Communications of the Acm

Total Page:16

File Type:pdf, Size:1020Kb

Communications of the Acm COMMUNICATIONS CACM.ACM.ORG OF THEACM 11/2014 VOL.57 NO.11 Scene Understanding by Labeling Pixels Evolution of the Product Manager The Data on Diversity On Facebook, Most Ties Are Weak Keeping Online Reviews Honest Association for Computing Machinery tvx-full-page.pdf-newest.pdf 1 11/10/2013 12:03 3-5 JUNE, 2015 BRUSSELS, BELGIUM Course and Workshop C proposals by M 15 November 2014 Y CM Paper Submissions by MY 12 January 2015 CY CMY K Work in Progress, Demos, DC, & Industrial Submissions by 2 March 2015 Welcoming Submissions on Content Production Systems & Infrastructures Devices & Interaction Techniques Experience Design & Evaluation Media Studies Data Science & Recommendations Business Models & Marketing Innovative Concepts & Media Art TVX2015.COM [email protected] ACM Books M MORGAN& CLAYPOOL &C PUBLISHERS Publish your next book in the ACM Digital Library ACM Books is a new series of advanced level books for the computer science community, published by ACM in collaboration with Morgan & Claypool Publishers. I’m pleased that ACM Books is directed by a volunteer organization headed by a dynamic, informed, energetic, visionary Editor-in-Chief (Tamer Özsu), working closely with a forward-looking publisher (Morgan and Claypool). —Richard Snodgrass, University of Arizona books.acm.org ACM Books ◆ will include books from across the entire spectrum of computer science subject matter and will appeal to computing practitioners, researchers, educators, and students. ◆ will publish graduate level texts; research monographs/overviews of established and emerging fields; practitioner-level professional books; and books devoted to the history and social impact of computing. ◆ will be quickly and attractively published as ebooks and print volumes at affordable prices, and widely distributed in both print and digital formats through booksellers and to libraries and individual ACM members via the ACM Digital Library platform. ◆ is led by EIC M. Tamer Özsu, University of Waterloo, and a distinguished editorial board representing most areas of CS. Proposals and inquiries welcome! Association for Contact: M. Tamer Özsu, Editor in Chief Computing Machinery [email protected] Advancing Computing as a Science & Profession COMMUNICATIONS OF THE ACM Departments News Viewpoints 5 From the President 24 Economic and Business Dimensions Dealing with the Deep, Long-Term The Dark Side of the Sharing Challenges Facing ACM (Part I) Economy … and How to Lighten It By Alexander L. Wolf Improving the sharing economy will require addressing myriad problems. 7 Cerf’s Up By Arvind Malhotra Heidelberg Laureate Forum II and Marshall Van Alstyne By Vinton G. Cerf 28 Legally Speaking 9 Letters to the Editor Updates on the Intellectual Accountability Is No Excuse Property Front for Surveillance Recapping influential U.S. Supreme Court decisions 10 BLOG@CACM rendered earlier this year. Teach the Teachers, 16 By Pamela Samuelson and Contribute to Humanity Mark Guzdial suggests computer 13 Researchers Simplify 31 Computing Ethics science education needs to be Parallel Programming Big Data’s End Run Around aimed at adults before teaching it to Parallel computing has become Procedural Privacy Protections children; Lawrence M. Fisher finds increasingly important as Recognizing the inherent limitations the volunteer spirit behind ACM chipmakers put more and more of consent and anonymity. Special Interest Groups. processor cores on individual chips. By Solon Barocas and Helen Nissenbaum By Gary Anthes 41 Calendar 34 Education 16 Computing What Fits A Future for Computing 106 Careers New apps and pods improve Education Research the virtual and actual retail Seeking to address the most experiences by ensuring clothing important issues facing the computer Last Byte and cosmetics look good on you education research community. before you buy them. By Steve Cooper, Shuchi Grover, 120 Upstart Puzzles By Esther Shein Mark Guzdial, and Beth Simon Proving without Teaching/ Teaching without Proving 20 Keeping Online Reviews Honest 37 Privacy and Security By Dennis Shasha As online reviews become Summing Up increasingly important Considering recent privacy- and security- to e-commerce and social media related events through this column. sites, computer scientists By Susan Landau work on ways to ensure their authenticity. 