Contents | Zoom in | Zoom out For navigation instructions please click here Search Issue | Next Page NOVEMBER 2012

INVENTING PHP: RASMUS LERDORF, P. 6 VON NEUMANN’S PROGRAMS 65 YEARS LATER, P. 59 ______http://www.computer.org CHINA’S INDIGENOUS INNOVATION POLICY, P. 70

Contents | Zoom in | Zoom out For navigation instructions please click here Search Issue | Next Page qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

'LVFRYHUWKHODWHVWWLWOHVLQ&RPSXWHU6FLHQFHIURP:LOH\ ,QIRUPDWLRQ2YHUORDG 7KH'HDWKRIWKH,QWHUQHW &\EHU6HFXULW\ An International Challenge for Markus Jakobsson 3ROLF\*XLGHERRN Professional Engineers and Technical 9781118062418, Paperback, 392pp, Jennifer L. Bayuk, Jason Healey, Paul Communicators $69.95, July 2012, Wiley-IEEE Rohmeyer, Marcus H. Sachs, Jeffrey Computer Society Press Schmidt, Joseph Weiss Judith B. Strother, Jan M. Ulijn, Zohra Fazal Covering internet security, malware, 9781118027806, Hardcover, 288pp, phishing, and how to combat these $89.95, April 2012, Wiley 9781118230138, Paperback, 320pp, serious and growing issues on both desktop and smart $49.95, October 2012, Wiley-IEEE Drawing upon a wealth of experience from phone platforms, this book draws upon state-of-the- Press academia, industry, and government service, Cyber art research from industry and academia. The content Security Policy Guidebook details and dissects, This book covers the ever-increasing also describes proven countermeasures using real in simple language, current organizational cyber problem of information overload from both the world examples. Filled with accessible and informative security policy issues on a global scale--taking great professional and academic perspectives. Focusing on coverage, this resource will prove essential for care to educate readers on the history and current the needs of practicing engineers and professional students, professionals, and large corporations. approaches to the security of cyberspace. It includes communicators, it addresses the causes and costs thorough descriptions--as well as the pros and of information overload, along with strategies and cons--of a plethora of issues, and documents policy techniques for reducing and minimizing its negative 3UDFWLFDO'DWDEDVH alternatives for the sake of clarity with respect to effects. The theoretical framework of information policy alone. overload and ideas for future research are also 3URJUDPPLQJZLWK9LVXDO presented. The book brings together an international %DVLF1(7QG(GLWLRQ group of authors, providing a truly global point of view Ying Bai &RPSXWHU1HWZRUN6RIWZDUH on this important, rarely covered topic. 9781118162057, Paperback, 896pp, $99.95, June 2012, Wiley-IEEE Press DQG+DUGZDUH(QJLQHHULQJ Unlike most database programming ZLWK$SSOLFDWLRQV 5HOLDELOLW\DQG$YDLODELOLW\ books, which overwhelm readers Norman F. Schneidewind RI&ORXG&RPSXWLQJ with large amount of code, this book employs a new, 9781118037454, Hardcover, 608pp, Eric Bauer, Randee Adams more reader-friendly approach. Now in a new edition $135, March 2012, Wiley-IEEE Press 9781118177013, Hardcover, 352pp, updated with the latest tools and information, it lays Today’s computer-based systems $79.95, August 2012, Wiley-IEEE Press out to readers, in particular college students, how to are highly complex because they are develop professional and practical database programs comprised of network, software, and This book addresses IS/IT architects, in Visual Basic.NET environment by using Visual developers, program managers, hardware components. In addition to basic design Studio.NET Data Tools and Wizards related to ADO. considerations, the system design must include product managers, and quality NET 4.0. This new approach allows readers to learn managers who are considering or reliability, availability, and maintainability of simpler ways of database programming, and enables hardware and software. Written to assist practicing responsible for applications that students to build professional and practical database will be virtualized or deployed on a cloud. Topics engineers, advanced undergraduate students, and programming with greater efficiency. covered include reliability risks, meeting customer’s graduate students in designing networks, software, expectations, and how to maximize service availability and hardware, this book addresses all of these and reliability of virtualized and cloud-based topics in an integrated fashion. deployments. Working from first principles, this $GYDQFHG,QWHUQHW3URWRFROV book considers the impact on virtualization and 6HUYLFHVDQG$SSOLFDWLRQV cloud computing in terms of both what design for Eiji Oki, Roberto Rojas-Cessa, (QWHUSULVH6RIWZDUH reliability diligence is most appropriate, and how best Mallikarjun Tatipamula, Christian Vogt $UFKLWHFWXUHDQG'HVLJQ to leverage virtualization and cloud to best assure 9780470499030, Hardcover, 260pp, Entities, Services, and Resources market expectations. $99.95, April 2012, Wiley Dominic Duggan This book offers a comprehensive 9780470565452, Hardcover, 512pp, technical overview and survey of advanced $120, February 2012, Wiley-IEEE (QHUJ\(IÀFLHQW'LVWULEXWHG internet protocols, first providing a solid Computer Society Press introduction and going on to discuss internetworking &RPSXWLQJ6\VWHPV Providing guidelines and best technologies, architectures, and protocols. It shows Albert Y. Zomaya, Young Choon Lee practices for the use and applications application of the concepts in next generation networks 9780470908754, Hardcover, 856pp, of SOA, this book covers the general and discusses protection and restoration, as well $130, August 2012, Wiley-IEEE implications of SOA, from low-level basic service as various tunneling protocols and applications. It Computer Society Press design to the broader field of service composition also informs readers of applicability of protocols in and process oriented SOA. It features synergy of low- One of the first books of its kind, this emerging technologies, such as wireless and optical. level technical and high-level systems engineering timely reference illustrates the need for and the state R&D managers, software and hardware engineers, perspectives; examples in Java Enterprise Edition of increasingly energy efficient distributed computing system engineers, and telecommunication/networking systems. Featuring the latest research findings on and Windows Concurrency Framework; and professionals will find this reference indispensable. emerging topics by well-known scientists, it explains emphasizes available tools such as Glassfish, how constraints on energy consumption creates a EMF and YAWL that students can use for hands-on suite of complex engineering problems that need to Content YOU Need. experimentation. It is intended as a textbook for be resolved in order to lead to greener distributed students in computer science, information systems, computing systems. Practitioners, postgraduate Wherever YOU Are. Instantly and systems engineering. students, postdocs, researchers, engineers and scientists working in high-performance computing Many Wiley titles are available digitally areas will find the insights in this work invaluable. for download onto your computer, laptop or mobile device.

9LVLWZZZZLOH\FRPIRUGHWDLOV______

Enter promotion code COM12 to receive 20% off these featured titles at checkout. ORDER INFORMATION  #:=?481=5/-G  59&1>?:2+:=70G!:3:9?:BBB B571D /:8 ______

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Editor in Chief Associate Editor in Chief, Computing Practices Multimedia Editor Ron Vetter Research Features Rohit Kapur Charles R. Severance University of North Carolina Kathleen Swigger [email protected] Wilmington University of North Texas [email protected][email protected][email protected]______2012 IEEE Computer Perspectives Society President Associate Editor Associate Editor in Chief, Bob Colwell John W. Walz in Chief Special Issues [email protected][email protected]______Sumi Helal Bill N. Schilit University of Florida Google [email protected][email protected]______

Area Editors Jean-Marc Jézéquel Security Publications Board Computer Architectures University of Rennes Jeffrey M. Voas Thomas M. Conte (chair), David H. Albonesi David M. Weiss NIST Alain April, David Bader, Cornell University Iowa State University Social Computing Angela R. Burgess, Greg Tom Conte John Riedl Byrd, Jim Cortada, Georgia Tech Column Editors University of Minnesota Koen De Bosschere, Hakan Steven K. Reinhardt Computing Conversations Software Technologies Erdogmus, Frank E. Ferrante, AMD Charles R. Severance Mike Hinchey Jean-Luc Gaudiot, Linda I. Greg Byrd University of Michigan Lero—the Irish Software Shafer, Per Stenström, North Carolina State University Discovery Analytics Engineering Research Centre George Thiruvathukal Graphics and Multimedia Naren Ramakrishnan 32 & 16 Years Ago Oliver Bimber Virginia Tech Neville Holmes Magazine Operations Johannes Kepler University Linz Education University of Tasmania Committee High-Performance Computing Ann E.K. Sobel Jean-Luc Gaudiot (chair), Vladimir Getov Miami University Advisory Panel Erik R. Altman, Isabel Beichl, University of Westminster Entertainment Computing Carl K. Chang Nigel Davies, Lars Heide, Information and Kelvin Sung Editor in Chief Emeritus Simon Liu, Dejan Milojicic, Data Management University of Washington, Bothell Iowa State University Michael Rabinovich, Naren Ramakrishnan Forward Slash Jean Bacon Forrest Shull, John Smith, Virginia Tech David A. Grier University of Cambridge Gabriel Taubin, Ron Vetter, Internet Computing George Washington University Hal Berghel John Viega, Fei-Yue Wang Simon Shim Green IT University of Nevada, Las Vegas San Jose State University Kirk W. Cameron Doris L. Carver Multimedia Virginia Tech Louisiana State University Savitha Srinivasan Identity Sciences Rick Mathieu IBM Almaden Research Center Karl Ricanek James Madison University Networking University of North Carolina, Naren Ramakrishnan Ahmed Helmy Wilmington Virginia Tech University of Florida In Development Theresa-Marie Rhyne Ying-Dar Lin Chris Huntley Consultant National Chiao Tung University Fairfield University Alf Weaver Security and Privacy Invisible Computing University of Virginia Rolf Oppliger Albrecht Schmidt eSECURITY Technologies University of Stuttgart Software Out of Band Renée Bryce Hal Berghel University of North Texas University of Nevada, Las Vegas Robert B. France Colorado State University

Editorial Staff Contributing Editors Design and Production Administrative Manager, Judith Prow Camber Agrelius Larry Bauer Staff Editorial Services Managing Editor Christine Anthony Design Products and Jennifer Stout [email protected]______Lee Garber Olga D’Astoli Services Director Senior Business Chris Nelson Bob Ward Cover Design Evan Butterfield Development Manager Senior Editor Staff Multimedia Kate Wojogbe Senior Manager, Sandy Brown Editors Jennie Zhu Editorial Services Senior Advertising Brian Brannon Lars Jentsch Coordinator Ben Jones Marian Anderson

Circulation: Computer (ISSN 0018-9162) is published monthly by the IEEE Computer Society. IEEE Headquarters, Three Park Avenue, 17th Floor, New York, NY 10016-5997; IEEE Computer Society Publications Office, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720-1314; voice +1 714 821 8380; fax +1 714 821 4010; IEEE Computer Society Headquarters, 2001 L Street NW, Suite 700, Washington, DC 20036. IEEE Computer Society membership includes $19 for a subscription to Computer magazine. Nonmember subscription rate available upon request. Single-copy prices: members $20; nonmembers $99. Postmaster: Send undelivered copies and address changes to Computer, IEEE Membership Processing Dept., 445 Hoes Lane, Piscataway, NJ 08855. Periodicals Postage Paid at New York, New York, and at additional mailing offices. Canadian GST #125634188. Canada Post Corporation (Canadian distribution) publications mail agreement number 40013885. Return undeliverable Canadian addresses to PO Box 122, Niagara Falls, ON L2E 6S8 Canada. Printed in USA. Editorial: Unless otherwise stated, bylined articles, as well as product and service descriptions, reflect the author’s or firm’s opinion. Inclusion in Computer does not necessarily constitute endorsement by the IEEE or the Computer Society. All submissions are subject to editing for style, clarity, and space.

NOVEMBER 2012 1

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® Computer Computer Computer Computer CONTENTS Digital Library at www.computer.org/csdl.Digital Library Society Computer the visit topics, computing on information more For New Means to Safely Handle New to Handle Means Safely Health Data? Health Records COVER FEATURES Box: Integrating Patient Data in Healthcare Networks The HHS Perspective 34 22 24 27 rvosPg otns omi omot|FotCvr|Sac su etPage Issue | Next Cover | Search out | Front in | Zoom Page | Contents Zoom Previous | rvosPg otns omi omot|FotCvr|Sac su etPage Issue | Next Cover | Search out | Front in | Zoom Page | Contents Zoom Previous | document sources and electronic health records records health sources and electronic document An innovative deployment concept decouples and Hannes Restel Raik Kuhlisch, Ben Kraufmann, a Records in Case Electronic for PHR designers. considerations important areparticularly issues security and efficiency, privacy but healthcare quality, data improving patient andfostering costs, healthcare lessening while data health offera way records tomanage health Personal Fernández Alemán, and Ambrosio Toval Inmaculada Carrión Señor, José Luis Personal Health Records: healthcare. intheir role to anactive take patients information and,ultimately, empowering accesstheir providers, allowing better to that and to patients information accurate health and complete deliver can records health Electronic Doug Fridsma Electronic Health Records: protections. security offering and privacy patient maintaining while parties healthcare-related among information ofhealth exchange the enable which records, health thetransition to electronic support way that areunder ofprojects A multitude Sobel Ann E.K. MoveThe Toward Electronic GUEST EDITOR’S INTRODUCTION www.computer.org/computer PERSPECTIVES structure: NIST Perspective NIST structure: care Information Infra- Programs 65 Years Programs Later of Giants: Von Neumann’s Records at Cloud Scale 50 59 42 among physicians, institutions, and individuals. and institutions, physicians, among information healthcare to sharingofprivate the pertaining problems interesting and new that poses endeavor with an aggressive timeline of milestones anambitious records, health transition to electronic T ISSUE THIS ABOUT that are under way the tomandatory support coverhe featuresinthis projects issue describe Testing the Nation’s Health- Debugging on the Shoulders on Shoulders the Debugging healthcare network healthcare into aregional platform anEHR integrating of task cumbersome inthe use for platform secure yet seamless, touse, aneasy to provide within a healthcare system. ahealthcare within less sharing of EHRsamong stakeholders seam- and secure the facilitates and records health ofelectronic centric management applications enables broader use of patient- ofhealthcare delivery low-cost large-scale, for platform cloud-based open, An experimental andJaap Ram Swaminathan Suermondt, Rolia,Sharad Singhal, James Pruyne,Jerry Li, Jun Karp, H. Alan Sujoy Basu, Healthcare Fusion: Managing team more than 50 years ago. than50 years team more his and byvon Neumann allforeseen —truths programming automatic design,and set tion instruc- effects, side architecture, computer about truths reveals time-tested machine IAS the for wrote von Neumann John programs the executed and thatexamined A study Skrien Dale Fagin and Barry enterprise. healthcare acrossthe tion ofinforma- exchange seamless facilitate will by developing test tools and techniques that infrastructure information healthcare grated nology is enabling the development of an inte- Tech- and ofStandards Institute National The Roberts Kathleen and Lide, Bettijoyce D. Brady,Kevin Ram Sriram, q q THE WORLD’S NEWSSTAND THE WORLD’SNEWSSTAND q q q q M M M M M M q q

m gs Qma gs Qma q q M M

M M MULTIMEDIA ® ® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Flagship Publication of the IEEE IEEE Computer Society: http://computer.org Computer: http://computer.org/computer Computer Society [email protected]______IEEE Computer Society Publications Office: +1 714 821 8380 November 2012, Volume 45, Number 11

RESEARCH FEATURE 87 Identity Sciences Biometric Authentication: System Security and User 70 China’s Indigenous Innova- Privacy tion Policy: Impact on Anil K. Jain and Karthik Nandakumar Multinational R&D Jason Dedrick, Jian Tang, and 93 Social Computing Kenneth L. Kraemer Customer Service 2.0: Where Social Computing Meets Multinational corporations seeking access to Customer Relations China’s burgeoning consumer markets and Frank Bi and Joseph A. Konstan human resources are establishing R&D centers in the country and developing ways 120 Forward Slash to thread a path through its complex Love the Show! innovation policies. David Alan Grier and Erin Dian Dumbacher COLUMNS NEWS 6 Computing Conversations 14 Technology News Inventing PHP: Rasmus Lerdorf Big Iron Moves Toward Exascale Computing Charles Severance Neal Leavitt 8 Computing and the Law 18 News Briefs A Brief Overview of the America Invents Act Lee Garber Brian M. Gaff, Ralph A. Loren, and Amy M. DeCloux MEMBERSHIP NEWS 12 32 & 16 Years Ago 96 IEEE Computer Society Connection Computer, November 1980 and 1996 99 Call and Calendar Neville Holmes DEPARTMENTS 79 Green IT 4 Elsewhere in the CS Sustainable IT: Challenges, Postures, 69 Computer Society Information and Outcomes 102 Career Opportunities Edward Curry, Bill Guyon, Charles Sheridan, and Brian Donnellan See www.computer.org/computer- multimedia____ for multimedia content 82 Out of Band related to the features in this issue. Strafor or Stratagainst Hal Berghel We welcome your letters. Send them to [email protected].______Letters are subject to editing for style, clarity, and length.

Reuse Rights and Reprint Permissions: Educational or personal use of this material is permitted without fee, provided such use: 1) is not made for profit; 2) includes this notice and a full citation to the original work on the first page of the copy; and 3) does not imply IEEE endorsement of any third-party products or services. Authors and their companies are permitted to post the accepted version of their IEEE-copyrighted material on their own Web servers without permission, provided that the IEEE copyright notice and a full citation to the original work appear on the first screen of the posted copy. An accepted manuscript is a version which has been revised by the author to incorporate review suggestions, but not the published version with copyediting, proofreading and formatting added by IEEE. For more information, please go to: http://___ www.ieee.org/publications_standards/publications/rights/paperversionpolicy.html.______Permission to reprint/republish this material for commercial, advertising, or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to the IEEE Intellectual Property Rights Office, 445 Hoes Lane, Piscataway, NJ 08854-4141 or [email protected].______Copyright © 2012 IEEE. All rights reserved. Abstracting and Library Use: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy for private use of patrons, provided the per-copy fee indicated in the code at the bottom of the first page is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. IEEE prohibits discrimination, harassment, and bullying. For more information, visit www.ieee.org/ ____ web/aboutus/whatis/policies/p9-26.html.______

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

ELSEWHERE IN THE CS

Computer Highlights Society Magazines

he IEEE Computer Society’s lineup of 12 peer-reviewed technical magazines cover cutting-edge topics in computing, including “Understanding Long-Term Earthquake Behavior through T scientific applications, Internet computing, Earthquake Simulation” is the lead article in CiSE’s machine intelligence, pervasive computing, security and September/October special issue on computational privacy, digital graphics, and computer history. Select arti- earthquake science. Authors Eric M. Heien and Michael cles from recent issues of Computer Society magazines are Sachs of the University of California, Davis, describe the highlighted below. Virtual California simulation code, which consists of three major components: a fault model (the only part of the system that’s California-specific), a set of quasistatic interactions, and an event model. It’s one of several Hewlett-Packard introduced its HP-65 programmable topologically realistic, system-level fault code collections pocket calculator in January 1974, advertising it as a that researchers using to construct ensemble earthquake “personal computer,” in what computing historian Paul forecasts similar to those used in weather and climate Ceruzzi thought might be the first use of the term in studies. print. A feature article in Annals’ July-September issue, “Once upon a Pocket: Programmable Calculators from the Late 1970s and Early 1980s and the Social Networks around Them,” traces the evolution of these devices as In the July/August issue of IS, “High-Frequency Trading: well as the user communities that grew up around them The Faster, the Better?” looks at computerized HFT as a and their influences on later PC markets and software culprit in the 998-point drop in the Dow Jones Industrial development. Average of major US stock prices that occurred between 2:31 and 2:51 p.m. on 6 May 2010. “This drop, subsequently known as the Flash Crash,” writes author Rahul Savani of the University of Liverpool, “caused a temporary loss of CG&A introduces a new department, “Spatial Interfaces,” more than US$1 trillion in market value, with some major in its September/October issue. In the first installment, stocks briefly falling to $.01 per share.” Although prices researchers from the MIT Media Lab and University quickly rebounded in the following days, Savani reviews of British Columbia review emerging technologies new evidence that HFT trades not only caused the Flash that significantly enhance glasses-free 3D display. In Crash but might also be disrupting genuine economic “Compressive Light Field Displays,” the researchers trading. He also considers options for regulating them and describe their work on a 3D output device that emits the role of agent-based modeling. compressed representations of light fields, which are then decoded by integration in the human eye. “We’re inspired by the promise that future generations of compressive displays will approach the realism of the “Priming for Better Performance in Microtask Crowd- physical world with technology that’s available today,” sourcing Environments” is the lead article in IC’s September/ they conclude. October theme on crowdsourcing. Authors Robert R. Morris

4 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 © 2012 IEEE

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

of MIT, Mira Dontcheva of Adobe Advanced Technology and transportation data. Researchers from Microsoft, Labs, and Elizabeth M. Gerber of Northwestern University AccuSpec Electronics, and the University of Washington describe two experiments in which they used the present results from a two-month user study that achieved psychological technique of affective priming to improve 3 to 20 percent reductions in home energy use among quality in paid crowdsourcing tasks. “We have the power participants who were already low-consuming energy users. to build on many years of cognitive science research,” they conclude, “and make interfaces and systems that leverage our innate human abilities and empower us to be more creative, productive, and successful.” S&P’s September/October issue is a special theme on e-voting security, guest edited by Michael Shamos of Carnegie Mellon University and Alec Yasinsac of the University of South Alabama. They introduce two articles IT Pro’s September/October issue is a special theme on that focus on algorithms that can provide inherent voting mobile and wireless technologies. “Analysts predict that by integrity and two that look at post-voting period audits. The 2016, there will be 10 billion connected mobile devices in issue also includes a roundtable discussion, “Electronic use globally, and smartphone traffi c will be 50 times what Voting Security 10 Years after the Help America Vote Act,” it is today,” write the guest editors, led by Irena Bojanova featuring Merle S. King, executive director of the Center for of the University of Maryland University College, in their Election Systems at Kennesaw State University, and Brian introduction. They present fi ve articles addressing issues Hancock, director of voting system testing and certifi cation that this connectivity raises, including mobile data service at the US Election Assistance Commission. deployments, mobile data security and privacy, and upcoming 4G networks.

Software’s November/December issue is a special theme, “Technical Debt: From Metaphor to Theory and Practice.” “Helix: Making the Extraction of Thread-Level Parallelism Guest editors Philippe Krichten of the University of British Mainstream” is the lead article in Micro’s July/August Columbia and Robert L. Nord and Ipek Ozkaya of the theme issue on parallelizing sequential code. Researchers Software Engineering Institute introduce the concept of from Harvard University and the University of Cambridge technical debt and its original description—“not quite describe their work on the Helix prototype compiler, right code which we postpone making it right”—through which extracts thread-level parallelism automatically from its place in leading software development schema to its sequential programs by transforming select loops into eventual dilution to “anything that adds to the friction parallel form. In evaluations using benchmarks from the from which software development endeavors suffer.” After SPEC CPU2000 suite on a real processor, Helix compared defining the term more precisely, they introduce four favorably to Doacross, the most similar historical approach articles to illustrate different perspectives on technical to loop parallelization. debt as well as a point/counterpoint column debating its merits in practice.

MultiMedia’s July-September theme issue on large- scale multimedia data collections opens with “The Community and the Cloud: Multimedia Benchmark Dataset Development.” On the basis of experience with the MediaEval Multimedia Benchmark, the authors present a specifi c example of crowdsourcing as a viable method for developing multimedia ground truth.

An article in PvC’s July-September issue, “GroupEnergyTable: An Interactive Tabletop for Energy Conservation,” describes a tool for supporting group exploration of home electricity

NOVEMBER 2012 5

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COMPUTING CONVERSATIONS VIDEO Inventing PHP: Rasmus Lerdorf Charles Severance University of Michigan

Unique among most of its peers, PHP wasn’t conceived as a pure programming language.

riginally conceived as an embraced by other Web developers, interested in the Web and solving the AUDIO HTML templating language, who continue to build on and improve Web problem from all around the Hypertext Preprocessor it. To watch the full interview with world. We all faced similar issues and O didn’t start its life as a pure Lerdorf, visit www.computer.org/ collaboratively we could build a tool programming language. Instead, computingconversations.______that solved our problem. That was Rasmus Lerdorf created PHP in 1994 really how PHP got off the ground. by collecting the code and utilities HUMBLE BEGINNINGS written in C that he was using to build In the Web’s early days, the devel- Because PHP was initially con- websites for various clients: oper community was small, so it ceived as a collection of library didn’t take long for Lerdorf’s col- utilities rather than as a new pro- I was living in Toronto and doing Web leagues to find out about his software gramming language, Lerdorf never application consulting for a number and start asking for copies for their felt the need to shape its future direc- of companies. I wrote the same code own clients: tion. He felt PHP would thrive if he over and over—basically, CGI [Common opened the code base to other people Gateway Interface] scripts written in C. I Other people started asking me how I and approaches: wrote code to handle forms, POST data, built these applications, and I said I was filtering, and other common Web things using this little tool I built. They asked I learned a bit along the way that, that you have to write in C when you’re if they could have it, and I said, “Sure, for this to grow, I had to give up con- writing CGI programs. It was kind of why not?” My toolkit wasn’t what I was trol of PHP—I had to let other people tedious and boring, so if I could reduce selling—I was selling my services of have some control. I couldn’t rewrite the amount of time I had to spend pro- solving problems, and the tool itself is patches, both because I’m lazy and it’s gramming, maximize the output, and irrelevant, really. It’s just my hammer. a lot of work and also to give people get to the solution quicker, then that was some ownership. Once they have full my goal with PHP. I put all my common After other programmers started control over their part of it, then they stuff into a C library, hacked it into the using it seriously, they found bugs, become much more invested in it and NCSA [National Center for Comput- fixed them, and sent him patches. passionate. It’s not just them contrib- ing Applications] webserver, and then Using these patches, he modified his uting to my project—it becomes our added a templating system on top of it utility library and templating engine project, and that really changed the to let me easily call into it. and improved the applications he was nature of PHP. This happened around building for his customers: 1997 or so, when I really delegated it The first version of PHP was simply out and gave people full access to the a productivity tool that enabled Ler- That’s when open source really hit me. source code repository that I was using. dorf to accelerate his development This was in 1994-1995 before the term across his multiple clients who needed “open source” existed. I got together Once Lerdorf allowed other people Web applications. PHP was quickly with a group of my peers, other people to become involved in PHP’s evolution,

6 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 © 2012 IEEE

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

he quickly built a large following the product. Lerdorf even leaves around the product: architectural decisions about PHP to the community: The Web grew, and PHP was at the right place at the right time. But also, It’s a meritocracy. Code speaks. If you it was very, very easy to get in and get write a patch or a piece of code to started using PHP and contributing to implement a feature, that says a lot. If it. Even today, it doesn’t take much to someone wants to disagree with that get a source code repository account way of doing things, or if they can offer in the PHP project. We have close to an alternative implementation, that’s 1,400 people with accounts, which a really good argument. If all they means those people can all commit to do is whine about it, that’s a really some part of the repository. Slightly bad argument, and chances are, the more than half the people have com- implementation will win even though mitted something in the last year and it might not be the best way of doing a half. things. If there’s code and it sort of works, that’s what we go with, and The only way to manage all those that has always been the default. It volunteers is to let them manage doesn’t always lead to consistency, but themselves. Within the PHP commu- it does lead to getting new features and nity, many small, dedicated groups actually being able to do something. Call work closely together and focus on Being able to connect to this type of for one aspect of PHP and collectively database even though it might not be own it. Lerdorf prefers to let passion- the best way of doing it, at least it gets Articles ate volunteers move forward, even if you there. That’s what PHP has always they make little mistakes that need to been about—solving a problem. We be fixed later after their contributions would rather have an ugly feature than IEEE Software seeks practical, are reviewed by more experienced not have a feature at all. readable articles that will appeal to members of the community. experts and nonexperts alike. The CROWDSOURCING hen I asked Lerdorf about magazine aims to deliver reliable, Through the PHP Extensions PHP’s future roadmap, his useful, leading-edge information Community Library (PECL), interested W answer was that it would groups of volunteers can incubate match the Web’s evolution. As the to software developers, engineers, an idea and then build interest in Web moves into new areas and and managers to help them stay their feature. Once a feature is in uses new technologies, PHP needs on top of rapid technology change. broad use, it can become part of the to make those new technologies core distribution, such as the JSON and approaches available to PHP Topics include requirements, extension in PHP 5.1: developers. There’s no master design, construction, tools, project plan except to be useful to people management, process improvement, That’s how new features eventually developing Web applications. maintenance, testing, education and creep in—they live outside of the core tree, get enough penetration Charles Severance,Computing training, quality, standards, and more. and enough people to install them, Conversations column editor and and then we see Linux distributions Computer’s multimedia editor, is Author guidelines: a clinical associate professor and pulling them into their core version of www.computer.org/software/author.htm teaches in the School of Information Further details: [email protected]______PHP. We look at what’s happening out at the University of Michigan. You can www.computer.org/software there, but there’s no real management follow him on Twitter @drchuck or of that either. contact him at [email protected].______

In many open source projects, an individual or small group controls Selected CS articles and columns the project’s architectural direction are available for free at to ensure consistency across http://ComputingNow.computer.org.

NOVEMBER 2012 7

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COMPUTING AND THE LAW AUDIO

A Brief Overview of the America Invents Act

Brian M. Gaff, Ralph A. Loren, and Amy M. DeCloux Edwards Wildman Palmer LLP

The eleventh in a series of articles providing basic information on legal issues facing people and businesses that operate in computing-related markets discusses the America Invents Act.

igned into law on 16 Sep- FIRST TO FILE a patent. If others independently con- tember 2011, the America Most parts of the AIA took effect ceived the invention and filed their Invents Act (AIA) made many one year after signing—on 16 Sep- patent applications after the person S significant changes to US tember 2012. However, the first-to-file who filed first, they will lose their patent law, including a transition to system will become effective on 16 ability to get a patent. a first-inventor-to-file system and the March 2013. While there are some very narrow institution of post-grant review, which Traditionally, US patents were exceptions to this, it’s important allows challenging a patent on any granted to those persons who to realize that this rule also holds grounds related to patentability within were the first to invent the subject even when a later filer conceived nine months of a patent’s issuance. matter that the patent covered. the invention before the first filer. In In our September 2012 column, we That meant that even if multiple other words, if a person who is first discussed the post-grant review pro- people independently conceived the to conceive an invention delays filing cedure and other methods the AIA invention, and each person applied a patent application, and a second provides to challenge patents (“Patent for a patent, the person who invented person later independently conceives Reform: New Tools for Challenging first was the one eligible to receive the the same invention and files an appli- Patent Validity as of September 2012,” patent. The US Patent Office used an cation right away, the first inventor pp. 9-11). In this month’s installment, administrative procedure—known as will likely be ineligible for a patent; we provide a brief overview of other an interference—to resolve disputes the second inventor will win. aspects of the AIA. over who was the first to invent. One aspect of US patent law limits Be sure to check the IEEE Com- That will all change for many this rule’s rigidity: the one-year grace puter Society’s website for the podcast patent applications filed on or after period after public disclosure for an that accompanies this article (www.____ 16 March 2013. For those applications, inventor to file an application. This computer.org/portal/web/computing the inventor who was the first to file is allows an inventor to make a public now/computing-and-the-law).______deemed the true inventor eligible for disclosure about the invention and

8 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 © 2012 IEEE

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

delay filing an application for up to Their goal is to provide individuals which complicated litigation. The one year from the date of the disclo- or businesses accused of infringing AIA now prohibits joining unrelated sure. If that disclosure occurs and a patent with an avenue to challenge defendants in a single action for then someone else files a patent appli- that patent more quickly and at less patent infringement unless there cation on the same invention before cost compared to litigation in federal are common facts and the defen- the inventor has filed an application, court. Our September 2012 column in dants were involved together in the the inventor might be able to rely on Computer and the associated podcast same acts that caused the alleged the date of his earlier disclosure. This provide a full discussion of post-grant infringement. The fact that separate could allow the second filer to be eli- and inter partes review. defendants are accused of infringing gible for a patent. Be careful, though, Parties accused of patent infringe- the same patent isn’t a basis for bring- because the scope of the disclosure is ment now have a new defense that ing the defendants together in a single important to the scope of the patent. they can raise in court: prior com- lawsuit. Because the focus is now on the mercial use. If an accused infringer When a court determines that patent application filing date instead can show that he commercially used a party has infringed a patent, it of the date of the invention, the defi- what the patent covers at least one will typically consider whether nition of prior art has changed. Prior that infringement was willful. Will- art is preexisting information, such fully infringing a patent essentially as that disclosed in a printed publi- Because the focus is requires that the infringer knew or cation, that describes the invention. should have known that there was Public use or sale of the invention is now on the patent a high likelihood that its actions prior art as well. application filing date constituted infringement of a valid Before the AIA, prior art that pre- instead of the date patent. If a court determines that the dated the date of the invention could of the invention, the infringement was willful, then the prevent an inventor from obtaining a definition of prior art penalty that the infringer pays to patent. Now, the prior art need only the patent owner could be doubled be earlier than the application filing has changed. or tripled. date. The public use or sale of the Usually, an accused infringer will invention used to be limited to acts in get advice from a patent lawyer about the US; these acts in another country year before the earlier of the patent whether it is infringing a patent. The are now considered prior art as well. application filing date or the date the lawyer typically gives the advice in This makes more prior art available invention was disclosed, he might the form of an opinion—a written as roadblocks to getting a patent. prevail. Before the AIA, this defense document that analyzes the patent This first-to-file system is how was limited to patents that cover busi- at issue and the potentially infring- most patent offices outside the US ness methods. The AIA expanded the ing item. Before the AIA, the failure have operated. This change makes defense to allow its use with pat- to get such an opinion could be used the US patent system more similar to ents that cover “any subject matter to prove willful infringement. The AIA systems in other countries. However, consisting of a process, machine, prevents patent owners from raising inventors—and their employers— manufacture or composition of the lack of an opinion as a basis to need to recognize how important it matter used in a manufacturing or prove willful infringement. is to get their patent applications on other commercial process.” How- Other AIA-inspired changes to liti- file quickly, or at least consider the ever, an accused infringer can’t use gation include ending challenges to merits of making strategic disclosures this defense if an institute of higher patent validity based on a failure to to preserve their patent rights. education owns the patent. satisfy the Best Mode requirement, A typical occurrence before the which obligates an inventor to, at the EFFECTS ON PATENT AIA was the filing of patent infringe- time of filing a patent application, dis- LITIGATION ment lawsuits that had one plaintiff close the best way that he knows to The AIA will change how patent (the patent owner) and multiple— use, or practice, the invention. Also, litigation is conducted. In particular, sometimes dozens of—defendants the AIA modified the patent mark- the AIA provides two new mecha- (the accused infringers). Usually, ing requirements to allow virtual nisms for challenging the validity of there were no business or corporate marking of products with the patent patents: post-grant review and inter connections between the defendants; numbers that cover those products, partes review. These procedures are the only commonality was that the and bars litigation based on marking administrative, not judicial, and are plaintiff was accusing all of them products with the numbers of patents conducted in the US Patent Office. of infringement of the same patent, that have expired. The latter issue

NOVEMBER 2012 9

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COMPUTING AND THE LAW

was a source of hundreds of lawsuits ations in which multiple inventors Tax strategies from 2009 to 2011. independently conceived the same Inventions that relate to strategies Additional effects that the AIA will invention. Finding evidence of trans- for reducing, avoiding, or deferring have on litigation will likely become mission and use may be difficult in taxes aren’t patentable. However, apparent over time. The law has been practice. inventions that relate to preparing in force for only a short time. As law- and filing tax returns or are used suits are filed and progress through Preissuance submissions solely for financial management the courts, the law will become more Third parties can submit any ref- aren’t covered by this prohibition. fully defined and provide additional erence, such as a patent, published guidance to patent owners and others patent application, or other printed impacted by the changes to the law. publication, during the examination here are other parts of the AIA of a patent application for the patent that, as they come into force, OTHER ASPECTS OF THE AIA examiner to consider. The patent T will become clearer and for The AIA has some other provisions, office will include the reference in which the effects will be better under- including the following. the record of the examination. In stood. There are usually unintended contrast to the pre-AIA practice that consequences that result when large- Derivation proceedings limited the time for submitting refer- scale legislation is enacted. Time will Derivation proceedings, a mech- ences to two months following the tell the scope and severity of these anism that counterbalances the publication of patent application, the consequences, if any, that relate first-to-file system, are designed so AIA extends the time to the earlier of to the AIA. Until then, inventors, that the first (true) inventor can chal- (i) the date a notice of allowance is patent applicants, and patent owners lenge the first applicant’s right to given or mailed in the application, should stay in close contact with their a patent by demonstrating that the or (ii) the later of either six months patent attorneys to keep abreast of first applicant is claiming an inven- after publication, or the date of the AIA-related matters and to consider tion derived from the true inventor. first rejection during the examination whether changes to their patent strat- With many limitations, derivation of the application. egies are warranted. proceedings can be conducted admin- istratively either in the US Patent Fees Brian M. Gaff is a senior member of IEEE and a partner at the Edwards Office or litigated conventionally in The AIA reduced certain fees for Wildman Palmer LLP law firm. Con- federal court. qualified small entities and intro- tact him at bgaff@edwardswildman.______The derivation proceedings con- duced a new class called micro com.___ cept isn’t new—only the procedure is entities. A micro entity is an appli- new. It’s triggered when both involved cant that qualifies as a small entity, Ralph A. Loren is a partner at parties file patent applications and hasn’t been named as an inventor the Edwards Wildman Palmer LLP at least one of the involved parties on more than four previously filed law firm. Contact him at rloren@______edwardswildman.com. charges that the other party derived patent applications, doesn’t have a the invention from it. However, only gross income exceeding three times Amy M. DeCloux is an associate at the party having the later effective the median household income for the the Edwards Wildman Palmer LLP filing date can initiate derivation pro- preceding calendar year, and hasn’t law firm. Contact her at adecloux@______ceedings. Further, the claims in the transferred ownership interest in the edwardswildman.com. competing patents or patent applica- application to another entity exceed- tions must not be patentably distinct. ing the income limit. Institutes of The content of this article is It could be challenging for the first higher education are included in the intended to provide accurate inventor to prevail over the first appli- definition of micro entities, but this and authoritative information cant in derivation proceedings. As the definition is subject to further regula- with regard to the subject matter term implies, the focus is on whether tions to be prescribed. covered. It is offered with the the first applicant derived the inven- understanding that neither IEEE tion from the first inventor. Therefore, Filing by assignee nor the IEEE Computer Society the first inventor might need to pro- The AIA allows assignees of inven- is engaged in rendering legal, accounting, or other professional vide evidence that important details tions such as employers of inventors services or advice. If legal advice or of his invention were transmitted to to file patent applications. This will other expert assistance is required, the first applicant and that the first facilitate filing when the inventor the services of a competent profes- applicant used them to file a patent won’t cooperate, can’t be found, or is sional person should be sought. application. This contrasts with situ- incapacitated.

10 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Instant Access to IEEE Publications

Enhance your IEEE print subscription with “IEEE is the umbrella that online access to the IEEE Xplore® digital library. allows us all to stay current with technology trends.”

Q Download papers the day they are published Dr. Mathukumalli Vidyasagar Head, Bioengineering Dept. Q Discover related content in IEEE Xplore University of Texas, Dallas

Q Signifi cant savings over print with an online institutional subscription

Start today to maximize your research potential.

Contact: [email protected]______www.ieee.org/digitalsubscriptions

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

32 & 16 YEARS AGO

NOVEMBER 1980 BUSINESS www.computer.org/csdl/mags/co/1980/11/index.html COMPUTING (p. 84) “In SPECIAL MESSAGE (p. 7) “... With the advent of computer spite of the engineering departments at the universities and the growth advances of software engineering, the institute should encourage made in the maximum participation in this exciting new area. Now past 33 years, might be the time to consider changing the name of the business institute from the Institute of Electrical and Electronics computing is Engineers to the Institute of Electrical and Computer far from being Engineers. In my opinion this would encourage increased a mature technology. participation of the computer professional in both the The advances to come in the next 33 years at the technical, Computer Society and the IEEE.” business, and social levels can reasonably be expected to match those achieved so far.” BALLISTIC COMPUTING (p. 37) “One of the world’s most complex undertakings in the past two decades has been SYSTEM PACKAGING (p. 100) “... As semiconductors in the US Army Ballistic Missile Defense Program. A critical electronic equipment go to VLSI ... a greater percentage part of the large research and development investment of total system cost will be in packaging, a greater in this program has been the effort to develop data percentage of total design and manufacturing delay will processing hardware and software technologies to meet be in packaging, and a greater percentage of the cost of the computational challenges of this incredibly complex testing solutions will be affected by packaging technology. problem. The demands for a computing system that will For these reasons, the system packaging engineer will deliver a throughput of hundreds of millions of instructions most certainly be needed to ensure system manufacture per second at some undetermined point in its life cycle, at reasonable cost.” with a high confidence that correct execution will occur, challenge even the most advanced technologists.” WHISTLE BLOWING (p. 104) “I am occasionally consulted by junior employees concerning ‘whistle blowing’— SUPER DATA FLOW (pp. 48-49) “Data flow architectures whether the employee, or ‘a friend of his,’ should tell offer a possible solution to the problem of efficiently management about another employee’s illegal, unethical, exploiting concurrency of computation on a large scale, or dishonest action. Responding to such an inquiry is and they are compatible with modern concepts of program not easy—a company’s high principles are not always structure. Therefore, they should not suffer so much from universally respected by management in practice and the difficulties of programming that have hampered other often the farther down in the management chain one approaches to highly parallel computation.” goes, the greater the divergence between principles and practice. Consequently, I was delighted to discover an DISTRIBUTED TASKS (p. 57) “... Distributed processing article on the dangers of whistle blowing to which I now applications range from large data base installations can refer inquirers …” where processing load is distributed for organizational efficiency to high-speed signal processing systems where COMPUTERS AND GOVERNMENT (p. 121) “Definition of extremely fast processing must be performed in a real- government’s role is the key to the effective implementation time environment. But, like any new concept, distributed of information technology, but [Simon] Ramo sees five processing has problems which must be solved before it obstacles to the crystallization of that definition: (1) the can become part of the accepted processing repertoire of government is fragmented, (2) it is subject to short-range system designers.” pressures, (3) bureaucracy is not well-suited to solving complex problems, (4) government tends to be equivocal VECTOR COMPUTERS (p. 82) “Improvements in the second and unclear, and (5) it has trouble attracting and retaining generation of vector supercomputers include such hardware experts in this difficult-to-comprehend technology.” features as extensive use of LSI memory chip technology, improved memory management to enhance throughput OFFICE COMPUTERS (p. 122) “Office procedures will performance, better designs to link and chain execution change considerably through the 1980s in response strings within the CPU, and much higher effective-speed to technological evolution. Four new market research I/O operations integrated into the architecture. Improved reports measure the impact of voice-activated typewriters, software items are a result of both better-working hardware advanced imager/processors, falling disk drive costs, and and better compilers. …” shifting DP maintenance cost policies.”

12 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 © 2012 IEEE

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

NOVEMBER 1996 shared-memory multiprocessor systems. Our task was www.computer.org/csdl/mags/co/1996/11/index.html to validate that multiple Pentium Pro processors and the 82450GX chipset would function correctly and perform as TIME SHARING (p. 6) “One programming language, JOSS specified in such systems.” (Johnniac Open Shop System), does have a specific birth date—November 7, 1960. JOSS was developed by J.C. ENGINEERED TESTING (p. 61) “Software-reliability- (Cliff) Shaw at Rand Corporation to give users a hands-on engineered testing combines the use of quantitative connection to a computer at a time when operating systems reliability objectives and operational profiles (profiles of had become the major management tool of computing system use). The operational profiles guide developers in center directors to speed up program turnaround and testing more realistically, which makes it possible to track eliminate programmers’ direct use of the console. JOSS the reliability actually being achieved.” allowed 12 (apparently) simultaneous users on a machine, preceding by a year Fernando Corbató’s invention of RELIABILITY PREDICTION (p. 69) “Critical business time-sharing.” applications require reliable software, but developing reliable software is one of the most difficult problems SECURITY (p. 8) “The CERT Coordination Center’s collection facing the software industry. After the software is shipped, of software vulnerability data provides empirical evidence software vendors receive customer feedback about that vendors continue to release software containing software reliability. However, by then it is too late; software essentially the same classes of security flaws, repeatedly, vendors need to know whether their products are reliable year after year. …” before they are delivered to customers. Software reliability growth models help provide that information. …” SURVIVAL (p. 10) “Tools that solve general problems efficiently live forever. We still compute with transistorized MEASURING QUALITY (pp. 78-79) “… The traditional binary logic circuits, and we will be doing so 20 years algorithms and metrics from the hard engineering hence. Consequently, back-end software will be written in disciplines either come up short when applied to software C 20 years hence because C can efficiently map a general or are easily misapplied. Software engineering is a class of procedural algebraic problems onto transistorized discipline that is largely nonparametric and resistant to binary logic circuits.” traditional modes of analysis. Unquestionably, we need common methods of determining the business value of THE TELECOMMUNICATIONS ACT (p. 16) “… it is unclear software. We must also generate and promote the human what the Telecommunications Act’s long-term effects will factors and activity statistics necessary to manage and be and whether the law will fulfill its promise. And under steer software development.” any circumstances, it looks as though consumers should not look for the large-scale development, introduction, and ELECTRONIC TRANSACTIONS (p. 92) “Possibly in reaction deployment of new technologies in the near future. to the Netscape-MasterCard alliance, Microsoft and Visa “This will be the case partially because many began to develop a competing electronic transaction telecommunications companies will be busy in the standard, the Secure Transaction Technology. Later, near future pursuing lawsuits, looking for partners, Netscape and MasterCard accused Visa and Microsoft of and figuring out what they need to do to cope with the planning to charge a royalty for each use of their standard. Telecommunications Act.” Eventually the differences were resolved, and in February MasterCard and Visa agreed to support a royalty-free PROGRAM ERROR (p. 20) “An inquiry has revealed that standard called Secure Electronic Transactions.” a software design error and insufficient software testing caused an explosion that ended the maiden flight of the THE VIRTUAL UNIVERSITY (p. 95) “Following the Monterey European Space Agency’s Ariane 5 rocket less than 40 conference, a group of higher education network leaders seconds after liftoff on June 4, 1996.” reviewed the technical requirements for the virtual university and for today’s research community. They Y2K (p. 21) “The US government says it may have to spend determined that by the year 2000, higher education will up to $30 billion to make sure its computers can cope with require an advanced, open, internetworking fabric …” the Year 2000 problem. Others think the cost could run even higher.”

