computing news and blogs, uates for Visual Analytics,” in IEEE These maps were a way to repre- along with articles ranging from CG&A’s March/April 2015 issue. sent ARPANET, a precursor of peer-reviewed research to opinion today’s Internet, to engineers. pieces by industry leaders. IEEE Intelligent Systems IEEE Pervasive Computing Researchers have tried to use foot- steps as a basis for biometric sys- Pervasive computing has yet to Selected CS articles and columns tems. However, constructing an be widely exploited in physical are also available for free at http:// ComputingNow.computer.org. identity-verifi cation system based spaces. According to the guest

6 ComputingEdge June 2015 EDITOR’S NOTE

Trends and Outlooks: Technology’s Future

ne constant when it comes to technol- a highly specialized corner of the Web. Now, ogy has been change. Computing and though, the overall Web is beginning to under- O communications have consistently stand geographical concepts, which will make it experienced new developments at all levels, includ- much more useful to consumers and application ing hardware, software, networking, and security. developers, as well as provide valuable context for This issue of ComputingEdge features articles the Internet of Things. on various important and interesting technology The topic of technology trends is also repre- trends. A piece from IEEE Security & Privacy dis- sented by articles from cusses an increasingly popular and dangerous cyberattack trend: malware that uses various tech- • IEEE Pervasive Computing on approximate niques to hide some of its elements, commands, computing, which lets computers become and communications. This makes it diffi cult for faster and more effi cient by being less than per- security software to recognize the threat. fect for tasks that don’t require great precision; Also included is an IT Professional article on • IEEE Cloud Computing about the processing the promise of healthcare analytics. The health- of distributed Internet of Things data in the care system is undergoing tremendous changes, cloud; and including the ability to collect huge amounts of • Computer on fl exible displays. patient data. Analytics appears ready to play a central role in improving patient outcomes while Other interesting topics are also covered. For helping to control costs. example, an IEEE Software piece by Grady Booch An article from IEEE Intelligent Systems pon- examines parallels between the Industrial Revolu- ders the challenge that researchers face because tion and the current computing revolution regard- the timeframe for both proving a new intelligent ing risk, transparency, and responsibility. technology’s usefulness and publishing R&D reports is often outstripped by fast changes in the approach itself. his issue will give readers a look at tech- A piece in IEEE Internet Computing looks nology trends already under way and those at bringing location technology online. Until Twaiting in the wings, including the promise recently, rich geographical information was they hold and the challenges they face.

2376-113X/15/$31.00 © 2015 IEEE Published by the IEEE Computer Society June 2015 7 HISTORIESHUMAN-CENTERED AND FUTURES COMPUTING Editors: Robert R. Hoffman, Jeffrey M. Bradshaw, and Ken Ford, Florida Institute for Human and Machine Cognition, [email protected]

Keeping Up with Intelligent Technology

Peter A. Hancock, University of Central Florida Robert R. Hoffman, Florida Institute for Human and Machine Cognition

his essay focuses on a fundamental discon- VR offered a degree of presence and immersion that nect brought about by the rapid pace of was unparalleled and unmatched by the residual T and approachingly passé capacities of 2D screens. change in intelligent technology. A previous es- One of us (P.A.H.) was fortunate enough to secure say in this department referred to this as a critical one of the rst commercial “eyephones” (VPL-003) challenge to human-centered computing1: the time systems. The empirical question for science was of frame for experimentation to rmly establish the course: is this offered technology a true “quantum understandability, usefulness, and usability of intel- leap” forward, or is it just another overhyped tech- ligent systems (and software, in general) is too long nical gizmo? This technology just begged for con- to keep up with the pace of change in the core tech- trolled experimentation to evaluate this proposi- nology. Robust controlled experimentation takes tion, and this was precisely what we proceeded to time, and by the time it has reached its conclusion, do. The protocol for the rst experiment was really the capacities and capabilities afforded by technol- quite simple and represented an extension of the ogy will have changed. In this essay, we focus on standard “transfer of training” approaches used in a derivative disconnect: the time frame for publish- classic experimental psychology research. The ex- ing reports on signi cant results of research and periment promised to provide a fair test of VR’s development activities—the time it takes to garner utility compared to other methods of training. in uential publications—is also vastly outstripped We need not recount the results of that experi- by the pace of change in the technology. At a re- ment here. Suf ce it to say that the results were in- cent government-sponsored workshop on prospects teresting, informative, and to a degree positive: VR for new technologies, a mantram was: in a rapidly did offer some advantages at least in the realm of changing world, the “quickest studies” will win. movement skills training. A report was submitted This is both arguably true and troubling. This fun- to a leading relevant journal under a rubric labeled damental disconnect has negative consequences for “rapid communications.” We were therefore hope- the agenda of human-centered computing HCC, ful for prompt publication of the ndings. The data but it also jeopardizes the realization of the prom- were collected in late 1990, the submission was ise of intelligent systems. Even more broadly, it calls in early 1991, and the accepted revision was ac- into question the notion that science is in the driv- cepted some few weeks later. The eventual publica- er’s seat, that science is cumulative, and that the tion date? 1993! By that time, VR had become just peer review process is viable. warm. Despite the fact that our results were among We start with two stories. Within reason, we try the rst published in an archival journal, two years to refer to these examples independent of any spe- was a long time to wait for a “rapid” communi- ci c identi cation because we want to make clear cation. Like the world, the lead graduate student that these observations are totally unrelated to on the research had by then moved on. It has been individuals or any particular deliberations, deci- gratifying that the work has often been cited, but sions, or speci c journals. we still believe it could have had a greater, broader, and more meaningful impact. A First Story: Technology Begs for Experimental Evaluation Another Story: Drive at Your Own Risk In the late 1980s, virtual reality (VR) became hot. A recent event has served to recapitulate that VR At the cutting edge of visualization and simulation, experience. The technology is Google Glass, and the

62 1541-1672/15/$31.00 © 2015 IEEE IEEE INTELLIGENT SYSTEMS 8 June 2015 Published by thePublished IEEE Computer by the IEEE Society Computer Society 2376-113X/15/$31.00 © 2015 IEEE realm is driving. There is little doubt We wish to make clear these two We have heard it said, going back that distracted driving places lives in stories of ours are neither cases of some years now, that the real purpose peril.2,3 Furthermore, the propensity blame nor sour grapes, since both ef- of journal publications is not to change for drivers to use handheld, carried- forts culminated in useful contribu- the “now” but to inform the next gen- in devices in their vehicles is clearly tions. Currently, the overall process eration. Whether science writ large is snowballing. This combination threat- is what it is. But our two stories are succeeding at this is open for discus- ens to radically increase the number tales of responsibility, heroism, and sion. It is arguably true that perhaps of driving-related injuries and fatali- the systemic abrogation of same. The the most common means by which ties.4 As a result, many innovation de- central question is this: must the pro- published work is utilized is in the sign and technology rms are looking cess of archival publication remain production of a never-ending stream for ways to reduce such distraction, like this, or will such a lag eventu- of literature reviews. This seems to be and this is part of a wider effort in ally challenge the very foundation of a mandatory “Task 1” in most grants the area of wearable computers. Such peer-reviewed science by preventing and contracts. But owing to time and is the innovation of Google Glass. any genuine cumulation of knowl- resource constraints, 60 percent of Quite rightly, we looked to evaluate edge? It is upon this superordinate is- these reviews are too selective to be the use of Google Glass while driving, sue that we focus. of much use, and the other 40 percent and compare it to certain alternative languish in the proprietary and dust- technologies. Implications for HCC covered shelving of contractors. In this effort we were not alone, and The problem of publication priority What all this means for a scienti c the race was on to reach the pages of and relevance has, in a sense, always discipline devoted to human-technol- a leading journal rst—with the ca- been with us. From the time of Dar- ogy interaction is that we stand in veat that proper experiments had to be win and Wallace’s contemporaneous danger of being permanently behind conducted and meaningful and useful publication of the ideas of evolution the use curve. And what that means— results had to accrue. The research of in the organ of the Linnean Society, since research is needed to determine others is just now emerging in the form to the angst expressed by Watson that technology is usable, useful, and of conference proceedings. That counts and Crick over the prospect of be- understandable—is a never-ending as a publication in deciding which com- ing beaten to the structure of DNA stream of user-hostile systems based puter science faculty members get ten- by Linus Pauling, scientists have al- solely on designer-centered design and ure, because (so it is argued) proceed- ways been aware of the importance weak usability analysis.5 ings submissions are said to be heavily of time and precedence. But now the Individual researchers or groups of reviewed. In experimental psychol- intrinsic competition among individ- researchers have reacted to this cur- ogy, only publications in peer-reviewed ual scientists and/or groups has been rent situation in several ways. One journals count. One wonders how a augmented by the accelerating rate of obvious response is to publish work in ve-page paper buried in the morass of technological innovation. We all know faster turnaround outlets such as con- unobtainable proceedings from meet- that technology is cycling at an ever- ference proceedings or nonrefereed ings such as the Fourteenth Somewhat faster frequency. It is almost an axi- communications, or even self-publish International Meeting on Highly Spe- omatic cliché of our business that we online in order to get the word out. cialized Things for Use in Speci c Wid- now illustrate this by referring to a de- One can even present results in popu- gets (FSIMHSTUSW, Timbuktu 2001) funct system such as “eight-tracks” or lar books or via the press that, as the will have any profound impact. “reel-to-reel” tapes. But the very rate cold-fusion debacle showed, prom- By dint of one journal editor’s he- of this replacement has reached such ises to be a rather dysfunctional pro- roic efforts, we managed to get our a precipitate level that the cycle time cess for science. But quo vadis sci- own results published in what must of technology is now faster than the ence in such situations? Evading time be close to record time. Although we publication cycle of almost any main- delays by evading peer review might are more than grateful for this special stream refereed journal. And here is be a pragmatic solution, but eventu- effort, the fact that it was special actu- our professional problem: our primary ally such a solution will erode a crit- ally emphasizes our main point about archival journals cannot now keep ical element of the very raison d’être the fundamental disconnect and ex- pace. By the time that such work ap- of science. Down this road lies the dis- traordinary efforts that individuals pears in our primary archival journals, solution of our unique value, to the must undertake in order to keep up. it is already essentially out of date. detriment of all concerned.

JANUARY/FEBRUARY 2015 www.computer.org/intelligent 63 www.computer.org/computingedge 9 So, if we cannot step around the is- resolve, is whether this lag will be- The only software we need is Microsoft sue, can we shrink the cycle time of come necessarily longer than most Word. HCC essays do not undergo tra- refereed journals? Some sort of cycle life cycles of the discrete technologies ditional time-consuming peer review, time metric is the avor of the week that we look to assess. Here is the but this is not to say that there is no re- in many discussions of journal edito- question that culminates all this: can view. At least one of the HCC depart- rial policy. Such departments as “rapid we use intelligent technology itself to ment editors is an author on each essay, communications” propose to circum- address the core challenge? That is, with the other editors serving as these vent the impasse by shortening the can intelligent systems technologies peers, providing genuine and challeng- journal’s side of the problem, but as subserve cycle matching times? ing editorial comments. Indeed, some we ourselves experienced, this strat- draft essays have been trash-canned egy is ghting uphill. Especially vexing and never saw the light of day. We leave is the introduction of software systems This question brings us to a critical it to others to judge the value and qual- to support journal editing and manu- impasse. If HCC and human factors ity of the HCC essays. script processing. In our experience, engineering are to lead the parade, they The HCC essays present ideas, meth- these have the consequence of turning must be based on a “science of techni- ods, and principles and are not research editors into spreadsheet monitors. In- cal design.” It is salutary to note that, at reports. Thus, it is an apples-to-oranges deed, editors often no longer actually the present time, design is much more contrast with time-to-publication of edit at all. The upshot is the actual bur- an art than a science (when it should research in major journals. That be- dens of editing get shifted over to the be strongly both), and we have no un- ing said, we could easily form an essay reviewers, who themselves must feed equivocal rational, scientic basis upon around a brief report of methods and the beast by placing sanitized, isolated which is found our “device advice” results of research studies. It’s just that statements into webpage templates and other than some nebulous “user accep- such offerings have not appeared (yet). checklists rather than actually digging tance.”4,5,9 Whether a true, quantitative As the saying goes, if you toot your in and annotating manuscripts. ratio-based science of design is a fea- own horn, it will play a single note. As Gandhi might say, “perhaps there sible proposition remains a debatable Would that everyone who has reached is a way out of (this) hell,” which is yet critical question. With such a scien- a certain level of accomplishment had contingent upon theory. Here theory tic yardstick it could then be possible access to rapid publication. Would that represents our proactive stance with to deal with ever shorter cycle times anyone at any level of accomplish- respect to each generation of techni- by being permanently ahead of the ment could quickly publish hot results cal development and innovation. It is curve—an extension of the “envisioned and ideas. Would that all of us actually predicated upon our direct understand- worlds” approach.10 Thus in theory had the time to read all the resulting ing of human physical and cognitive and by theory, this could solve the im- material. capacities, and here we can provide passe we have noted. However, it leaves We welcome your suggestions of top- technological pronouncements about the present pragmatic public problem ics and possibilities of collaboration on what technologies should do (pro- still very much in place. these issues and others in future HCC spective prognostications) as opposed Founded on the envisioned worlds essays. to ever more outdated reactive com- strategy, we have our own notions as ments on what designers have already to how we might approach potential References produced (a retrospective cogitation) solutions.11 However, we solicit the 1. R.R. Hoffman, P. Hancock, and J.M. and then even perhaps discarded. This thoughts of others. If we do not solve Bradshaw, “Metrics, Metrics, Metrics, juxtaposition is reminiscent of the dis- the issue and if our archival sources be- Part 2: Universal Metrics?” IEEE cussions as to whether human factors come simply super uous to the modern Intelligent Systems, Nov./Dec. 2010, engineering, as either a science or pro- technological world, it will not simply pp. 93–86. fession, is doomed to just “clean up af- affect the revenue stream of our profes- 2. P.A. Hancock, M. Mouloua, and ter the parade” versus “having its own sional societies but rather, promises to J.W. Senders, “On the Philosophical parade.”6,7 A theme of HCC is that undermine the nature of science itself. Foundations of Driving Distraction and human factors considerations and re- It has generally taken a month or the Distracted Driver,” Driver Distraction: search should lead the parade.8 two from the time an essay for this de- Theory, Effects and Mitigation, M.A. The empirical embarrassment that partment is in nal draft, undergoes Regan, J.D. Lee, and K.L. Young, eds., we now must face, and must look to peer review, and then appears in print. CRC Press, 2008, pp. 11–30.

64 www.computer.org/intelligent IEEE INTELLIGENT SYSTEMS 10 ComputingEdge June 2015 3. P.A. Hancock, “Driven to Distraction Society, 2001; www.hfes.org/Web in Ergonomics Science, vol. 1, 2001, and Back Again,” Driver Distraction and /PubPages/Howell.pdf. pp. 272–282. Inattention: Advances in Research and 7. D.D. Woods, “Watching People Watch 11. R.R. Hoffman et al., “The Practitioner’s Countermeasures, M.A. Regan, T. Victor, People at Work,” presidential keynote Cycles, Part 2: Solving Envisioned and J. Lee, eds., Ashgate, 2013, pp. 9–25. presentation to the Annual Meeting of World Problems,” IEEE Intelligent 4. P.A. Hancock, “Autobiomimesis: Toward a the Human Factors and Ergonomics Systems, May/June 2010, pp. 6–11. Theory of Interfaces,” presentation at 6th Society, 1999; http://csel.eng.ohio-state International Conference on Automotive .edu/productions/hf99. Peter A. Hancock is Provost Distinguished User Interfaces and Interactive Vehicular 8. P.A. Hancock, “A Stranger in Research Professor, University Trustee Applications (AutoUI 14), 2014; www Paradigms,” Proc. Ann. Meeting of Chair, and Pegasus Professor at the Uni- ..com/watch?v=oIrPd_1GVcI& the Human Factors and Ergonomics versity of Central Florida. Contact him at feature=youtu.be. Soc., 2000. [email protected]. 5. R.G. Bias and R.R. Hoffman, “Where 9. R.R. Hoffman, A. Roesler, and B.M. Is the Rigor in the Field of Usability Moon, “What Is Design in the Context Robert R. Hoffman is senior research sci- Analysis?” IEEE Intelligent Systems, of Human-Centered Computing?” IEEE entist at the Florida Institute for Human Nov./Dec. 2013, pp. 66–72. Intelligent Systems, July/Aug. 2004, and Machine Cognition. Contact him at 6. W.C. Howell, “The Human Factors- pp. 89–95. [email protected]. Ergonomics Parade: A Tale of Two 10. D.D. Woods and S.W.A. Dekker, Models,” presidential keynote “Anticipating the Effects of Technology Selected CS articles and columns presentation to the Annual Meeting of Change: A New Era of Dynamics for Thisare article also originally available appeared for free in at the Human Factors and Ergonomics Human Factors,” Theoretical Issues http://ComputingNow.computer.org.IEEE Intelligent Systems, vol. 30, no. 1, 2015.

NEW Save up to 40% on selected articles, books, STORE and webinars. Find the latest trends and insights for your • presentations • research • events webstore.computer.org

JANUARY/FEBRUARY 2015 www.computer.org/intelligent 65 www.computer.org/computingedge 11 BLUE SKIES

Processing Distributed Internet of Things Data in Clouds

ecent studies by Cisco and IBM show that we generate 2.5 quintillion bytes of data per day, and this is set to explode Lizhe Wang to 40 yottabytes by 2020—that’s 5,200 gigabytes for every Chinese 1,2 Academy of person on earth. Much of this data is and will be gener- Sciences and ated from Internet of Things (IoT) devices and sensors. IoT com- China University of Geosciences prises billions of Internet-connected devices (ICDs) or “things,” each of which can sense, communicate, compute, and potentially actuate, and can have intelligence, multimodal interfaces, physi- Rajiv Ranjan Commonwealth cal/virtual identities, and attributes. ICDs can be sensors, RFIDs, Scientific and social media, clickstreams, business transactions, actuators (such Industrial Research as machines/equipment tted with sensors and deployed for min- Organization ing, oil exploration, or manufacturing operations), lab instruments (such as a high energy physics synchrotron), and smart consumer appliances (TV, phone, and so on).

The IoT vision is to allow IoT Big Data Application Requirements things to be connected anytime, anywhere, with The current generation of IoT big data applica- anything and anyone, ideally using any path, net- tions (such as smart supply chain management, work, and service. This vision has recently given rise syndromic surveillance, and smart energy grids) to the notion of IoT big data applications that are ca- combines multiple independent data analytics pable of producing billions of datastreams and tens models, historical data repositories, and real-time of years of historical data to provide the knowledge datastreams that are likely to be available across required to support timely decision making. These geographically distributed datacenters (both pri- applications need to process and manage stream- vate and public). For example, in a smart supply ing and multidimensional data from geographically chain management IoT application, advanced an- distributed data sources that can be available in dif- alytics provides the next frontier of supply chain ferent formats, present in different locations, and innovation. However, data management in supply reliable at different levels of con dence. chains is challenging because:

12 June 2015 Published by the IEEE Computer Society 2376-113X/15/$31.00 © 2015 IEEE 76 IEEE CLOUD COMPUTING PUBLISHED BY THE IEEE COMPUTER SOCIETY 2325 6095/15/$31.00 © 2015 IEEE

d1blu.indd 76 5/21/15 5:19 PM • datasets span multiple continents and datasets are available across geo- software/middleware stacks. Examples are independently managed by hun- graphically distributed locations. include virtual machine management dreds of suppliers and distributors; systems such as Eucalyptus and Amazon • datasets are updated in real time Despite the requirements posed by IoT Elastic Compute Cloud (EC2); image based on feeds from sensors attached big data applications, the capability of management tools such as the Future- to manufacturing devices and deliv- existing big data processing technologies Grid image repository3; massive data ery vehicles; and and datacenter computing infrastruc- storage/le systems such as Google File • customers express their sentiments ture is limited. For example, they can System (GFS), the Hadoop distributed regarding products via a mix of ven- only process data on compute and stor- le system (HDFS), and Amazon Simple ues such as social media, product age resources within a centralized local Storage Service (S3); and data-intensive review portals, and blogs. area network, such as a single cluster execution frameworks such as Amazon within a datacenter. In addition, they Elastic MapReduce. In addition, Future- Companies must combine and analyze don’t provide mechanisms to seamlessly Grid (http://FutureGrid.org) and Open- this distributed data along with contex- integrate data spread across multiple Stack provide software stack denitions tual factors such as weather forecasts distributed heterogeneous data sources. for cloud datacenters. and pricing positions to establish which factors strongly in uence the demand of particular products and then quick- ly take action to adapt to competitive and evolving environments. Similarly, The IoT vision is to allow things to be syndromic surveillance IoT applica- connected anytime, anywhere, with tions require churning through massive amounts of heterogeneous, real-time in- anything and anyone, ideally using formation available from social media, any path, network, and service. emergency rooms, health departments, hospitals, and ambulatory care sites to detect outbreaks of deadly diseases such as SARS, avian u, cholera, and dengue fever. Finally, they can’t ensure security and On the other hand, private datacen- Clearly, these IoT applications pro- privacy-preserving processing of hetero- ters typically build basic infrastructure duce big datasets that can’t be trans- geneous data governed by heterogeneous services by combining available soft- ferred over the Internet to be processed policies and access control rules. ware tools and services. This software by a centralized public or private data- includes cluster management systems center. The main reasons for this state State of the Art in Distributed IoT such as Torque, Oscar, and Simple of affairs are: Data Processing Utility for Resource Management Existing big data processing technolo- (Slurm); parallel le/storage systems • the datasets have strict privacy, se- gies and datacenter infrastructures have such as storage area network/network- curity, and regulatory constraints varied capabilities with respect to meet- attached storage (SAN/NAS)4 and that prohibit their transfer outside ing the distributed IoT data processing Lustre (http://wiki.lustre.org); as well the parent domain; challenges. as data management systems such as • the datasets ow at a volume and the Berkeley Storage Manager (BeST- velocity too large and too fast to be Datacenter Cloud Computing Man, https://sdm.lbl.gov/bestman) and processed by a single centralized Infrastructure Service Stack dCache (www.dcache.org). In addition, datacenter as it could lead to high Commercial and public datacenters such some private datacenters are enabled network communication overhead; as Amazon Web Services and Micro- for resource sharing with grid comput- and soft Azure provide computing, storage, ing middleware, such as Globus tool- • the analytics models and intel- and software resources as cloud ser- kits, Uniform Interface to Computing ligence required to process the vices, which are enabled by virtualized Resources (Unicore, www.unicore.eu),

www.computer.org/computingedge 13 JANUARY/FEBRUARY 2015 IEEE CLOUD COMPUTING 77

d1blu.indd 77 5/21/15 5:19 PM BLUE SKIES

and Lightweight Middleware for Grid consistency, isolation, durability) PigMix, fueled by the need to analyze Computing (gLite). transactional properties. the performance of different big data technologies. These benchmark suites Massive Data Processing Models and Accordingly, several research efforts model workloads for stress testing one Framework have integrated different cloud data stor- or more categories of big data processing The MapReduce paradigm has been age services by providing a transparent technologies. Among these frameworks, widely used for large-scale data-intensive interface. Examples are Simple Cloud BigDataBench is most comprehensive computing within datacenters due to API (http://simplecloud.com), Simple because it constitutes workload mod- its low cost, massive data parallel- API for Grid Applications (SAGA) with els for NoSQL, database management ism, and fault-tolerant processing. The an SRM interface, and some uniform systems (DBMSs), SPEs (Stream Pro- most popular implementation, Ha- services such as PDC@KTH’s proxy cessing Engines), and batch processing doop framework allows applications service12 and Open Grid Services Ar- frameworks. Primarily, BigDataBench to run on large clusters and provides chitecture Data Access and Integration targets the search engine, social network, transparent reliability and data trans- (OGSA-DAI, www.ogsadai.org.uk) Web and e-commerce application domains. fer. Other implementations include services. In addition, a number of third- However, there are limited bench- Compute Uni ed Device Architecture party providers (DropBox, Mozy, and so marks and application kernels for het- (CUDA),5 eld programmable gate array on) simplify online cloud storage access. erogeneous datacenters. In fact, there’s (FPGA),6 virtual machines,7 as well as no agreement on available performance streaming runtime,8 grid,8 and oppor- Data-Intensive Workflow Computing benchmarking for executing large-scale tunistic environment.9 Apache Hadoop Typical data-intensive scienti c work- IoT applications across distributed data- on Demand (HOD) provides virtual ow frameworks include Pegasus, centers. Actually, the lack of intercent- Hadoop clusters over a large physical Kepler, Taverna, Triana, Swift, and er benchmarks and standards should cluster based on Torque. MyHadoop Trident. Various business workow be the key research agenda for the fu- provides on-demand Hadoop instances technologies have also been applied to ture. Currently, the National Institute on high-performance computing (HPC) data-intensive workow systems. Ex- of Standards and Technology (NIST), resources via traditional schedulers.10 amples include service orchestration Open Grid Forum (OGF), Distributed Other MapReduce-like projects in- with Business Process Execution Lan- Management Task Force (DMTF) Cloud clude Twister (www.iterativemapreduce guage (BPEL) and YAWL (Yet Another working group, Cloud Security Alliance, .org), Sector/Spear (http://sector Workow Language),13 service choreog- and Cloud Standards Customer Council .sourceforge.net), and All-pairs.11 raphy with Web Services Choreography are all working on cloud standards. Description Language (WS-CDL, www Data Management Service across .w3.org/TR/ws-cdl-10), and service- Research Issues Datacenters oriented architectures.14 Big IoT data processing across multiple The following four storage service ab- distributed datacenters remains chal- stractions supported by cloud providers Benchmark, Application Kernels, lenging, mainly because of technical differ in how they store, index, and ex- Standards, and Recommendations issues related to basic service stacks ecute queries: Several benchmarks and application for datacenter computing infrastruc- kernels have been developed, including tures, massive data processing models, • Binary Large Object (Blob) for un- Graph 500 (www.graph500.org), Hadoop trusted data management services, structured data such as Amazon S3 Sort (http://wiki.apache.org/hadoop/Sort) data-intensive workow computing, and and Azure Blob; and Sort benchmark (http://sortbenchmark benchmarks. • key-value storage such as HBase, .org), MalStone,15 Yahoo Cloud Serving MongoDB, and BigTable; Benchmark (http://research.yahoo.com/ Service Stacks in a Multidatacenter • message queuing systems such as Web_Information_Management/YCSB), Computing Infrastructure SQS and Apache Kafka; and Google cluster workload (http://code Despite signi cant advances, public • relational database management sys- .google.com/p/googleclusterdata), TPC-H cloud computing technologies are still tems such as Oracle and MySQL, benchmarks (www.tpc.org/tpch), Big- technically challenging for serving which support ACID (atomicity, DataBench, BigBench, Hibench, and large-scale IoT applications across data-

14 ComputingEdge June 2015 78 IEEE CLOUD COMPUTING WWW.COMPUTER.ORG/CLOUDCOMPUTING

d1blu.indd 78 5/21/15 5:19 PM centers. First, cloud technologies must To process and store massive data- across distributed datacenters. Finally, be integrated into the resource manage- sets across geographically distributed data storage and management servic- ment and le systems of existing private storage services while providing re- es aren’t incorporated in the service- datacenter infrastructures to provision quired quality of service (QoS) guaran- oriented framework for data-intensive cloud services. tees raises several concerns. workow systems. First, current cloud storage services Massive Data Processing Models for aren’t secure by nature because of the Benchmark and Application Kernels Datacenters inherent risk of data exposure, temper- Currently, there’s no agreement on There are several limitations in using ing, and denial of data access. Ensuring available performance for executing MapReduce and Hadoop for large-scale data con dentiality, integrity, and avail- large-scale IoT applications in distrib- distributed massive data processing. ability is a great concern. uted datacenters. Even worse, there First, this framework is limited to com- Another issue concerns the intelli- are currently no intercenter benchmark pute infrastructures within a local area gence to automate the choice of the best and application kernels or standards for network or datacenter, and can’t be di- storage services and network routes for running large-scale IoT applications on rectly used for large-scale IoT applica- optimal application QoS. Existing quanti- distributed datacenters. tions across geographically distributed tative criteria approaches applied optimi- datacenters. Second, MapReduce suf- zation17 and performance measurement fers from performance degradation due techniques18 for selecting cloud services. arge-scale IoT applications need to to the absence of a high-performance Other research focuses on static XML process and manage massive data- parallel and distributed le system that schema matching methods.19 sets across geographically distributed can seamlessly operate across multiple The uncertainty of cloud storage datacenters. These applications need datacenters. Third, MapReduce uses services and network routes in a multiple to be provisioned across multiple data- a task “fork” mechanism that can’t be datacenter environment is another major centers to exploit independent and geo- directly deployed in traditional private concern. Several reactive techniques rely graphically distributed data sources and datacenters with local task managers on service state monitoring and action IT infrastructure. The capability of ex- such as Torque and Globus, not to men- triggering to ensure QoS while adapting isting data processing computing tools tion the lack of security models. Fourth, to run-time variation in resource loading (for example, le systems, MapReduce, the limited semantics of MapReduce and failures.20,21 Some QoS prediction and workow technologies), however, is can’t easily present the diverse paral- methods such as the Network Weather optimized for single datacenter. Future lel patterns of large-scale scienti c Service use both monitoring and fore- research efforts will need to tackle the applications. In addition, MapReduce casting. Another proposed network challenge of provisioning IoT applica- and Hadoop aren’t currently widely QoS-aware approach uses QoS pro ling, tions across multiple datacenters by ex- supported by data-intensive workow modelling, and prediction.22 tending existing big data processing tools systems, although there are some pre- with the ability to process data across liminary efforts.16 Data-Intensive Workflow Computing geographic locations; developing tech- IoT applications typically require dis- niques for ensuring security and privacy Optimized Data Management across tributed processing of data as a work- of sensitive data; and developing intel- Datacenters ow that spans across multiple data ligent techniques for application provi- Several research efforts have integrated processing services and repositories. sioning based on cost, performance, and heterogeneous types of cloud storage Several open source products exist for other QoS requirements. services by providing a transparent in- running data-intensive workows. How- terface. However, these services and ever, current systems suffer from some References interfaces can’t guarantee that data limitations. For example, there’s limited 1. R. Pepper and J. Garrity, “The In- is secured both in motion and at rest, support for workow walk across het- ternet of Everything: How the Net- don’t support automated ranking of erogeneous le systems, such as Lustre, work Unleashes the Bene ts of Big competing storage services, and cannot HDFS, and GFarm. There’s also limited Data,” Global Information Technol- handle uncertainties regarding cloud support for MapReduce task and sub- ogy Report, Cisco, 2014, pp. 35–42; storage services and network routes. workow in data-intensive workows http://blogs.cisco.com/wp-content/

www.computer.org/computingedge 15 JANUARY/FEBRUARY 2015 IEEE CLOUD COMPUTING 79

d1blu.indd 79 5/21/15 5:19 PM BLUE SKIES

uploads/GITR-2014-Cisco-Chapter sources, tech. report, San Diego Ann. Conf. Internet Measurement, .pdf. Supercomputer Center, Univ. of Cal- 2010, pp. 1–14. 2. “Bringing Big Data to the Enter- ifornia, San Diego, 2011. 19. A. Ruiz-Alvarez and M. Humphrey, prise,” IBM, http://www-01.ibm 11. C. Moretti et al., “All-Pairs: An Ab- “An Automated Approach to Cloud .com/software/in/data/bigdata. straction for Data-Intensive Cloud Storage Service Selection,” Proc. 3. J. Diaz et al., “FutureGrid Image Computing,” Proc. IEEE Int’l Symp. 2nd Int’l Workshop Scientic Cloud Repository: A Generic Catalog and Parallel and Distributed Processing Computing (ScienceCloud 11), Storage System for Heterogeneous (IPDPS 08), 2008, pp. 1–11. 2011, pp. 39–48. Virtual Machine Images,” Proc. 3rd 12. I. Livenson and E. Laure, “Towards 20. L.M. Vaquero et al., “Dynamically IEEE Int’l Conf. Cloud Computing Transparent Integration of Hetero- Scaling Applications in the Cloud,” Technology and Science (CloudCom geneous Cloud Storage Platforms,” SIGCOMM Computer Comm. Rev., 11), 2011, pp. 560–564. Proc. 4th Int’l Workshop Data- vol. 41, no. 1, 2011, pp. 45–52. 4. P. Radzikowski, “SAN vs DAS: A Intensive Distributed Computing 21. Z. Shen et al., “CloudScale: Elastic Cost Analysis of Storage in the En- (DIDC 11), 2011, pp. 27–34. Resource Sharing for Multi-Tenant terprise,” Capitalhead, 2008; http:// 13. C. Ouyang, M. Adams, and A.H.M. Cloud Systems,” Proc. 2011 ACM capitalhead.com/articles/san-vs-das Hofstede, “Yet Another Work ow Symp. Cloud Computing, 2011. -a-cost-analysis-of-storage-in-the Language: Concepts, Tool Support, 22. K. Alhamazani et al., “Cloud Moni- -enterprise.aspx. and Application,” Handbook of Re- toring for Optimizing the QoS of 5. B. He et al., “Mars: A MapReduce search on Business Process Modeling, Hosted Applications,” Proc. 4th IEEE Framework on Graphics Processors,” IGI Global, 2009, pp. 92–121. Int’l Conf. Cloud Computing Technol- Proc. 17th Int’l Conf. Parallel Archi- 14. K.K. Droegemeier et al., “Service- ogy and Science, 2012, pp. 765–770. tectures and Compilation Techniques Oriented Environments for Dynami- (PACT 08), 2008, pp. 260–269. cally Interacting with Mesoscale LIZHE WANG is a professor at the In- 6. Y. Shan et al., “FPMR: MapReduce Weather,” Computing in Science stitute for Remote Sensing and Digital Framework on FPGA,” Proc. 18th and Engineering, vol. 7, no. 6, 2005, Earth, Chinese Academy of Sciences, and Ann. ACM/SIGDA Int’l Symp. Field pp. 12–29. at the School of Computer at the China Programmable Gate Arrays (FPGA 15. C. Bennett, R. Grossman, and J. Se- University of Geosciences. Wang has a 10), 2010, pp. 93–102. idman, MalStone: A Benchmark for PhD in computer science from Karlsruhe 7. S. Ibrahim et al., “Cloudlet: To- Data Intensive Computing, tech. report University. He is a senior member of IEEE. wards MapReduce Implementation TR-09-01, Open Cloud Consortium, Contact him at [email protected]. on Virtual Machines,” Proc. 18th 2009; http://malgen.googlecode.com/ ACM Int’l Symp. High Performance les/malstone-TR-09-01.pdf. RAJIV RANJAN is a senior research Distributed Computing (HPDC 09), 16. J. Wang, D. Crawl, and I. Altintas, scientist, Julius Fellow, and project 2009, pp. 65–66. “Kepler + Hadoop: A General Archi- leader at the Commonwealth Scientic 8. S. Pallickara, J. Ekanayake, and tecture Facilitating Data-Intensive and Industrial Research Organization. G. Fox, “Granules: A Lightweight, Applications in Scientic Work- At CSIRO, he leads research projects re- Streaming Runtime for Cloud Com- ow Systems,” Proc. 4th Workshop lated to cloud computing, content deliv- puting with Support for Map-Reduce,” Work ows in Support of Large- ery networks, and big data analytics for Proc. Cluster Computing and Work- Scale Science (WORKS 09), 2009; Internet of Things (IoT) and multimedia shops (CLUSTER 09), 2009, pp. 1–10. doi:10.1145/1645164.1645176. applications. Ranjan has a PhD in com- 9. H. Lin et al., “Moon: MapReduce 17. M. Hajjat et al., “Cloudward Bound: puter science and software engineering on Opportunistic Environments,” Planning for Benecial Migration from the University of Melbourne. Con- Proc. 19th ACM Int’l Symp. High of Enterprise Applications to the tact him at [email protected]. Performance Distributed Computing Cloud,” ACM SIGCOMM Computer (HPDC 10), 2010, pp. 95–106. Comm. Rev., vol. 40, no. 4, 2010, pp. 10. S. Krishnan, M. Tatineni, and C. 243–254. This articleSelected originally CS articles appeared and columns in Baru, MyHadoop—Hadoop-on- 18. A. Li et al., “CloudCMP: Comparing are also available for free at http:// IEEE ComputingNow.computer.org.Cloud Computing, vol. 2, no.1, 2015. Demand on Traditional HPC Re- Public Cloud Providers,” Proc. 10th