40 Viewpoint By Logan Kugler An Embarrassment of Riches A critical review of open innovation systems. By Mark Klein and Gregorio Convertino 43 Viewpoint Designing User Incentives for Cybersecurity How to encourage better user security practices and behavior. Association for Computing Machinery Advancing Computing as a Science & Profession By Terrence August, Robert August, and Hyoduk Shin OF BODYMETRICS COURTESY IMAGE 2 COMMUNICATIONS OF THE ACM | NOVEMBER 2014 | VOL. 57 | NO. 11 11/2014 VOL. 57 NO. 11 Practice Contributed Articles Review Articles 48 68 86 48 Evolution of the Product Manager 68 Scene Understanding 86 The Data on Diversity Better education needed by Labeling Pixels It’s not just about being fair. to develop the discipline. Pixels labeled with a scene’s By Beryl Nelson By Ellen Chisa semantics and geometry let computers describe what they see. 53 JavaScript and the Netflix By Stephen Gould and Xuming He Research Highlights User Interface Conditional dependency resolution. 78 On Facebook, Most Ties Are Weak 97 Technical Perspective By Alex Liu Strong ties connect individuals The Intricate Dance in the same community; of Fabric and Light 60 A Decade of Progress in Parallel weak ties connect individuals By Szymon Rusinkiewicz Programming Productivity in different communities. Looking at the design By Pasquale De Meo, 98 Building Volumetric Appearance and benefits of X10. Emilio Ferrara, Giacomo Fiumara, Models of Fabric Using By John T. Richards, Jonathan Brezin, and Alessandro Provetti Micro CT Imaging Calvin B. Swart, and By Shuang Zhao, Wenzel Jakob, Christine A. Halverson Steve Marschner, and Kavita Bala Articles’ development led by queue.acm.org About the Cover: Creating a computer that can automatically understand a visual scene has been a perennial problem in the AI and computer vision fields. This month’s cover story (p. 68) presents a promising approach that calls for annotating every pixel in a scene with a label that indicates what and where it is. Cover illustration by MEME IMAGE BY CATHERINE CONSTANTINIDES/ONEDESK.COM; ILLUSTRATIONS BY ANDREW JOYCE, SARAH HANSON SARAH ANDREW JOYCE, BY ILLUSTRATIONS CONSTANTINIDES/ONEDESK.COM; CATHERINE BY MEME IMAGE Andrew Joyce. NOVEMBER 2014 | VOL. 57 | NO. 11 | COMMUNICATIONS OF THE ACM 3 COMMUNICATIONS OF THE ACM Trusted insights for computing’s leading professionals. Communications of the ACM is the leading monthly print and online magazine for the computing and information technology fields. Communications is recognized as the most trusted and knowledgeable source of industry information for today’s computing professional. Communications brings its readership in-depth coverage of emerging areas of computer science, new trends in information technology, and practical applications. Industry leaders use Communications as a platform to present and debate various technology implications, public policies, engineering challenges, and market trends. The prestige and unmatched reputation that Communications of the ACM enjoys today is built upon a 50-year commitment to high-quality editorial content and a steadfast dedication to advancing the arts, sciences, and applications of information technology. ACM, the world’s largest educational STAFF EDITORIAL BOARD ACM Copyright Notice and