Editor: Neville Holmes; [email protected]______THE PENTIUM PRO (p. 47) “Intel designed the Pentium Pro processor to be used gluelessly (without extra chips) in

NOVEMBER 2012 13

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

TECHNOLOGY NEWS

Big Iron Moves Toward Exascale Computing Neal Leavitt

Developers and researchers face many challenges in trying to produce exascale supercomputers, which would perform a thousand times faster than today’s most powerful systems.

upercomputing is entering a in the US Lawrence Berkeley National use supercomputers. “As always,” new frontier: the exaflops era, Laboratory’s Computing Research explained Intel Labs Fellow Shekhar in which high-performance Division. Borkar, “the technology will trickle machines could run a thou- “While transistor density on silicon down to mainstream computing.” Ssand times faster than today’s is projected to increase with Moore’s However, building exascale petaflops systems. law, the energy efficiency of silicon machines faces some significant Some experts say that some- is not,” he noted. “Power [consump- challenges. one could build an exaflops tion] has rapidly become the leading machine—capable of performing design constraint for future high- BACKGROUND 1018 floating-point operations per performance systems.” University of Illinois at Urbana- second—by the end of this decade. Thus, said Dittmer, software devel- Champaign researchers started More speed would be welcome, opers will have to optimize code for building supercomputers in the early as supercomputing is used in many power efficiency rather than just 1950s and parallel supercomputers in areas—including nuclear-weapon performance. the early 1960s. testing simulations, analyzing the Researchers are also looking into Seymour Cray, who founded geologies of various areas for possible a number of disruptive hardware Cray Research—the forerunner of oil deposits, astronomy, astrophysics, technologies that could dramatically today’s Cray Inc.—in the 1970s, is financial services, life sciences, and increase efficiency, including new considered the father of commercial climate modeling—that could benefit types of memory, silicon photonics, supercomputing. from higher performance. stacked-chip architectures, and com- Early supercomputers were “This will necessitate new hard- putational accelerators, explained designed like mainframes but adapted ware and software paradigms,” said Dimitrios S. Nikolopoulos, professor for higher speed. Arend Dittmer, director of product and director of research at Queen’s In the 1980s, the next wave of HPC marketing for Penguin Computing, a University Belfast. machines used custom processors. high-performance computing (HPC) The US, China, Japan, the European During the 1990s, general-purpose services provider. Union, and Russia are each investing commercial processors began offer- But for the first time in decades, billions of dollars in supercomputer ing good performance, low prices, and computing-technology advances research. reduced development costs, which might be threatened, said John Shalf, Achieving HPC improvements made them attractive for use in super- Computer Science Department head could even help those who don’t computers, said Stanford University

14 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 © 2012 IEEE

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Table 1. World’s fastest supercomputers as ranked by Top500 (www.top500.org), June 2012.

Maximum throughput Power Rank Site Manufacturer Computer Country Cores (petaflops) (megawatts)

1 US Lawrence Livermore IBM Sequoia USA 1,572,864 16.30 7.89 National Laboratory 2 RIKEN Advanced Institute for Fujitsu K computer Japan 795,024 10.50 12.66 Computational Science 3 US Argonne National IBM Mira USA 786,432 8.16 3.95 Laboratory 4 Leibniz Rechenzentrum IBM SuperMUC Germany 147,456 2.90 3.52 5 National Supercomputer National University of Tianhe-1A China 186,368 2.57 4.04 Center in Tianjin Defense Technology 6 US Oak Ridge National Cray Jaguar USA 298,592 1.94 5.14 Laboratory 7 CINECA IBM Fermi Italy 163,840 1.73 0.82 8 Forschungszentrum Juelich IBM JuQUEEN Germany 131,072 1.38 0.66 9 Commissariat a l’Energie Bull Curie thin France 77,184 1.36 2.25 Atomique nodes 10 National Supercomputing Dawning Nebulae China 120,640 1.27 2.58 Center in Shenzhen

Source: Professor Jack Dongarra, University of Tennessee, Top500 project

professor William Dally, who is also “All are far more complex to solve BlueGene/Q HPC line and performs chief scientist and senior vice presi- than what has been done in the past, 16.3 Pflops. dent of research at GPU maker Nvidia. and it’s only now, with petascale The Top500 project, in which sev- The first machine to break the going to exascale, that we can begin eral academic and research experts petaflops barrier was IBM’s Roadrun- to solve these in less than a lifetime,” rank the world’s nondistributed super- ner in 2008. he explained. computer systems, placed Sequoia at Getting to exascale computing is the top of its list in its recent semi- critical for numerous reasons. Faster TOMORROW’S BIG IRON annual report, as Table 1 shows. supercomputers could conduct calcu- While some aspects of Ranking second was Fujitsu’s K com- lations that have been beyond reach supercomputing—such as the puter, which performs 10.5 Pflops. because of insufficient performance, traditional forms of security it uses— Sequoia, which runs Linux and is noted IBM Research director of com- are unlikely to change to enable primarily water cooled, consists of puting systems Michael Rosenfield. exascale computing, others will. 96 racks, 98,304 16-core compute Another issue is that many com- For example, developers are nodes, 1.6 million total cores, and 1.6 plex problems have a large number placing processing engines inside petabytes of RAM. of parameters. The only way to deal memory, rather than outside, Despite being so powerful, the with such problems is to simultane- to overcome the bottlenecks of system at peak speeds is 90 times ously run multiple sets of calculations today’s memory-to-processor more energy efficient than ASC using different combinations of connections. They are also working Purple and eight times more than parameters, which requires tremen- with alternate programming Blue Gene/L, two other very fast IBM dous computational resources. languages that optimize, enhance, supercomputers. Bill Kramer, deputy director for and simplify parallelism, as the National Center for Supercom- well as communications and Power consumption puting Applications’ (NCSA’s) Blue control approaches that improve Sequoia uses 7.89 megawatts at Waters petascale computing project, performance. peak performance. At that rate, a one- said research teams are working on exaflops machine would consume difficult problems in areas such as Fastest Supercomputer: 400 MW, about one-fifth of Hoover solar science, astrophysics, astron- IBM’s Sequoia Dam’s entire generation capacity, said omy, chemistry, material science, Sequoia, an IBM supercomputer at Nathan Brookwood, research fellow medicine, social networks, and neu- the US Lawrence Livermore National with semiconductor consultancy tron physics. Laboratory, is part of the company’s Insight 64.

NOVEMBER 2012 15

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

TECHNOLOGY NEWS

Without improvements, an exa- Processing teristics can be complex and time scale computer “might need its own Processor performance will be a consuming. nuclear power plant or large hydro- key factor in exascale computing. And Investigating such matters is the electric dam,” said Carl Claunch, vice parallelism, created via multiple cores Heterogeneous System Architecture president and distinguished analyst on a chip working on different tasks (HSA) Foundation consortium of chip- with market research firm Gartner simultaneously, is driving processor- makers, academics, equipment man- Inc. performance improvements. ufacturers, software companies, and When an early Univac powered Future supercomputers will operating-system vendors. up in the 1950s, the lights dimmed have more cores per chip and each According to King-Smith, super- in the surrounding neighborhood, core will run many threads to hide computer developers will face a Brookwood noted. “Imagine the latency, according to Stanford’s Dally. challenge in balancing performance, impact of powering up a 400-MW There is an emerging consensus power, and chip size. supercomputer and watching the that future supercomputers will be Moreover, noted Dally, an exa- lights dim in the Southwest,” he heterogeneous multicore computers, scale machine will have to run over continued. “Future systems must with each processing chip having dif- a billion parallel threads at any time improve their performance per watt ferent types of cores specialized for to keep busy—many times more by a factor of 40 or more to deliver different tasks, he said. than today’s fastest computers—and exascale results within reasonable this will require new programming power envelopes.” approaches. The US Department of Energy Designers of exascale computers has set a goal that supercomputers There could be an could turn to 3D processors with use no more than 20 MW of power, exascale computer various layers of circuitry stacked on which would require radical re- by the end of this top of one another. Integrating a large designs of processors, interconnects, decade. processing system this way improves and memory, noted Alan Lee, vice memory access and performance, president of research and advanced added Dally. development for chipmaker AMD. However, this also creates chal- Supercomputer designers now For example, Dally explained, lenges for cooling and power routinely incorporate energy- the majority of the cores would be supply. For example, noted Georgia conserving features that turn off throughput-optimized to execute Institute of Technology assistant pro- idle elements within their chips parallelized work quickly and with fessor Richard Vuduc, heat builds up when possible. Modern chips, noted minimum energy consumption, as is between layers, making them harder Stanford’s Dally, use both power the case with GPUs. to cool. In addition, he said, the inter- gating—in which power to parts of A small number of cores would be layer connections are difficult to a chip is shut off—and clock gating— latency-optimized, like those in CPUs, design, and there are few tools for in which the power is left on but the for use in critical serial tasks. developing and testing 3D circuits. clock is turned off. For parallel tasks, said AMD’s Stacked DRAM placed close to the Lee, GPUs are more energy efficient Memory and interchip processor increases memory band- than CPUs because they use a single communications width while requiring significantly instruction to perform many opera- Two crucial limitations that less power to transfer data than cur- tions and because they run at lower exascale computing faces are the rent designs, he noted. voltages and frequencies. increasing speed disparity between Supercomputers could become Each type of processor provides a CPU and external memory, and the more energy efficient by using low- distinct advantages, said Tony King- relative slowdown in interconnect power memory and also components Smith, vice president of marketing support. that run at lower frequencies, as well for , which Processing speeds have increased as reducing the amount of data move- designs and licenses multimedia and exponentially, but the connecting ment, added Lee. communications semiconductor fabric and memory controllers are In the future, said University of cores. still working to keep up. California, San Diego (UCSD) pro- However, using different kinds of Introducing solutions such as data fessor Michael Taylor, using highly cores would not come without chal- compression, as well as optimizing specialized, low-speed application- lenges. For example, programming memory organization and usage by specific coprocessors could help multiple types of processors to take adding localized caches and thereby decrease energy consumption. advantage of their distinct charac- keeping more of the processing on

16 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

chip, would improve some memory- Thus, exascale systems might If exascale systems aren’t built and interconnect-related issues, said implement hybrid cooling systems and computing performance stalls King-Smith. using both liquid and air cooling, said at today’s levels, said the Lawrence Optical links and 3D chip stacking Cray’s Blake. Berkeley National Laboratory’s Shalf, could improve interchip communica- A current trend, noted IBM’s the information-technology industry tions and lower power consumption, Rosenfield, is to use room- will shift from a growth industry to but further research in this area is temperature water to efficiently a replacement industry, and future necessary, said the UCSD’s Taylor. conduct heat away from sensitive societal impacts of computing will be He predicted that optical connec- components without requiring water limited. tions will be built onto chips during chillers, which would increase energy the next few years. consumption. Neal Leavitt is president of Leavitt However, Stanford’s Dally noted, Communications (www.leavcom. com),___ a Fallbrook, California-based some major technical hurdles must ccording to Dally, the individ- international marketing communica- be cleared for this to happen, such as ual components of an exascale tions company with affiliate offices reducing the cost and power dissipa- Amachine could be reliable and in Brazil, France, Germany, Hong tion of optical links. have low failure rates, but combin- Kong, India, and the UK. He writes ing so many into one large computer frequently on technology topics and Internode networking increases the chance a failure will can be reached at [email protected].______Many supercomputers use high- occur somewhere. speed Ethernet for communication “Concerted government and indus- Editor: Lee Garber, Computer; between processing nodes. How- try investment and collaboration are [email protected]______ever, the technology’s deep router needed to overcome the challenges queues and tendency to occasionally [of exascale computing]. Leadership drop packets could create high and is necessary … as evidenced by sov- Selected CS articles and columns unpredictable latencies unsuitable for ereign strategic commitments to HPC are available for free at http://____ exascale computing. in Japan, China, Russia, and Europe,” ComputingNow.computer.org. Proprietary networking technolo- said IBM’s Rosenfield. gies like those used in Cray machines Added King-Smith, industry con- and other supercomputers have sortiums such as the Khronos Group lower-latency routers, topologies and the HSA Foundation should con- with fewer hops, and more efficient tinue pushing mainstream adoption buffer management, said Bill Blake, of technologies like heterogeneous Cray’s senior vice president and chief processing and GPU computation. technology officer. This approach In the past 20 years, US expendi- provides low internode latency and tures on HPC have steadily grown, high bandwidth. but it’s not certain that the country COMPUTING However, proprietary technologies will have the first practical exascale are expensive. system, noted the NCSA’s Kramer. THEN The technical challenges and uncer- Cooling tainties; the complexity of industrial, Supercomputers generate huge government, and national laboratory Learn about computing history amounts of heat. If the heat is partnerships; and budget problems and the people who shaped it. not either cooled or moved away might mean there won’t be the http://computingnow. from chips, connectors, and the focused US effort necessary for such machine’s many other heat-sensitive an expensive and technically chal- computer.org/ct components, they—and the entire lenging undertaking. system—will fail. Current plans for a US system In the past, supercomputers by 2018 are no longer likely to bear have used liquid cooling and/or fruit, and the country may not have air cooling via fans and heat sinks. an exascale machine until between Liquid cooling is highly effective, 2023 and 2025, Kramer said. “China, but it can be expensive and would Europe, even Russia may arrive at become much more so in exascale some type of exascale system first,” systems. he added.

NOVEMBER 2012 17

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

NEWS BRIEFS

Gaming Industry Threatened ability of cheap games that can be by Financial Problems accessed via downloads, largely to For years, gaming has been seen as smartphones, as opposed to more- a growth industry with a bright finan- costly games accessed via discs that cial future. Things have looked good must be played on relatively expen- for developers of both games and con- sive consoles. soles. However, the industry has now Experts also say that developers fallen upon hard times. have made creative mistakes in their In the lucrative US market, designs and that the big gaming com- computer-game sales dropped 8 per- panies have failed to come up with cent in 2011 to about $17 billion, and enough blockbuster products. have fallen another 20 percent through In addition, there hasn’t been a any surface. This technology could August of 2012. According to the new console on the market for about provide portable power to many Gamasutra website (www.gamasutra. six years, which has limited the buzz devices that have trouble accommo- com),___ which covers the gaming indus- surrounding gaming. Nintendo plans dating a traditional battery. try, US sales have declined each year to release its Wii U controller in mid- The new spray-on lithium-ion bat- since reaching a record $22 billion in November, in time for the holiday tery is applied via layers of paint. Each 2008. Gamasutra said totals in 2012 shopping season. layer contains a necessary element could reach about $18 billion if there However, some observers predict of a conventional battery, including is a “miracle” turnaround the rest of that the traditional sale of games on current collectors, a cathode, an this year, $15 billion if sales don’t pick discs for use in consoles may be on anode, and a polymer separator. The up, and about $12.5 billion in a “worst its way out. separator keeps the positive and neg- case” scenario. They say the key to gaming’s ative electrodes apart to avoid short Video-game console sales have future will depend on the creativity circuits while permitting the trans- also declined steadily since 2008. of smaller developers of download- port of ionic charge carriers that As a result of these problems, able games. complete the circuit. gaming-company stock values have Rice graduate student Neelam plummeted. Need a Battery? Singh led the research team that Numerous industry observers say Just Spray It on developed the spray-on battery. the worldwide economic problems Rice University scientists have To test their invention, the scientists have contributed to the downturn. developed a spray-on battery that, performed an experiment in which They also cite the increasing avail- they say, could be applied to almost they connected nine batteries sprayed onto bathroom tiles. One included a solar cell that converted power from a light. When fully charged by both the solar cell and standard building elec- tricity, the batteries produced 2.4 volts and powered 40 LEDs that spelled out “Rice” for six hours. The research team has also painted batteries onto surfaces such as stainless steel, flexible polymers, and glass. Singh said spray painting is already a process used in many industries, so the technique will be easy for com- panies to implement. The Rice team is continuing its research and hopes to develop ver- sions of the battery that could include Rice University researchers have designed a technology for spraying batteries onto painted tiles that could be fitted almost any surface. In one experiment, they connected nine batteries sprayed onto together and configured in multiple bathroom tiles. When fully charged, the batteries produced 2.4 volts and powered 40 ways to meet the needs of individual LEDs that spelled out “Rice” for six hours. products and projects.

18 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 © 2012 IEEE

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

IPv4 Shortage Causes UK TEAM BUILDS SUPERCOMPUTER FOR $4,050 Address Trading, Hoarding Some strange things are happening niversity of Southampton researchers, with the help of a professor’s 6-year-old son, in the normally routine world of IP U have built a supercomputer with a group of $35, credit-card-sized Raspberry Pi com- addresses, thanks to the growing puters stacked in racks built with Lego toy blocks. shortage of IPv4 addresses. The team—led by Professor Simon Cox—used 64 Raspberry Pi computers, each with a For example, companies have 16-gigabyte SD card, yielding a terabyte of memory—to construct their Iridis-Pi cluster. begun participating in informal The machine was named after the University of Southampton’s Iridis supercomputer. Cox said one of his project’s goals is to make supercomputing—typically the domain secondary markets in which they only of well-funded, highly trained scientists—accessible to hobbyists. sell the addresses they don’t need to Raspberry Pi is a Linux-based, single-board computer with a 700-MHz ARM- organizations that don’t have enough. architecture CPU, 256 Mbytes of RAM, two USB ports, and a 10/100 Ethernet controller. These developments are important The 45-gram machine measures 85.6 × 53.98 × 17 millimeters, not including the SD card because the vast majority of Internet and connectors. The Raspberry Pi Foundation started work in 2009 to produce an inexpensive computer that young people could use to learn programming. traffic is still based on IPv4, despite Cox and his team installed and built all of their supercomputer’s software, including an growing calls over the last few years implementation of the Message Passing Interface, a language-independent communi- for IPv6 adoption in light of the cations protocol used to program parallel computers. They also created code written in shrinking number of available IPv4 Python to distribute parallel-computing tasks. addresses. Cox’s 6-year-old son, James, lent his Lego-related expertise to the building of the racks that held the Raspberry Pi units. Within North America, about 25 The supercomputer cost about $4,050, not including the Ethernet switches that percent of all new IPv4 address blocks connected the nodes. that new users have obtained have The researchers have released an online guide (www.southampton.ac.uk/~sjc/ been traded between organizations, raspberrypi/pi_supercomputer_southampton.htm)______for building a Raspberry Pi-based according to a recent study by Syra- supercomputer. cuse University and Delft University of Technology researchers. This trading has occurred even though the regional internet registry for North America, called the Ameri- can Registry for Internet Numbers, still reportedly has millions of IPv4 addresses available for ISPs and users. Among other activities, the five RIRs manage the allocation and registra- tion of IP addresses. Traditionally, organizations return unneeded addresses to their area’s RIR, which then gives them to orga- nizations that want them. However, that’s not possible now in some regions. For example, two UK researchers have built an inexpensive supercomputer from a number of $35, RIRs—the Asia-Pacific Network credit-card-sized Raspberry Pi computers. The team was led by Professor Simon Cox, Information Centre and Réseaux IP whose 6-year-old son, James, designed the Lego racks that held the Raspberry Pi Européens (European IP networks) units. Network Coordination Centre—are running out of IPv4 addresses. Thus, organizations are trading However, the agency has decided to open market, given that they com- addresses among themselves where hold onto these addresses. prise the last unused block of its size such activity is permitted. They Sponsors of a public campaign in the European-Middle East region. reportedly are trading for about $10 are trying to fight this by convincing each. the UK government to auction off the Researcher Cracks Encrypted Meanwhile, the UK Department for block to users who want to use the Password for Flame-Botnet Work and Pensions recently found a addresses to link to the Internet. Server block of 16.8 million IPv4 addresses Some observers say the addresses A researcher with security vendor that are not connected to the Internet. could be worth $1.5 billion on the Kaspersky Lab cracked the encryp-

NOVEMBER 2012 19

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

NEWS BRIEFS

tion protecting the password for a in May and eventually executed a The attackers utilized multiple command-and-control server used suicide command that wiped it off approaches—such as targeting rout- by the Flame cyberespionage botnet, of infected machines. Many vic- ers, servers, and applications—to which infected and then compro- tims had already cleaned up their bring down the banks’ websites. They mised thousands of computers in the computers. switched the techniques around regu- Middle East. Nonetheless, security researchers larly depending on the results they Having the password allowed secu- say, information on command-and- were achieving and the defenses that rity officials to access the server and control servers indicates the malware targets deployed. In the past, security learn more about Flame, as well as could strike again. experts say, hackers have tended to possibly identify its operators. use just one DDoS approach. Kaspersky analyst Dmitry Bestu- Cyberattack on US Banks The assaults were particularly zhev broke the hash after security One of Biggest Ever effective because by law, US banks vendor Symantec failed to do so Recent distributed denial-of- must provide encryption, protected with brute-force attacks and asked service assaults on several major US login systems, and other types of for help. Symantec, the International banks represented one of the biggest security. These applications are Telecommunication Union’s Interna- such cyberattacks ever, according to prone to bottlenecks, which make tional Multilateral Partnership against security experts. them especially susceptible to DDoS Cyber Threats (ITU-IMPACT), and the The DDoS attacks shut down web- attacks. German Federal Office for Informa- sites belonging to Bank of America, The itsoknoproblembro tool can tion Technology Security’s Computer Chase Bank, Wells Fargo, US Bank, run on compromised servers even if Emergency Response Team for fed- Citibank, and PNC Bank after flood- the hackers can’t acquire administra- eral agencies (CERT-Bund/BSI) have ing them with huge amounts of tive or root access. This gives hackers been conducting an investigation into traffic. The hackers didn’t steal any more machines to work with. Flame. data from the banks or damage their Before most of the assaults, online Flame infected Windows comput- transactional systems. posts correctly named the targets and ers and gave the resulting botnet’s To set up their attacks, the hackers the days they would be hit. However, operators access to the machines. compromised thousands of high- experts say, they can’t find informa- The software encrypted informa- bandwidth webservers—not the PCs tion that supports claims in the posts tion on the computers and sent it to usually used in such assaults—via that the Izz ad-Din al-Qassam Bri- command-and-control servers for several DDoS tools, including a new gades, Hamas’ military branch, were subsequent decryption offline. one called itsoknoproblembro (It’s responsible. Experts say Flame was highly OK, no problem, bro.). They used And as intricate as the attacks sophisticated and was behind an the resulting botnet to create traffic were, security investigators add, there April 2012 attack that caused Iranian storms—based on the User Data- was nothing sophisticated enough officials to disconnect their oil- gram Protocol, TCP, HTTP, and HTTP to indicate that a country had to be industry computers from the Internet. Secure—of up to 60 gigabits per behind them. They note that crimi- The malware was discovered second. nal organizations sometimes launch DDoS attacks on banks as a distrac- tion while they steal money from account holders. According to experts, admin- istrators must better secure their webservers to keep attackers from being able to use their machines in DDoS attacks. They also warn that the hack- ers could launch more of the same attacks.

Editor: Lee Garber, Computer; [email protected]

20 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Organizing Committee IEEE Symposium on Low-Power and High-Speed Chips Chair: H. Kobayashi Tohoku Univ. Vice Chairs: COOL Chips XVI J. Torrellas Univ. of Illinois, Urbana-Champaign Yokohama Joho Bunka Center, Yokohama, Japan K. Uchiyama Hitachi (Yokohama Media & Communications Center, Yokohama, Japan) C. -M. Kyung KAIST April 17 - 19, 2013 H. Amano Keio Univ. Advisory Chair: CALL FOR CONTRIBUTIONS T. Nakamura Keio Univ. COOL Chips is an International Symposium initiated in 1998 to present advancement of low- Secretaries: power and high-speed chips. The symposium covers leading-edge technologies in all areas of K. Suzuki Renesas H. Igura NEC microprocessors and their applications. The COOL Chips XVI is to be held in Yokohama on Treasurers: April 17-19, 2013, and is targeted at the architecture, design and implementation of chips with R. Egawa Tohoku Univ. special emphasis on the areas listed below. All papers will be published online via IEEE Xplore. K. Nitta NTT Authors of best papers will be recommended to submit an extended version to a COOL Chips Program Chairs: special issue of IEEE Micro. M. Ikeda Univ. of Tokyo Contributions are solicited in the following areas: F. Arakawa Renesas Publicity Chair: D Low Power-High Performance Processors for - M. Suzuki Panasonic Multimedia, Digital Consumer Electronics, Mobile, Graphics, Encryption, Robotics, Publication Chairs: Automotive, Networking, Medical, Healthcare, and Biometrics. Y. Unekawa Toshiba D Novel Architectures and Schemes for - Y. Hirose Fujitsu Labs. Single Core, Multi/Many-Core, Embedded Systems, Reconfigurable Computing, Grid, Registration Chair: K. Takano IBM Ubiquitous, Dependable Computing, GALS and Wireless. Local Arrangement Chairs: D Cool Software including - Parallel Schedulers, Embedded Real-time Operating System, Y. Nitta Renesas Binary Translations, Compiler Issues and Low Power Techniques. A. Hashiguchi Sony Proposals should consist of a title, an extended abstract (up to 3 pages) describing the product or Web Manager: topic to be presented and the name, job title, address, phone number, FAX number, and e-mail Y. Sato JAIST address of the presenter. The status of the product or topic should precisely be described. If this is a not-yet-announced product, and you would like to keep the submission confidential, please Advisory Committee indicate it. We will do our best to maintain confidentiality. Proposals will be selected by the Chair: program committee's evaluation of interest to the audience. Submission should be made by e- T. Nakamura Keio Univ. Chair Emeritus: mail, (Author’s kit can be obtained from http://www.coolchips.org/) M. J. Flynn Stanford Univ. to: M. Ikeda, Program Chair e-mail: [email protected]______Advisory Emeritus: Author Schedule: February 5, 2013 Extended Abstract Submission (by e-mail) T. L. Kunii Univ. of Tokyo March 11, 2013 Acceptance Notified (by e-mail) Members: March 26, 2013 Final Manuscript Submission D. Allison Stanford Univ. You are also invited to submit proposals for poster sessions by e-mail, D. B. Alpert Camelback to: K. Hashimoto, Poster Chair e-mail: [email protected]______Computer Architecture Author Schedule: March 18, 2013 Poster Abstract Submission (by e-mail) A. J. Baum Intel March 26, 2013 Poster Acceptance Notified (by e-mail) D. A. Draper True Circuits For more information, please visit . (TCMCOMP Chair) For any questions, please contact the Secretariat . M. A. Franklin Washington Univ. Sponsored by the Technical Committees on Microprocessors and Microcomputers and Computer Architecture of the IEEE Computer Y. Hagiwara Sojo Univ./AIPS Society. In cooperation with the IEICE Electronics Society and IPSJ. S. Iwade Osaka Inst. of Tech. L. Jow Hewlett-Packard R. Kasai NTT Electronics S. Kohyama Covalent Materials T. Kunio NEC K. Kushima NTT T. Makimoto TechnoVision Program Committee Consulting Chairs: M. Ikeda (Univ. of Tokyo), F. Arakawa (Renesas) O. Mencer Imperial College Vice Chairs: J. Yao (NAIST), H. Shimada (NAIST) H. Mochida Rohm Poster Chair: K. Hashimoto (Fukuoka Univ.) Y. Mori CM Engineering Special Session Chair: H. Tomiyama (Ritsumeikan Univ.) J. Naganuma Shikoku Univ. M. Nishihara AIPS Members: T. Nukii Sharp A. Ben-Abdallah (Aizu Univ.) K. -R. Cho (Chungbuk National Univ.) T. Ogura Ritsumeikan Univ. A. Gupta (Freescale) Y. Han (Chinese Academy of Science) Y. Okamoto Panasonic T. Harada (Yamagata Univ.) N. Higaki (Panasonic) Y. Inoguchi (JAIST) A. Omondi Yonsei Univ. S. Izumi (Kobe Univ.) K. Kimura (Waseda Univ.) T. Kobori (NEC) T. Kodaka (Toshiba) Y. Kodama (Univ. of Tsukuba) M. Kuga (Kumamoto Univ.) T. Shimizu Renesas G. Lee (Korea Univ.) S. -J. Lee () K. Morioka (Fujitsu Labs.) T. Tabata ON Semiconductor T. Watanabe Riken M. Muroyama (Tohoku Univ.) B. -G. Nam (Chungnam National Univ.) N. Woo Samsung S. Otani (Renesas) Y. Shibata (Nagasaki Univ.) K. Shimamura (Hitachi) H. -J. Yoo KAIST H. Takizawa (Tohoku Univ.) N. Togawa (Waseda Univ.) T. -H. Tsai (NCU Taiwan) H. Yoshizawa Fujitsu Labs. T. Tsutsumi (Meiji Univ.) Y. Wada (UEC) H. Yamauchi (Samsung) (in alphabetical order) K. S. Yeo (NTU Singapore) (in alphabetical order) (As of October 9, 2012)

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

GUEST EDITOR’S INTRODUCTION

The Move Toward Electronic Health Records

Ann E.K. Sobel, Miami University

A multitude of projects are under way IN THIS ISSUE that support the transition to electronic In his introduction to this special issue titled “Electronic health records, which enable the exchange Health Records: The HHS Perspective,” Doug Fridsma, chief science officer and director of the Office of Science of health information among healthcare- & Technology in the US Department of Health and Human related parties while maintaining patient Services, gives an overview of current efforts to foster the privacy and offering security protections. meaningful use of EHRs. These efforts focus on developing a consensus for building standards and EHR certification, providing support to implementers, and focusing on he US Patient Protection and Affordable Care Act patients’ needs to ensure ongoing success with the of 2010 embraces the notion that electronic health adoption of EHRs in the US. information is the bedrock of modern healthcare. In “Personal Health Records: New Means to Safely T To this end, a multitude of projects are under way Handle Health Data?,” Inmaculada Carrión Señor and that support the transition to electronic health records her colleagues at the University of Murcia, Spain, discuss (EHRs), which enable the exchange of information among concerns about the security and privacy of personal health various healthcare-related parties while maintaining information and explore the larger issue of segregating patient privacy and offering security protections. patient data in related health contexts. The authors This ambitious endeavor with an aggressive timeline describe the potential for addressing these concerns by of milestones poses new and interesting problems combining a reliable certification entity that accredits pertaining to the sharing of private information among data protection with the use of internationally established physicians, institutions, and individuals. Both the US privacy and security standards and regulations to help Department of Health and Human Services and the increase the numbers of patients and medical professionals National Institute of Standards and Technology have been who are willing to use PHR systems. actively supporting health IT projects and the creation of “Electronic Case Records in a Box: Integrating Patient standards and certification. Data in Healthcare Networks” by researchers at Fraunhofer Other countries have a head start on the US in this FOKUS, Germany, describes an interoperable solution to regard, as they began adopting related strategies years the efficient exchange of medical data between institutions. ago. Thus, some of the contributions to this special issue ECR in a Box, a concept deployed by Germany’s Electronic come from outside the US. Case Record Association, hides the security and privacy

22 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 © 2012 IEEE

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

aspects so that healthcare providers and system vendors n 2010, the initial goal of having 80 percent of can focus on the business aspects of ECRs, thus providing physicians using EHRs by 2014 seemed optimistic given an off-the-shelf approach that dramatically reduces entry I that less than 20 percent were using the technology at barriers for healthcare providers and makes it easier to set that time. However, according to a September 2012 survey up and participate in regional healthcare networks. of 21,000 physicians, 82 percent of respondents indicated “Fusion: Managing Healthcare Records at Cloud Scale” that they are currently using an EHR or plan to do so

by researchers from HP Labs proposes a cloud-based (www.healthcare-informatics.com/news-item/majority-______

platform for low-cost delivery of healthcare applications physicians-currently-use-or-will-implement-ehrs-survey-______that enables broader use of patient-centric management of finds).____ Fine-tuning certification criteria and establishing EHRs while supporting the strict guidelines and technical best practices appear to be keys to this initiative’s contin- safeguards required to protect information as outlined in ued overall success. the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Privacy and Security Rules. “Testing the Nation’s Healthcare Information Ann E.K. Sobel is an associate professor in the Department Infrastructure: NIST Perspective” by Kevin Brady and his of Computer Science and Software Engineering, Miami colleagues from the National Institute of Standards and University. Contact her at [email protected].______Technology describes NIST’s involvement in healthcare automation activities focused on developing associated test methods, protocols, and specifications for interoperability Selected CS articles and columns are available in the use of EHRs. for free at http://ComputingNow.computer.org. ______

NOVEMBER 2012 23

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE

Electronic Health Records: The HHS Perspective

Doug Fridsma, Office of the National Coordinator for Health IT

Electronic health records can deliver com- has always remained ONC’s sole focus. ONC sees the goals plete and accurate health information to of promoting nationwide adoption of health IT as three- patients and their providers, allowing fold: improving health, providing better healthcare, and reducing costs. better access to that information and, ulti- To increase the overall health of the population, mately, empowering patients to take an health IT can help address behavioral risk factors, focus active role in their healthcare. on preventive care, and identify public health concerns, such as the increased risk of chronic illnesses like dia- betes or acute illnesses like influenza. Providing better he US Health Information Technology for Eco- healthcare means improving patients’ care experience nomic and Clinical Health (HITECH) Act, enacted within the Institute of Medicine’s six domains of quality: as part of the American Recovery and Rein- safety, effectiveness, patient-centeredness, timeliness, T vestment Act of 2009, was signed into law on efficiency, and equity. Finally, health IT should reduce 17 February 2009 to promote the adoption and meaning- costs by lowering the total cost of care while improving ful use of health information technology. quality, resulting in reduced monthly expenditures for Electronic health records (EHRs) can provide many Medicare, Medicaid, and Children’s Health Insurance benefits for providers and their patients, but the benefits Program beneficiaries. depend on how EHRs are used. Meaningful Use is the set In addition to supporting the widespread adoption of of standards defined by the Centers for Medicare & Medi- health IT, ONC is focused on developing standards that caid Services (CMS) Incentive Programs in conjunction support interoperability and provide strong, clear guidance with the Office of the National Coordinator for Health IT to the implementer community. (ONC). These standards govern the use of EHRs and allow eligible providers and hospitals to earn incentive payments MEANINGFUL USE: THE HITECH CORE by meeting specific criteria. Implementation of Meaningful Use is occurring in three The benefits of meaningfully using EHRs include deliv- stages, emphasizing an incremental path that providers ering complete and accurate health information to patients can take toward implementing EHR use in their practices and their providers, allowing better access to that informa- or facilities. tion and, ultimately, empowering patients to take an active In stage one, the focus is on making health information role in their healthcare. —usually maintained in paper records—electronic by implementing EHR use. In this stage, providers must HEALTH IT GOALS demonstrate the ability to capture data in a standardized While developing the Meaningful Use standards and electronic format and then use that information to engage related federally managed health IT programs, the patient patients and their families during care.

24 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 © 2012 IEEE

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

In stage two, providers must be able to share records A key component to ensuring success is providing sup- with other providers, regardless of the EHR systems in port to on-the-ground implementers in assembling the use. Ensuring that data is interoperable is a critical founda- standards and policy building blocks required to meet tion to the successful use of health IT. Interoperability will providers’ most pressing information exchange needs. As improve patients’ care by ensuring that their information early implementations produce results, disseminating and follows them across different care settings. spreading the information exchange solutions will ensure Stage three will focus on improving information ex- that a wide array of implementation guidance is available to change and interoperability, building toward the day when providers looking to engage in health information exchange. healthcare providers can actually learn from the electronic information they are using. This stage will emphasize THE NEXT STEP: ENSURING not only improving individual patient outcomes but also STANDARDS COMPLIANCE improving the health of the general population. This is As the health IT community develops and agrees upon Meaningful Use in action. standards, ONC’s Certification Program is intended to ensure that EHR technologies meet those standards and WORKING IN THE BACKGROUND: to help providers and hospitals achieve CMS’s Meaningful IMPLEMENTATION Use objectives and measures. The work promoting the adoption and uptake of health Certification of health IT assures purchasers and other IT is key to ensuring the HITECH Act’s goals. But making users that an EHR system offers the necessary techno- certain that the technical standards and specifications logical capability, functionality, and security to help them needed to support this technology are in place is also criti- meet Meaningful Use objectives and measures. Certifica- cal to the development and success of a fully functional tion also gives providers and patients confidence that the nationwide health IT ecosystem. products and systems they use are secure and can work As with the technology that people use every day— with other systems to share information. To date, ONC has telephones, email, the Internet, mobile technology—health information exchange doesn’t offer a “one size fits all” solution—different providers will use the technology in dif- The first step toward widespread ferent ways. The standards and specifications supporting adoption of standards-based health these diverse needs are being developed and harmonized IT is simply getting the systems in within ONC’s Office of Science & Technology. Initiatives are place and converting the data into under way to establish the fundamental building blocks of an electronic format. interoperability by

t standardizing healthcare vocabularies, certified many different types of ambulatory and inpatient t leveraging HL7 international standards for interoper- EHR products from numerous vendors, providing this as- ability of health information to develop the underlying surance throughout the country. structure, t using secure email protocols to standardize transport, WHERE ARE WE TODAY? t using NIST-adopted encryption standards to standard- As of the end of 2011, 52 percent of office-based physi- ize security, and cians indicated their intention to take advantage of EHR t developing open and accessible APIs to standardize incentives (www.cdc.gov/nchs/data/databriefs/db79.htm). services. What’s more, according to an ONC analysis of the Na- tional Ambulatory Medical Care Electronic Health Record ONC is working with the health IT community to con- Survey, the percentage of primary care providers who’ve vene and rapidly prioritize the challenges it faces so that it adopted EHRs in their practice doubled from 20 percent to can subsequently develop and harmonize the standards, 40 percent between 2009 and 2011. These numbers are sig- specifications, and implementation guidance needed to nificant because the first step toward widespread adoption solve these challenges. ONC is also responsible for curat- of standards-based health IT is simply getting the systems ing the set of standards and specifications that support in place and converting the data into an electronic format. interoperability and ensuring that they can be assembled Momentum is building. In terms of outreach, ONC’s Re- into solutions for a variety of health information exchange gional Extension Centers (RECs) have signed up more than scenarios. Through its Strategic Health IT Advanced Re- 100,000 primary care providers, meaning that roughly search Projects program and a series of Innovations one-third of the nation’s primary care providers have com- Challenge grants, ONC will continue to support innova- mitted to meaningfully using EHRs by partnering with tion in health IT. their local REC.

NOVEMBER 2012 25

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE

Hospital adoption of EHRs has more than dou- uch work remains to be done, but ONC is confident bled since 2009, increasing from 16 percent to 35 that the strategy of working within the community percent (www.healthit.gov/media/pdf/ONC_Data_Brief_ M to build consensus on standards and EHR certifi- AHA_2011.pdf).______In addition, approximately 85 percent cation, providing education and support to implementers, of hospitals have indicated their intention to attest to and focusing on the patient’s needs will ensure ongoing Meaningful Use by 2015. success with the adoption of EHRs in the US. ONC will continue to support the community of stake- holders and the needs of patients. Functionality will Doug Fridsma is the chief science officer and director of continue to improve as the portfolio of standards building the Office of Science & Technology, Office of the National blocks grows in response to priorities that the health IT Coordinator for Health IT, US Department of Health and Human Services. In his role at ONC, Fridsma is responsible community sets forth. As this happens, ONC’s certification for the programs that focus on providing a foundation for program will also evolve to ensure that the country’s health interoperable health information exchange. He is a board IT products conform to these agreed-upon standards. member of HL7 and the National e-Health Collaborative. Finally, ONC will continue to support the community of Fridsma received an MD from the University of Michigan implementers who are working to make interoperable and a PhD in biomedical informatics from Stanford Univer- EHRs a reality in our healthcare system. sity. Contact him at [email protected].______

IEEE VR 2013

20th IEEE Virtual Reality

16-20 March 2013 Orlando, FL, USA

IEEE VR 2013 is the premier international conference and exhibition on virtual reality. Find the brightest minds, the most innovative research, the leading companies and the most stimulating GLVFXVVLRQVLQWKHÀHOGVRIYLUWXDOHQYLURQPHQWVDXJPHQWHGUHDOLW\KDSWLFVDQG'XVHULQWHUIDFHV Register today!

ŚƩƉ͗ͬͬĐŽŶĨĞƌĞŶĐĞƐ͘ĐŽŵƉƵƚĞƌ͘ŽƌŐͬǀƌͬϮϬϭϯ______

26 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE Personal Health Records: New Means to Safely Handle Health Data?