16 ComputingEdge June 2015 80 IEEE CLOUD COMPUTING WWW.COMPUTER.ORG/CLOUDCOMPUTING

d1blu.indd 80 5/21/15 5:19 PM ATTACK TRENDS Editor: orsten Holz, [email protected]

ese techniques have o en been Information Hiding neglected by the security commu- nity, but are widely used to exl- trate data and make security threats as a Challenge for stealthier by postponing their detec- tion for as long as possible. Information hiding is part of a Malware Detection wide spectrum of methods that are used to make data dicult to notice. is practice shouldn’t be Wojciech Mazurczyk | Warsaw University of Technology confused with encryption, in which Luca Caviglione | National Research Council of Italy the content is unreadable, as it is instead overt. Such mechanisms are o en used jointly to ensure that a conversation remains unreadable. Steganography is one of the most e’re experiencing an expo- cybercriminals for prot. Instead, well-known subelds of informa- W nential growth in mali- they’re thought to have been cre- tion hiding and aims to cloak secret cious so ware. According to the ated by nation-states to spy on a data in a suitable carrier. Historical antivirus research rm AV-TEST, wide range of international targets examples include the use of taoos 2014 saw approximately 130 mil- and eventually launch aacks if nec- or invisible ink to hide a conversa- lion new forms of malware, com- essary. Regin has been used since at tion from unauthorized observers.2 pared to just over 80 million in 2013 least 2008 to spy on several inter- Typically, to exchange secrets, and about 30 million in 2012 (www national targets including govern- the involved parties must agree on .av-test.org/en/statistics/malware). ment and business organizations, a preshared scheme and embed the Although the inux of malware infrastructure operators, research- secrets in a carrier: the greater the has drawn the aention of security ers, and private individuals. Its six- carrier’s popularity, the beer its experts worldwide, the counter- year period of hidden activity raises masking capacity. Too many altera- measures that are currently avail- the question: How can malware tions would reveal the presence able are progressively showing their developers avoid detection for long of hidden information, thus limit- limitations. For example, Symantec, periods of time? ing the amount of data that can be one of the largest antivirus vendors, covertly transmied. For example, recently admied that its products Information Hiding using too many least signicant bits are able to detect only approxi- Providing a clear answer is dicult, (LSBs) of an image’s pixels as the mately 45 percent of new threats.1 but the most common arguments carrier can reveal the secret data due As a result, we should expect a rel- consider the increasing degree of to visible artifacts. Onkar Dabeer evant increase in the number of sophistication of new threats, such and his colleagues’ “Detection of undiscovered types of malware. as modular design to enable cus- Hiding in the Least Signicant Bit” Consider the case of the Regin tomization (seen in Regin, Flamer, shows a representative method of Trojan, called a “top-tier espionage and Weevil) or multistage loading detecting this scheme.3 tool” by Symantec and other secu- architectures in which each stage Networks play an important rity companies. e sophistication is hidden and encrypted (seen in role in modern malware, mak- of Regin and other malware such Regin, Stuxnet, and Duqu). In this ing network steganography a cru- as Flame, Duqu, and Stuxnet leads article, we highlight the importance cial tool: in this case, the secret is industry experts to believe that of understanding information- injected into network trac. For they weren’t created by “typical” hiding techniques in malware. example, the data can be cloaked by

2376-113X/15/$31.00 © 2015 IEEE Published by the IEEE Computer Society June 2015 17 1540-7993/15/$31.00 © 2015 IEEE Copublished by the IEEE Computer and Reliability Societies March/April 2015 89 ATTACK TRENDS

manipulating the content of unused information hiding–capable mal- malware is according to the meth- ags within headers or by modulat- ware include Regin and Linux. odology used to implement covert ing the inter-packet time (IPT) of Fokirtor, which use network trac communications. As such, we intro- network ow datagrams. In the lat- to covertly leak data, and Alureon, duce three major groups: ter case, a sender can encode bits of Duqu, Lurk, and Trojan.Zbot, information in previously agreed- which use digital images as hid- ■ group 1methods that hide on IPT values. Similar to the LSB den data carriers. Even when rudi- information by modulating the example, overly aggressive devia- mentary, new threats exploiting status of shared hardware/so- tions would make it possible to dif- some form of information hiding ware resources, ferentiate the hiding process from continue to be discovered, as seen ■ group 2methods that inject normal jier events. erefore, hid- in Soundcomber and AirHopper, secret data into network trac, and den channels are typically charac- which modify the status of shared ■ group 3methods that embed terized by a low bandwidth, oen hardware/soware resources to secret data by modifying a digi- ranging from a few to a few hundred exltrate condential data, and in tal le’s structure or using digital bits per second. Feederbot, W32.Morto, and Smug- media steganography, for exam- Today, many other methods gler, which manipulate network ple, by manipulating image pixels enable covert communications trac for this purpose. or sound samples. among desktops or digital devices, Smartphones are beer suited including generating inaudible than desktops to exploit informa- Groups 2 and 3 contain tech- sounds or utilizing a smartphone’s tion hiding because they natively niques that are primarily used to sensors to receive a sequence that incorporate cameras, GPS, WLAN, increase the stealthiness of com- activates a threat. Malware can use , cellular networks, and munications carrying commands or information-hiding techniques to other various sensors.6 Even when leaked data that are mainly observed cloak its existence, making it harder using legacy general packet radio in malware-targeting desktops. to detect. Having a beer under- service or connectivity with band- Group 1 includes mechanisms that standing of these types of malware width scarcityin which case, bypass a security perimeter, such as will help security professionals data leaking could be very slow or a sandbox, or enable communica- detect, mitigate, and prevent aacks. impracticablethe availability of tions from or to an isolated source dierent carriers could provide an or destination, for example, two dis- Roots of the New Trend eective workaround. Furthermore, connected devices located on the Advancements in security systems aer their success with desktops, same workbench. In this case, the over the past 15 years have forced malware developers turned a sig- prime targets are smartphones and malware developers to investigate nicant portion of their aention to mobile devices. In Table 1, desktop new possibilities to make their mobile devices, leading to a 1,800 and mobile refer to the malware “products” stealthier. Although it’s percent increase in mobile malware format. Real-life malware refers to dicult to determine the origin of over the past two years, as reported actual malware that’s been discov- information-hiding techniques, the by McAfee.7 reats using infor- ered, and academic malware refers rst massive usage of these tech- mation hiding on mobile platforms to proof-of-concept malware pro- niques can be traced back to 2006, could be the next great challenge for posed by the academic community. when Operation Shady T led to security researchers. Next, we describe what we con- aacks against numerous institu- sider the three most meaningful tions worldwide and in icted dam- Information-Hiding examples for each group. age for months.4 Years later, security Malware: A Classification experts agreed that the main pro- Nearly all information hiding– Group 1 gram responsible for this aack was capable malware was discovered Researchers’ increasing aention the phishing virus Trojan.Down- between 2011 and 2014, with a peak combined with Android’s open bot.5 is virus created a back door in 2014. Table 1 shows the most source nature has allowed the and then downloaded les appear- popular types and proof-of-concept development of many instances ing as real HTML pages or JPEG implementations proposed by the of proof-of-concept information images. ese les were encoded research community. However, we hiding–capable mobile malware. A with commands that would allow consider only examples that are prime example is Soundcomber,8 remote servers to gain access to local suciently mature to be deployed which covertly transmits the but- les on the infected host computer. in real scenarios. A convenient way tons pressed during a call, for Other notable examples of to organize existing hiding-capable example, when entering a PIN for

18 ComputingEdge June 2015 90 IEEE Security & Privacy March/April 2015 Table 1. e most popular and recent information hiding–capable malware.

Malware name or developers Group Discovery/ Desktop (D) Real-life (R) or proposal date or mobile (M) academic (A) malware Soundcomber 1, 2 Feb. 2011 M A Trojan.Downbot 3 May 2011 D R Feederbot 2 Aug. 2011 D R W32.Morto 2 Aug. 2011 D R Alureon 3 Sept. 2011 D R Duqu 3 Sept. 2011 D R Gasior and Yang14,15 2 Oct. 2011/Dec. 2012 M A Trojan:Android/FakeRegSMS.B 3 Jan. 2012 M R Marforio and his colleagues16 1 Dec. 2012 M A Sensor- based malware 1 May 2013 M A KINS Trojan (variant of Zeus) 3 June 2013 D R Linux.Fokirtor 2 Sept. 2013 D R Lalande and Wendzel17 1 Sept. 2013 M A Inaudible sound- based malware 1 Nov. 2013/Aug. 2014 D/M A Lurk 3 Feb. 2014 D R Trojan.Zbot 3 Mar. 2014 D R Oldboot.B 3 Apr. 2014 M R AirHopper 1 Oct. 2014 D/M A Smuggler18 2 Nov. 2014 D/M A Multilayer .NET malware 3 Nov. 2014 D R Regin 2 Nov. 2014 D R

a bank service. Notably, it uses that controls the screen state), and but the rate is in the range of 100 to information hiding to bypass the le locks (secret data is exchanged 500 bits per second. security framework of mobile OSs. between the processes by compet- Finally, in “Sensing-Enabled In fact, the malware could have ing for a le lock). Channels for Hard-to-Detect insu cient privileges to access the As we mentioned, another rel- Command and Control of Mobile network to exltrate data, so it can evant eld in which information Devices,” Ragib Hasan and his col- use a “colluding” application to hiding can be used is the covert leagues demonstrate a method to leak data outside the device. transmission of data from and to trigger aacks on a large population Soundcomber utilizes several devices that are physically isolated of infected smartphones in the same information-hiding methods to form from other peers. For instance, geographic area.11 Latent malware four local covert channels whose Luke Deshotels uses standard could be activated by using built-in range is limited to the single device. smartphone speakers to transmit sensors listening to ad hoc hidden e covert techniques exploit the data via ultrasonic sounds.9 is stimuli, such as a song with a partic- most popular smartphone function- technique can cover distances up ular paern, vibrations from a sub- alities such as vibration or volume to 30 meters with a rate of 9 bits woofer, or the ambient light from a seings (one process dierenti- per second. Similarly, AirHopper TV or a monitor. ates vibration or volume status, and enables infected devices to commu- another infers secret data bits from nicate by modulating the graphics Group 2 this event), screen state (secret bits processing unit load to emit elec- In 2011, Symantec announced are transferred by acquiring and tromagnetic signals.10 In this case, the discovery of the worm W32. releasing the wake-lock permission the coverage is reduced to 7 meters, Morto, which propagates using a www.computer.org/computingedge 19 www.computer.org/security 91 ATTACK TRENDS

vulnerability in the remote desk- System Security in Budapest, Hun- Future Trends top protocol. To communicate with gary, discovered malware generating Due to the rich availability of command and control (C&C), it strange les with the pre x “~DQ”; options and the masking features uses domain name system (DNS) as a result, it was named Duqu.13 oered by the massive utilization records. Speci cally, W32.Morto It bears many resemblances to the of the Internet, malware developers exploits the TXT record, which was famous Stuxnet worm, which was could nd the highest potential in originally introduced to contain text likely developed to aack Iran’s network steganography. Although readable by humans. W32.Morto nuclear infrastructure. Duqu is gen- early steganographic techniques queries for a DNS TXT record (not erally considered the precursor to focused only on modifying unused for a domain to IP lookup), and then a future Stuxnet-like aack. Duqu’s elds of TCP/IP headers (such as validates and decrypts the returned main aim is to gather information the type of service eld of IPv4, data. e obtained information typ- about industrial control systems. To which is rarely set by routers), more ically yields a binary signature and ex ltrate secrets, it encrypted data, recent and sophisticated methods an IP address where the worm can which was appended at the end of include, but aren’t limited to, the retrieve another malware to execute. innocent digital images and then exploitation of ows produced by e recently identi ed Linux. sent over the Internet to a C&C popular services such as and Fokirtor is a Trojan virus that opens server. is approach postponed BitTorrent. Furthermore, network a back door and allows aackers the worm’s detection because the trac produced by popular online to remotely compromise a host. images containing leaked infor- games can be used to covertly Symantec reported that the malware mation were hidden in the bulk of exchange data, even in devices with was utilized in May 2013 to aack actual digital pictures. In the same limited capabilities, such as gaming one of the largest hosting providers period, a variant of Alureon used a consoles. In fact, the signaling used and focused on stealing con dential comparable technique. to locate players in a rst-person customer information such as cre- In February 2014, malware shooter game can be an eective dentials and emails.12 As cybercrimi- called Lurk was found spreading carrier. To this end, some bits of the nals realized that their target network via websites using or an set of coordinates and angles can be was generally well protected, they Adobe Flash exploit. A thorough used to hide data.3 hid malware communications in analysis revealed the use of stegan- In addition, because smart- an innocent secure shell and other ography to embed encrypted URLs phones are complete computing server process network trac. In in an image by manipulating pixels. platforms, they can leverage all the addition to this information-hiding Such information is then used to techniques presented in this arti- technique, Linux.Fokirtor used the retrieve an additional payload. cle and combine them with a rich Blow sh encryption algorithm to Another approach uses a variant set of sensors, oering essentially cipher stolen data or other commu- of the Trojan.Zbot malware, which unlimited options for covertly com- nications with its C&C server. was rst detected in 2014. is ver- municating with the surrounding In November 2014, Regin took sion downloaded innocent-looking environment. From this perspec- malware stealthiness a step fur- JPEG images depicting sunsets tive, we can envision the following ther. It utilized many sophisticated or cats that contained a list of IP future trends: mechanisms, including antiforen- addresses to be inspected, mainly sics capabilities, a custom-built pointing at nancial institutions. ■ New information-hiding tech- encrypted virtual le system, and an Once users visit any of the listed niques will be continually alternative encryption (RC5 vari- destinations, the malware proceeds introduced, and their degree ant). It also exploited information to steal their con dential informa- of sophistication will increase. hiding in network trac to covertly tion, such as access credentials. Hence, future malware-related communicate with its C&C server Regin, Duqu, and Lurk are trac could be harder to detect. by tunneling secrets in Internet real-life examples of what security ■ Information hiding oers a Control Message Protocol/ping experts should expect to see daily decoupled design. erefore, it trac and embedding commands in the future. In fact, even if the can be easily incorporated into in HP cookies or in custom TCP information-hiding methods uti- every type of malware to provide segments and UDP datagrams. lized in current and future malware stealthy communication of both aren’t yet very sophisticated, they control commands and the ex l- Group 3 could become dangerous in the tration of con dential user data as In the second half of 2011, the next few years if state-of-the-art aca- well as communication from iso- Laboratory of Cryptography and demic solutions are considered. lated environments or networks.

20 ComputingEdge June 2015 92 IEEE Security & Privacy March/April 2015 ■ Information hiding–capable mal- Response, 24 May 2011; www. 15. W. Gasior and L. Yang, “Exploring ware can remain cloaked for a symantec.com/security_response Covert Channel in Android Plat- long period of time while slowly /writeup.jsp?docid=2011- 052413 form,” Proc. Int’l Conf. Cyber Secu- but continuously leaking sensitive - 1248-99. rity, 2012, pp. 173–177. user data. us, this type of mal- 6. W. Mazurczyk and L. Caviglione, 16. C. Marforio et al., “Analysis of the ware must be considered a new “Steganography in Modern Smart- Communication between Collud- advanced persistent threat and phones and Mitigation Techniques,” ing Applications on Modern Smart- must be addressed properly. IEEE Comm. Surveys & Tutorials, phones,” Proc. 28th Ann. Computer 2014, doi: COMST.2014.2350994. Security Applications Conf. (ACSAC 7. “McAfee Labs reat Report,” Aug. 12), 2012, pp. 51–60. long-term solution to these 2014; www.mcafee.com/uk/resour 17. J. Lalande and S. Wendzel, “Hiding A trends is to consider the ces/reports/rp- quarterly- threat Privacy Leaks in Android Applica- potential vulnerabilities enabling - q2- 2014.pdf. tions Using Low- Aention Rais- covert communications from the 8. R. Schlegel et al., “Soundcomber: A ing Covert Channels,” Proc. 8th very early design phases of desk- Stealthy and Context- Aware Sound Int’l Conf. Availability, Reliability top and mobile platforms, services, Trojan for Smartphones,” Proc. Net- and Security (ARES 13), 2013, pp. and protocols. For existing devices, work and Distributed System Security 701–710. especially smartphones, a short- Symp., 2011, pp. 17–33. 18. T. Neaves, “SmugglerAn Interac- term approach would require some 9. L. Deshotels, “Inaudible Sound tive 802.11 Wireless Shell without form of ad hoc mitigation, at least as a Covert Channel in Mobile the Need for Authentication or for the most hazardous threats. Devices,” Proc. 8th USENIX Conf. Association,” blog, Trustwave Spi- However, this a posteriori approach O ensive Technologies (WOOT 14), derLabs, 3 Nov. 2014; hp://blog is very dicult because there aren’t 2014, p. 16. .spiderlabs.com/2014/11 yet any universal countermeasures. 10. M. Guri et al., “AirHopper: Bridging /smuggler-an- interactive-80211 We hope that raising awareness and the Air- Gap between Isolated Net- - wireless- shell- without- the- need understanding of these information- works and Mobile Phones Using - for- authentication- or- association hiding techniques will help research- Radio Frequencies,” Proc. 9th Int’l .html. ers and security experts develop the Conf. Malicious and Unwanted So- necessary countermeasures. ware (MALWARE 14), 2014, pp. Wojciech Mazurczyk is an associate 58–67. professor at the Institute of Tele- References 11. R. Hasan et al., “Sensing- Enabled communications in the Faculty 1. D. Yardon, “Symantec Develops Channels for Hard-to- Detect of Electronics and Information New Aack on Cyberhacking,” Wall Command and Control of Mobile Technology at the Warsaw Uni- Street J., May 2014; www.wsj.com Devices,” Proc. 8th ACM SIGSAC versity of Technology. He’s also /articles/SB100014240527023034 Symp. Information, Computer and an associate technical editor for 17104579542140235850578. Communications Security (ASIA IEEE Communications Magazine. 2. E. Zielińska, W. Mazurczyk, and K. CCS 13), 2013, pp. 469–480. Contact him at wmazurczyk@ Szczypiorski, “Trends in Steganog- 12. “Linux Back Door Uses Covert tele.pw.edu.pl. raphy,” Comm. ACM, vol. 57, no. 3, Communication Protocol,” Syman- 2014, pp. 86–95. tec Security Response, 13 Nov. Luca Caviglione is a researcher at the 3. O. Dabeer et al., “Detection of Hid- 2013; www.symantec.com/connect National Research Council of Italy. ing in the Least Signicant Bit,” /blogs/linux- back- door- uses- covert He holds several patents and is an IEEE Trans. Signal Processing, vol. - communication- protocol. associate editor of Wiley’s Transac- 52, no. 10, 2004, pp. 3046–3058. 13. B. Bencsáth et al., “Duqu: A tions on Emerging Communications 4. E. Nakashima, “Report on ‘Opera- Stuxnet- Like Malware Found in the Technologies. Contact him at luca tion Shady T’ Identies Wide- Wild,” tech. report v0.93, 14 Oct. [email protected]. spread Cyber- Spying,” Washington 2011; www.crysys.hu/publications Post, 3 Aug. 2011; www.washington /les/bencsathPBF11duqu.pdf. post.com/national/national- security 14. W. Gasior and L. Yang, “Network /report- identies- widespread- cyber Covert Channels on the Android -spying/2011/07/29/gIQAoTU Platform,” Proc. 7th Ann. Work- Got an idea for a future article? This article originally appeared in mqI_story.html. shop Cyber Security and Information Email editor orsten Holz ([email protected]).IEEE Security & Privacy, vol. 13, no. 2, 2015. 5. É. Young and E. Ward, “Trojan. Intelligence Research (CSIIRW 11), Downbot,” Symantec Security 2011, article 61. www.computer.org/computingedge 21 www.computer.org/security 93 INDISTINGUISHABLE FROM MAGIC

Flexible Displays, Rigid Designs?

Kasper Hornbæk, University of Copenhagen

Rapid technological progress has enabled a wide range of flexible displays for computing

devices, but the user experience—which we’re Academic and commercial re- only beginning to understand—will be the key searchers have recently made sub- stantial progress in meeting some driver for successful designs. of the technical challenges of ex- ible displays. Equally important, but less well understood, are the isplay technology has undergone signicant technology’s benets to users, as human–computer in- change over the years. However, despite major teraction (HCI) experts have produced few user studies of improvements in image resolution, color exible displays. Beyond some obvious applications, the rendering, energy eciency, interactivity, and question therefore remains: how might people employ Dother features, the rigid form factor of traditional displays exible displays? continues to limit the portability and use of computing and communication devices. TYPES OF FLEXIBLE DISPLAYS Emerging exible displays promise to mitigate these Flexible displays became technically feasible in the Ž‘’“s limitations. In contrast to CRT and LCD displays, exible with the development of e-paper using organic light- displays are thin and pliable, enabling them to be bent, emitting diodes (OLEDs), but it wasn’t until a decade ago folded, stretched, crumbled, twisted, rolled up, and even that researchers developed cost-e•ective prototypes. cut. With a exible display, you could physically expand it Since then, research has rapidly progressed. Currently, to see an entire document. Your large-screen phone would three types of exible displays—passive, sensing, and always t in your pocket, and you could change its shape actuated— have either hit the market or are under devel- to wrap around your arm when exercising. opment in commercial or academic labs.

22 June 2015 Published by the IEEE Computer Society 2376-113X/15/$31.00 © 2015 IEEE 92 COMPUTER PUBLISHED BY THE IEEE COMPUTER SOCIETY 0018-9162/15/$31.00 © 2015 IEEE EDITOR ANTTI OULASVIRTA INDISTINGUISHABLE FROM MAGIC Aalto University; antti.oulasvirta@aalto.fi

Passive Passive exible displays allow only simple deformations. These defor- “INDISTINGUISHABLE FROM mations are xed at the time of man- ufacture in existing consumer prod- MAGIC”: EXPLORING EMERGING ucts, such as curved Samsung K INTERACTIVE TECHNOLOGIES UHD (ultra high denition) TVs (www .samsung.com/us/video/uhd-tv) and Antti Oulasvirta, Aalto University the LG G Flex phone (www.lg.com /us/mobile-phones/gex). Concepts rthur C. Clarke stated that “any sufficiently advanced technology is like the Nokia Morph (http://research Aindistinguishable from magic.” This oft-repeated “third law of technology” .nokia.com/morph) will also let users alludes to the fantastical ways we expect computers to work for and with us—with bend and reshape the display to make the flick of a wand. the device wearable. However, none of The motivation for this new bimonthly Computer column is an inconvenient these devices senses deformations or truth: despite enormous investments and high public expectations, many—too manipulations. many—long-awaited technological breakthroughs haven’t yet occurred. One need The key challenge of passive ex- look no further than the interfaces of everyday computing devices: some, like ible displays is scalability to enable menus, hypertext, and buttons, have been around for decades, while others, such wall-size displays and devices whose as the qwerty keyboard, are centuries old. entire surface is a display. Startups like Why have the promising visions of virtual reality, speech control, and smart Canatu (www.canatu.com) and Kate- homes not yet been realized? Should we have been able to predict which technol- eva (http://kateeva.com) are exploring ogies didn’t even have a chance of becoming indistinguishable from magic? this challenge. Sometimes the reasons for a slow start are technological, like low recogni- tion accuracy in the case of speech interfaces. Often, however, the reasons have Sensing deeper social and psychological roots, as the problems with Google Glass show. Sensing exible displays can be bent, Indeed, interactive design problems can’t be solved by traditional computer sci- stretched, and otherwise deformed ence and engineering alone. by the user, and those deformations The goal of this column is to create a forum that goes beyond the hype of can be sensed and used as input. The emerging interactive technologies to explore both technical and human-related PaperPhone, shown in Figure ‹a, has challenges. If you’re interested in contributing to this discussion, please send an e-paper display and an array of bend column submissions or suggestions for future topics to me at antti.oulasvirta@ sensors on the back that allows users aalto.fi. to bend the corner of the phone to take calls or answer messages.‹ Another ANTTI OULASVIRTA is an associate professor in the Department of Communications and Networking at Aalto University, Finland. His research example is Gummi, a prototype com- interests include user interfaces, human–computer interaction, human per- puter that lets users supplement touch formance, and using predictive models and optimization methods to design input with bending and stretching.Ž interactive tasks. Contact him at antti.oulasvirta@aalto.fi. A major challenge in realizing these types of displays is combining pliability with sensing, even for sim- ple touch input. FlexSense is a trans- parent surface that can sense complex will enable a range of novel on-body rods that can move up and down to deformations on or above a display.’ user interfaces. create a display that is part projected, Another challenge is making displays part physical.™ Commercially, an that can stretch and be worn directly Actuated Apple Ž˜‹˜ patent describes “a shape- on the skin. Recent progress toward Actuated exible displays can bend, changeable surface that can selec- this goal has been made with iSkin, fold, or otherwise deform on their tively alter according to an input so a thin, touch-sensitive, stretchable own. MIT researchers have devel- as to provide changeable topography sensor that can be a”xed to the skin. oped inFORM, shown in Figure ‹b, a of the user interface” (www.google Combining such sensors with displays surface comprised of —˜˜ motorized .com/patents/USŽ˜‹˜˜‹œŽ‹˜—),

www.computer.org/computingedge 23 MARCH 2015 93 INDISTINGUISHABLE FROM MAGIC

consumer needs and expectations. The EU-funded GHOST project (www .ghost-fet.com) brings together teams from the University of Copenhagen in Denmark, the University of Bristol and Lancaster University in the UK, and Eindhoven University of Technology in the Netherlands to explore “generic, highly organic shape-changing tech- nology” (hence the project acronym) (a) (b) with a focus on how users interact Figure . Two types of flexible displays. (a) Sensing flexible displays like the Paper- with such technology, including ex- Phone can be deformed by the user, and those deformations can be sensed and used ible displays. as input. Image source: B. Lahey et al., “PaperPhone: Understanding the Use of Bend Two example user studies from the Gestures in Mobile Devices with Flexible Electronic Paper Displays,” Proc. SIGCHI Conf. project highlight the importance of Human Factors in Computing Systems (CHI ‰‰), Š‹‰‰, pp. ‰Œ‹Œ–‰Œ‰Š. (b) Actuated user research. In one study, user expe- displays like the inFORM can change shape on their own. Image source: S. Follmer et riences with simulated elastic dis- al., “inFORM: Dynamic Physical Affordances and Constraints through Shape and Object plays inspired novel design ideas. The Actuation,” Proc. th Ann. ACM Symp. User Interface Software and Technology (UIST other study revealed that conventional ‰Œ), Š‹‰Œ, pp. •‰––•Š—. design parameters might be too rigid for actuated displays.

ELASTIC DISPLAYS ALLOW EASY 3D MANIPULATION Touch screens are now widely deployed, but what if you could also poke, pinch, twist, or slap a display? Elastic displays aren’t yet techni- cally possible, but a GHOST team led by Giovanni Troiano obtained inter- esting data by simulating an elastic Figure . A simulated elastic display from a study examining what gestures users display using Lycra and a commodity would perform on the display in response to a set of common computing tasks. One projector and then studying users’ promising use of this technology is ŒD object manipulation (right). reactions to it.š Troiano asked ›Œ participants to show gestures they would perform and Tactus Technology (http:// can morph themselves into partic- on the display in response to a set of tactustechnology.com) has demon- ular shapes while allowing users to tasks, as Figure ž illustrates. The tasks strated how to make physical buttons manipulate them. included selecting an object, navigating appear and disappear on touch dis- among views on a map, changing the plays. Not only will actuation allow USING FLEXIBLE DISPLAYS view of a ŸD drawing, and other com- new forms of physical display, it will Technology is only one of the chal- mon interactions. In HCI research, such also enable symmetric displays that lenges in realizing a successful exi- guessability or elicitation studies can can both be deformed and also deform ble display. Just as important, but less help identify preferred modes of inter- themselves: input can become output familiar to developers, is the value action that would be good candidates and vice versa. such a display o‚ers to users. Such for implementing in actual interfaces. Combining display technology value isn’t always obvious, as one The study produced ¡¢Ÿ gestures, with actuation presents many tech- CNET reporter lamented in a review of and the researchers observed many nical challenges. Promising direc- the Round: “A curved common uses of depth in the tasks. tions include very small mechan- display itself is not really a beneŠt to For instance, when asked to rotate, ically actuated displays such as consumers.”Œ displace, and deform ŸD objects, par- Morphees and using programmable HCI researchers often employ user ticipants treated the objects as if they matter such as claytronics. The long- studies to determine what prospec- were physical by grabbing, pushing, term goal is to create displays that tive technologies would best match pulling, and twisting the display. The

24 ComputingEdge June 2015 94 COMPUTER WWW.COMPUTER.ORG/COMPUTER researchers also observed a few imag- inative interactions that could be implemented in future displays: some participants pinched a map to zoom

in on it, used the display’s elasticity Notication to simulate a slingshot, or reached behind the display and pulled a virtual object to move it farther away. Overall, the study revealed that an elastic display would enable a vari- ety of novel interaction techniques, including gesture recognition on both Hand approach sides of a display and pushing/pulling as an alternative to tapping. It also Figure . Example shape-changing design parameter in a hypothetical actuated suggested several natural gestures for display. The phone automatically curls up to notify the user of an incoming call or text changing a display’s depth. message and when the user approaches it to make it easier to pick up—a behavior that some participants in a user study found appealing and others found creepy. SHAPE CHANGE PREFERENCES ARE TASK DEPENDENT Curiously, the speed of shape apid technological progress in There has been little research on the changes had minimal impact on the recent years has made ’exible experience of interacting with actu- study participants’ experiences. This Rdisplays possible, enabling a ated displays, and the data available was unexpected, as previous ’exi- wide range of new forms of interac- are based on simple prototypes that ble display studies found that users tion. However, it’s the user experience cover only a fraction of the actuation favored some technologies (for exam- that will ultimately be the selling point possibilities. To address this de- ple, pneumatics and motors) over and key driver for successful designs. ciency, Esben W. Pedersen and his others (for example, smart-mem- Researchers must expend as much GHOST colleagues created „ videos ory alloys) because of their faster time and eŠort understanding these of a shape-changing phone by sys- response rates. experiences as they now spend explor- tematically varying seven design The free-text descriptions yielded ing the technology itself. Only in parameters, including area, curva- many important insights. One par- this way will they be able to identify ture, and amplitude. They asked ‡ˆ ticipant was particularly enthusi- which features—such as ˜D model- participants to watch these videos and astic about a phone display whose ing through deformation, and display respond using both rating scales and area automatically expanded and shape changes actuated by particular free text.‰ The rating scales made it retracted: “If a phone could grow application or user needs—developers possible to assess participants’ emo- that big and then go back I would pay should focus on as well as to discover tional reactions to and perceptions of crazy amounts of money for it!” Actu- novel interaction capabilities that can the device, while the free-text descrip- ated curvature, shown in Figure ˜, be the basis for future research. tions allowed open-ended analysis of invited both positive interpretations the participants’ experiences across (“standing on two legs waiting to be the many design variations. picked up”) and negative ones (“seem- REFERENCES The participants’ experience of ing to bite at the hand”). . B. Lahey et al., “PaperPhone: Under- shape change was surprisingly com- Although seeing videos of a device standing the Use of Bend Gestures plex. There were large and signicant isn’t the same as actually holding and in Mobile Devices with Flexible Elec- diŠerences in ratings of the design interacting with one, the study showed tronic Paper Displays,” Proc. SIGCHI parameters—for example, users pre- the promise of actuated ’exible dis- Conf. Human Factors in Computing ferred curvature to amplitude vari- plays: participants were uniformly Systems (CHI ), ¡¢ , pp. ˜¢˜– ˜ ¡. ability. In addition, hedonic quality positive about adding the third dimen- ¡. C. Schwesig, I. Poupyrev, and E. Mori, (for example, stylish or inspiring) was sion to otherwise ’at phones. Actu- “Gummi: A Bendable Computer,” inversely related to urgency, and some ated displays could give rise to novel Proc. SIGCHI Conf. Human Factors in shapes were perceived as ugly yet use- and varied forms of interaction, such Computing Systems (CHI ¢¤), ¡¢¢¤, ful. These ndings suggest that shape- as phones that adapt their shape to the pp. ¡¥˜–¡ˆ¢. change preferences for a phone are app being used or, say, in the case of ˜. C. Rendl et al., “FlexSense: A Trans- highly task-dependent. text notications, the sender’s identity. parent Self-Sensing Deformable www.computer.org/computingedge 25 MARCH 2015 95 INDISTINGUISHABLE FROM MAGIC

Surface,” Proc. th Ann. ACM Symp. ›. A. Roudaut et al., “Morphees: Toward Large-Scale Study of Shape Change User Interface Software and Technology High ‘Shape Resolution’ in Self- in Handheld Devices Using Videos,” (UIST ),  , pp.  –. Actuated Flexible Mobile Devices,” Proc. ‡nd Ann. ACM Conf. Human . M. Weigel et al., “iSkin: Flexible, Proc. SIGCHI Conf. Human Factors in Factors in Computing Systems (CHI ), Stretchable and Visually Custom- Computing Systems (CHI ),  ,  , pp. Žš –Ž. izable On-Body Touch Sensors for pp. Ž –› . Mobile Computing,” to be published š. S. Tibken, “Samsung Galaxy Round: in Proc. SIGCHI Conf. Human Factors Get Bent, Get Buzz—But Get Real,” KASPER HORNBÆK is a profes- in Computing Systems (CHI Ž),  Ž; Oct.  , CNET; www.cnet.com sor in the Department of Computer www.martinweigel.com/downloads /news/samsung-galaxy-round-get Science at the University of Copenhagen, Denmark. Contact him / Ž-iSkin.pdf. -bent-get-buzz-but-get-real. at [email protected]. Ž. S. Follmer et al., “inFORM: Dynamic . G.M. Troiano, E.W. Pedersen, and Physical A˜ordances and Con- K. Hornbæk, “User-De¦ned Gestures straints through Shape and Object for Elastic, Deformable Displays,” Actuation,” Proc. th Ann. ACM Proc.  ­€ Int’l Working Conf. Advanced Selected CS articles and columns are also available for Symp. User Interface Software and Visual Interfaces (AVI ),  , pp. –. This article originally appeared in Technology (UIST ),  , . E.W. Pedersen, S. Subramanian, and free at http://ComputingNow Computer.computer.org, vol. 48, no.. 3, 2015. IEEE MultiMedia April–June 2011 April–June MultiMedia IEEE pp. š–›. K. Hornbæk, “Is My Phone Alive?: A MU.generalCFP-full-half-jz.indd 32

http://www.computer.org

APRIL-JUNE 2011

http://www.computer.org

T

Emerging Multimedia Emerging JULY-SEPTEMBER 2013 JULY-SEPTEMBER

Call for Papers

IEEE MultiMedia serves the community of scientists, engineers, prac-

IEEE MultiMedia IEEE titioners, and students interested in research, development, and

application of novel techniques and systems for capturing, creating, Volume 18 Number 2 Number 18 Volume

understanding, accessing, delivering, and adapting digital content

April–June April–June and information across multiple media types.