scientific computing society, delivers Copyright © 2014 by Association for resources that advance computing as a DIRECTOR OF GROUP PUBLISHING EDITOR-IN-CHIEF Computing Machinery, Inc. (ACM). science and profession. ACM provides the Scott E. Delman Moshe Y. Vardi Permission to make digital or hard copies computing field’s premier Digital Library [email protected] [email protected] of part or all of this work for personal and serves its members and the computing Executive Editor NEWS or classroom use is granted without profession with leading-edge publications, Diane Crawford Co-Chairs fee provided that copies are not made conferences, and career resources. Managing Editor William Pulleyblank and Marc Snir or distributed for profit or commercial Thomas E. Lambert Board Members advantage and that copies bear this Executive Director and CEO Senior Editor Mei Kobayashi; Kurt Mehlhorn; notice and full citation on the first John White Andrew Rosenbloom Michael Mitzenmacher; Rajeev Rastogi page. Copyright for components of this Deputy Executive Director and COO Senior Editor/News work owned by others than ACM must Patricia Ryan Larry Fisher VIEWPOINTS be honored. Abstracting with credit is Director, Office of Information Systems Web Editor Co-Chairs permitted. To copy otherwise, to republish, Wayne Graves David Roman Tim Finin; Susanne E. Hambrusch; to post on servers, or to redistribute to Director, Office of Financial Services Editorial Assistant John Leslie King lists, requires prior specific permission Darren Ramdin Zarina Strakhan Board Members and/or fee. Request permission to publish Director, Office of SIG Services Rights and Permissions William Aspray; Stefan Bechtold; from [email protected] or fax Donna Cappo Deborah Cotton Michael L. Best; Judith Bishop; (212) 869-0481. Director, Office of Publications Stuart I. Feldman; Peter Freeman; Bernard Rous Art Director Mark Guzdial; Rachelle Hollander; For other copying of
Recommended publications
  • A DATA-ORIENTED NETWORK ARCHITECTURE Doctoral Dissertation
    TKK Dissertations 140 Espoo 2008 A DATA-ORIENTED NETWORK ARCHITECTURE Doctoral Dissertation Teemu Koponen Helsinki University of Technology Faculty of Information and Natural Sciences Department of Computer Science and Engineering TKK Dissertations 140 Espoo 2008 A DATA-ORIENTED NETWORK ARCHITECTURE Doctoral Dissertation Teemu Koponen Dissertation for the degree of Doctor of Science in Technology to be presented with due permission of the Faculty of Information and Natural Sciences for public examination and debate in Auditorium T1 at Helsinki University of Technology (Espoo, Finland) on the 2nd of October, 2008, at 12 noon. Helsinki University of Technology Faculty of Information and Natural Sciences Department of Computer Science and Engineering Teknillinen korkeakoulu Informaatio- ja luonnontieteiden tiedekunta Tietotekniikan laitos Distribution: Helsinki University of Technology Faculty of Information and Natural Sciences Department of Computer Science and Engineering P.O. Box 5400 FI - 02015 TKK FINLAND URL: http://cse.tkk.fi/ Tel. +358-9-4511 © 2008 Teemu Koponen ISBN 978-951-22-9559-3 ISBN 978-951-22-9560-9 (PDF) ISSN 1795-2239 ISSN 1795-4584 (PDF) URL: http://lib.tkk.fi/Diss/2008/isbn9789512295609/ TKK-DISS-2510 Picaset Oy Helsinki 2008 AB ABSTRACT OF DOCTORAL DISSERTATION HELSINKI UNIVERSITY OF TECHNOLOGY P. O. BOX 1000, FI-02015 TKK http://www.tkk.fi Author Teemu Koponen Name of the dissertation A Data-Oriented Network Architecture Manuscript submitted 09.06.2008 Manuscript revised 12.09.2008 Date of the defence 02.10.2008 Monograph X Article dissertation (summary + original articles) Faculty Information and Natural Sciences Department Computer Science and Engineering Field of research Networking Opponent(s) Professor Jon Crowcroft Supervisor Professor Antti Ylä-Jääski Instructor(s) Dr.