Inmaculada Carrión Señor, José Luis Fernández Alemán, and Ambrosio Toval University of Murcia, Spain

Personal health records offer a way to man- t preferences: types of treatment desired; stipulations age health data while lessening healthcare regarding organ donations, hospice care, living will; costs, improving patient data quality, and t alarm system: medication warnings, appointments with a physician, available analytical results; and fostering healthcare efficiency, but privacy t family history: family diseases, genetic predispo- and security issues are particularly impor- sitions, if any. tant considerations for PHR designers. In addition, a PHR stores vital information from the patient’s healthcare providers: laboratory tests, medical oday’s healthcare practices are increasingly images, allergies, glucose level, blood pressure, blood transitioning to e-health: the application of infor- group, weight, height, immunizations, and medications. mation and communication technology (ICT) PHR applications are increasingly popular. An estimated T to health information systems. E-health offers 70 million people in the US now access some form of PHR.1 solutions that respond to the burgeoning problems and Users are aware of the benefits that PHRs provide, such as demands inherent in the management of paper-based improved doctor-patient communication, ease of compre- patient health records. hension, and reduced risk of medical errors. Nonetheless, Regulations such as the 1996 US Health Insurance Por- the existence of PHRs raises the possibility for significant tability and Accountability Act (HIPAA) state that patients privacy and security issues, which both users and design- have a right to control who can access their information ers must understand. and how that information is managed. This regulation, coupled with patients’ interest in using the Internet to find PHR FUNCTIONALITY AND ARCHITECTURE information about their symptoms, diseases, and treat- PHRs can store a wealth of user information that ments, has led to the generation of personal health records. users can collect and manage. Patients can enter their A PHR is an electronic Web-based application that lets data as well as view data from other sources. Patients individuals access, manage, and share their health infor- can also share and exchange their data with other users mation and access that of others if they have the correct and with healthcare professionals. Because informa- credentials. A typical PHR stores a variety of information tion self-management lets patients better manage their beyond personal identification data: own health data, users of PHRs specifically associated or integrated with their healthcare providers’ data t personalized health advice: from a physician on un- systems have found PHRs to be very helpful in health healthy habits, physical exercise, diet; emergencies.1

0018-9162/12/$31.00 © 2012 IEEE Published by the IEEE Computer Society NOVEMBER 2012 27

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE

100 PHR ADOPTION Although the adoption of PHRs, given their proliferation 90 Regulations compliance Secure certifications and wide availability, seems inevitable at this point, both 80 Social networks doctors and patients have expressed several concerns: 70 t Security on the Internet. Web-based PHRs are sub- 60 ject to multiple threats, just like other Internet 50 applications. 40 t Privacy issues. If patients control their PHRs, they PHR percentage must know to whom they are granting access and for 30 what purpose. 20 t Less information being recorded. Physicians might 10 avoid writing certain information for fear that patients can access that information. 0 Free Purchase t Information quality. If patients introduce their infor- PHR classifications depending on the cost mation into a PHR system, the information might not be as accurate as if a professional were to Figure 1. Personal health records (PHRs) in the communi- record it. cations hub between stakeholders who exchange data t Comprehension difficulty. Patients might be unable to and interact with patients. understand the information contained in their PHR, leading to unnecessary anxiety. This problem could Many applications are integrated with, and use, PHRs be exacerbated in patients with psychiatric problems. as an information source, as Figure 1 shows. Examples of t Educational level. Patients with a lower level of educa- such applications are the electronic health record (EHR) tion might be unable to understand the information systems of healthcare providers, the information systems shared on the PHR system. of research labs and pharmacies, and monitoring devices. t Decrease in face-to-face communication. The use of An EHR is a repository of information related to a pa- PHRs involves the loss of face-to-face interaction tient’s healthcare history that is processed and supported between doctors and patients, the therapeutic rela- electronically using ICT. An EHR differs from a PHR in that tionships established by personal interaction, and medical professionals, not patients, determine its contents. associated benefits. Healthcare professionals can support PHR-EHR integration t Increased workload and reduced compensation. Physi- because they can use PHRs to help patients manage their cians’ workloads might increase, without appropriate diseases, especially chronic conditions such as diabetes. remuneration, although most professionals believe Interoperability is a key component of PHR architecture that this increase might also lead to fewer patient that permits the integration of PHR and EHR systems. Stan- visits. dards like ISO/TS 13606 (Health Informatics—Electronic t Physicians’ role. It is unclear what the physicians’ roles Record Communication) assist in the design of interoperable and responsibilities are with regard to PHRs. EHR systems. As Figure 1 shows, the PHR receives data from patient These issues could well become barriers to the implemen- monitoring devices, test results, EHR systems, doctors, and tation and adoption of PHRs if not thoughtfully addressed third-party applications (the last three obtain data from by PHR designers.2 PHRs to perform their functions). Business intelligence refers to computer-based tech- PRIVACY AND SECURITY niques that identify, extract, and analyze business data, One challenge when designing a PHR system is ensur- such as sales revenue from products or departments or ing information privacy and security, which is a particular from associated costs and incomes. PHRs could apply concern to users.3 If patients lack confidence that their data these techniques to extract the information that hospi- is sufficiently protected, they will not use PHRs. tals, pharmacies, insurers, research laboratories, and Beyond addressing security concerns, PHR designers healthcare associations need. These entities could in turn must contend with legal requirements: many countries use this information to discover what resources and data require personal data protection by law. European Union are needed to perform their activities. Furthermore, PHRs countries, for example, have developed personal data could help develop decision support systems for use in protection laws based on the 1995 European directive these scenarios. Finally, social networks are a communi- 95/46/CE. In the US, the security focus is sectorial, and cation bridge between PHRs and, as a last resort, patients. laws such as the Privacy Act of 1974 guarantee the right

28 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

to information privacy. The “Personal Health Records and Security” sidebar offers additional PERSONAL HEALTH RECORDS AND SECURITY information about these regulations. e analyzed 40 personal health record (PHR) application software Moreover, PHRs are subject to threats that are W packages, of which 16 are free and 24 are available commercially. inherent in any Web application. The Open Source Figure A shows the percentage of free and commercial PHR application Vulnerability Database (OSVDB), for example, has software that satisfies security regulations or principles, such as the Health Insurance Portability and Accountability Act (HIPAA; www.hhs.gov/ocr/ registered 45,413 vulnerabilities to date (www.____ privacy)____ and Health On the Net Code of Conduct (HONCode; www.hon.ch), osvdb.org) that are related to Web applications. has secure certifications, and is integrated with a variety of social networks. These vulnerabilities—scored on the basis of In total, 70 percent of the PHR systems we analyzed satisfy some security impact, exploitability, temporal, and environmen- regulations, 15 percent have one or more secure certifications, and 27.5 per- tal vulnerabilities with the Common Vulnerability cent are connected with social networks. As Figure A shows, a higher percentage of free PHRs versus commercial PHRs satisfy these characteris- Scoring System (http://nvd.nist.gov/cvss.dfm)—______tics. Note, however, that we analyzed 33 percent more commercial than free have an average severity score of approximately PHRs. The total number of PHRs that actually satisfy regulations and secure 4.75 (out of 10). A score of 4.75 means that unau- certifications is quite high. thorized people (usually hackers) could access and Medefile (www.medefile.com) is the most popular commercial PHR that modify data relatively easily. we analyzed, with more than 18,000 fans on Facebook. Medefile satisfies HIPAA regulations and has been certified by both TRUSTe (www.truste.com) One example of a PHR that experienced data and Geotrust (www.geotrust.com). The most popular free PHR is dLife, spe- vulnerability problems is Microsoft HealthVault: cifically for diabetes patients (www.dlife.com), with more than 5,000 fans on in 2009, Microsoft identified 13 incidents that Facebook alone. This PHR also satisfies HIPAA regulations and has the involved lost or stolen credentials and affected TRUSTe certification. 15 individuals (http://www.govinfosecurity.com/ ______articles.php?art_id=2996&opg=1). Research Healthcare Hospital Pharmacy Insurance laboratory association A suitable solution for achieving safer PHRs is s to include privacy and security standards or regu- Business lations in the PHR early specifications that can Third-party intelligence readily be defined by, for instance, HIPAA, which application identifies security and privacy rules that US health EHR Social PHR systems should satisfy. Additionally, the ISO/TS PHR network 13606 standard defines the minimum access Physicians policy specifications that EHR systems must sat-

isfy if they are to be interoperable. Devices Lab results Various studies have evaluated PHR system privacy policies. For example, a 2011 study inves- Figure A. Free and commercial personal health record systems tigated whether a given set of PHRs satisfied the classified by regulation compliance, security certification, and HIPAA rules.4 In another study, researchers assessed social network integration. the usability of privacy and security characteristics in PHR systems.5 A 2012 study analyzed PHRs by function, dividing them into nine categories, depending Privacy problems can result when, as is commonly the on their security and privacy characteristics.6 The “Privacy case, PHRs are used to analyze the data stored in them for Policy Principles in PHRs” sidebar provides details regard- research purposes. In these cases, the data is aggregated ing these policies. and de-identified—that is, data that has been purged of It is possible to develop Web-based PHRs that can sat- identification information that pertains to many people. isfy security certificates. This certification ensures that However, it is very difficult to remove sufficient informa- the data dealt with in the application are protected and tion to ensure that a specific person cannot be identified. encrypted, which lets consumers feel more confident when Some studies have used methods such as k-anonymity to using such systems. Several online PHRs, such as dLife and avoid this situation.7 HealthyCircles, are certified by entities such as TRUSTe Nevertheless, a new problem has arisen with the inte- (www.truste.com). gration of PHRs and social networks—researchers Arvind Moreover, PHR designers should consider the Health Narayanan and Vitaly Shmatikov, for example, success- on the Net Foundation Code of Conduct (HONcode; www.____ fully identified a person from aggregated data and the hon.ch)_____ for Web-based records, as it is a code of conduct person’s information that had been stored on a social for medical and health websites that specifically addresses network. Consequently, they developed a generic re- the reliability and usefulness of medical information on identification algorithm for anonymized social the Internet. networks.8

NOVEMBER 2012 29

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE

The role-based scheme defined by ISO for PRIVACY POLICY PRINCIPLES IN PHRS EHRs, however, can be adapted to PHRs, which given PHR vendor or supplier’s privacy policy contains all the information are patient-centered applications and in which A related to the privacy and security of user data. The privacy policy should patients decide who can access what informa- be clear and concrete so that users can understand how the PHR system tion. By analyzing 40 online PHRs against the manages their information. backdrop of the ISO standard, we identified eight The Canadian Standards Association, for example, has defined 10 princi- ples that privacy policies should satisfy to ensure that a particular system’s possible roles and permission assignments for privacy policy contains all the information the user needs. We performed a seven access levels that PHR designers should study using the seven most important principles defined by this association: consider in developing future PHRs. Table 2 consent, limiting collection, limiting user disclosures and retention, accuracy, lists these roles and permission assignments. safeguards, openness, and individual access. These principles are the only Although the user ultimately decides who ones we could analyze as external auditors of PHR privacy policies. We investigated to determine whether the privacy policies of the 23 free accesses what information and with what per- PHRs shown in Table 1 in the main text satisfy these seven principles.1 The mission, the PHR system might suggest how to histogram in Figure B indicates the percentage of PHRs that satisfy 0, 1, 2, and grant access. Moreover, because certain PHRs so on, principles. Note that only 17.4 percent of PHRs satisfy all seven do not allow users to grant access, they might principles. use this model. Reference A PHR system will manage varying roles, and 1. G. Yee and L. Korba, “Personal Privacy Policies,” Computer and Information Security offer different access levels, depending on its func- Handbook Canada, J.R. Vacca, ed., Morgan Kaufmann, 2009. tionality. Administrator access allows another user to control and manage the information as if he or 100 she is the user who owns it. 90 80 Certain PHR systems anticipate what happens 70 if the user cannot access a PHR, as in the case 60 of an emergency. In this situation, the individual 50 would be unable to control who could access the 40 data, but these PHR systems define a special role 30 used only in these cases. Some systems do not 20 grant access merely because someone says that 10 an emergency has occurred, and some individu- 0 01234567 als would consider this to be a privacy breach. Other PHR systems use an audit log so that pa- Figure B. PHR histogram with policies that satisfy the privacy tients can see who has accessed their data, when principles defined by the Canadian Standards Association. the access occurred, and for what purpose. Both HIPAA and ISO/TS 13606 identify the need to use such logs. Still another situation that could potentially expose a person to data vulnerability is that administrative staff HEALTH INFRASTRUCTURE: could access a user’s data without receiving explicit consent. NEW APPLICATIONS In our work, we have researched PHRs in terms of avail- The integration of PHRs with social networks provides ability, social network integration, and privacy policy. significant benefits—notably, patients with the same dis- Table 1 lists 56 PHRs, both free and commercial, that ease can contact each other to share information and we compiled both from a literature search and from the experiences. For example, through dLife, a social network myPHR website (www.myphr.com), which was created and PHR that provides information specifically intended for is managed by the American Health Information Manage- diabetics, users can communicate with one another to ment Association. share diabetes-related news and information. However, using social networking raises additional privacy and ACCESS CONTROL AND AUDIT security issues with which PHR designers must wrestle, As yet, unlike for EHRs, no international standard exists especially regarding the sharing of information related to to define a PHR. The ISO/TS 13606 standard, for example, family members. defines five sensitivity levels of information and identi- Social networks have other pitfalls. Several PHRs, fies seven functional roles associated specifically with for example, currently offer patients the opportunity to EHR system users. Each user has a functional role and provide genetic information. But a patient who volun- can access the information depending on that role and the tarily discloses this information through a social network information’s sensitivity level. could be violating a family member’s privacy.

30 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Table 1. Availability and type of personal health records.

Social Privacy Free network policy PHRs

No No HIPAA or EMRy STICK (http://phr.emrystick.com); MedDataNet (www.meddatanet.com); HealthString (www.___ HONCode healthstring.com);______LifeOnKey (www.lifeonkey.com/Solutions/Default.aspx); Lynxcare (www.lynxcare.net); HealthButler (http://healthbutler.com); MediKeeper (www.medikeeper.com); MyLifeSaver (www.doctorglobal. com/index2.asp); Your Health Record (www.yourhealthrecord.com) No No No Patient Power (http://gtipatientpower.com)

NoNoOwnAccessMyRecords (www.accessmyrecords.com); ER-IDcard (www.er-card.com); HealtheTracks (ww___w. healthetracks.com);______HealthTrio (www.healthtrio.com/index.php); K.I.S. Medical Record Solutions (http://kis-______medicalrecords.com);______LifeLedger (www.elderissues.com); MedicalSummary (www.medicalsummary.com); MedNotice (www.mednotice.com); MyActiveHealth (https://www.myactivehealth.com/portal); MyMedical Records (www.mymedicalrecords.com); myPHI (www.my-phi.com), OnlineMedicalRegistry (www.myihr.com/ entry);___ PeopleChart (www.peoplechart.com); EHE&me (www.eheandme.com); The Smart PHR (www.___ thesmartphr.com);______WebMD Health Manager (https://healthmanager.webmd.com) No Yes HIPAA or Dossia (www.dossia.org); Healthgram.com (www.healthgram.com); Magnus Health (http://magnushealth. HONCode com);___ Medefile (www.medefile.com); SynChart (www.synchart.com) No Yes Own MemiTech (www.911medicalid.com); RelayHealth (www.relayhealth.com); TAC Drive (www.tacdrive.com)

Yes No HIPAA or GlobalPatientRecord (www.globalpatientrecord.com); MedicAlert (www.medicalert.org); MedsFile.com (www.___ HONCode medsfile.com);______My HealtheVet (www.myhealth.va.gov); MediCompass (www.medicompass.com/mcweb/ default.aspx);______MyChart (www.mychartlink.com/mychart); Dr. I-Net (www.drinet.com) Yes No No Medical ID Card (www.tnlink.com/medcard)

Yes No Own iHealthRecord (http://medfusion.net/ihealthrecord); myHealthFolders (https://myhealthfolders.com);______TeleMedical.com (www.telemedical.com); MiVIA (www.mivia.org) Yes Yes HIPAA or My Doclopedia PHR (www.doclopedia.com); Microsoft HealthVault (www.microsoft.com/en-us/healthvault); HONCode dLife (www.dlife.com); Juniper Health (https://juniperhealth.com) Yes Yes Own HealthyCircles (www.healthycircles.com); Keas (https://keas.com) Both No Own myMediConnect (www.mymediconnect.net/index.php); Passport MD

Both Yes Own NoMoreClipBoard.com (www.nomoreclipboard.com); RememberItNow! (www.rememberitnow.com)

Table 2. Roles and possible permission assignments to Likewise, if a user who has contracted a disease at decrease data vulnerability. work—for example, after being exposed to chemicals— shares this information on a social network, the privacy Access level functionality of coworkers could be compromised. Another concern is Role View Add Modify Administrator information about contagious diseases—those closest to data data data the patient might have the same illness, and their privacy would not be guaranteed. Owner/user X X X X As Figure 4 shows, PHRs such as Microsoft Health- Friend X Vault have application programming interfaces (APIs) Family XX X X that software designers can use to create supplemen- member (only one family member) tary applications. PHRs can use these applications as a data source, like common health devices, which are Healthcare XX X professional connected to PHRs and thus make it easier for patients to upload and track health data. Conversely, because the Other users X applications can extract data from PHRs, they should Device1 X likewise protect user data. PHRs such as HealthButler Application2 X (http://healthbutler.com) and myMediConnect (www.____ Other services3 XX X X mymediconnect.net) share information with Microsoft 1 Such as a blood pressure monitor, a weight, a blood glucose monitor. 2 Such as DiabetesPHA, SmokeFreeLife, Lab Tracker by Health nexus. HealthVault, which leads to a mutual sharing and com- 3 Insurance companies, pharmacies, and so on. plementing of both information stored by these PHRs and of functionality. soft has registered 83 health tools and 20 health Microsoft HealthVault connects with third-party devices that are collectively classified into 10 activity applications and devices. As Figure 4 shows, Micro- categories.

NOVEMBER 2012 31

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE

40 t Recovery. Cloud providers must 35 Health tools have a data retrieval system, such 30 Devices as Iron Mountain (http://www.______25 ironmountain.com),______to recover data 20 15 in the case of a disaster—for ex- 10 ample, a cyberattack that results in 5 massive data loss. 0 t Long-term viability. PHR design- ers must be sure that users’ data records Manage will remain available even if the conditions emergency community Track health Track medications Interact with cloud provider disappears. Get organized Prepare for an Connect with a Connect Other activities health provider Improve fitness Improve Manage medical Manage lab tests t Network security. All dataflow Activity in the network must be secured to prevent the leakage of sensi- Figure 4. Health tools such as DiabetesPHA and devices such as a pedometer or tive information. Encryption blood pressure monitor that connect with Microsoft HealthVault are classified by activity. schemes such as Secure Sockets Layer could be used for this purpose. CLOUD COMPUTING t Virtualization technology. The dynamic nature of The use of PHRs with cloud computing provides new virtual machines permits fast reconfiguration and possibilities for designers. They could achieve PHRs quicker makes it possible to revert to previous instantiations, and with fewer mistakes, thus taking advantage of other pause or restart, or clone and move the servers that PHRs stored in the cloud. However, this approach leads to create security problems. new security and privacy threats that must be analyzed. t Investigative support. Investigating inappropriate or Microsoft HealthVault can be combined with Windows illegal activity can be very difficult in cloud comput- Azure capabilities, thus offering cloud computing ser- ing. If designers meet to resolve national security and vices through its API. This API enables the development privacy requirements in the cloud, they can mitigate of applications for which the data source is Microsoft this problem.9 HealthVault. Some PHRs, like HealthATM (http://healthatm. com),___ have been deployed around Microsoft HealthVault to Achieving adequate security to deal with all these complement HealthVault’s information and functionality, threats traditionally involves five aspects: availability, thus making it possible to design low-cost PHRs that are confidentiality, data integrity, control, and auditing. Avail- customized and optimized for specific functions and popu- ability is the property of being accessible and usable by lations. Furthermore, third-party applications also use an authorized entity on demand. Confidentiality ensures HealthVault as a storage service in the cloud. For example, that information is accessible only to those authorized to Biomedix is an application that uses advanced natural lan- have access. Data integrity ensures that information is guage processing technologies to detect vascular diseases. accurate and not modified in an unauthorized fashion. Designers of PHRs that offer cloud services must con- Control access is a means of ensuring that only authorized sider the potential for new security and privacy threats. users access data. Auditing ensures that any action can be New threats PHR designers face include the following: examined later.

t Privileged user access. Designers must consider that certain data will be processed outside their company. n addition to the potential they present for new t Regulatory compliance. Patients are responsible for business opportunities, PHRs are gaining increas- the security and integrity of their own data, and they I ing interest because of their ease of use, portability, must verify that this data is safe. and wide applicability. Currently, several million people

t Data location. Data location is not precisely known around the world have access to some kind of PHR (www.____ with cloud services. Patients need to know whether ncbi.nlm.nih.gov/pmc/articles/PMC2585530).______However, providers satisfy some specific jurisdictions and what problems with the privacy and security of such sensitive privacy requirements they satisfy. data could pose a serious impediment to PHR develop- t Data segregation. Data in the cloud is colocated with ment.10 The existence of a reliable certification entity, such that of other customers, and cloud providers must use as TRUSTe, that accredits data protection, along with the encryption schemes that take this special character- use of internationally established, well-regarded privacy istic into account. and security standards and regulations such as HONcode,

32 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

ISO/TS 13606, and HIPAA, will help to increase the num- informatics, software engineering, requirements engineer- bers of patients and medical professionals who are willing ing, and security and privacy. Carrión received a BSc in to use PHR systems. computer science from the University of Murcia. Contact In addition to the privacy and security issues that her at [email protected].______PHRs pose, the integration of technologies such as social José Luis Fernández Alemán is an associate professor of networks is an ongoing area of research. Additionally, re- programming and software quality in the Department of search is needed on the use of secure natural-language Computer Science and Systems at the University of Murcia, processing techniques to perform diagnoses and on ma- Spain. His research interests include e-learning, software chine learning to detect suspicious access to data.11 engineering, medical informatics, and computer-based learning and its application. Fernández received a PhD in computer science from the University of Murcia. Contact References him at [email protected].______1. D.C. Kaelber et al., “A Research Agenda for Personal Health Ambrosio Toval is a full professor in the Department of Records (PHRs),” J. Am. Medical Informatics Assoc., vol. 15, Computer Science and Systems Department at the Univer- no. 6, 2008, pp. 729-736. sity of Murcia, Spain. His research focuses on the design 2. G.L. Yau, A.S. Williams, and J.B. Brown, “Family Phy- and implementation of conceptual UML model verification, sicians’ Perspectives on Personal Health Records: requirements engineering processes, computer-aided re- Qualitative Study,” Canadian Family Physician, May 2011, quirements engineering tools, and security requirements. pp. e178-e184. Toval received a PhD in computer science from the Technical 3. P.C. Tang et al., “Personal Health Records: Definitions, University of Valencia, Spain. Contact him at [email protected].______Benefits, and Strategies for Overcoming Barriers to Adop- tion,” J. Am. Medical Information Assoc., Mar./Apr. 2006, pp. Selected CS articles and columns are available 121-126. for free at http://ComputingNow.computer.org. 4. I. Carrión, J.L. Fernández-Alemán, and A. Toval, “Assess- ing the HIPAA Standard in Practice: PHR Privacy Policies,” Proc. 33rd Ann. Int’l Conf. Engineering in Medicine and Biol- ogy Soc. (EMBC 11), IEEE, 2011, pp. 2380-2383. 5. I. Carrión, J.L. Fernández-Alemán, and A. Toval, “Usable Privacy and Security in Personal Health Records,” Proc. Conf. Human-Computer Interaction (Interact 11), LNCS 6949, Springer, 2011, pp. 36-43. 6. I. Carrión et al., “Evaluation and Neuronal Network-Based stay connected. Classification of the PHRs Privacy Policies,” Proc. Hawaii Int’l Conf. System Sciences (HICSS 12), IEEE, 2012, pp. 2840-2849. 7. L. Sweeney, “k-Anonymity: A Model for Protecting Pri- vacy,” Int’l J. Uncertainty, Fuzziness and Knowledge-Based Systems, vol. 10, no. 5, 2002, pp. 557-570. 8. A. Narayanan and V. Shmatikov, “De-Anonymizing Social Networks,” Proc. 30th Symp. Security and Privacy (S&P 09), IEEE, 2009, pp. 173-187. 9. E. Kuada, H. Olesen, and A. Henten, “Public Policy and Regulatory Implications for the Implementation of Oppor- tunistic Cloud Computing Services for Enterprises,” Proc. 9th Int’l Workshop on Security in Information Systems, pp. 3-13; www.iceis.org/Abstracts/2012/WOSIS_2012_ abstracts.htm.______Keep up with the latest IEEE Computer Society 10. I. Carrión, J.L. Fernández-Alemán, and A. Toval, “Are publications and activities wherever you are. Personal Health Records Safe? A Review of Free Web- | Accessible Personal Health Record Privacy Policies,” J. TM @ComputerSociety | Medical Internet Research, vol. 14, no. 4, 2012, p. e114. @ComputingNow 11. A.A. Boxwala et al., “Using Statistical and Machine Learn- | facebook.com/IEEEComputerSociety ing to Help Institutions Detect Suspicious Access to | facebook.com/ComputingNow Electronic Health Records,” J. Am. Medical Information | IEEE Computer Society Assoc., vol. 18, no. 4, 2011, pp. 498-505. | Computing Now

| youtube.com/ieeecomputersociety Inmaculada Carrión Señor is an associate researcher in the Software Engineering Research Group in the Depart- ment of Computer Science and Systems at the University of Murcia, Spain. Her research interests include medical

NOVEMBER 2012 33

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE Electronic Case Records in a Box: Integrating Patient Data in Healthcare Networks

Raik Kuhlisch, Ben Kraufmann, and Hannes Restel, Fraunhofer FOKUS, Germany

An innovative deployment concept de- vacy aspects of ECRs so that healthcare providers and couples document sources and elec- system vendors can focus on the business aspects. The tronic health records to provide an approach’s off-the-shelf nature dramatically reduces barriers to entry for healthcare providers, making it easy-to-use, seamless, yet secure plat- easier to set up and participate in regional healthcare form for use in the cumbersome task networks. of integrating an EHR platform into a regional healthcare network. THE ECR PLATFORM In 2006, major stakeholders in the German health- care industry—later formally organized as the Verein he reliable and confidential exchange of medi- Elektronische FallAkte (EFA), or Electronic Case Record cal data is critical to making healthcare more Association—launched an initiative to create specifications efficient and cost-effective, while also protecting for a federated and secure ECR service platform (www.____ T patient privacy. For this reason, healthcare pro- fallakte.de).______The Fraunhofer Institute for Open Commu- viders are increasingly abandoning paper-based records nication Systems FOKUS has since developed a reference in favor of electronic health records (EHRs) or electronic implementation of the ECR platform that medical IT ven- case records (ECRs). Laws recently enacted in many dors Siemens, CompuGroup Medical, and the Computer countries, such as the US Patient Protection and Afford- Sciences Corporation’s Healthcare Group use. able Care Act of 2010, encourage the development and The ECR platform’s primary goal is for all providers in use of EHRs/ECRs. the “circle of treatment,” including the general practitio- Due to the federated nature of EHRs/ECRs, security, ner, clinical specialists, and therapists, to share a patient’s privacy, and patient informed consent are key objec- medical data in a single case record during care for a par- tives. However, the complexity of state-of-the-art security ticular injury, condition, or disorder—that is, “the case.” architectures can make their integration with healthcare A case record is opened upon receipt of the patient’s in- provider IT systems prohibitively expensive. Consequently, formed consent and closed upon the patient’s full recovery EHR/ECR providers must strive for innovative, cost- or death. Closing a case record invalidates the informed effective solutions. consent and prohibits further access to the record by those In Germany, the Electronic Case Record Associa- in the circle of treatment. Because access is directly de- tion—an interest group that includes major hospitals rived from the patient’s informed consent, there is no need and clinics, local healthcare associations, and regional to define supplemental restrictions within the case record. healthcare networks—has introduced a new deployment The system grants the permissions to healthcare profes- concept, ECR in a Box, that hides the security and pri- sionals based on their functional roles.

34 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 © 2012 IEEE

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

As Figure 1 shows, the ECR architecture de- Peer 1 Peer2 fines a distributed peer-to-peer platform without central services. Each healthcare provider par- ECR services ECR services User ticipating in the circle of treatment acts as an User Local data Local data ECR peer. This implies that each participant must independently implement all ECR-related Virtually integrated electronic services—authentication, authorization, data case records storage, and so on. These implementations are based on the ECR service stack specification, Local data which defines ECR peer connections to the local infrastructure and to other peers. Peer 3 This federated healthcare environment in- User cludes distinct services (implemented as Web ECR services services), the ECR registry, the ECR repository, and the ECR consumer, all of which are man- aged by an ECR provider—typically a hospital. To Figure 1. Distributed peer-to-peer architecture of the Electronic enable an integrated viewpoint, the ECR provider Case Record Association’s ECR platform. Each provider participating fulfills the role of both data source and mediator: in the circle of treatment acts as an ECR peer, independently imple- menting all ECR-related services. it operates one or more peers that both store med- ical data and return request results from other peers. All peers within the medical circle of treatment are WS-SecurityPolicy for the description of a service’s secu- likewise equal partners in a technical “circle of trust.” rity requirements.4 The security architecture is completely independent of SECURITY ARCHITECTURE the application/business architecture. Security tokens— Because security is a cross-cutting concern, the pri- specifically, digitally signed SAML assertions5—are mary healthcare provider’s ECR system incorporates a transferred solely in the SOAP security header, just as the security architecture to ensure that only medical staff WS-Security standard specifies,6 even for proxy solutions members with the patient’s consent can access protected deployed behind XML gateways. As Figure 2 shows, the medical data. The security architecture’s access control ECR architecture applies several security mechanisms model combines discretionary access control (DAC), role- to protect medical data. This includes authentication and based access control (RBAC), and policy-based access authorization at the service layer, and subsequently the control (PBAC). A white paper published by the nonprofit pseudonymization of the stored data. Furthermore, each Integrating the Healthcare Enterprise (IHE) describes the of the ECR services’ related stored data is technically sepa- underlying security principles in more detail.1 rated to prevent prohibited data aggregation, such as data The communication among different clients and ser- mining and data fusion. vices as well as between the ECR services themselves The security architecture relies on a completely occurs via synchronous end-to-end message exchange decentralized processing paradigm that takes authenti- (unicast) in layer 7 of the Open Systems Interconnection cation for granted. Each peer uses an identity provider (OSI) model. The generic communication pattern between to authenticate healthcare professionals via X.509 two ECR peers is as follows: certificates. Identity providers establish trust by issuing the identity assertions that a service consumer uses to t The client sends a request message to an ECR service demand access to service providers. In the ECR case, and then pauses until service execution. this identity assertion contains the authenticated health- t The ECR service processes the request and executes care professional’s attributes that might be relevant the appropriate operation. for retrieving a patient’s records. The client applica- t The result is returned to the client, which then re- tion subsequently passes the returned assertion and a sumes its activities. patient identifier to a cryptographic service provider. This admission token service creates secret hashes for each To guarantee maximum interoperability healthcare professional attribute concatenated with a between the communicating ECR peers, the ECR archi- patient identifier. tecture uses state-of-the-art standards for its messaging In this peer-to-peer approach, the authentication asser- infrastructure—for example, SOAP and protocols such as tion is forwarded to any other peer that calculates secret WS-SecureConversation to establish security contexts across hashes as well. Admission codes are created for each messages,2 WS-Trust for trusted message exchange,3 and peer and returned to the client application in a second

NOVEMBER 2012 35

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE

by high costs in terms of both time and money. Related Source Protection mechanism concerns include the following: Service Who is allowed to use which view ECR service service? Authentication/ t The implementation and deployment of state-of-the- Authorization art security architectures is not a strong business area Data Who is allowed to assign, for most hospital IT vendors. Given the fact that hos- view combine, read, and write pitals with a long history of systems integration often Transport Access which data? rights Pseudonymization/ deal with vendor lock-in, this could lead to conflicts. Audit logs Administrative segregation/ t The business processes that occur throughout a health Encryption/ record’s life cycle are unique in different healthcare Medical data Digital signature networks. t Hospitals and physicians usually implement unique IT infrastructures. Figure 2. ECR architecture approaches to protect medical t Each of the numerous established vendors of clini- data. cal information systems provide their own interfaces and capabilities. Health Level Seven International SAML assertion—the admission assertion collection—that (HL7), a global organization, writes consensus-based contains further admission assertions from each peer. This healthcare communication standards. Some vendors approach enables pseudonymization because the relation- support standards-based business process control ship between the healthcare professional and the patient via HL7 v2 messages that can be exchanged between is secret: a patient identifier is not needed when working different clinical information systems. on a case record. A peer’s registry service retrieves case records from The ECR’s deployment of business and security services both the local data store and the respective registry service aims for a tight integration between the hospital informa- of the trusted peers. tion system (HIS) and its supporting clinical workflows. Each registry service returns those records that comply A “boxed” implementation of the ECR has been devel- with the admission codes assigned to it. For a healthcare oped by Fraunhofer FOKUS to offer a highly integrated professional to browse a case record’s contents, create ECR solution that supports an easy integration into ex- folders, or request medical data, the service request isting HISs and that encapsulates security aspects and must contain an authorization. Following the principle of issues. Accomplishing this requires a proprietary interface using security tokens with separated concerns, a second between the HIS and the ECR service stack—that is, ven- authorization service must issue another SAML (named dors must provide customer-specific ECR solutions that access assertion) by passing a selected case record iden- individually integrate with HIS subsystems. tifier and an admission assertion to that authorization service. The access assertion has one or more assigned Integrating services access policies that express the access rights that the ECR Because developing customer-specific ECR solutions business services must enforce. The ECR provider must de- can be difficult or even infeasible for some vendors, ECR termine whether the assignment needs an explicit access in a Box addresses these concerns. The platform includes policy. In such a case, either a client application (policy the following: push) or an ECR business service (policy pull) might re- quest an optional policy assertion with an XACML policy t ECR application services come preloaded with security set and enforce it accordingly.7 To guarantee confidenti- services and privacy-enhancing technologies to hide ality, each ECR peer’s document repository encrypts all complexity from both the provider (the hospital) and medical documents before the system transmits them to the client (the physician). Simple programming and the client. webservice interfaces on the client side and a standards- based retrieve, locate, and update service (RLUS) in- ECR IN A BOX terface on the provider side are likewise predefined. The above-described ECR platform provides interfaces Vendors can revert to original interfaces as needed. for both outpatient and inpatient care. But to function t As Figure 3 shows, ECR plugs are the glue between properly in both domains, the underlying technical the RLUS interface and the HIS. Since HL7 v2 mes- architecture must maintain interoperability between the sages are predominantly used in hospitals, ECR office-based and hospital-based IT systems. Integration plugs transform those messages into clinical docu- with primary healthcare IT systems is essential for the ment architecture (CDA) documents and vice versa.8 platform’s overall acceptance, but this might be limited Most healthcare information systems encode new or

36 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

updated medical documents in the medical document management (HL7 v2 MDM) format; they encode all Case record management setup administration patient-related, administrative events (admit, transfer, discharge, and so on) in the admit discharge transfer (HL7 v2 ADT) format. ECR plugs are easy to implement External ECR view with the communication servers that link HIS subsys- ECR ECR plugs Communication tems. Additionally, ECR in a Box provides ECR plugs registry server for most common identity and access management systems as well as IHE cross-enterprise document Internal ECR view sharing (XDS) systems.

ECR Hospital information ECR in a Box handles a case record’s life-cycle manage- registry subsystems ment as well as its contents. The platform is loaded with RIS, LIS, PACS, special HL7 CDA documents that are used as controlling and so on objects to create and update case records, thereby easing Figure 3. Connecting ECR to hospital information systems plug and play. In fact, ECR in a Box’s innovation is that it subsystems. handles file management through CDA documents. This approach is similar to the document engineering approach, in which the exchanged documents control the underlying require special handling as opposed to “generic” business process.9 This moves ECR life-cycle management updates: from the HIS to the ECR platform. A CDA content module is a template for a specific HL7 t Healthcare professionals use case record update con- v3 CDA entity such as a document, section, or entry. The tent modules to update the case record itself, that specified ECR modules are based on IHE PCC (patient is, to upload new documents such as diagnostic care coordination) CDA content modules, in which CDA findings. documents are profiled for their conformance to special t Consent update content modules update patient in- templates.10 Table 1 lists several CDA content modules formed consent. ECR in a Box directly infers access specified for ECR in a Box. rights from these consent documents. We focus here on the two most widely used individual content modules—extracting and updating documents.11 Information object or document metadata cannot be ECR extract documents are used for two purposes and updated; if modifications are needed, the client simply thus come in two variations: sends a new document to ECR in a Box. Just as sent HL7 v3 CDA documents represent operation instructions (“initial- t ECR providers use initial extract documents to create ize new case record,” “read data,” “put new data”), the exact documents, such as the initial case record extract inbound and outbound provider interface must be defined document, which they can send to ECR in a Box to for the CDA’s controlling documents. Consequently, ECR set up a new ECR instance. in a Box’s server-side face must provide an interface for t Healthcare professionals use vital extract documents querying against the information models inside the box as to query ECR in a Box for a given object’s vital extract well: case management and medical data are commonly document, which the platform uses to process an ECR governed by the HIS, not the ECR platform. or a visit’s current content or state. The inbound/outbound provider interface typically uses the following operations: ECR update documents update object properties of visits and case records. ECRs have two defined update content t initialize—send new information objects to ECR in modules because consent and authorization updates a Box;

Table 1. ECR document content modules.

Module Case record Healthcare professional (HCP) visit Information object

Extract document Initial case record extract content module Initial HCP visit extract content module Wrapped non-CDA content module Vital case record extract content module Vital HCP visit extract content module Update document Case record update content module HCP visit update content module Consent update content module

NOVEMBER 2012 37

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE

t put—send updated information objects to ECR in a municated, similar to a service description in WSDL Box; and documents. A semantic signifier’s essential elements t list—fetch one or more information objects from ECR include its name, its description, and a normative data in a Box. structure that describes instances of it—for example, implementation guidelines, schemas, and specifications Every operation has defined request and response mes- for validation.13 sages that carry information to and from ECR in a Box. As the term implies, a specific semantic signifier es- To initialize, maintain, and use the core structural objects tablishes a specific view on the stored ECR data in an found in case records, ECR in a Box accepts messages ECR data back end. The “filling” of a semantic signifier—its that comply with the RLUS service functional model instantiation—with medical data relates to the system’s specification.12 ability to interpret the data. Generally, two types of sys- The ECR-specific inbound/outbound provider interface tems identify the extent to which an RLUS implementation supports a core subset of the functionalities defined in can interpret medical data: the RLUS specification; specifically, ECR in a Box requires HL7 v3. Additional ECR plugs that convert messages in t A content agnostic implementation cannot interpret the data. This is analogous to an IHE XDS.b document repository, in which a document from an inquiring ECR in a Box provides a highly system—say, an XDS.b document consumer—is re- integrated software or hardware trieved solely by using a document identifier. A system solution that supports easy integration behaves similarly when the data is encrypted and into existing HISs and encapsulates must be decrypted by a third party. To allow a search security features. on such data (content independent), metadata must be associated with it. t In contrast, content-aware systems can interpret or outdated formats might support older HL7 versions. Using analyze a database. These systems are character- HL7 messages to couple the ECR with the internal IT infra- ized by data that is collectable and transferable into a structure requires mapping the internal record structure return type defined by a semantic signifier. In other to the ECR structure. This is accomplished by means of words, complex queries for specific data are possible. semantic signifiers. Data warehouse systems with data mining and online analytical processing have this capability. Medical Semantic signifiers ontologies might also be used. Medical and administrative data transferred between ECR in a Box and ECR plugs must be described both se- Although ECR in a Box currently processes a handful mantically and structurally: of information types—see the ECR content modules in Table 1—future implementations should be able to return t For interoperability with RLUS services, a classifi- aggregated data. cation and description of the returned data must be available to enable its further processing. Off-the-shelf deployment t Requested data from ECR in a Box must be identifi- ECR in a Box provides a logical combination of technical able and transferable in an appropriate return type. components that can be used for both software and hard- The return type does not necessarily need to be the ware implementations. For example, Fraunhofer FOKUS same as the storage type, but its requestors should implements the ECR in a Box concepts using an XML gate- have defined it. way to offer t Ideally, search requests and filters should not be aligned against generic metadata but rather against t service virtualization, specific information models. t dataflow control, t event and access attempt auditing, The RLUS specification provides a flexible means t integrity verification and confidentiality enforcement of querying data. So-called semantic signifiers spec- on exchanged data, and ify the RLUS messages that ECR in a Box processes, t integrated hardware modules. defining the syntax and semantics of the data that is to be exchanged via the message: with semantic signi- Going forward, additional ECR implementation could be fiers, a service provider can make statements about the virtualized using XML gateways, such as the ECR applica- message’s content and structure that should be com- tion architecture or metadata management.

38 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

The client-side counterpart of ECR in a Box is the ECR connector. Just as ECR in a Box fa- ECR provider cilitates the integration of HIS subsystems, the ECR box ECR connector simplifies the connection of CDA processor ECR HIS RLUS plugs client-side systems. As Figure 4 shows, the ECR ECR service stack HL7Msg Connector implements various webservice secu- rity mechanisms defined by ECR specifications, transparently setting up secure ECR in a Box ses- Healthcare professional IT infrastructure sions via WS-SecureConversation and handling ECR box all security tokens such as authentication and ECR provider 2 WAN ECR connector authorization for service invocations. It is not SOAP (WS-Security necessary for a physician’s desktop system to with SAML 2.0) Physician’s desktop system process ECR security-related tokens because the ECR connector encapsulates that task. The ECR connector can be used both as a soft- Figure 4. ECR in a Box and the ECR connector serve as enablers for a secure and trustworthy data exchange between HIS and a resident ware library and as a hardware box with a SOAP physician’s IT. interface. Other approaches for using the ECR connector incorporate a Web-distributed author- ing and versioning (WebDAV) interface or printer drivers such as those used in the US or other countries in Europe. with text recognition. For example, HL7 CDA referral let- In the US, the Nationwide Health Information Network ters might be used as an active control object to create a (NHIN), now called eHealth Exchange, created a specifica- new case record. Additionally, to register the document, tion for a messaging platform that allows health-related the physician’s desktop system can upload it into special information exchange. The NHIN and ECRs share the same WebDAV folders or it can print them via a virtual printer, architectural principles, such as decentralization, local which might be necessary if the primary HIS does not sup- autonomy, and service orientation. Both specifications also port direct document export. rely exclusively on open standards. Table 2 highlights other similarities and differences. A COMPARISON The ECR is primarily a Table 2. Comparison of the US Nationwide Health Information Network and Germany’s ECRs. German construct for which there is no comparable system Feature NHIN ECRs in most countries. The ECR Audience platform is dedicated to re- Healthcare consumer X -- gional health networks with Healthcare provider X X the purpose of better treat- Purpose of use General health information Strictly case-related ment for patients receiving care from various healthcare Services providers. In Germany, in- Pseudonymized records -- X formation exchange among Patient/record discovery X/-- --/X health information organiza- Query for available documents X X tions is subject to regulation Retrieve documents X X and very restricted. Thus, the Health information event messaging X -- case record has a dedicated use and a limited set of users. Document-based control -- X From the data protection per- Security spective, the ECR concept is Webservice-based message security X X widely accepted because no Authorization framework X X queries on stored data reveal Federated health information XX the entirety of a patient’s data. exchange (federated identity) Only a limited set of users Requester authorization X X who have received consent Policy-based access control X X can retrieve case records. This System security categorization Moderate High separates the ECR from other sharable EHR approaches, Audit trail X X

NOVEMBER 2012 39

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE

urrently, ECR in a Box has proved to be valuable on 2. A. Nadalin et al., “WS-SecureConversation 1.3,” Oasis, 2007; the ECR provider side, but future work will focus http://docs.oasis-open.org/ws-sx/ws-secureconversation/ C on enabling physicians on the client side to make 200512/ws-secureconversation-1.3-os.html.______semantic queries via the ECR connector. This will increase 3. A. Nadalin et al., “WS-Trust 1.3,” Oasis, 2007; http://docs. oasis-open.org/ws-sx/ws-trust/200512/ws-trust-1.3-os. the quality of communicated data and demonstrate the html.___ advantages of using a content-aware system at the docu- 4. A. Nadalin et al., “WS-SecurityPolicy 1.2,” Oasis, 2007; http://___ ment level. docs.oasis-open.org/ws-sx/ws-securitypolicy/200702/______Other work also must be done on secure rendering ws-securitypolicy-1.2-spec-os.html.______of case records when using mobile devices, which is be- 5. J. Kemp et al., “Authentication Context for the OASIS Se- coming increasingly more common in the medical field. curity Assertion Markup Language (SAML) v2.0,” Oasis, 2005; http://docs.oasis-open.org/security/saml/v2.0/saml-______Fraunhofer FOKUS is likewise investigating emerging authn-context-2.0-os.pdf.______Web security trends such as JSON data structures14 and 6. A. Nadalin et al., “Web Services Security: SOAP associated JSON security profiles (addressing signatures Message Security 1.1,” Oasis, 2006; www.oasis-open. and encryption) and their suitability for the ECR security org/committees/download.php/16790/wss-v1.1-spec-os- architecture. Thus, JSON simplifies and enables the usage ______SOAPMessageSecurity.pdf.______of mobile devices and establishes a second, secured com- 7. “eXtensible Access Control Markup Language (XACML) munication protocol next to SOAP. v2.0,” Oasis, 2005; http://docs.oasis-open.org/xacml/2.0/ access_control-xacml-2.0-core-spec-os.pdf.______8. Corepoint Health, “The HL7 Evolution Comparing HL7 References Version 2 to Version 3, Including a History of Version 1. J. Caumanns et al., “IHE IT-Infrastructure White Paper, 2,” white paper, 2010; www.corepointhealth.com/sites/ Access Control,” IHE Initiative, Sept. 2009; www.ihe.net/ default/files/whitepapers/hl7-v2-v3-evolution.pdf.______Technical_Framework/upload/IHE_ITI_TF_WhitePaper______9. R. Glushko and T. McGrath, Document Engineering: Analyz- AccessControl_2009-09-28.pdf.______ing and Designing Documents for Business Informatics and Web Services, MIT Press, 2005. 10. “Patient Care Coordination,” IHE Wiki, July 2012; http://____ wiki.ihe.net/index.php?title=Patient_Care_Coordination.______11. “IG:CDA für die elektronische Fallakte,” HL7 Wiki, Mar. 2012; http://wiki.hl7.de/index.php/IG:CDA_ f%C3%BCr_die_elektronische_Fallakte.______12. “Retrieve, Locate, and Update Service (RLUS) Specification, v.1.0.1,” OMG, July 2011; www.omg.org/spec/RLUS/1.0.1/ pdf. 13.“ISO/IEC 19757-3:2006 Information Technology—Doc- ument Schema Definition Language (DSDL)—Part 3: Rule-Based Validation—Schematron,” Int’l Org. for Stan- dardization, Jan. 2010; www.iso.org/iso/iso_catalogue/ *&&&0QFO"DDFTT catalogue_tc/catalogue_detail.htm?csnumber=40833.______14. D. Crockford, “The Application/JSON Media Type for Java- Script Object Notation (JSON), RFC 4627,” IETF, 2006; Unrestricted access to today’s groundbreaking research http://tools.ietf.org/html/rfc4627. via the IEEE Xplore® digital library Raik Kuhlisch is a researcher at Fraunhofer FOKUS, where he works on IT security and Semantic Web technologies IEEE offers a variety of open access (OA) publications: related to healthcare issues. Kuhlisch received an MS in computer science from the University of Hagen, Germany. t)ZCSJEKPVSOBMTLOPXOGPSUIFJSFTUBCMJTIFEJNQBDUGBDUPST Contact him at [email protected].______t/FXGVMMZPQFOBDDFTTKPVSOBMTJONBOZUFDIOJDBMBSFBT Ben Kraufmann is a researcher at Fraunhofer FOKUS. His t"NVMUJEJTDJQMJOBSZPQFOBDDFTTNFHBKPVSOBMTQBOOJOHBMM research interests include IT security in distributed systems *&&&mFMETPGJOUFSFTU and XML technologies. Kraufmann received a diploma in Discover top-quality articles, chosen by the IEEE peer-review computer science from the Free University of Berlin, Ger- standard of excellence. many. Contact him at [email protected].______Hannes Restel is a researcher at Fraunhofer FOKUS. His Learn more about IEEE Open Access research interests include interoperability, IT security, and www.ieee.org/open-access the Semantic Web. Restel received an MS in computer sci- ence from the Free University of Berlin, Germany. Contact him at [email protected].______

40 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

______

______

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE Fusion: Managing Healthcare Records at Cloud Scale

Sujoy Basu, Alan H. Karp, Jun Li, James Pruyne, Jerry Rolia, Sharad Singhal, Jaap Suermondt, and Ram Swaminathan, HP Labs