2013 IEEE MultiMedia is currently accepting papers discussing innovative

mult-18-02-Cover Cover-1 http://www.computer.org approaches across a wide range of multimedia subjects, from theory to practice.

April 11, 2011 5:54 PM Visit http://www.computer.org/portal/web/peerreviewmagazines/ multimedia for full details, or contact EIC Yong Rui (yongrui@

APRIL-JUNE 2013 microsoft.com) with editorial questions or proposals.

IEEE MultiMedia

12/31/2013 3:38:29 PM

❚ http://www.computer.org

Large-Scale Web Media Web Large-Scale

January–March www.computer.org/multimedia

2013 JANUARY-MARCH 2013 JANUARY-MARCH

3D Imaging Techniques & Multimedia Applications 26 ComputingEdge June 2015

96 COMPUTER WWW.COMPUTER.ORG/COMPUTER Volume 20 Number 2 Number 20 Volume

Volume 20 Number 1

January 10, 2013 5:42 PM mult-20-02-c1 Cover-1

mult-20-01-c1 Cover-1

May 17, 2013 6:23 PM DATA ANALYTICS EDITOR: Seth Earley, Earley & Associates, [email protected]

The Promise of Healthcare Analytics

Seth Earley, Earley & Associates

“ n the next ten years, data What Works in tual embodiment of things that sciences and software will Treatment Adherence help people make the day-to-day do more for medicine than Behavioral changes and adher- decisions that lead to long-term all of the biological sciences ence to medical treatment are changes in unhealthy behaviors together.”I That’s quite an asser- better addressed through patient- and habits—communication, ed- tion by venture capitalist Vinod provider communication than ucation, reminders, and, in some Khosla.1 The venture capitalists they are through an application.3 cases, nagging spouses. Point-of- of the world and Silicon Valley “Patient non-adherence is a physi- care information from physician entrepreneurs might all be ex- cian-patient communication chal- to patient is delivered in a very cited about the promise of wear- lenge—not a health information small window of time. This in- able technologies with biophysical technology challenge,” according formation needs to be reinforced interfaces, physiological sensors, to Stephen Wilkins, a consumer with ongoing education from just- and embedded diagnostic tools health behavior researcher.4 He in-time sources such as portals, to measure “the quantified self,” goes on to say that when doctors mobile tips, and daily motivators. which will then empower indi- prescribe a new medication, they A most interesting idea is for viduals to take control of their typically spend less than a minute mobile sensors to detect behaviors healthcare, improve the effective- explaining it to the patient: why it in real time and offer alternatives, ness of treatments, and “replace needs to be taken, how to take it, interventions, or, in an extreme 80% of what doctors do.”2 when to stop, and so forth. example, an alert to a health coach However, it’s one thing to have “In healthcare, the actionability or spouse to intervene and dis- information, and it’s another to and effectiveness of data science courage a poor choice. (Google act on it. Patients are notorious for hinge on communication be- Glass identifying a cigarette about not following through on “doctor’s tween providers and patients, and to be lit. “Leave me alone, Glass.”) orders,” and many of the diseases on patients’ ability to act on those The key is understanding context caused by lifestyle choices are due insights. There are a few methods and offering the correct messag- to them avoiding what they should of provider-to-patient commu- ing and mechanisms when the be doing (quitting smoking, exercis- nication and actionability” that patient is receptive and in need of ing regularly, eating healthy foods, are effective at getting patients to the information, encouragement, and so on). Following through on change behaviors, according to motivation, or admonition. Con- treatment regimens requires the Kyle Samani, a veteran of the elec- text is determined and enabled by missing discipline that contributed tronic medical records industry.5 text analytics by correlating un- to the condition that the treatment These mechanisms for encour- structured content consumption is meant to remediate. aging change represent the vir- with measured outcomes through

2376-113X/15/$31.00 © 2015 IEEE Published by the IEEE Computer Society June 2015 27 1520-9202/15/$31.00 © 2015 IEEE Published by the IEEE Computer Society computer.org/ITPro 7 DATA ANALYTICS

electronic health records, observa- Another source of rich his- The challenge is that though tional outcomes, and sensor data. torical data across large patient medicine is founded in science, Integrating and making sense of populations is that captured the practice of medicine is con- these diverse information sources, by healthcare payers—the in- sidered an art based on science.10 though challenging, will be an surance companies and public Evidence-based medicine com- important innovation in medical health agencies that mine mil- bines research approaches with informatics and healthcare ana- lions of claims each year for clinical observations of treatments lytics, and will become the critical trends in service delivery, qual- and outcomes. It also combines missing element between health- ity, efficacy, abuse, waste, fraud, a variety of approaches for devel- care intervention and outcome. and errors. The data holds great oping, disseminating, and imple- promise for outlier detection menting practices that are clinically The Role of Analytics in healthcare services. The US appropriate and cost effective.11 Data analytics won’t reduce the Center for Medicare and Med- Analytics and big data ap- need for physicians but will alter icaid has just enacted policies proaches for dealing with large how they spend their time. In the to release claims data that until amounts of structured and un- future, doctors will spend less recently wasn’t publicly avail- structured heterogeneous data time in diagnosis because this able.7 (The American Medical will help support evidence-based function can be better accom- Association received an injunc- medicine by providing another plished by computers that can tion in 1979 that prevented the analytical tool in the researcher’s absorb and analyze vast amounts public from knowing how much and clinician’s toolkit. Other ef- of up-to-date medical informa- taxpayer money individual doc- forts hold great promise in help- tion. Doctors and other medi- tors received from the Medicare ing to identify low-frequency cal professionals can then spend program, which effectively closed adverse drug events through the more time on patient education this data off from analysis.8) This analysis of observational medi- and providing the compassionate data will allow for greater scru- cal data (see www.fnih.org/work/ care they might have originally tiny of costs and provide visibility past-programs/omop). envisioned. into unusual claim patterns that Personalized medicine is an im- All of this data, whether it is ob- could be indicative of fraud. In portant, emerging area of health- tained from sensors, communica- 2011, more than US$4 billion in care. The ability to personalize tion, and reminders to patients, or fraudulent healthcare payments medical treatment is based on from detailed notes taken by doc- was recovered, but that amount is the data-intensive fields of phar- tors at the point of service, pro- a small fraction of the estimated macogenomics, nutrigenomics, vide a rich and growing repository total for fraudulent payments. and pharmacoproteomics,12 all of information that can be mined Therefore, the incentive is high of which use the understanding for a variety of purposes. Be- for such analyses.9 of the molecular behavior of bio- yond diagnoses, analytics can be In addition, data analysis could active molecules to develop ad- used for a vast array of purposes identify the most effective treat- vanced medical treatments. in healthcare, depending on the ments for specific subpopulations Biological systems are variable, data that’s being analyzed, the at a more granular level than has dynamic, complex chemical sys- hypotheses being developed, the been possible before. tems in which slight variations in framework for analysis, and the Evidence-based medicine is a an individual’s genomic makeup domain expert’s perspective. For broad concept that applies de- have significant implications with example, the Controlled Risk In- scriptive, statistical, and analyti- regard to a therapy’s effectiveness. surance Corporation (CRICO), a cal approaches to evaluating the Analysis of the data could identify captive medical liability insurance efficacy of treatment through re- the most effective treatments for company owned by and serving view of experimental (structured specific subpopulations at a more the Harvard medical commu- clinical trials) as well as analysis granular level than has been pos- nity, analyzes malpractice insur- of unstructured observational sible before. Decoding the mecha- ance claims to identify high-risk data (typically, electronic health nisms of action of compounds and patient populations, conditions, records) (see www.cebm.net/ biologicals in this environment treatments, procedures, physi- study-designs/). To a layperson, all depends on researchers’ ability cians, and contributing factors to healthcare might seem to be “ev- to model interactions with thou- improve the safety of medical pro- idence-based.” Isn’t medical science sands of potential variables and cedures and treatments.6 based on evidence? millions of possible data points.

28 ComputingEdge June 2015 8 IT Pro March/April 2015 DATA ANALYTICS

electronic health records, observa- Another source of rich his- The challenge is that though Tailoring treatment to individual emrandhipaa.com/kyle/2014/01/29/ com/2012/05/efficient-use-of-big- tional outcomes, and sensor data. torical data across large patient medicine is founded in science, needs based on genetic makeup unlocking-the-power-of-data-science- data-could-reduce-instances-of- Integrating and making sense of populations is that captured the practice of medicine is con- will require highly sophisticated in-healthcare/. healthcare-fraud/. these diverse information sources, by healthcare payers—the in- sidered an art based on science.10 analyses—personalized medicine 6. “Malpractice Risks of Routine 10. S.C. Panda, “Medicine: Science or though challenging, will be an surance companies and public Evidence-based medicine com- is mind bogglingly data- and Medical Procedures,” CRICO press Art?” Mens Sana Monographs, vol. 4, important innovation in medical health agencies that mine mil- bines research approaches with analytics-intensive. release, 17 Dec. 2013; https://www. no. 1, 2006, pp. 127–138. informatics and healthcare ana- lions of claims each year for clinical observations of treatments rmf.harvard.edu/About-CRICO/ 11. J. Belsey, What Is Evidence-Based lytics, and will become the critical trends in service delivery, qual- and outcomes. It also combines Media/Press-Releases/News/2013/ Medicine? May 2009; www.medicine. missing element between health- ity, efficacy, abuse, waste, fraud, a variety of approaches for devel- he healthcare system is December/Malpractice-Risks-of- ox.ac.uk/bandolier/painres/download/ care intervention and outcome. and errors. The data holds great oping, disseminating, and imple- undergoing tremendous Routine-Medical-Procedures. whatis/ebm.pdf. promise for outlier detection menting practices that are clinically change, and analytics 7. “Medicare Provider Utilization 12. V. Ozdemir et al., “Personalized 11 T The Role of Analytics in healthcare services. The US appropriate and cost effective. plays a central role in improving and Payment Data: Physician and Medicine Beyond Genomics: New Data analytics won’t reduce the Center for Medicare and Med- Analytics and big data ap- outcomes and quality of life while Other Supplier,” Centers for Medi- Technologies, Global Health Diplo- need for physicians but will alter icaid has just enacted policies proaches for dealing with large helping to control costs. The next care and Medicaid Services, last macy and Anticipatory Governance,” how they spend their time. In the to release claims data that until amounts of structured and un- several years will see many new updated Apr. 2014; www.cms.gov/ Current Pharmacogenomics and Person- future, doctors will spend less recently wasn’t publicly avail- structured heterogeneous data mechanisms and tools making Research-Statistics-Data-and-Systems/ alized Medicine, vol. 7, no. 4, 2009, time in diagnosis because this able.7 (The American Medical will help support evidence-based significant contributions in all of Statistics-Trends-and-Reports/Medicare- pp. 225–230; www.ncbi.nlm.nih.gov/ function can be better accom- Association received an injunc- medicine by providing another these areas. Provider-Charge-Data/Physician- pmc/articles/PMC2886025/. plished by computers that can tion in 1979 that prevented the analytical tool in the researcher’s and-Other-Supplier.html. absorb and analyze vast amounts public from knowing how much and clinician’s toolkit. Other ef- References 8. “Wall Street Journal Sues to Open Seth Earley is CEO of Earley & As- of up-to-date medical informa- taxpayer money individual doc- forts hold great promise in help- 1. F. Lardinois, “Vinod Khosla: In the Up Secret Medicare Database,” Dow sociates (www.early.com). He’s an ex- tion. Doctors and other medi- tors received from the Medicare ing to identify low-frequency Next 10 Years, Data Science Will Do Jones press release, 25 Jan. 2011; pert in knowledge processes and customer cal professionals can then spend program, which effectively closed adverse drug events through the More for Medicine than All Biologi- www.dowjones.com/pressroom/ experience management strategies. His more time on patient education this data off from analysis.8) This analysis of observational medi- cal Sciences Combined,” Tech Crunch, releases/2010/01252011-medicare. interests include customer experience de- and providing the compassionate data will allow for greater scru- cal data (see www.fnih.org/work/ 11 Sept. 2013; http://techcrunch. asp. sign, knowledge management, content care they might have originally tiny of costs and provide visibility past-programs/omop). com/2013/09/11/vinod-khosla-in- 9. “Efficient Use of Big Data Could Re- management systems and strategy, and envisioned. into unusual claim patterns that Personalized medicine is an im- the-next-10-years-data-science- duce Instances of Healthcare Fraud,” taxonomy development. Contact him at All of this data, whether it is ob- could be indicative of fraud. In portant, emerging area of health- will-do-more-for-medicine-than- Govplace, 2012, www.govplace. [email protected]. tained from sensors, communica- 2011, more than US$4 billion in care. The ability to personalize all-biological-sciences-combined/. tion, and reminders to patients, or fraudulent healthcare payments medical treatment is based on 2. V. Khosla, “Technology Will Re- from detailed notes taken by doc- was recovered, but that amount is the data-intensive fields of phar- place 80% of What Doctors Do,” This article originally appearedstay in IT Professional connected., vol. 17, no. 6, 2015. tors at the point of service, pro- a small fraction of the estimated macogenomics, nutrigenomics, Fortune, 4 Dec. 2012; http://fortune. vide a rich and growing repository total for fraudulent payments. and pharmacoproteomics,12 all com/2012/12/04/technology-will- of information that can be mined Therefore, the incentive is high of which use the understanding replace-80-of-what-doctors-do/. for a variety of purposes. Be- for such analyses.9 of the molecular behavior of bio- 3. A. Atreja, N. Bellam, and S.R. Levy, yond diagnoses, analytics can be In addition, data analysis could active molecules to develop ad- “Strategies to Enhance Patient stay connected. used for a vast array of purposes identify the most effective treat- vanced medical treatments. Adherence: Making it Simple,” in healthcare, depending on the ments for specific subpopulations Biological systems are variable, Medscape General Medicine, vol. 7, data that’s being analyzed, the at a more granular level than has dynamic, complex chemical sys- no. 1, 2005; www.medscape.com/ hypotheses being developed, the been possible before. tems in which slight variations in viewarticle/498339. framework for analysis, and the Evidence-based medicine is a an individual’s genomic makeup 4. S. Wilkins, “Patient Non-Adherence domain expert’s perspective. For broad concept that applies de- have significant implications with (Like Engagement) Is a Physician- example, the Controlled Risk In- scriptive, statistical, and analyti- regard to a therapy’s effectiveness. Patient Communication Chal- surance Corporation (CRICO), a cal approaches to evaluating the Analysis of the data could identify lenge—Not a Health Information Keep up with the latest IEEE Computer Society captive medical liability insurance efficacy of treatment through re- the most effective treatments for Technology Challenge,” Center for publicationsKeep up with and the activities latest IEEE wherever Computer you Society are. company owned by and serving view of experimental (structured specific subpopulations at a more Advancing Health, 23 July 2013; publications and activities wherever you are. the Harvard medical commu- clinical trials) as well as analysis granular level than has been pos- www.cfah.org/blog/2013/patient- | @ComputerSociety nity, analyzes malpractice insur- of unstructured observational sible before. Decoding the mecha- non-adherence-like-engagement-is- | | @ComputingNow@ComputerSociety | @ComputingNow ance claims to identify high-risk data (typically, electronic health nisms of action of compounds and a-physician-patient-communication- | facebook.com/IEEEComputerSociety | | facebook.com/ComputingNow patient populations, conditions, records) (see www.cebm.net/ biologicals in this environment challenge-not-a-health-information- facebook.com/IEEEComputerSociety | facebook.com/ComputingNow treatments, procedures, physi- study-designs/). To a layperson, all depends on researchers’ ability technology-challenge. | IEEE Computer Society | | ComputingIEEE Computer Now Society cians, and contributing factors to healthcare might seem to be “ev- to model interactions with thou- 5. K. Samani, “Unlocking the Power | Computing Now improve the safety of medical pro- idence-based.” Isn’t medical science sands of potential variables and of Data Science In Healthcare,” | youtube.com/ieeecomputersociety | youtube.com/ieeecomputersociety cedures and treatments.6 based on evidence? millions of possible data points. EMR & HIPAA, 29 Jan. 2014; www.

www.computer.org/computingedge 29 8 IT Pro March/April 2015 computer.org/ITPro 9 CONFERENCES in the Palm of Your Hand

IEEE Computer Society’s Conference Publishing Services (CPS) is now offering conference program mobile apps! Let your attendees have their conference schedule, conference information, and paper listings in the palm of their hands.

The conference program works for Android devices, iPhone, iPad, and the Kindle Fire.

For more information please contact [email protected] Linked Data Editor: Carole Goble • [email protected] Where Is Everywhere: Bringing Location to the Web

Kerry Taylor • CSIRO and Australian National University, Canberra, Australia

Ed Parsons • Google Research, London, UK

Hitherto rich geographical information has been a valuable, but highly specialized, corner of the Web. A linked Web that understands geographical concepts will immediately make much of the Web more useful to the developers of Web applications and will provide an important context for the emerging Internet of Things.

ou will often hear geographers claiming ef ciently utilizing scarce resources such as fer- that everything is geolocated, even abstract tile land, minerals, water, energy, and biodiver- Y concepts like Einstein’s Theory of Relativ- sity; forecasting and adapting to global climate ity, or peace, but you don’t have to accept that change; and reducing human conict and epide- claim of universality to recognize that geoloca- miological disease, while at the same time ame- tion is important. Since the release of GPS tech- liorating everyday consumer discomforts like the nology beyond the military in 1996, government, craving for a good coffee or the shame of forget- scientists, entrepreneurs, and consumers alike ting where the car was parked. have gone wild publishing and consuming spatial A third reason is driven by hardware tech- data in popular applications, for nding a way nology advances coupled with mass-market through a traf c snarl, keeping a watchful eye on consumer demand for physically small, sensory- kids, or alerting us to heavy rain within the hour. rich, and delightfully mobile electronic devices There are at least three reasons for the impor- of all kinds. These devices are learning to pas- tance of spatial data. One is that, to a rst sively observe their physical environments and approximation, it’s easy to integrate independent, to actively interact with their (often) human heterogeneous data that includes a reference to a vehicles. Commonly called the Internet of Things, location on the earth’s surface. Everybody knows we’re seeing the development of a complex inter- that all you need is the latitude and longitude play of location-aware sensing and social or and you can plot the data on a visually appealing economic impact,1,2 with a desperate need for and conceptually familiar map. Well, okay, you loosely-coupled data exchange just as we see in do need to know which coordinate is latitude and the Web of linked data. which is longitude, but that isn’t asking for much. So what can we do to maximize the value The ability to create data “mash-ups” using Web from these emerging demands and opportunities? mapping APIs such as those of Google and Bing The Open Geospatial Consortium (OGC) has been was a de ning feature of many Web startups in working for two decades to develop and standard- the early 2000s. ize solutions for publishing and interoperating Another reason for spatial data’s importance over geospatial data and services. The work of the is that this data, whether observed or simulated, OGC has been adopted by Government Agencies underlies solutions to some of the most compel- and National Mapping Agencies to publish and ling issues of the modern world: discovering and share their data, often in the form of a National

MARCH/APRIL 2015 1089-7801/15/$31.00 © 2015 IEEE Published by the IEEE Computer Society 83 2376-113X/15/$31.00 © 2015 IEEE Published by the IEEE Computer Society June 2015 31 Linked Data

or Regional Spatial Data Infrastruc- the geographers, as demonstrated information about them. This prac- ture (SDI).3 While successful for this through existing OGC standards, is tice is not so well understood in the use case, the OGC Web services are an employed for spatial representation. Geospatial community, where objects example of the Deep Web, with much On the other hand, the Group will be like Lake Lefroy may not be identi ed of the valuable information published relying on the expertise of the com- independently of some (time-varying, behind specialized Web services in puter scientists of the Web’s W3C to context-dependent) geometric rep- databases that are inaccessible to recommend methods and tools that resentation, a practice likely to have most Web users, human or automated. will be of most use for rapid uptake been driven by the data modeling of On the other hand, for nearly 15 by the fast-and-furious Linked Data traditional GIS tools. We hope that years the World Wide Web Consor- developer community. Let’s look a the Working Group’s advice on this tium (W3C), the standards consortium little deeper at the problems to be topic will have impact beyond Linked for the Web, has been developing tackled. Data publishing, into the practices of and standardizing solutions for the developing linkable SDIs that also Web of Linked Data (an application Geography Is More need to share interoperable informa- of the Semantic Web). This describes Than a Point in Space tion about real-world objects at a an architecture for interoperability While at its most basic a location large scale. and integration relying on formalized may be expressed as a coordinate in There are a number of well-known vocabularies, a graph data model, and some agreed reference system such spatial relationship vocabularies RESTful http machine-to-machine as the well-used World Geodetic Sys- embedded in spatial databases, in communication. There’s a cultural tem (WGS84), we need to be able to OGC standards, and in Linked Data emphasis within the Linked Data describe more complex geographic practice; these often include encod- community to support small consum- features that may or may not have ings for geometry and geometric ers — to develop methods that can well-de ned point locations or shapes literals in RDF. Probably the Geo- be rapidly taken up by application and to be able to model the relation- SPARQL vocabulary is best known, software developers without special ships between them. This has become including not one but three families expertise. To date, geospatial data has known as the conict between the of topological relations among pairs been only lightly touched within the well-de ned idea of “space” and the of georeferenced geometric objects W3C community. It has been power- less-de ned concept so important to (OGC Standards and associated docu- ing along, however, in Linked Data geography, “place.” Think of the urban ments are available from www.open- developments outside the standards villages common in many western geospatial.org/standards). While all sphere: the GeoNames Linked Open cities, such as New York’s Meatpack- three are well-de ned by geometric Data (LOD) resource is second only ing District or London’s Little Venice, algorithms, in the spirit of the Web to DBPedia in inward-linking in the which have no formal boundaries. there may be some weaker notions LOD Cloud4 and the geonames and Are such locations contained within required, such as “sdw:samePlaceAs,” geo (WGS84_pos) vocabularies fol- the larger cities, or are they indepen- “sdw:near” (like foaf:based_near) low only foaf and dc in the pre x.cc dent? Think also of ephemeral lakes and “sdw:in” that would be useful account of “what knowledgeable RDF like Lake Lefroy in Western Australia, irrespective of geometry. Clearly the hackers are interested in”5 (excluding famous for land yacht sailing. These very imprecision of these makes them rdf, rdfs, and owl). places can’t, in a sense of geometric context-dependent, and so open to The OGC and the W3C have encoding, “touch” a boundary with inappropriate interpretation, but does decided to combine their efforts; to other neighborhoods; and whether that matter? On the other hand, are bring the might of the two together a road “crosses” them may be quite the well-de ned topological relations for the rst time to co-develop a suite subjective and time-dependent. Nev- too strong for the laissez-faire Web, of Linked Data technologies and best ertheless, as abstract objects they where dynamic spatial joins over dis- practice guidelines for spatial data need identi ers so that they can be tributed data sources are unlikely to on the Web. The Working Group will talked about. perform well anyway? assess practice in both the Linked Data URIs as identi ers for anything NeoGeo6 suggests a convenient community and the OGC community at all, both real-world objects and design for handling alternative to recommend best practices for the information resources, are a critical encodings of geometry, Linked Data growth of the Geospatial Seman- concept for the Web of Linked Data style, using Multipurpose Inter- tic Web. A persistent theme across and are supported by well-developed net Mail Extensions (MIME) types all the work of the group will be to practices for associating the identi - and content negotiation. GeoJSON ensure that the expert knowledge of ers for the objects with the identi ed (JSON stands for JavaScript Object

84 www.computer.org/internet/ IEEE INTERNET COMPUTING 32 ComputingEdge June 2015 Where Is Everywhere: Bringing Location to the Web

Notation),7 with its variant TopoJ- vocabulary, or something very like it, through modularity and documenta- SON, has become a particularly pop- to the status of a formal standard for tion in the Working Group. ular JSON encoding, and it’s being interoperability. While the vocabulary developed to comply with the new may be too committed to the Grego- Remote Sensors Linked Data standards JSON-LD and rian calendar, it covers both the rep- Measure the Earth the JSON-LD API (W3C standards resentation of instants and intervals We’re also witnessing an explosion in and reports are available from www. in time and important temporal rela- geolocated data that’s sensed remotely w3.org/TR). Although primarily con- tionship concepts. It may be recom- by satellites. Traditionally, this kind cerned with administrative notions mended with little change, although of rather large and technically dif - of location, the European Commis- extension points for alternative cal- cult-to-interpret data has been locked sion (EC) developed the Interoper- endars may be needed, as may updat- inside the computer rooms of military, ability Solutions for European Public ing to account for the XML Schema government, or academic research Administrations (ISA) Core Location datatypes revision of 2012. labs, but both commercial and public- vocabulary8 that also addresses geo- good objectives could be better served graphic identi ers and geometry. It’s Sensors Measure Things by high availability. easy to see why both publishers and in Space and Time For remote sensing data, the Work- consumers of spatial data on the Web In 2012, a W3C incubator group pub- ing Group will be looking again at the are looking for advice on which way lished an ontology for sensor networks RDF Data Cube vocabulary. While raw to jump. that’s usually known as the Semantic sensed data is likely to be considered The Spatial Data Infrastructure Sensor Networks (SSN) ontology.9 It too raw for widespread consumption, movement has invested heavily in has been highly cited in the research once georeferenced tiles are obtained the capture and formalized repre- literature, and is known to be used or it seems conceptually sensible to use sentation of metadata implemented trialed in industrial applications for a Data Cube model to represent obser- in, for example, the ISO 19115 stan- smart agriculture, satellite con gu- vations of geophysical properties such dards. There, metadata is conceived ration, building management, and as sea surface temperature and ocean as a standardized description of a Internet of Things services. It’s very height (see Figure 1). The Linked substantial chunk of data, itself com- commonly used in association with Data design should work well for small monly identi ed as a le or archived research efforts to build a Web of addressable geolocated images, but package of les. Instead, metadata as linked streaming data and complex almost certainly the underlying scale Linked Data can be intrinsically con- events, for example.10 of Earth Observation (EO) datasets will nected to the data, being represented The SSN design deliberately create challenges. The OGC standard in the same RDF graph model as the remained agnostic to encodings for Geography Markup Language Appli- data itself, and indeed in the same measurement locations, times, and cation Schema-Coverages (GMLCOV) connected graph as the data. Meta- values, and this has frustrated some de nes a comprehensive XML Schema data can be associated with resources adopters. Now we have the oppor- model for coverages that has been at any level of granularity. The Work- tunity to closely align SSN with the known to work well for data que- ing Group will articulate some prin- standard representations for loca- ried from 130-Tbyte coverage data- ciples for multigranularity metadata tion and time being developed in bases,13 so this gives us con dence applicable to spatial objects. the Group. The W3C RDF Data Cube that a Linked Data interface will be vocabulary,9 developed since SSN, feasible, too. The SSN ontology should Time Is Everywhere, Too offers a highly successful platform for be useful here for sensor description. Confoundingly, things have an unfor- Linked Data publishing of time series However, coverage is not always sen- tunate tendency to move, so as soon values, a common style of data aris- sor-observed and the Working Group as we talk about place we have to talk ing from sensors,11 and alignment aims to deliver at least a Linked Data about time, too. Even observations with the Data Cube would be ben- recommendation for the simple case made at xed locations change over e cial to Linked Data publishers and where a time-varying property is asso- time because everything in the space consumers. ciated with a xed point location, such is moving. The Linked Data commu- We need to keep an eye on other as in OGC’s WaterML. nity has a very popular vocabulary recent developments for represent- for time, OWL-Time (OWL stands for ing dynamic data on the Web, too, What Will the Geolocated Web Ontology Language), a work- such as Robert Sanderson and Herbert Web Look Like? ing draft in the W3C since 2006. Van de Sompel’s work.12 There are If the Working Group is a success, The time has come to promote that also plans to improve SSN usability what could we expect to see?