    [Show full text]
  • Benchmarks for IP Forwarding Tables
    Reviewers James Abello Richard Cleve Vassos Hadzilacos Dimitris Achilioptas James Clippinger Jim Hafner Micah Adler Anne Condon Torben Hagerup Oswin Aichholzer Stephen Cook Armin Haken William Aiello Tom Cormen Shai Halevi Donald Aingworth Dan Dooly Eric Hansen Susanne Albers Oliver Duschka Refael Hassin Eric Allender Martin Dyer Johan Hastad Rajeev Alur Ran El-Yaniv Lisa Hellerstein Andris Ambainis David Eppstein Monika Henzinger Amihood Amir Jeff Erickson Tom Henzinger Artur Andrzejak Kousha Etessami Jeremy Horwitz Boris Aronov Will Evans Russell Impagliazzo Sanjeev Arora Guy Even Piotr Indyk Amotz Barnoy Ron Fagin Sandra Irani Yair Bartal Michalis Faloutsos Ken Jackson Julien Basch Martin Farach-Colton David Johnson Saugata Basu Uri Feige John Jozwiak Bob Beals Joan Feigenbaum Bala Kalyandasundaram Paul Beame Stefan Felsner Ming-Yang Kao Steve Bellantoni Faith Fich Haim Kaplan Micahel Ben-Or Andy Fingerhut Bruce Kapron Josh Benaloh Paul Fischer Michael Kaufmann Charles Bennett Lance Fortnow Michael Kearns Marshall Bern Steve Fortune Sanjeev Khanna Nikolaj Bjorner Alan Frieze Samir Khuller Johannes Blomer Anna Gal Joe Kilian Avrim Blum Naveen Garg Valerie King Dan Boneh Bernd Gartner Philip Klein Andrei Broder Rosario Gennaro Spyros Kontogiannis Nader Bshouty Ashish Goel Gilad Koren Adam Buchsbaum Michel Goemans Dexter Kozen Lynn Burroughs Leslie Goldberg Dina Kravets Ran Canetti Paul Goldberg S. Ravi Kumar Pei Cao Oded Goldreich Eyal Kushilevitz Moses Charikar John Gray Stephen Kwek Chandra Chekuri Dan Greene Larry Larmore Yi-Jen Chiang
    [Show full text]
  • Here I Led Subcommittee Reports Related to Data-Intensive Science and Post-Moore Computing) and in CRA’S Board of Directors Since 2015
    Vivek Sarkar Curriculum Vitae Contents 1 Summary 2 2 Education 3 3 Professional Experience 3 3.1 2017-present: College of Computing, Georgia Institute of Technology . 3 3.2 2007-present: Department of Computer Science, Rice University . 5 3.3 1987-2007: International Business Machines Corporation . 7 4 Professional Awards 11 5 Research Awards 12 6 Industry Gifts 15 7 Graduate Student and Other Mentoring 17 8 Professional Service 19 8.1 Conference Committees . 20 8.2 Advisory/Award/Review/Steering Committees . 25 9 Keynote Talks, Invited Talks, Panels (Selected) 27 10 Teaching 33 11 Publications 37 11.1 Refereed Conference and Journal Publications . 37 11.2 Refereed Workshop Publications . 51 11.3 Books, Book Chapters, and Edited Volumes . 58 12 Patents 58 13 Software Artifacts (Selected) 59 14 Personal Information 60 Page 1 of 60 01/06/2020 1 Summary Over thirty years of sustained contributions to programming models, compilers and runtime systems for high performance computing, which include: 1) Leading the development of ASTI during 1991{1996, IBM's first product compiler component for optimizing locality, parallelism, and the (then) new FORTRAN 90 high-productivity array language (ASTI has continued to ship as part of IBM's XL Fortran product compilers since 1996, and was also used as the foundation for IBM's High Performance Fortran compiler product); 2) Leading the research and development of the open source Jikes Research Virtual Machine at IBM during 1998{2001, a first-of-a-kind Java Virtual Machine (JVM) and dynamic compiler implemented
    [Show full text]
  • The Strange Birth and Long Life of Unix - IEEE Spectrum Page 1 of 6
    The Strange Birth and Long Life of Unix - IEEE Spectrum Page 1 of 6 COMPUTING / SOFTWARE FEATURE The Strange Birth and Long Life of Unix The classic operating system turns 40, and its progeny abound By WARREN TOOMEY / DECEMBER 2011 They say that when one door closes on you, another opens. People generally offer this bit of wisdom just to lend some solace after a misfortune. But sometimes it's actually true. It certainly was for Ken Thompson and the late Dennis Ritchie, two of the greats of 20th-century information technology, when they created the Unix operating system, now considered one of the most inspiring and influential pieces of software ever written. A door had slammed shut for Thompson and Ritchie in March of 1969, when their employer, the American Telephone & Telegraph Co., withdrew from a collaborative project with the Photo: Alcatel-Lucent Massachusetts Institute of KEY FIGURES: Ken Thompson [seated] types as Dennis Ritchie looks on in 1972, shortly Technology and General Electric after they and their Bell Labs colleagues invented Unix. to create an interactive time- sharing system called Multics, which stood for "Multiplexed Information and Computing Service." Time-sharing, a technique that lets multiple people use a single computer simultaneously, had been invented only a decade earlier. Multics was to combine time-sharing with other technological advances of the era, allowing users to phone a computer from remote terminals and then read e -mail, edit documents, run calculations, and so forth. It was to be a great leap forward from the way computers were mostly being used, with people tediously preparing and submitting batch jobs on punch cards to be run one by one.