An experimental open, cloud-based plat- have stringent requirements because of the sensitive form for large-scale, low-cost delivery of nature of the data involved, business-critical demands, healthcare applications enables broader regulatory constraints, and the need to securely and seamlessly share data among multiple parties including use of patient-centric management of healthcare providers, payers, government agencies, and electronic health records and facilitates patients. the secure and seamless sharing of EHRs Fusion is an experimental open, cloud-based platform among stakeholders within a healthcare for securely managing and sharing healthcare informa- system. tion at large scale that aims to reduce the cost of adopting EHRs. It also offers new opportunities to develop applica- tions that can leverage EHR data to improve quality of care, ealthcare forms a large and growing segment healthcare efficiency, and treatment outcomes. of the world economy,1 and providers are under significant pressure to reduce costs by intro- FUSION FEATURES AND BENEFITS H ducing automation, which has led to a focus on Figure 1 shows the Fusion platform’s scope. Small the deployment of electronic health records (EHRs). The clinics, hospitals, payers, and other stakeholders in a Health Information Technology for Economic and Clinical healthcare system interact with Fusion to upload or access Health (HITECH) Act, part of the American Recovery and data for patient care and potentially for research. Service Reinvestment Act (ARRA) of 2009, is an example of how interfaces provide access for developers to create new governments are increasingly providing incentives for applications and link EHR systems to exchange data. healthcare providers to move toward using EHR systems in patient care. Features In many settings, small-scale providers are typically a Fusion has several key features. patient’s first point of contact with a healthcare system. Low cost and large scale. Fusion is architected to scale The use of EHRs in these settings is thus essential to horizontally to keep costs low for the cloud service pro- achieving the technology’s oft-touted benefits. However, vider, healthcare providers, and patients. Given that EHR the substantial IT cost and expertise required to implement applications are business critical, the platform is also such systems has limited their adoption. designed to be highly available and reliable. Cloud-based platforms are ideally suited for delivering Secure data protection. Patient data must be stored IT applications because they offer substantial scalability, securely and protected for a very long time. The Fusion agility, and cost advantages. However, EHR applications architecture includes mechanisms to enable security,

42 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 © 2012 IEEE

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

privacy, and auditability of accesses to med- Value-added applications/ ical records. services Seamless, decentralized data sharing. Disparate healthcare providers can use Analyzing Fusion to directly store patient records and data Developers securely share this data with other stake- Hospital Service Service APIs Storing Fusion Sharing APIs holders. Fusion also supports the integration data data of EHR environments that store data in their own formats, and provides mechanisms to Web portal/SaaS allow managed sharing of aggregated data. applications Pharmacy Patient empowerment. Patients can use Fusion to view their own EHRs, regardless of Medical researchers which provider generated them, and grant access to all relevant members of the health- care team managing their treatment. Primary care Laboratory Patient/ Specialty family Benefits care Fusion provides multiple benefits to stakeholders. Figure 1. Fusion platform. Stakeholders within a healthcare system Patients. Fusion monitors patients’ interact with Fusion to upload or access data for patient care and poten- complete health history, improving their tially for research. Service interfaces provide access for developers to create new applications and link EHR systems to exchange data. quality of care and treatment outcomes. It also protects patient privacy by controlling the release of medical data, ensuring that such data has tion hurdles that healthcare IT systems face when opting not been subject to unauthorized use. And with Fusion, for a cloud-based EHR solution. patients have anytime, anywhere access to their health records. Cloud-based delivery model Providers. Fusion enables on-demand, real-time The cloud-based delivery paradigm is inherently a access to health data and aggregated knowledge derived volume model that relies on shared resources to drive from such data, resulting in better treatment decisions down cost. To encourage wide adoption, Fusion must scale and facilitating collaboration among providers during out horizontally while keeping operational costs low. The treatment. It also contains mechanisms to ensure com- platform is designed to handle up to 1 billion patients, pliance with regulatory requirements using a common, 10 million practitioners, and 100 billion or more individual secure platform that supports best practices. Individual health records, with an affordable cost per patient and healthcare IT departments can thus avoid the cost of per provider. In practice, depending on the scale and trust duplicating the necessary enforcement infrastructure model assumed in the implementation, Fusion could be while demonstrating appropriate use of healthcare data used in public, private, or hybrid clouds. when disputes occur. Fusion reduces the risk to the pro- vider of releasing data by managing access to centrally Balance of security, privacy, stored records, rather than transferring copies of the and ease of data sharing records themselves. Health records contain extremely sensitive personal Payers. Patients and providers can use Fusion to information and thus pose strong privacy concerns. Any securely and efficiently grant access to medical records EHR system must comply with various regulatory poli- such as procedures, tests, clinical notes, and prescriptions cies regarding the handling of such information. In the for claim adjudication, accelerating claims processing US, for example, the Health Insurance Portability and while ensuring claim integrity and preventing errors. Accountability Act (HIPAA) and the HITECH Act define Developers. Fusion provides open APIs that developers strict guidelines and specify the technical and method- can use to create, integrate, and provision existing and ological safeguards required to protect medical data. new applications and services that conform to Fusion’s Different stakeholders must be able to use Fusion to security and privacy protection standards. leverage common security and privacy protection technol- ogy, best practices, and knowledge offered by the cloud ARCHITECTURAL REQUIREMENTS service provider to meet compliance requirements. At Fusion’s innovative approach to managing and sharing the same time, healthcare practitioners need lightweight, healthcare data addresses significant technical and adop- transparent, and trustworthy mechanisms to share data

NOVEMBER 2012 43

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE

FUSION ARCHITECTURE Healthcare applications Figure 2 shows Fusion’s layered Patients Healthcare providers Medical research Payers architecture. The infrastructure layer contains Appointments, Administration, referral/ Billing, payments, prescriptions, wellness consultation, discharge Data mining, analysis claims adjudication building blocks such as a store for health management, treatments summaries, clinic notes records; a messaging and communica- Third-party application/ tions framework for interactions among Common data policy management service support healthcare providers; a compute frame- De- Consent/ Account Application work for processing data management identification notification Privacy Governance management store tasks, including data encryption, data Auditing Authorization Authentication Collaboration Billing Provisioning retention, and data analyses; and a workflow execution and management Migration Replication Retention Context Assurance Monitoring mechanism to manage cross-provider, Infrastructure services process-driven collaboration. These build- ing blocks are available in most public,

Common cloud services Data exchange (ontology, federation, Workflow/process execution and data models) management private, or hybrid cloud offerings, or devel- Scalable messaging and communication opers can build on them using appropriate Scalable event notification framework framework software components. Scalable compute framework (synchronous, asynchronous) Above the infrastructure layer, Fusion contains a common data policy Scalable store (files, objects, relational data) management layer, where the system handles issues including authoriza- tion, authentication, access control, Figure 2. Fusion’s layered architecture. auditing, data retention, and consent/ notification for privacy protection. Be- without compromising security and privacy. Furthermore, cause regulations and cloud models vary widely,2,3 security mechanisms must not interfere with normal clini- the policies in this layer must be specific to the geo- cal workflows. graphic region or type of cloud environment where Fusion is deployed. We assume that covered enti- Collaborative data sharing ties (such as doctors) will act in accordance with The Fusion architecture must facilitate a collaborative existing security requirements, regulatory policies, environment where participating healthcare providers can and best practices. While Fusion does not address all seamlessly share data and best practices while respect- aspects of regulatory compliance, such as administra- ing patients’ preferences and consent policies. To enable tive requirements, it provides a common platform to evidence-based medicine and take advantage of derived capture best practices and share them across users. common knowledge, it must allow for the consolidation Also above the infrastructure layer, Fusion exposes of de-identified patient information across providers to functions such as billing, provisioning, and discovery support analytics applications. as service APIs with developer tools to support the easy integration of various third-party healthcare-specific appli- Patient centricity cations. We envision Fusion as a next-generation platform All healthcare data related to a given patient should for existing EHR vendors as well as for novel applica- be accessible to that patient, regardless of its origin. At tions that leverage Fusion’s capabilities to assist medical the same time, patients should not need to be involved in researchers, payers, and regulatory bodies. day-to-day decisions about sharing data among providers. Finally, Fusion’s domain application layer integrates Thus, Fusion should provide direct value to patients while EHR applications targeted at patients, providers, payers, also being easy for healthcare practitioners to use. researchers, and other stakeholders. Our research focuses on the common data policy Openness to third-party service providers management layer. In particular, this layer has two main Given the high degree of fragmentation among stake- subsystems: the Fusion Store, for large-scale secure man- holders in a healthcare system, the service platform should agement of EHRs to support regular patient care; and the have the flexibility to allow organic growth as needed by Fusion Data Share, for aggregating de-identified data to accommodating applications from diverse third-party support applications such as healthcare analytics, peer- application developers. In other words, Fusion should have comparison studies, and research that require sharing data an open and not a monolithic closed architecture. more broadly across the healthcare system.

44 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

SECURE HEALTH DATA

MANAGEMENT Patient N0 L0 Central to the Fusion architecture is L L0 0 L0 the need to securely and efficiently store L1 L3 L2 N L N L N L patients’ health records and to enable sharing Provider 1 1 2 2 3 3 them in accordance with regulatory policies L L 2 and the consent and notification require- 1 L K L L 1 6 Key 2 2 K K K’ K ments of individual providers and patients. 4 N 5 N rotation 6 7 4 5 N N’ N The Fusion Store combines cloud-based K 6 6 7 … K K 6 K’ K data storage with data encryption and 4 5 6 7 4 K’ authorization-based access control to pro- 6 K7 K K K vide a highly secure and privacy-protected 6 K 10 18 K 6 8 N K N N environment to manage EHR data. Fusion’s 8 9 9 10 N18 K K K data access protocols provide patients with 8 9 10 K18 the ability to access all of their own health records, as well as to authorize others to access their records, while allowing pro- viders to easily and securely share data Encrypted data records without the patient’s constant participation or intervention. Figure 3. The Fusion Store links a patient’s encrypted records together Protecting data at rest using metadata arranged as a tree hierarchy that is also encrypted. Lock- The Fusion Store uses a record-oriented boxes on each node store the encryption keys, while the lockbox itself is encrypted using the key stored in the parent’s lockbox. data organization scheme in which each data record is encrypted with a unique key.

Encryption keys also serve as authorization tokens, thus Setup. Each patient maintains a root secret L0, pos- allowing a person (or application) that has the keys to sibly stored on a secure personal device such as a smart

create or read the corresponding records. A patient’s re- card. When visiting a provider Pi, the patient presents the

cords are linked together using metadata arranged as a secure device as part of the process of registering with Pi, tree hierarchy that is also encrypted. The Fusion Store which in turn generates a provider-specific shared secret 5 uses a journaling mechanism to make metadata and data Li that is derived from L0 and unique to Pi. In Figure 3, for

records immutable and appends new metadata and data example, Pi could derive Li for i = 1,2,3 from L0 as Li =

records during updates. H(L0, NIi), where H is a one-way cryptographic hash func-

As Figure 3 shows, the metadata tree’s first two levels tion and NIi is the ith provider’s national identifier. With represent patients and providers, while the leaves contain this scheme, patients can access all of their records with

pointers to the actual data records as well as the keys used L0, while Pi need only maintain a single key, Li, for each to encrypt and decrypt the data records. Lockboxes on each patient. The Fusion Store itself has access to none of these node of the metadata tree store the encryption keys. The keys and thus no visibility into either the metadata tree or lockbox itself is encrypted using the key stored in the par- the stored data records.

ent’s lockbox. For example, the lockbox at N6 is encrypted Storing data. Providers add new records to the Fusion

using L2. The Fusion Store uses this lockbox’s content—that Store by encrypting them with their corresponding keys.

is, K6—to encrypt the lockbox at node N8. Thus, given a key In Figure 3, for example, when P2 wants to store a data

to node v’s lockbox, one can decrypt the lockbox’s contents record linked to N8, it opens the lockboxes recursively

and recursively use these contents to access encryption from N2 to N8, reads the encryption key K8, and encrypts

keys for v’s children. the data record with K8. Delegating access. Providers delegate access to records Secure key management and delegation in a subtree by sharing the key contained in the lockbox The Fusion Store uses a novel approach to managing of the subtree’s root. The delegatee can then recursively encryption keys and delegating access to data records. obtain access to the metadata and data records in the Each provider owns and manages a subtree between the subtree.

metadata tree’s root and leaves. In Figure 3, for example, Revoking access. In Figure 3, suppose provider P2

provider P1 owns and manages the subtree rooted at N1. wishes to revoke delegated access to, say, provider P3 after Thus, a provider can selectively share patient records with the patient completes a course of treatment. Because both other providers by sharing the lockbox keys in its subtree. providers have valid access to existing records, the Fusion

NOVEMBER 2012 45

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE

Security and privacy within the cloud. Since High-level Admission Detection Treatment Discharge Follow-up patient flow all data residing in the cloud is encrypted, and the Fusion Store by itself cannot decrypt the Clinical Team 1 Team 2 Team 5 Team 4 Team 3 Team 1 data, the security and privacy of data at rest Team 4 teams Team 3 Team 1 Team 2 Team 2 are guaranteed. Simple management of encryption keys. ACE inhibitor Medical guideline Discharge Education guidelines The patient maintains a single secret, and Admission guideline guideline Beta blocker triggered each provider maintains a single key for each CT scan guideline guideline patient. All other necessary keys are either EHR in context derived from these secrets or recovered from lockboxes at the metadata tree’s nodes. This Alternative EHR 1 EHR 2 treatment reduces the overhead of secure key manage- queries ment for patients and providers. De-identified data Seamless sharing of healthcare data. A Fusion Store Fusion Data Share patient can access all treatment data once providers release it into the cloud. Similarly, providers can share data without involving the Figure 4. Healthcare applications interact via the Fusion Store and patient and ensure that only relevant data is Fusion Data Share systems. shared. Simple access revocation. Using key rota- Store does not terminate access to those records, but only tion and lazy revocation, the Fusion Store balances the to records created after the relationship ends. continuing need for retroactive access to records, while The challenge is to generate new versions of encryption terminating access to new records that should no longer keys such that old records can still be decrypted using the be visible to unauthorized providers. new keys while newly encrypted records are unreadable using the old keys. The Fusion Store solves this problem by DATA MODELING AND INTEGRATION rotating the old keys in a cryptographically secure manner A fundamental tenet of Fusion is that it provides an to obtain new keys; to prevent reuse of old keys, it relies open environment for applications to store and share on lazy revocation, wherein rotation of a key terminates healthcare-related information. Healthcare applica- access to new records by providers using the old keys.6 tions typically have their own data types and formats,

In Figure 3, for example, suppose provider P2 revokes but also need to share information with other applica-

delegated access by provider P3 and rotates the old version tions. Because the Fusion Store neither imposes nor

of key K6 to K´6 at node N6. It inserts node N10 after key rota- provides any structure for the data records it stores,

tion and encrypts its lockbox with K´6. If P2 now shares K´6 data integration in Fusion must address disparate data

with P1, provider P1 can decrypt the lockbox at N10, rotate sources and sinks.

K´6 back to K6, and use K6 to obtain access to old records. As an example of these diverse, integrated appli-

However, P3 cannot rotate K6 forward to obtain K´6 and thus cations, consider Figure 4, which shows the path of a

cannot access node N10. patient who interacts with multiple healthcare provid- Asymmetric encryption keys make it possible to se- ers including clinical teams of doctors, diagnostic test curely separate permissions necessary to read records centers, and a pharmacy. In these interactions, the from those necessary to create records. patient is the only entity that is constantly involved in all steps. The figure shows the patient’s EHRs from the Fusion Store benefits different teams being submitted to the Fusion Store. This The Fusion Store primarily deals with the secure stor- information can then provide context to subsequent age and sharing of data, and toward that end provides the teams for decision making—for example, for selecting following benefits in the context of a cloud-based EHR. high-level clinical pathways, guidelines, and progress Additional components such as auditing and consent/ of care or for reducing the communication needed to notification that are necessary for meeting regulatory coordinate care. compliance are subjects of future research. Application developers and integrators use Fusion’s Secure navigation of patient health data. A consult- data-modeling tools to define data formats that they pro- ing healthcare provider can browse a patient’s history duce and consume. Fusion’s data-modeling approach is represented in the metadata tree and ask for permission to object-oriented and uses common tools, techniques, and access certain data records from other providers without terminologies found in other data-modeling environments being able to see the rest of the data records. such as the Unified Modeling Language.

46 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Fusion’s data modeling process has a threefold role. Figure 4 illustrates use of the Data Share in support First, it provides a core model for sharing information of an evidence-based healthcare application.7 Such an among multiple healthcare applications. Fusion’s data application combines information about a patient under model defines concepts common to various EHR applica- study with de-identified data from other patients with a tions and is built upon existing relational models used in similar demographic and health history to assess and EHR systems and controlled vocabularies such as SNOMED prioritize various medical options. While patients have an CT (www.ihtsdo.org/snomed-ct), ICD-9-CM (www.cdc.gov/ incentive to share their data to improve their own treat-

nchs/icd/icd9cm.htm),______and LOINC (http://loinc.org). Fusion’s ment outcome, data sharing across a large population of modeling tools support vocabulary transformations like patients will also benefit providers, medical researchers, those defined in the Unified Medical Language System pharmaceutical companies, public health agencies, and (UMLS) Metathesaurus (www.nlm.nih.gov/research/umls/ commercial or government payers by helping them to knowledge_sources/metathesaurus/index.html).______The core address systemwide concerns including effectiveness, model also captures common concepts supporting third- safety, efficiency, productivity, patient satisfaction, and party applications such as billing, provisioning, and asset health service coordination and integration. management. Second, while Fusion’s core concepts allow interoper- ability, the object-oriented data modeling process enables Data sharing across a large population extensions for specific EHR applications. Developers can of patients will also benefit providers, easily build upon existing models in Fusion or introduce medical researchers, pharmaceutical entirely new ones. companies, public health agencies, and Third, Fusion’s data models provide a means of discov- commercial or government payers. ering how applications represent data, helping developers to logically present information residing within the system. The open models support a naturally evolving environ- RELATED WORK ment for new services. The current EHR market is relatively fragmented, with With Fusion’s data modeling approach, creating or in- no single dominant player.8,9 About half a dozen commer- tegrating services is typically a two-step process. First, cial systems provide functionality that they have developed the developer determines which parts of the existing, and refined over many years. These systems have typically predefined data models it will work with and what exten- focused on the data sharing and interoperability needs sions or new concepts to introduce. Fusion accordingly of hospitals or large outpatient clinics, although increas- makes all new models available to other participants in the ingly they are serving smaller clinics as well. In addition, healthcare system. The service then uses the APIs defined several open source EHR products are available as well within Fusion to retrieve the required EHR data. as a growing number of cloud-delivered offerings from emerging vendors. DATA SHARING In the US, the development of regional and nationwide To build a knowledge base from each patient’s en- health information exchanges10 with common standards, counter with healthcare providers and thereby increase services, and policies has been a goal for decades, with efficiency, improve treatment outcomes, and reduce costs, significant research funding by the Department of Health Fusion makes de-identified data from the Fusion Store and Human Services. For example, HHS has supported available to applications via the Data Share. creation of the UMLS and various regional health informa- The Data Share relies on Fusion’s common data policy tion organizations and networks. The HITECH Act offers management mechanisms (see Figure 2) to manage data major financial incentives for providers to enable sharing access and sharing. In particular, it relies on the de- of EHR information but, except for vertically integrated identification service for moving data from the Fusion providers or in some cases providers with the same EHR Store to the Data Share and the authorization and authen- vendor, there is still little interoperability among systems tication services for access control. Fusion can provide used by clinics and hospitals, with most independent pro- explicit means for obtaining patients’ consent for second- viders continuing to share patient records through printed ary use of their records when they register with a provider, or faxed documents. simplifying the consent/notification process. Unlike data There have been a few cloud-based, consumer- in the Fusion Store, the Data Share’s de-identified data is controlled personal health record (PHR) systems on the more broadly sharable, and thus has less stringent security market, including Microsoft HealthVault (www.microsoft. requirements. Data mining and analysis applications can com/en-us/healthvault) and Google Health (discontinued directly retrieve and process the data either offline or using in 2011), but they have had limited success and adoption. compute and storage facilities offered by cloud providers. In addition, many commercial EHR vendors now offer

NOVEMBER 2012 47

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE

so-called tethered PHRs that are essentially patient- References facing views of their internal EHRs. Patients using these 1. Centers for Medicare and Medicaid Services, “National systems can view information released by their doctors Health Expenditure Data,” 11 Apr. 2012; www.cms.gov/ and in some instances supplement it with information NationalHealthExpendData.______they enter themselves. However, tethered PHR systems 2. Office of the Nat’l Coordinator for Health Information Tech- nology, “HITECH Programs,” 27 Jan. 2011, US Dept. Health usually do not allow the integration of data originating and Human Services; http://healthit.hhs.gov/portal/server. from multiple vendors or even institutions, nor do they pt/community/healthit_hhs_gov__hitech_programs/1487.______let patients manage the sharing of information among 3. “Directive 95/46/EC of the European Parliament and other stakeholders. All PHR service providers have vis- of the Council of 24 October 1995 on the Protection of ibility into all patient data, and thus cannot guarantee Individuals with Regard to the Processing of Personal the degree of control over security and privacy that Data and on the Free Movement of Such Data,” Official J. Fusion offers. European Communities, no. L 281, 23 Nov. 1995, pp. 31-39; http://ec.europa.eu/justice/policies/privacy/docs/95-46-ce/ Practice Fusion (www.practicefusion.com) and Care- dir1995-46_part1_en.pdf.______Cloud (www.carecloud.com) are EHR products that use 4. J. Li and A.H. Karp, Zebra Copy: A Reference Implementation a cloud model, but the cloud encrypts data and manages of Federated Access Management, tech. report HPL-2007- keys, enabling the service provider to see all the EHR data 105, Hewlett-Packard Development Co., 2007; www.hpl. hosted in its environment. hp.com/techreports/2007/HPL-2007-105.html. PatientsLikeMe (www.patientslikeme.com) lets users 5. M. Rosenblum and J.K. Ousterhout, “The Design and Im- plementation of a Log-Structured File System,” ACM Trans. join a social network of patients with the same disease Computer Systems, Feb. 1992, pp. 26-52. or disorder. They disclose the details of their condition 6. M. Kallahalla et al., “Plutus: Scalable Secure File Sharing on voluntarily to the network, encourage each other during Untrusted Storage,” Proc. 2nd Usenix Conf. File and Storage care, and share their own perspective when another Technologies (FAST 03), Usenix, 2003, pp. 29-42. patient in that group needs to make a decision such as 7. T.E. Love et al., “Electronic Medical Record-Assisted Design which treatment option to choose. of a Cluster-Randomized Trial to Improve Diabetes Care and Outcomes,” J. General Internal Medicine, Apr. 2008, pp. 383-391. 8. C.-J. Hsiao et al., “Electronic Medical Record/Electronic usion is an experimental open, cloud-based platform Health Record Use by Office-Based Physicians: United for large-scale, low-cost delivery of both exist- States, 2008 and Preliminary 2009,” Centers for Disease F ing and newly developed healthcare applications. Control and Prevention, Dec. 2009; www.cdc.gov/nchs/ It enables broader use of patient-centric management data/hestat/emr_ehr/emr_ehr.htm.______of electronic health records and facilitates the secure 9. T.J. Handler, Magic Quadrant for Global Enterprise EHR and seamless sharing of EHRs among stakeholders in Systems, industry research report G00214841, 6 Sept. 2011, Gartner. a healthcare system, protecting patient privacy while 10. Office of the Nat’l Coordinator for Health Information improving system efficiency, treatment outcomes, and Technology, “Nationwide Health Information Network quality of care. Exchange,” 16 May 2012, US Dept. Health and Human Ser- Although Fusion’s design is agnostic to the choice of the vices; http://healthit.hhs.gov/portal/server.pt/community/ underlying cloud infrastructure, we are building a research healthit_hhs_gov__nhin_exchange/1407.______prototype on HP Cloud Services to demonstrate its feasi- bility. Thus far, we have prototyped major architectural components to validate the data access protocols, includ- Sujoy Basu is a senior scientist at HP Labs, where he ing encryption key generation from the metadata tree has worked on Web services, distributed computing, structure, key rotation, and key revocation. Preliminary networking, multimedia content distribution networks, studies indicate that Fusion can meet expected perfor- and processor and system architecture. Basu received a PhD in computer science from the University of Illinois at mance and cost targets. Urbana-Champaign. He is a senior member of IEEE and We have started integrating several existing open source ACM. Contact him at [email protected]. EHR applications—notably Oscar (www.oscarcanada.org), Alan H. Karp is a principal scientist in the Intelligent Infra- OpenMRS (http://openmrs.org), and OpenEMR (www.____ structure Laboratory at HP Labs, where he is conducting open-emr.org).______Because these applications have existing research on the resilience of distributed applications at data models in the form of relational database schemas, scale. He also heads the Virus Safe Computing Group, we have incorporated concepts within these applications which implements usable security. Karp received a PhD into data models to explore the modeling tools necessary in astronomy from the University of Maryland. He is a for Fusion. We have also developed bridges between the member of the IEEE Computer Society, ACM, the American relational stores and the Fusion Store to transfer medical Astronomical Society, and the International Astronomical records between them. Union. Contact him at [email protected].

48 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Jun Li is a principal scientist at HP Labs. His research focuses IEEE and the Acoustical Society of America. Contact him on large-scale policy-aware data management frameworks at [email protected]. to ensure correct management of business-critical data Jaap Suermondt is the director of healthcare research at in the cloud computing environment. Li received a PhD in HP Labs. His research spans analytics, electronic health computer engineering from Carnegie Mellon University. records, personalization, data mining, storage and informa- Contact him at [email protected]. ______tion management, decision support systems, patient safety, James Pruyne is a senior scientist at HP Labs, where and operational efficiency. Suermondt received a PhD in his work focuses on developing methods for monitoring medical information sciences from Stanford University and managing distributed environments, starting with School of Medicine. He is a Fellow of the American College client-server systems and evolving to service-oriented ap- of Medical Informatics. Contact him at ______jaap.suermondt@ proaches. Pruyne received a PhD in computer sciences from hp.com. the University of Wisconsin-Madison. Contact him at ____james. Ram Swaminathan is a senior scientist at HP Labs. His [email protected]. research interests include mathematics, especially linear Jerry Rolia is a principal scientist in the Services and So- algebra; combinatorial optimization; cryptography; and lutions Research Lab at HP Labs. His research interests complexity theory. He has also actively worked on network- include cloud computing, healthcare information systems, ing and storage systems. Swaminathan received a PhD in capacity management, and performance engineering. Rolia computer science from Purdue University. He is a member received a PhD in computer science from the University of of the Mathematical Society of America, the American Toronto. Contact him at [email protected]. Mathematical Society, and the Society for Industrial and Applied Mathematics. Contact him at ______ram.swaminathan@ Sharad Singhal is a distinguished scientist at HP Labs. His hp.com. research interests include speech and video processing, neural networks, middleware, and personal communica- tions services. Singhal received a PhD in engineering and Selected CS articles and columns are available applied science from Yale University. He is a member of for free at http://ComputingNow.computer.org.

Corporate Affiliate Program Increases technical training while cutting costs.

Provides company-wide, employee access to 4,300 technical courses, 600 technical and business books, dozens of Brainbench Exams and free or discounted training webinars and software development certifications.

For more information, call 1-855-727-3632 or email us at [email protected]______

NOVEMBER 2012 49

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE Testing the Nation’s Health- care Information Infrastructure: NIST Perspective

Kevin Brady, Ram D. Sriram, Bettijoyce Lide, and Kathleen Roberts National Institute of Standards and Technology

The National Institute of Standards and and efficiently, without any information loss. Accord- Technology is enabling the development ingly, the National Institute of Standards and Technology of an integrated healthcare information in- has been working closely with ONC; Integrating the Healthcare Enterprise (IHE; www.ihe.net), an initiative frastructure by developing test tools and by healthcare professionals and industry to improve the techniques that will facilitate seamless way healthcare computer systems share information; exchange of information across the health- and other organizations, such as IEEE, to accelerate the care enterprise. adoption of information technology by US healthcare enterprises. NIST, specifically its Information Technology Labora- ccording to the Centers for Medicare and Med- tory, is involved in several healthcare automation activities icaid Services, the US spent nearly $2.6 trillion focused on developing associated test methods, protocols, on healthcare in 2010, an amount estimated to and specifications, for interoperability. These projects, A nearly double by the end of this decade (www.____ which frequently involve coordination with related or- cms.gov).______This rate of spending was underscored by ganizations such as IHE, have been devised according to Athenahealth CEO Jonathan Bush: “The US spends an healthcare information flows. amount equal to 300 percent of India’s GNP on health- care, and India’s population is three times ours” (Fortune, INFORMATION FLOW IN 16 Jan. 2012, p. 22). In an attempt to rein in healthcare HEALTHCARE SERVICES costs, the Obama administration, like the preceding Bush The healthcare services industry generates and pro- administration, has initiated a major effort to move from cesses large amounts of complex information relating paper-based medical record keeping to electronic health to patient diagnosis, testing, monitoring, treatment, and records (EHRs). These efforts established the Office of the health management; billing for healthcare services; and National Coordinator for Health Information Technology asset management of healthcare resources. Healthcare (ONC) and formulated financial incentives for the nation’s delivery is a collaborative process, with many physicians, physicians to use EHRs, which will jointly lead to consider- specialists, nursing staff, and technicians from multiple able automation in the healthcare industry. organizations participating in patient treatment. In addi- To take advantage of such automation, information tion, many external organizations, including government generated in the healthcare enterprise must be digitally agencies, insurance companies, employers, medical re- encoded with the right semantics, archived for efficient searchers, pharmacists, and even lawyers in malpractice storage and retrieval, and transported reliably, securely, suits use the resulting healthcare information.

50 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 © 2012 IEEE

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

The healthcare industry creates and uses different t The office administrator submits claims to an insur- classes of information, including the following five types:1,2 ance agency using the physician-supplied codes for claims processing, and sometimes seeks benefits au- t detailed medical records of each patient for every thorization for specialized treatment for the patient. episode of illness or type of healthcare delivered; t Health insurance agencies might seek additional t workflow for patient referrals to specialists,3 physician justification for treatment provided to the patient or orders for diagnostic tests or procedures, and hospital for a recommended course of tests or treatment. admission and discharge; t Health insurance agencies might provide a list of t detailed administrative records for managing health- preferred medications (formularies) and other cost care resources—for example, scheduling patient containment measures to healthcare facilities. appointments, tracking hospital bed utilization, and t Managed care organizations and other payer agencies inventory management of pharmaceutical supplies; might also provide treatment guidelines. t billing for healthcare services, healthcare cost control t Life insurance companies might seek a patient’s medi- procedures, and coordination of benefits; and cal record to evaluate the risk of a policy applicant t research reports, clinical observations, results of new or to identify fraud due to a known, but undisclosed, pharmaceutical clinical trials, and new guidelines. preexisting medical condition.

One category of information flow occurs within the healthcare services industry and is characterized as follows: The foundation for healthcare information sharing is the electronic t An administrator obtains patient medical history, health record (or electronic medical employment and social data, and health insurance in- record), as it contains all the relevant formation and enters the data into the patient’s chart. patient healthcare data in sharable form. t A nurse records the patient’s vital signs, medications, and chief complaints for a particular visit. t A physician conducts an examination and writes or t Clinic nursing staff occasionally might need to report dictates an “encounter note” for subsequent tran- incidents of certain diseases to public health agencies scription and signoff for inclusion in the chart. An and record pediatric immunizations with the appro- administrator submits billing information identifying priate state’s vital statistics bureau. services rendered and the diagnosis codes for use in t Medical researchers might seek medical records of insurance claims. patients with certain profiles for investigations; the t Larger healthcare institutions might have internal clinic might provide the information (with patient advisory groups that recommend treatment guide- consent) after removing patient-identifiable data. lines (evidence-based medicine) to be followed by the t Malpractice lawsuits might require a healthcare facil- healthcare staff to improve healthcare quality. ity to submit medical records of patients (with profiles similar to the litigant’s) to determine adherence to A second category of information flow involves informa- standards of practice. tion exchanged between healthcare facilities: Finally, accrediting organizations in this information t The physician might prescribe an order for a labora- flow category might review patient records to review tory or diagnostic imaging test or procedure, refer the operational and quality standards. patient to a specialist, or have the patient admitted to a hospital. In some cases, the physician would include ELECTRONIC HEALTH RECORDS the patient’s relevant clinical history. The EHR or electronic medical record (EMR) is the foun- t The results of a laboratory test or the report and dation for healthcare information sharing, as both contain images of a diagnostic imaging would subsequently all the relevant patient healthcare data in sharable form. In be sent to the physician. healthcare delivery, the EHR serves integrating functions t Upon the patient’s discharge from the hospital, the similar to a manufacturing bill of materials. Although the discharge summary would be sent to the patient’s terms EMR and EHR are used interchangeably, ONC makes physician. a distinction between these two, as follows (see htttp:// www.healthit.gov). EMRs represent digital versions of the In the third category of information flow, information paper charts in a doctor’s office. An EMR contains the is transmitted between a healthcare facility and external medical and treatment history of the patients in one prac- agencies: tice, but the information in EMRs doesn’t travel easily out

NOVEMBER 2012 51

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE

hl7book.net/index.php?title=CDA) are External Pharmacy exemplary in this regard. laboratories NCPDP benefit HL7, briefly, is the global author- Support Hospital Community managers services pharmacies pharmacies ity on interoperability standards for health IT (www.hl7.org).5 External services Such measures would prevent the HL7 X12N HL7 loss of information during data inter- Radiology Billing Payers NCPDP change that could otherwise occur due DICOM/HL7 HL7 to differences in terms, codes, and re- Electronic lated semantics in various healthcare medical HL7 vocabularies. By using IT that adheres Hospital HL7 record Admission/ labs Transfer/ to HL7, healthcare institutions could HL7 discharge deal transparently with information HL7/IEEE 11073 HL7 Administrative record keeping obtained from external agencies as

11073 Physio- HL7/IEEE well as with information generated logical Charting by in-house healthcare information monitors systems. Their applications could per- Bedside Order form data mining of patient medical ECG computer entry records for healthcare quality metrics, monitor identify patients across populations IV for timely medical interventions, and pump IEEE 11073 Clinical record keeping check for compliance with preventive- Ventilator service protocols. A variety of messaging and infor- Figure 1. Standards that link to an electronic health record. (Source: US mation exchange standards permits Congress, Office of Technology Assessment, Bringing Healthcare Online: The an enterprise to integrate the vari- Role of Information Technologies, OTA-ITC-624, US Government Printing Office, ous health information systems and Washington, D.C., 1995.) archive the data as an EHR or EMR (www.nist.gov/healthcare/index.cfm). of the practice. EHRs do all those things, and more. EHRs In addition to HL7, such standards include Digital Im- focus on the patient’s total health, going beyond standard aging and Communications in Medicine (DICOM), IEEE clinical data collected in the provider’s office and include 11073 Healthcare Devices and Personal Health Devices, a broader view on a patient’s care. EHRs are designed to and others listed by the Healthcare Information and Man- reach out beyond the health organization that originally agement Systems Society’s Integrating the Healthcare collects and compiles the information. Enterprise initiative and ANSI’s Healthcare Information Although large healthcare institutions have significant Technology Standards Panel. investments in EHR-based computer systems, it is esti- Figure 1 illustrates the classes of clinical information mated that only a small percentage of US small practices and some of the standards that link these classes to a full 4 use an EHR system in their daily practice (www.aafp.org).______EHR. Specifically, HL7 messaging standards allow dis- In most healthcare settings—especially small clinics— parate healthcare information systems to communicate paper-based records and fax-based communications are with each other. Version 2.x, although the most common still the norm. Recent incentive programs issued by the implementation, is likely to be superseded by version 3.0, Centers for Medicare and Medicaid Services, however, are which uses an object-oriented approach. Independent accelerating EHR adoption by both small and large prac- healthcare institutions can submit orders and referrals tices (www.cms.gov/ehrincentiveprograms). via HL7 for healthcare services for their patients. DICOM The adoption of standards for information interchange standards enable the interchange of information between will help to integrate disparate healthcare systems. How- imaging systems and facilitate remote access for physi- ever, rather than being geared simply to support human cians at their clinic. readability of medical reports, healthcare data integration With standards-based integration of information sys- implementations should incorporate the formalism and tems and authenticated remote access to reports and details necessary for proper computer interpretability of images, physicians can review radiologists’ reports and such information. The formalism and details contained diagnostic images for use in patient counseling. One con- within NIST’s Health Level Seven International’s (HL7’s) cern with the current standards, however, is that they Clinical Document Architecture (CDA) standard (http://____ deal only with syntactic issues. Thus, due to the disparate

52 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

nature of the medical termi- nology in various EHRs (it is Applications and services common for different EHRs to Web services: Java APIs use different terminology to HL7 Message Message generation represent the same concept), artifacts maker Message validation it is increasingly important to Message Profile develop tools and techniques Message 3rd-party validation applications for semantic interoperability. Message Profile and testing Java validation validation database environments HEALTH IT TESTING Profile Message Message validation AT NIST generation encoding Web applications: Testing framework Testing IHE PIX/PDQ NIST’s Information Tech- NIST HL7 HL7 data test data IHE PCD nology Laboratory (for Data Test repository MU EHR → PH brevity, we use “NIST” to sources agents MU Immunization → PH NHIN PIX/PDQ denote this laboratory from MC Profile HL7 communication CCHIT lab messages here on) is collaborating with registry validation Message generation industry, healthcare infor- Message validation matics-related standards organizations, consortia, and government agencies to Figure 2. NIST HL7 toolkit infrastructure. build tools and prototypes to advance the adoption of IT within healthcare systems. NIST researchers are carrying mittee and associated working groups to pursue these on several activities in particular: efforts. Working groups include HL7, IEEE 11073, the National Council for Prescription Drug Programs, and t Collaborating with HL7 to help ensure that HL7 the American Telemedicine Association. messaging and EHR systems’ conformance can be defined and measured at an appropriate level. Following are several NIST projects, at various stages of t Providing technical leadership on IHE projects, completion, that have resulted from these activities. specifically for cross-enterprise document sharing and patient care devices. HL7 testing toolkit t Providing technical leadership to build a common As Figure 2 shows, NIST is building a toolkit for testing Web-based tool set that integrates testing tools HL7 message interfaces based on message profiles. The and activities of various standards development toolkit’s foundation is a set of Java APIs and a testing frame- organizations, consortia, and other organizations; work that supports activities such as automated message also, providing technical leadership on the devel- generation, message validation, and use case testing. De- opment, selection, and implementation of security velopers can use the toolkit to build tools or Web services, specifications for securely communicating health or they can incorporate it into third-party applications and information. testing environments. t Collaborating with ONC to achieve a Nationwide NIST has applied the toolkit to develop numerous tools Health Information Network (NwHIN) and developing for creating messages, cross-referencing patient identity, several test procedures for “meaningful use.” Accord- and formulating EHR queries. The toolkit’s main focus is ing to ONC, “meaningful use is the set of standards on HL7 version 2, although developers have recently added defined by the Centers for Medicare and Medicaid capabilities to the toolkit to support version 3 validation. Services (CMS) Incentive Programs that governs the Tools are delivered as stand-alone applications, Web ser- use of electronic health records and allows eligible vices, and Web applications. providers and hospitals to earn incentive payments The HL7 (version 2) standard, around which we have by meeting specific criteria.” based the toolkit, is a specification for moving clinical t Collaborating with the Centers for Medicare and and administrative information between healthcare ap- Medicaid Services to provide guidance on the Health plications. In the US, 90 percent of hospitals use the HL7 Insurance Portability and Accountability Act Security standard. Its adoption in other care settings such as out- Rule. patient and long-term care facilities or telemedicine is t Participating in the ONC Federal Advisory Committee necessary to ensure that organizations can reap the ben- on Health Information Technology Standards Com- efits of widespread electronic communication. However,

NOVEMBER 2012 53

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE

the cost-restrictive nature of managing an HL7 system to load and validate from external applications. NIST has achieve interoperability is a concern for widespread adop- future plans to expand the toolkit to support the Quality tion in these other settings. Reporting Document Architecture’s Quality Reporting and When originally developed, the HL7 standard was de- e-Measures format. signed to accommodate the many diverse processes within the healthcare industry. Although a universal design was Meaningful-use Stage 1 test method necessary to gain broad industry support, the initial design The US Health Information Technology for Eco- resulted in a standard that could not be sufficiently con- nomic and Clinical Health (HITECH) Act, enacted as strained to provide a single and consistent interpretation, part of the 2009 American Recovery and Reinvestment which prohibited plug-and-play installations. Conse- Act, emphasizes the need for the US to begin using quently, systems were difficult to implement and debug, EHRs. To encourage more widespread adoption of in- resulting in undue costs. teroperable health IT, the legislation calls for ONC, in To help alleviate this shortcoming, HL7 introduced the consultation with NIST, to establish a program for the vol- concept of message profiles. A message profile is a subset untary certification of health IT as being in compliance of the HL7 messaging standard that constricts message with applicable criteria to meet defined MU requirements. definition so that it specifically states a message’s optional MU will be implemented in three stages: Stage 1 in 2011, constructs and processing rules. However, if EHR vendors Stage 2 in 2013, and Stage 3 in 2015. Further details of do not follow the profile rules, interoperability problems these stages can be obtained at www.healthit.gov. Physi- will persist. Conformance testing is essential. NIST is devel- cians will receive federal financial incentives depending oping testing tools to ensure that vendors apply message on how well they conform to criteria described in rules profiles as intended to fulfill the promise of interoperable associated with each stage. healthcare systems. Under the health IT certification program, ONC- authorized testing organizations use the NIST test method and conformance tools to evaluate EHR software and Legislation calls for the voluntary systems so that doctors’ offices, hospitals, and other certification of health information healthcare providers can have confidence in the systems technology to encourage more they purchase. In collaboration with ONC, NIST has devel- widespread adoption of interoperable oped the necessary functional and conformance testing health IT. requirements, test cases, and test tools in support of Stage 1 of the MU health IT certification program and is currently working on the other two stages. Clinical Document Architecture validation In August 2010, NIST published an ONC-approved test The HL7 version 3 Clinical Document Architecture (CDA) method (encompassing test procedures, data, and tools) for is an XML-based markup standard intended to specify the testing EHR systems to meet MU Stage 1 certification crite- encoding, structure, and semantics of clinical documents ria and standards. During the test method’s development, for exchange, and is not itself a document type. CDA was NIST collaborated with ONC to ensure that the relevant developed using the HL7 development framework, which standards and certification criteria were consistent and is based on the HL7 Reference Information Model. NIST—in effectively represented within the test procedures. The ap- collaboration with IHE’s Patient Care Coordination (PCC) proved NIST-developed test method evaluates EHR system domain, the Quality, Research and Public Health domain, components such as electronic prescribing of patient pre- and HL7—is working on a series of testing tools for pro- scriptions to pharmacies, submission of laboratory results moting CDA’s adoption by vendors and users of healthcare to the Centers for Disease Control and Prevention (CDC), information systems. how pediatric doctors plot and display growth charts of The toolkit can validate documents from legacy Health patients, and how vendors control access so that only au- Information Technology Standards Panel (www.hitsp.org) thorized users can retrieve information. work, the IHE PCC domain documents, and HL7 docu- The following tools for MU Stage 1 testing are complete ments. The toolkit also includes sample documents of and available from NIST (we are working on Stage 2 tools, syntactically correct XML files for most document types. which should be available in a few months): The NwHIN testing team also uses this toolkit at IHE Con- nectathons (multivendor testing events held worldwide) t Stage 1 Test Method (http://healthcare.nist.gov/use_

to check for meaningful use (MU) and for patient identity testing/effective_requirements.html).______This method to validate documents being exchanged. Users access the defines the approved version 1.1 test procedures that tool via a webpage form where they upload their XML file Authorized Testing and Certification Bodies (ATCBs) or through a SOAP-based Web service to automatically use in the health IT certification program.

54 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

t Reportable Lab Results and Immuniza- tions (http://healthcare.nist.gov:8080/ HL7V2MuValidation2011).______With this HL7 v2 test tool, ATCBs can assess the cer- Repository Imaging Primary care enterprise Repository center tification criteria for doctors to use in physician enterprise submitting immunizations and report- ing lab results to the CDC. t Clinical Document Architecture (CDA) Repository Validation (http://hit-testing.nist.gov/cda-______enterprise Cross-enterprise Hospital A document validation/mu.html).______NIST provides an registry HL7 Continuity of Care Document (CCD) (XDS) validation tool designed specifically to support MU Stage 1 testing. Emergency room

According to ONC, more than 2,500 EHR Repository products for ambulatory care and more than enterprise 800 products for in-patient care are currently Patient Admin certified for MU Stage 1 (http://oncchpl.force. com/ehrcert/CHPLHome; a product is not nec- Hospital B essarily a complete EHR—see ONC’s website for definition of a product). All products can Figure 3. Cross-enterprise document sharing (XDS). Healthcare profes- sionals within a community can use XDS to access a patient’s clinical be traced back to NIST-developed test proce- information regardless of where it is located. dures and tools.