MARCH/APRIL 2015 85 www.computer.org/computingedge 33 Linked Data

precision roads or vertical obstruc- tions data, suitable for autonomous vehicle navigation, be encouraged to use something like our hypotheti- cal sdw:samePlaceAs links to connect to locations like Little Venice that might be rather less controlled? We propose that the Working Group will not only inuence the development of SDIs, improving inter-connectivity and provenance of data, but will also magnify the bene ts of SDIs by mak- ing them citizen-accessible. Often, data provenance is impor- tant to spatial data. Data may be sourced from SDIs and manipulated and integrated through simulation or visualization tools to underpin stra- tegic and sensitive government deci- sions. The Australian Government BioRegional Assessment process is an exemplar (see www.bioregional- assessments.gov.au), where decisions to permit coal seam gas mining must Figure 1. NOAA polar orbiting satellites obtain the data for sea surface balance economic gains against the temperature. This is a composite 15-day image showing the extension of risks of long term damage to water the Leeuwin Current around Tasmania. (This image by CSIRO is licensed resources and other environmental CC-BY 3.0.) assets. Good provenance records are not only important for assessing suit- ability for input to such processes, but also for association with process Imagine running for the airport SDI is mandated as a European Union outputs to back up transparent and and realizing that you left your (EU) directive called Infrastructure scienti cally-contestable decisions. laptop on the bus. Your favorite for Spatial Information in Europe Fortunately, the recent W3C PROV search engine would be able to tell (INSPIRE).14 To date, SDIs have devel- Recommendation provides an ideal you that the bus is currently “Outside oped as information silos discon- technical solution that aligns well the Queen Elizabeth Conference Cen- nected from the rest of the Web. While with the plans for the Working Group. tre,” its nal destination and expected such data may have a stronger sense As the group Recommendations are time of arrival, the telephone number of authoritativeness and careful qual- adopted for government informa- of the lost property of ce of the bus ity-oriented custodianship than typi- tion published as Linked Data, we operator and its opening hours today, cal Linked Data (trawled, for example, should expect to see rich provenance and how long it will take you to get from citizen-contributed sources such attached in a way not previously pos- there by taxi from your current loca- as Wikipedia), publishing it in a form sible, progressing liberal social princi- tion. Already, much of the informa- that’s easy to consume has got to be ples for both transparent science and tion to locate objects in the real world “A Good Thing.” Surely this will con- transparent government. and information about them exists tribute to the objectives of SDIs that online, somewhere, but not in a for- relate to realizing the economic and mat that would allow you to search social value tied up in spatial data he Working Group is just starting for your lost laptop! assets. A good question for providers T (see the related sidebar). This arti- Governments are publishing spa- of such data will be to ask what Linked cle only represents the knowledge and tial data in interoperable ways to Data principles can be properly used opinions of the authors and shouldn’t promote reuse of high-quality fun- in that more controlled context. For be interpreted as representing the col- damental datasets. In Europe, their example, should a provider of high- lective opinions and wisdom of the

86 www.computer.org/internet/ IEEE INTERNET COMPUTING 34 ComputingEdge June 2015 Where Is Everywhere: Bringing Location to the Web

How to Participate in Developing Group. We look forward to developing Spatial Data on the Web a consensus among the participants and we hope you can join us to help he Spatial Data on the Web Working Group was established as an outcome bring location, in all its richness, to T of the Linking Geospatial Data meeting in London in March 2014 (www. the Web of Linked Data. w3.org/2014/03/lgd/report). The Working Group is a collaboration between the World Wide Web Consor- Acknowledgments tium (W3C) and the Open Geospatial Consortium (OGC), scheduled to commence Phil Archer and Ralf Swick of the W3C, Bart De work on 22 January 2015. Outputs will be submitted for formal standardization Lathouwer and Denise Mackenzie of the OGC and through the processes of both organizations — as Recommendations and Notes in Alex Coley of the UK Government have been crit- the W3C and as Standards and Best Practices Documents in the OGC. ical thinkers and organizers to get the Working Participation in the Working Group is open to OGC members and to W3C Group to this point. Many other members of both members, although membership of both organizations is strongly encouraged. If organizations have made important contributions your organization is already a member of the W3C, please contact your organiza- already, and are expected to continue to do so. tion’s W3C Advisory Committee Representative (AC Rep). If your organization is already a member of the OGC, then please subscribe to the email list for the Spa- References tial Data on the Web Working Group (a Sub-working Group of the Geosemantics 1. P. Barnaghi et al., “Semantics for the Inter- DWG). To join the standards organizations, visit www.w3.org/Consortium/mem- net of Things: Early Progress and Back bership or www.opengeospatial.org/ogc/join, respectively. to the Future,” Int’l J. Semantic Web and Meetings will be held weekly through international teleconferences. The rst Information Systems, vol. 8, no. 1, 2012, face-to-face meeting is expected to be held during the OGC Technical Committee pp. 1–21; doi:10.4018/jswis.2012010101. meetings in Barcelona, 9–13 March 2015. The Working Group will adopt the W3C 2. K. Taylor et al., “Farming the Web of communications practice for minutes, email discussions, wiki documents, editor’s Things,” IEEE Intelligent Systems, vol. 28, drafts, and formal outputs that will be openly available to non-Members. The Work- no. 6, 2013, pp. 12–19. ing Group will be open to public comment at all times. 3. M. Gould et al., “Next-Generation Digital The authors of this article are the initial Chairs of the W3C/OGC Spatial Data Earth: A Position Paper from the Vespucci on the Web Working Group. Initiative for the Advancement of Geo- graphic Information Science,” Int’l J. Spa- tial Data Infrastructures Research, vol. 3, Streaming Data Sources,” Int’l Semantic ciate professor at the Australian National 2008, pp. 146–167. Web Conf., 2010, pp. 96–111. University, a principal fellow at the Univer- 4. M. Schmachtenberg et al., Linking Open Data 11. L. Lefort et al., “A Linked Sensor Data Cube sity of Melbourne, and a visiting reader at Cloud Diagram, 2014; http://lod-cloud.net. for a 100-Year Homogenised Daily Tem- the University of Surrey, UK. Her research 5. R. Cyganiak, Top 100 Most Popular RDF perature Dataset,” Proc. 5th Int’l Workshop interests include the Semantic Web and Namespace Pre xes, 15 Feb. 2011; http:// on Semantic Sensor Networks, 2012; http:// e-research. Taylor has a PhD in computer sci- richard.cyganiak.de/blog/2011/02/top-100- ceur-ws.org/Vol-904/paper10.pdf. ence from the Australian National University. most-popular-rdf-namespace-pre xes/. 12. R. Sanderson and H. Van de Sompel, “Cool Contact her at [email protected]. 6. J.M. Salas et al., NeoGeo Vocabulary: URIs and Dynamic Data,” IEEE Internet De ning a Shared RDF Representation for Computing, vol. 16, no. 4, 2012, pp. 76–79. Ed Parsons is the Geospatial Technologist of GeoData (Madrid edition), 7 Feb. 2012; 13. P. Baumann, P. Mazzetti, and J. Ungar, Google Research, London, UK. His work http://geovocab.org/doc/neogeo/. “Big Data Analytics for Earth Sciences: focuses on evangelizing Google’s mission to 7. H. Butler et al., The GeoJSON Format Spec- The EarthServer Approach,” Int’l J. Digital organize the world’s information using geog- i cation, 16 June 2008; http://geojson.org/ Earth (to appear). raphy and tools, including Google Earth and geojson-spec.html. 14. European Commision, “Directive 2007/2/ Google Maps. Parsons has an MS in Applied 8. A. Perego et al., ISA Programme Loca- EC of the European Parliament and of the Remote Sensing from Cran eld Institute of tion Core Vocabulary, 25 Nov. 2013; www. Council of 14 March 2007 Establishing an Technology and holds an honorary doctorate w3.org/ns/locn#. Infrastructure for Spatial Information in the in science from Kingston University, London. 9. M. Compton et al., “The SSN Ontology of the European Community (INSPIRE),” Of cial J. He’s a fellow of the Royal Geographical Soci- W3C Semantic Sensor Network Incubator of the European Union, 25 Apr. 2007; http:// ety. Contact him at [email protected]. Group,” Web Semantics: Science, Services eur-lex.europa.eu/legal-content/EN/TXT/ and Agents on the World Wide Web, Else- PDF/?uri=CELEX:32007L0002&from=EN. vier, 2012, pp. 25–32. ThisSelected article originallyCS articles appeared and columns in 10. J.-P. Calbimonte, O. Corcho, and A. Gray, Kerry Taylor is a principal research scientist at IEEEare Internet also available Computing for free, vol. at http://19, “Enabling Ontology-Based Access to CSIRO, Canberra, Australia, an adjunct asso- ComputingNow.computer.org.no. 2, 2015.

MARCH/APRIL 2015 87 www.computer.org/computingedge 35 Take the CS Library wherever you go!

IEEE Computer Society magazines and Transactions are available to subscribers in the portable ePub format.

Just download the articles from the IEEE Computer Society Digital Library, and you can read them on any device that supports ePub, including:

• Adobe Digital Editions (PC, MAC) • iBooks (iPad, iPhone, iPod touch) • Nook (Nook, PC, MAC, Android, iPad, iPhone, iPod, other devices) • EPUBReader (FireFox Add-on) • Stanza (iPad, iPhone, iPod touch) • ibis Reader (Online) • Sony Reader Library (Sony Reader devices, PC, Mac) • Aldiko (Android) • Bluefi re Reader (iPad, iPhone, iPod touch) • Calibre (PC, MAC, Linux) (Can convert EPUB to MOBI format for Kindle) www.computer.org/epub SectionSmartphones Title Here Editor:Editor: Editor Nayeem Name IslamHere nn EditorQualcomm af liation n [email protected] n editor email here

Approximate Computing: Making Mobile Systems More Efcient

Thierry Moreau, Adrian Sampson, and Luis Ceze, University of Washington

obile devices run at the limits of APPROXIMATE COMPUTING to existing processor designs, making M what is possible in computer sys- CHALLENGES their near-term adoption dif cult, and tem designs, with performance and bat- There are two key challenges to real- they often present little energy reduc- tery life both paramount. Unfortunately, izing approximate computing’s full tion over their precise counterparts. battery technology is advancing slowly. potential: we need ways to safely pro- To address these challenges, our Making mobile devices truly better from gram approximate computers, and we end-to-end system includes two build- generation to generation will necessitate need hardware technologies that can ing blocks. First, a new programmer- new, creative ways to extract more from smoothly trade off energy for accuracy. guided compiler framework transforms each joule of a battery’s capacity. Regarding programmability, an programs to use approximation in a Approximate computing is an emerg- approximate system must make it trac- controlled way. An Approximate C ing research area that promises to offer table for programmers to write correct Compiler for Energy and Performance drastic energy savings. It exploits the fact software even when the hardware can Tradeoffs (Accept) uses programmer that many applications don’t require be incorrect. Programmers need to iso- annotations, static analysis, and dynamic perfect correctness. Many important late parts of the program that must be pro ling to nd parts of a program that mobile applications use “soft” error-tol- precise from those that can be approx- are amenable to approximation. erant computations, including computer imated so that a program functions Second, the compiler targets a system vision, sensor data analysis, machine correctly even as quality degrades. For on a chip (SoC) augmented with a co- learning, augmented reality, signal pro- example, an image renderer can toler- processor that can ef ciently evaluate cessing, and search. A few small errors ate errors in the pixel data it outputs; coarse regions of approximate code. A while detecting faces or displaying game a small number of erroneous pixels Systolic Neural Network Accelerator in graphics, for example, might be accept- might be acceptable or even undetect- Programmable logic (Snnap) is a hard- able or even unnoticeable, yet today’s able. However, an error in a jump table ware accelerator prototype that can systems faithfully compute precise out- could lead to a crash, and even small ef ciently evaluate approximate regions puts even when the inputs are imprecise. errors in the image le format might of code in a general-purpose program.1 Approximate computing research make the output unreadable. The prototype is implemented on the builds software and hardware that are Regarding the technology, approxi- FPGA fabric of an off-the-shelf ARM allowed to make mistakes when appli- mate hardware must offer appealing SoC, which makes its near-term adop- cations are willing to tolerate them. quality-performance tradeoffs that can tion possible. Hardware acceleration Approximate systems can reclaim energy be exposed to the compiler. For exam- with Snnap is enabled by neural accel- that’s currently lost to the “correct- ple, an approximate adder implemented eration, an algorithmic transforma- ness tax” imposed by traditional safety using power gating can rely on ISA tion that substitutes regions of code in margins designed to prevent worst-case (instruction set architecture, or hard- a program with approximate versions scenarios. In particular, research at the ware/software interface) extensions to that can be ef ciently evaluated on a University of Washington is exploring specify the amount of error allowed in specialized accelerator. Using Accept programming language extensions, a an addition operation. The challenge and Snnap, a software programmer can compiler, and a hardware co-processor with most approximate hardware tech- leverage the bene ts of approximate to support approximate acceleration. niques is that they require modi cations acceleration with minimal effort by

2376-113X/15/$31.00 © 2015 IEEE Published by the IEEE Computer Society June 2015 Published by the IEEE CS n 1536-1268/15/$31.00 © 2015 IEEE PERVASIVE computing37 9 SMARTPHONES SMARTPHONES

annotating legacy software with intui- approximate data. To this end, Accept the pixel array in an image- lter algo- tive approximate datatype annotations. provides a compiler analysis library that rithm. The programmer also provides a nds regions of code that are amenable quality metric that measures the accu- AN APPROXIMATE COMPILER to transformations. An ensemble of racy of the program’s overall output. The Accept compiler framework com- optimization strategies transform these bines programmer annotations, code regions. One critical optimization tar- Compilation analysis, optimizations, and pro ling gets Snnap, our neural accelerator The compiler implements neural accel- feedback to make approximation safe (described in more detail later). eration in four phases: region selection, and keep control in the hands of pro- execution observation, training, and grammers. Its front end, built atop the Autotuning code generation. Accept rst identi es LLVM compiler infrastructure, extends Although a set of annotations might large regions of code that are safe to the syntax of C and C++ to incorporate permit many different safe program approximate and nominates them as an APPROX keyword that program- relaxations, not all of them are bene - candidates for neural acceleration. mers use to annotate datatypes. Accept’s cial in the quality-performance tradeoff Next, it executes the program with analysis identi es code that can affect they offer. A practical approximation test cases and records the inputs and only variables marked as APPROX. mechanism must help programmers outputs to each target code region. It Optimizations use these analysis results choose from among many candidate then uses this input-output data to train to avoid transforming the precise parts relaxations for a given program to a neural network that mimics the origi- of the program. An autotuning com- strike an optimal balance between per- nal code. Training can use standard ponent measures program executions formance and quality. Accept’s auto- techniques for neural networks—we and uses heuristics to identify program tuner heuristically explores the space use the standard backpropagation variants that maximize performance of possible relaxed programs to identify algorithm. and output quality. The nal output is Pareto-optimal variants. Finally, the compiler generates an a set of Pareto-optimal versions of the executable that replaces the original input program that reect its ef ciency- NEURAL ACCELERATION code with invocations of a special accel- quality tradeoff space. Neural acceleration is a powerful erator (the NPU), which implements the approach to approximate comput- trained neural network. Safety Constraints and Feedback ing that works by substituting entire Because program relaxations can have regions of code in a program with Execution signi cant effects on program behavior, machine-learning models.2 Neural During deployment, the transformed programmers need visibility into—and acceleration trains neural networks to program begins execution on the main control over—the transformations mimic and replace regions of approxi- core and con gures the NPU. Through- the compiler applies. To give the pro- mate imperative code. Once the neural out execution, the program invokes grammer fine-grained control over network is trained, the system no longer the NPU to perform a neural network relaxations, Accept extends an exist- executes the original code and instead evaluation in lieu of executing the code ing lightweight annotation system for invokes the neural network model on region it replaced. Invoking the NPU approximate computing based on type a neural processing unit (NPU) accel- is faster and more energy-ef cient than quali ers.2 Accept gives programmers erator. Neural networks have ef cient executing the original code region on visibility into the relaxation process via hardware implementations, so this the CPU, so the program as a whole feedback that identi es which transfor- workow can offer signi cant energy runs faster. mations can be applied and which anno- savings over traditional execution. tations are constraining it. Through Neural acceleration consists of three HARDWARE SUPPORT FOR annotation and feedback, the program- phases: programming, compilation, APPROXIMATE ACCELERATION mer iterates toward an annotation set and execution. Our NPU implementation, Snnap, runs that unlocks new performance bene ts on off-the-shelf FPGAs. Using existing, while relying on an assurance that criti- Programming affordable hardware means that Snnap cal computations are unaffected. To use neural acceleration in Accept, can provide bene ts today, without wait- the programmer uses pro ling informa- ing for new silicon. Snnap uses an emerg- Automatic Program tion and type annotations to mark code ing class of heterogeneous computing Transformations that’s amenable to approximation. For devices called programmable system- Based on programmer annotations, many applications, it’s easy to identify on-chips (PSoCs). These devices combine Accept’s compiler passes can apply pro- the “core” approximate data that domi- a set of hard processor cores with pro- gram transformations that involve only nates the program’s execution—such as grammable logic on the same die.

ComputingEdge June 2015 10 38PERVASIVE computing www.computer.org/pervasive SMARTPHONES

Compared to conventional FPGAs, this integration provides a higher- Zynq programmable system-on-a-chip bandwidth and lower-latency interface Application processing unit ACP Neural processing unit port between the main CPU and the pro- AXI Master Scheduler grammable logic. However, the latency OCM L2 $ Interface is still higher than in previous propos- bus als for neural acceleration with special- snoop control unit purpose hardware.3 Our design covers PU PU this additional latency by exploiting L1 I$ L1D$ control control parallelism. PE PE Implementation on the Zynq PE PE We’ve implemented Snnap on a com- ...... mercially available PSoC: the Xilinx Dual core Zynq-7020 on the ZC702 evaluation ARM cortex-A9 scratchpad platform (www.xilinx.com/products/ PE scratchpad PE silicon-devices/soc.html).4 The Zynq SIG SIG includes a Dual Core ARM Cortex-A9 and an FPGA fabric. The CPU-NPU interface composes three communica- tion mechanisms on the Zynq PSoC4 for high bandwidth and low latency. Figure 1. The system diagram for the Systolic Neural Network Accelerator in First, when the program starts, it Programmable logic (Snnap). Each processing unit (PU) contains a chain of con gures Snnap using the medium- processing elements (PE) feeding into a sigmoid unit (SIG). throughput general-purpose I/Os (GPIOs) interface. Then, to use Snnap during execution, the program sends from a local scratchpad memory three undergraduate researchers, all of inputs using the high-throughput ARM where temporary results can also be whom were beginners with the C and Accelerator Coherency Port (ACP). The stored. The sigmoid unit implements C++ languages and new to approximate processor then uses the ARMv7 SEV/ a nonlinear neuron-activation func- computing, as well as graduate students WFE signaling instructions to invoke tion using a lookup table. The PU more familiar with the eld. Snnap and enter sleep mode. Finally, the control block contains a con gurable Programmers tended to approach accelerator writes outputs back to the sequencer that orchestrates com- annotation by finding the central processor’s cache via the ACP interface munication between the PEs and the approximable data in the program— and, when nished, signals the proces- sigmoid unit. The PUs can be pro- for example, the vector coordinates in a sor to wake up. grammed to operate independently, clustering algorithm, or pixels in imag- so different PUs can be used to either ing code. Accept’s type errors guided Micro-Architecture parallelize the invocations of a single programmers toward other parts of Our design, shown in Figure 1, consists neural network or evaluate different the code that needed annotation. Pro- of a cluster of processing units (PUs) neural networks concurrently. grammers needed to balance effort with connected through a bus. Each PU is potential reward during annotation, so composed of a control block, a chain EXPERIENCE AND RESULTS auxiliary tools, such as pro lers and of processing elements (PEs), and a sig- We applied Accept and Snnap to a set call graph generators, were useful to moid unit, denoted by the SIG block. of approximable benchmarks. Our goal nd hot spots. The PEs form a one-dimensional sys- was to show that programmers can tolic array that feeds into the sigmoid unlock signi cant ef ciency gains at a Snnap Acceleration Ef ciency unit. Systolic arrays excel at exploiting small accuracy cost with minimal effort. Our evaluation targeted seven bench- the regular data-parallelism found in marks from many application domains: neural networks, and they’re amenable Writing Approximate Programs option pricing, signal processing, robot- to ef cient implementation on modern To evaluate the effort required to ics (the inverse kinematics for 2-joint FPGAs. apply approximation, we annotated arm—inversek2j), lossy image com- When evaluating a layer of a neural a set of benchmarks for Accept’s lan- pression, machine learning (k-means), network, PEs read the neuron weights guage. The programmers included and image processing. We compared

www.computer.org/computingedge APRIL–JUNE 2015 PERVASIVE computing39 11 SMARTPHONES SMARTPHONES

better resource-normalized through- 4 10.84 38.12 3.78 put on four out of seven benchmarks. In particular, when HLS couldn’t t a fully pipelined datapath on the avail- 3 able resources, the resulting throughput 2.67 was affected. In addition to competitive perfor- 2.25 2.35 mance, Snnap and Accept also offer 2 programmability and generality 1.46 advantages over specialized datapaths. 1.3 Neural acceleration doesn’t require

Whole application speedup 1 hardware design knowledge which was often required to debug or opti- mize the performance of HLS kernels. Also, all seven benchmarks we com- 0 piled through HLS generated a dif- fft jpeg sobel bscholes inversek2j jmeint kmeans GEOMEAN ferent specialized datapath, whereas Snnap provides a fabric for acceler- ating all seven benchmarks, making Figure 2. Whole-application speedup rates across the benchmark suite. The virtualization and context-switching geometric mean was 3.78. possible.

each program’s performance, power, relatively complex and didn’t present ccept and Snnap represent the rst and energy consumption when using a signicant advantage over executing A steps toward near-term approxi- Snnap versus running the original the original target region on the CPU. mate computing on PSoCs, but compi- software on the ARM processor. We The energy efciency results were lation and neural acceleration aren’t the limited each application’s output error similar: energy use was reduced 2.77 only challenges in approximate comput- to 10 percent. Snnap incorporates eight times on the SoC+DRAM subsystem, ing. We’re also developing high-level tools processing units and runs at one quarter ranging from 0.87 times for k-means to to help programmers better navigate of the CPU’s core frequency. 28.01 times for inversek2j. The primary and understand performance-quality energy benet of Snnap comes from tradeoffs, including special-purpose Performance and energy efficiency. Fig- racing to completion: faster execution debuggers for approximate programs. ure 2 shows the geometric mean for the times must compensate for Snnap’s We also wish to explore the rich design whole-application speedup, which was xed power overhead. space for approximate acceleration; 3.78 times faster across our benchmark neural acceleration is just one coarse- suite. As shown, the speedup ranged Comparing Snnap with application- grained technique among others. Future from 1.30 times faster for k-means specific datapaths. Specialized hard- work will establish better error guaran- to 38.12 times for inversek2j. Inverse ware accelerators are another way to tees for neural acceleration using robust kinematics saw the largest speedup, improve applications’ energy efciency training. because the bulk of its execution was using FPGAs. We compared Snnap’s Approximate computing research is of oaded to Snnap. The target code performance to specialized FPGA in its infancy and needs more tools for for that benchmark includes trigono- designs generated by a commercial prototyping and evaluating ideas. The metric function calls that are expensive high-level synthesis (HLS) tool, Vivado Accept framework and Snnap proto- to evaluate on an ARM CPU. Neural HLS 2014.2. For each benchmark, type—both of which we plan to make acceleration approximates these expen- we generated a specialized datapath open source—demonstrate a practical sive functions with a compact neural by compiling through HLS the same and efcient implementation of approx- network that can be quickly evaluated region of code that we of oad to Snnap imate transformation. on Snnap. Conversely, the benchmark via neural acceleration. Approximate computing is especially that had the smallest speedup couldn’t For a fair comparison, we normal- relevant in mobile environments for two of oad most of its execution to Snnap, ized performance of each approach by important reasons. First, mobile devices and the neural network that was trained its resource usage on the FPGA. To our are energy-constrained. Second, most of to approximate the target region was surprise, neural acceleration offered the applications we run in mobile devices

ComputingEdge June 2015 12 40PERVASIVE computing www.computer.org/pervasive SMARTPHONES

are inherently approximable—including REFERENCES video chatting, games, video creation and Thierry Moreau is a PhD 1. T. Moreau et al., “SNNAP: Approxi- consumption, sensor data collection and mate Computing on Programmable student at the University of summarization. If we can make approxi- SoCs via Neural Acceleration,” Proc. Washington. Contact him at mate computing a reality on smartphones, 21st IEEE Symp. High Performance [email protected]. Computer Architecture (HPCA), it could signi cantly increase performance 2015; http://homes.cs.washington. while simultaneously decreasing energy edu/~moreau/media/papers/snnap- consumption, thereby potentially enabling hpca2015.pdf. new, more demanding applications. 2. A. Sampson et al., “EnerJ: Approximate Adrian Sampson is a PhD Data Types for Safe and General Low- student at the University of Power Computation,” ACM SIGPLAN Washington. Contact him at ACKNOWLEDGMENTS Conf. Programming Language Design and Implementation (PLDI), 2011, [email protected]. We thank everyone involved in doing research on pp. 164–174. edu. approximate computing in collaboration with UW: 3. H. Esmaeilzadeh et al., “Neural Accel- Andre Baixo, James Bornholt, Doug Burger, Hadi eration for General-Purpose Approxi- Esmaeilzadeh, Dan Grossman, Kathryn McKinley, mate Programs,” International Symp. Luis Ceze is the Torode Todd Mytkowicz, Jacob Nelson, Mark Oskin, Karin Microarchitecture (MICRO), 2012, Family Professor of Com- pp. 449–460. Strauss, and Mark Wyse. The research in this article puter Science and Engi- was supported in part by the National Science Foun- 4. Xilinx, Zynq-7000 All Programmable neering at the University of dation; DARPA; the Center for Future Architectures SoC: Technical Reference Manual, Feb. Washington. Contact him 2015; www.xilinx.com/support/ Research (C-FAR), one of six centers of STARnet; and documentation/user_guides/ug585- at [email protected]. gifts by Microsoft, Google and Qualcomm. Zynq-7000-TRM.pdf. edu.

This article originally appeared in Pervasive Computing, vol. 14, no. 2, 2015.

Take the CS Library wherever you go!

IEEE Computer Society magazines and Transactions are now available to subscribers in the portable ePub format.

Just download the articles from the IEEE Computer Society Digital Library, and you can read them on any device that supports ePub. For more information, including a list of compatible devices, visit

www.computer.org/epub

www.computer.org/computingedge APRIL–JUNE 2015 PERVASIVE computing41 13 IEEE Cloud Computing Call for Papers

lthough cloud technologies have been advanced and adopted at an astonishing pace, much work remains. IEEE Cloud Computing seeks to foster the evolution of Acloud computing and provide a forum for reporting original research, exchanging experiences, and developing best practices.

IEEE Cloud Computing magazine seeks accessible, useful papers on the latest peer-reviewed developments in cloud computing. Topics include, but aren’t limited to:

• Cloud architectures (delivery models and deployments), • Cloud management (balancing automation and robustness with monitoring and maintenance), • Cloud security and privacy (issues stemming from technology, process and governance, international law, and legal frameworks), • Cloud services (cloud services drive and are driven by consumer demand; as markets change, so do the types of services being offered), • Cloud experiences and adoption (deployment scenarios and consumer expectations), • Cloud and adjacent technology trends (exploring trends in the market and impacts on and in uences of cloud computing), • Cloud economics (direct and indirect costs of cloud computing on the consumer; sustainable models for providers), • Cloud standardization and compliance (facilitating the standardization of cloud tech and test suites for compliance), and • Cloud governance (transparency of processes, legal frameworks, and consumer monitoring and reporting).

Submissions will be subject to IEEE Cloud Computing magazine’s peer-review process. Articles should be at most 6,000 words, with a maximum of 15 references, and should be understandable to a broad audience of people interested in cloud computing, big data, and related application areas. The writing style should be down to earth, practical, and original.

All accepted articles will be edited according to the IEEE Computer Society style guide. Submit your papers through Manuscript Central at https://mc.manuscriptcentral.com/ccm-cs.

If you have any questions, feel free to email lead editor Brian Kirk at [email protected].

www.computer.org/cloudcomputing

d3cfp.indd 84 12/8/14 1:01 PM From the Editor in Chief Editor in Chief: Maria R. Ebling n IBM T.J. Watson Research Center n [email protected]

The Importance of Being… Bored

Maria R. Ebling, IBM T.J. Watson Research Center

n my ride to work in the morn- the participants who read the phone which walks you through the sci- O ing, I’m usually listening to NPR. book were much more creative in their ence behind the importance of being Recently, NPR’s New Tech City ran a answers about those two paper cups. bored, challenges you with different program called “Bored and Brilliant.” I Participants who copied out the phone ways of bringing boredom back into found the series fascinating and enjoyed book came up with ideas such as using your day. See the “NPR: New Tech their challenges. I’d like to share parts the cups as holders or planters. Partici- City’s ‘Bored and Brilliant’ Chal- of it here and issue my own challenge pants who read the phone book came lenges” sidebar for a description of for our readers. up with ideas for turning those cups each day’s challenge. into earrings, musical instruments, and INNOVATIVE DAYDREAMING more. ACCEPTING THE CHALLENGE Neuroscientists have been studying In considering this burst of creativ- Here, I examine my own experiences what the brain does when it isn’t doing ity, the belief is that boredom gets you with the six-day “Bored and Brilliant” anything in particular.1 Neuroimag- to start daydreaming and allows your challenges. ing studies have found that the brain mind to wander. It moves you beyond is surprisingly busy. In addition, the the conscious mind to the subcon- Pocket Your Phone body is putting quite a bit of effort into scious, which is where your imagi- I couldn’t complete this challenge that activity, as measured by a drop in nation is most active. Consequently, because it wasn’t realistic for me. Wom- blood ow of just 5–10 percent during “missing out” on boredom could be a en’s clothing generally either doesn’t periods of “rest.” Functional magnetic major problem from the perspective of have pockets or has pockets too small resonance imaging suggests that day- inventing creative solutions to impor- to be of any use, so I carry my phone in dreaming is the default mental state of tant problems. my purse or my hand (at work). This the human mind. What does this have to do with per- past week, I carried my phone and my Meanwhile, Sandi Mann from vasive computing? Consider the last laptop in a bag all day. I found that it the University of Central Lancashire time you were bored and what you did. became a conscious decision to check wondered what could possibly be the Did you pull out your smartphone and my phone rather than a habit when evolutionary point of boredom. Mann check your email? Play a game? Watch my mind began to wander. I was con- performed a study in which she got a video? Smartphones provide an end- cerned that I would miss important participants as bored as possible—hav- less stream of entertainment (as long as texts or calls, but that turned out not ing them copy phone numbers from a your battery is charged). We never have to be a problem (and, yes, I did catch telephone book for 20 minutes—after to be bored! And if we never have to be an important text message even though which point she asked them to think of bored, are we losing the potential time my phone was in my tote bag). I am as many uses as possible for two paper to daydream and nd creative, imagina- undecided about whether I will con- cups.2 In the next experiment, she had tive solutions to important problems? tinue to carry my phone and laptop in them do something even more bor- This brings me to NPR’s “Bored a bag every day, but it’s something I’m ing—simply read the phone book. Yet and Brilliant” series. The series, considering.

MISSION STATEMENT: IEEE Pervasive Computing is a catalyst for advancing research and practice in mobile and ubiquitous computing. It is the premier publishing forum for peer-reviewed articles, industry news, surveys, and tutorials for a broad, multidisciplinary community.

2376-113X/15/$31.00 © 2015 IEEE Published by the IEEE Computer Society June 2015 Published by the IEEE CS n 1536-1268/15/$31.00 © 2015 IEEE PERVASIVE computing43 5 FROM THE EDITOR IN CHIEF FROM THE EDITOR IN CHIEF

NPR: NEW TECH CITY’S “BORED AND BRILLIANT” CHALLENGES

Here are the daily changes issued as part of the “Bored and Bril- Day 4: Take a Fauxcation liant” series. For more information, see www.wnyc.org/series/ Disconnect from the digital world for a day. Set an out-of-of ce bored-and-brilliant. message as if you were on vacation. Set an “away” message on instant messaging and social media. Disconnect at work and Day 1: Keep Your Phone in Your Pocket take some time to just think. Keep your phone in your bag when you are in motion. By not carrying your phone, you ease your sense that part of your at- Day 5: One Small Observation tention must be on your phone. It will also open up some time Go somewhere public, anywhere, and hang out. Observe the to daydream. To learn more, read The Distraction Addiction, by world around you and let your mind wander. Just notice some- Alex Soojung-Kim Pang (Little, Brown and Company, 2013). thing—anything. This is the type of situation in which humans are most creative and imaginative. Day 2: Photo-Free Day See the world through your eyes—not your screen. Don’t take Day 6: Dream House any photo! A study done at Fair eld University in Connecticut Put your phone away. Get bored (by watching a generous pot showed that taking a photo in an art museum impacts your abil- of water come to a boil or writing 0s and 1s on a small piece of ity to remember what you see.1 By outsourcing your memories paper in small font). Then, empty the contents of your wallet to your camera, your brain doesn’t bother storing the informa- onto the table and use the items to create your dream house. tion. Give the house a name, take a photo, and then send it in.

Day 3: Delete That App We all have that one app that we spend too much time on. Find REFERENCE the app that is wasting your time… and then delete it. For more 1. L.A. Henkel, “Point-and-Shoot Memories: The Inuence of Taking information about how these games can be addicting, check Photos on Memory for a Museum Tour,” Psychological Science, Dec. out Hooked: How to Build Habit-Forming Products by Nir Eyal 2013; http://pss.sagepub.com/content/early/2013/12/04/095679761 (2013). 3504438.full.pdf+html.