    [Show full text]
  • NORTHWESTERN UNIVERSITY Adopting a Gateway Centric View
    NORTHWESTERN UNIVERSITY Adopting a Gateway Centric View for Cellular Network Content Delivery A DISSERTATION SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL FULFILLMENT OF THE REQUIREMENTS for the degree DOCTOR OF PHILOSOPHY Field of Computer Science By John Paul Rula EVANSTON, ILLINOIS June 2017 2 c Copyright by John Paul Rula 2017 All Rights Reserved 3 Committee Fabi´anBustamante (Chair), Northwestern University Aleksandar Kuzmanovic, Northwestern University Peter Dinda, Northwestern University Jon Crowcroft, University of Cambridge 4 ABSTRACT Adopting a Gateway Centric View for Cellular Network Content Delivery John Paul Rula Mobile traffic is expected to grow tenfold by 2019, topping 24 exabytes of monthly traffic and accounting for nearly half of all Internet traffic. This growth is driven by the increasing number of smart phones and tablets, and the data demands of high bandwidth services enabled by next-generation cellular networks such as LTE/5G. As in the wired Internet, network usage is dominated by content consumption, with the vast majority served through content delivery networks (CDNs). CDNs host and replicate popular content across thousands of servers worldwide, directing users to \nearby" servers. This replica selection is a key determinant of client performance, yet replica selection for cellular clients has previously been overlooked, due to high radio latency, inconsistent throughput, and a limited number of ingress locations which dominated end-to-end latency. NGCNs and their improved performance place a renewed emphasis on replica selection policies for cellular clients. We find that the performance of existing replica selection systems in cellular networks is hindered by their opacity, the dynamic assignment of clients to infrastructure components, the emergence of centralized DNS within cellular networks, and the growth of public DNS in global mobile operators.
    [Show full text]
  • The Strange Birth and Long Life of Unix - IEEE Spectrum
    The Strange Birth and Long Life of Unix - IEEE Spectrum http://spectrum.ieee.org/computing/software/the-strange-birth-and-long-li... COMPUTING / SOFTWARE FEATURE The Strange Birth and Long Life of Unix The classic operating system turns 40, and its progeny abound By WARREN TOOMEY / DECEMBER 2011 They say that when one door closes on you, another opens. People generally offer this bit of wisdom just to lend some solace after a misfortune. But sometimes it's actually true. It certainly was for Ken Thompson and the late Dennis Ritchie, two of the greats of 20th-century information technology, when they created the Unix operating system, now considered one of the most inspiring and influential pieces of software ever written. A door had slammed shut for Thompson and Ritchie in March of 1969, when their employer, the American Telephone & Telegraph Co., withdrew from a collaborative project with the Photo: Alcatel-Lucent Massachusetts Institute of KEY FIGURES: Ken Thompson [seated] types as Dennis Ritchie looks on in 1972, shortly Technology and General Electric after they and their Bell Labs colleagues invented Unix. to create an interactive time-sharing system called Multics, which stood for "Multiplexed Information and Computing Service." Time-sharing, a technique that lets multiple people use a single computer simultaneously, had been invented only a decade earlier. Multics was to combine time-sharing with other technological advances of the era, allowing users to phone a computer from remote terminals and then read e-mail, edit documents, run calculations, and so forth. It was to be a great leap forward from the way computers were mostly being used, with people tediously preparing and submitting batch jobs on punch cards to be run one by one.