Cross-enterprise document sharing NIST has developed a reference implementation for NIST is working with industry to develop a standards- the XDS specification and a Web-based test suite, al- based registry infrastructure that will allow healthcare lowing vendors to determine conformance to the XDS professionals to find and access all pertinent patient clini- profile. Vendors also use the test suite as an early stage cal information regardless of the healthcare organization tool for interoperability testing. The reference implemen- that creates and manages the documents. Additionally, tation is available as IHE open source, an open source NIST is collaborating on the IHE project on Cross- project hosted on Source Forge (http://iheos.sourceforge. Enterprise Document Sharing (XDS). Specifically, NIST net).___ The NIST test suite is available at http://ihexds. is a primary author of the XDS standards-based speci- nist.gov. fication. As Figure 3 shows, healthcare professionals can use XDS to manage document sharing between any Medical device communication testing healthcare enterprise, from a private physician’s office In a typical intensive care unit, a patient might be con- to an acute care in-patient facility and personal health nected to one or more vital-sign monitors, receive fluids record systems. through multiple infusion pumps, and be supported by a Sharing is managed through document repositories and ventilator. Each of these medical devices can capture vol- a document registry to create a longitudinal patient infor- umes of data, which is available multiple times per second, mation record within a given clinical domain. These are on a per-patient basis. Today, these devices do not commu- distinct entities with separate responsibilities. A document nicate and have little or no plug-and-play interoperability. repository stores documents in a transparent, secure, reli- Medical device interoperability raises several issues: able, and persistent manner and can respond to document retrieval requests. A document registry stores information t Manually captured data is labor intensive, recorded about those documents so that the documents of interest for infrequently, and prone to human error. a patient’s care can be easily found, selected, and retrieved t Expensive custom connectivity equipment might be irrespective of the repository where they are actually stored. used only for patients with acute needs. Using document registries to share clinical information t Detection of patient problems such as adverse drug intraorganizationally presents unique challenges: data events is hindered due to the inability to collect real- interoperability and interchange, for example, requires time data from multiple devices. standardized metadata, interfaces, and formats; moreover, t Vendors intending to communicate data between de- the technology must support strict adherence to security vices must develop specialized interfaces for each and privacy policies related to healthcare information. device.

NOVEMBER 2012 55

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COVER FEATURE

The ISO/IEEE 11073 (x73) Healthcare Devices and Per- mented in an XML schema. These tools (and information sonal Health Devices Working Groups are defining a set model) are publicly available (http://hit-testing.nist.gov/ of standards to enable medical devices to interoperate medicaldevices/index.html).______Medical device test message and electronically capture and process data. These work- generation is also possible to facilitate future manager/ ing groups are collaborating with the IHE Patient Care agent conformance test scenarios. Device Domain to develop a framework for integrating medical device data into an EHR. IHE CONNECTATHONS NIST is actively developing medical device communi- Each year, the IHE sponsors Connectathons in North cation test methodologies and tools to enable consistent America, Europe, and Asia to promote interoperabil- and correct communication between medical devices and ity among IHE profile implementations (www.ihe.net/ device-gateways across the healthcare enterprise. This work ______connectathon). The Connectathons are cross-vendor is intended to provide standards-based, rigorous validation structured testing events where developers of health infor- of medical device communication through conformance mation systems can compare their implementations with leading to interoperability. Rigorous testing is essential to those of other vendors. The goal is to promote the adop- achieve multivendor and enterprise-wide interoperability, tion of standards-based interoperability solutions defined and it must be predicated on sufficiently specified medical by IHE in commercially available healthcare IT systems. device and enterprise-communication standards. The NIST The 2012 North American Connectathon held in Chi- software test tools aim to meet the X73-defined require- cago, Illinois, featured more than 160 systems from 117 ments as well as the enterprise/electronic health record participating organizations, which performed and veri- level defined in the HL7 messaging standard. fied more than 3,500 successful tests of IHE integration profiles. Ninety percent of the applications demonstrated at the Connectathon used the NIST test tools. Partici- Electronic health information exchange pants and monitors use NIST tooling in cross-enterprise that follows patients across providers document sharing, patient identity and queries, patient regardless of geographical boundaries care devices, and CDA validation to compare them against greatly improves the clinical decision- the IHE profiles. making process. Interest in the Connectathons and NIST tooling to support them has been growing; at the 2012 event, IHE Korea and IHE Japan began using NIST tooling with IHE A related tool is the ICSGenerator (http://hit-testing. Australia to learn how to use the technology for their nist.gov/medicaldevices/index.html), which facilitates respective Connectathons. creation of vendor conformance statements that would be applicable to testing a particular X73 device. With NWHIN TESTING the ICSGenerator, users can easily develop and produce NwHIN is a set of standards, services, and policies implementation conformance statements. Users such that enable secure health information exchange over the as medical device vendors, manufacturers, and clinical Internet. NwHIN is not a physical network but rather is engineers can execute the tool to produce statements that a foundation for the communication of health informa- disclose details of a specific implementation and specify tion across diverse entities and communities around the the features provided by a particular medical device—that country. Electronic health information exchange that is, a device profile. Medical device vendors can compare follows patients across providers regardless of geographical device implementation conformance statements based on, boundaries greatly improves the clinical-decision-making and required by, the x73 standards and use them across process by providing clinicians with updated, relevant, device interfaces to help overcome the semantic interoper- and accessible patient data (http://nwhin.siframework.org/ ability problem. NwHIN+Basics.)______Conformance test tools can use device profiles in con- These standards, services, and policies enhance patient junction with messages to and from devices to determine care quality and evolve care coordination by helping move standards conformance and validity. The ValidatePDU tool current paper-based medical records to an electronic pro- can determine not only the correctness of the x73 message, cess for securely storing and sharing EHRs. NIST has been but also the message’s compliance to a user-defined profile involved in the testing process for “on-boarding,” the pro- (derived via the ICSGenerator tool). ValidatePDU provides cess by which an organization joins the Nationwide Health basic syntax, structure, and low-level semantic checking Information Network Exchange, which verifies that it com- for one or more captured messages. Both ValidatePDU and plies with NwHIN-supported specifications. On-boarding ICSGenerator use the electronic representation of the x73 includes verifying an organization’s eligibility for participa- standards information model that NIST researchers imple- tion (must be a federal agency or ONC contractor), that its

56 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

gateway complies with the NwHIN specifications, and that Research J., Perspectives in Health Information Manage- it can exchange information. ment, 2012. NwHIN uses an existing set of NIST tools with modifica- 4. S.R. Rao et al., “Electronic Health Records in Small Physi- tions based on the NwHIN specifications (http://hit-testing. cian Practices: Availability, Use, and Perceived Benefits,” J. Am. Medical Informatics Assoc., vol. 18, no. 3, 2011, pp. nist.gov:12080/xdstools2nwhin).______The tools include XDS, 271-275. Cross-Community Patient Discovery Query and Retrieve 5. T. Benson, Principles of Health Interoperability: HL7 and (XCPD), Patient Identity Cross Reference, Patient Discovery SNOMED, Springer, 2010. Query, and a CDA validator. These tools help to automate the on-boarding process and allow potential participants Kevin Brady is Interoperability Group leader, Systems and to completely test their gateways at the NIST website before Software Division, Information Technology Laboratory, Na- they start on-boarding. The NwHIN network might play a tional Institute of Standards and Technology. His research larger role in meaningful use testing in Stage 2. interests include health information technology, smart healthcare, and cyberphysical systems. Brady received an MS in computer science from the George Washington Uni- versity. Contact him at [email protected].______he creation of an integrated healthcare information infrastructure depends on all parties involved— Ram D. Sriram is chief of the Systems and Software T consumers, healthcare professionals, researchers, Division, Information Technology Laboratory, National In- and insurers—having systems, tools, and information stitute of Standards and Technology. His research interests include distributed design, artificial intelligence, and smart that are complete, correct, secure, and interoperable. Until networked systems and societies. Sriram received a PhD we achieve a full-scale interoperability of software sys- in civil engineering from Carnegie Mellon University. He tems in the healthcare enterprise, we will not realize the is a senior member of IEEE, a fellow of ASME and AAAS, full benefits of using information technology in health- and a life member of AAAI and ACM. Contact him at ram.___ care. Achieving true interoperability would require that [email protected].______three tightly integrated activities must succeed: standards Bettijoyce Lide is the health IT program manager, Informa- development, implementation support (including imple- tion Technology Laboratory, National Institute of Standards mentation guidance and precertification testing), and and Technology. Her research interests include health comprehensive conformance and interoperability test- information technology, evaluated scientific data, and col- ing. Thus, true interoperability testing cannot be achieved laborations on cutting-edge R&D. Lide received an MS in without having the right standards, implemented in the chemistry, information technology, and management from right way, and tested—both for syntax and semantics— the American University. She is a member of the American to the right requirements. NIST will continue the Chemical Society. Contact her at [email protected].______research and development activities required to support Kathleen Roberts is associate director for federal and in- and test a fully integrated and interoperable healthcare dustrial relations, Information Technology Laboratory, enterprise. National Institute of Standards and Technology. Roberts received an MS in computer science from the George Wash- ington University. Contact her at Kathleen.Roberts@nist.______Acknowledgments gov.__ Project leads for the various projects include Robert Snelick (HL7 V2 Testing Toolkit), Ken Gebhart (Meaningful Use), Bill Majurski (Cross-Enterprise Document Sharing), John Garguilo (Medical Device Interoperability), Andrew McCaffrey (CDA The identification of certain commercial software sys- validation), and Gavin O’Brien (NwHIN). Lisa Carnahan initi- tems in this article does not imply recommendation or ated the testing projects during her term as the leader of the endorsement by NIST nor does it imply that the prod- health IT conformance testing program; Mary Laamanen and Sandra Martinez also contributed efforts in CDA and Medical ucts identified are necessarily the best available for the Devices, respectively. We appreciate the input from Steven J. purpose. Further, any opinions, findings, conclusions, Fenves and Lisa Carnahan on this article. or recommendations expressed in this material are those of the authors and do not necessarily reflect the References views of NIST or any other supporting US government 1. C. Bock et al., Healthcare Strategic Focus Area: Clinical Infor- matics, NIST Internal Report 7263, Nat’l Inst. of Standards or corporate organizations. and Technology, Washington, D.C., 2005. 2. National Research Council, For the Record: Protecting Elec- tronic Health Information, National Academies Press, 1997. 3. M. Ramaiah et al., “Workflow and Electronic Health Selected CS articles and columns are available Records in Small Medical Practices,” AHIMA’s Online for free at http://ComputingNow.computer.org.

NOVEMBER 2012 57

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

______

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

PERSPECTIVES

Debugging on the Shoulders of Giants: Von Neumann’s Programs 65 Years Later

Barry Fagin, US Air Force Academy Dale Skrien, Colby College

A study that examined and executed the programs John von Neumann wrote for the IAS machine reveals time-tested truths about computer architecture, side effects, instruction set design, and automatic programming—truths all foreseen by von Neumann and his team more than 50 years ago.

ome of the first computing programs ever written directly executed on the machine as written. Allowing for were to solve mathematical problems pertaining to typographical errors, at least a few of them contain non- the Institute for Advanced Study computer.1-5 The trivial bugs. Our emulator validated corrected versions of S IAS computer is intimately linked with John von all the programs in the original IAS reports,1-4,7 producing Neumann, who led the IAS project team in Princeton, N.J., the expected results. during the post-World War II era. Our analysis of these pro- grams revealed several errors. Given that these programs PROGRAMMING THE IAS MACHINE have not been examined for well over 50 years after the A brief overview of how problems were solved on the IAS only machine that could execute them was shut down, this computer provides background for appreciating the intel- is hardly surprising. lectual achievements of von Neumann as well as of Arthur To conduct our investigation, we used an IAS machine Burks, Herman Goldstine, and all others who worked at the emulator, developed originally for educational purposes Institute for Advanced Study. so that users could write and execute programs in the The IAS computer consisted of a memory bank referred original IAS instruction set.6 Executing these programs to as the Selectrons, an accumulator (A) capable of shifting, reveals time-tested truths about computer architecture, adding, and subtracting; and an arithmetic register (R), side effects, instruction set design, and automatic program- used, among other things, to hold double width results from ming—truths all foreseen by von Neumann and his team multiplication and division along with the accumulator so many years ago. (these latter operations were accomplished through shift- The evidence suggests that at least a few of the pro- ing and adding or subtracting). The machine also had the grams, which appeared in both IAS technical reports and necessary support logic for reading and writing memory later in John von Neumann: Collected Works,5 were never and for fetching and executing instructions from memory.

0018-9162/12/$31.00 © 2012 IEEE Published by the IEEE Computer Society NOVEMBER 2012 59

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

PERSPECTIVES

Table 1. IAS computer instruction set.

Inst # Inst name Abbrev Description

1S(x) q Ac + x Copy number in Selectron location x into A. 2S(x) q Ac – x – Same as #1 but copy the negative of the number. 3S(x) q AcM xM Same as #1 but copy the absolute value. 4S(x) q Ac–M x – M Same as #1 but subtract the absolute value. 5S(x) q Ah + xh Add number in Selectron location x into A. 6S(x) q Ah – xh – Subtract number in Selectron location x from A. 7S(x) q AhM xhM Same as #6, but add absolute value. 8S(x) q Ah–M xh – M Same as #7, but subtract absolute value. 9S(x) q R xR Copy number in Selectron location x into R. 10 R q A A Copy number in R to A. 11 S(x) * R q A x × Multiply number in Selectron location x by the number in R. Place the left half of the result in A and the right half in R. 12 A/S(x) q R x ÷ Divide the number in A by the number in Selectron location x. Place the quotient in R and the remainder in A. 13 Cu q S(x) xC Continue execution at the left-hand instruction at Selectron location x. 14 Cu’ q S(x) xC’ Continue execution at the right-hand instruction at Selectron location x. 15 Cc q S(x) xCc If the number in A is > = 0, continue as in #13. Otherwise, continue normally. 16 Cc’ q S(x) xCc’ If the number in A is > = 0, continue as in #14. Otherwise, continue normally. 17 At q S(x) xS Copy the number in A to Selectron location x. 18 Ap q S(x) xSp Replace the right-hand 12 bits of the left-hand instruction at Selectron location x by the right-hand 12 bits of A. 19 Ap’ q S(x) xSp’ Same as above, but modifies right-hand instruction. 20 R R Shift the number in A to the right 1 bit (left-most bit is copied). 21 L L Circularly left-shift the bits in A and R as an 80-bit quantity, leaving the most significant bit of A unchanged. A: accumulator Cc: control conditional (conditional branch in modern parlance) Cu: control unconditional (unconditional branch or jump in modern parlance) R: arithmetic register S: Selectrons (memory in modern parlance)

All registers and data paths visible at the assembly language First, each programming problem began with a de- level were 40 bits wide. scription of the algorithm in a combination of English and Table 1 lists the basic instructions, referred to as orders. mathematics. The IAS mathematicians then translated this Some descriptions have been modified for clarity. algorithm into a flow diagram like the one in Figure 1.2 Programming the IAS required translating an algorithm Circles in Figure 1 indicate entry and exit points. originally expressed in the language of mathematics into a Arrows indicate the flow of control. Boxes with two exit sequence of the instructions in Table 1.2 arrows are alternative boxes: they represent conditional branches, typically denoting loop exit points. III# A “+” denotes the path taken if the expres- 11.52+2 sion in the box is greater than or equal to zero, i m × C 1 –> i i – I – 1 e a “−” indicates the path if the expression is o – 2 negative. Boxes with one entry and one exit point are operation boxes and are labeled with i + 1 → i 2 the mathematical description of the computa- 3 III # tions performed. In modern parlance, these au 2 + bu + c V = i i to A.2i are called basic blocks. Boxes labeled with “#” i du + e i denote either substitution boxes, indicating (m + 2i) to C o changes to variables in memory, or assertion boxes, indicating certain valid mathemati- Figure 1. Flow diagram for an IAS computation. cal relationships at the time the computation

60 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

traverses the box. Memory locations are indicated with From this point, an engineer would translate the final capital letters and numeric suffixes. enumeration into binary and load the program into the In following Goldstine and von Neumann’s translation Selectrons, presumably by setting toggle switches as dic- process, once they believed the diagram to be complete, tated by the binary translation. they labeled alternative and operations boxes with roman numerals, and obtained a preliminary enumeration of THE IAS EMULATOR instructions. This process is roughly similar to the output The process of developing and eventually teaching a US a modern compiler might supply to a linker, in that it con- Air Force Academy course on “Great Ideas in Computing” tains the necessary instruction sequence but with only led to a search for tools that would permit students to pro- symbolic memory addresses. Each line in a preliminary gram the original IAS computer. No such tools were found. enumeration has at most three fields: a designator indicat- However, CPU Sim, a general-purpose emulator, was avail- ing the block from the flow diagram associated with the able from Colby College (http://www.cs.colby.edu/djskrien/ instruction and the instruction number within the block, CPUSim).______6 Based on the descriptions of the machine and a symbolic memory location, and an optional instruction instruction set provided in the 1946-1947 documentation, abbreviation from Table 1 (if omitted, the instruction is we used CPU Sim to create IASSim, an emulator for the assumed to be a load of the accumulator from the address). Princeton IAS computer. As Figure 2 shows, IASSim accepts The first few instructions from the preliminary enumer- text files containing long-form sequences of IAS instruc- ation of Figure 1 are as follows (we have added comments tions and executes them based on the semantics of Table 1. to aid understanding): IASSim supports both single-step and start-to-finish ex- ecution mode, and it allows full inspection of all machine I,1 B.6 // load contents of memory location B.6 into registers and memory. the accumulator We have used IASSim in support of graded classroom .2 C S // store the accumulator into memory work. College freshmen with no prior computer science location C background have used it to program in IAS assembly II,1 C // load C into accumulator language.8 ,2 B.7 h – // subtract contents of memory location B.7 Once the emulator was up and running, other uses from accumulator beyond computer science education evolved. In particular, ,3 e Cc // branch to exit point if accumulator >= 0 the existence of a functioning IAS emulator provides re- III,1 C // load C into accumulator searchers with the opportunity to revisit the programming , 2 III,3 Sp // Change the address field of the following problems given in the 1947 IAS reports. As the IAS programs instruction to the lower 12 bits of the are among the oldest programs ever written, runnable on accumulator only one machine in the world, we believed it would be ,3 - // load from address as set by previous interesting to run them through the emulator to see which instruction programs, if any, contained bugs.

Once the preliminary enumeration is complete, the SOURCES OF ERROR IN PROGRAM program’s total size can be determined, which means that TRANSLATION storage locations can be assigned (typically those immedi- Many steps are required to go from a 65-year-old ately following the instructions), and branch targets filled in. algorithm description to a working program running on a IAS stores two instructions per memory word, and therefore 21st-century emulator. We performed all of the steps except pairs them into words at this stage. Based on the program’s the last one by hand, any one of which could introduce an total size and the storage locations assigned, the instruc- error that would make the result incorrect. These steps tions in the preceding preliminary enumeration become were as follows: the four words in the following final enumeration. Whereas the 1947 reports used only abbreviations in preliminary and 1. Describe algorithm mathematically. final enumerations, we have included the long forms to aid 2. Depict algorithm in flow diagram. understanding. 3. Translate flow diagram into preliminary enumeration. 4. Transform preliminary enumeration into final WORD INST PAIR LONG FORM enumeration. 0 19, 22S S(x) -> A 19 A -> S(x) 22 5. Transcribe final enumeration from the 1947 technical 1 22, 20h- S(x)-> A 22 A -> A-S(x) 20 reports in the 1963 edition of John von Neumann: Col- 2 26Cc, 22 Cc-> S(x) 26 S(x) -> A 22 lected Works. 6. Enter program listing into emulator. 3 3Sp’, - Ap’-> S(x) 3 S(x) -> A - 7. Execute program on emulator.

NOVEMBER 2012 61

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

PERSPECTIVES

the coresidence of data and instructions. Instructions, however, are 20 bits wide, with an 8-bit opcode and a 12-bit address. Thus, as the previous code example demonstrates, the IAS stores instructions in pairs, which requires making distinctions between the instructions in the left and right half of a word in branch targets. In Table 1, these are indi- cated with an apostrophe in the instruction notation. For example, Cc 30 means to conditionally branch to the instruction in the left half of the memory word 30, while Cc´ 30 means the target is the instruction in the right half of the word. Figure 2. Screenshot from IASSim, an emulator for the IAS computer (www.cs.colby.edu/ The IAS makes the distinc- djskrien/IASSim). tion between the left or right “handedness” of instructions Von Neumann and his team would have performed steps during the translation of a preliminary enumeration to a 1-4 as part of the programming process. Steps 5-7 were final one. added by the authors to support execution on the emulator. We note that step 5 is not strictly necessary. We origi- Number representation nally took our program listings from the Collected Works The IAS represents integers in fixed-point binary 2’s alone. When we eventually found errors, we compared complement notation. The assumed binary point is to the the code with that in the original 1947 technical reports. immediate right of the most significant bit (the left-most bit). Occasionally, we found programs in the original reports to All numbers are 40 bits in length. Thus, ½ would be repre- be correct while the corresponding code in Collected Works sented as the 40-bit quantity 0100 … 000, and –5/8 would was wrong, suggesting that copying or printing errors oc- be 10110 … 000. The only numbers that can be represented curred when Collected Works was first compiled. Thus, in the machine, therefore, lie on the interval –1 <= x < 1. we cite the transfer of code from the technical reports to Interestingly, 1 cannot be represented. The IAS engineers Collected Works as a possible source of error. maintained accuracy by using appropriate rescaling of numbers when necessary, or by the programmer’s having UNUSUAL FEATURES OF THE IAS MACHINE sufficient knowledge of the problem under study to pre- The IAS computer contained a few features that are, by scale inputs appropriately and apply the correct postscaling modern standards, somewhat unusual. to the results. This representation scheme dictates the requirement Lack of I/O that all data inputs to the machine, all intermediate quanti- The IAS machine had no I/O. This meant that users had ties calculated during program execution, and all outputs to enter variables, as well as constants, by hand into spe- must lie on the interval –1 < = x < 1. Otherwise, the results cific memory locations. The program placed the results might be incorrect. in memory locations, and engineers had to inspect them The only exceptions to this representation scheme are manually after program termination. This should be kept numbers used to address memory, referred to as position in mind when examining IAS program listings. marks (memory addresses in modern terminology). These numbers are 12 bits long. Since the IAS stores instructions IAS memory and instruction format in pairs, and each has a 12-bit address field, it is convenient The IAS organized memory into 2,048 40-bit words. One to store these numbers as duplicated 12-bit patterns if the of the machine’s pioneering achievements is, of course, IAS performs address manipulation, so that instructions

62 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

and addresses in the left half of words need not be treated cally alter the sequencing of basic blocks in the program. specially. Thus, the IAS would store the number 3 position The IAS can even use these instructions to manipulate mark as the 40-bit quantity 0×00-003-00-003 (represented data directly. here in hexadecimal notation with hyphens separating ad- dress and opcode fields). VON NEUMANN’S ORIGINAL The original literature indicates position marks with 15 PROGRAMMING PROBLEMS

a subscript of 0. Thus, if n = 6, an indication that (n – 1)0 Volume 2, part 1, of Goldstine and von Neumann’s should be stored in a given memory location does not refer technical report, “Planning and Coding Problems for an to the number 5, since the IAS machine cannot represent 5. Electronic Computing Instrument,”3 contains nine pro- Instead, it represents the position mark 0×00-005-00-005. gramming examples; part 2 lists six more. The authors chose the examples, given in order of approximate increas- Self-modifying code ing complexity, to illustrate the IAS machine’s different The IAS designers recognized early on that vector pro- problem domains and features. cessing—the ability to perform the same computation on We give a brief overview of each example and indicate multiple data items—was an important requirement. The whether Goldstine and von Neumann’s programming so- machine achieved this capability through self-modifying lutions as given in the literature are correct. If a mistake code, a programming technique generally frowned upon existed in either the original reports or the Collected Works, today. we describe the nature of the error, how we believe the Two special IAS instructions can modify the address error originated, and show the necessary correction. field of memory words at a given address. Von Neumann re- ferred to these instructions as “partial substitution orders,” A simple algebraic expression or “substitution orders” for short. They are denoted as Ap Problem 1 is the simplest one, intended as an introduc- and Ap´ for modification of the left and right address fields tion to IAS features and the process of programming for it. in a word, respectively. These are instructions 18 and 19 Problem 1 calculates the value of the expression v = (au2 from Table 1. + bu + c) / (du + e), where a through e are constants and For example, consider the following IAS program u is a user-supplied variable. The code as written is correct. fragment: Parameters and subroutining WORD LONG FORM HEX INSTRUCTION Problem 2 is the same as problem 1, but now the code stores u and v at specific memory addresses, with v point- 20 Ap -> S(x) 50 0x 12 032 : change address field of left inst at mem[50] ing to where the result will go. This is intended to illustrate … the concept of parameters and subroutines. The code given is correct. 50 S(x) -> Ac + 0 0x 01 000 ; currently set to load accumulator from mem[0] Iteration Problem 3 treats v as a function f(u) for which the pro- Suppose the lower 12 bits of the accumulator contain gram uses iteration to calculate multiple values. It stores 0x053 when the instruction at memory location 20 is each (u, v = f(u)) pair in consecutive memory locations fetched. When it completes, instruction 50’s address field starting at memory address M. One interesting feature of will be modified to 0x53. Thus, the program will now look this program is that it has a partial substitution order that like this: modifies the instruction immediately after it:

20 Ap -> S(x) 50 0x 12 032 : change address field WORD LONG FORM SHORT FORM of left inst at mem[50] 3 Ap’->S(x) 3 3Sp’ … 50 S(x) -> Ac + 0 0x 01 053 ; will now load accu- S(x)->Ac+ – – mulator from mem[83] This partial substitution is a potential hazard since the Notice that instruction 50 has yet to execute; the effect program prefetches both instructions in a word simultane- of the address change will not be apparent until it does. ously. We know from the literature that the IAS computer’s As von Neumann noted, the substitution orders are design accounted for this possibility and therefore allowed quite powerful. If they modify load and store instructions, it in programs.1 The initial design anticipated the complica- they implement vector processing—but they can also tions of data forwarding and delayed branching in modern modify branch instructions, in which case they dynami- pipelined architectures.

NOVEMBER 2012 63

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

PERSPECTIVES

The solution to problem 3 contains an error. As written correct; however, there is an error in the Collected Works, in the original report, the instruction sequence at words probably introduced during the transcription process. The 12 and 13 is: instruction in the left half of word 5 is written as 9h in the original IAS report, but is incorrectly rendered in the WORD LONG FORM SHORT FORM Collected Works as 0h. 12 S(x)->Ah+ 6 16h A/S(x)->R 24 24÷ Binary to binary-coded decimal conversion Problem 6 is the IAS code to convert a number in 13 At->S(x) – – S standard IAS floating-point format to IAS binary- Cu->S(x) 1 1C coded decimal (BCD) format. As originally pub- lished, the instruction pair at word 11 has the The problem is that the result of the division in the branch parities reversed. The simplest correction is second instruction is left in the R register, but the second to switch the targets (which would make the second instruction must move it to the accumulator before the branch a noop). The code was originally written as third instruction can store it in memory. The simplest cor- 12Cc´, 3C´. Changing the instruction pair to 3Cc´, rection is to insert two R q A instructions between words 12C corrects the code. 12 and 13: BCD to binary conversion WORD LONG FORM SHORT FORM Problem 7 is similar to problem 6, but converts from 12 S(x)->Ah+ 16 16h BCD to binary. The published solution has three minor A/S(x)->R 24 24÷ errors and one logic error. The minor errors are as 13 R->A follows:

R->A AS SHOULD 14 At->S(x) – – S WORD WRITTEN READ SOURCE OF ERROR Cu->S(x) 1 1 C 24 17S, 48 17S, 43 Collected Works and 35 42S, 36Cc 42S, 26Cc IAS report, Collected Works … so on 38 41Cc´, A 39Cc´, A IAS report, Collected Works

This insertion in turn requires adjusting all target The first two are probably typographical errors, since addresses from word 14 onward. In our case, the they differ only by one digit. The correction to the third error IASSim emulator’s built-in assembler performs this task is consistent with the flow diagram given in the IAS report,3 automatically. and so the error would have been introduced after that point Strictly speaking, although only one extra instruction in the compilation process. is required, this would change the left-right parity of all In addition, there is a logic error between instruction the instructions in the words that follow, which would in words 26 and 27: turn require changing the parity of all branch instructions affected. We chose a simpler approach. WORD LONG FORM SHORT FORM 26 At->S(x) 42 425 Precalculation of scale factors S(x)->Ac+ 17 17 Problem 4 shows how to precalculate the appropriate 27 L L scaling factor for a quotient u/v (the integer n such that 2(n-1) LL <= ( u/v) < 2n), without having to compute u/v explicitly. This would have been a common programming task on the IAS machine. The L instructions (left shift) occur in a loop, and have The only error in the listing appears to be typographi- the side effect of moving bits into the R register. In one cal. Instruction 10 is written as 35  h, but should appear part of the program, this side effect is needed, but in as 35h. This error appears in both the original reports and this particular part it is not. The instruction at word 27 the Collected Works. uses these left shifts only to multiply the accumulator by 4, and the remaining parts of the program will not Newton’s method for calculating square roots work correctly if the L instructions at word 27 alter the R

Problem 5 iterates zi+1 = ½ (zi + u/zi) from a starting es- register in any way.

timate z0 until the limits of machine precision are reached. The easiest fix is to insert a pair of S(x) q R 43 instruc- This converges to √u. The code as originally published is tions between words 26 and 27, since according to the text

64 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

memory, location 43 contains 0. This has the effect of clear- Numerical integration via Simpson’s rule, ing R: subset of points Problem 11 is similar to problem 10, except that the WORD LONG FORM SHORT FORM boundaries of a subinterval of the function values are 26 At->S(x) 42 425 used as boundaries for integration. These are assumed S(x)->Ac+ 17 17 to be the problem parameters. The code as originally 27 S(x) -> R 43 43R written in the IAS report is correct; however, two minor printing errors appear in the Collected Works as S(x) -> R 43 43R follows: 28 L L LL As printed in vol. 2, As later printed in WORD part 1 (Correct) Collected Works (incorrect) As with earlier examples, only one instruction is strictly 14 34, 26Sp´ 34, .26Sp´ necessary, but inserting a pair of identical instructions is simpler. Similarly, the usual adjustment of target addresses 23 –, – – h –, – h is required. A legitimate question is whether the implementation of different semantics for the L instruction would make Lagrangian interpolation the published solution correct and that we are simply ap- Problem 12 uses Lagrangian interpolation to calcu- plying the wrong ones. Different semantics for different late the coefficients of the unique polynomial of degree

IAS instructions were indeed known and published (for M – 1 that passes through M points (x1,p1) .. (xM,pM), and example, in the IAS reports, changes are evident from then evaluates that polynomial for some given x. The code volume 1 to volume 2). However, in this case the L instruc- is correct. tion was changed to modify the R register precisely to support binary to decimal conversion, which this example Three problems using Lagrangian was intended to illustrate. interpolation for a tabulated function For the emulator, we chose the semantics for all IAS in- Problem 13 is divided into three subproblems, each structions given in volume 2, part 1, the same report in showing different ways to use problem 12’s code to inter- which these problems were published.3 We are aware of polate a tabulated function. For these problems, there are

no consistent semantics for the L instruction that make N >> M points (p1,y1)..(pN,yN). The computer is first used to

the published listing work correctly for this problem. With find the index k of M points starting with yk that are closest the proposed correction, the code runs on the emulator to the value of a given variable y. The program then passes exactly as described, correctly converting numbers in IAS this index value to the code of problem 12 to evaluate the BCD format to their floating-point representations. function at y. For problem 13a, we assume the points to be equi- Double-precision sum distant, which means that the computer stores only the The code in problem 8 sums two 80-bit IAS numbers and total number and the endpoints. For problem 13b, the is correct as written. points are not equidistant, which means that the emulator must store all points explicitly. Problem 13c is identical to

Double-precision floating-point product 13b except that the pi and yi values alternate in memory The code in problem 9 multiplies two 80-bit IAS numbers instead of being stored as a vector of p’s followed by a and is correct as written. vector of q’s. Problem 13a has at least two logic errors. To perform a Numerical integration via Simpson’s rule certain arithmetic operation, the code uses three substitu- The problems from volume 2, part 2, are substantially tion orders at various places: more complex,4 and were chosen to illustrate the power and broad applicability of the electronic stored-program WORD LONG FORM SHORT FORM computer. 64 Ap´->S(x) 52 52Sp´ Problem 10 numerically integrates a function supplied as … N + 1 values f(x) on the closed interval x = [0..1]. The code 69 … as written is correct. There is only a minor printing error Ap->S(x) 50 50Sp in the Collected Works, which lists the contents of memory location 21 as 2N/3 but should instead be written as 2/3N. 72 Ap->S(x) 51 51Sp The annotation is correct in the IAS report. …

NOVEMBER 2012 65

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

PERSPECTIVES

For this operation to have the desired effect, the indi- WORD ORIGINAL CORRECTED cated memory locations must be zero before the emulator 81 42h, 65Cc 42h, 65Cc alters them (recall that substitution orders replace only 82 49, 50h 52, 51S parts of words). Even if we assume that memory locations that are not explicitly initialized begin with default values 83 51Sp´, 51 49, 50h of zero, two of the three referenced locations above are 84 R, 51Sp 51Sp´, 51 sinks of previous instructions, so at least two of them are 85 51h, 48S R, 51Sp´ incorrect. 51Sp´ , 51Sp The easiest correction is to find two memory locations 51h, 48S we can explicitly initialize to zero without further affect- ing the program. A review of the code shows the program can use the memory locations 48 (C.1), 49 (C.2), and 50 The insertion of two extra instruction words requires (C.1.1), which means the instruction in the right half of word incrementing all word addresses from 85 and beyond by 2. 69 can remain unaltered. Thus, if the program explicitly The code as corrected above produces the desired solution initializes memory locations 48–50 to zero, the following on the emulator. changes will make the code correct: Problem 13c has the same errors as problem 13b. The complete listing was not given in the original report, only WORD LONG FORM SHORT FORM those changes necessary from the code of 12 and 13b. 64 Ap´->S(x) 48 48Sp´ Making those changes coupled with the corrections above … requires suitably modifying the branch targets . Other than 69 … that, the code is correct. There is a printing error in the listing for this problem in Ap´->S(x) 50 50Sp the Collected Works. Instruction pair 53 reads 93, 62Sp but 72 Ap->S(x) 49 49Sp should read 93, 62Sp´. The listing is correct in the original report. Problem 13b suffers from the same deficiency. The so- lution, however, is more elaborate, because the affected Merging two lists substitution orders now occur in a loop. This requires The IAS authors deliberately chose problems 14 and 15 to explicitly clearing the memory locations during program be less mathematical in nature and more suggestive of data execution. processing. Clearly, von Neumann anticipated the powerful The affected sequence of instructions follows, grouped nonmathematical applications of digital computing. by pairs for clarity: Problem 14 inductively merges two lists of records. What the report calls a “complex,” we now call a record. A “se- WORD SHORT FORM quence” is a list in modern terminology, and a “principal 81 42h, 65Cc number” is a key. 82 49, 50h The listing contains what is probably a typographical error. The instruction in the second half of word 26 reads 10Cc´, 83 51Sp´ 51 but should read 10C´ (replacing a conditional branch with an 84 R, 51Sp unconditional one). With this change, the code runs correctly. 85 51h, 48S Sorting a list To ensure that memory location 51 is cleared before the Problem 15 uses the problem 14 code to inductively sort substitution order at 83, the program inserts a load from a a list by first merging successive pairs of lists of size 1, then memory location set to zero. In this case, it uses the lowest- merging half again as many lists of size 2, and so on. List numbered memory location not in use, which according to sizes that are not powers of two are accommodated. The the listing is #52. For the order at 84, however, that will not only error is the same one in problem 14. With that correc- work, because the next instruction needs the value in the tion, the code runs correctly. accumulator. Since the program only needs to explicitly clear the lower half of the word in this context (the upper LESSONS FOR COMPUTER half is already zero), the easiest solution is to insert an Ap´ SCIENTISTS TODAY substitution order. The program then follows it with a dupli- Revisiting the computational problem-solving processes cate order as a noop to preserve the parities of the branch first outlined in the 1947 IAS technical reports offers both a targets that follow. The following is a comparison of the trip back in time and a prescient glimpse into the future of original and corrected code: computing. Many of the issues computer scientists would

66 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

later grapple with, and continue to wrestle with today, can of orthogonality in interaction among IAS instructions. be seen in microcosm by retracing the process from flow Reasoning about side effects such as changing register diagram to emulated result. Four issues are particularly values, shifting bits from one register into another, and noteworthy. having some instructions modify others is notoriously dif- ficult. Adding support at the instruction-set level for specific Programming automatization computational tasks like binary-to-decimal conversion as Bridging the semantic gap between mathematics and the IAS machine did seems similar, for example, to the use electrical impulses was an intellectually demanding and of the POLY instruction in the VAX 11/780 40 years later.10 error-prone process, even for the most brilliant minds of It appears to significantly complicate the hardware, and it the post-World War II era. All of the IAS examples began makes correct programming at the assembly language level with correct mathematics, but the lack of automatic tools more challenging. to support the necessary transitional steps from flow dia- The emergence of reduced-instruction-set computer grams to bits led to the inevitable introduction of errors, architectures in the 1980s might be seen as a response paradoxically due to both the complexity and the tedium to concerns about the orthogonality and side effects in of the work required. As more hardware became available, instruction set design, as well as the implementation and researchers began to meet this need for transitional steps refinement of more complex instruction sets in terms of in the 1960s with assembly language, assemblers, high-level simpler micro-operations. Achieving the correct balance languages, and compilers, but the need to further remove between hardware and firmware may be a perpetual chal- human error from the programming process remains vital lenge for computer science. today. Once humans have indicated the problems they want their computing devices to solve, the less involvement they The challenge of testing a nonexistent computer have with that process, the better. None of the codes in the IAS technical reports could have been tested when they were published in 1947, since their Formal methods target machine was not fully functional until five years later. Related to the previous point, it is clear that von Neu- Obviously, emulation was not an option, so the researchers mann anticipated the use of more formal mathematical could rely only on their vision of how the machine would techniques in the programming process, even if he could work. Under those circumstances, the relatively small not employ them as extensively as he might have preferred. number of errors in the codes is quite remarkable. Much of the historical delay was probably due to the pro- digious increase in the number of computer programmers and mathematicians. Based on his writing, we suspect von third IAS technical report, which we have not yet Neumann would have viewed that trend negatively. He fully investigated, introduces two more program- wrote, for example, that the inclusion of a floating point in A ming problems.7 These are not specific mathematical the machine would have been a mistake, both because of tasks per se, but instead illustrate subroutining, linking, the complexity and because it encouraged a lack of math- and loading—tasks that were automated in later decades. ematical rigor. If a user did not know to within a power of We propose using IASSim to investigate these problems as two what the correct result of his computation should be, a topic for future work. he probably didn’t understand the problem well enough to Finally, although we understand that the computer be using the machine. science curriculum is already quite challenging, our explo- However, formal methods might now be maturing to ration into the IAS machine makes us wonder if some sort a point that would have gladdened von Neumann’s heart. of exposure to older machines might make sense for future Work is ongoing, for example, on an implementation of a computer designers. After all, those who do not learn from Domain Name System server that uses Ada and the SPARK computer history are condemned to repeat it. program analysis toolset to prove the absence of runtime exceptions.9 These tools require users to insert assertions References at various points in the code to indicate what properties 1. A.W. Burks, H.H. Goldstine, and J. von Neumann, “Pre- should hold there. The analogy to the assertion boxes of von liminary Discussion of the Logical Design of an Electronic Neumann’s original flow diagrams is immediately apparent. Computing Instrument,” Report to US Army Ordnance De- partment, Inst. for Advanced Study, 1946. Simplicity and orthogonality in instruction 2. H.H. Goldstine and J. von Neumann, Planning and Coding Problems for an Electronic Computing Instrument, vol. 1, set design part 2, Inst. for Advanced Study, 1947. Related to the lack of programming tools that were 3. H.H. Goldstine and J. von Neumann, Planning and Coding available for the IAS machine, many of the errors we found Problems for an Electronic Computing Instrument, vol. 2, were due to side effects, inconsistent semantics, and lack part 1, Inst. for Advanced Study, 1947.

NOVEMBER 2012 67

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

PERSPECTIVES

4. H.H. Goldstine and J. von Neumann, Planning and Coding 10. W.D. Strecker, “VAX-11/780—A Virtual Address Extension to Problems for an Electronic Computing Instrument, vol. 2, the DEC PDP-11 Family,” Proc. Nat’l Computer Conf., AFIPS, part 2, Inst. for Advanced Study, 1947. 1978, pp. 967-979. 5. A.H. Taub, ed., “Design of Computers, Theory of Automata Barry Fagin is a professor of computer science at the US Air and Numerical Analysis,” John von Neumann: Collected Force Academy. His research interests are computer science Works, vol. V, Macmillan, 1963. education, computing and public policy, and using formal meth- 6. D.J. Skrien, “CPU Sim 3.1: A Tool for Simulating Computer ods to improve internet security. He received a PhD in computer Architectures for Computer Organization Classes,” ACM J. science from the University of California, Berkeley. Fagin is a Educational Resources in Computing, Dec. 2001, pp. 46-59. member of ACM and is an IEEE Senior Member. Contact him at 7. H.H. Goldstine and J. von Neumann, Planning and Coding [email protected].______Problems for an Electronic Computing Instrument, vol. 3, part 2, Inst. for Advanced Study, 1947. Dale Skrien is a professor of computer science at Colby Col- 8. B.S. Fagin and D.J. Skrien, “IASSim: A Programmable Emu- lege. His research interests include algorithmic graph theory, lator for the Princeton IAS/Von Neumann Machine,” Proc. object-oriented design, and computer music. Skrien received a 42nd ACM Technical Symp. Computer Science Education PhD in mathematics from the University of Washington. He is (SIGSE 11), ACM, 2011, pp. 359-364. a member of ACM. Contact him at [email protected].______9. M. Carlisle and B. Fagin, “Creating a Provably Secure DNS Server,” tech. report, US Air Force Academy Center for Cy- Selected CS articles and columns are available berspace Research, Mar. 2011. for free at http://ComputingNow.computer.org.