Put Down the Camera instant messaging, nor to Facebook. My Lessons Learned The “no photos” day was probably laptop is open and I am using a computer, The biggest lesson I took away from the least appropriate challenge for me. but it is a tool to support me and not a the “Bored and Brilliant” series was to Because I normally don’t take photos tool that can demand anything from me. remember to be purposeful about when except during touristy activities and to use technology. Another lesson was because this challenge occurred on a Observe that being bored is good because our workday, this was trivial for me. I did nd For this challenge, I went to a large brains might do critically important the discussion about how taking photos bookstore in New York City, with work during exactly that sort of “down can hurt our ability to remember the “miles” of bookshelves. The interest- time.” And nally, I took away the les- experience very interesting and will need ing thing is that people were not, by son that I need to make sure that my to consider this during our next vacation. and large, using their phones. They use of technology does not take away were looking at books. My child sat 100 percent of my boredom. Stop Playing Useless Apps on the floor reading a book that a The conclusion of the series got me This was my favorite challenge. I friend had just purchased. No texting. to thinking about other challenges, ones deleted two time-wasting apps: Two No videos. No games. Just reading… appropriate to pervasive computing users. Dots and Bonza. And I don’t miss them! paper books! My plan is to issue my own challenge to I don’t turn to them at every “boring” you each issue to help you evaluate your moment. I also don’t accidentally stay Embrace Boredom use of pervasive technologies and help up late playing them. They both stayed I must admit that I didn’t bore myself and you nd more time to be bored! You’ll deleted on Day 4 and beyond. then try to build a dream house out of nd the rst challenge in the “Pervasive items in my wallet. I just couldn’t bring ‘Bored and Brilliant’ Challenge” sidebar. Disconnect myself to watch a pot of water come to This was another favorite challenge— a boil! That seems a bit too much like IN THIS ISSUE taking a fauxcation from the digital watching the grass grow! But those who The theme for this special issue is “Inter- world. In fact, I do this regularly when did complete the challenge produced some acting with Smart Spaces,” with Sumi I need quiet time when thoughtfulness is pretty creative work (see www.wnyc. Helal and Sasu Tarkoma serving as guest required. For example, as I write this mes- org/story/winning-wallet-dream-houses- editors. Smart spaces hold the potential sage, I am not connected to email, nor to artist-nina-katchadourians-picks). to allow technology to support our needs

ComputingEdge June 2015 6 44PERVASIVE computing www.computer.org/pervasive FROM THE EDITOR IN CHIEF

and fade into the background. Might PERVASIVE “BORED AND BRILLIANT” CHALLENGE they someday also support boredom? Perhaps we could check our phones at How does social media enhance or detract from boredom? I considered my own use of the door, knowing that the room would Facebook, which I access more and more from my phone these days. I originally joined inform us if an important call or noti ca- Facebook to see photos of my adorable niece. Over time, my Facebook feed has be- come dominated by Mashable and Buzzfeed and similar streams. I nd these feeds to tion arrived. Of course, there are many be entertaining, but in the category of the time-wasting app. So, I recently hid those challenges that the designers of such feeds. This increases the percentage of updates coming from and family and smart spaces face, ranging from the ques- I’m enjoying Facebook more. Another challenge that went from trial to permanent! tion of where to process captured data So my challenge for you this issue is to examine your social media. What elements of your feeds are serving your needs? What elements are wasting time? Once you to that of how to know who is located identify these “empty calories,” hide them for a day or week and see whether you where within the space. I thank Helal think the change is positive or negative. and Tarkoma for the excellent work they have done to bring you this issue, which explores many of these challenges. are discussed in detail in the article. The report, Nicola Dell and Trevor Perrier I’d also like to take this opportunity question in my mind is whether these from the University of Washington report to thank IEEE Pervasive Comput- ideas can be implemented in vehicles on the 2014 ACM Annual Symposium on ing reviewers. For a list of the 2014 before driverless cars become available. Computing for Development. They pro- reviewers, please see www.computer.org/ For our department lineup this issue, vide a nice overview of each of the key- cms/Computer.org/dl/mags/pc/2015/02/ I’m afraid we begin by saying goodbye notes and each of the papers presented extras/mpc2015020005s.pdf. to a dear friend and colleague, Gaetano during the conference. I was impressed by We also have two feature articles this Borriello. Gaetano was a founding mem- the variety of work being done to address issue. The rst is “Proximity Detection ber of the Editorial Board of IEEE Per- the signi cant challenges experienced in with RFID,” by Miodrag Boli ´c, Majed vasive Computing until stepping down developing areas. They also observe that Rostamian, and Petar M. Djuri ´c. They from our Advisory Committee in late one of DEV’s strengths is the diversity of show how their Sense-a-Tag system can 2014. We will deeply miss his kind heart, its participants, with researchers coming facilitate the Internet of Things. One key generous spirit, and wise counsel. Please together from many different communi- feature of the IoT is the ability for things be sure to read the In Memoriam depart- ties, allowing for cross-pollination and to know about other things in their ment—my tribute, honoring his legacy. seeding interesting collaborations. immediate vicinity—which isn’t possible Another tribute for Borriello occurred Our Innovations in Ubicomp Products with UHF-based RFID systems. How- at the Sixteenth Workshop on Mobile department highlights the role of tool- ever, using their approach, the authors Computing Systems and Applications ing in the IoT. Christian Weichel, Jason show how to perform ne-grain localiza- (ACM HotMobile 2015), which is cov- Alexander, Abhijit Karnik and Hans tion in a few different scenarios using a ered in our Conferences department. Gellersen describe two IoT tools and traditional RFID system enhanced with Brad Campbell, Thomas Zachariah, the ways they are used in digital fabri- a network of Sense-a-Tags. and Noah Klugman from the University cation to reduce the number of context The second feature article is “Pre- of Michigan report on the workshop, shifts makers typically experience. Each dicting Reduced Driver Alertness on which began with a keynote by Mark context shift disrupts the ow of design, Monotonous Highways,” by Gre- Corner, CTO of Fiksu and associate and these tools have shown a signi cant goire S. Laure, Andry Rakotonirainy, professor at the University of Massachu- reduction in context shifts. This work and Anthony N. Pettitt. The authors setts, Amherst. Corner shared his views highlights the intersection between IoT evaluate a range of machine-learning of the academic and start-up worlds technologies and digital fabrication! algorithms for their ability to detect and discussed both their similarities and This issue’s Health department looks reduced driver alertness. They use EEG differences. Campbell, Zachariah, and at “Living Labs for Pervasive Healthcare signals as the gold standard and exam- Klugman then summarize the papers and Research.” Jesus Favela, Jeffrey Kaye, ine a number of surrogate measures that topics and discuss the tribute at the con- Marjorie Skubic, Marilyn Rantz, and are easier to collect in a vehicle, includ- ference banquet. Participants toasted the Monica Tentori look at three different ing heart rate and eye activity. Their memory of Borriello and his many con- living laboratories: the Oregon Center ndings show that neural networks can tributions to the eld. I think he would for Aging and Technology, the Tiger- detect a substantial number of periods have liked that. Place senior housing center in Missouri, of inattention with a low rate of false Furthermore, we’ve done something and the Pasitos smart school for children alarms in plenty of time to support in- different this issue and are covering two with autism. They consider the utility of vehicle interventions. These exciting recent events in our Conferences depart- these living labs in terms of both user- results do have some limitations, which ment. In addition to the HotMobile centered design and evaluating pervasive

www.computer.org/computingedge APRIL–JUNE 2015 PERVASIVE computing45 7 FROM THE EDITOR IN CHIEF FROM THE EDITOR IN CHIEF

This article originally appeared in IEEE Pervasive Computing vol. 14, no.2, 2015.

technologies in the eld. They also high- of the ethical issues of monitoring precious joules. However, I challenge light the challenges living labs face in our children. Another takes a look at you to be mindful about your use of terms of funding, maintenance, and data a 3D printed exoskeleton to defend a technology. Use it to serve you and the overload. If you are considering building woman’s personal space. A third sum- rest of humanity; don’t allow it to waste a living lab, this article is a good overview marizes some of the very real issues your time and reduce your creativity! of the costs and bene ts such a lab pro- around drones own by inexperienced vides and gives good pointers to a number pilots. This third topic hit a nerve with REFERENCES of examples. me because, during a tour I took at 1. K. Smith, “Neuroscience: Idle In our Smartphones department, Olana, a historic property in New York Minds,” Nature, 19 Sept. 2012; www. Thierry Moreau, Adrian Sampson, and State, I observed rst-hand the concern nature.com/news/neuroscience-idle- Luis Ceze bring approximate computing of the staff when two teenagers showed minds-1.11440. and its relevance to pervasive comput- up with remote-controlled aircraft. 2. “Being Bored at Work Can Make ing practitioners to our attention. They One wrong “turn” could cause untold Us More Creative,” Science Daily, 9 highlight work done to build program- damage to the historic property—and Jan. 2013; www.sciencedaily.com/ releases/2013/01/130108201517.htm. ming language extensions, a compiler apparently has in the past. I encourage that makes energy/performance trad- you to join our subreddit community eoffs, and a hardware co-processor and participate in the discussions. that supports approximate computing. Maria R. Ebling is a director at the IBM T.J. Watson Applications of this technology to image Research Center. She manages a team building sys- recognition or sensor data analysis might n closing, one of the things I like tems capable of supporting a Smarter Planet while come to a smartphone near you in the I most about IEEE Pervasive Com- not forgetting about the people who use such sys- (not-too-distant) future. This is certainly puting is learning about the many ways tems. Ebling received her PhD in computer science a technology worth following! people are using technology to serve from Carnegie Mellon University. She’s a member This issues’ Notes from the Commu- our communities, whether that’s serv- of the IBM Academy of Technology, a distinguished nity discusses a number of interesting ing people in the developing world or member of the ACM, and a senior member of IEEE. topics. One discussion examines some guring out how to make better use of Contact her at [email protected].

Call for Articles IEEE Pervasive Computing

seeks accessible, useful papers on the latest

peer-reviewed developments in pervasive,

mobile, and ubiquitous computing. Topics

include hardware technology, software

infrastructure, real-world sensing and Author guidelines: interaction, human-computer interaction, www.computer.org/mc/ and systems considerations, including pervasive/author.htm deployment, scalability, security, and privacy. Further details:

[email protected] www.computer.org/pervasive MOBILE AND UBIQUITOUS SYSTEMS

ComputingEdge June 2015 8 46PERVASIVE computing www.computer.org/pervasive Editor: Grady Booch IBM, grady@ ON COMPUTING computingthehumanexperience.com

Of Boilers, Bit, and Bots

Grady Booch

ONCE UPON A TIME, boilers used burning boilers, but that too mostly far less sympathetic. As many have to blow up quite often, killing many came back into balance (only to be noted, putting an unsecured IP cam- people. subsumed by other kinds of energy- era on the Internet is akin to placing This was generally not seen as a related pollution). your home or of ce on a busy pub- good thing. But, by going back in time, I get lic street, installing large glass win- Despite the comforts that boilers ahead of myself. Let’s begin again dows, and leaving the drapes open. brought to life—trains and steam- with three contemporary stories. Of course—as the digerati point ships that could transport people out—you have abrogated your right and goods faster than a horse, cen- On Privacy, Regulation, to privacy by being so careless. tral heating for buildings previously and Encryption Amazon just announced the Echo, warmed by individual replaces, There’s a site that lets you watch tens an intentionally unobtrusive physi- power for innumerable manufactur- of thousands of unsecured Internet cal artifact that embodies Alexa, an ing industries from milling to weav- connected cameras (www.insecam. ever-present digital personal assis- ing to machining—the social trans- com). The public outrage over this tant. Alexa joins a growing family of formation and human cost couldn’t site has been rather vociferous, espe- personal digital assistants, including be neglected. In the second half of cially by those who have found their Apple’s , Microsoft’s , the 1800s, professional engineering home or of ce on the list. Their re- and Google’s Now. organizations formed, best practices action is quite understandable. For We aren’t by any means even were codi ed into law, and the ethos the most part, we all have some ex- close to a really personal digital as- of living with these noisy, smelly, pectation of privacy in our personal sistant such as Samantha, as found and sometimes explosive boilers spaces, and we rightfully assume that in the universe of Spike Jonze’s Her, slowly entered the daily life of ev- what happens behind closed doors but it’s not hard to trace the trajec- eryone dwelling in an industrialized will remain hidden from public view. tory of such technology. Human as city. It took much longer to regulate On the other hand, the reaction we are, we often desire an uncompli- the pollution associated with coal- by the technical community has been cated and compliant companion to

2376-113X0740-7459/15/$31.00/15/$31.00 © 2015 © IEEE 2015 IEEE Published by the IEEE Computer SocietyJANUARY/FEBRUARY 2015 | IEEEJune SOFTWARE 2015 11 47

s1onc.indd 11 12/9/14 3:06 PM ON COMPUTING

assist us with the tedium and cruft Now and Then of the Internet of Things. Who in his of life. Even today, the wealthy and Let’s return to the age of boilers, or her right mind would have imag- the famous might have the means to the age of the great Industrial Rev- ined a world in which doorknobs and hire a esh-and-blood personal as- olution that transformed nations light bulbs would have unique IP ad- sistant; technologies such as Alexa, and lives. This was also the age of dresses, much less each of us carry- Siri, Cortana, and Now bring some Charles Babbage and Charles Dick- ing around mobile network device of that ease to the masses. ens (who, by the way, died only (our phones) and driving around in That being said, there are cer- about a year apart). In his marvel- our cars (which themselves are net- tainly issues worth debating pub- ous book Charles Dickens in Cyber- worked)? Well, actually, a few pre- lically. As one observer wryly space (Oxford Univ. Press, 2006), scient folks did predict such a thing, noted regarding Echo’s product Jay Clayton speaks of the societal but the basic undercarriage of the features, the “NSA, CIA, and FBI transformation that took place in original Internet was never crafted for would like to personally thank that era, a time that I also spoke of in such circumstances (thus the recent Amazon for installing spy mics in my earlier column, “To Code or Not move from the IPV4 address to IPV6). every home” (http://techcrunch. to Code” (IEEE Software, vol. 31, In the early days of the Industrial com/2014/11/06/amazon-echo/ no. 5, 2014, pp. 9–11). Referring to Revolution, who would have thought #comments). While I don’t ex- Jane Austen’s novel Mans eld Park, of putting a boiler in every home? actly share that level of cynicism or Clayton observes that part of the Well, we do now, in the form of wa- paranoia, the observer does make plot hinges on “the consequence of ter heaters. These things are still ca- a valid point: In a digital world, complex interactions among varied pable of explosion and damage, but what’s the meaning of trust? communications media”—in short, we’ve largely engineered the risk out There are any number of legal the juxtaposition of the pen and pa- of them. Also, their user interface is battles going on whose front lines per against the telegraph. Clayton so simple that we mostly don’t even are at the con uence of the digital notes, “we live in an undisciplined think about them, they have so faded and the social. The FCC is at the culture again,” so our challenges in so completely out of sight. center of the debate about network adapting to a digital culture are born So it will be with these cameras neutrality. Many ISPs are against out of the same human dynamics and other connected devices, but it, driven by economic needs that that people in the time of Babbage with one big difference. By their na- prefer an unregulated Internet (just and Dickens faced in adapting to an ture, they’re connected in ways be- as long as the playing eld still tilts industrialized culture. yond our choice—their meaning is unnoticeably in their direction), Boilers used to blow up, but sci- materially different from the water whereas many of those represent- ence and industry were compelled to heaters we place in our homes. How ing consumer rights are against mitigate the underlying causes, and then do we cope? The general public it. FBI Director James Comey has society and the law eventually me- must adjust; they must accept the ad- come out against the efforts by tabolized their use. Cameras, digi- ditional risk that these things might Apple and Google to encrypt their tal assistants, and encryption some- blow up in unintended digital ways. phones in ways that increase con- times yield terrible results, yet the art At the same time, we who de- sumer privacy at the expense of law and science of computing is similarly velop, deploy, and deliver such tech- enforcement having easy access the compelled to mitigate their negative nology must engineer the risk out of data behind such encryption. Tay- aspects. Furthermore, we have a gen- them and make them so simple we lor Swift’s latest album 1989 went eration being born who doesn’t know don’t even think about them. As we platinum—the rst such album that these things once didn’t exist. engineers know, making things sim- of 2014, in a year in which mu- Let’s return to each of my con- ple is terribly hard, but the human sic sales were deeply reduced—in temporary stories one last time. use of our software-intensive arti- spite of explicitly withdrawing her facts demands it. tracks from the digital streaming Evolving Doors The rise of cognitive assistants service . The problem with unprotected cam- brings us to exactly the same perspec- What can we make of these con- eras is just one visible manifestation tive. Whereas the Internet of Things temporary stories? of a much larger issue: the growth connects us to one another, Siri, Cor-

48 12 IEEE SOFTWAREComputingEdge | WWW.COMPUTER.ORG/SOFTWARE | @IEEESOFTWARE June 2015

s1onc.indd 12 12/9/14 3:06 PM ON COMPUTING

tana, Now, and Alexa have the poten- because we live in an abundance of these modern-day digital boilers that tial to give us something much more computational resources, the energy entertain us, feed us, care for us, and intimate: ways to connect to our- costs of a simple RESTful interaction serve us. It’s our responsibility to en- selves, to reduce the friction of life. are often ignored. And yet, when sure that we do our work with the ut- We engineers still must drive the risk multiplied by trillions of times of exe- most professionalism and care for the out of these artifacts and make them cution, they do add up to cycles spent human spirit, to which our work is part of the atmosphere. This too is on a server, electricity consumed, ultimately directed. very hard, made even more so because and some fuel—fossil, hydroelectric, we’re talking about software-intensive nuclear, or solar—expended. systems that can become extremely We, who have the privilege to GRADY BOOCH is an IBM Fellow and one of UML’s original authors. He’s currently developing personal. Not only do we need good develop, deploy, and deliver soft- Computing: The Human Experience, a major trans- software engineers and cognitive sci- ware-intensive systems that matter, media project for public broadcast. Contact him at entists building such things, we also shouldn’t expect the general pub- [email protected]. need psychologists, cultural anthro- lic to grok the intimate technology pologists, and artists to be a part of with which we live and breathe and the journey. in which we delight. We must design As for the vibrant legal morass these artifacts as if our children’s This articleSelected originallyCS articles and appeared columns in that we now see at the intersection lives depended on them (and, in many are also available for free at IEEE http://ComputingNow.computer.org.Software, vol. 32, no. 1, 2015. of computing and humanity, let me cases, they do). We’re the builders of offer the positive spin on it that the presence of such noise might actu- ally be a good thing. Science and technology always precede the rule of law. The fact that we see public debate suggests that the time has - nally come for society to codify best practices into law, just as in the age of boilers. The thing we nonlawyer On Computing software types must get used to is podcast that the business of making laws is incredibly messy, often muddled and www.computer.org/oncomputing inconsistent, and rarely ever stable or settled. To that end, as computer sci- entists we must both accept the rule of law and not be silent in its making.

he story is often told of Steve Job’s maniacal focus T to shave milliseconds from seemingly trivial parts of the Mac OS. Under his point of view, even milliseconds—when multiplied by trillions of times of execution—add up to human cost. Early boilers were incredibly sloppy and wasteful, but we engineered ef ciencies into them. Most of our Web-centric systems are equally sloppy and wasteful, but

www.computer.org/computingedge JANUARY/FEBRUARY 2015 | IEEE SOFTWARE 13 49

s1onc.indd 13 12/9/14 3:06 PM Standards Editor: Barry Leiba • [email protected] Email Address Internationalization: 例子 @ 例子.中国

Arnt Gulbrandsen

Jiankang Yao • China Internet Network Information Center

For 30 years, Internet email addresses have used the format [email protected], with the character set A–Z, 0–9, ., and -. Gradually mail has been extended to sup- port bæ, löffel, and 中国 in most places, but not in addresses. Now Email Address Internationalization (EAI) work has added support for unicode in addresses, sim- plifying syntax simultaneously.

he Internet email stack has marvelous back- As the use of email widened around 2000, a ward compatibility: Mail senders from 1986 new audience appeared: people who spoke only T and mail readers from 2014 can still com- one language — not English — and wanted email municate. The price of that is that the infrastruc- addresses they could understand. For someone ture has grown more complex over time. who has no friends or associates in Boston, and In the 1990s, email protocols added support who perhaps can’t read Latin letters anyway, an for attachments and non-ASCII text in message ASCII address is more an impediment than a help. bodies, in the subject, and later even in attach- Thus, in 2003, the Internet Engineering Task ment file names. However, to achieve backward Force (IETF) introduced the first proposals to sup- compatibility and support the different encodings port non-ASCII email addresses. Around 2007 or used around the world, this required several kinds 2008, they tested a set of experimental extensions of encoding. A word such as Blåbærsyltetøy could and found them wanting. They reworked those be encoded one way if it’s in the message’s sub- experimental extensions, and in 2012 the IETF ject, another if it’s in the message body, a third published a set of workable standards and devel- way if it’s an attachment filename, and the first opers began implementing them. way again if it’s an attachment filename and the sender uses Microsoft Exchange. Email Address Internationalization However, the email addresses themselves have (EAI) Extensions remained unextended for a long time, for sev- Internet email is stored and transmitted mostly eral reasons. Perhaps most importantly, people using a handful of protocols and standards. The who used email tended to use it internationally, message format used universally is that defined so they needed ASCII addresses. Otherwise, their by RFC 5322, which is, in turn, largely compat- correspondents in places like Boston wouldn’t be ible with the one defined in 1982 by RFC 822. able to type them. RFC 5322 may be regarded as a clarification of Further, there was some concern that if people RFC 822 (that isn’t strictly true, but it’s close). had email addresses that are only readable within Various extensions were added to the mes- one country, these people essentially would sage format over the decades. Most importantly, be firewalled from the rest of the world. Many RFCs 2045–2047, part of the suite of Multipur- people in the email standards community didn’t pose Internet Mail Extensions (MIME), defined appreciate that thought. Content-Type, multipart mail, attachments (such

60 Published by the IEEE Computer Society 1089-7801/15/$31.00 © 2015 IEEE IEEE INTERNET COMPUTING 50 June 2015 Published by the IEEE Computer Society 2376-113X/15/$31.00 © 2015 IEEE Email Address Internationalization: 例子@例子.中国

as images), and the like, and RFC From: Jøran Øygårdvær 6376 definedDomainKeys Identified To: Arnt Gulbrandsen Mail (DKIM) signatures, a mecha- Subject: Blåbærsyltetøy nism used to confirm that the sign- Date: 20 May 2014 14:28:51 +0200 ing domain was, in fact, involved in sending the message. Blåbærsyltetøy er veldig godt. Jeg liker blåbærsyltetøy. Messages are sent from the user- Jøran. agent to the user’s server using an authenticated “submission” variant Figure 1. An example message in Email Address Internationalization (EAI) of the Simple Mail Transfer Protocol format. (SMTP; see RFC 6409), then onwards to the recipients’ servers using regu- lar SMTP (RFC 5321), and are finally From: =?utf-8?q?J=C3=B8ran_=C3=98yg=C3=A5rdv=C3=A6r?= accessed by the recipients using the To: Arnt Gulbrandsen Internet Message Access Protocol Subject: =?utf-8?q?Bl=C3=A5b=C3=A6rsyltet=C3=B8y?= (IMAP; see RFC 3501) or Post Office Date: 20 May 2004 14:28:51 +0200 Protocol version 3 (POP3; see RFC 1939). Mime-Version: 1.0 The EAI suite of protocols (see RFCs Content-Type: text/plain; charset=utf8 6530–6533 and 6854–6858) extends Content-Transfer-Encoding: quoted-printable the message format, SMTP, IMAP, and Bl=C3=A5b=C3=A6rsyltet=C3=B8y er veldig godt. Jeg liker bl=C3=A5b=C3=A6=rsyltet=C3=B8y. POP3, allowing the use of UTF-8 (the J=C3=B8ran. Universal Character Set Transforma- tion Format — 8-bit) to encode uni- code characters in addresses. Each Figure 2. A similar message in Multipurpose Internet Mail Extensions (MIME) EAI extension is similar: there’s a flag format. to indicate UTF-8 support; it becomes legal to use unicode strings (encoded 例子.中国. However, one mail server When EAI is used, email addresses as UTF-8) in most circumstances, pro- can easily serve both example.net.cn are almost entirely case-insensitive. In vided that both ends support that; and 例子.中国, and the 1986-vintage classic email, the domain is case-insen- and no character encodings other mail reader can exchange mail with sitive and the localpart (to the left of than ASCII and UTF-8 are allowed. ASCII-only addresses in the domain the “@”) may or may not be. Formally The EAI extensions are simpler than example.net.cn. speaking, in an address such as Fred@ most previous mail extensions, but we example.com, “example.com” is case- pay for that simplicity with one big Message Format insensitive and example.com decides limitation: they require everyone to Let’s consider an example of what an whether “Fred” is case-sensitive. support EAI and unicode addresses in EAI message looks like, compared to Everyone outside the example.com order for the extensions to be useful. classic email. The first message (Fig- domain is supposed to treat “Fred” Today, for example, Gmail supports ure 1) shows EAI in use. Figure 2 as case-sensitive, because it might EAI and Yahoo mail doesn’t. That means shows a similar message, without any be. Many users simply expect “Fred” that an EAI message can be sent to a EAI address. to be case-insensitive, and will read Gmail address, but not to a Yahoo mail As will be visible, the “To” and addresses over the phone without address. Yahoo users can’t send email to “Subject” fields and the body text all specifying case, but the RFCs specify 例子@例子.中国, receive email from use UTF-8 in EAI. There’s no extra that the domain owner decides whether 例子@例子.中国, or even receive email level of encoding to represent the “localparts” are case-sensitive. that’s copied to 例子@例子.中国. Users unicode characters in ASCII. MIME EAI changes that. If there’s at least of an email system that supports EAI encoded many things using the mech- one non-ASCII character in a local- can exchange email with both ASCII anisms specified in RFC 2047 and part, then that localpart is entirely and UTF-8 addresses (including a mix- RFC 2231. Internationalized domain case-insensitive. In Fë[email protected], ture of the two), while users of an email names use “punycode” to encode both localpart and domain are case- system that doesn’t support EAI can names in the Domain Name System insensitive, and “Fëdor” and “fëdor” only deal with ASCII email addresses. (DNS). The EAI message format uses are both assured to be valid and the Similarly, a mail reader from 1986 neither, which simplifies implement- same. (This change could be pointed can’t be used to send mail to 例子@ ing EAI considerably. out more prominently in the RFCs.)

MAy/jUNE 2015 61 www.computer.org/computingedge 51 Standards

Apart from these changes, EAI is In the example, the client sends C: d create “maßkrug” exactly like the classic email in use the usual EHLO command (extended S: d OK done since the 1980s. One of the authors was hello), and the server’s response indi- able to update one program in about cates that it supports unicode addresses The server advertises that it supports an hour, and another (23-year-old) (the SMTPUTF8 extension). Note that unicode addresses. program needed no changes at all: it the EHLO can’t use unicode: the Command “a” is the client login. just had to be tested. (Not everything is client doesn’t know yet whether the (In the wild, this should properly use that simple, however: a third program server supports it. AUTHENTICATE, but LOGIN is so much needed weeks of steady work.) The source address in this example nicer in print than AUTHENTICATE, For a more complex message, with uses only ASCII, but the client specifies with the latter’s long base64 strings.) attachments, the simplifications are a the SMTPUTF8 extension on the MAIL Command “b” enables unicode sup- little greater. However, Delivery Status FROM command because it knows that port, command “c” opens the inbox, Notifications (DSNs, as defined in RFC something else about the message and command “d” creates a mailbox 6533 and older RFCs) are somewhat needs unicode. The server responds called maßkrug (containing the Ger- more complex, because it can be nec- with OK, agreeing that it will accept man “eszett” character). IMAP afficio- essary to send new unicode addresses unicode addresses. From that point, nados will appreciate that words such even to unicode-ignorant senders. everything is similar to classic email, as “maßkrug” require no encoding For instance, if [email protected] except that it can use unicode addresses contortions. sends mail to [email protected]. and the simpler message format that When an unextended IMAP cli- cn, which is forwarded to 例子@例 includes unicode characters. ent accesses an extended server, the 子.中国 and is rejected by the spam If the SMTP server doesn’t sup- server has three options. First, it can filter there, it’s formally necessary to port the SMTPUTF8 extension, things deny the client’s SELECT commands if report this to [email protected], even grow more complicated. In general, it the user tries to open a mailbox con- though yahoo.com can’t really handle ends up being returned to the sender taining unicode addresses (because the the failing address. Because of this, (“bounced”) if it requires that support. client hasn’t enabled support for those DSNs exist in two varieties now. IMAP is similarly extended: the addresses, and wouldn’t be able to han- server advertises unicode support, dle the UTF-8 in the server’s responses). SMTP and IMAP and the client enables it using the Second, it can implement either RFC SMTP, IMAP, and POP3 all needed to IMAP ENABLE command. Once that’s 6857 or RFC 6858, both of which specify be extended by EAI, and RFCs 6531– done, both the client and server may ways to present “downgraded” extended 6533 and 6855–6858 define those send UTF-8 in any strings where they messages that unextended clients can extensions. previously used ASCII. The follow- read (RFC 6857 is more ambitious, while SMTP, like most of the really old ing is an example (one line has been RFC 6858 is simpler to implement). Internet standards, is based on “lines” of wrapped for layout reasons): Both of these approaches render mes- text, which each line ends with a speci- sages well enough that the user can read fied line-end character or sequence. Cli- S: * OK [CAPABILITY ...] Hi! mail, download attachments, and so on. ents send lines of text to servers, and Replying isn’t possible, though, because servers send lines of text back. C: a login arnt p1ls there are no valid email addresses to The SMTP extensions are plain: S: a OK [CAPABILITY IMAP4rev1 replace the unicode addresses that the The server declares that, in addition to ENABLE UTF8=ACCEPT] done client doesn’t support. ASCII, the client may use unicode with Last, it can simply present the cli- UTF-8 encoding, the client uses that, C: b enable utf8=accept ent with unicode-extended email and all is well. Here’s an example (lines S: * ENABLED UTF8=ACCEPT messages. This is, strictly speaking, for- written by the client start with C, ones S: b OK done bidden, but if a server should do this it with the server start with S): would hardly be the first time a client C: c select inbox is exposed to syntactically invalid mail. C: ECHO mta.example.com S: * FLAGS (\Answered ...) A survey by the Gmail development S: 250-mta.beispiel.de S: * 73897 EXISTS team shows that this approach works ... S: * 0 RECENT fairly well in practice. But again, the S: 250 SMTPUTF8 S: * OK [UIDNEXT 252246] client won’t be able to reply. C: MAIL FROM: S: * OK [UIDVALIDITY 2] The situation regarding POP3 is SMTPUTF8 S: * OK [UNSEEN 68666] entirely similar; however, POP3 imple- S: 250 2.1.0 Ok S: c OK [READ-WRITE] done menters appear to be either uninterested

62 www.computer.org/internet/ IEEE INTERNET COMPUTING 52 ComputingEdge June 2015 Email Address Internationalization: 例子@例子.中国