    [Show full text]
  • 3 Is Not a Crowd, It's an Anecdote
    3 is Not a Crowd, It’s an Anecdote Jon Crowcroft Marconi Professor of Communications Systems, Computer Laboratory University of Cambridge Cambridge, UK [email protected] Abstract has been crowd-sourced from the Internet, we should all be Crowd-sourcing measurements from the Internet, for the extremely aware of this non-trivial risk. In some areas of Internet, and by the Internet, is naturally popular due to the studies (e.g. censorship, hacktivism,cybercrime), the risk cost scaling that this approach offers. It appears to offer a of such re-identification to some members of our crowds low barrier to entry to new researchers, when compared with may be extremely high. We are all social scientists, now. the difficulties in obtaining data about operational networks ACM CCS Concepts: C.2, Networks from their owners. Keywords: Internet Measurement, Crowdsourcing, Privacy In this talk I will outline some precautions that should be taken by researchers, including: Sample Bias – Ground truth must be established about your sample. The very fact that you are using people on the internet prepared (assuming you have informed consent – you do, don’t you?) to be part of an experiment, means you have selection bias. Establish what it is by old fashioned means. Subject Privacy – You may get more buy-in from more users, and in more ways, if you can offer assurances about maintaining their privacy: o “No, this app won’t (unlike 70% of smart phone apps) leak lots of your Personal Data”, o How you achieve this, best practice with sandboxes and cryptography and security processes, o AAA applied to your logging databases, BIO o Long term fate, care and curation.
    [Show full text]
  • Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University
    Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University. Linda A. Cicero/Stanford News Service. Whitfield Diffie Martin E. Hellman ernment–private sector relations, and attracts billions of Whitfield Diffie, former chief security officer of Sun Mi- dollars in research and development,” said ACM President crosystems, and Martin E. Hellman, professor emeritus Alexander L. Wolf. “In 1976, Diffie and Hellman imagined of electrical engineering at Stanford University, have been a future where people would regularly communicate awarded the 2015 A. M. Turing Award of the Association through electronic networks and be vulnerable to having for Computing Machinery for their critical contributions their communications stolen or altered. Now, after nearly to modern cryptography. forty years, we see that their forecasts were remarkably Citation prescient.” The ability for two parties to use encryption to commu- “Public-key cryptography is fundamental for our indus- nicate privately over an otherwise insecure channel is try,” said Andrei Broder, Google Distinguished Scientist. fundamental for billions of people around the world. On “The ability to protect private data rests on protocols for a daily basis, individuals establish secure online connec- confirming an owner’s identity and for ensuring the integ- tions with banks, e-commerce sites, email servers, and the rity and confidentiality of communications. These widely cloud. Diffie and Hellman’s groundbreaking 1976 paper, used protocols were made possible through the ideas and “New Directions in Cryptography,” introduced the ideas of methods pioneered by Diffie and Hellman.” public-key cryptography and digital signatures, which are Cryptography is a practice that facilitates communi- the foundation for most regularly used security protocols cation between two parties so that the communication on the Internet today.
    [Show full text]
  • Curriculum Vitae
    Massachusetts Institute of Technology School of Engineering Faculty Personnel Record Date: April 1, 2020 Full Name: Charles E. Leiserson Department: Electrical Engineering and Computer Science 1. Date of Birth November 10, 1953 2. Citizenship U.S.A. 3. Education School Degree Date Yale University B. S. (cum laude) May 1975 Carnegie-Mellon University Ph.D. Dec. 1981 4. Title of Thesis for Most Advanced Degree Area-Efficient VLSI Computation 5. Principal Fields of Interest Analysis of algorithms Caching Compilers and runtime systems Computer chess Computer-aided design Computer network architecture Digital hardware and computing machinery Distance education and interaction Fast artificial intelligence Leadership skills for engineering and science faculty Multicore computing Parallel algorithms, architectures, and languages Parallel and distributed computing Performance engineering Scalable computing systems Software performance engineering Supercomputing Theoretical computer science MIT School of Engineering Faculty Personnel Record — Charles E. Leiserson 2 6. Non-MIT Experience Position Date Founder, Chairman of the Board, and Chief Technology Officer, Cilk Arts, 2006 – 2009 Burlington, Massachusetts Director of System Architecture, Akamai Technologies, Cambridge, 1999 – 2001 Massachusetts Shaw Visiting Professor, National University of Singapore, Republic of 1995 – 1996 Singapore Network Architect for Connection Machine Model CM-5 Supercomputer, 1989 – 1990 Thinking Machines Programmer, Computervision Corporation, Bedford, Massachusetts 1975