CG&A IEEE Computer Graphics and Applications bridges the theory and practice of computer graphics. From specifi c algorithms to full system implementations, CG&A offers a unique combination of peer-reviewed feature articles and informal departments. CG&A is indispensable reading for people working at the leading edge of computer graphics technology and its applications in everything from business to the arts. Visit us at www.computer.org/cga

68 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

PURPOSE: The IEEE Computer Society is the world’s largest EXECUTIVE COMMITTEE association of computing professionals and is the leading President: John W. Walz* provider of technical information in the field. President-Elect: David Alan Grier* MEMBERSHIP: Members receive the monthly magazine Past President: Sorel Reisman* Computer, discounts, and opportunities to serve (all activities VP, Standards Activities: Charlene (Chuck) Walrad† are led by volunteer members). Membership is open to all IEEE Secretary: Andre Ivanov (2nd VP)* members, affiliate society members, and others interested in the VP, Educational Activities: Elizabeth L. Burd* computer field. VP, Member & Geographic Activities: Sattupathuv Sankaran† COMPUTER SOCIETY WEBSITE: www.computer.org VP, Publications: Tom M. Conte (1st VP)* OMBUDSMAN: To check membership status or report a change VP, Professional Activities: Paul K. Joannou* of address, call the IEEE Member Services toll-free number, VP, Technical & Conference Activities: Paul R. Croll† +1 800 678 4333 (US) or +1 732 981 0060 (international). Direct Treasurer: James W. Moore, CSDP* all other Computer Society-related questions—magazine delivery 2011–2012 IEEE Division VIII Director: Susan K. (Kathy) Land, CSDP† or unresolved complaints—to [email protected].______2012–2013 IEEE Division V Director: James W. Moore, CSDP† CHAPTERS: Regular and student chapters worldwide provide the 2012 IEEE Division Director VIII Director-Elect: Roger U. Fujii† opportunity to interact with colleagues, hear technical experts, *voting member of the Board of Governors †nonvoting member of the Board of Governors and serve the local professional community. BOARD OF GOVERNORS AVAILABLE INFORMATION: To obtain more information on any Term Expiring 2012: Elizabeth L. Burd, Thomas M. Conte, Frank E. of the following, contact Customer Service at +1 714 821 8380 or Ferrante, Jean-Luc Gaudiot, Paul K. Joannou, Luis Kun, James W. Moore, +1 800 272 6657: William (Bill) Pitts t Membership applications Term Expiring 2013: Pierre Bourque, Dennis J. Frailey, Atsuhiro Goto, t Publications catalog André Ivanov, Dejan S. Milojicic, Paolo Montuschi, Jane Chu Prey, Charlene t Draft standards and order forms (Chuck) Walrad t Technical committee list t Technical committee application EXECUTIVE STAFF t Chapter start-up procedures Executive Director: Angela R. Burgess t Student scholarship information Associate Executive Director; Director, Governance: Anne Marie Kelly t Volunteer leaders/staff directory Director, Finance & Accounting: John Miller t IEEE senior member grade application (requires 10 years Director, Information Technology & Services: Ray Kahn practice and significant performance in five of those 10) Director, Membership Development: Violet S. Doan Director, Products & Services: Evan Butterfield PUBLICATIONS AND ACTIVITIES Director, Sales & Marketing: Chris Jensen Computer: The flagship publication of the IEEE Computer Society, Computer, publishes peer-reviewed technical content that COMPUTER SOCIETY OFFICES covers all aspects of computer science, computer engineering, Washington, D.C.: 2001 L St., Ste. 700, Washington, D.C. 20036-4928 technology, and applications. Phone: tFax: +1 202 728 9614 Periodicals: The society publishes 12 magazines, 15 transactions, Email: [email protected]______and one letters. Refer to membership application or request Los Alamitos: 10662 Los Vaqueros Circle, Los Alamitos, CA 90720 information as noted above. Phone: +1 714 821 8380 Conference Proceedings & Books: Conference Publishing Email: [email protected]______Services publishes more than 175 titles every year. CS Press MEMBERSHIP & PUBLICATION ORDERS publishes books in partnership with John Wiley & Sons. Phone: tFax: t&NBJMIFMQ!DPNQVUFSPSH Standards Working Groups: More than 150 groups produce Asia/Pacific: Watanabe Building, 1-4-2 Minami-Aoyama, Minato-ku, IEEE standards used throughout the world. Tokyo 107-0062, Japan Technical Committees: TCs provide professional interaction in Phone: tFax: +81 3 3408 3553 more than 45 technical areas and directly influence computer Email: [email protected]______engineering conferences and publications. Conferences/Education: The society holds about 200 IEEE OFFICERS conferences each year and sponsors many educational activities, President and CEO: Gordon W. Day including computing science accreditation. President-Elect: Peter W. Staecker Certifications: The society offers two software developer Past President: Moshe Kam credentials. For more information, visit www.computer.org/ Secretary: Celia L. Desmond certification.______Treasurer: Harold L. Flescher President, Standards Association Board of Governors: Steven M. Mills VP, Educational Activities: Michael R. Lightner NEXT BOARD MEETING VP, Membership & Geographic Activities: Howard E. Michel 5–6 Nov., New Brunswick, NJ, USA VP, Publication Services & Products: David A. Hodges VP, Technical Activities: Frederick C. Mintzer IEEE Division V Director: James W. Moore, CSDP IEEE Division VIII Director: Susan K. (Kathy) Land, CSDP IEEE Division VIII Director-Elect: Roger U. Fujii President, IEEE-USA: James M. Howard

revised 18 Oct. 2012

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

RESEARCH FEATURE China’s Indigenous Innovation Policy: Impact on Multi- national R&D

Jason Dedrick and Jian Tang, Syracuse University Kenneth L. Kraemer, University of California, Irvine

Multinational corporations seeking access to China’s burgeoning con- sumer markets and human resources are establishing R&D centers in the country and developing ways to thread a path through its complex innovation policies.

ecently, the growth of R&D in emerging economies The answers to these questions offer an introduction such as Brazil, Russia, and particularly India and to China’s innovation policies and the R&D activities and China, has captured the attention of researchers.1 strategies of foreign MNCs in China. R Collectively called BRIC economies, these large and growing markets also produce many relatively low-cost sci- EMPIRICAL RESEARCH entists and engineers. To develop products for these markets, We studied China’s indigenous innovation policies, and and to tap their skilled human resources, multinational cor- the decisions and activities of major MNCs in the informa- porations (MNCs) are setting up R&D labs in these countries tion and communication technology industry in China. and in some cases outsourcing R&D activities to local firms. We also interviewed a dozen R&D executives at five large China has a strong desire to learn from MNCs, while US MNCs, executives of IT industry associations, and US developing domestic companies that can compete glob- government officials in China. ally and reduce China’s dependence on foreign intellectual Table 1 provides background information on each of the property (IP). The resulting indigenous innovation policies MNCs. We do not reveal company names at their request. have raised alarm among MNCs, which complain that these policies can be arbitrary and unfair to foreign companies.2 CHINA’S INDIGENOUS INNOVATION Based on a review of the literature and interviews con- POLICIES ducted in China in 2009, we asked the following questions: China is now the leading manufacturer of many elec- tronics products, assembling advanced PCs, mobile phones, t What are the objectives of China’s indigenous inno- networking equipment, and other high-tech goods. Yet only vation policies, and how is China translating these a few Chinese companies are globally competitive in any objectives into specific regulations and initiatives? of these industries, and MNCs or Taiwanese companies t What factors influence MNC R&D activities in China, produce most exports. As a result, although China plays a and what is the impact of China’s indigenous innova- major role in the global IT industry, it captures a small share tion policies? of the profits in the value chain.3 t How do MNCs manage R&D in China within the con- China’s government leaders want to move into higher text of their global organizations? value activities such as R&D, particularly the development

70 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 © 2012 IEEE

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Table 1. Background information for companies in the study.*

CharacteristicMNC 1MNC 2MNC 3MNC 4MNC 5

Industry sector Computers, software, Computers Software Semiconductors Mobile and services communications No. of employees 20,000 > 10,000 4,000 7,000 10,000 in China No. of R&D 6,000 total; 300 PhDs < 100 researchers 2,000 total, 250 in > 1,200 hardware 1,000 to 2,000 employees in China plus interns and research labs and software postdoctoral engineers candidates

* From company documents and interview notes.

of new products and advanced technologies.4,5 Starting (China’s largest mobile carrier), and the International in the mid-1980s, China instituted a series of policies to Telecommunication Union has approved it as a global promote domestic technology development for commer- standard.6,10 cial markets.6 These policies helped domestic enterprises The government clearly uses the standards-setting pro- and promoted innovation in the PC, electronics, software, cess as a tool to support domestic companies. Establishing integrated circuit, and telecommunications equipment domestic standards reduces the competitive advantage industries. of MNCs, which use technologies based on international China’s five-year 2006 to 2010 plan further targeted the standards. information industry by focusing on indigenous innovation. MNCs have been involved in some Chinese standards It emphasized initiatives, such as TD-SCDMA, the Audio Video Standard (AVS), and the Intelligent Grouping and Resource Sharing t developing domestic standards and technologies, (IGRS) protocol, a home networking standard.10 But MNCs t promoting innovation in IT products, and are not involved in other standards, such as the Wireless t supporting domestically owned technology firms. LAN Authentication and Privacy Infrastructure (WAPI). It would be fair to say that China sees the importance of par- At the same time, China announced a 15-year “Medium- ticipating in global standards bodies as well as the value of to-Long-Term Plan for the Development of Science and involving MNCs in its own standards forums. Technology,” which called for the country to become an In the longer run, China seeks to become a leading player innovation-oriented society by 2020 and a world leader in in international standards bodies, but plans to do so from a science and technology by 2050.7 position of internationalizing its own national standards as A statement by Zhang Dejiang, a member of the Po- well as localizing international standards.10 The MNCs real- litical Bureau of the Communist Party and vice prime ize that they will need to adopt China’s standards in some minister, captures the motivation behind these policies cases if they want to participate in the Chinese market, so (www.miit.gov.cn/n11293472/n11293877/n13702866/ they attempt to influence those standards when possible. n13702883/14206919.html):______The desire to promote domestic standards rather than just adopt international standards might put China behind Under the guidance of Decisions of Accelerating the in adopting some technologies. For example, its promo- Growth and Development of Strategic Emerging Industries, tion of TD-SCDMA for 3G mobile phone service and the it is important to enhance the policy support and strengthen decision to require China Mobile to adopt the standard left the capability of indigenous innovation, especially to make China years behind other countries in rolling out 3G mobile the IT industry to be the leading industry. … It is also phone service. Yet the government was willing to pay that essential to continue supporting TD-SCDMA [time division price to promote a domestic standard and ensure that do- synchronous code division multiple access, a standard], and mestic equipment manufacturers such as Datang, a state encourage the industrialization and internationalization of enterprise under the China Academy of Telecommunication TD-LTE [time division, long-term evolution]. Technology, would have a leading role in the 3G market.10

Promoting domestic standards and technologies Promoting domestic innovation China seeks to develop IP and core technologies, and To promote domestic innovation, the government offers views technical standards as crucial to its success.8,9 It has tax incentives and other financial benefits to domestic and been working hard to push Chinese standards as interna- foreign firms that set up R&D centers in China. To be eli- tional standards. For example, the government selected gible for these benefits, firms must seek certification, which TD-SCDMA to be the 3G mobile standard of China Mobile means they must

NOVEMBER 2012 71

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

RESEARCH FEATURE

t register in mainland China (which does not include the PC market. Even favored state enterprises often face Hong Kong, Macau, and Taiwan), competition in the sectors they dominate.11 t engage in R&D, t develop independent IP in core technologies, and Bureaucratic competition in policy t file patents in China.9 implementation Although outsiders might see China’s government as Most certified firms are domestic companies, as the a unified actor making policies that affect the MNCs, the requirements are problematic for foreign firms. According reality is much different—the state’s role can be ambigu- to one interviewee, the head of an IT industry organiza- ous and is not always unified.10 Several central government tion, “There are some high-profile cases where companies institutions implement indigenous innovation policies; each left China or chose another location in Asia, such as institution has different agendas, as do provincial and city the Philippines, because of the IP laws and certification governments.4 requirements.” Other MNCs conduct R&D in China without The key central government agencies are the Ministry of receiving certification or the associated incentives. Science and Technology (MOST), the National Development The government also adopted measures to speed tech- and Reformation Committee (NDRC), and the Ministry of nology development and transfer, including financial Education.2 The Ministry of Industry and Information Tech- support, tax incentives, IP protection, and domestic R&D nology (MIIT) is a key agency in the information industry. centers. It also required more technological investments The Standardization Administration of China (SAC) leads from MNCs, including R&D centers that engage in research in developing standards policies. According to interview- collaboration with local researchers and institutions. Our ees, there is inconsistency and sometimes conflict among interviews indicate that China anticipates that domestic central government agencies. This might reflect not only researchers in these collaborations will have access to ad- institutional rivalry, but also the personalized nature of vanced technologies from the MNCs. many policy processes in China, which only increases the level of uncertainty and ambiguity in policy outcomes.4 Policy objectives can also differ between the central China’s indigenous innovation policy and local governments. For example, the central govern- gives preference to domestic companies ment sets the certification criteria that define a high-tech in procurement by government agencies company, whereas local governments certify individual and state-owned enterprises. companies. MNCs seek high-tech certification because it reduces the corporate income tax from 25 to 15 percent. For certification as a high-tech company, an MNC’s local subsidiary should perform R&D and file patents in China. Supporting domestic firms However, most local governments mainly want jobs and China’s indigenous innovation policy gives preference have been willing to certify MNCs as high-tech companies to domestic companies in procurement by government without strict adherence to the criteria. As one interviewee agencies and state-owned enterprises. Regulations state stated, “Local governments are not fussy about what they that “If government departments purchase software related label as R&D in their reports to the central government, so to national sovereignty or economic security, they should a wide variety of activities end up being called R&D.” follow the procedure of government procurement” and give As another interviewee stated, “The local governments preference to local companies.9 are under pressure to stimulate high-tech industry, so they China also promotes national champions to act as a attract companies that appear on the surface to be doing counterbalance to the market power of MNCs in specific high-tech work although in reality they might not be doing sectors; it also encourages these champions to become so. Although the central government is concerned about the innovators capable of competing globally.2 As one inter- long-term impact and the development of indigenous R&D, viewee said, “China’s strategy is to create one strong player local governments are not.” in each industry segment and to build them up to dominate The result of competition among localities for invest- the China market and prepare them to go global. They do ment and jobs is the emergence of a regionalized high-tech not care about creating competition among local com- industry, with major regions specializing in different panies, and they want to protect these companies from aspects of production and innovation.4 For example, Beijing foreign competition.” However, having national champions hosts MNCs and domestic firms specializing in software does not mean that these sectors are competition free. For development and is the home to many MNC R&D labs, as example, competes at home and abroad with ZTE well as Lenovo. The industry is concentrated in the Zhong- in networking equipment, while Lenovo, China’s leading guancun Science Park, a development supported by the PC maker, faces both domestic and foreign competitors in central and Beijing municipal governments.12

72 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

The Shanghai area hosts several MNC R&D labs and tioned market growth as a reason for manufacturing in is home to both MNCs and domestic semiconductor and China, and cited specific market opportunities for product telecommunications companies. Shanghai’s municipal gov- development in the country. ernment has played a key role in developing science parks How does this market potential translate into a need for and promoting the local IT industry.4 R&D in China? One factor is understanding market needs. The Pearl River Delta in southern China hosts the largest One general manager stated that “China is valuable for R&D concentration of hardware manufacturing, including the because the economy is huge and growing bigger, and the massive Foxconn campus near Shenzhen, which makes customers have unique [scale] requirements. By being in products for Apple, HP, Dell, Intel, and others. It is also China, we can gain an edge over competitors because we home to China’s greatest homegrown high-tech success understand these requirements better than others.” story, Huawei, a network equipment company. The Chinese market also has some characteristics that create novel R&D opportunities for MNCs. For example, FACTORS INFLUENCING R&D DECISIONS China bans sales of most videogame consoles, and only Key factors influencing the location of MNC investment a few retail outlets sell games. Instead, consumers can in overseas R&D include a large domestic market, availabil- download games from government-approved websites. One ity of low-cost R&D manpower, and the scale of national company said that this created a potential market for tech- technology capabilities. There is no clear evidence that nology that accelerates downloads and leads to performing R&D incentives offered by foreign governments have an related work in its China R&D lab. impact on R&D intensity or that adverse policies (such as inadequate patent protection or restrictive trade regimes) affect the attractiveness of a country for R&D.13 Key factors influencing the location of Our interviews support prior research by showing that MNC investment in overseas R&D include MNCs are attracted to China primarily by the size of the a large domestic market, availability of domestic market and the availability and low cost of R&D low-cost R&D manpower, and the scale talent.14 However, China’s technological capabilities do not of national technology capabilities. appear to be an important attraction; its perceived weak protection of IP rights might limit the types of R&D activi- ties conducted there. Another interviewee pointed to the potential for research opportunities that take advantage of the vast amount of Domestic market data that certain events can generate in China, such as Web The size and growth rate of China’s economy make it traffic during the 2008 Olympics. For technologies such a unique attraction for MNCs, leading them to make con- as large-scale data mining or managing network capacity cessions that they might not make in other markets. For during huge spikes in traffic, China can serve as a unique example, China has as many mobile phone users as the research environment. combined populations of the US and the European Union (about 800 million), and has an estimated 538 million Inter- R&D talent availability and cost net users. China’s economy is larger than the combined GDPs Access to China’s large pool of science and engineering of the other three BRIC economies. A continuation of the graduates is a major factor for most MNCs locating R&D in double-digit growth of the past three decades could make China. China’s universities and colleges produce an abun- China the world’s largest economy in less than 20 years. dance of graduates in science and engineering. Although At the same time, it is difficult for foreign companies to most of these graduates are not of the caliber that MNCs re- enter China’s market. Obstacles include inadequate physi- quire, MNCs select from the cream of the crop—the top 0.5 cal and financial infrastructure in many places, lack of percent, according to one company, or the top 10 schools, enforceable commercial laws, weak IP protection, heavy according to another. competition from domestic firms with lower costs, and Competition for talent has increased as more MNCs enter an array of government restrictions on the activities of all the market, along with Taiwanese and mainland Chinese companies, particularly foreign companies. In the words companies. According to several interviewees, state-owned of one interviewee, “Policy is everything and is arbitrary. enterprises, once unattractive to talented graduates, now One day you can do [a type of] business, the next day they offer competitive salaries and better benefits—such as sub- say, ‘Sorry, you can’t.’” sidized housing—compared with MNCs. In addition, the Despite these issues, the Chinese market is so attrac- prestige of working for an MNC has somewhat diminished. tive that MNCs must be there. The representatives of four This competition has led to salary increases, especially of five MNCs we interviewed mentioned market access as for experienced scientists and engineers, as well as for a major reason for locating R&D in China. The fifth men- managers. Although competition is becoming more intense

NOVEMBER 2012 73

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

RESEARCH FEATURE

and salaries are increasing, the quality of graduates has weaker and mixed effect on MNCs. Companies are gen- also improved. erally unhappy with some requirements, but have been One interviewee said, “People used to get PhDs in two willing to expand their R&D activities in China in spite of to three years. No research methodology, just theory. Now those concerns. When incentives are available, they seek the education system has improved. They have numerous certification as high-tech companies. In general, they professors with degrees from the US and experience in US do better with local governments than with the central universities. The gap is much smaller than it was.” government. The biggest shortage is in middle managers and higher- A US official said, “The central government offers sub- level leaders who can run a project or an entire division. sidies to domestic companies for indigenous development There are few people with 10 to 15 years’ experience in of technology. But there is no clear definition of what a China, and bringing experienced personnel from the US is domestic company is.” expensive. Salaries for people with 15 years’ experience are The policy of requiring IP registration in China for firms comparable to those in other locations such as Ireland or that desire treatment as domestic companies is a major Israel, according to one interviewee. One solution to finding concern to some MNCs, less so to others. This difference experienced people is to hire Chinese nationals who have might relate to differences in the firms’ strategies, whether studied and worked in the US or other locations to manage they seek incentives, or the extent to which they focus on teams in China. the government and SOE markets. According to one interviewee,

Registering IP in China doesn’t fit with a global opera- Although MNCs might look for incentives tions model, where R&D is done in a unified way. How do or subsidies, the bigger motivation is to you justify having some part of it coming from China, and gain favor from government officials. how do you protect it if you do define some part as from China? The business issue is this: Do the benefits of licensing in China, like tax benefits, potential sales, goodwill with the government, outweigh the IP risk?

Despite increased competition and cost, as well as short- On the other hand, another US MNC said that it had ob- ages in some skills, the availability and quality of science tained certification as a high-tech company. The company and engineering talent is clearly a major attraction for firms indicated that the Chinese government defined the cri- doing R&D in China. Cost is mentioned less often, but it is teria in advance, and the company reports performance an advantage. To be clear, although salaries are rising in every year. This company has made a major commitment China, there is still a huge gap compared with the US. As of to China as a manufacturing and product development lo- 2005, a newly graduated computer engineer in China could cation, as well as a market, so potential tax incentives are expect to start at $7,500 to $10,000 a year, while in the US, especially valuable. the figure was around $60,000.15 Some MNCs have been more aggressive in challenging China’s policies and trying to involve the US government. INFLUENCE OF CHINA’S POLICIES ON MNC Others try to keep a low profile and avoid possible STRATEGIES retaliation from the Chinese government. The most vis- China’s policies in general have a major influence on ible and contentious issues in the past have been over IP the decisions of MNCs to locate R&D in China. As one in- protection—for example, from software piracy—standards terviewee said, “Most companies are doing only as much setting, and content censorship. as the government forces them to. Market access requires MNCs were successful in acting together to challenge doing R&D in China.” MIIT’s 2009 order that all new PCs come with Green Dam Although MNCs might look for incentives or subsidies, software installed to block certain Internet content. The the bigger motivation is to gain favor from government of- MNCs argued that this was an unreasonable requirement, ficials. In the words of a former R&D director for a major and eventually MIIT dropped the requirement. This success MNC, “The main reason that MNCs come to China is cheap came largely because the MNCs allied themselves with Chi- labor, but it is also to have influence with the government nese PC makers and consumers, and with the US and other so that these companies can participate in large Chinese governments. In contrast, Google shut down its mainland government procurements or in the consumer market. If China search engine for a time after being unable to resolve companies play the game right, they can get considerable censorship issues. In this case, the US government was help from the government in many different forms.” powerless to influence China’s position in spite of criticism China’s indigenous innovation policies seem to have a from the US secretary of state.

74 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Table 2. Motivation, activities, and management of China R&D.

Characteristics MNC 1 MNC 2 MNC 3 MNC 4 MNC 5

Factors influencing R&D location in China Key motivations for Market access, Market access, Win government Market access, low- Win government R&D in China understand market, understand market favor and support for cost talent, be a favor, develop China influence policy, needs, access to IP protection “good citizen” as major market, tap access to talent talent local talent MNC interaction with the local innovation system Local partnerships University-focused: Joint R&D projects Industry and univer- Joint R&D projects Industry focused hire talented stu- with universities sity focused, and education dents, joint projects outsourced software programs development IP policies IP managed globally IP managed globally, IP managed globally IP managed globally, IP registered in China share IP from joint share IP from joint and globally if devel- projects research oped in China Response to indige- Try to influence and Does not seek treat- Developing local Built a fabrication Certified as high-tech nous innovation shape policy behind ment as domestic outsource suppliers, plant, increased R&D company for lower policy the scenes company attract R&D to China activity tax rate China R&D strategy R&D activities in Development and Localization, poten- Research and Develop extensions Development for China testing for global tial to develop develop technolo- of existing technolo- local market, devel- teams, localization technology for gies for global gies for local market, opment and test for global market business units possible use in other global projects markets; testbed for unique conditions Management control Limited control, deci- Limited control, deci- Independent pro- Matrixed organiza- Lead some global sions made in US or sions made in US jects, integrated into tion reporting to projects, compete elsewhere global projects; busi- local management with other global ness units are all and corporate teams labs represented in China lab

In the case of indigenous innovation, US MNCs made a for an important government catalogue prepared by major issue of discrimination in the procurement aspects MIIT, to ensure that it will not be used for import of the policy and obtained support from the US government substitution, the provision of export subsidies, or to in negotiating with China on the issue. Possibly as a result, discriminate against American equipment manufac- the Chinese government announced changes in its policy turers in Chinese government programs targeting during President Hu’s state visit to Washington in January these products. 2011. Specifically, the Chinese promised to delink indig-

enous innovation from government procurement (www.___ MNC R&D STRATEGIES IN CHINA ______reuters.com/article/idUSTRE70J7RL20110121). As Table 2 shows, MNC strategies have focused primarily The White House described the agreement as fol- on using low-cost talent to exploit their technology assets lows (www.whitehouse.gov/the-press-office/2011/01/19/ by localizing existing products to the Chinese market rather fact-sheet-us-china-economic-issues):______than developing technologies for global markets. However, R&D activities have evolved as local scientists and engineers t The US and China agreed that government procure- have gained experience and capabilities, as well as the con- ment decisions will not be made based on where the fidence of corporate management. Although no China lab goods’ or services’ IP is developed or maintained, that has the independent authority enjoyed by more established there will be no discrimination against innovative labs in Europe, Japan, or Israel, some have begun to move products made by foreign suppliers operating in China, in that direction. and that China will delink its innovation policies from its government procurement preferences. MNC 1: Computers, software, and services t China agreed to eliminate discriminatory indigenous The China R&D group in MNC 1 focuses on localiza- innovation criteria used to select industrial equipment tion of products for China and on testing for the whole

NOVEMBER 2012 75

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

RESEARCH FEATURE

corporation. It thus works on a broad scope of technolo- develop a domestic outsourcing industry that is competi- gies, but MNC 1 still limits its role to a small part of the tive with India. R&D process. This R&D group does not act autonomously, but is under the control of corporate R&D management. MNC 4: Semiconductors According to one MNC 1 interviewee, MNC 4 has been aggressive in trying to transition from little more than a satellite operation created for public rela- China R&D does product R&D for our whole corpo- tions to an independent lab on par with other leading labs rate business model. China does the test phase and some outside the US. localization; architectural design and business development The director of research at MNC 4 stated that the com- and delivery models are all done by units outside China. pany’s R&D had gone through four phases since it first We invest a lot rotating people in China through the vari- established a lab in China 10 years ago. At first, MNC 4 was ous labs. In the future, some development and business just trying to “give back to China,” as it had been making a direction may shift to China, but decisions about product lot of money there. offerings and positioning of the product will be decided In the initial phase, Chinese engineers were well behind outside China. the skills of their counterparts in other countries. They thus worked on software that was for internal use only, not for MNC 2: Computers the company’s products. In the second phase, teams in In MNC 2, the China lab serves the company’s business the US sent tasks to the China lab for the development of units and participates in development for those units rather designs initiated in the US. In the third phase, some senior than in research. However, there is some room for local engineers in China could initiate a project, but the team in initiative, with the possibility of developing technologies China could not carry out the entire project. The current for use in the parent company. fourth phase is a shift to developing an independent R&D lab capable of carrying out complete projects to develop technologies for use in China and other markets.

IP developed in partnership with local MNC 5: Mobile communications universities is jointly owned; the MNC 5 has a history of extensive R&D activity in China, company files patents in China as a major market and operational center for the company. Its well as the US. R&D labs are part of a global network, and the company expects that China will move from a following to a leading role over time. According to the R&D director,

“[MNC 2] is close to [our] business units. We develop Our different R&D centers around the world coordinate demos that the business units request. We also develop and compete with one another. The R&D centers try to get demos based on our own imagination and show them to involved in projects rather than just wait to be chosen. Each the business units.” business unit looks at R&D globally and decides where it IP developed in partnership with local universities is wants to do things. If the cost of other locations is too high, jointly owned; the company files patents in China as well they’re likely to grow more in China. Our R&D center’s mis- as the US. As one interviewee said, “Patenting is not dif- sion is to transition R&D from localization and support to ferent in China from elsewhere. [We] have experienced, development projects and then to projects for some global professional people in the company to help with patenting.” markets.

MNC 3: Software EXPECTATIONS AND IMPLICATIONS MNC 3 operates as an independent R&D unit serving The MNCs in this study conduct R&D in China primar- the firm’s global businesses. All of the company’s business ily because China’s government at least implicitly expects units are present in the China lab and operate indepen- such investment in exchange for market access and favor- dently of each other, working on their own projects. The lab able treatment. Some seek to exploit China’s large pool of director referred to this as a federated model. This company low-cost talent; others see market opportunities for their has a heavy focus on basic research and operates its China products and services as well as learning opportunities that lab accordingly, “hiring top researchers and leaving them they can apply to other large emerging markets. They also alone,” according to the director. seek to meet the special requirements of local customers. MNC 3 also does a substantial amount of software These R&D centers seldom operate independently of an localization and outsources to local firms as part of an MNC’s business units or its other R&D units. Most perform agreement with the government. The goal is to help China a well-proscribed development function within this larger

76 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

framework, usually more development and testing than global sales in 2011 (www.bloomberg.com/news/2011-10-19/ actual research. R&D management outside China, usu- china-becomes-apple-s-second-largest-market-by-sales-______

ally in the US, determines their activities. However, a trend cook-says.html#).______Whether Apple can sustain its growth toward greater autonomy is arising at some companies. without committing to R&D in China remains to be seen. One lesson from the history of MNCs in China is that Implications for MNCs an MNC should not individually challenge policies that it China is serious about becoming a center for indigenous finds unacceptable. China does not need any individual innovation, so MNCs must carefully consider whether and MNC, but it does need MNCs as a group to help achieve its how to develop R&D there. technology goals. So the government sometimes reconsid- It is true that China generally favors domestic firms in ers when facing complaints from several MNCs, especially many policy decisions. Although it is convenient to see when these firms can rally local allies, as in the Green Dam a dynamic that pits the Chinese government against the case. MNCs can also solicit pressure from the US or other MNCs as a group, the reality is much more complex. Various governments, especially when a policy is inconsistent with central ministries as well as provincial and local govern- international rules. ments set and implement Chinese policies, and they do not Google’s experience highlights the risks of a direct chal- always coordinate efforts. lenge to the government by a single company. China’s rich MNCs can sometimes thread a path through the system complexity requires that MNCs develop a highly nuanced and benefit from favorable treatment, especially from pro- strategic approach. MNCs must balance helping to advance vincial and local governments, which are more interested China’s goals in return for market access without giving up in receiving investment than in enforcing indigenous in- their own sources of competitive advantage. novation policies. On the other hand, it is difficult for MNCs to know where they stand; one institution might overturn ecause of strong motivations to invest in R&D regard- another’s approval. less of policies, it appears that in many cases, China’s B indigenous innovation policies do not matter. Com- Lessons learned panies with experience in China continue to prosper. As Several lessons come from the experience of the MNCs in Apple’s experience demonstrates, even new entrants that this study. Some apply to all firms, whereas others depend have products Chinese consumers want can do very well. on a specific firm’s circumstances in China. Indigenous innovation policies might even benefit MNCs Although government agencies and state-owned enter- that have a strong commitment to China, but those com- prises are a difficult market to break into, MNCs continue panies must be very careful about exposing IP to take to anticipate that their share of domestic business will in- advantage of government incentives. crease as China grows. They sometimes compare China to Japan and Korea, where protectionist economies have References gradually opened up, and MNCs have grown their busi- nesses with domestic companies. This confidence appears 1. Y. Sun, M. Von Zedtwitz, and D.F. Simon, “Globalization of R&D and China: An Introduction,” Asia Pacific Business to be justified by the performance of firms with greater Rev., vol. 13, no. 3, 2007, pp. 311-319. experience in China. In a recent survey, only 42 percent of 2. J. McGregor, “China’s Drive for ‘Indigenous Innova- US companies with less than two years in China reported tion’: A Web of Industrial Policies,” US Chamber of China operations were profitable or very profitable. In con- Commerce, 2010; www.uschamber.com/sites/default/files/ trast, that figure was 81 percent for firms with 10 to 20 reports/100728chinareport.pdf.______years in China, and 76 percent for firms with more than 3. G. Linden, K.L. Kraemer, and J. Dedrick, “Who Captures 20 years’ experience.16 Value in a Global Innovation Network? The Case of Apple’s iPod,” Comm. ACM, Mar. 2009, pp. 140-144. But China is also different in many ways. Japan and 4. D. Breznitz and M. Murphree, Run of the Red Queen: Gov- Korea encourage competition among private domestic ernment, Innovation, Globalization and Economic Growth in companies as well as with foreign MNCs, whereas China China, Yale Univ. Press, 2011. promotes national champions in many sectors. In the long 5. M. von Zedtwitz, “Managing Foreign R&D Laboratories in run, domestic companies are likely to become competitive China,” R&D Management, Sept. 2004, pp. 439-452. in more industries both at home and globally. 6. A. Segal, Advantage: How American Innovation Can Over- A key issue for foreign MNCs is to balance a realistic view come the Asian Challenge, W.W. Norton and Co., 2011. of market potential against the risks of exposing IP through 7. C. Cao, R.P. Suttmeier, and D.F. Simon, “China’s 15-Year Science and Technology Plan,” Physics Today, Aug. 2006, R&D in China’s complex and uncertain environment. An in- pp. 38-43. teresting case is Apple, which has no R&D in China, yet has 8. G. Linden, “China Standard Time: A Study in Strategic In- seen its sales there quadruple in one year. China ranks as dustrial Policy,” Business and Politics, vol. 6, no. 3, 2004, pp. Apple’s second largest market, accounting for 16 percent of 1-26.

NOVEMBER 2012 77

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

RESEARCH FEATURE

9. Ministry of Information Industry, “Guidance of Accelerat- 16. AmCham-China, American Business in China, American ing Independent Innovation in Information Industry,” Sept. Chamber of Commerce in China, 2011. 2006; www.gov.cn/zwgk/2006-09/01/content_375841.htm (in Chinese). Jason Dedrick is an associate professor in Syracuse University’s 10. R.P. Suttmeier, X. Yao, and A.Z. Tan, Standards of Power? School of Information Studies. His research interests include the Technology, Institutions, and Politics in the Development of globalization of technology and innovation, global value chains China’s National Standards Strategy, Nat’l Bureau of Asian in the electronics and wind energy industries, national technol- Research, 2006. ogy policies, and the economic and organizational impacts of IT. 11. B. Naughton, “China’s Economic Policy Today: The New Dedrick received a PhD in management from the University of State Activism,” Eurasian Geography and Economics, May/ California, Irvine. Contact him at [email protected]. June 2011, pp. 313-329. 12. Y. Zhou and T. Xin, “An Innovative Region in China: Interac- Jian Tang is a doctoral student in Syracuse University’s School tion between Multinational Corporations and Local Firms of Information Studies. Her research interests include IT use in a High-Tech Cluster in Beijing,” Economic Geography, Apr. and evaluation (especially from the ecological psychology per- 2003, pp. 129-152. spective) and the information industry and innovation policies 13. N. Kumar, “Determinants of Location of Overseas R&D in developing countries. Tang received a BA in information Activity of Multinational Enterprises: The Case of US and management and information systems from Renmin University Japanese Corporations,” Research Policy, Jan. 2001, pp. in Beijing, China. Contact her at [email protected]. 159-174. 14. Y. Sun, “Strategic or Tactical? Foreign Research and Devel- Kenneth L. Kraemer is a research professor at the Paul Merage opment in Developing Countries: A Case Study of China,” School of Business and codirector of the Personal Computing Asian Geographer, vol. 22, nos. 1-2, 2003, pp. 143-167. Industry Center, University of California, Irvine. His research 15. J. Dedrick and K.L. Kraemer, “Impact of Globalization and interests include the social implications of IT, national policies Offshoring on Engineering Employment in the Personal for IT production and use, the contributions of IT to productiv- Computer Industry,” The Offshoring of Engineering: Facts, ity and economic development, and the value of innovation in Unknowns, and Potential Implications, Committee on the global innovation and production networks. Kraemer received Offshoring of Engineering, Nat’l Academies Press, 2008, pp. a PhD in public policy and management from the University of 125-136. Southern California. Contact him at [email protected].______

NEW+EXPANDED IEEE COMPUTER SOCIETY’S COMPUTING NOW WEBSITE

Learn industry solutions you can use from practical articles, case studies, blogs, and interviews that address high-interest, focused areas of technology.

Mobile Computing rCloud Computing r Security r Software r High-Performance Computing r Networking

Visit http://computingnow.computer.org

78 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

GREEN IT Sustainable IT: Challenges, Postures, and Outcomes

Edward Curry, National University of Ireland, Galway Bill Guyon, Intel Charles Sheridan, Intel Labs Europe Brian Donnellan, National University of Ireland, Maynooth

Sustainable IT capabilities benefit not only the environment but also business value.

ustainability is an impor- SUSTAINABLE IT challenges in developing clear busi- tant business issue, CHALLENGES ness strategies, which might not fully affecting new products Despite an increasing profile and address sustainable IT. This puts the S and services, compliance tangible, measurable benefits, there onus on the IT department to deliver requirements, cost-reduction oppor- remain numerous misconceptions the benefits of sustainable IT across tunities, reputation, and revenue about sustainable IT—that it’s simply the organization. generation. Many people think that about saving the planet and isn’t a incorporating sustainable practices business issue; that it’s driven by com- SUSTAINABLE IT requires a significant transforma- pliance; that it only concerns energy FRAMEWORK tional program, but the ultimate goal savings, the datacenter, or what goes Sustainability is still a relatively is to embed sustainability into busi- on in IT’s own arena; and that it’s new, complex subject with few ness-as-usual activities. expensive to implement. guidelines and best practices. Those Researchers have estimated that Businesses considering sustainable responsible for achieving sustainable information and communications IT face many questions: IT can feel like they are pioneers in technology (ICT) is responsible for at uncharted territory with no map to least 2 percent of global greenhouse t Does the organization recognize guide them. This means that once gas emissions, with datacenters IT as a significant contributor to they’ve reached certain milestones, it’s accounting for about 1.3 percent. In its overall sustainability strategy? unclear where they should go next and any individual business, ICT accounts t How does IT contribute to the how far along the journey they are. for a much higher percentage of its organization’s sustainability To address this issue, a consortium carbon footprint. goals? of leading organizations from indus- Yet, researchers also estimate that t What more could IT do to con- try, the nonprofit sector, and academia ICT can reduce an organization’s tribute to those goals? have developed a framework for carbon footprint fivefold. To lever- t Are there clear, measurable improving sustainable IT capabili- age these benefits, many corporate objectives for sustainable IT? ties (B. Donnellan, C. Sheridan, and E. IT departments are now looking to Curry, “A Capability Maturity Frame- develop sustainable IT capabilities. The issue is further complicated by work for Sustainable Information Unfortunately, these organizations the fact that sustainability is an enter- and Communication Technology,” IT often don’t exploit IT’s full potential in prise-wide issue that spans the full Professional, vol. 13, no. 1, 2011, pp. their efforts to achieve sustainability. value chain. The business already has 33-40).

0018-9162/12/$31.00 © 2012 IEEE Published by the IEEE Computer Society NOVEMBER 2012 79

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

GREEN IT

Maturity Cost Center Service Center Investment Center Value Center

Continuous, Continuous Aligned to business Sustainability Optimizing sustained IT sustainable service strategy, embeddedi opportunities efficiencies improvement n portfolio drive business revenue

Unmanaged, Emerging Predictable Regular, predictable strategy, Advanced incremental service enhancements unfunded, undefined value repeatable impact costsavings to the business Cross-functional Defined objectives, Defined process to Individual efforts, capabilities to Intermediate accountable meet business limited recognition dentify new individuals sustainability needs of sustainability sustainability opportunities Driven by IT Occasional Occasional service- strategy, projects Basic Cost savings driven product by tech upgrades level sustainability return predictable efficiency sustainability sustainability improvements impacts Limited Defined governance, Undefined cost new IT deployed with Limited Initial savings, limited sustainability in opportunities service areas defineds ustainability output

Figure 1. The four basic IT postures at varying sustainable IT maturity levels.

This framework serves two impor- more efficiently to aligning business Figure 1 compares these postures at tant purposes. First, it’s the basis of with IT and identifying those sus- the five sustainable IT maturity levels. an assessment process that helps an tainability processes where IT can Regardless of its posture, IT can organization determine the current contribute. realize business value by maturing maturity level of their sustainable IT When defining sustainable IT prac- in the area of sustainable IT. How- efforts. Second, it provides a view of tices and capabilities, it’s important ever, IT’s posture will determine the the growth path by identifying the to consider their potential value from maximum achievable business value next set of capabilities an organiza- the vantage point of different IT pos- over time. For example, as long as IT’s tion should develop to drive greater tures within the organization. There posture is a cost center, no matter business value from sustainable IT. are four basic sustainable IT postures: how much it matures, it will always The framework defines a maturity emphasize improving efficiencies. curve with five levels—initial, basic, t UIFDPTUDFOUFS manages the direct However, shifting to a service center intermediate, advanced, and optimiz- sustainability costs within the IT posture could help IT get its foot into ing—for sustainable IT capabilities arena, with only indirect benefits the business side of value. An effec- including strategy and planning, for the business; tive sustainable IT program can help processes management, people and z the service center focuses on IT reposition itself from the viewpoint culture, and governance. the sustainability of IT services of both customers and management. supplied to support the business; IT POSTURES AND z the investment center delivers SUSTAINABLE IT AT INTEL SUSTAINABILITY predictable sustainability Intel has long recognized sus- Sustainable IT goes beyond using benefits across both IT and the tainability as a strategic priority for IT to reduce energy consumption. business; and its company and has become a rec- It’s also about helping the whole t UIFWBMVFDFOUFS leverages sus- ognized leader in the space. At the business meet its sustainability tainable IT as a strategic asset beginning of 2008, CEO Paul Otellini targets. This greatly extends IT’s to drive sustainable business set out an ambitious five-year plan scope from simply executing the IT opportunities as a competitive to reduce environmental impacts in design-procure-run-dispose life cycle differentiator. several areas, including energy, water,

80 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

and reduction of carbon emissions by to 2007. During the same time period, land, Galway. Contact him at edward._____ 20 percent on 2007 levels. IT’s computing processing capac- [email protected].______Seeing this as an opportunity for ity increased 159 percent, storage Bill Guyon is a program manager IT to play a key role in achieving the increased from 18.6 to 38.2 petabytes, at Intel’s IT Sustainability Program company’s sustainability goals , CIO and network bandwidth increased Office. Contact him at bill.guyon@______Diane Bryant established the IT Sus- from 3.0 to 6.2 gigabits per second— intel.com. tainability Program. The program all while delivering IT services to an Charles Sheridan is the associate used an investment posture to help additional 11,000 employees. More- director of Intel Labs Europe’s Energy the business deliver on its objec- over, Intel’s annual revenue rose by and Sustainability Research Lab. Con- tives by reducing the environmental 41 percent. tact him at charles.g.sheridan@intel.______impacts of IT operations, and to help com.___ transform the overall organization (E. Brian Donnellan is the academic Curry et al., “Developing a Sustainable ntel IT’s experience dem- director of the Innovative Value Insti- IT Capability: Lessons From Intel’s onstrates that choosing an tute, National University of Ireland, Journey,” MIS Q. Executive, Jan. 2012, Iappropriate posture for sustain- Maynooth. Contact him at brian.____ pp. 61-74). able IT, together with a structured [email protected].______One of the primary ways Intel methodology to maturing that capa- IT reduced its carbon footprint was bility, can deliver tangible fi nancial through server consolidation in and environmental savings, all while Editor: Kirk W. Cameron, Dept. of Computer its datacenters. While chip perfor- assisting businesses to meet their Science, Virginia Tech; [email protected]______mance doubles every 18 months, the overall sustainability targets. energy consumed by the chip does Selected CS articles and not double. Moore’s law thus drives Edward Curry is a research scientist continuous chip-level energy effi- at the Digital Enterprise Research columns are available for free at ciency, meaning that newer servers Institute, National University of Ire- http://ComputingNow.computer.org. and laptops use less power than older machines to do the same work. Intel IT has settled on a four-year server refresh policy, which has CONFERENCES allowed it to double processing capac- in the Palm of Your Hand ity and reduce costs. Together with an aggressive server virtualization strategy and improved management IEEE Computer Society’s Conference Publishing Services (CPS) is now offering conference program of workload distribution among serv- mobile apps! Let your attendees have their conference ers, Intel IT has reduced the number schedule, conference information, and paper listings in of servers from 100,000 to 75,000. the palm of their hands. The program also helped the whole The conference program mobile app works for company to reduce its carbon foot- Android devices, iPhone, iPad, and the Kindle Fire. print. In 2011, Intel had more than 91,500 employees across 164 sites in 62 countries. These employees would typically work in distributed and vir- tual teams. Intel IT made extensive use of collaboration technology to reduce the need for employees to travel. In 2010 and 2011, video con- ferencing efforts saved employees 435,000 travel hours—a cost savings For more information please contact [email protected]______of more than US$114 million and an environmental savings of more than 87,500 metric tons of CO2 emissions. By the end of 2011, Intel had reduced the carbon emissions of its IT operations by 60 percent compared

NOVEMBER 2012 81

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

OUT OF BAND Stratfor or Stratagainst Hal Berghel University of Nevada, Las Vegas

Based on what you know about WikiLeaks and Stratfor, which group seems to be the greater threat to society?

early one year has 1. intelligence gathering—basically espionage and cybersurveillance, passed since WikiLeaks the same investigation plus anal- and some of the activities of Stratfor, released Stratfor’s ysis activities usually associated HBGary, and Palantir under such N internal email via the with law enforcement, perhaps innocuous-sounding rubrics as “pre- hacktivist group, Anonymous. By with an increased level of sophis- dictive policing” involve surveillance. now, this story should have inspired tication in real-time reporting and It should be noted that the activi- public discussions on any number of analysis, just-in-time briefings of ties in (1) and (2) fall within the fronts: journalistic ethics, whether impending events, back-end data domain of statutory investigative private intelligence-gathering compa- mining, and so forth. This activ- agencies such as the police and nies that use bribery to gain privileged ity may involve illegal behavior FBI. I note here that accurate clas- information from politically exposed such as the bribery, extortion, and sification of cybermercenaries is persons (PEPs) should fall under blackmail of PEPs. difficult for outsiders because of the the Foreign Corrupt Practices Act, 2. cyberespionage and cybersurveil- secrecy under which they operate— and whether governments and their lance—again, basically what law well outside the sphere of statutory employees should be held account- enforcement does, only privately authority and beyond the reach of able for supporting such activities, and with neither oversight nor the media—kind of like a National to name but a few. Yet the current court orders. Security Agency but without the tax crop of thought leaders appears to be 3. cyberweapons manufacturing support. avoiding any potentially important or deployment—either licensed This parallels the proliferation policy issues that might underlie this to clients or used offensively by of corporate mercenaries—private incident. developer. armies, private military contractors, private security contractors—such BLACK OPS NGOs From what I can tell from the as Academi (formerly Xe Services, Stratfor illustrates the post-9/11 WikiLeaks documents, Stratfor is Blackwater) and Triple Canopy. For wave of private cybermercenaries— primarily in the first group—along the moment, the cyber side seems for-profit organizations that sell with HBGary Federal (now part of to remain largely decoupled, but I cyberservices to risk-averse and fear- ManTech) and Palantir on their best predict that, in time, these interests ful businesses and governments. behavior. The third group is also will converge into one-size-fits-all, Although the psychology behind this easy to populate (thanks again to general-purpose private army/police/ mindset may be the more interesting the Anonymous folks). Players in intelligence-for-hire concerns. Experi- topic and will likely be the subject of this space include HBGary and the ments at such integration have social science treatises, essays, and Gamma Group. The second group already occurred—see the Com- monographs for decades, we’ll limit is harder to define because it draws puter Sciences Corporation, which our present discussion to the cyber talent from the other groups. For owned the private military contractor side of things. example, as the “URL Pearls” side- DynCorp from 2003 to 2005. Not sur- The missions behind the current bar describes, some of the software prisingly, as Figure 1 indicates, some crop of cybermercenaries seem to fit developed by HBGary and the Gamma of these companies have been known within the following continuum: Group was designed for cyber- to target WikiLeaks.