or extinct. We don’t know of any POP3 implementations of the EAI extensions. PURPOSE: The IEEE Computer Society is the world’s largest association of computing professionals and is the leading provider of technical information in the field. MEMBERSHIP: Members receive the monthly magazine Computer, discounts, and hile this article provides exam- opportunities to serve (all activities are led by volunteer members). Membership is W ples using both European and open to all IEEE members, affiliate society members, and others interested in the Chinese unicode characters, the main computer field. interest in EAI is from countries COMPUTER SOCIETY WEBSITE: www.computer.org using CJK (Chinese-Japanese-Korean) Next Board Meeting: 1–5 June 2015, Atlanta, GA, USA characters. EAI support is reportedly EXECUTIVE COMMITTEE growing in those countries, because it President: Thomas M. Conte satisfies a very strong need, and the President-Elect: Roger U. Fujii; Past President: Dejan S. Milojicic; Secretary: vast majority of their users mostly use Cecilia Metra; Treasurer, 2nd VP: David S. Ebert; 1st VP, Member & Geographic email within their own country. Activities: Elizabeth L. Burd; VP, Publications: Jean-Luc Gaudiot; VP, Professional As EAI-enabled email increases & Educational Activities: Charlene (Chuck) Walrad; VP, Standards Activities: Don there and makes its way out to the rest Wright; VP, Technical & Conference Activities: Phillip A. Laplante; 2015–2016 of the world, we expect EAI support in IEEE Director & Delegate Division VIII: John W. Walz; 2014–2015 IEEE Director & both SMTP servers and infrastructure, Delegate Division V: Susan K. (Kathy) Land; 2015 IEEE Director-Elect & Delegate and webmail and IMAP (and, possi- Division V: Harold Javid bly, POP3) clients to increase as well, BOARD OF GOVERNORS in a manner similar to how MIME Term Expiring 2015: Ann DeMarle, Cecilia Metra, Nita Patel, Diomidis Spinellis, Standards supportEmail grew. AddressToday, essentially Internationalization: every Phillip A. 例子 Laplante,@ Jean-Luc例子.中国 Gaudiot, Stefano Zanero email user can send and receive mes- Term Expriring 2016: David A. Bader, Pierre Bourque, Dennis J. Frailey, Jill I. sage bodies in other character sets, Gostin, Atsuhiro Goto, Rob Reilly, Christina M. Schober which also contain attachments. Term Expiring 2017: David Lomet, Ming C. Lin, Gregory T. Byrd, Alfredo Benso, Forrest Shull, Fabrizio Lombardi, Hausi A. Muller Apart from these changes, EAI is In the example, the client sends C: d create “maßkrug” or extinct. We don’t know of any POP3 Perhaps in a few years, every email implementations of the EAI extensions. EXECUTIVE STAFF exactly like the classic email in use the usual EHLO command (extended S: d OK done userPURPOSE: will be The able IEEE toComputer receive Society mail is from the world’s largest association of computing Executive Director: Angela R. Burgess; Director, Governance & Associate Executive since the 1980s. One of the authors was hello), and the server’s response indi- addressesprofessionals like and isjøran@blåbærsyltetøy. the leading provider of technical information in the field. Director: Anne Marie Kelly; Director, Finance & Accounting: John G. Miller; able to update one program in about cates that it supports unicode addresses The server advertises that it supports exampleMEMBERSHIP: and from Members 例子 receive@例子 the.中国 monthly. magazine Computer, discounts, and Director, Information Technology Services: Ray Kahn; Director, Membership: Eric an hour, and another (23-year-old) (the SMTPUTF8 extension). Note that unicode addresses. hile this article provides exam- opportunities to serve (all activities are led by volunteer members). Membership is Berkowitz; Director, Products & Services: Evan M. Butterfield; Director, Sales & ples using both European and Arntopen Gulbrandsen to all IEEE members, is a long-haired affiliate Unix society hacker members, and others interested in the program needed no changes at all: it the EHLO can’t use unicode: the Command “a” is the client login. W Marketing: Chris Jensen just had to be tested. (Not everything is client doesn’t know yet whether the (In the wild, this should properly use Chinese unicode characters, the main computerwho interrupted field. his CS/mathematics stud- COMPUTER SOCIETY OFFICES that simple, however: a third program server supports it. AUTHENTICATE, but LOGIN is so much interest in EAI is from countries COMPUTERies to join SOCIETYa startup, WEBSITE: and has www.computer.orgbeen work- Washington, D.C.: 2001 L St., Ste. 700, Washington, D.C. 20036-4928 needed weeks of steady work.) The source address in this example nicer in print than AUTHENTICATE, using CJK (Chinese-Japanese-Korean) Nexting Board mostly Meeting: in startups 1–5 Junesince. 2015, His Atlanta, interests GA, USA Phone: +1 202 371 0101 • Fax: +1 202 728 9614 • Email: [email protected] For a more complex message, with uses only ASCII, but the client specifies with the latter’s long base64 strings.) characters. EAI support is reportedly include computer communication, such as EXECUTIVE COMMITTEE Los Alamitos: 10662 Los Vaqueros Circle, Los Alamitos, CA 90720 MAIL b growing in those countries, because it email, and software documentation. Con- attachments, the simplifications are a the SMTPUTF8 extension on the Command “ ” enables unicode sup- President: Thomas M. Conte Phone: +1 714 821 8380 • Email: [email protected] little greater. However, Delivery Status FROM command because it knows that port, command “c” opens the inbox, satisfies a very strong need, and the President-Elect:tact him at [email protected]. Roger U. Fujii; Past President: Dejan S. Milojicic;Membership Secretary: & Publication Orders Notifications (DSNs, as defined in RFC something else about the message and command “d” creates a mailbox vast majority of their users mostly use Cecilia Metra; Treasurer, 2nd VP: David S. Ebert; 1st VP, Phone:Member +1 & 800Geographic 272 6657 • Fax: +1 714 821 4641 • Email: [email protected] 6533 and older RFCs) are somewhat needs unicode. The server responds called maßkrug (containing the Ger- email within their own country. JiankangActivities: Yao Elizabethis a senior L. engineer Burd; VP, at Publications:China Inter- Jean-Luc Gaudiot;Asia/Pacific: VP, Professional Watanabe Building, 1-4-2 Minami-Aoyama, Minato-ku, Tokyo 107- more complex, because it can be nec- with OK, agreeing that it will accept man “eszett” character). IMAP afficio- As EAI-enabled email increases & netEducational Network Activities: Information Charlene Center (Chuck) (CNNIC). Walrad; VP, Standards0062, Japan Activities: • Phone: Don +81 3 3408 3118 • Fax: +81 3 3408 3553 • Email: tokyo.ofc@ essary to send new unicode addresses unicode addresses. From that point, nados will appreciate that words such there and makes its way out to the rest Wright;His research VP, Technical interests & Conferenceinclude internation Activities:- Phillip A.computer.org Laplante; 2015–2016 IEEE Director & Delegate Division VIII: John W. Walz; 2014–2015 IEEE Director & even to unicode-ignorant senders. everything is similar to classic email, as “maßkrug” require no encoding of the world, we expect EAI support in alized domain names, email address inter- IEEE BOARD OF DIRECTORS Delegate Division V: Susan K. (Kathy) Land; 2015 IEEE Director-Elect & Delegate For instance, if [email protected] except that it can use unicode addresses contortions. both SMTP servers and infrastructure, nationalization, and DNS technology. Yao President & CEO: Howard E. Michel; President-Elect: Barry L. Shoop; Past Division V: Harold Javid sends mail to [email protected]. and the simpler message format that When an unextended IMAP cli- and webmail and IMAP (and, possi- has a DE in computer software and theo- President: J. Roberto de Marca; Director & Secretary: Parviz Famouri; Director cn, which is forwarded to 例子@例 includes unicode characters. ent accesses an extended server, the bly, POP3) clients to increase as well, BOARDries. Contact OF GOVERNORS him at [email protected]. & Treasurer: Jerry Hudgins; Director & President, IEEE-USA: James A. Jefferies; 子.中国 and is rejected by the spam If the SMTP server doesn’t sup- server has three options. First, it can in a manner similar to how MIME Term Expiring 2015: Ann DeMarle, Cecilia Metra, Nita Patel,Director Diomidis & President, Spinellis, Standards Association: Bruce P. Kraemer; Director & VP, filter there, it’s formally necessary to port the SMTPUTF8 extension, things deny the client’s SELECT commands if support grew. Today, essentially every Phillip A. Laplante, Jean-Luc Gaudiot, Stefano Zanero Educational Activities: Saurabh Sinha; Director & VP, Membership and Geographic report this to [email protected], even grow more complicated. In general, it the user tries to open a mailbox con- email user can send and receive mes- Term Expriring 2016: David A. Bader, Pierre Bourque, DennisActivities: J. Frailey, Wai-Choong Jill I. Wong; Director & VP, Publication Services and Products: This article originally appeared in Sheila Hemami; Director & VP, Technical Activities: Vincenzo Piuri; Director & though yahoo.com can’t really handle ends up being returned to the sender taining unicode addresses (because the IEEE_half_horizontal_Q6:Layoutsage bodies in other character sets, 1 4/21/11Gostin, 4:21 Atsuhiro PM Page Goto, Rob1 Reilly, Christina M. Schober IEEE Internet Computing, vol. 19, no. 3, 2015. Delegate Division V: Susan K. (Kathy) Land; Director & Delegate Division VIII: which also contain attachments. Term Expiring 2017: David Lomet, Ming C. Lin, Gregory T. Byrd, Alfredo Benso, the failing address. Because of this, (“bounced”) if it requires that support. client hasn’t enabled support for those Forrest Shull, Fabrizio Lombardi, Hausi A. Muller John W. Walz DSNs exist in two varieties now. IMAP is similarly extended: the addresses, and wouldn’t be able to han- Perhaps in a few years, every email Selected CS articles and columns server advertises unicode support, dle the UTF-8 in the server’s responses). user will be able to receive mail from EXECUTIVEare also STAFFavailable for free at http:// revised 27 Jan. 2015 SMTP and IMAP and the client enables it using the Second, it can implement either RFC addresses like jøran@blåbærsyltetøy. ComputingNow.computer.org.Executive Director: Angela R. Burgess; Director, Governance & Associate Executive Director: Anne Marie Kelly; Director, Finance & Accounting: John G. Miller; SMTP, IMAP, and POP3 all needed to IMAP ENABLE command. Once that’s 6857 or RFC 6858, both of which specify example and from 例子@例子.中国. Director, Information Technology Services: Ray Kahn; Director, Membership: Eric MAy/jUNE 2015 63 be extended by EAI, and RFCs 6531– done, both the client and server may ways to present “downgraded” extended Berkowitz; Director, Products & Services: Evan M. Butterfield; Director, Sales & Arnt Gulbrandsen is a long-haired Unix hacker 6533 and 6855–6858 define those send UTF-8 in any strings where they messages that unextended clients can Marketing: Chris Jensen extensions. previously used ASCII. The follow- read (RFC 6857 is more ambitious, while who interrupted his CS/mathematics stud- SMTP, like most of the really old ing is an example (one line has been RFC 6858 is simpler to implement). ies to join a startup, and has been workEx-perimCOMPUTERenting SOCIETYwith OFFICESyour hiring process? Internet standards, is based on “lines” of wrapped for layout reasons): Both of these approaches render mes- ing mostly in startups since. His interests Washington, D.C.: 2001 L St., Ste. 700, Washington, D.C. 20036-4928 Phone: +1 202 371 0101 • Fax: +1 202 728 9614 • Email: [email protected] text, which each line ends with a speci- sages well enough that the user can read include computer communication, suchFi nasd ing the best computing job or hire shouldn’t be left to chance. Los Alamitos: 10662 Los Vaqueros Circle, Los Alamitos, CA 90720 email, and software documentation. IConEEE- Computer Society Jobs is your ideal recruitment resource, targeting fied line-end character or sequence. Cli- S: * OK [CAPABILITY ...] Hi! mail, download attachments, and so on. Phone: +1 714 821 8380 • Email: [email protected] ents send lines of text to servers, and Replying isn’t possible, though, because tact him at [email protected] 85,000 eMembershipxpert resea &rc Publicationhers and qOrdersualified top-level managers in software servers send lines of text back. C: a login arnt p1ls there are no valid email addresses to engineering, rPhone:obotic s+1, p 800rog 272ram 6657min •g Fax:, art +1ific i714al i n821tel l4641igen c• eEmail:, netw [email protected] and The SMTP extensions are plain: S: a OK [CAPABILITY IMAP4rev1 replace the unicode addresses that the Jiankang Yao is a senior engineer at China Intercom-municatioAsia/Pacific:ns, consul tWatanabeing, mod Building,eling, d a1-4-2ta s tMinami-Aoyama,ructures, and oMinato-ku,ther com Tokyoputer 107- net Network Information Center (CNNIC). 0062, Japan • Phone: +81 3 3408 3118 • Fax: +81 3 3408 3553 • Email: tokyo.ofc@ The server declares that, in addition to ENABLE UTF8=ACCEPT] done client doesn’t support. science-related fields worldwide. Whether you’re looking to hire or be hired, ASCII, the client may use unicode with Last, it can simply present the cli- His research interests include internation- computer.org IEEE Computer Society Jobs provides real results by matching hundreds of UTF-8 encoding, the client uses that, C: b enable utf8=accept ent with unicode-extended email alized domain names, email address inter- IEEE BOARD OF DIRECTORS relevant jobs with this hard-to-reach audience each month, in Computer and all is well. Here’s an example (lines S: * ENABLED UTF8=ACCEPT messages. This is, strictly speaking, for- nationalization, and DNS technology. Yao President & CEO: Howard E. Michel; President-Elect: Barry L. Shoop; Past written by the client start with C, ones S: b OK done bidden, but if a server should do this it has a DE in computer software and theomag- azine anPresidentd/or on:l iJ.n eRoberto-only! de Marca; Director & Secretary: Parviz Famouri; Director with the server start with S): would hardly be the first time a client ries. Contact him at [email protected]. & Treasurer: Jerry Hudgins; Director & President, IEEE-USA: James A. Jefferies; C: c select inbox is exposed to syntactically invalid mail. Director & President, Standards Association: Bruce P. Kraemer; Director & VP, C: ECHO mta.example.com S: * FLAGS (\Answered ...) A survey by the Gmail development httpEducational://ww Activities:w.c Saurabhom pSinha;u tDirectorer.o & rVP,g Membership/jobs and Geographic S: 250-mta.beispiel.de S: * 73897 EXISTS team shows that this approach works Activities: Wai-Choong Wong; Director & VP, Publication Services and Products: Sheila Hemami; Director & VP, Technical Activities: Vincenzo Piuri; Director & ... S: * 0 RECENT fairly well in practice. But again, the Delegate Division V: Susan K. (Kathy) Land; Director & Delegate Division VIII: S: 250 SMTPUTF8 S: * OK [UIDNEXT 252246] client won’t be able to reply. The IEEE Computer Society is a partner in the AIP CareerJohnNetw W.ork Walz, a collection of online job sites for scientists, engineers, and C: MAIL FROM: S: * OK [UIDVALIDITY 2] The situation regarding POP3 is compuSelectedting profe sCSsio naarticlesls. Othe r andpart necolumnsrs includ e Physics Today, the American Association of Physicists in Medicine (AAPM), American Association of Physics Teachers (AAPT), American Physicarevisedl Soci e27ty Jan.(AP 2015S), AVS Science and Technology, and the Society of Physics SMTPUTF8 S: * OK [UNSEEN 68666] entirely similar; however, POP3 imple- Studenarets (S alsoPS) aavailablend Sigma Pfori S ifreegma .at http:// S: 250 2.1.0 Ok S: c OK [READ-WRITE] done menters appear to be either uninterested ComputingNow.computer.org.

62 www.computer.org/internet/ IEEE INTERNET COMPUTING MAy/jUNE 2015 63 www.computer.org/computingedge 53

ce6gul.indd 53 5/22/15 10:09 PM CAREER OPPORTUNITIES

NAJANAJA LTD. seeks a PLM Tech- presentations/solution demonstra- positions available. Resumes to: Sapna nical Analyst for Irving, TX to gather/ tions. Also resp for build, delivery, & Rao, HR Mgr, 850 Technology Way, analyze requirements, create tech- mgmt of proof of concept & pilot proj- Libertyville, IL 60048. nical design for Windchill PLM proj- ects. Mail resumes to GSPANN, 362 ects, create proof of concepts using Fairview Way, Milpitas, CA 95035, PROGRAMMER ANALYST: Design, web stack, write technical docs, lead Attn: HR. develop, integrate, test and imple- onshore/o shore team. Tools used - ment application software utilizing J2EE, Windchill PLM (Product Lifecycle INTERSHOP DEVELOPER, Brightstar knowledge in Agile environment uti- Management), Confi guration/Change/ US, Inc. (Libertyville, IL) to Assist in lizing technologies like .Net Frame- CAD Management. Master’s degree, the dvlpmt of Brightstar’s next gener- work 4.0/4.5, C#.Net, ASP.Net Web Knowledge of SDLC & Windchill PLM ation e-Commerce processes & svcs Applications, Web Services, Ado.Net, reqd. Apply to [email protected] or for customers. Align to dsgn reqmts WinForms, LINQ, Visual Studio .Net, NajaNaja Ltd, 625 Heritage Ln, Flower of the Brightstar systms (applicable) to Sql Server Management Studio, Ja- Mound, TX 75022. clients are managed & successful for vaScript,VB Script, T-Sql,SQL server, applics locally, regionally or globally Oracle, HTML, XML,CSS, TFS, IIS,MS- TECHNICAL CONSULTANTS sought dvlpd. Identify technical issues & pro- Unit. Must be willing to travel & reloc. by GSPANN Technologies, Inc. in Mil- vide resolution steps. Dsgn & dvlp sys- Requires MS in comp sci, eng or rel. pitas, CA. Bach’s deg in Comp Sci, tms using Intershop platform. Reqmts: Mail resumes to Code Ace Solutions Engr, or rltd w/ 5 yrs exp. Provide cus- Bachelor’s deg, or foreign equiv, in Inc. 50 Cragwood Road, Ste 217, South tomers w/ service, support, problem Comp Sci or rltd fi eld. Min of 5 yrs exp Plainfi eld, NJ 07080. solving, & escalation. Understand/as- in job or of overall s/ware dvlpmt exp sess web dvlpmt, production reqmts, w/a min of 3 yrs working w/Intershop TECHNICAL LEAD/TEAM LEAD F/T goals, & problems/issues to propose/ Enfi nity 6.x or Intershop 7. Solid un- (Poughkeepsie, NY) Position in- provide solutions. Provide knowl trans- derstanding of SQL, Oracle SWL pre- volves travel to various unanticipated fer, mentoring, & training. Dsgn/implmt ferred. Exp w/project implmtn using worksites up to 100% of the time any- workfl ows as well as solutions using technologies such as Java, JSP, Serv- where in the United States. Must have Content Mgmt Systm. Build/deliver let, JDBC, XML/XSLT, & HTML. Multiple Bach deg or the foreign equiv in Comp

Cisco Systems, Inc. is accepting resumes for the following positions: Bellevue, WA: Technical Marketing Engineer (Ref.# BEL8): Responsible for Richardson, TX: Manager, Technical Services (Ref.# RIC18): Responsible enlarging company’s market and increasing revenue by marketing, supporting, for leading a team in the delivery of world-class customer support on a line and promoting company’s technology to customers. Travel may be required to of products or for a targeted group of customers. Telecommuting permitted. various unanticipated locations throughout the United States. Network Consulting Engineer (Ref.# RIC20): Responsible for the support and delivery of Advanced Services to company’s major accounts. Travel may Boxborough, MA: Project manager (Ref#: BOX16): Coordinate small, medium, be required to various unanticipated locations throughout the United States. large/complex and multiple projects throughout the project lifecycle (initiate, Telecommuting permitted. plan, execute, control, close) or a portion of a larger, more complex project. Telecommuting permitted. Rosemont, IL: Solutions Architect (Ref.# ROSE2): Responsible for IT advisory and technical consulting services development and delivery. Telecommuting Franklin, TN: Network Consulting Engineer (Ref.# FRA1): Responsible for permitted and travel may be required to various unanticipated locations the support and delivery of Advanced Services to company’s major accounts. throughout the United States. Telecommuting permitted. San Jose/Milpitas/Santa Clara, CA: Mechanical Engineer (Ref.# SJ75): Irvine, CA: Software Engineer (Ref.# IRV13): Responsible for the de nition, Provide mechanical support to engineering teams. Technical Marketing design, development, test, debugging, release, enhancement or maintenance Engineer (Ref.# SJ178): Responsible for enlarging company’s market and of networking software. Telecommuting permitted and travel may be increasing revenue by marketing, supporting, and promoting company’s required to various unanticipated locations throughout the United States. technology to customers. Travel may be required to various unanticipated Solutions Consultant (Ref.# IRV14): Responsible for planning, designing, locations throughout the United States. Test Engineer (Ref.# SJ16): Build test implementing, operating and optimizing (PDIOO) Safety and Security solutions equipment and test diagnostics for new products based on manufacturing utilizing multiple technologies, and the company’s and partner’s products. designs. Technical Marketing Engineer (Ref.# SJ56): Responsible for Telecommuting permitted. Travel may be required to various unanticipated enlarging company’s market and increasing revenue by marketing, supporting, locations throughout the United States. and promoting company’s technology to customers. Iselin/Edison, NJ: Network Consulting Engineer (Ref.# ED9): Responsible for Seattle, WA: Network Consulting Engineer (Ref.# SEA7): Responsible for the support and delivery of Advanced Services to company’s major accounts. the support and delivery of Advanced Services to company’s major accounts. Telecommuting permitted. Telecommuting permitted. Lawrenceville, GA: Network Consulting Engineer (Ref.# LV12): Responsible for the support and delivery of Advanced Services to company’s major accounts. Please mail resumes with reference number to Cisco Systems, Inc., Attn: Research Triangle Park, NC: Network Consulting Engineer (Ref.# RTP2): M51H, 170 W. Tasman Drive, Mail Stop: SJC 5/1/4, San Jose, CA 95134. Responsible for the support and delivery of Advanced Services to company’s No phone calls please. Must be legally authorized to work in the U.S. major accounts. without sponsorship. EOE. www.cisco.com

54 June 2015 Published by the IEEE Computer Society 2376-113X/15/$31.00 © 2015 IEEE 84 COMPUTER PUBLISHED BY THE IEEE COMPUTER SOCIETY 0018-9162/15/$31.00 © 2015 IEEE

r6cla.indd 84 5/22/15 10:45 AM CAREER OPPORTUNITIES

App, Comp Sci, or related w/5 yrs of progressive exp or a Master deg or the foreign equiv in Comp App, Comp Sci or related w/1 yr exp managing & lead - ing a team of 3 developers in applica - tion analysis, design, development, implementation, testing and perfor- Juniper Networks is recruiting for our Sunnyvale, CA office: mance tuning of software applications Resident Engineer #26985: Provide problem testing and debugging security features in through full product development life resolution related to Juniper routers and flow based packet forwarding engine of Ju- cycle and release process. Mentor their integration to customers’ networks. niper’s NGSRX platforms. Carry out testing of new features and func- the junior team members by provid - QA Engineer #15048: Perform manual and ing technology knowledge transition. tionalities required by customers in a lab- oratory environment. May work at other automated functional tests, write test plans Provide comprehensive consultation undetermined worksites in the U.S. and re- on Juniper networks products, report de- to business unit & IT management and location may be required. fects in features and implement protocols staƒ at the highest technical level on such as TCP/IP and HTTP. all phases of application. Provide sub - Software Engineer #29393: Perform software development tasks related to software re- Software Engineer #32599: Define User In- ject matter expertise and implement terface concepts and guide development the code using following tools/tech - leases. Perform software configuration man- agement administration and data mining for that culminates in an excellent user experi- nologies: Java/ J2EE, JSP, Servlets, key performance indices. ence. Collaborate with visual designers and HTML, XML, JavaScript, JSF, Spring, corporate marketing to integrate visual and Hibernate, EJB, UML, Rational Rose, Resident Engineer #33335: Provide post- behavioral elements. Lead design process, RSA, JDBC, Oracle, DB2, Websphere sales support of Juniper’s networking prod- drive decisions, create schedules and track MQ, JMS, JAAS, Web services, JAXB, ucts and carry out testing of new designs, user experience outcomes. features, functionality, and software releases JUnit , Portlets, WPS, WAS , Tomcat, as required by the customer in a laboratory Test Engineer Staff #16163: Prepare and ex- RAD, Eclipse, SubVersion, VSS, and environment. ecute test plans for automated testing of SCRUM Tools. Send resume: Indotro- product features. Architect and develop the nix Int.l Corp., Recruiting (AS), 331 Main Resident Engineer Staff #2509: Support de- infrastructure of company’s testing program St, Poughkeepsie, NY 12601. sign, deployment, and operational readiness for contrail SDN functionalities. of Juniper network routing, switching and security products within the customer in- Software Engineer Staff #24491: Develop frastructure. Troubleshoot equipment and detailed software functional and design network problems. May work at other unde- specifications for new software features on termined worksites throughout the US and company products. Work with Product Man- relocation may be required. agement team to get requirements for new software features. Samsung Research America, Inc. Software Engineer #17561: Design, develop, assist in deployment and maintenance of Technical Support Engineer #17362: Deliver has the following opportunities networking, kernel, TCP/IP solutions on Unix hands-on technical assistance and trouble- environment. shooting skills in resolving critical customer (various levels) available hardware and software issues. Identify and Software Engineer Staff #12921: Perform lead service support initiatives to improve in San Francisco, CA: service gateway software design and main- the supportability of processes, products, tenance, including designing, implementing, and systems. UI Engineer, Staff 2 Juniper Networks is recruiting for our Herndon, VA office: Technical Support Engineer Staff #15227: Technical Support Engineer Staff #15388: (Ref# SF15E01) Provide high level expertise on Juniper prod- Provide high level expertise on Juniper prod- ucts and deliver in-depth diagnostics and ucts and deliver in-depth diagnostics and Research Engineer, Staff 1 root-cause analysis for network impacting root-cause analysis for network impacting issues on Juniper routing products (internet issues on Juniper routing products (internet (Ref# SF15E02) backbone routers). backbone routers). Industrial Designer Juniper Networks is recruiting for our San Francisco, CA office: Software Engineer #32224: Develop cloud- technical leads on critical aspects of security (Ref# SF15E03) based security services. Work alongside software testing. Mail single-sided resume with job code # to Research Engineer, Sr. Juniper Networks Attn: MS 1.4.251 (Ref# SF15E04) 1133 Innovation Way Sunnyvale, CA 94089 Specific requirements apply. All of these positions will involve developing technolo- CLASSIFIED LINE AD SUBMISSION DETAILS: gies for company’s computer, digital television, mobile telephone, printer, or Rates are $425.00 per column inch DEBBIE SIMS ($640 minimum). Eight lines per column inch Classified Advertising other electronic products. and average five typeset words per line. Computer 10662 Los Vaqueros Circle, Send copy at least one month Mail your resume referencing job title and Los Alamitos, CA 90720 prior to publication date to: (714) 816-2138; f (714) 821-4010 Ref# to [email protected]. Email: [email protected]

www.computer.org/computingedge 55 JUNE 2015 85

r6cla.indd 85 5/22/15 10:45 AM CAREER OPPORTUNITIES

Microsoft Corporation currently has the following openings (job opportunities available at all levels, including Principal, Senior and Lead levels):

REDMOND, WA International Project Engineers/Managers: ploy and/or support complex client/server Applied Scientist: Utilize knowledge in applied Ensure the successful internationalization or or database software systems. (http://bit.ly statistics and mathematics to handle large localization of software components for foreign /MSJobs_1392) (http://bit.ly/MSJobs_1421) amounts of data using various tools. http://bit.ly markets. http://bit.ly/MSJobs_Intl_Proj_Eng Compliance Service Engineer - Dynamics or Oth- /MSJobs_Data_Applied_Science Machine Learning Scientist: Design and de- er: De ne and deliver on the IT auditing/compli- Artists, Art Leads and Animators: Responsible liver general and/or domain-speci c machine ance needs required to operate Microsoft Online for designing and creating art assets that meet learning algorithms and systems. http://bit.ly systems. http://bit.ly/MSJobs_1882 or exceed industry standards for quality while /MSJobs_Data_Applied_Science Franchise Business Manager-Operating Sys- supporting Microsoft Game Studio (MGS) busi- Premier Field Engineers: Provide technical sup- tems Engr Grp or Other: Responsible for opti- ness goals. http://bit.ly/MSJobs_Art port to enterprise customers, partners, internal mizing product line(s) within a video game fran- Business Managers and Business Development staff or others on mission critical issues experi- chise. http://bit.ly/MSJobs_1873 Managers/Business Development and Strategy enced with Microsoft technologies. Roving Em- Associate Architect MCS - COO or Other: Iden- Analyst Manager: Develop business opportuni- ployee—requires travel up to 100% with work tify and analyze internal client and partner busi- ties for sales of software and services. http://bit to be performed at various unknown worksites ness needs and translate needs into business re- .ly/MSJobs_Business_Development throughout the U.S. Telecommuting permitted. quirements. Requires domestic and international http://bit.ly/MSJobs_Support_Delivery Consultants: Deliver design, planning, and im- travel up to 50%. http://bit.ly/MSJobs_1972 plementation services that provide IT solutions Researchers/Scientists: Conduct research and Industrial Designer II - Devices Group or Oth- to customers and partners. Roving Employee— lead research collaborations that yield new in- er: Design for the Xbox core product, accesso- requires travel up to 100% with work to be per- sights, theories, analyses, data, algorithms, and ries, incubation, and vision hardware programs. formed at various unknown worksites through- prototypes. http://bit.ly/MSJobs_Research http://bit.ly/MSJobs_1240 out the U.S. Telecommuting Permitted. http:// Service Engineers/Managers, Service Oper- Electrical Engineer - Devices Group or Other: bit.ly/MSJobs_Technical_Delivery ations Engineers, and Systems/Operations Design, develop and test antennas and RF cir- Consultants: Deliver design, planning, and im- Engineers: Plan, architect, deploy and/or sup- cuitry in consumer electronics devices. http:// plementation services that provide IT solutions port complex client/server or database soft- bit.ly/MSJobs_1239 ware systems. (http://bit.ly/MSJobs_Service to customers and partners. Requires domestic Security Analyst II - Operating Systems Engi- and international travel up to 25%. http://bit.ly _Engineering) (http://bit.ly/MSJobs_IT_Serv _Eng) (http://bit.ly/MSJobs_IT_Serv_Ops) neer Group or Other: Design service speci ca- /MSJobs_Technical_Delivery tions that meet business requirements. http:// Content Developer/Engineer: Responsible for Solution Managers: Identify and analyze in- bit.ly/MSJobs_1233 the design, development, deployment, vision, ternal client and partner business needs, and translate needs into business requirements and Electrical Engineer - Devices Group or Other: and business strategy for content creation, Responsible for working with team members acquisition, production, editorial, and publish- value-added solutions and solution roadmaps. http://bit.ly/MSJobs_IT_Solution_Mgmt to evaluate audio and Ethernet options for per- ing activities at Microsoft. http://bit.ly/MSJobs formance, functionality, stability, cost, and risk. _Content_Publishing Solutions Sales Professional/Specialist: En- http://bit.ly/MSJobs_1418 Data Scientist: Manipulate large volumes of hance the Microsoft customer relationship from a capability development perspective by artic- Account Manager - Biz Development and Evan- data, create new and improved techniques and/ gelism GRP or Other: Responsible for bringing or solutions for data collection, management ulating the value of our services and solutions and identifying competition gaps in targeted games to all Microsoft platforms by utilizing stra- and usage. http://bit.ly/MSJobs_Data_Applied tegic partnerships. http://bit.ly/MSJobs_1382 _Science accounts. http://bit.ly/MSJobs_Solution_Sales Support Engineers / Escalation Engineers: Audio Implementer - Operating Systems Engr Design Veri cation/Validation Engineers: Grp or Other: Work with team members to ar- Responsible for ensuring the quality of Micro- Provide technical support on issues experi- enced with Microsoft technologies. http://bit.ly chitect the audio content pipeline. http://bit.ly soft hardware products. http://bit.ly/MSJobs /MSJobs_1381 _Hardware_Design_Veri cation_Eng /MSJobs_Support_Eng Data and Applied Scientist - Applications and Evangelists/Technical Evangelists: Secure future Designers: Develop user interface and user in- teraction designs, prototypes and/or concepts Services Engineer Group or Other: Responsible growth of the Microsoft platform by engaging a for designing, prototyping, implementing and community of customers, partners, and academ- for business productivity, entertainment or other software or hardware applications. http://bit.ly testing machine learning models and algorithms. ics to embrace and adopt Microsoft technology. http://bit.ly/MSJobs_1219 http://bit.ly/MSJobs_Tech_Evangelist /MSJobs_Design Advanced Analytics Manager – Devices Group Evangelists/Technical Evangelists: Secure fu- Design Researchers: Develop user interface and user interaction designs, prototypes and/or con- or Other: Requires mastery of Production Plan- ture growth of the Microsoft platform by engag- ning Dashboard (PPD) to conduct data analy- ing a community of customers, partners, and cepts for business productivity, entertainment or other software or hardware applications. http:// sis, forecast, and generate reports. http://bit.ly academics to embrace and adopt Microsoft tech- /MSJobs_1457 nology. Requires travel throughout the U.S. up to bit.ly/MSJobs_Design_Research 25%. http://bit.ly/MSJobs_Tech_Evangelist Business Process Manager: Responsible for Signal Integrity Test Engineer - Devices Group the design, implementation, and release of or Other: Perform Signal Integrity testing for Game/Systems Designer: Create design docu- high-speed signal interface standards such ments for multiple major features on large proj- programs or projects. http://bit.ly/MSJobs_Fin _Plan_Analy_Contr as DDR3, USB2/3, DP, HDMI, SATA. http://bit.ly ects and the entire design on smaller projects, /MSJobs_1456 ensuring consistency of design. http://bit.ly Network Planner: Contribute to the network /MSJobs_Game_Design strategy and planning team for online services Electrical Engineer - Devices Group or Other: infrastructure. Travel up to 50% with work to Design, implement and test computer hardware Hardware Dev. or Design Engineers, Hardware products that add strategic value to the company. Engineers, Electrical Engineers, and Design be performed at various unknown worksites throughout the U.S. Telecommuting permit- This position requires international and domestic Engineers (all levels, including Leads and Man- travel up to 50%. http://bit.ly/MSJobs_1454 agers): Design, implement and test computer ted. (http://bit.ly/MSJobs_1493) (http://bit.ly hardware. http://bit.ly/MSJobs_Hardware_Dev /MSJobs_1339) Systems Designer – Operating Systems Engr _Eng Site Reliability Engineer: Plan, architect, de- Grp or Other: Work with the Lead Designer to

56 ComputingEdge June 2015 86 COMPUTER WWW.COMPUTER.ORG/COMPUTER

r6cla.indd 86 5/22/15 10:45 AM CAREER OPPORTUNITIES

understand the vision of the product and design Service Engineer II - GFS - Networking and Functions IT or Other: Create information strat- gameplay systems. http://bit.ly/MSJobs_1415 Shared Service or Other: Plan, architect, deploy egies and models and master data management Electrical Engineer II - Devices Group or Other: and/or support complex client/server or data- to enable businesses to consolidate. http://bit.ly Work with team members to evaluate memory base software systems. Telecommuting permit- /MSJobs_1293 options for performance, functionality, stability, ted. http://bit.ly/MSJobs_1913 Sales Excellence Manager – SMB Coverage cost, and risk. http://bit.ly/MSJobs_1423 Security Project Manager - GFS - Security or or Other: Responsible for developing business Sourcing Engineer – Devices Group or Other: Other: Support and drive all physical security opportunities and driving business processes Required to specialize in manufacturing pro- systems project implementation, testing, com- for sales of software or services. http://bit.ly cesses and total cost management of assigned missioning, and acceptance. Requires domestic /MSJobs_1519 categories. http://bit.ly/MSJobs_1383 and international travel up to 50%. http://bit.ly Solution Specialist DCMOD-EPG Core Account /MSJobs_1899 Premier Field Engineer – COO or Other: Work Coverage or Other: Enhance the Microsoft closely with Microsoft’s Client OEM partners to Category Manager Windows - Retail S&M Opex customer relationship from a capability devel- advise on engineering enablement and device or Other: Responsible for reinvigorating the PC opment perspective. Requires travel up to 25% health. http://bit.ly/MSJobs_1388 market, succeeding in tablets and improving with work to be performed at various unantic- the PC purchase experience. Requires Domestic ipated worksites throughout the U.S. http://bit Electrical Engineer: Design, implement and test and International travel up to 25%. http://bit.ly .ly/MSJobs_1525 computer hardware products. This position /MSJobs_1892 requires domestic and international travel up C+E Business Intelligence Developer - Corp- to 25%. (http://bit.ly/MSJobs_1452) (http://bit. Senior Architect, Imaging - MDG Phones or Fin-G&A or Other: Responsible for developing or ly/MSJobs_1465) (http://bit.ly/MSJobs_1510) Other: Design, implement and test computer testing computer software applications, systems (http://bit.ly/MSJobs_1354) hardware products that add strategic value to or services. http://bit.ly/MSJobs_1296 the company. Requires international and domes- Producer – Operating Systems Engineer Group Solution Specialist Devices-EPG Core Account tic travel up to 25%. Telecommuting permitted. Coverage or Other: Enhance the Microsoft or Other: Serve as the production lead for game http://bit.ly/MSJobs_1943 development projects that include external part- customer relationship from a capability devel- ners. This position requires domestic, regional Hardware Engineer (Reliability Engineer): De- opment perspective. Requires travel up to 50% and international travel up to 25%.http://bit.ly sign, implement and test computer hardware with work to be performed at various unantic- /MSJobs_1491 products that add strategic value. Requires ipated worksites throughout the U.S. http://bit international and domestic travel up to 25%. .ly/MSJobs_1299 SW/FW Engineer: Responsible for developing http://bit.ly/MSJobs_1982 rmware for embedded devices. This position Senior Business Planner-Product Marketing requires domestic, regional and international Senior International Site Manager: Ensure the or Other: Responsible for developing product travel up to 25%. (http://bit.ly/MSJobs_1534) successful internationalization or localization licensing strategy for products and services. (http://bit.ly/MSJobs_1542) of software components for foreign markets. http://bit.ly/MSJobs_1235 http://bit.ly/MSJobs_1871 Risk Integration Manager- Operating Systems Sales Excellence Manager – EPG Core Account Engineer Group or Other: Responsible to bring- Security Analyst: Gather system and host Coverage or Other: Support the Productivity ing new partners / new scenarios to Risk Man- data across Microsoft’s network. http://bit.ly business with data gathering and business in- agement platform. http://bit.ly/MSJobs_1547 /MSJobs_1529 sights. http://bit.ly/MSJobs_1635 Senior Applied Researcher - Applications and Business Analytics & Insights Manager: Apply Senior Learning and Development Specialist – Services Engr Grp or Other: Solve ambiguous principles and techniques of nance, marketing, WW M&O or Other: Design, develop and deliver problems, design and implement machine learn- and/or business to articulate business problems. tailored training programs for the eld sales and ing algorithms and analyze big data. http://bit.ly http://bit.ly/MSJobs_1506 services organization. Requires domestic and /MSJobs_1444 Senior Producer: Coordinate the development, international travel up to 25%. Telecommuting permitted. http://bit.ly/MSJobs_1462 Sourcing Manager, Optics - Devices Group or execution, and release of gaming products and Other: Support the Microsoft global procure- services. http://bit.ly/MSJobs_1714 Senior Solutions Sales Specialist, Customer ment process by managing the development, Senior IT Service Engineer: Design service Advocacy and Technology Management - EPG implementation, and alignment of global sourc- speci cations that meet business requirements Core Account Coverage or Other: Enhance the ing strategies. Requires international travel up to by analyzing solution priorities. http://bit.ly Microsoft customer relationship from a capabil- 50%. http://bit.ly/MSJobs_1754 /MSJobs_1499 ity development perspective. Requires domestic and international travel up to 25%. Telecommut- Principal Group Service Engineering Manager Senior Business Process Manager – CFS – G&A ing permitted. http://bit.ly/MSJobs_1171 - GFS - Bandwidth or Other: Plan, architect, de- or Other: Analyze, design and deliver busi- ploy and/or support complex client/server or da- ness information and nancial reporting solu- Software Architect-Transform the Datacenter tabase software systems. Requires international tions for internal business groups http://bit.ly Pillar or Other: Engage with strategic enter- travel up to 25%. http://bit.ly/MSJobs_1386 /MSJobs_1621 prise customers to solve their business needs. Requires travel throughout the U.S. up to 25%. Tech Evangelist – Developer Experience and Senior Security Analyst: Design, develop, and http://bit.ly/MSJobs_1727 Evangelism or Other: Secure future growth of conduct global security investigations and tests the Microsoft platform by engaging a commu- on attacks targeting Microsoft. http://bit.ly Senior Business Development Manager - Busi- nity of customers, partners, and academics. /MSJobs_1710 ness Development or Other: Develop business opportunities for sales of software and services. Requires international and domestic travel up to Principal IT Enterprise Architect: Responsible 25%. http://bit.ly/MSJobs_1344 Requires travel throughout the U.S. up to 25% of for working with team members to provide busi- the time. http://bit.ly/MSJobs_1772 Senior Art PM - Studios or Other: Coordinate ness-to-technology mapping for moderate risk, program development of high-end, three dimen- moderate complexity software development en- sional art asset creation and computer software gagements. Requires travel throughout the Unit- Multiple job openings are available for applications. Requires international and domes- ed States up to 10%. http://bit.ly/MSJobs_1681 each of these categories. To view de- tic travel up to 25%. http://bit.ly/MSJobs_1338 Business Analytics Specialist - Shared CSS UX Researcher (Design Researcher) - OSG Core Delivery or Other: Responsible for the design, tailed job descriptions and minimum re- PM or Other: Develop user interface and user implementation, and release of programs or quirements, and to apply, visit the web- interaction designs, prototypes and/or concepts. projects. http://bit.ly/MSJobs_1288 site address listed. EOE. Requires international and domestic travel up to Principal IT Enterprise Architect-Corporate 25%. http://bit.ly/MSJobs_1281

www.computer.org/computingedge 57 JUNE 2015 87

r6cla.indd 87 5/22/15 10:45 AM CAREER OPPORTUNITIES

Microsoft Corporation currently has the following openings (job opportunities available at all levels, including Principal, Senior and Lead levels):