    [Show full text]
  • Lecture 10: File Systems File Systems, Databases, Cloud Storage
    Lecture 10: File systems File systems, databases, cloud storage • file: a sequence of bytes stored on a computer – content is arbitrary (just bytes); any structure is imposed by the creator of the file, not by the operating system • file system: software that provides hierarchical storage and organization of files, usually on a single computer (or nearby) – a significant part of the operating system • database: an integrated collection of logically related records – data is organized and structured for efficient systematic access – may be distributed across lots of machines & geographically dispersed • database system: software that provides efficient access to information in a database – not usually part of the operating system • cloud storage: the same thing, but on someone else's computer(s) File systems: managing stored information • logical structure: users and programs see a hierarchy of folders (or directories) and files – a folder contains references to folder and files – "root" folder ultimately leads to all others – a file is just a sequence of bytes contents determined and interpreted by programs, not the operating system – a folder is a special file that contains names of other folders & files plus other information like size, time of change, etc. contents are completely controlled by the operating system • physical structure: disk drives operate in tracks, sectors, etc. – other storage devices have other physical properties • the operating system converts between these two views – does whatever is necessary to maintain the file/folder
    [Show full text]
  • Privacy Engineering for Social Networks
    UCAM-CL-TR-825 Technical Report ISSN 1476-2986 Number 825 Computer Laboratory Privacy engineering for social networks Jonathan Anderson December 2012 15 JJ Thomson Avenue Cambridge CB3 0FD United Kingdom phone +44 1223 763500 http://www.cl.cam.ac.uk/ c 2012 Jonathan Anderson This technical report is based on a dissertation submitted July 2012 by the author for the degree of Doctor of Philosophy to the University of Cambridge, Trinity College. Technical reports published by the University of Cambridge Computer Laboratory are freely available via the Internet: http://www.cl.cam.ac.uk/techreports/ ISSN 1476-2986 Privacy engineering for social networks Jonathan Anderson In this dissertation, I enumerate several privacy problems in online social net- works (OSNs) and describe a system called Footlights that addresses them. Foot- lights is a platform for distributed social applications that allows users to control the sharing of private information. It is designed to compete with the performance of today’s centralised OSNs, but it does not trust centralised infrastructure to en- force security properties. Based on several socio-technical scenarios, I extract concrete technical problems to be solved and show how the existing research literature does not solve them. Addressing these problems fully would fundamentally change users’ interactions with OSNs, providing real control over online sharing. I also demonstrate that today’s OSNs do not provide this control: both user data and the social graph are vulnerable to practical privacy attacks. Footlights’ storage substrate provides private, scalable, sharable storage using untrusted servers. Under realistic assumptions, the direct cost of operating this storage system is less than one US dollar per user-year.
    [Show full text]
  • Unix and Shell Programming
    UNIX AND SHELL PROGRAMMING OBJECTIVE: UNIX – Born in the dark and somber portals of Bell Labs, it was a dream that one man nurtured and cherished. Like a parent, he reared the infant with compassion and zeal. And as the fledgling grew and spread its wings, it caught the attention of the world. This chapter will explore through the basics of UNIX, along with certain commands which itself are categorized accordingly. The File System and Some File Handling Commands: The file system is one of the its simplest and it lets users not to access files not belonging to them, You will be learning about categorization of files, the significance of HOME directory, mkdir, rmdir, and absolute, relative path name. Kenneth T. Moras 8/21/2007 BRIEF HISTORY 1966 The Multiplexed Time Sharing and Computing System or MULTICS project was a joint attempt by General Electric (GE), AT&T Bell Labs and the Massachusetts Institute of Technology (MIT) at developing a stable multiuser operating system The aim is to create an operating system that could support a lot of simultaneous users (thousands!). Multics stands for Multiplexed Information and Computer service. Left Ken Thompson, Right Dennis Ritchie The people involved in the project at this time are Ken Thompson, Dennis Ritchie, Joseph Ossanna, Stuart Feldman, Doug McIIroy and Bob Morris. Although a very simple version of MULTICS could now run on a GE645 computer, it could only support 3 people and therefore the original goals of this operating system had not been met, the research and development is just so expensive and Bell Labs withdraws their sponsorship.
    [Show full text]