82 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 © 2012 IEEE

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

URL PEARLS The Stratfor website states that “Stratfor is a subscription-based pro- ruce Schneier refers to HBGary Federal as a “cyberweapons arms manufacturer.” vider of geopolitical analysis. … Unlike B(http://gizmodo.com/5888440/wikileaks-reveals-private-cias-dirty-laundry-updating- traditional news outlets, Stratfor uses live).__ HBGary has been associated with a variety of software that would qualify as either, a unique, intelligence-based approach including FastDump and FDPro Windows memory-capturing utilities and the to gathering information via rigorous Windows rootkit project, Magenta (http://cyberwarzone.com/cyberwarfare/hbgarys- open-source monitoring and a global rootkit-project-magenta?page=4).______The Gamma Group is associated with FinFisher, a general-purpose snoop tool that offers screen scraping, Skype session capture, network of human sources.” Founded keylogging, decryption, and rootkit capabilities (http://bits.blogs.nytimes.com/ in 1996 by George Friedman, this 2012/08/13/elusive-finspy-spyware-pops-up-in-10-countries).______Some interesting analy- Austin, Texas, company “publishes sis of the FinFisher product can be found at https://citizenlab.org/2012/07/from-______analysis via … website and custom- ______bahrain-with-love-finfishers-spy-kit-exposed. ized email updates.” It isn’t clear that Wikileaks refers to the 5 million or so Stratfor email messages that it released as “The Global Intelligence Files” (wikileaks.org/gifiles/releases.html). WikiLeaks has the entire much of what Stratfor does with its Palantir/HBGary/Berico slide presentation in PDF format online at http://wikileaks.org/ “intelligence” is particularly interest- IMG______/pdf/WikiLeaks_Response_v6.pdf. F______orbes.com has the complete statement from ing or controversial, but the way that Palantir CEO Alex Carp online at www.forbes.com/sites/andygreenberg/2011/02/ it gets its “intelligence” is both inter- 11palantir-apologizes-for-wikileaks-attack-proposal-cuts-ties-with-hbgary.______esting and controversial, as is evident The PayPal book-banning story has been well covered (www.huffingtonpost.co.uk/ bernard-oleary/paypal-banned-books-the-books-banned-by-paypa_b_1314953.html).______from the WikiLeaks revelations. In reaction to the outcry from anticensorship groups, PayPal has since lifted the ban As the press release from Stratfor’s (www.abffe.org/news/86299/). founder, shown in Figure 2, indicates, Stratfor’s expressed objection to the Anonymous/WikiLeaks exposé is that Morentz, then managing director of Stratfor serves global corpora- it was “illegal” and a “breach of pri- Goldman Sachs, who invested sev- tions and agencies. A quick review vacy.” Let’s see if we have this right: eral million dollars in Stratfor to of the “GB Master Client List” spread- Stratfor is claiming that there’s some- create actionable intelligence useful sheet dated 3-15-07 is a who’s who thing wrong with illegal breaches to investors in exchange for a Strat- of financial institutions, government of privacy or the dissemination of for board seat. Apparently this deal contractors, technology compa- information that has been obtained soured. nies, and Forbes 1,000 companies, without the information owner’s Stratfor uses global informants. including Coke, Wexford Capital, permission. According to some media reports, at Perot Systems, Dow Chemical, and Ponder that for a while. It seems least some of these informants are Northrup Grumman. to me to be a clear case of pots and paid via Swiss bank accounts and According to Friedman, Stratfor is kettles, snakes and crabs, or bram- prepaid debit cards. not above innovative means to con- bles and pomegranates. Let’s try to put it into some sort of meaningful perspective. While the mainstream press has extensively covered WikiLeaks for several years now, Stratfor has oper- ated largely in the dark. Many of us had never heard of Stratfor before the Anonymous hack of December 2011, so I offer the following short review for the benefit of the uninitiated. Stratfor’s avowed goal is to become “the world’s leading private intelli- gence organization.” This is expressly stated in one of CEO George Fried- man’s leaked emails (5 September 2011, with the subject line “Labor Day Review of Where We Are”). This is also the email in which Friedman Figure 1. A slide taken from Palantir’s presentation “The WikiLeaks Threat.” (The CEO announced to Stratfor employees of Palantir has since apologized for this.) the StratCAP partnership with Shea

NOVEMBER 2012 83

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

OUT OF BAND

trol its sources: “If this is a source you suspect may have value, you have to take control od [sic] him. Control means financial, sexual or psychological control to the point where he would reveal his sourcing

______and be tasked.” This email is dated 6 December 2011 and went to a Strat- for intelligence analyst regarding an informant’s report on the health of Hugo Chavez. Regarding relationships with the media, Stratfor works with media organizations and journalists whom it refers to as (among other things) “confederation partners.” It’s not at all obvious that a private intel- ligence organization’s close relation with the media satisfies the stan- dards of journalistic ethics taught in the academy. With those few clarifications in mind, I offer for your consideration Table 1 as a modest comparison of Stratfor and WikiLeaks in terms of their operations and objectives. I’ve based Table 1 on information available from mainstream media reports and analysis of the WikiLeaks documents. Assuming that this is a fair characterization, and based on what you know about WikiLeaks and Figure 2. Stratfor CEO’s announcement of the WikiLeaks revelations.

Table 1. Comparison of WikiLeaks and Stratfor operations.

Activity WikiLeaks Stratfor

Revenue model Not for profit For profit Primary constituency served Media/individuals Corporations/agencies Seeks access to nonpublic, proprietary, or classified information, for Under dispute Yes which the owner does not authorize access Relies on a leak-centric communication network Yes Yes System built on paid informants No Yes Uses active intelligence systems: leakers, spies, whistleblowers Yes Yes Willing to corrupt media resources Perhaps Yes Partners with media to inform public Yes No Provides intelligence to media/public Yes Limited Provides actionable intelligence to partners in military industrial complex No Yes Black ops No Yes Uses third-party contractors (spies) No Yes Controls sources via money, sex, blackmail, extortion No Yes Nature of risks to society Overt Covert

84 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Stratfor, which group seems to you to lack of oversight and transparency rule of law, and whether government be the greater threat to society? in the process. From the email, it agencies should be tolerating it, much appears that Stratfor has introduced less encouraging it. I’m not sure that a THE BRIGHT SIDE a corrupting influence on the process “trust us” defense should be any more Good journalists are always of intelligence gathering. compelling to society in this case than concerned about the possibility of The question that informed world when it was used to defend flawless accidentally disseminating erroneous citizens should ask is whether they efficient markets before the most information. At this point, I haven’t feel comfortable with their govern- recent economic meltdown. seen a single report from any source ments supporting such things. It that I deem credible that claims the should be emphasized that there is ne final observation: it’s WikiLeaks Stratfor emails are bogus. I a reason why governments and busi- unlikely that any of this encourage everyone to look into these nesses outsource this kind of work. Is O would have become public leaked documents, and the concomi- it due to the fact that dedicated private were it not for Anonymous. But that’s tant media coverage, and come to companies are so much better at it? a topic for another column. their own conclusion. Or do the customers and clients want The Stratfor revelations are alarm- to maintain distance from, and deni- Hal Berghel, Out of Band column ing for at least two reasons. First, I’m ability of, putatively illegal activity. editor, is a professor of computer sci- ence at the University of Nevada, Las not convinced that Stratfor’s approach There is no obvious Fourth Amend- Vegas, where he is the director of the to intelligence analytics will lead to ment protection against private Identity Theft and Financial Fraud significantly better decision making shadow intelligence agencies, just as Research and Operations Center than we’ve come to expect from the there is no First Amendment protec- (itffroc.org).______Contact him at hlb@___ military industrial complex, and I’m tion against PayPal banning books. computer.org. fearful that unenlightened leader- While the constitutional lawyers ship may be lulled into overreliance argue the legality, the public should on such analyses. That might in turn be discussing whether or to what Selected CS articles and columns lead to even more ill-advised deci- extent Stratfor’s activities are consis- are available for free at sions. Second, I’m bothered by the tent with democratic values and the http://ComputingNow.computer.org.

NEW TRANSACTIONS NEWSLETTER!

Stay connected with the IEEE Computer Society Transactions by signing up for our new Transactions Connection newsletter. It is free and contains valuable information like:

t News about your favorite transactions, t Multimedia, t Contributions from the Editorial Board, t And much more. t Information about related conferences,

Not a subscriber? Don’t worry. You can still sign up to receive news about the transactions.

Visit http://www.computer.org/newsletters to sign up today!

NOVEMBER 2012 85

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

-VJ\ZVU @V\Y1VI:LHYJO

0,,, *VTW\[LY :VJPL[` 1VIZ OLSWZ `V\ LHZPS` ÄUK H UL^ QVI PU 0;ZVM[^HYL KL]LSVWTLU[ JVTW\[LY LU NPULLYPUN YLZLHYJO WYVNYHTTPUN HYJOP[LJ[\YL JSV\K JVTW\[PUN JVUZ\S[PUN KH[HIHZLZ HUK THU` V[OLY JVTW\[LYYLSH[LKHYLHZ 5L^MLH[\YL!-PUKQVIZYLJVTTLUKPUNVYYLX\PYPUN[OL 0,,,*:*:+(VY*:+7JLY[PÄJH[PVUZ

=PZP[^^^JVTW\[LYVYNQVIZ[VZLHYJO[LJOUPJHSQVI______VWLUPUNZWS\ZPU[LYUZOPWZMYVTLTWSV`LYZ^VYSK^PKL

O[[W!^^^JVTW\[LYVYNQVIZ______

;OL0,,,*VTW\[LY:VJPL[`PZHWHY[ULYPU[OL(07*HYLLY5L[^VYRHJVSSLJ[PVUVMVUSPULQVIZP[LZMVYZJPLU[PZ[ZLUNPULLYZHUKJVT W\[PUNWYVMLZZPVUHSZ6[OLYWHY[ULYZPUJS\KL7O`ZPJZ;VKH`[OL(TLYPJHU(ZZVJPH[PVUVM7O`ZPJPZ[ZPU4LKPJPUL((74(TLYPJHU (ZZVJPH[PVUVM7O`ZPJZ;LHJOLYZ((7;(TLYPJHU7O`ZPJHS:VJPL[`(7:(=::JPLUJLHUK;LJOUVSVN`HUK[OL:VJPL[`VM7O`ZPJZ :[\KLU[Z:7:HUK:PNTH7P:PNTH

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

IDENTITY SCIENCES Biometric Authentication: System Security and User Privacy Anil K. Jain Michigan State University Karthik Nandakumar Institute for Infocomm Research, Singapore

While biometric systems aren’t foolproof, the research community has made significant strides to identify vulnerabilities and develop measures to counter them.

dentity theft is a growing con- an individual has multiple identity confidence and acceptance of biomet- cern in our digital society. The cards (for example, passports) under ric technology. US Federal Trade Commission different names. Thus, biometric I reports that ID theft affects systems impart higher levels of secu- BIOMETRIC SYSTEM millions of innocent victims each year rity when appropriately integrated OPERATION and is the most common consumer into applications requiring user A biometric system first records complaint (www.ftc.gov/opa/reporter/ authentication. a sample of a user’s biometric trait idtheft/index.shtml).______While law enforcement agencies using an appropriate sensor—for Traditional authentication meth- have used fingerprint-based biometric example, a camera for the face— ods such as passwords and identity authentication for more than a cen- during enrollment. It then extracts documents aren’t sufficient to combat tury in forensic investigations, the salient characteristics, such as ID theft or ensure security. Such sur- last two decades have seen a rapid fingerprint minutiae, from the rogate representations of identity proliferation of biometric recognition biometric sample using a software can be easily forgotten, lost, guessed, systems in a wide variety of govern- algorithm called a feature extractor. stolen, or shared. ment and commercial applications The system stores these extracted Biometric systems recognize indi- around the world. Figure 1 shows features as a template in a database viduals based on their anatomical some examples. along with other identifiers such as traits (fingerprint, face, palmprint, Although many of these deploy- a name or an identification number. iris, voice) or behavioral traits (sig- ments are extremely successful, To be authenticated, the user pre- nature, gait). Because such traits are there are lingering concerns about sents another biometric sample to the physically linked to the user, biomet- the security of biometric systems and sensor. Features extracted from this ric recognition is a natural and more potential breaches of privacy result- sample constitute the query, which reliable mechanism for ensuring ing from the unauthorized release of the system then compares to the tem- that only legitimate or authorized users’ stored biometric data. Like any plate of the claimed identity via a bio- users are able to enter a facility, other user authentication mechanism, metric matcher. The matcher returns access a computer system, or cross a biometric system can be circum- a match score representing the degree international borders. Biometric sys- vented by a skillful impostor given of similarity between the template tems also offer unique advantages the right circumstances and plenty and the query. The system accepts such as deterrence against repudia- of time and resources. Mitigating such the identity claim only if the match tion and the ability to detect whether concerns is essential to gaining public score is above a predefined threshold.

0018-9162/12/$31.00 © 2012 IEEE Published by the IEEE Computer Society NOVEMBER 2012 87

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

IDENTITY SCIENCES

(a) (b)

(c) (d)

Figure 1. Examples of biometric authentication systems deployed in government and commercial applications. (a) The US-VISIT program to regulate international border crossings (www.dhs.gov/files/programs/usv.shtm) records all 10 fingerprints of a visa applicant. (b) India’s Aadhaar civil registry system (www.uidai.gov.in) captures the iris and face images in addition to 10 fingerprints. (c) Walt Disney World Resort in Orlando, Florida, uses a fingerprint-based access system to prevent ticket fraud (www.boston. com/news/nation/articles/2006/09/03/disney_world_scans_fingerprint_details_of_park_visitors). (Photo by Mark Goldhaber; www.mouseplanet.com/9797/Walt_Disney_World_Resort_Update#rfid.) (d) Many banks in countries including Japan (www.___ theregister.co.uk/2012/04/12/ogaki_palm_scanning_cash)______and Brazil (www.bradescori.com.br/site/conteudo/interna/default. aspx?secaoId=680&idiomaId=2)______use palm-vein-based automated teller machines. (Photo courtesy of Bradesco; http://infosurhoy. com/cocoon/saii/xhtml/en_GB/features/saii/features/economy/2010/03/01/feature-04.)

BIOMETRIC SYSTEM attacks (A.K. Jain, A.A. Ross and Because an individual’s biometric VULNERABILITIES K. Nandakumar, “Security of samples acquired during enrollment A biometric system is vulnerable Biometric Systems,” Introduction and authentication are seldom to two types of failures, as Figure 2 to Biometrics, Springer, 2011, pp. identical, as Figure 3 shows, a shows. A denial of service occurs 259-306). biometric system can make two when the system doesn’t recognize types of authentication errors. A a legitimate user, while an intrusion Intrinsic limitations false nonmatch occurs when two refers to the scenario in which the Unlike a password-based au- samples from the same individual system incorrectly identifies an thentication system, which requires have low similarity and the system impostor as an authorized user. a perfect match between two can’t correctly match them. A false While there are many possible alphanumeric strings, a biometric- match occurs when two samples reasons for these failures, they based authentication system relies on from different individuals have high can be broadly categorized as the similarity between two biometric similarity and the system incorrectly intrinsic limitations and adversary samples. declares them as a match.

88 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

A false nonmatch leads to a denial of service to a legitimate user, while a false match can result in intrusion Adversary attacks by an impostor. Because the impostor need not exert any special effort to Collusion Spoof Trojan horse Man-in-the- Template fool the system, such an intrusion is Coercion attacks attacks middle and leakage known as a zero-effort attack. Most of Negligence replay attacks Enrollment fraud Attacks on sensor Attacks on Attacks on the research effort in the biometrics Exception abuse feature Attacks on database community over the past five extractor interconnections Insider attacks and matcher between decades has focused on improving modules authentication accuracy—that is, on minimizing false nonmatches and false matches. Intrinsic limitations Adversary attacks False nonmatch Denial of service False match Intrusion A biometric system may also fail to operate as intended due Biometric system vulnerabilities to manipulation by adversaries. Such manipulations can be carried Figure 2. A biometric system is vulnerable to denials of service and intrusions, which out via insiders, such as system can be caused by both intrinsic limitations and adversary attacks. administrators, or by directly attacking the system infrastructure. An adversary can circumvent a biometric system by coercing or colluding with insiders, exploiting their negligence (for example, failure to properly log out of a system after completing a transaction), or fraudulently manipulating the procedures of enrollment and exception processing, originally designed to help authorized users. External adversaries can also cause a biometric system to fail (a) through direct attacks on the user interface (sensor), the feature extractor and matcher modules, the interconnections between the modules, and the template database. Examples of attacks targeting the system modules and their interconnections include Trojan (b) horse, man-in-the-middle, and replay attacks. As most of these attacks are also applicable to password-based authentication systems, several countermeasures like cryptography, time stamps, and (c) mutual authentication are available to prevent them or minimize their Figure 3. Inherent variability between biometric samples of the same individual. impact. (a) Variations in fingerprint patterns of the same finger due to differences in finger Two major vulnerabilities that placement on the sensor. (b) Variations in face images of the same person due to specifically deserve attention in the changes in pose. (c) Variations in iris images of the same eye due to differences in pupil dilation and gaze direction. context of biometric authentication

NOVEMBER 2012 89

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

IDENTITY SCIENCES

and ID cards, it isn’t possible to replace stolen templates with new ones because biometric traits are irrevocable. Finally, the stolen biometric templates can be used for unintended purposes—for example, to covertly track a person across multiple systems or obtain private health information.

(a) (b) BIOMETRIC TEMPLATE SECURITY A critical step in minimizing the security and privacy risks associated with biometric systems is to protect the biometric templates stored in the system database. While the risks can be mitigated to some ex- tent by storing the templates in a decentralized fashion—for example, in a smart card carried by the user— (c) such solutions aren’t feasible in applications requiring deduplication Figure 4. Example of obtaining a biometric trait by reverse engineering the capability such as the US-VISIT or corresponding biometric template: (a) original fingerprint image, (b) minutiae India’s Aadhaar system. template information extracted from the fingerprint image, and (c) fingerprint image Although many techniques exist reconstructed using only the minutiae information. (Adapted from J. Feng and A.K. for securing passwords including Jain, “Fingerprint Reconstruction: From Minutiae to Phase,” IEEE Trans. Pattern Analysis encryption/hashing and key genera- and Machine Intelligence, Feb. 2011, pp. 209-223.) tion, they’re predicated on the assump- tion that passwords provided by are spoof attacks at the user interface Researchers have developed the user during enrollment and and template database leakage. These numerous liveness detection authentication are identical. two attacks have serious adverse techniques—for example, verifying effects on biometric system security. the physiological properties of human Template security A spoof attack involves present- fingers or observing involuntary requirements ing a counterfeit biometric trait not human actions such as blinking of The main challenge in developing a obtained from a live person. Exam- the eye—to ensure that the biometric biometric template protection scheme ples of spoofed biometric traits trait captured by a sensor indeed is to achieve an acceptable tradeoff include a gummy finger, photograph comes from a live person (K.A. Nixon, among three requirements. or mask of a face, or dismembered V. Aimale, and R.K. Rowe, “Spoof Noninvertibility. It must be finger from a legitimate user. Detection Schemes,” Handbook of computationally hard to recover the A fundamental tenet of biometric Biometrics, A.K. Jain, P. Flynn, and biometric features from the stored authentication is that even though A.A. Ross, eds., Springer, 2007, template. This prevents the adversary biometric traits aren’t secrets—it pp. 403-424). from replaying the biometric features may not be very difficult to covertly Template database leakage refers gleaned from the template or creating obtain a photo of a person’s face or to a scenario where a legitimate physical spoofs of the biometric trait. the fingerprint pattern from an object user’s biometric template information Discriminability. The template or surface touched by a person—the becomes available to an adversary. protection scheme shouldn’t degrade system is still secure because the trait This aggravates the problem of the biometric system’s authentication is physically linked to a live user. A spoofing because it makes it easier accuracy. spoof attack, if successful, violates for the adversary to recover the Revocability. It should be possible this basic assumption and thereby biometric pattern by simply reverse to create multiple secure templates greatly undermines the system’s engineering the template, as Figure 4 from the same biometric data that security. shows. Moreover, unlike passwords aren’t linkable to that data. This

90 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

property not only enables the Enrollment biometric system to revoke and reissue new biometric templates if the database is compromised, but it Noninvertible System transform database also prevents cross-matching across databases, thereby preserving the user’s privacy. Biometric User-specific parameters Transformed/ Template security approaches template protected template There are two generic approaches for securing biometric templates: Authentication biometric feature transformation and biometric cryptosystems. Noninvertible In the case of biometric feature transform transformation, as Figure 5a shows, Matching the secure template is derived by applying a noninvertible or one- Biometric User-specific parameters way transformation function to the query Transformed Match/ original template; this transformation (a) query nonmatch is typically based on user-specific parameters. During authentication, Enrollment the system applies the same trans- formation function to the query and Secure System sketch database matching occurs in the transformed generation domain. Biometric cryptosystems, as Figure 5b shows, store only a fraction of Biometric Cryptographic template key Secure the information derived from the sketch biometric template known as the secure sketch. While the secure sketch Authentication in itself is insufficient to reconstruct the original template, it does contain sufficient data to recover the template Validity in the presence of another biometric Recovered check Error sample that closely matches the template and correction cryptographic key enrollment sample. Match/ Biometric The secure sketch is typically nonmatch (b) query obtained by binding the biometric template with a cryptographic key. Figure 5. Securing biometric templates using (a) biometric feature transformation and However, a secure sketch isn’t the same (b) biometric cryptosystems. as a biometric template encrypted using standard cryptographic techniques. with a biometric query that closely (A. Juels and M. Wattenberg, “A Fuzzy In standard encryption, the matches the template, it can recover Commitment Scheme,” Proc. 6th ACM encrypted template and decryption both the original template and the Conf. Computer and Comm. Security key are two separate entities and cryptographic key using common [CCS 99], ACM, 1999, pp. 28-36). The the template is secure only as long error detection techniques. fuzzy vault is useful for protecting as the decryption key is secure. A Researchers have proposed two templates that are represented as a secure sketch encapsulates both main approaches for generating a set of points (K. Nandakumar, A.K. the biometric template and the secure sketch: fuzzy commitment Jain, and S. Pankanti, “Fingerprint- cryptographic key as a single entity. and fuzzy vault. Fuzzy commitment Based Fuzzy Vault: Implementation Neither the key nor the template can can be used to protect biometric & Performance,” IEEE Trans. Infor- be recovered using only the secure templates that are represented mation Forensics and Security, Dec. sketch. When the system is presented as fixed-length binary strings 2007, pp. 744-757).

NOVEMBER 2012 91

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

IDENTITY SCIENCES

Pros and cons a feature transformation function There are currently no satisfactory Biometric feature transformation to the biometric template before practical solutions on the horizon to and biometric cryptosystems have it is protected using a biometric address such questions. their own pros and cons. cryptosystem. Such systems, which Matching is often straightforward combine feature transformation with iometric recognition provides in a feature transformation scheme, secure sketch generation, are known more reliable user authenti- and it may even be possible to design as hybrid biometric cryptosystems. Bcation than passwords and transformation functions that don’t identity documents, and is the only alter the original feature space’s THE PRIVACY CONUNDRUM way to detect duplicate identities. characteristics. However, finding The irrefutable link between While biometric systems aren’t an appropriate transformation users and their biometric traits has foolproof, the research community function that is noninvertible but at triggered valid concerns about user has made significant strides to identify the same time tolerant to inherent privacy. In particular, knowledge of vulnerabilities and develop measures intra-user biometric variations can the biometric template information to counter them. New algorithms for be diffi cult. stored in the database can be protecting biometric template data While secure sketch generation exploited to compromise user privacy alleviate some of the concerns about techniques based on sound in many ways. system security and user privacy, information-theoretic principles Template protection schemes can but additional improvements will be are available for biometric mitigate this threat to some extent, required before such techniques find cryptosystems, the challenge is to but many thorny privacy issues their way into real-world systems. represent the biometric features remain beyond the scope of biometric in standardized data formats like technology: Anil K. Jain is a University Distin- binary strings and point sets. guished Professor in the Department Therefore, an active research t Who owns the biometric data, of Computer Science and Engineering at Michigan State University. Contact topic is designing algorithms that the individual or the service him at [email protected]. convert the original biometric providers? template into standardized data t Will the use of biometrics be Karthik Nandakumar is a research formats like fixed-length binary proportional to the need for scientist in the Institute for Infocomm strings or point sets without any security in a given application? Research, Singapore. Contact him at loss of discriminative information For example, should a fi ngerprint [email protected].______(A. Nagar, K. Nandakumar, and A.K. be required to purchase a ham- Jain, “Multibiometric Cryptosystems burger at a fast food restaurant Based on Feature-Level Fusion,” or access a commercial website? Editor: Karl Ricanek Jr., director of the Face IEEE Trans. Information Forensics t What is the optimal tradeoff Aging Group at the University of North and Security, Feb. 2012, pp. 255-268). between application security Carolina Wilmington; [email protected] Fuzzy commitment and fuzzy and user privacy? For example, ______vault have other limitations, including should governments, businesses, the inability to generate multiple and other entities be able to use nonlinkable templates from the same surveillance cameras at public Selected CS articles and columns biometric data. One possible way to spaces to covertly track benign are available for free at overcome this problem is to apply activities of users? http://ComputingNow.computer.org.

Subscribe today for the latest in computational science and engineering research, news and analysis, CSE in education, and emerging technologies in the hard sciences. www.computer.org/cise

92 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

SOCIAL COMPUTING Customer Service 2.0: Where Social Computing Meets Customer Relations Frank Bi and Joseph A. Konstan University of Minnesota

Social computing is moving customer relations from private spaces into the public space.

efore the Internet, there with customers, cost savings, brand In other words, companies can’t was the suggestion box. positioning, and other benefits. dismiss negative comments as they did Impersonal but effective, However, many businesses aren’t in the days of the physical suggestion B the box served as the having success using such tools. box. “‘Ignore it and it will go away’ bearer of bad (and sometimes good) To get a first-hand look at this doesn’t work anywhere, especially news for businesses from frank issue, we went into the field and spoke on social media,” said Lower. He customers who felt the need to share with numerous business owners, cautions businesses that waiting their opinions. Some companies took managers, and customers. We also 24 hours to respond to a negative the suggestions to heart, while others talked with Christopher Lower, a review is too long, especially when ignored them if they bothered to read 30-year marketing veteran who a Web search can bring the review them at all. If customers didn’t use teaches companies how to respond back up. “Whether or not the situation the box, the business never found out to comments and reviews online. was right or wrong, perception wins,” what was on their mind. Lower is the founder of Sterling said Lower. “The person had a bad Today, customers use the Cross Communications, which has experience with your brand, and if Internet, especially social media, specialized in social media marketing you can’t at least listen to them and to complain to or about—as well as and online reputation management acknowledge them, that change in praise—businesses. Consequently, for the past decade. He explained that perception is going to stay.” companies are slowly but surely an online reputation—established Of course, customers also use the expanding their presence on social through social media or elsewhere— same social media to share positive media sites. According to a recent can make or break a business. experiences they’ve had with a survey by CompTIA, an IT industry Even before the emergence of company or product. association, 82 percent of responding social media, aggravated customers companies had a Facebook page, found ways to complain publicly A BAR CUSTOMERS “LIKE” 68 percent had a Twitter profile, online. Lower cited examples of Republic, a craft beer bar near and 68 percent had a LinkedIn websites dating back to 1996 created downtown Minneapolis, doesn’t page (Social Business: Trends and with a company’s name followed by have an advertising budget. Situated Opportunities, 2012). “sucks” in the domain name. And an in an area dense with similar As the CompTIA study reveals, online reputation spreads quickly—so establishments that have been around proper use of social media tools quickly and widely that it can cause a longer than the year-and-a-half- can lead to better communication sudden stock price drop. old bar, Republic has nevertheless

0018-9162/12/$31.00 © 2012 IEEE Published by the IEEE Computer Society NOVEMBER 2012 93

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

SOCIAL COMPUTING

quickly earned a solid reputation for past 40 years. But it was only in the Facebook, Twitter, and other social itself around the neighborhood and is past few years that Patel started media. soon opening a second location. reading and responding to online Anna Gallegos of Houston waited With more than 1,250 likes on reviews. several hours for a customer support its Facebook page, social media has “We’re trying to get in touch with representative to install her cable TV without a doubt been instrumental people on a more personal level,” said and Internet service. When no one in the bar’s success, according to Patel. “It’s a learning experience for showed up during the appointment manager Ryan O’Leary. “We believe us, and we try to evaluate what to do window, she tried to arrange the product should sell itself,” he said. to do it better.” Along with monitoring installation through email. After a And it has. comments on TripAdvisor, one of the dozen futile attempts, the exasperated A brief glance at the bar’s Facebook world’s largest travel-related user Gallegos posted a complaint on the and Twitter profiles show daily posts communities, Patel has experimented company’s Facebook page. about Republic and images of its with Facebook by adding former Gallegos found she wasn’t alone. offerings. Loyal customers follow customers as friends, although he has “People were complaining about the Twitter feed almost religiously, since scaled that effort back because everything,” she said. By the next boasted O’Leary, who added that the results didn’t justify the time business day, the company had some customers show up almost invested. posted a “copy-paste” response to immediately following a post about a certain product, such as a prized brew about to be made available. The suggestion box hasn’t gone away—it has just Most of Republic’s Twitter interactions changed. are with beer enthusiasts who inquire about select beers or make suggestions about what they’d like to On TripAdvisor, the hotel has all of its customers with a generic see, said O’Leary. received more than 230 reviews apology and another email address to Before the advent of social and is ranked as the number one contact. Gallegos got her appointment media, restaurants and bars limited hotel in Millbrae, California. While rescheduled a week after the original their online presence to a website, there are more than 110 “excellent” date, but her perceptions of the observed O’Leary. However, Republic reviews, there are also two “terrible” company took a dive; she’s prepared leads customers to its Facebook reviews. One traveler even called his for a fight the next time she has to page, where the user interface is time there the “worst hotel stay ever deal with bad service. more inviting and is familiar to experienced.” Patel responded in One of the authors had a most people. “It’s the most unique 200 words, explaining the situation similar experience dealing with a marketing technique I’ve ever seen,” to potential guests and encouraging troublesome Android app, but with a said O’Leary, who has worked in the them to read the hundreds of other happier resolution. restaurant service industry for more positive reviews. After five frustrating email than 10 years. On social media, “you “I personally don’t like it when exchanges with the app company’s speak to your customers more, and somebody for some reason had a customer service representatives, he you speak to them directly.” bad day and they take it out on the felt like he was going in circles. He Republic relies on social media Internet,” said Patel. “It’s easy to posted a blog message on Google+, in other ways. The bar’s owners and slander a business online.” and almost as an afterthought an off-site employee charged with Customers can and have tried to tweeted a pointer to this post with the managing social media marketing hold a company’s online reputation company’s customer support hashtag. strategies and maintaining the bar’s hostage, explained Sterling Cross Within an hour, the company sent online reputation receive Twitter and Communications’ Lower, but him a private message and put him Facebook update notifications on a business can combat this by in contact with someone who took their cell phones, enabling them to responding respectfully and issuing an ownership of the case. In the end, he keep abreast of consumer opinions apology or otherwise making amends. got more than he’d originally asked and suggestions in real time. for, and all within a few hours of THE CUSTOMER’S LAST the tweet. His response moved from HAVING AN IN AT THE INN RECOURSE anger and frustration to surprise and Vijay Patel has operated Millwood What happens when customers delight—so delighted that he posted Inn and Suites, a small family-owned can’t get effective support? In some a follow-up blog message applauding hotel outside San Francisco, for the cases, they take their case straight to the service.

94 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

ocial computing is moving And the fi shbowl is imposing new Frank Bi is a computer science and customer relations from pri- rules. Responding authentically to a journalism student at the University Svate spaces into the public complaint—whether by apology or of Minnesota. Contact him at _____frank@ space. And it’s extending the reach of by supplying explanatory context frankbi.com. that public space through sites with and details—can be good. Keeping Joseph A. Konstan is the Distin- tens of millions of visitors and search loyal customers up-to-date through guished McKnight Professor of Computer Science and Engineering at engine indexing. social media can also be good. But the University of Minnesota. Contact The good news is that a few clicks overloading your customers with too him at [email protected].______can alert thousands or millions of many posts and boilerplate language potential customers about your can be bad. And losing your temper Editor: John Riedl, Department of Computer new tap beer or bed-and-breakfast online and telling off a customer— Science and Engineering, University of

special. The bad news is that even a rude one—can be very bad. Minnesota; [email protected]______customers can just as easily vent The suggestion box hasn’t gone their frustrations with your service away—it has just changed. The box Selected CS articles and columns

to the same number of people. Life is there for all to see, and everyone is are available for free at ____http:// in a fi shbowl is hard. watching how you handle it. ComputingNow.computer.org.______IEEE ISM 2012

14th IEEE International Symposium on Multimedia

10-12 December 2012

Irvine, CA, USA

ISM 2012 is an international forum for researchers to exchange information regarding advances in the state of the art and practice of multimedia computing, DVZHOODVWRLGHQWLI\WKHHPHUJLQJUHVHDUFKWRSLFVDQGGHÀQHWKHIXWXUHRI multimedia computing. Register today!

ŚƩƉ͗ͬͬŝƐŵ͘ĞĞĐƐ͘ƵĐŝ͘ĞĚƵ______

NOVEMBER 2012 95

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COMPUTER SOCIETY CONNECTION

CS Names 2012 Tech Award Recipients

he IEEE Computer in the 1970s, he invented the Kogge- best exemplify Cray’s creative spirit. Society announced Stone-Adder process, which is still The award includes a US$10,000 the 2012 recipients of considered the fastest way of adding honorarium. T three technical achieve- numbers on a computer. Kogge is scheduled to accept the ment awards. This year’s Seymour During his 26-year career at IBM, award at the keynote session at SC12 Cray Award went to Peter Kogge for Kogge designed the Space Shuttle in Salt Lake City on 13 November. innovations in advanced computer I/O processor, one of the fi rst multi- architecture and systems. Klaus threaded computers and the first SIDNEY FERNBACH AWARD Schulten and Laxmikant “Sanjay” to fl y in space. Kogge also invented RECIPIENTS: KLAUS Kale shared the Sidney Fernbach the world’s fi rst multicore processor, SCHULTEN AND SANJAY Award for outstanding contri- Execube, which his IBM team placed KALE butions in the application of high- on a memory chip in an early effort performance computers. to solve the data bottleneck problem. More recently, Kogge led a team PETER KOGGE RECEIVES of computer professionals for the SEYMOUR CRAY COMPUTER US Defense Advanced Research ENGINEERING AWARD Projects Agency (DARPA) to pioneer development of a supercomputer Klaus Schulten (left) and Sanjay Kale Peter Kogge, capable of executing a quintillion (right) received the 2012 Sidney recipient of the mathematical operations per second. Fernbach Award for their development 2012 Seymour Cray Kogge’s research interests of widely used parallel software for Award, has been include massively parallel process- large biomolecular systems simulation. at the forefront of ing architectures, advanced VLSI Klaus Schulten and Sanjay Kale, several innovations that have shaped and nanotechnologies and their professors at the University of Illinois the computing industry over the past relationship to computing systems at Urbana-Champaign, received three decades. architectures, non-von Neumann the 2012 IEEE Computer Society Currently the Ted H. McCourt- models of programming and execu- Sidney Fernbach Award for their ney Professor of Computer Science tion, and parallel algorithms and development of widely used parallel and Engineering at the University applications and their impact on com- software for large biomolecular of Notre Dame and an IEEE Fellow, puter architecture. systems simulation. Peter Kogge has been at the forefront One of the IEEE Computer Schulten, a Swanlund Professor of several innovations that have Society’s highest awards, the of Physics, directs the Center for shaped the computing industry over Seymour Cray Award recognizes Biomolecular Modeling at the the past three decades. While work- innovative contributions to high- Beckman Institute and codirects the ing on his PhD at Stanford University performance computing systems that Center for the Physics of Living Cells.

96 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 © 2012 IEEE

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

His research focuses on molecular of the very large macromolecular Kale, an IEEE Fellow, collaboratively assembly and cooperation in complexes forming the machinery developed the NAMD application biological cells, and he was the first to of living cells. as well as other applications for demonstrate that parallel computers Corecipient Kale is a professor computational cosmology, quantum can be practically employed to solve of computer science, director chemistry, rocket simulation, and the classical many-body problem in of the Parallel Programming unstructured meshes. He is a cowinner biomolecular modeling. Thousands Laboratory, and a senior investiga- of the 2002 Gordon Bell Award. Kale of researchers worldwide use his tor for the Blue Waters project at and his team won the HPC Challenge group’s visual molecular dynamics the National Center for Supercomput- Best Performance award at SC11 for (VMD) program for displaying, ing Applications. their entry based on Charm++. animating, and analyzing large His work Established in 1992 in memory of biomolecular systems and NAMD (Not focuses on enhancing performance high-performance computing pioneer [just] Another Molecular Dynamics) and productivity via adaptive Sidney Fernbach, the Fernbach program for modeling them on runtime systems, with research on Award recognizes outstanding personal computers as well as at programming abstractions, dynamic contributions in the application of the world’s leading supercomputing load balancing, fault tolerance, and high-performance computers using centers. Schulten and his team power management. These efforts innovative approaches. The award are presently developing a new are embodied in Charm++, a widely comes with a US$2,000 honorarium. computational method that assists distributed parallel programming Kale and Schulten are slated to biologists in solving the structures system. receive the award at SC12. New IEEE CS Membership Packages Serve Specific Technical Interests

n an effort to better serve the the global workforce of technology CS membership benefits, including growing audience of global leaders,” said IEEE Computer Society a subscription to Computer, access Icomputing professionals, the President John Walz. “We hope these to thousands of online courses and IEEE Computer Society is launching attractive bundles—featuring the books, and discounts on conferences membership packages to meet specific Computer Society’s best information and other products. technical focuses and goals. sources, from webinars and articles to Those who sign up for the software New and renewing members will magazine subscriptions—will provide focus package will receive an be able to choose a membership an easy and attractive means of electronic version of IEEE Software. package in one of four focus areas— keeping up with the rapidly changing ICT focus package subscribers will software and systems, information technology world.” receive IT Pro, security and privacy and communication technologies Each package includes a monthly focus package subscribers will (ICT), security and privacy, or newsletter covering technology in receive IEEE Security & Privacy, and computer engineering—to provide the specific focus area, an electronic computer engineering focus package targeted resources for keeping up to version of a CS magazine serving that subscribers will receive IEEE Micro. date in specific technical areas and interest area, 12 free CS articles of To select the focus package meeting career-development goals. the member’s choosing, three free CS that meets your interests, visit the “This is just another way the webinars, and special discounts on IEEE Computer Society Join page IEEE Computer Society is adding CS training courses. These package (www.computer.org/portal/web/

value and evolving to help serve benefits are in addition to standard membership/join).______

NOVEMBER 2012 97

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

COMPUTER SOCIETY CONNECTION

IEEE AND IEEE CS LAUNCH TRYCOMPUTING.ORG

EEE and the IEEE Computer Society launched a new online com- The portal supports academic preparation in computing through I puting education portal in September. TryComputing.org______makes descriptions of popular computing majors and a searchable database global computing education resources available for pre-university of accredited computing degree programs worldwide. Additionally, it teachers, school counselors, parents, and students. The site, intended offers career preparation guidance by suggesting pre-university to build on the successes of its counterpart, TryEngineering.org, coursework and listing extracurricular involvement opportunities features information about academic and career preparation in such as competitions and scholarships. computing. TryComputing.org includes a series of lesson plans to help pre- TryComputing.org includes profiles of computing profession- university educators introduce essential computing concepts to als and students, a computing career cloud tool, an accredited their students. The plans include all of the information necessary computing degree program search, and lesson plans. It provides for a teacher to successfully implement these activities in the class- information about the wide range of career options available in room, such as background information on each topic, step-by-step the evolving computing field. Visitors get a glimpse into the life instructions, lists of necessary materials, student worksheets, and and work of everyday computing professionals and undergradu- references to education standards. Teachers can also rate and ate students, and meet computing heroes who have made review lesson plans featured on the site. significant contributions to the field through a series of engaging The computing education portal was developed through a part- profiles. The computing career cloud tool suggests careers for vis- nership between the IEEE Computer Society and the IEEE Educational itors to explore further on the site according to their personal Activities Board with funding from the IEEE New Initiatives interests. Committee. Systems Engineering Body of Knowledge Version 1.0 Is Available

he Guide to the Systems Association, and the US Department from hundreds of reviewers. Primary Engineering Body of Knowledge of Defense’s Systems Engineering funding came from the US Department T(SEBoK) is now available as a Research Center. of Defense, with significant contri- wiki document at www.sebokwiki.org. CS representatives on the project butions in kind coming from the The SEBoK Guide is the product were Thomas B. Hilburn, professor authors’ home organizations. of the Body of Knowledge and emeritus of software engineering at In January 2011, the project opted Curriculum to Advance Systems Embry-Riddle Aeronautical University, for a wiki-based presentation to Engineering (BKCASE) project, which and Dick Fairley, principal associate support the evolution of the document was organized in September 2009. at Software & Systems Engineering with technology and the maturing Stevens Institute of Technology and Associates and chair of the IEEE field of systems engineering. Systems the Naval Postgraduate School led Computer Society Professional engineers are invited to use SEBoK the project in partnership with the Activities Board Software and Systems in their professional efforts and to International Council of Software Engineering Committee. comment on it in the wiki. BKCASE Engineering, the IEEE Computer The SEBoK Guide represents expects the SEBoK Guide to receive Society, the IEEE Systems Council, contributions from 70 authors minor updates twice a year and major ACM, the National Defense Industrial around the world and comments updates every third year.

98 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

CALL AND CALENDAR

CALLS FOR ARTICLES FOR COMPUTER Computer seeks submissions for a June 2013 special issue on big data, exploring aspects of discovery, productivity, and policy, with a focus on their socioethical implications. This special issue will address how deeply personal data, such as how often and with whom we com- municate using our cell phones or other digital devices; our location; what products and services we buy; where we eat, sleep, and work every day; and our photos and videos will likely be scrutinized in the context of cal merit and relevance to Computer’s Effi ciently using the Message Pass- data-driven decision making. In a way, readership. Accepted papers will be ing Interface requires that individual we will be trading our privacy for a professionally edited for content and computation tasks must be relatively new kind of “surveillance” based on style. large to overcome communication the premise of customer care. The guest editors for this special latencies. It becomes diffi cult to use The guest editors seek varied per- issue are Katina Michael (katina@______the MPI at the fi ne-grained level when spectives regarding the challenges, uow.edu.au),______an associate professor fast on-chip communication is avail- possibilities, and benefi ts of big data. on the Faculty of Informatics at the able. Higher-level mechanisms like They particularly welcome articles University of Wollongong, Australia, MapReduce or shard-based databases that feature qualitative assessments, and Keith Miller (miller.keith@uis.______are popular in particular application case studies from government agen- edu),___ a professor in the Department domains, though researchers have cies, perspectives from Internet search of Computer Science at the University not yet effi ciently applied them at the companies and other hardware and of Illinois Springfi eld. chip/node level. software vendors, predictive studies Paper submissions are due by 15 This special issue will focus on demonstrating paradigm shifts, and January 2013. Please email the guest approaches to providing scalable, social impact research. editors a brief description of the article shared on-chip memory, paramount Articles should appeal to a broad you plan to submit by 15 Decem- in a future where individual nodes interdisciplinary audience or policy ber 2012. Visit www.computer.org/ will have on the order of 1,000 cores

professionals in the information and ______computer/cfp6 to view the complete each. communications technology sector. call for papers. Suggested topics include but are The writing should be original, avoid- For author guidelines and informa- not limited to private and shared ing long discussions about theories, tion on how to submit a manuscript, cache hierarchies; scalable memory theorems, algorithms, or mathemati- visit www.computer.org/portal/web/ coherence protocols, directory-

cal notations. All manuscripts are peerreviewmagazines/computer.______based and otherwise; data layout and subject to peer review on both techni- placement techniques; on-chip inter- Computer seeks submissions for an connects to support shared-memory October 2013 special issue on multi- abstractions; and hardware, software, SUBMISSION core memory coherence. and hybrid approaches. INSTRUCTIONS As we enter an era of large multi- Articles are due by 1 March 2013. core systems, the question of effi- Visit www.computer.org/computer/ The Call and Calendar section lists con- ciently supporting a shared memory cfp10____ to view the complete call for ferences, symposia, and workshops that model has become more important. papers. the IEEE Computer Society sponsors or Massively parallel architectures lack- cooperates in presenting. ing coherent shared memory have CALLS FOR ARTICLES Visit www.computer.org/conferences for instructions on how to submit confer- enjoyed great success in niche appli- FOR OTHER IEEE CS ence or call listings as well as a more cations such as 3D rendering, but PUBLICATIONS complete listing of upcoming computing- general programming developers still IEEE Pervasive Computing plans an related conferences. demand the convenience of a shared October-December 2013 special issue memory abstraction. on cloud computing.