MOUNTAIN VIEW, CA learning algorithms and systems. http://bit.ly deploy solutions. http://bit.ly/MSJobs_1313 Applied Scientist: Utilize knowledge in applied /MSJobs_Data_Applied_Science Account Executive-Field Global Sales or Other: statistics and mathematics to handle large Researchers/Scientists: Conduct research and Responsible for selling online advertising solu- amounts of data using various tools. http://bit.ly lead research collaborations that yield new in- tions. http://bit.ly/MSJobs_1394 /MSJobs_Data_Applied_Science sights, theories, analyses, data, algorithms, and Account Executive, Advertising & Online New Data Scientist: Manipulate large volumes of prototypes. http://bit.ly/MSJobs_Research Markets LATAM - Field Global Sales or Other: data, create new and improved techniques and/ Service Engineers/Managers, Service Oper- Develop business, grow revenue and increase or solutions for data collection, management ations Engineers, and Systems/Operations overall sales partner satisfaction and loyalty. and usage. http://bit.ly/MSJobs_Data_Applied Engineers: Plan, architect, deploy and/or sup- Requires local travel up to 50%. Telecommuting _Science port complex client/server or database soft- permitted. http://bit.ly/MSJobs_1429 Design Veri cation/Validation Engineers: ware systems. (http://bit.ly/MSJobs_Service Technical Advisor-Consumer or Other: Provide Responsible for ensuring the quality of Micro- _Engineering) (http://bit.ly/MSJobs_IT_Serv technical advice and support on issues experi- soft hardware products. http://bit.ly/MSJobs _Eng) (http://bit.ly/MSJobs_IT_Serv_Ops) enced with Microsoft technologies. Telecom- _Hardware_Design_Veri cation_Eng Design Researchers: Develop user interface and muting permitted. http://bit.ly/MSJobs_1704 user interaction designs, prototypes and/or con- Machine Learning Scientist: Design and de- DOWNERS GROVE, IL liver general and/or domain-speci c machine cepts for business productivity, entertainment or Assure productive learning algorithms and systems. http://bit.ly other software or hardware applications. http:// Technical Account Manager: use of Microsoft technologies, focusing on de- /MSJobs_Data_Applied_Science bit.ly/MSJobs_Design_Research livery quality through planning and governance. Researchers/Scientists: Conduct research and SAN DIEGO, CA Requires travel up to 40% to various client sites lead research collaborations that yield new in- Hardware Dev. or Design Engineers, Hardware in the Midwest region. Telecommuting permit- sights, theories, analyses, data, algorithms, and Engineers, Electrical Engineers, and Design En- ted. http://bit.ly/MSJobs_1502 prototypes. http://bit.ly/MSJobs_Research gineers (all levels, including Leads and Manag- CAMBRIDGE, MA Service Engineers/Managers, Service Oper- ers): Design, implement and test computer hard- ations Engineers, and Systems/Operations ware. http://bit.ly/MSJobs_Hardware_Dev_Eng Data Scientist: Manipulate large volumes of data, create new and improved techniques and/ Engineers: Plan, architect, deploy and/or sup- Specialist, Cellular Modem Software - NDS or solutions for data collection, management port complex client/server or database soft- Engineering Group or Other: Responsible for and usage. http://bit.ly/MSJobs_Data_Applied ware systems. (http://bit.ly/MSJobs_Service con guration, debugging and implementa- _Science _Engineering) (http://bit.ly/MSJobs_IT_Serv tion of cellular modem software. http://bit.ly _Eng) (http://bit.ly/MSJobs_IT_Serv_Ops) /MSJobs_1988 International Project Engineers/Managers: Ensure the successful internationalization or Principal Electrical Engineer - Devices Group or Design Validation Engineer - MDG Phones or localization of software components for foreign Other: Responsible for developing product and Other: Perform wireless device testing in lab, markets. http://bit.ly/MSJobs_Intl_Proj_Eng system level design. http://bit.ly/MSJobs_1230 debug device and test system related issues. Systems Engineer – Devices Group or Other: http://bit.ly/MSJobs_2008 Service Engineers/Managers, Service Oper- ations Engineers, and Systems/Operations Work with team members to implement hard- Hardware Engineer: Design, implement and Plan, architect, deploy and/or sup- ware and embedded software across a vari- test hardware products that add strategic value. Engineers: port complex client/server or database soft- ety of products and technologies. http://bit.ly Domestic and International travel required up to ware systems. (http://bit.ly/MSJobs_Service /MSJobs_1406 25%. (http://bit.ly/MSJobs_1999) (http://bit.ly _Engineering) (http://bit.ly/MSJobs_IT_Serv /MSJobs_1971) Technology Solutions Professional-EPG Core _Eng) (http://bit.ly/MSJobs_IT_Serv_Ops) Solution Specialist - CnE or Other: Drive prod- GM, Hardware- Surface or Other: Lead the over- uct win rates by proving the value of prod- all Strategy and Planning Team for the Surface CHARLOTTE, NC ucts to customers and partners. http://bit.ly organization within Microsoft. Requires domes- Support Engineers / Escalation Engineers: /MSJobs_1672 tic and international travel up to 25%. http://bit Provide technical support on issues experi- SAN FRANCISCO, CA .ly/MSJobs_2068 enced with Microsoft technologies. http://bit.ly /MSJobs_Support_Eng Sr. Technical Evangelist-DX Evangelist Spec- FORT LAUDERDALE, FL Corp SMSG (S&T) or Other: Secure future Business Managers and Business Development WASHINGTON DC growth of the Microsoft platform by engaging Managers/Business Development and Strategy Business Managers and Business Development a community of customers, partners, and aca- Analyst Manager: Develop business opportuni- Managers/Business Development and Strategy demics. Telecommuting from home of ce per- ties for sales of software and services. http://bit Analyst Manager: Develop business opportuni- mitted. Travel required up to 35% to undeter- .ly/MSJobs_Business_Development ties for sales of software and services. http://bit mined client sites throughout the U.S. http://bit .ly/MSJobs_Business_Development .ly/MSJobs_1177 Sales Excellence Manager – EPG Core Account Coverage or Other: Measure and track an ef - Senior Business Strategy Manager: Analyze SUNNYVALE, CA cient Segment Sales Excellence function span- market and technology trends and data to de- Applied Scientist: Utilize knowledge in applied ning scorecard, Rhythm of Business, and busi- velop creative solutions to key business strategy statistics and mathematics to handle large ness management. http://bit.ly/MSJobs_1619 issues. Requires travel throughout the United amounts of data using various tools. http://bit.ly Chief Security Advisor - AMS-EPG PS or Oth- States up to 10%. http://bit.ly/MSJobs_1518 /MSJobs_Data_Applied_Science er: Formulate and promote external company Data Scientist: Manipulate large volumes of strategy regarding computer security issues. data, create new and improved techniques and/ Requires domestic and international travel up to Multiple job openings are available for or solutions for data collection, management 40%. Telecommuting is permitted. http://bit.ly each of these categories. To view de- /MSJobs_1496 and usage. http://bit.ly/MSJobs_Data_Applied tailed job descriptions and minimum re- _Science Partner Technical Consultant-Global Business quirements, and to apply, visit the web- Machine Learning Scientist: Design and de- Support or Other: Help Microsoft partners accel- liver general and/or domain-speci c machine erate their sales cycles and design, develop and site address listed. EOE.

58 ComputingEdge June 2015 88 COMPUTER WWW.COMPUTER.ORG/COMPUTER

r6cla.indd 88 5/22/15 10:45 AM CAREER OPPORTUNITIES

Microsoft Corporation currently has the following openings (job opportunities available at all levels, including Principal, Senior and Lead levels):

NEW YORK, NY IRVING, TX travel up to 50% with work to be performed at Support Engineers / Escalation Engineers: Support Engineers / Escalation Engineers: various unknown worksites throughout the U.S. Provide technical support on issues experi- Provide technical support on issues experi- http://bit.ly/MSJobs_1301 enced with Microsoft technologies. http://bit enced with Microsoft technologies. http://bit ISELIN, NJ .ly/MSJobs_Support_Eng .ly/MSJobs_Support_Eng Premier Field Engineer-Global Business Sup- Solution Specialist DC-EPG Core Account Cov- HOUSTON, TX port or Other: Provide technical support to erage or Other: Enhance the Microsoft custom- Assure produc- enterprise customers, partners, internal staff er relationship from a capability development Technical Account Manager: tive use of Microsoft technologies, focusing on or others on mission critical issues. Requires perspective. Requires travel up to 20% with delivery quality through planning and gover- travel up to 75% with work to be performed at work to be performed at various unanticipat- nance. Requires travel throughout the U.S. up various unknown worksites throughout the U.S. ed worksites throughout the U.S. http://bit.ly to 75%; telecommuting permitted. http://bit.ly http://bit.ly/MSJobs_1251 /MSJobs_1283 /MSJobs_1868 Solution Sales Professional, PDW-EPG Core Premier Field Engineer-Global Business Sup- Account Coverage or Other: Enhance the Mi- port or Other: Provide technical support on LOS ANGELES, CA crosoft customer relationship from a capability mission critical issues experienced with Micro- Technical Account Manager: Assure productive development perspective. Requires travel to soft technologies. Requires travel up to 50% use of Microsoft technologies, focusing on de- various unanticipated locations up to 50% of with work to be performed at various unknown livery quality through planning and governance. the time. Telecommuting permitted. http://bit worksites throughout the U.S. Telecommuting Requires travel throughout the U.S. up to 25%. .ly/MSJobs_1752 permitted. http://bit.ly/MSJobs_1349 http://bit.ly/MSJobs_1540 AUSTIN, TX Solutions Sales Specialist – EPG Core Account EDINA, MN Coverage or Other: Enhance the Microsoft cus- Account Technology Strategist-EPG Core Ac- tomer relationship from a capability develop- Technical Account Manager – Premier COGS or count Coverage or Other: Provide pre-sales ment perspective. Telecommuting permitted. Other: Assure productive use of Microsoft tech- technical and architectural support for sales http://bit.ly/MSJobs_1653 nologies, focusing on delivery quality through of software, solutions, and related products. planning and governance. Requires travel up http://bit.ly/MSJobs_1483 FARGO, ND to 75% to various client sites in the Minneapolis Technical Account Managers: Assure pro- region. Telecommuting permitted. http://bit.ly/ Multiple job openings are available for MSJobs_1630 ductive use of Microsoft technologies, focus- each of these categories. To view de- ing on delivery quality through planning and BENTONVILLE, AR governance. http://bit.ly/MSJobs_Delivery tailed job descriptions and minimum _Relationship_Mgmt Senior Premier Field Engineer - Global Business Support or Other: Provide technical support to requirements, and to apply, visit the enterprise customers, partners, internal staff website address listed. EOE. or others on mission critical issues. Requires

SOFTWARE DEVELOPER - Assist in de- Senior Software Engineer in Test W/a BS in Comp Info Sys. or rltd + velopment of software for cloud based (REQ#9ASSS8). Test, design & develop 30 mos exp as ITO Service Delivery scheduling systems and desktop man- automated testing framework for dis- Consult. or rltd. Dsgns & dvlps solu - agement suits for multiple industries. tributed sys upgrades. Senior UI Soft- tions to complex applics prgms, syst. Consult with clients to determine busi- ware Engineer (REQ#9CXTSZ). Design admin. issues, or network concerns. ness requirements. Design and execute & implement new front end for Co.’s Mo- Dsgns, modifies, dvlps, writes, & im - tests to ensure quality control. Master’s bile Intelligence product. Refer to Req# plmts s/ware prgmg apps. to adhere degree in Computer Science, Systems & mail resume to Splunk Inc., ATTN: J. to dsgns supporting internal bus. reqs. Eng. or related field, or foreign equiv- Aldax, 250 Brannan Street, San Fran- for SalesForce platform. Standard - alent. Must be proficient in C#.Net; cisco CA 94107. izes qlty assurance procedures for s/ ASP.Net; SQL Server; Java script; Vi- ware apps. Identifies s/ware reqs. & sual Studio; Win Forms; Visual Basic; PROGRAMMER ANALYST: Design, de- works w/suppliers in meeting cus- testing frameworks such as Selenium, velop, test & implement Web and Cli- tomer objectives by implmtg changes. Sikuli, and HP Quality Center; Hudson ent/Server Technologies using knowl- Supports &/or installs s/ware apps. in Continuous Integration Server; and GIT. edge in C#.Net, ASP.Net, ASP.Net SalesForce. Coords a team of s/ware Resumes to: Elite Software Inc., 4001 W. MVC, WCF Services ( SOAP & REST), dvlprs in SalesForce s/ware dvlpmt. Newberry Rd, Gainesville, FL 32607. HTML5, CSS3, XSD, XML, SQL Server Mail resumes to Nexius Insight, Inc., 2008 R2/2012,SSRS, SSIS, JavaScript, 1301 Central Expressway S., Ste 200, SIEMENS PLM SOFTWARE INC. has an JQuery, ADO.Net, ADO.Net Entity Allen, TX 75013. Attn: HR opening in Troy, MI for Sr. Application framework, Windows XP/VISTA/7/8 Engineer to support technical sales, de- Visual Studio 2010,2012. Must be will- CLOUDERA, INC. is recruiting for our termine customer specs & demo related ing to travel & relocate. Requires MS Palo Alto, CA o«ce: Software Engineer: LMS Imagine.Lab software to customer. in Computer science, Engineering or Architect, design, develop and test Requires 25% domestic/international related. Mail resumes to Strategic Re - large distributed systems based on the travel. Email resumes to PLMCareers@ sources International, 777 Washington Hadoop ecosystem capable of process- ugs.com & refer to Req#143906. EOE Rd, Ste 2, Parlin, NJ 08859. ing multiple petabytes of data. Mail re- sume w/job code #36215 to: Cloudera, SPLUNK INC. has the following job SYSTEMS ENGINEER (Mult. Open- Attn.: HR, 1001 Page Mill Rd., Bldg. 2, opportunities in San Francisco, CA: ings) Allen, TX, Nexius Insight, Inc. Palo Alto, CA 94304.

www.computer.org/computingedge 59 JUNE 2015 89

r6cla.indd 89 5/22/15 10:45 AM CAREER OPPORTUNITIES

NEW YORK UNIVERSITY ABU DHABI To be considered submit a cover let - Trivedi, Director, CLOUDFOUNTAIN, POSTDOCTORAL RESEARCHER es- ter, curriculum vitae, and a statement INC.,125 Cambridge Park Drive, Suite tablished the Center for Interdisciplin - of research interests online at: http:// 333, Cambridge, MA 02140. ary Studies in Security and Privacy nyuad.nyu.edu/en/about/careers (CRISSP-AD) to meet the growing chal- /faculty-positions.html PROGRAMMER ANALYST: Analyze, lenges that are faced in securing net - develop, implement, migrate and test worked information technology sys - SENIOR SIEBEL CRM CONSULTANT software applications utilizing knowl- tems that have become pervasive and -Cambridge MA. Design, develop, test edge of C,C++, PL/SQL, Java, .NET, address broader political, economic and deploy Siebel CRM technology Oracle Applications(11i/R12) , reports & and policy issues that help understand solutions. Analyze customer require- form builder (6i/10g), SDLC, OA Frame- and mitigate cyber risk. CRISSP-AD ments to design technical architecture work, SQL * Loader,Unix. AIM. Knowl - is seeking outstanding postdoctoral for business process solutions. Trans - edge in Microsoft Windows, Visual candidates to join our team to further late business requirements into Siebel Basic .NET,Linux, SOA, System admin - support its research activities. The ar - CRM functional and configuration istration and Web Methods reqd. Must eas of expertise aimed at, but not lim - requirements. Work on Siebel Tools, be willing to travel & reloc. Reqs MS in ited to, are: cyber threat intelligence Siebel Workflows, Siebel Reports, comp sci, eng, bus or rel. Mail resumes and network analytics; hardware and OATS, Selenium, EAI, Siebel Integra - to Nitya Software Solutions Inc. 9690 critical-infrastructure security; and us - tion and Siebel upgrade. Required a South 300, Ste 319, Salt Lake City, er-centric security. Candidates must Master’s Degree in Computer Science, Utah 84070. hold (or be close to completing) a Engineering, Math, CIS or MIS and 1 Ph.D. in Computer Science, Electrical year of work experience. A Bachelor’s BUCKNELL UNIVERSITY, GIS/WEB and Computer Engineering or quanti - degree in a related field and 5 years of APPLICATION SPECIALIST: DUTIES: tative social sciences. Ph.D. holders work experience would be acceptable LEWISBURG, PA. Develop, integrate, with a strong publication record and in lieu of Master’s degree in related implement GIS/digital scholarship ap - hands-on skills are encouraged to ap - field. Any suitable combination of ed - plications that will advance the Uni - ply. Applicants with a M.S. in the same ucation, training or experience would versity’s academic mission. Research fields may apply for a Research Assis - be acceptable. Resume to Dipali & recommend infrastructure solutions tant or Research Engineer position.

INFOSYS LIMITED is in need of individuals to LEAD CONSULTANT(S) (DOMAIN) – US needed to anchor different work full-time in Plano,Texas and various unanticipated loca- phases of IT engagement including business process consulting, tions throughout the U.S. Must be willing to work anywhere in problem de nition, discovery, solution generation, design, develop- the U.S.as all job opportunities may involve relocation to various ment, deployment and validation. (REF ID 8851BR). and unanticipated client site locations; any relocation to be LEAD CONSULTANT(S) (PRODUCTS AND PACKAGES) - US needed paid by employer pursuant to internal policy. We have multiple to anchor different phases of the IT engagement including business openings for each job opportunity, and are an Equal Opportunity process consulting, problem de nition, discovery, solution generation, Employer M/F/D/V. Please apply online at: http://www.infosys. design, development, deployment and validation. (REF ID 8852BR). com/careers/apply-now/apply.asp. Select ‘Americas’ under ‘Job PRINCIPAL(S) - Business Consulting needed to lead small proposals Opportunities’ and follow the link for ‘Experienced Professionals.’ and multiple streams on complex proposals. Develop best in class Once a user account has been created, please follow the link for proposals that present Infosys Point of View, approach and IT solu- ‘Search Openings’ and enter reference ID(s) for the position(s) of tion. Help identify clients and opportunities for the practice, present interest in the ‘Auto Req ID’ box. preliminary ideas and proposals to clients, lead engagements from ASSOCIATE ENGAGEMENT MANAGER(S) needed to contribute to launch to closure. Travel Required. (REF ID 8854BR). competitor analysis and prospect identi cation; provide ground PRINCIPAL CONSULTANT(S) (DOMAIN) US needed to lead the engage- intelligence to pursuit teams, as well as account context and client ment effort for IT assignments, from business process consulting and introductions required for opening diverse service offerings in ac- problem de nition to solution design, development and deployment. count(s). Travel required. (REF ID 8880BR). Lead proposal development. Travel required. (REF ID 8855BR). CONSULTANT(S) (DOMAIN) - US needed to help conduct IT require- – US needed to provide IT ar- ments gathering, de ne problems, provide solution alternatives, SENIOR TECHNOLOGY ARCHITECT(S) create detailed computer system design documentation, implement chitectural solutions for one or more projects. Provide input to create deployment plan and help conduct knowledge transfer with the objec- technology and architectural frameworks. Understand and analyze tive of providing high quality IT consulting solutions. (REF ID 8878BR). client business & IT problems, technology landscape, IT standards, and enterprise roadmaps. (REF ID 8876BR). CONSULTANT(S) (PRODUCTS AND PACKAGES) - US needed to help conduct IT requirements gathering, de ne problems, provide solution TECHNOLOGY ARCHITECT(S) - US needed to provide inputs on IT alternatives, create detailed computer system design documentation, solution architecture based on evaluation/understanding of solution implement deployment plan, and help conduct knowledge transfer alternatives, frameworks and products. Will interact with clients to with the objective of providing high-quality IT consulting solutions. elicit architectural and non-functional requirements like performance, (REF ID 8879BR). scalability, reliability, availability, maintainability. (REF ID 8877BR).

60 ComputingEdge June 2015 90 COMPUTER WWW.COMPUTER.ORG/COMPUTER

r6cla.indd 90 5/22/15 10:45 AM CAREER OPPORTUNITIES

for GIS use on campus and upgrade Microsoft Corporation currently has the following of GIS software. Provide technical openings (job opportunities available at all levels, support for GIS use across campus. including Principal, Senior and Lead levels): REQUIREMENTS, Must have Bach - elor’s Degree or foreign equivalent REDMOND, WA veloping or testing computer software ap- in Geomatics Engineering or related Software Engineers and Software Develop- plications, systems or services. (http://bit.ly field and 6 months post-baccalaure - /MSJobs_SDE) (http://bit.ly/MSJobs_IT_SDE) ate experience in GIS System devel - ment Engineers in Test (all levels, includ- Responsible for opment & support in an academic or ing Leads and Managers): CAMBRIDGE, MA developing or testing computer software professional setting. Experience must applications, systems or services. (http:// Software Engineers and Software Develop- include 6 months experience using bit.ly/MSJobs_SDE) (http://bit.ly/MSJobs ment Engineers in Test (all levels, including ArcGIS desktop and Image processing Responsible for de- _IT_SDE) Leads and Managers): software to conduct applied spatial veloping or testing computer software ap- analysis in academic research proj - Software Engineers and Software Develop- plications, systems or services. (http://bit.ly ects; building GIS systems or modules ment Engineers in Test (all levels, including /MSJobs_SDE) (http://bit.ly/MSJobs_IT_SDE) Leads and Managers): Responsible for devel- using Python, C#, SQL, and C/C++/ DURHAM, NC Delphi; using ArcGIS Server, Google oping or testing computer software applica- Maps API, Java Script, HTML, and CSS tions, systems or services. Requires domestic Software Engineers and Software Develop- and international travel up to 25%. (http://bit.ly to build GIS web applications; and ment Engineers in Test (all levels, including /MSJobs_SDE) (http://bit.ly/MSJobs_IT_SDE) knowledge of software algorithms on Leads and Managers): Responsible for de- both vector and raster data. Please Research Software Development Engineers (all veloping or testing computer software ap- plications, systems or services. (http://bit.ly send cover letter and resume includ - levels): Responsible for conducting applied re- /MSJobs_SDE) (http://bit.ly/MSJobs_IT_SDE) ing job history to Alison Epting Razet, search into new products and services through Bucknell University, One Dent Drive, software engineering techniques. http://bit.ly ALISO VIEJO, CA /MSJobs_Research_Software_Engineer Lewisburg, PA 17837; ae015@buck - Software Engineers and Software Develop- nell.edu. Equal Opportunity Employer. MOUNTAIN VIEW, CA ment Engineers in Test (all levels, including Software Engineers and Software Develop- Leads and Managers): Responsible for de- MPHASIS CORP. has multi openings ment Engineers in Test (all levels, including veloping or testing computer software ap- at various levels for the follow’g po - Leads and Managers): Responsible for de- plications, systems or services. (http://bit.ly sitions at its office in NY, NY & unan - veloping or testing computer software ap- /MSJobs_SDE) (http://bit.ly/MSJobs_IT_SDE) ticipated client sites thr/o the US 1. plications, systems or services. (http://bit.ly RESTON, VA Info. Sys. Anyst* - Ana. & provide sys /MSJobs_SDE) (http://bit.ly/MSJobs_IT_SDE) req & spec. 2. SW Dvlper* - Design, Software Engineers and Software Develop- dvlp & modify SW sys. 3. Sys. Archi - PALO ALTO, CA ment Engineers in Test (all levels, including tect Dvlper* - Dvlp IT architecture 4. Software Engineers and Software Develop- Leads and Managers): Responsible for de- veloping or testing computer software ap- Graphic UI Desgr* - Design UI & per - ment Engineers in Test (all levels, including plications, systems or services. (http://bit.ly form UAT 5. N/W Infra Eng* - Maintain Leads and Managers): Responsible for de- /MSJobs_SDE) (http://bit.ly/MSJobs_IT_SDE) & TRBL n/w, design, dvlp, install n/w in- veloping or testing computer software ap- fra appl. 6. Business Operation Anyst* plications, systems or services. (http://bit.ly NEW YORK, NY /MSJobs_SDE) (http://bit.ly/MSJobs_IT_SDE) - Ana bus process thru app of s/w sol. Software Engineers and Software Develop- 7. IT Mgr* - Plan & manage the deliv - SAN FRANCISCO, CA ment Engineers in Test (all levels, including ery of IT proj. 8. Enterprise Svc Enga - Software Engineers and Software Develop- Leads and Managers): Responsible for de- gem’t Mgr* - E2E sale of IT svc/prod. ment Engineers in Test (all levels, including veloping or testing computer software ap- 9. Eng Engagem’t Mgr* - Manage & Leads and Managers): Responsible for de- plications, systems or services. (http://bit.ly direct business integration of proj ac - veloping or testing computer software ap- /MSJobs_SDE) (http://bit.ly/MSJobs_IT_SDE) tivities.10. Mkt Dvlpt Mgr* - Promote IT plications, systems or services. (http://bit.ly HUMACAO, PUERTO RICO svc/prod. & impl bus plans.Must have a /MSJobs_SDE) (http://bit.ly/MSJobs_IT_SDE) Bachelor/equiv and prior rel. exp, Mas - Software Engineer, Principal IT-Ops Services ter/equiv, or Master/equiv and prior SUNNYVALE, CA or Other: Responsible for developing or testing rel. exp. Edu/exp req vary depending Software Engineers and Software Develop- computer software applications, systems or on position level/type. *Lead positions ment Engineers in Test (all levels, including services. http://bit.ly/MSJobs_1930 in this occupation must have Master/ Leads and Managers): Responsible for de- FARGO, ND equiv+2yr or Bach/equiv+5yr progres- veloping or testing computer software ap- Software Engineers and Software Develop- sive exp. Travel/relo req. Send resume plications, systems or services. (http://bit.ly ment Engineers in Test (all levels, including & applied position to: recruitmentus@ /MSJobs_SDE) (http://bit.ly/MSJobs_IT_SDE) Leads and Managers): Responsible for de- mphasis.com or 460 Park Ave. S., Ste# SAN DIEGO, CA veloping or testing computer software ap- 1101, New York, NY 10016 Attn: Recruit. plications, systems or services. (http://bit.ly Software Engineers and Software Develop- /MSJobs_SDE) (http://bit.ly/MSJobs_IT_SDE) ment Engineers in Test (all levels, including SAMSUNG SEMICONDUCTOR INC. Leads and Managers): Responsible for de- has a Director, Software Engineering veloping or testing computer software ap- (job code: 5CJ2512) job opportunity plications, systems or services. (http://bit.ly Multiple job openings are available for in Menlo Park, CA: Define, consult and /MSJobs_SDE) (http://bit.ly/MSJobs_IT_SDE) each of these categories. To view de- contribute to the software architecture of SSIC mHealth Simband platform. CHICAGO & DOWNERS GROVE, IL tailed job descriptions and minimum Mail resume to 2440 Sand Hill Rd., Ste. Software Engineers and Software Develop- requirements, and to apply, visit the 302, Menlo Park, CA 94025, Attn: S. ment Engineers in Test (all levels, including website address listed. EOE. Tan. Must reference job code to be Leads and Managers): Responsible for de- considered. EOE.

www.computer.org/computingedge 61 JUNE 2015 91

r6cla.indd 91 5/22/15 10:45 AM CAREER OPPORTUNITIES

SAMSUNG SEMICONDUCTOR INC. & routing architect. at high & low level. Virtualization Layer, etc. Candidates has a Security Architect job opportu- Prov. architect. recommend. on di¤erent must have min 1yr exp in SOA, Biztalk nity in Milpitas, CA: Security Architect dimensions incl reliability, security, & ESB, SAP/PeopleSoft Adapters, HIPPA/ (job code: 5MD1320) Work closely with scalability. Dvlp detailed plans for con- EDI, .NET,BAM, BRE, etc. 2) Java Devel - business partners and other stakehold- figuring, testing, & upgrading ntwrk el- oper: To Design, develop & implement ers such as legal, HR, IT, facilities etc. to ements. Use dynamic routing protocols business software apps using Java & provide information security oversight (BGP & OSPF) & policy-based routing. J2EE, Candidates must have 1 yr. of man- where required and assist in building Implmt. Pv6 networks in data center datory exp in Java Flex, Blaze Server, corporate policies and procedures. Mail environ. incl assoc. routing architect. Web Services, UI Development, integra- resume to Samsung Semiconductor, c/o (BGPv6). Utilize expertise w/Cisco Nexus tion w/legacy systems, Hadoop, etc. All StaŠng – PTCL, 601 McCarthy Blvd., family of switches (2000, 5000 & 7000 positions require: MS in CS/Engineer- Milpitas, CA 95035. Must reference job series). Use exp. w/layer 2 protocols such ing/Info systems/Business or related. code to be considered. as VTP, link aggreg. (LACP & Cisco VPC) BS degree + 5yrs exp can be substituted & UDLD. Utilize exp w/first hop redund. for the MS reqirmt Any combination of PROGRAMMER ANALYST dsgn, dvlp, protocols (e.g. HSRP, VRRP). Use exp. w/ foreign edu + related exp equivalent maintain, test & implmt applic s/w data- MPLS at telco scale. Utilize exp w/Nexus to a US Masters, or any combination of bases ,ETL Mappings, BI reports utiliz- modules & assoc. 10, 40 & 100 gbps inter- foreign edu +related exp equivalent to ing knowledge of Sql, Plsql, Unix Shell faces. Utilize exp w/data center firewalls, a BS Degree will be accepted. Travel to Scripting, Oracle 8i/9i/10g/11g, SQL load balancers & security apps., part. Ju- several unanticipated locations all over Server, Informatica 8.6/9, ERWIN data niper &/or Cisco. Use 3GPP mobility stds US & might involve relocation consis- modeler, TOAD, SQL Plus, Oracle OBIEE & interfaces & high level EPC architect. tent w/client reqirmts & State & Local 10g/11g; Must be willing to travel & reloc. Mail resumes to: Nexius Insight, Inc., 1301 reqirmts. Mail your resume to: eVan- Reqs MS Comp Sci, Engg or rel. Mail Central Expressway S, Ste 200, Allen, TX tage Solutions Inc., Inc, Attn: HR, 317 resumes to Strategic Resources Inter- 75013. Attn: HR George St., Ste # 205, New Brunswick, national, Inc, 777 Washington Rd, Ste 2, NJ 08901.ttn: HR, 317 George St., Ste # Parlin , NJ 08859. COMPUTER PROFESSIONALS. Cen- 205, New Brunswick, NJ 08901. tral NJ IT Consulting company requires SR. IP NETWORK ENGINEER. (Mult. candidates for following positions at EVENTBRITE, INC. is looking Sr. Soft- Openings) Nexius Insight, Inc. Allen, their primary New Brunswick, NJ loca- ware Engineers – Front End in San Fran - TX. W/BS in Comp Sci/Electronics Engg tion 1) Biztalk Developer: design & im- cisco, CA to build software solutions & or rltd + 5 yrs exp. Network Engr or rltd. plement EAI & SOA business solutions application features. Resume to HR, Job Undrstnd existing data center Switching using Biztalk App Integration Bus, Web #EB05, Eventbrite, Inc., 155 5th St. Fl 7, Services, Real Time Messaging, Data San Francisco, CA 94103. Samsung Research America, Inc. has the following opportunities (various levels) available in Mountain View, CA:

Staff Software Engineer (Ref# MTV15C01) Interaction Designer, Staff 1 (Ref# MTV15E03) Software Engineer, Staff 1 (Ref# MTV15C02) Interaction Designer, Staff 2 (Ref# MTV15E04) Sr. Engineer (Ref# MTV15C03) Sr. Product Manager (Ref# MTV15E05) Sr. Software Engineer (Ref# MTV15C04) Staff Engineer (Ref# MTV15E06) Sr. Research Engineer (Ref# MTV15D01) Sr. Graphics Driver Engineer (Ref# MTV15E07) Software Engineer, Sr. Staff 1 (Ref# MTV15E01) Sr. UX Researcher (Ref# MTV15E08) Software Engineer (Ref# MTV15E02)

Specific requirements apply. All of these positions will involve developing technologies for company’s computer, digital television, mobile telephone, printer, or other electronic products. Mail your resume referencing job title and Ref# to [email protected].

62 ComputingEdge June 2015 92 COMPUTER WWW.COMPUTER.ORG/COMPUTER

r6cla.indd 92 5/22/15 10:45 AM CAREER OPPORTUNITIES

Microsoft Corporation currently has the following openings (job opportunities available at all levels, including Principal, Senior and Lead levels):

REDMOND, WA Domestic and International travel up to 25%. design, implementation, and release of pro- Program Managers: Coordinate program de- http://bit.ly/MSJobs_1967 grams or projects. Requires domestic and velopment of computer software applications, Business Program Manager: Responsible international travel up to 25%. http://bit.ly systems or services. (http://bit.ly/MSJobs for the design, implementation, and release /MSJobs_1587 _ProgMgr) (http://bit.ly/MSJobs_HW_ProgMgr) of programs or projects. Telecommuting Operations Program Manager (Tech Solu- (http://bit.ly/MSJobs_ProdQlty_Supp) (http:// Permitted. Position allows employee to re- tions Professional, MMDS)- Mobile Device bit.ly/MSJobs_IT_ProgMgr) side anywhere in the U.S. and telecommute Sales or Other: Responsible for the design, Program Managers: Coordinate program to perform work exclusively from home. implementation, and release of programs development of computer software appli- (http://bit.ly/MSJobs_1526) (http://bit.ly or projects. Requires domestic and in- cations, systems or services. Requires do- /MSJobs_1622) ternational travel up to 25%. http://bit.ly mestic and international travel up to 25%. Principal Program Manager: Coordinate /MSJobs_1589 (http://bit.ly/MSJobs_ProgMgr) (http://bit program development of computer software CAMBRIDGE, MA .ly/MSJobs_HW_ProgMgr) (http://bit.ly applications, systems or services. Requires /MSJobs_ProdQlty_Supp) (http://bit.ly international travel up to 50%. Telecommut- Program Managers: Coordinate program /MSJobs_IT_ProgMgr) ing permitted when not required at factory development of computer software appli- sites. http://bit.ly/MSJobs_1869 cations, systems or services. (http://bit.ly Business/Operations Program Managers: /MSJobs_ProgMgr) (http://bit.ly/MSJobs Responsible for the design, implementation, MOUNTAIN VIEW, CA _HW_ProgMgr) (http://bit.ly/MSJobs and release of programs or projects. (http:// Program Managers: Coordinate program _ProdQlty_Supp) (http://bit.ly/MSJobs_IT bit.ly/MSJobs-Buss_Oper_Prog_Mgmt) _ProgMgr) (http://bit.ly/MSJobs_Ops_PM) development of computer software appli- cations, systems or services. (http://bit.ly DURHAM, NC Program Manager II - Operating Systems /MSJobs_ProgMgr) (http://bit.ly/MSJobs Engr Grp or Other: De ne and execute the _HW_ProgMgr) (http://bit.ly/MSJobs Program Managers: Coordinate program security plan for a Microsoft consumer prod- _ProdQlty_Supp) (http://bit.ly/MSJobs_IT development of computer software appli- uct combining hardware and software tech- _ProgMgr) cations, systems or services. (http://bit nologies. http://bit.ly/MSJobs_1411 .ly/MSJobs_ProgMgr)(http://bit.ly/MSJobs Program Manager: Coordinate program devel- PALO ALTO, CA _HW_ProgMgr) (http://bit.ly/MSJobs opment of computer software applications, Senior Program Manager - Skype Engineer- _ProdQlty_Supp) (http://bit.ly/MSJobs_IT systems or services. This position requires ing or Other: Coordinate program develop- _ProgMgr) international and domestic travel up to 50%. ment of computer software applications, RESTON, VA (http://bit.ly/MSJobs_1476) (http://bit.ly systems or services.Requires domestic and /MSJobs_1364) international travel up to 25%. http://bit.ly Program Managers: Coordinate program NPI/SCC Engineering Program Manager /MSJobs_2264 development of computer software appli- - Devices Group or Other: Coordinate pro- cations, systems or services. (http://bit.ly gram development of hardware products / SAN FRANCISCO, CA /MSJobs_ProgMgr)(http://bit.ly/MSJobs systems. This position requires domestic, Program Managers: Coordinate program _HW_ProgMgr) (http://bit.ly/MSJobs regional and international travel up to 25%. development of computer software appli- _ProdQlty_Supp) (http://bit.ly/MSJobs_IT http://bit.ly/MSJobs_1485 cations, systems or services. (http://bit _ProgMgr) Director, Program Manager – Product Mar- .ly/MSJobs_ProgMgr) (http://bit.ly/MSJobs IRVING, TX keting or Other: Manages program devel- _HW_ProgMgr) (http://bit.ly/MSJobs opment of computer software applications. _ProdQlty_Supp) (http://bit.ly/MSJobs_IT Business/Operations Program Managers: http://bit.ly/MSJobs_1880 _ProgMgr) Responsible for the design, implementation, and release of programs or projects. (http:// Business Program Manager (Learning & SUNNYVALE, CA Development Specialist MPN) - SMSP Part- bit.ly/MSJobs-Buss_Oper_Prog_Mgmt) ner Coverage or Other: Responsible for the Program Managers: Coordinate program de- (http://bit.ly/MSJobs_Ops_PM) design, implementation, and release of pro- velopment of computer software applications, RENO, NV grams or projects. Requires Domestic and systems or services. (http://bit.ly/MSJobs International travel up to 25%. http://bit.ly _ProgMgr)(http://bit.ly/MSJobs_HW Business/Operations Program Managers: /MSJobs_1489 _ProgMgr) (http://bit.ly/MSJobs_ProdQlty Responsible for the design, implementation, _Supp) (http://bit.ly/MSJobs_IT_ProgMgr) and release of programs or projects. (http:// Senior Hardware Program Manager - Large bit.ly/MSJobs-Buss_Oper_Prog_Mgmt) Screen Devices (LSD) or Other: Responsible SAN DIEGO, CA (http://bit.ly/MSJobs_Ops_PM) for leading a cross-functional team from ini- tial conception to high volume production. Program Managers: Coordinate program Requires Domestic and International travel development of computer software appli- Multiple job openings are available for up to 25%. http://bit.ly/MSJobs_1922 cations, systems or services. (http://bit.ly each of these categories. To view de- Senior Director Business Operations & /MSJobs_ProgMgr) (http://bit.ly/MSJobs_HW Program Management- Mobile Devices _ProgMgr) (http://bit.ly/MSJobs_ProdQlty tailed job descriptions and minimum _Supp) (http://bit.ly/MSJobs_IT_ProgMgr) Sales or Other: Manage the operations and requirements, and to apply, visit the business-critical function of the sales of Business Program Manager- Mobile De- website address listed. EOE. smartphones and mobile phones. Requires vice Sales or Other: Responsible for the

www.computer.org/computingedge 63 JUNE 2015 93

r6cla.indd 93 5/22/15 10:45 AM CAREER OPPORTUNITIES

Apple Inc. has the following job opportunities in Cupertino, CA:

Systems Design Engineer (Req# provide conceptual & detailed des ASIC Design Engineer (REQ# 9JQNT9) Eval latest iPad, iPhone, to meet bus users’ needs by com- 9AAUUK). Dev tests & test envi- &iPod HW systems in eld. Travel bining SAP stand. con g & cus- ronments for GPU designs. Req 30% tom dev. Software Engineer Applications ASIC Design Engineer (Req# Information Systems Manager (Req# (REQ#9D2W42). Des & dev large 9D82KR) Work w/ SoC design, 9BGQ73) Admin, install, con g, scale machine learning platform w/ system group & OSATs to de ne trbleshoot & write spprt doc for mission critical perform req. & execute the state-of-art assem- IBM/AIX & act as lead for team of Technical Project Coordinator (Req# bly technology roadmap including AIX sys engs. 9Q3S2W) Coord & drive build PoP, SiP, CSP, wirebond & ip chip Hardware Development Engineer deliver & cross function’l BGA. (Req# 9F4T6X) Dsgn, intgrt & val- dependencies. Engineering Project/Program idate analog & mixd signl hrdwre Software Engineer, Applications Manager (Req#9ML2Y6) Plan & subsys for prtble dvcs. (REQ#9RXPXE). Des & dev web/ execute Apple Power Eng Programs Software Engineer Applications mobile based solt’ns for Apple Retl through building strategic vision, (Req#9NBSC4). Respon for develop, Busns. implementing processes, & provid- design & debug of sw for iOS retail sys. ing precise guidance to team while Software Engineer Applications leveraging eng & operation part- Information Systems Engineer (Req#9UXPWL). Des & dev SW ners to meet & exceed programs’ (Req#9H3UX6). Respon for de- for Apple internet servers. sign, implement & deploy for the critical milestones. Travel Req Software QA Test Engineer (Req# Apple communities used to sup 25%. 9QEUU6) Test iOS device integ prod questions & issues. Senior Software Engineer (Req# & compatib w/Apple CarPlay & 9QZTQV) Dsgn & dvlp software Engineering Program Specialist non-CarPlay auto head units. (Req#9CYVHL). Assist hw eng team for web apps. Hardware Development Engineer to coordinate key areas of hw eng Software Engineer Applications (Req#9FD26J). Support the des, progs w/ exposure to cross-func teams (Req#9L5TEK) Des & imple user constrctn, & validation of board/ & overseas vendors. friendly, highly function & secure sys level electronics for consumer PTS sys that meet global req of reg, Technical Content Analyst (REQ# electronic devices. 9HBVRY). Resp for diagnosing, zero down, reliable & scal. Software Development Engineer troubleshooting, analyzing CMS/ Software Engineer Systems (Req# (Req#9NYVDS). Des & dev sys data processing problems to implnt 9HDNBF). Respon for writing sw SW apps & frameworks for Ap- & imprv comp systems to develop & maintain mission crit- ple Watch prod w/ well-designed ical portal app including writing User Interface Designer & Pro- solutions. totyper (REQ#9BVW2D). Des & code for new feats & sup existing Software Engineer, Applications prototyp user interf for new con- srvcs. (Req#9H6THF). Spprt lrg-scale smr prod Software Development Engineer retail POS sys utlzng exp in comp (Req#9FTNYV). Respon for design Software Development Engineer apps sftwre dsgn, dvlpmnt, implm- & develop of algorithms & sw for (REQ#9J2U2T). Create test plans ntion & maintnce. for new & ex’ting 1st-party apps & comp vision sys. Software Quality Assurance Engi- OS functn’lity. Software Engineer Applications neer (Req#9LG3YS). Responsible (Req#9KXSB3). Respon for design Software Development Engineer for testing code for iTunes products & develop of web/mobile based sols (REQ#9LDPT6). Des & impl large- and services. scale, high vol, high avail, queue- for Apple Retail Bus. ASIC Design Engineer (Req# based backend pipeline SW using Software Engineer, Applications 9FLQ3Y). Respon for design veri - Java. (REQ#9M2RXL). Des & dev SW cation of complex SOCs. Create di- sys based on machine learning & Software Development Engineer rect & random test for hw design. (REQ#9HKTB3). Res for validat. algorithms. Hardware Development En gineer of WiFi SW stack on iOS & OS X IST Technical Project Lead (REQ# (Req#9K4Q7D). Lead proj from platforms. 9LZVCC ). Anlyz bus users’ reqs to concept phase prod in colab de-

64 ComputingEdge June 2015 94 COMPUTER WWW.COMPUTER.ORG/COMPUTER

r6cla.indd 94 5/22/15 10:45 AM CAREER OPPORTUNITIES

veloping audio features. Travel Software Engineer App li cations Software Quality Assurance Engi- Req’d 25% (Req#9JTTQC). Des & dev Data- neer (REQ#9LUS65). Create, dev store abstraction services, framew & lead the exec of all tst strategies Software QA Engineer (Req# & web based app that can rap- to ensure highst qual embed prdct 9U4VHM). Def & create test as- idly scale & serve variety of usage SW solu’s. Travel req’d 15% surance, plans & automation. patrns & data form’s @ PB scale . Systems Design Engineer (Req# Software Development Engineer Software Engineer Applications 9FZN77). Work w/ cross-funct (Req#9D2W4F). Test cellular tele- (Req#9K2NHY). Des & dev Data- teams designing, testing & debug- phony functionality of iOS devices. store abstract. services, frmewk ging products for compliance w/ Travel req’d 30%. & web based app that can rapidly worldwide EMC regs. Layout/Mask Designer (Req#9F- scale & serve variety of usage patt’s Software Development Engineer C4KS). Work on the latest tech- & data form’s @ PB scale. (Req#9F4VHN) Identify areas of nology nodes to create world-class Mechanical Quality Engineer weakness in existing prod. Prop custom digital macros, libraries, (REQ#9E5UWC). Dev & implem’t sol’s & improv to existing prods. etc. inspection tools in high vol manuf. Hardware Development Engineer Software Development Engineer enviromnt. Travel req: 35% (REQ#9LD3MH). Des, dev & val- (Req#9FC4R8). Des & dev SW to Software Engineer Applications idate baseband HW circuits & syst assist with the evaluation of Maps (Req#9RDT85). Des, dev, test & for wireless comm devices. services. deploy high volume, highly scal- Application Engineer (REQ# Hardware Development Engineer able, & highly fault tolerant email 9E2PSD). Des & impl’nt Enterprise (Req#9D9W3W). Respon for de- infrstrctre. product data & release sys’m. sign & develop of hw for OLED Software Engineer, Applications displays. Travel req 20%. ASIC Design Engineer (REQ# (REQ#9REUAV). Monitor, main- 98LV5L). Des App. Specic Inte- Systems Design Engineer (Req# tain, & automate all data ctr oper grated Circuits (processor design) . 9F52Y4). Respon for eval of iPad & for Apple ISO for all hosts & dvcs iPhone hw/sw wireless systems. by perf puppet cong mgt & bldg Software Engineer Applications (Req#9PRUG9). Des & build user Hardware Development Engineer custom modules interface for Apple’s support and (Req#9UD48M). Dsgn & intgrte Software Development Engineer service bus. solid-state fngrprint snsrs for mbl (Req#9CHME3) Dev & implmnt devices. Travel req’d 20%. SW to improve modem perfor- Software Development Engineer (Req#9BV3H9). Des & implmnt Software Engineer Systems (Req# mance in iOS devices. audio drivers and audio SW tools 9NLSL8). Architect, dev & mn- Engineering Project Manager (Req# for OS X and iOS. tain full-stack SW solutions that 9DPPBR) Mng new prdct ramp to include a front-end, serv. & launch Apl’s prdcts on tme w supe- Software Development Engineer storage. rior prdct qual & max cust avail. (REQ#9FZ25R). Des, dev & debug Travel req’d 30%. drivers involved w/ radio comm.

Apple Inc. has Apple Inc. has the following job the following job

opportunity in opportunity in Refer to Req# Newark, CA: Austin, TX: & mail resume to Apple Inc., ATTN: L.M. Systems Programmer (Req# ASIC Design Engineer (REQ# 1 In nite Loop 104-1GM 9CZPUX ) Dfne, crte & implmnt 9GX2FB). Imp complx, high per- Cupertino, CA 95014. cstm dvlpm integrations, user intrf- form & low power unts of a CPU ces & lrg scl intrnl tool sets. involving logic des, HDL synth & Apple is an EOE/AA m/f/ place-and-route. disability/vets.

www.computer.org/computingedge 65 JUNE 2015 95

r6cla.indd 95 5/22/15 10:45 AM CAREER OPPORTUNITIES

The Department of Computer Science and ADVERTISER INFORMATION • JUNE 2015 Engineering at the University of Notre Dame seeks candidates for a teaching faculty position to teach Advertising computer.org, courses primarily in the CS&E undergraduate curricula. This Personnel [email protected] is a full-time, continuing position in the Special Professional Debbie Sims Phone: +1 508 394 4026 Faculty track. Competitive candidates will have the training Advertising Coordinator Fax: +1 508 394 1707 and experience necessary to teach effectively in a range of Email: dsims@computer. courses in accredited degree programs in Computer Science org Southwest, California: and Computer Engineering. Candidates with backgrounds in Phone: +1 714 816 2138 Mike Hughes all areas of Computer Science and Computer Engineering will Fax: +1 714 821 4010 Email: mikehughes@ be considered. Relevant industry experience is also valued. computer.org C h r i s R u o Phone: +1 805 529 6790 The University of Notre Dame is a private, Catholic university Sales Manager Email: cruo @computer. with a doctoral research extensive Carnegie classication, and Southeast: org consistently ranks in USNWR as a top-twenty national univer- Heather Buonadies Phone: +1 714 816 2168 Email: h.buonadies@ sity. The South Bend area has a vibrant and diverse economy Fax: +1 714 821 4010 with affordable housing and excellent school systems, and is computer.org Phone: +1 973 304-4123 within easy driving distance of Chicago and Lake Michigan. Advertising Sales Fax: +1 973 585 7071 Qualied candidates should have at least a Masters degree, Representatives (display) Central, Northwest, Advertising Sales and preferably a doctoral degree, in Computer Science, Far East: Representative Computer Engineering, or a related area. Eric Kincaid (Classi ed Line Email: e.kincaid@ Applications should include a cover letter, curriculum vitae, & Jobs Board) computer.org statement of teaching experience and philosophy, and names Heather Buonadies Phone: +1 214 673 3742 Email: h.buonadies@ of at least three professional references, at least two of Fax: +1 888 886 8599 whom must be able to comment on the applicant’s teaching computer.org Phone: +1 201 887 1703 experience. Review of applications will begin on June 1 and Northeast, Midwest, continue until the position is lled. Europe, Middle East: Ann & David Schissler Applications should be submitted at Email: a.schissler@ http://apply.interfolio.com/29569.

handles the details so you don’t have to!

Professional management and production of your publication Inclusion into the IEEE Xplore and CSDL Digital Libraries Access to CPS Online: Our Online Collaborative Publishing System Choose the product media type that works for your conference: Books, CDs/DVDs, USB Flash Drives, SD Cards, and Web-only delivery! Contact CPS for a Quote Today! www.computer.org/cps or [email protected]

66 ComputingEdge June 2015 96 COMPUTER WWW.COMPUTER.ORG/COMPUTER

r6cla.indd 96 5/22/15 10:45 AM CAREER OPPORTUNITIES

Cisco Systems, Inc. is accepting resumes for the following positions: Austin, TX: Program Manager (Ref#: AUS102): Coordinate and develop large Richardson, TX: Customer Support Engineer (Ref.# RIC1): Responsible for engineering programs from concept to delivery. Telecommuting permitted. providing technical support regarding the company’s proprietary systems and software. Boxborough, MA: User Experience Engineer (Ref#: BOX15): Identify user interaction requirements and develop user experience interface speci cations Rosemont, IL: Network Consulting Engineer (Ref.# ROSE10): Responsible for and guidelines. Network Consulting Engineer (Ref#: BOX14): Responsible for the support and delivery of Advanced Services to company’s major accounts. the support and delivery of Advanced Services to company’s major accounts. Travel may be required to various unanticipated locations throughout the San Francisco, CA: Software Engineer (Ref# SF3): Responsible for the United States. Technical Leader (Ref#: BOX3): Lead engineering groups on de nition, design, development, test, debugging, release, enhancement or projects to design, develop or test hardware or software products. maintenance of networking software. Chicago, IL: Software Engineer (Ref#: CHI6): Responsible for the de nition, San Jose/Milpitas/Santa Clara, CA: Technical Marketing Engineer (Ref#: design, development, test, debugging, release, enhancement or maintenance SJ15): Responsible for enlarging company’s market and increasing revenue of networking software. Telecommuting permitted. by marketing, supporting, and promoting company’s technology to customers. Network Consulting Engineer (Ref#: SJ9): Responsible for the support and Columbia, MD: Software Development Manager (Ref#: COLU4): Lead a team delivery of Advanced Services to company’s major accounts. User Experience in the design and development of company’s hardware or software products. Designer (Ref#: SJ587): Identify user interaction requirements and develop user experience interface speci cations and guidelines. Scrum Master (Ref#: Herndon, VA: Technical Marketing Engineer (Ref#: HER7): Responsible for SJ129): Coordinate and develop large engineering programs from concept enlarging company’s market and increasing revenue by marketing, supporting, to delivery. Deploy technical solutions to large cross functional groups. and promoting company’s technology to customers. Consulting Systems Engineer (Ref#: SJ812): Provide speci c end-to-end Iselin/Edison, NJ: Network Consulting Engineer (Ref#: ED10): Responsible for solutions and architecture consulting, technical and sales support for major the support and delivery of Advanced Services to company’s major accounts. account opportunities at the theater, area, or operation level. Telecommuting Telecommuting permitted and travel may be required to various unanticipated permitted and travel may be required to various unanticipated locations locations throughout the United States. throughout the United States. Software Engineer (Ref#: SJ10): Responsible for the de nition, design, development, test, debugging, release, enhancement Norwalk, CT: Systems Engineer (Ref#: NOR1): Provide business-level or maintenance of networking software. Systems Engineer (Ref#: SJ143): guidance to the account team or operation on technology trends and Provide business-level guidance to the account team or operation on competitive threats, both at a technical and business level. Travel may be technology trends and competitive threats, both at a technical and business required to various unanticipated locations throughout the United States. level. Telecommuting permitted. Software/QA Engineer (Ref#: SJ11): Debug software products through the use of systematic tests to develop, apply, and Research Triangle Park, NC: Technical Leader Services (Ref#: RTP715): maintain quality standards for company products. Independently solve problems in broad, complex, and unique networks in Service Provider, Enterprise, and Data Center environments. Team Lead Tewksbury, MA: Software Engineer (Ref#: TEW7): Responsible for the (Ref#: RTP7): Conduct technical reviews in support of the customer and team de nition, design, development, test, debugging, release, enhancement or requirements. Network Consulting Engineer (Ref#: RTP245): Responsible for maintenance of networking software. the support and delivery of Advanced Services to company’s major accounts. May require travel to various unanticipated locations throughout the United Whippany, NJ: Software Engineer (Ref#: WHI1): Responsible for the de nition, States. Business Systems Analyst (Ref#: RTP138): Optimize operational design, development, test, debugging, release, enhancement or maintenance ef ciency and develop systemic process solutions. Hardware Engineer of networking software. Test Engineer (Ref#: WHI32): Build test equipment (Ref#: RTP12): Responsible for the speci cation, design, development, test, and test diagnostics for new products based on manufacturing designs. enhancement, and sustaining of networking hardware. Project Manager (Ref#: RTP15): Coordinate small, medium, large/complex and multiple Please mail resumes with reference number to Cisco Systems, Inc., Attn: projects throughout the project lifecycle (initiate, plan, execute, control, M51H, 170 W. Tasman Drive, Mail Stop: SJC 5/1/4, San Jose, CA 95134. close) or a portion of a larger, more complex project. Technical Lead/Leader No phone calls please. Must be legally authorized to work in the U.S. (Ref#: RTP5): Lead engineering groups on projects to design, develop or test without sponsorship. EOE. hardware or software products. www.cisco.com

Subscribe today for the latest in computational science and engineering research, news and analysis, CSE in education, and emerging technologies in the hard sciences. www.computer.org/cise

www.computer.org/computingedge 67 JUNE 2015 97

r6cla.indd 97 5/22/15 10:45 AM CAREER OPPORTUNITIES

UNCW IS SEEKING QUALIFIED APPLICANTS TO THE M.S. Computer Science Announcement of an open position at the and Information Systems Faculty of Informatics, Vienna University of Technology, Austria an interdisciplinary program offered jointly by the FULL PROFESSOR Department of Computer Science and the of COMPUTER Department of Information Systems and Operations Management ENGINEERING (Computer Architecture) The Vienna University of Technology invites ap- plications for a Full Professor position at the Small class sizes Faculty of Informatics. The successful candidate will have an outstand- ing research record in computer engineering, Professional Science Masters with a particular emphasis on one or (ideally) more of the following computer architecture-related fields that complement existing activities at the 100% placement of graduates Faculty of Informatics: • Architectures for mixed-criticality applications Multi- and many-core architectures Negative time from graduation to employment Massively parallel architectures (e.g. GPU archi- tectures) Non-conventional architectures (e.g. neural com- puting) High performance architectures (multi-threading, superscalar, etc.) Apply by June 1 for fall admission; • Reconfigurable architectures Memory architectures Nov. 1 for spring admission Circuit design and modeling We offer excellent working conditions in an attrac- tive research environment in a city with an excep- tional quality of life. For a more detailed announcement and informa- uncw.edu/mscsis tion on how to apply, please go to: http://www.informatik.tuwien.ac.at/vacancies EEO/AA Institution Application Deadline: August 20, 2015

IEEE TRANSACTIONS ON AFFECTIVE COMPUTING A publication of the IEEE Computer Society

Affective Computing is the eld of study concerned with understanding, recognizing and utilizing human emotions in the design of computational systems. The IEEE Transactions on Affective Computing (TAC) is intended to be a cross disciplinary and international archive journal aimed at disseminating results of research on the design of systems that can recognize, interpret, and simulate human emotions and related affective phenomena.

Subscribe today or submit your manuscript at: www.computer.org/tac

68 ComputingEdge June 2015 98 COMPUTER WWW.COMPUTER.ORG/COMPUTER

r6cla.indd 98 5/22/15 10:45 AM 39th Annual International CALL FOR PAPERS Computers, Software July 1-5, 2015 & Applications Conference Tunghai University www.compsac.org Taichung, Taiwan Mobile and Cloud Systems - Challenges and Applications COMPSAC is the IEEE Signature Conference on Computers, Software, and Applications. It is one of the major international forums for academia, industry, and government to discuss research results, advancements and future trends in computer and software technologies and applications. The technical program includes keynote addresses, research papers, industrial case studies, panel discussions, fast abstracts, doctoral symposium, poster sessions, and a number of workshops on emerging important topics. With the rapidly growing trend in making computations and data both mobile and cloud-based, such systems are being designed and deployed worldwide. However, there still exists several challenges when they are applied to different domains or across domains. COMPSAC 2015 will provide a platform for in-depth discussion of such challenges in emerging application domains such as smart and connected health, wearable computing, internet-of-things, cyber-physical systems, and smart planet. Technical Symposia Workshops Program Special Sessions

COMPSAC 2015 will be organized as a tightly integrated union of several symposia, each of which will be focusing on a particular technical segment. Please visit www.compsac.org for full information on symposia organization. * Symposium on Embedded & Cyber-Physical Environments * Symposium on Software Engineering Technologies & Applications * Symposium on Technologies and Applications of the Internet * Symposium on Security, Privacy and Trust Computing * Symposium on Mobile, Wearable and Ubiquitous Computing * Symposium on Web Technologies & Data Analytics * Symposium on Human-Machine and Aware Computing * Symposium on Novel Applications and Technology Advances in Computing * Symposium on Computer Education and Learning Technologies * Symposium on IT in Practice Authors are invited to submit original, unpublished research work and novel computer applications in full-paper format. Simultaneous submission to other publication venues is not permitted. The review and selection process for submissions is designed to identify papers that break new ground and provide substantial support for their results and conclusions as significant contributions to the field. Submissions will be selected that represent a major advancement in the subject of the symposia to which they are submitted. Authors of submissions with a limited contribution or scope may be asked to revise their submissions into a more succinct camera-ready format; e.g., a short paper, workshop paper, fast abstract, or poster.

COMPSAC 2015 will also feature a workshops program for topics closely related to the conference theme, Mobile and Cloud Systems - Challenges and Applications. Special sessions such as Fast Abstract and Industry Papers will be applicable especially for researchers and engineers who would like to present a new, early and work-in-progress ideas, method, and analysis. The Doctoral Symposium will provide a forum for doctoral students to interact with other students, faculty mentors, industry and government. Students will have the opportunity to present and discuss their research goals, methodology, and preliminary results within a constructive and international atmosphere. Important Dates for Authors: Contact COMPSAC January 17, 2015: Paper submissions due For full information and CFP please visit www.compsac.org March 15, 2015: Paper notifications Contact COMPSAC organizers at [email protected] April 28, 2015: Camera ready and registration due

COMPSAC Sponsors: COMPSAC Technical Co-Sponsors: COMPSAC 2015 Local Host:

www.computer.org/computingedge 69

r1com.indd 1 12/18/14 4:50 PM r6cla.indd 99 5/22/15 10:45 AM COMPUTER SOCIETY: BRING YOUR CHILD TO WORK DAY

Computer Users: The Next Generation

Evan Butterfi eld

eople go on and on about “the next To Samuel Sims, 11, his cover represented generation” of computers or “the next computations determining that the Los Angeles P generation” of technology or “the next Clippers professional basketball team makes 53 generation” of publishing. I’m as guilty as anyone. percent of its three-point shots. Jayden Thomp- (For the record, I will also go on and on about Star son, 10, drew a 3D representation of a PC. And Trek: The Next Generation.) Saoirse Walsh, 10, sketched a magnifying glass Last month, IEEE Computer Society staff con- demonstrating the Internet’s ability to bring the fronted “the next generation” of … generations. world into focus. For Bring Your Child to Work Day, three CS staff - For their generation, computers aren’t something ers brought their kids to our Los Alamitos, Cali- separate and distinct―an us-versus-them thing―but fornia, offi ce for a day of organized activities rather a natural part of everyday life. It was a delight dedicated to learning about Computer Society to have these young people at our offi ce; maybe products, services, activities, and fi elds of inter- someday they’ll be Computer society members! est. One of the activities was designing a mock cover for Computer magazine. The covers they Evan Butterfi eld is the IEEE Computer Society’s drew refl ected diff erent views of what computation director of products and services. Contact him at means to today’s young people. ebutterfi [email protected].

70 June 2015 Published by the IEEE Computer Society 2376-113X/15/$31.00 © 2015 IEEE Cont. from p. 72 would fi nd a way to people, regardless of whether Not long ago, my books competed with one the words are printed or displayed on a screen. another on my shelf: it was Philip K. Dick ver- Now, though, I must admit that apps’ ubiquity has sus Jorge Luis Borges. The volumes would peer made me a bit concerned. at each other over the paperbacks between them, just waiting for me to grab one some rainy Satur- day morning. That seemed like good competition: t’s an interesting time, to be sure. And if we words versus words. look at words and the containers that carry Now, however, the bookshelf is digital, and I them, we can see that the times indeed are a when Philip looks at Jorge, he might see only my changin’. email app or Angry Birds. For some people, it might Today’s books are zeros and ones lost in a not even be a fair fi ght any more. E-books have sea of apps, and the competition is fi erce. Is the remained simply a collection of words. The reading answer to make words more like apps, bringing in experience hasn’t necessarily been enhanced by social-media connectivity, interactive minigames this digital medium; it’s merely a new type of paper. between chapters, or hidden expositions that are unlocked based on a reader’s location as detected The Impact of Apps by GPS technology? Or must publishers, who have been in the paper game, get into the hard- Now that I work in publishing, it’s interesting to ware game? see how apps―and digital technology in gen- There is still a place for words, and there will eral―have impacted a publication’s readership probably be more apps before it’s all said and done. and our ability to communicate with an audi- I just hope that the next generation can recognize ence. By and large, I feel that many of us are still the diff erence, appreciate both, and not think that re-creating words on paper and this might not be e-books are simply boring apps. enough to draw people away from interactive apps. Also, since the early 20th century, the publish- Brian Kirk is IEEE Computer Society’s associate man- ing industry picked up some habits that haven’t ager for editorial project development. Contact him inspired either effi ciency or economic eff ective- at [email protected]. ness, such as a bookseller’s right to return unsold copies to the publisher and the practice of pulping unsold books. Selected CS articles and columns are also available for free at http://ComputingNow.computer.org. Nonetheless, I was still optimistic that stories

Silver Bullet Security Podcast

In-depth interviews with security gurus. Hosted by Gary McGraw.

www.computer.org/security/podcasts *Also available at iTunes

Sponsored by

www.computer.org/computingedge 71 LIFE AND TECH

The Word on Apps

Brian Kirk

etween Google Play and Apple’s App compared books to movies and games because Store, there are almost 3 million apps. they are diff erent media. B For users, the process of accessing apps I fi gured printing words on paper allowed for is easy and straightforward: fi nd the app and click. only certain types of stories. Regardless of genre, We can then bask in the glow of the innovative the reader follows the trail of words as they’re pre- things that our apps can accomplish. We can view sented, basically without choice or interaction. the night sky, fi nd the planets’ locations, and see For me, reading was a passive experience, one in the number of steps we’ve taken during a period which a narrator in your brain used the words on of time. We can read the news, videochat with the page to tell you a story and paint you a picture friends, fi nd a house for rent, and play games. or two. (My narrator spoke in a British accent and However, apps―and digital technology in could do some excellent impressions.) general―also pose a challenge to the publish- I thought the digital future would be somehow ing industry. And for those who value the written diff erent, allowing us more options in a narrative word, it’s important to understand the nature of experience by enabling multimedia, tangential this challenge. expositions, and potentially other readers’ com- ments presented within or alongside the text. Medium Well Digital Challenge As a college student, I was drawn to the digital revolution and its eff ect on the written word. I felt I love my tablet. It’s a wonderful device, albeit a like the idea of a story was somehow limited to its tad outdated as it’s almost two years old. It’s got a medium. I love stories, and certain stories work fair amount of music, some games, a few movies better in certain media. I would rather watch The and television shows, and a growing collection of Avengers on a big screen than read it in a book, and e-books. Now when I fl y somewhere, I don’t have I never need to see a movie on The Chicago Man- to schlep my current reading list in printed form. ual of Style. In the same vein, I’ve never directly Cont. on p. 71

72 June 2015 Published by the IEEE Computer Society 2376-113X/15/$31.00 © 2015 IEEE While the world benefits from what’s new, IEEE can focus you on what’s next.

IEEE Xplore can power your research and help develop new ideas faster with access to trusted content:

• Journals and Magazines • Conference Proceedings • Standards • eBooks • eLearning • Plus content from select partners

IEEE Xplore® Digital Library Information Driving Innovation Learn More innovate.ieee.org

Follow IEEE Xplore on

TOM EMRICH Consultant Mobile, Wearables, and Emerging Tech ROCK STARS OF

TIM MOORE Director of Wearable WEARABLES Technologies, Rochester Optical

PANKAJ KEDIA

Senior Director & Business Lead, Smart WearablesQualcomm

23 September 2015 Brazos Hall What Technologies Are Needed for Austin, TX Wearables? What Markets are Emerging? Stake Your Claim in the Fast-Growing Future of REGISTER NOW Wearables. Early Discount Pricing Now Available! At this must-attend event of 2015, top industry experts give you computer.org/ actionable solutions for wearable success. wearables You’re invited.