0018-9162/12/$31.00 © 2012 IEEE Published by the IEEE Computer Society NOVEMBER 2012 99

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

CALL AND CALENDAR

enabling resource-intensive next- EVENTS IN 2012 & 2013 generation applications. MICRO-45 Welcomed are original, high- December 2012 quality submissions addressing all he 45th Annual International Sym- 1-5 ...... MICRO-45 aspects of this field, as long as the T posium on Microarchitecture brings 3-6 ...... CLOUDCOM 2012 connection to the focus topic is clear together researchers and industrial de- signers in the fields of microarchitecture, 5-7 ...... RTSS 2012 and emphasized. 1 December compilers, and systems. It will cover topics 6-8 ...... APSCC 2012 Articles are due such as network-on-chip architectures, 10-12 ...... ICIOS 2012 2012. Visit www.computer.org/portal/ near-threshold computing, and security 11-14 ...... ICDM 2012 web/computingnow/pccfp4______to view and privacy. 17-19 ...... SOCA 2012 the complete call for papers. MICRO-45 takes place 1-5 December 17-20 ...... DASC 2012 in Vancouver. Visit www.microsymposia. 19-21 ...... HIPC 2012 IEEE Internet Computing plans a org/micro45 for more information. September/October 2013 special issue January 2013 on dynamic collective work. 15-18 ...... WACV 2013 As the Internet has changed the Visit www.computer.org/portal/web/ 28-30 ...... ICOIN 2013 way in which data circulates, we computingnow/iccfp5______to view the 28-31 ...... ICNC 2013 have shifted from a world of paper complete call for papers. documents to one of online docu- February 2013 ments, databases, and provenance IEEE Micro plans a July/August 23-27 ...... HPCA 2013 systems. This has also increased the 2013 special issue on reliability. size and complexity of systems that Over the past decade, designers support today’s globally distributed, have sought better ways to balance Arguably, two of the most impor- rapidly changing, and agile collab- power, performance, and cost. Of tant technological developments of orative enterprises. Such systems are these, power has emerged as a first- the past few years are the emergence becoming increasingly federated and order design challenge. In the coming of mobile and cloud computing. By are generating a huge amount of data era, this challenge may be subsumed shifting the hardware and staffing at different granularity levels that by that of building robust and reliable costs of managing computational include tweets, blog posts, instant systems. As technology advances, infrastructure to third parties such messages, Facebook updates, and systems are becoming increasingly as Google, Microsoft, and Amazon, other social media content. These sys- susceptible to transient errors such cloud computing has made it possible tems and data are fueling explosive as timing violations, parameter varia- for small organizations and individu- growth in dynamic collective work in tions, and aging. Without innovations als to deploy world-scale services; the healthcare, insurance, banking, in the areas of microprocessor and all they need to pay is the marginal and other industries. software reliability, future systems cost of actual resource usage. At the Dynamic and collective activities may face continuous failure. Thus, same time, the deployment of 3G are characterized by their flexibility we need new computing paradigms and 4G networks, rapid adoption of and people-driven nature. Automo- that incorporate adaptive techniques feature-rich smartphones, and grow- bile insurance claims handling, order at both the hardware and software ing integration of computation into processing of prescription drugs, hos- layers to ensure resilient execution. consumer products such as cars and pital patient case management, and The system, as a whole, must dynami- home appliances have brought mobile recovery and response assistance cally detect and recover from errors and pervasive computing into the during natural disasters are just a few to meet historically established mainstream. examples. In these and other tasks, high reliability standards without This special issue aims to explore various factors determine the set of exceeding power budgets and cost the intersections of these two trends. actions that must be performed and constraints or violating performance Mobile and embedded devices make the order in which they’re executed, targets. it possible for users to access cloud- including human judgment and docu- This issue seeks original articles based services and data anywhere and ment contents. on all topics related to reliability that anytime, extending their reach into This special issue seeks original span the layers in the system stack, everyday life. Simultaneously, cloud articles describing research efforts from device, circuit, and architec- computing offers a natural platform and experiences concerning Internet- ture design to the role of software to remedy the lack of local resources supported dynamic collective work. in enabling robust and reliable in mobile and pervasive devices while Articles are due 4 January 2013. computing.

100 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Articles are due 8 January 2013. 6-8: APSCC 2012, IEEE Asia-Pacific High Performance Computing, Pune, Visit http://www.computer.org/portal/ Services Computing Conf., Guilin, India; www.hipc.org w______eb/computingnow/micfp4 to view China; http://grid.hust.edu.cn/______the complete call for papers. apscc2012______JANUARY 2013 15-18 Jan: WACV 2013, IEEE Work- IEEE Internet Computing plans a 10-12 Dec: ICIOS 2012, 1st IEEE Int’l shop on Applications of Computer November/December 2013 special Conf. on Internet Operating Sys- Vision, Clearwater Beach, Florida; issue on smart cities. tems, Irvine, California; http://icios. http://cvl.cse.sc.edu/wacv2013/index. Smart cities are currently the wordpress.com html___ focus of a broad research commu- nity as well as of many government 11-14 Dec: ICDM 2012, IEEE Conf. 28-30 Jan: ICOIN 2013, 2013 Int’l and industry innovation agendas. on Data Mining, Brussels; http://____ Conf. on Information Networking, The Internet plays a fundamental icdm2012.ua.ac.be______Bangkok, Thailand; www.icoin.org role in communication, information sharing and processing, data trans- 17-19 Dec: SOCA 2012, 5th EEE Conf. 28-31 Jan: ICNC 2013, Int’l Conf. fer and analysis, and distributed on Service-Oriented Computing and on Computing, Networking and computing in many of today’s cities. Applications, Taipei, Taiwan; http://____ Communications, San Diego; www.____ The rise of the Internet of Things conferences.computer.org/soca conf-icnc.org/2013 and the large-scale adoption of Web technologies in urban environments 17-20 Dec: DASC 2012, 10th IEEE Int’l FEBRUARY 2013 have proved that Internet-based solu- Conf. on Dependable, Autonomic 23-27 Feb: HPCA 2013, IEEE Int’l tions can successfully address smart and Secure Computing, Changzhou, Symp. on High-Performance Com- cities’ multifaceted, cross-domain China; http://cse.stfx.ca/~dasc2012 puter Architecture, Shenzhen, China; challenges. www.cs.utah.edu/~lizhang/HPCA19/ This special issue seeks sub- 19-21 Dec: HIPC 2012, Int’l Conf. on index.html______missions about recent or ongoing research efforts and experiences in applying Internet technologies to real- ize the smart city vision. Email the guest editors (ic6-2013@______computer.org)a brief description Showcase Your of the article you plan to submit by 15 February 2013. Articles are due Multimedia Content 1 March 2013. Visit www.computer. org/portal/web/computingnow/iccfp6 on Computing Now! to view the complete call for papers. IEEE Computer Graphics and Applications seeks computer graphics-related CALENDAR multimedia content (videos, animations, simulations, podcasts, and so on) to DECEMBER 2012 feature on its Computing Now page, 1-5 Dec: MICRO 2012, IEEE/ACM Int’l www.computer.org/portal/web/ Symp. on Microarchitecture, Van- ______computingnow/cga. couver; www.microsymposia.org/ If you’re interested, contact us at micro45_____ [email protected]______. All content will be reviewed for relevance and quality. 3-6 Dec: CLOUDCOM 2012, 4th IEEE Int’l Conf. on Cloud Computing Tech- nology and Science, Taipei, Taiwan; www.cloudcom.org

5-7 Dec: RTSS 2012, 33rd IEEE Real- Time Systems Symp., San Juan, Puerto Rico; www.rtss.org

NOVEMBER 2012 101

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

CAREER OPPORTUNITIES

UNIVERSITY OF NORTH CAROLINA c______om/jobofferdetails.jsp?JOBID=35201. a strong commitment to high-quality WILMINGTON, COMPUTER SCIENCE Questions regarding the position may teaching. Candidates will be expected to (ASSISTANT PROFESSOR, TENURE- be addressed to [email protected]. publish their research in peer-reviewed TRACK). Vacancy 13F008 Starts Au- edu.__ The Computer Science Department journals, to teach, and to participate in gust 2013. Ph.D. in Computer Science or at UAlbany offers B.S., M.S. and Ph.D. de- department and University service. For closely related area required. Emphasis grees in Computer Science. For addition- full information about this search and in computer graphics, visualization, ani- al information about the department, application instructions, please visit: mation or closely related area. Details at please visit http://www.cs.albany.edu. ______http://cse.wustl.edu/aboutthedepart- ______http://uncw.edu/hr/employment-epa. ment/Pages/OpenFacultyPositions.aspx.______html___ Priority consideration date: Janu- WASHINGTON UNIVERSITY IN ST. Applicants should hold a doctorate in ary 2, 2013. EEO/AA Employer. Women LOUIS, FACULTY POSITIONS. The Computer Science, Computer Engineer- and Minorities encouraged to apply. Department of Computer Science & En- ing, or a closely related field. Washington gineering at Washington University in University in St. Louis is an Equal Oppor- UNIVERSITY AT ALBANY. Open Rank St. Louis seeks outstanding tenure-track tunity and Affirmative Action employer Faculty / Computer Science Dept. The faculty in all areas of computer science and invites applications from all quali- Computer Science Department at the and engineering at the assistant profes- fied candidates. Employment eligibility University at Albany – SUNY is seeking sor level. Exceptional candidates at the verification required upon employment. candidates for an open rank tenure-track associate and full professor levels will faculty position beginning Fall 2013. We also be considered. The department UNIVERSITY OF CALIFORNIA, MER- seek candidates whose research involves plans to grow its faculty size by 50% in CED, PROFESSOR OF COMPUTER the design and implementation of data the coming years. We seek multiple tal- SCIENCE. The School of Engineering analytics techniques or systems that ented and highly motivated individuals at the University of California at Merced can be used in other areas of Computer who will build transformative research invites applications from distinguished Science and/or in other disciplines. Ap- programs, both through work in the scholars and teachers for a tenured or a plicants must have a Ph.D. in Computer core disciplines of computer science tenure-track faculty position in Electri- Science or closely related discipline. and computer engineering and through cal Engineering and Computer Science. Candidates for Associate or Full Professor interdisciplinary collaborations with re- We are seeking candidates with demon- positions must also have a strong record searchers in areas such as biomedicine, strated excellence in the areas of theory of funded research. For a complete job engineering, and the sciences. Success- of computing, software engineering, description and application procedures, ful candidates must show exceptional and programming languages. However, visit: http://albany.interviewexchange. promise for research leadership and exceptionally qualified candidates in other areas of Computer Science and Engineering will also be considered. A Ph.D. in Electrical Engineering, Com- BAYLOR UNIVERSITY puter Science, or a related field and demonstrated excellence in research are Assistant, Associate or Full Professor of Computer Science required. To apply, or for more informa- tion, please visit our website: http://jobs. The Department of Computer Science seeks a productive scholar and dedicat- ucmerced.edu/n/academic/position.______ed teacher for a tenured or tenure-track position beginning August, 2013. The ______jsf?positionId=4263 AA/EOE. ideal candidate will hold a terminal degree in Computer Science or a closely MASSACHUSETTS INSTITUTE OF related field and demonstrate scholarly capability and an established and ac- TECHNOLOGY, FACULTY POSI- tive independent research agenda in one of several core areas of interest, in- TIONS. The Department of Electrical cluding, but not limited to, game design and development, software engineer- Engineering and Computer Science (EECS) seeks candidates for faculty po- ing, computational biology, machine learning and large-scale data mining. A sitions starting in September 2013. Ap- successful candidate will also exhibit a passion for teaching and mentoring pointment will be at the assistant or at the graduate and undergraduate level. For position details and application untenured associate professor level. In special cases, a senior faculty appoint- information please visit: http://www.baylor.edu/hr/index.php?id=81302 ment may be possible. Faculty duties Baylor, the world’s largest Baptist university, holds a Carnegie classifica- include teaching at the graduate and undergraduate levels, research, and su- tion as a “high-research” institution. Baylor’s mission is to educate men and pervision of student research. We will women for worldwide leadership and service by integrating academic ex- consider candidates with backgrounds cellence and Christian commitment within a caring community. Baylor is and interests in any area of electrical actively recruiting new faculty with a strong commitment to the classroom engineering and computer science. Faculty appointments will commence and an equally strong commitment to discovering new knowledge as Baylor after completion of a doctoral degree. aspires to become a top tier research university while reaffirming and deepen- Candidates must register with the EECS ing its distinctive Christian mission as described in Pro Futuris (http://www. search website at https://eecs.mit.edu/______Computer,______and must submit application baylor.edu/profuturis/).______materials electronically to this website. Baylor is a Baptist university affiliated with the Baptist General Convention Candidate applications should include a description of professional interests and of Texas. As an AA/EEO employer, Baylor encourages minorities, women, goals in both teaching and research. veterans, and persons with disabilities to apply. Each application should include a curric- ulum vita and the names and addresses

102 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 © 2012 IEEE

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

of three or more individuals who will provide letters of recommendation. Let- Faculty Positions Available in the ter writers should submit their letters Department of Computer Science directly to MIT, preferably on the web- site or by mailing to the address below. The Department of Computer Science (CS@VT) at Virginia Tech seeks applicants for tenure- Please submit a complete application by track faculty positions in the following areas: December 15, 2012. Send all materials not submitted on the website to: Profes- Associate Professor in Cybersecurity sor Anantha Chandrakasan, Department The successful candidate will contribute to the research and graduate programs in the National Capital Region (NCR) and collaborate with faculty at Virginia Tech’s campus in Blacksburg, VA. Head, Electrical Engineering and Com- This position adds to the collaboration in cybersecurity between the Department of Computer puter Science, Massachusetts Institute Science and the Bradley Department of Electrical and Computer Engineering (ECE). Candidates of Technology, Room 38-401, 77 Massa- should have research interests in systems and network security, trustworthy systems, software chusetts Avenue, Cambridge, MA 02139. security, information security and privacy, or other topics relevant to national critical infrastructure. M.I.T. is an equal opportunity/affirma- Candidates should have a record appropriate to an associate professor rank in scholarship, tive action employer. leadership, and interdisciplinary collaboration in cybersecurity. Ideal candidates combine cybersecurity with existing departmental strengths. See www.cs.vt.edu/FacultySearch for UNIVERSITY OF NEVADA, RENO. additional information. Computer Science and Engineering at The department collaborates with ECE in the newly established Ted and Karyn Hume Center for UNR invites applications for a tenure- National Security and Technology (www.cnst.ictas.vt.edu) and the NCR Program in Information track assistant professor faculty position Assurance with an associated Executive Master's degree and a graduate certificate program. The starting July 1, 2013. More information NCR campus (www.ncr.vt.edu) is located near the Washington D.C./Falls Church area and houses the Virginia Tech Research Center (www.ncr.vt.edu/arlington) in Arlington, VA, enabling significant can be found www.cse.unr.edu. Can- research opportunities in cyber-security. The new facility is within walking distance of the NSF, didates with interest and expertise in ONR, AFOSR, DARPA, and other agencies. big data/cloud computing, embedded Applications must be submitted online to ______https://jobs.vt.edu reference posting #0122357 or use systems, or computer games may be this direct link (listings.jobs.vt.edu/applicants/Central?quickFind=196077______). Applicant screening given preference. Applicant should be will begin December 31, 2012 and continue until the position is filled. Inquiries should be directed strongly committed to quality research to Dr. Dennis Kafura, Search Committee Chair, [email protected]______. and teaching, expect to develop a robust externally funded research program, su- Assistant Professor in Artificial Intelligence/Machine Learning Blacksburg, VA pervise MS and PhD students, and par- Full-time tenure-track position, at the rank of Assistant Professor, from candidates with ticipate in service and outreach. Review expertise in artificial intelligence having specific emphasis on machine learning or reasoning of applications will begin on January 15, under uncertainty. The department is in the process of making multiple hires over multiple years 2013. To apply https://www.unrsearch.______in this area. Candidates should have a record of scholarship, leadership, and collaboration in com/postings/11551. EEO/AA. computing and interdisciplinary areas; demonstrated ability to contribute to teaching at the undergraduate and graduate levels in AI and related subjects; sensitivity to issues of diversity in LEAD DEVELOPER. White Plains, NY. the campus community; and the skills to establish and grow a multidisciplinary research group. Develop application software for int’l Early applications are encouraged. Applications must be submitted online to https://jobs.vt.edu______for posting #0122414. rail travel provider. Master’s deg in Com- puter Science & 1 yr exp in job offered The department is home to the Discovery Analytics Center (dac.cs.vt.edu), a university-wide effort that brings together faculty with strengths in machine learning, big data, and data mining or as Java Developer req’d. Strong exp in applied to problems of national interest. There also are rich opportunities in a highly Java, Servlets, JSP, JDBC, Spring, XML, Ja- collaborative department with strengths in HCI, HPC, computational biology and vaScript, Perl, HTML, DHTML req’d. Exp in bioinformatics, information retrieval, software engineering, CyberArts, and CS education. AJAX, RSS & Web 2.0 technologies, SOAP Beyond the department, there are opportunities for collaboration in machine learning with technology, MySQL,Oracle & Eclipse faculty in ECE and Statistics. Research on security and personal health informatics is possible req’d. Resumes to: Rail Europe, 44 S in collaboration with the VT-Carilion Research Institute associated with the VT-Carilion School Broadway, 11th Fl, White Plains, NY 10601 of Medicine. Applicant screening will begin December 31, 2012 and continue until the position or email resumes to HR_Resources@______is filled. Inquiries should be directed to Dr. Doug Bowman, AI/ML Search Committee Chair, raileurope.com. [email protected]______. Assistant, Associate, or Full Professor in Systems PROGRAMMER ANALYST. Dsgn, dvlp, Blacksburg, VA test & implmt , Java, J2EE, Struts2, Tap- Candidates with research breadth and depth across several areas of computer systems, including estry, Oracle Spatial, Oracle intermedia, architecture, operating systems, and networking are sought and researchers in the areas of AWK, Oracle 9i/10g/11g , RAC, Req MS in compilers, run-time systems, and parallel and distributed systems are especially encouraged to Comp Sci, Engg or rel. Freq travel reqd. apply. Candidates should have a record of scholarship and collaboration in computing and interdisciplinary areas; demonstrated ability to contribute to teaching at the undergraduate and Mail resumes to Sunmerge Systems Inc, graduate levels; and sensitivity to issues of diversity in the campus community. Applications 15 Corporate Place South, Ste 430, Pisca- must be submitted online to ______https://jobs.vt.edu for posting #0122413. Applicant screening will taway, NJ 08854. begin December 31, 2012 and continue until the position is filled. Inquiries should be directed to Dr. Kirk W. Cameron, Search Committee Chair, [email protected]______. PROGRAMMER ANALYST. Iselin, The Department of Computer Science (CS@VT) has 35 tenure-track research oriented faculty NJ: Travel to multiple client locations including 12 NSF CAREER award winners, Ph.D. production among the top 30 in the USA, and nationwide to create, modify, main- annual research expenditures exceeding $6.5 million. CS@VT is in the College of Engineering tain stored procedures for processing whose undergraduate program was ranked 16th among all accredited engineering schools, and business logic (financial domain) for sixth among public universities and whose graduate program was ranked 24th by US News & different modules according to user World Report in fall 2012. In 2010, CS@VT was ranked 5th in the recruiting quality of computer science undergraduate majors by the Wall Street Journal. Recently, the department has requirements using Sybase (T-SQL), attracted high-profile research funding including several multi-million dollar awards from Rapid SQL, PERL, JavaScript in multi- diverse sources, e.g., IARPA, NSF, DOE, and ARO. platform environment. Work with Or- Salary for suitably qualified applicants is competitive and commensurate with experience. acle, PL SQL, DB2. Test, troubleshoot, Virginia Tech is an equal opportunity/affirmative action institution.

NOVEMBER 2012 103

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

University of Illinois at Urbana-Champaign

The Department of Electrical and Computer Engineering (ECE) at the University of Illinois at maintain existing code. Reply to: Mag- Urbana-Champaign invites applications for faculty positions at all levels and in all areas of num Infotech, Inc., 33 Wood Avenue S, electrical and computer engineering, but with particular emphasis in the areas of bioinformat- #600 Iselin NJ 08830. ics and systems biology, controls, energy and power systems, nanoelectronics, nanophotonics devices, circuits and systems, computer systems, parallel computing, reliable computing, and CONSULTANT. F/T (Poughkeepsie, distributed systems. Applications are encouraged from candidates whose research programs are NY) Position involves travel to various in traditional as well as in nontraditional and interdisciplinary areas of electrical and computer unanticipated worksites up to 100% of engineering. The department is engaged in exciting new and expanding programs for research, the time anywhere in the United States. education, and professional development, with strong ties to industry. Must have Bach deg or the foreign equiv Applicants for positions at the assistant professor level must have an earned Ph.D. or equiva- in Technology, Comp Sci & Engg, Comp lent degree, excellent academic credentials, and an outstanding ability to teach effectively at Engg, or related with two (2) yrs of exp both the graduate and undergraduate levels. Successful candidates will be expected to initiate building dynamic websites, web appli- and carry out independent research and to perform academic duties associated with our B.S., cations and web services using ASP.Net, M.S., and Ph.D. programs. Senior level appointments with tenure are available for persons of C#.Net, VB.Net, XML, Telerik Controls and international stature. SQL Server 2005. Send resume: Indotro- nix Int.l Corp., Recruiting (RS), 331 Main Faculty in the department carry out research in a broad spectrum of areas and are supported St, Poughkeepsie, NY 12601. by world-class facilities, including the Coordinated Science Laboratory, the Information Trust Institute, the Micro and Nanotechnology Laboratory, the Beckman Institute for Advanced Sci- ETL/DATA STAGE DEVELOPER sought ence and Technology, as well as several industrial centers and programs that foster interna- by GSPANN Technologies, Inc. in Mil- tional collaborations. The department has one of the leading programs in the United States, pitas, CA w/ Master’s in Comp Sci or granting approximately 350 B.S. degrees, 100 M.S. degrees, and 60 Ph.D. degrees annually. related. Responsibilities incl providing In order to ensure full consideration by the Search Committee, applications must be received professional comp consulting services in by December 15, 2012. Salary will be commensurate with qualifications. Preferred starting date form of systems analysis, dsgn & dvlpmt, is August 16, 2013, but is negotiable. Applications can be submitted by going to http://jobs. systems integration &/or testing consult- ing. Mail resumes to 362 Fairview Way, illinois.edu______and uploading a cover letter, CV, research statement, and teaching statement, along Milpitas, CA 95035 attn: HR. with names of three references. For inquiry, please call 217-333-2302 or email ece-recruiting@______illinois.edu.______PRINCIPAL SYSTEMS ARCHITECT Illinois is an Affirmative Action /Equal Opportunity Employer and welcomes individuals with sought by Nexius Solutions Inc. (Allen, diverse backgrounds, experiences, and ideas who embrace and value diversity and inclusivity TX) w/ Comp/Electronic Engg or rltd (www.inclusiveillinois.illinois.edu). deg w/ 5 yrs exp. Job duties: To decide on core network mgmt technological choices for wireless & telecommunica- tions networks; identify product & tech- nical reqmts & work w/potential suppli- BAYLOR UNIVERSITY ers. Lead dsgn, implmtn & integration of element mgmt systems & network mgmt Lecturer of Computer Science system for devise. Possible relocation to Fairfax, VA. Mail Resumes to 1301 Central The Department of Computer Science seeks a dedicated teacher and pro- Expressway S., Ste 200, Allen, TX 75013. gram advocate for a lecturer position beginning August, 2013. The ideal Attn HR coordinator. candidate will have a master’s degree or Ph.D. in Computer Science or a SOFTWARE ENGINEER. (Vienna, VA) related area, a commitment to undergraduate education, effective com- Analyze, dsgn, dvlp, test & implmt data warehouses, web based applics & applic munication and organization skills, and industry/academic experience in systems & s/w using Oracle 8, Perl, C++, game development, especially with graphics and/or engine development. XML, ASP, Cold Fusion, WebSphere, Korn For position details and application information please visit: http://www. Shell Scripts, HTML, DHTML, JSP, JDBC, Using JumpStart, SunInstall, WebStart, baylor.edu/hr/index.php?id=81302______KickStart & Symantec, Unix & Windows 98/00/NT. Reqs MS Sci, Comp Sci or Busi- Baylor, the world’s largest Baptist university, holds a Carnegie classifica- ness. Mail resumes to SMK Soft Inc., 8230 tion as a “high-research” institution. Baylor’s mission is to educate men Boone Blvd, Ste 430., Vienna, VA 22182

and women for worldwide leadership and service by integrating academic SOFTWARE ENGINEER, TEST ENGI- excellence and Christian commitment within a caring community. Baylor NEERING - Dev. framework for testing is actively recruiting new faculty with a strong commitment to the class- next-gen. Visual Analytics and Collabo- ration suite of software. Reqs BS or for- room and an equally strong commitment to discovering new knowledge eign equiv. deg. in Comp. Sci., Engg., or a as Baylor aspires to become a top tier research university while reaffirm- rltd. field + 5 yrs of prog., post-bacc. exp., ing and deepening its distinctive Christian mission as described in Pro which includes 3 yrs of exp. in testing computer software utilizing a high-level Futuris (http://www.baylor.edu/profuturis/). programming language; designing and implementing automation frameworks; Baylor is a Baptist university affiliated with the Baptist General Convention developing and maintaining automated of Texas. As an AA/EEO employer, Baylor encourages minorities, women, tests; testing and profiling large-scale C++ systems; testing highly scalable Java veterans, and persons with disabilities to apply. and/or Ruby server systems that back dynamic, highly interactive web experi-

104 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

ences; and creating test specifications and test plans. Any suitable combination of education, training, or experience is acceptable. Position at Tableau Software Florida International University is a multi-campus public research university in Kirkland, WA. To apply, please e-mail located in Miami, a vibrant, international city. FIU is recognized as a Carn- resume and cover letter to jobstableau@______tableausoftware.com. egie engaged university. Its colleges and schools offer more than 180 bachelor’s, master’s and doctoral programs in fields such as computer science, engineering, QUALITY ASSURANCE ANALYST - Use international relations, architecture, law, and medicine. As one of South Flori- of SQL to test custom built s/ware ap- da’s anchor institutions, FIU is worlds ahead in its local and global engagement, plics to ensure bug fixes & new features finding solutions to the most challenging problems of our time. FIU emphasizes work per specifications; create & manage research as a major component of its mission and enrolls 48,000 students in two tickets using co. ticket tracking system campus and three centers including FIU Downtown on Brickell and the Miami for in-house applics; provide training to Beach Urban Studios. More than 160,000 alumni live and work in South Florida. existing/new users, applic support team For more information about FIU, visit http://www.fiu.edu/. & dvlpmt members on existing applics/ features; lead the applic support team & The School of Computing and Information Sciences seeks exceptionally quali- assist w/solving issues reported via the fied candidates for multiple tenure-track and tenured faculty positions at all lev- applic support ticketing system; & auto- els as well as non-tenure track faculty positions at the level of Instructor. mate existing test cases. Min. req. MS in TENURE TRACK/TENURED POSITIONS (JOB ID# 505004) Info Technology. Resumes to Job Loca- tion: InnerWorkings, Inc. 600 W. Chicago We seek well-qualified candidates in all areas of Computer Science and research- Ave., Ste 850, Chicago, IL 60654. ers in the areas of programming languages, compilers, databases, information retrieval, computer architecture, scientific computing, big data, natural language SERVICES CONSULTANT (Islandia NY & processing, computational linguistics, health informatics, and robotics, are par- locs throughout US). Understand client’s ticularly encouraged to apply. Preference will be given to candidates who will bus. needs & collaborate w/ architect to enhance or complement our existing research strengths. prep dsgn docs. Dvlp, implmt & config CA Clarity PPM solution. REQS: Bach- Ideal candidates for junior positions should have a record of exceptional research elor’s or foreign equiv in Comp Sci, Math, in their early careers. Candidates for senior positions must have an active and Engg (any field), Bus. (any field) or rel + 2 proven record of excellence in funded research, publications, and professional yrs exp in job &/or rel occup; must have service, as well as a demonstrated ability to develop and lead collaborative re- exp w/ Implmntg & configuring CA Clar- search projects. In addition to developing or expanding a high-quality research ity PPM solution; Engaging in customer- program, all successful applicants must be committed to excellence in teaching facing prof services consulting; Certified at both graduate and undergraduate levels. An earned Ph.D. in Computer Science as CA Clarity PPM Bus. Analyst &/or CA or related disciplines is required. Clarity PPM Professional; Frequent travel reqd; Work from home benefit avail- NON-TENURE TRACK INSTRUCTOR POSITIONS (JOB ID# 505000) able. Send resume to: Althea Wilson, CA We seek well-qualified candidates in all areas of Computer Science and Informa- Technologies, One CA Plaza, Islandia, NY tion Technology. Ideal candidates must be committed to excellence in teaching 11749, Refer to Requisition #29522. a variety of courses at the undergraduate level. A graduate degree in Computer Science or related disciplines is required; significant prior teaching and industry PROGRAMMER ANALYSTS (multiple experience and/or a Ph.D. in Computer Science is preferred. positions): Analyze, dsgn, dvlp, test & sup- port applications/systems based on bus./ Florida International University (FIU), the state university of Florida in Miami, is ranked by the Carnegie Foundation as a comprehensive doctoral research uni- versity with high research activity. The School of Computing and Information Sciences (SCIS) is a rapidly growing program of excellence at the University, with 36 faculty members and over 1,500 students, including 75 Ph.D. students. SCIS offers B.S., M.S., and Ph.D. degrees in Computer Science, an M.S. degree in Telecommunications and Networking, and B.S., B.A., and M.S. degrees in DEPARTMENT HEAD Information Technology. SCIS has received approximately $17.5M in the last Nominations and applications are being four years in external research funding, has six research centers/clusters with solicited for the position of Head of the first-class computing infrastructure and support, and enjoys broad and dynamic Bradley Department of Electrical and industry and international partnerships. Computer Engineering (ECE). Candidates should have demonstrated leadership and HOW TO APPLY: management skills to lead the department to become one of the premier ECE departments Applications, including a letter of interest, contact information, curriculum vi- in the nation. Candidates must qualify for tae, academic transcript, and the names of at least three references, should be tenure at the rank of professor and should have achieved distinction in university-level submitted directly to the FIU Careers website at https://jobsearch.fiu.edu; refer teaching and research and have a record of to Job ID# 505004 for tenure-track or tenured positions and to Job ID# 505000 superior scholarship, administrative ability, for instructor positions. The application review process will begin on January and leadership. 7, 2013, and will continue until the position is filled. Further information can Complete position information, application be obtained from the School website http://www.cis.fiu.edu, or by e-mail to procedures, and the review process are [email protected]. available at   ______. Please apply online at    ______, posting FIU is a member of the State University System of Florida and is an Equal Opportu- . nity, Equal Access Affirmative Action Employer. EO/AA

NOVEMBER 2012 105

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Department of Electrical Engineering and Computer Science University of Kansas: end user reqmts utilizing knowl of & exp w/Oracle 10g/11g; SQL Server 2005/2008; Computer Science/Computer Engineering Faculty SQL; PL/SQL; JAVA; J2EE; Web Sphere; Web Services; SOA; XML; TOAD; SQL DE- The University of Kansas (KU) Department of Electrical Engineering and Computer VELOPER; HTML; Apache; IIS; Java Script; Science (EECS) seeks outstanding individuals for three tenure track positions in the CSS; DHTML; Windows NT/XP; & UNIX. disciplines of computer engineering or computer science. Successful candidates are Travel req. to unanticipated client sites in expected to contribute to the development of academic and research programs and USA. Min. Req. MS in Comp Sci, Eng. dis- to contribute to the research community. Successful candidates must have an earned cipline, or related. Resumes to Job Loca- doctorate or equivalent in computer science, computer engineering, or related fields tion: Aarkay Technologies Inc., 852 Gold at the time of joining the department. Hill Rd., Ste. 205, Fort Mill, SC 29708. EECS leads the KU School of Engineering with 36 faculty members and a research volume of over $10 million per year. The EECS department offers undergraduate BUSINESS ANALYST needed to devel- and graduate degrees in electrical engineering, computer engineering, computer sci- op and maintain financial databases and ence, interdisciplinary computing, and information technology. The department has computer software systems. Job located approximately 450 undergraduate and 250 graduate students. The EECS faculty in Midland, TX. Mail resumes to Midland collaborate on research opportunities that cross language, compiler, architecture, Central LLC, 1203 N. Lamesa Road, Mid- high-performance computing, and scientific computing topics, among others, with- land, TX 79701. No walk-ins. in and outside the department. DBA LEADS Troy, MI area. Work w/ data- Operating Systems base system clusters on mainframes, db2 We are interested in those candidates exploring new ideas in advanced operating sys- UDB, & IMS w/ COBOL, CICS & JAVA apps. tems, distributed systems, file and storage systems, embedded systems, resilient sys- Plan & execute database related projects tems, virtualization, and multi-core computing, with the focus on computer systems. like database system upgrades, data mi- gration, normalization, performance tun- Three letters of recommendation and questions should be sent separately to Dr. ing, high-availability & disaster recovery. Prasad Kulkarni, by emailing to [email protected]. Must possess a MS in Software Engg, Bioinformatics Computer Engg, Computer Sci or related + 36 months as a Computer Software Pro- This search is focused on those with expertise in machine learning, data mining, fessional. Travel/reloc as req. Send res to statistical learning, distributed databases, big data analytics; all focused on com- Unified Business Technologies, Inc. and putational life sciences problems. Other areas of computer science focused on com- designate position to 3250 West Big Bea- putational life sciences maybe considered for exceptional applicants. Candidates ver Rd, Ste 329, Troy MI 48084. are sought for assistant and associate professor level. Demonstrated research and academic leadership is required for the senior rank. KU strongly supports leading life sciences research in all aspects. There are many interdisciplinary collaboration opportunities involving different schools at KU using high throughput sequencing, THE UNIVERSITY high content screening, mass spectrometry, and brain imaging, to name a few ex- amples. KU Medical Center is an NIH designated Cancer Center. Three letters of OF MINNESOTA– recommendation and questions should be sent separately to Dr. Jun Huan by email- TWIN CITIES ing to [email protected]. High Performance Computing The University of Minnesota – Twin This search is focused on those with expertise in high performance computing Cities invites applications for faculty (HPC), including parallel computing on HPC systems employing multi-core, GPU, positions in Electrical and Computer or special-purpose architectures, parallel and distributed algorithms, and data- Engineering from individuals with a intensive computing. Exceptional candidates in related areas of computer science/ strong background in core areas of ECE, engineering focused on computational science may also be considered. Candidates particularly (1) power and energy systems are sought for the assistant professor level. There are many collaboration oppor- and (2) systems, communications, and tunities with established language, compiler, architecture, and scientific computing controls, with interests in bio- or medical- researchers both within and outside the department. There are many interdisciplin- imaging, big data, information processing, ary collaboration opportunities involving different schools at KU with high perfor- mance computing needs, such as the KU Medical Center, a NIH designated Cancer or systems biology. Women and other Center. Three letters of recommendation and questions should be sent separately to underrepresented groups, and those Dr. Joe Evans by emailing to [email protected]. with strong interdisciplinary interests, The KU School of Engineering is rapidly expanding and plans to add thirty new are especially encouraged to apply. An faculty lines in the next 5 years with expand research and teaching facilities. The earned doctorate in an appropriate University of Kansas is focused on four key campus-wide strategic initiatives: (1) discipline is required. Rank and salary Sustaining the Planet, Powering the World; (2) Promoting Well-Being, Finding will be commensurate with qualifications Cures; (3) Building Communities, Expanding Opportunities; and (4) Harnessing In- and experience. Positions are open until formation, Multiplying Knowledge. For more information, see http://www.provost. filled, but for full consideration, apply at ku.edu/planning/themes/. Successful candidates will address KU’s themes. http://www.ece.umn.edu/ by January The appointment will be effective as negotiated. Applications and nominations 4, 2013. The University of Minnesota should be submitted at http://www.ku.edu/employment/ under faculty. Applications is an equal should include a letter of application, curriculum vita, a statement of research inter- opportunity ests and future plans, a statement of teaching interests and future plans. Applica- employer and tions will be reviewed beginning December 1, 2012 and will be accepted until the educator. position is filled. Equal Opportunity Employer M/F/D/V

106 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Department of Computer and BT AMERICAS, INC. has an opening field & 2 yrs exp in each of the follow- Information Sciences for Sr. Security Systems Engineer in El ing: Proficiency in Microsoft Office Suite; Temple University Segundo, CA to provide support in life Implementing best practices in systems service Security & Network solutions. Re- development; SDLC best practices; En- Tenure Track Faculty quires MS degree + 2 yrs exp. less than terprise data mgmt concepts, designs & 5% domestic/int’l travel. Apply online at implementations; Agile Methodologies; Applications are invited for tenure- track, open rank, faculty positions in the www.btamericascareers.com Job Code Project Mgmt. Also requires travel &/or Department of Computer and Information #3822. EOE. relocation to client sites at unanticipat- Sciences at Temple University. ed locations anywhere in the U.S. Worker The junior position is in the software SR. SOFTWARE DEVELOPER. IT Com- may telecommute 1-2 days/wk. Email re- systems area, which includes pany in Calabasas, CA has an opening sume to [email protected].______for Sr. Software Developer. Define the r Software Engineering and software system architecture which in- IT PROFESSIONALS. TechDemocracy, Applications, Database Systems, and clude high level design, coding, defining LLC has multiple openings for the follow- r r Programming Languages. test strategy and security restrictions, ing positions at its office in Edison, NJ, among others. F/T, requires Bachelor’s and unanticipated sites throughout the The senior position for Associate or Full Degree plus 5 yrs. Experience in job or U.S.: § Software Engineers - Gather and Professor is open to all areas of computer related occupation. If interested please analyze user requirements, design and science/engineering. Applicants for the send this ad and your resume to Pro Soft- develop new software. Handle systems senior position are expected to have an net Corp., Attn: HR 26115 Mureau Rd. Ste. development of life cycle. Experience outstanding track record. A, Calabasas, CA 91302. Required. § Computer Programmers/ Please submit applications with all Programmer Analysts - Work under su- requested information online at ENGAGEMENT MANAGER. Jackson- pervision or independently, gather data http://academicjobsonline.org. ville, FL: Future Technology Associates prepare requirements and specifications, For further information check seeks Engagement Manager to oversee design detailed flowcharts and generate http://www.cis.temple.edu or send email overall planning, investment brief au- standardized code. Test, debug, and in- to search committee chair Dr. Eugene thoring, budgeting, resource allocation, stall the operating programs and proce- Kwatny at [email protected]. Review design, development & resource mgmt dures. Experience required. § Technical of candidates will begin on January 2, for all phases; Understand & apply com- Systems Architects -Perform architec- 2013 and will continue until the positions plex concepts from computer science tural design and integration for complex, are filled. Temple University is an equal in business context for solving busi- cross-functional systems. Identify op- opportunity, equal access, affirmative ness or operational issues; Req Master’s portunities for improvements to meet action employer. degree in Info Systems Mgmt or related customer needs. Experience required.

Department of Computer Science and Engineering Faculty Positions The Department of Computer Science and Engineering, Salary is highly competitive and will be commensurate with HKUST (http://www.cse.ust.hk/) has more than 40 faculty qualifications and experience. Fringe benefits include medical members, recruited from major universities and research and dental benefits and annual leave. Housing benefits will also institutions around the world, and about 800 students be provided where applicable. For appointment at Assistant (including about 200 postgraduate students). The medium Professor/Associate Professor level, initial appointment will of instruction is English. In 2012, we were ranked 13th normally be on a three-year contract. A gratuity will be among all Computer Science and Engineering Departments payable upon completion of contract. worldwide according to QS World University Ranking, and Applications should be sent through e-mail including a cover th 26 according to Academic Ranking of World Universities. letter, curriculum vitae (including the names and contact The Department will have at least one tenure-track faculty information of at least three references), a research statement opening at Assistant Professor/Associate Professor/Professor and a teaching statement (all in PDF format) to csrecruit@cse. levels for the 2013–2014 academic year. We are looking for ust.hk. Priority will be given to applications received by 28 candidates with interests in Security, or Systems. Strong February 2013. Applicants will be promptly acknowledged candidates in core computer science and engineering research through e-mail upon receiving the electronic application areas will also be considered. Applicants at Assistant Professor material. level should have an earned PhD degree and demonstrated (Information provided by applicants will be used for recruitment and potential in teaching and research. other employment-related purposes.)

NOVEMBER 2012 107

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

CAREER OPPORTUNITIES

§ Management Systems Analysts- De- & Graduate coursework. Email resumes velop, implement design of system level to [email protected]______& refer to Job requirements. Finalize systems require- code UGS117. EOE. ments and application architecture. Build process and code migration on various SOFTWARE ENGINEER UI/UX (N. platforms. Experience required. § Secu- Reading, MA) Must hv BS in CS, Engg, rity Analysts- Plan, coordinate and imple- s/ware dvlpmt, math or info systems or ment security measures for information foreign equiv & 3 yrs exp in job offd or Cisco Systems, Inc. is accepting resumes for systems. Analyze and develop appro- in s/ware dvlpmt including 1 yr of user priate responses to computer security interface dvlpmt in Flex; or a MS in CS, the following position in breaches. Experience required. Attrac- Engg, s/ware dvlpmt, math or info sys- tive compensation. Travel and relocation tems or foreign equiv & 2 yr exp in job Irvine, CA: possible. Please mail resume, with salary offd or in s/ware dvlpmt including 1 yr history and position applied for to: Tech- of user interface dvlpmt in Flex. Send Democracy, LLC, 499 Thornall Street, 3rd resumes to Mary Beth Christopher, Kiva IT Program Manager Fl., Edison, New Jersey 08837. Attention: Systems, Inc., 300 River Park Dr., N. Read- Human Resources. ing, MA 01864 or to mchristopher@kiva-______(Ref#: IRV11) systems.com.______Refer to job#003. SOFTWARE ENGINEER (Columbus, Manage and lead strategic and global IT programs OH) Dsgn, implmt, test & maintain ap- SENIOR DB2 DEVELOPER. Miami, FL. plications using Oracle SQL, PL/SQL, MSc or BSc plus 5 yrs exp req’d. AIX/UDB, that have a significant impact across a large client JAVA Oracle 11g, 10g, 9i, Performs Or- Unix, stored DB2 procedure & SQL exp base. acle Application 11i & R12 admin tasks, req’d. Architectural knwldg & exp of IBM Backup & Recovery using Rman, Rac, systems w/ multi-partitioning environ- Asm, Dataguard, Streams, Oracle Forms, ment at Enterprise level req’d. Strong Please mail resumes with reference number to Perl, Shell scripts, Unix & Windows data modeling & analytical exp req’d. Cisco Systems, Inc., Attn: B51M, 170 W. Tasman XP/2000/2003/2008. Must be willing to TracFone Wireless, resumes only via Drive, Mail Stop: SJC 5/1/4, San Jose, CA 95134. No travel & reloc. Reqs MS Comp Sci, Eng email to: [email protected].______or rel. Mail resumes to Technology Soft- phone calls please. Must be legally authorized to ware, 1505 Bethel Rd, Ste 301, Columbus, PRINCIPAL CONSULTANT - New York, work in the U.S. without sponsorship. EOE. OH 43220. NY. Assess the security properties of computer applications, networks, frame- www.cisco.com SIEMENS PLM SOFTWARE INC. has an works, embedded devices, and mobile opening in Shoreview, MN for Software applications and devices like Android, Engineer Adv. to design, develop, mod- Windows Phone, iOS, RIM BlackBerry, ify & implement software programming Apache and IIS servers, thick clients, and for products. Requires BS & 3 yrs. exp. in Class B corporate networks, and develop prof. software development. Email re- exploits for the same. Analyze crypto- sumes to [email protected] & refer graphic properties of software, modules, to Job code UGS97. EOE. and algorithms, and test for design and implementation flaws affecting security. SIEMENS PLM SOFTWARE INC. has Reverse engineer and modify software an opening in Plano, TX & various unan- applications for platforms including An- Cisco Systems, Inc. is accepting resumes for ticipated worksites thru-out the U.S. for droid, Windows Phone, iOS, Java, .NET, the following position in Solution Architect to implement, deploy and native languages (C/C++). Perform & consult on Teamcenter solutions. Re- manual source code reviews and de- Chicago, IL: quires BS & 5 yrs. exp. & 75% domestic velop applications in the following lan- travel. Email resumes to PLMCareers@______guages: Assembly , C/C+ +, .NET, Java, ugs.com & refer to Job code UGS99. EOE. Objective-C, Groovy, SQL, HTML. Will use Network Consulting a wide range of tools including Mallory, SIEMENS PLM SOFTWARE INC. has an Burp, IDA Pro, Nessus, nmap, sqlmap, opening in Milford, OH for Software En- Backtrack, Peach, ILSpy, gdb efficiently Engineer gineer to work on NX Modeling software for a variety of assessments.Travel may (Ref#: CHI1) development projects. Requires MS or be required. Required: Master’s degree completion of degree reqs towards MS in Science, Information Technology or Responsible for the support and delivery of Advanced Services to company’s major accounts. CLASSIFIED LINE AD SUBMISSION DETAILS: Rates are Please mail resumes with reference number to $400.00 per column inch ($600 minimum). Eight lines per col- Cisco Systems, Inc., Attn: J51W, 170 W. Tasman umn inch and average five typeset words per line. Send copy at Drive, Mail Stop: SJC 5/1/4, San Jose, CA 95134. No least one month prior to publication date to: Marian Anderson, phone calls please. Must be legally authorized to Classified Advertising, Computer Magazine, 10662 Los Vaque- work in the U.S. without sponsorship. EOE. ros Circle, Los Alamitos, CA 90720; (714) 821-8380; fax (714) 821- www.cisco.com 4010. Email: [email protected].______

108 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

MIS. Bachelor’s degree in related field PEOPLESOFT DEVELOPER. App Fujitsu Network and 5 years of experience is acceptable maintenance & devel., enhancem., new in lieu of Master’s degree in related field. module installation etc. for PeopleSoft Communications, Inc. Any suitable combination of education, v9.x Financial/Supply Chain sys (GL, AP, has a job opportunity available in training and experience would be ac- AM, PO, EXP, ePro). Assist production ceptable. Send resume to Intrepidus support resol., project, sys test & vali- Sunnyvale, CA Group, Inc., 119 Fifth Avenue, Suite 702, dation. Devel. tech docs for all phases New York, NY 10003. of PeopleSoft SDLC. Use SQL, PL/SQL, PeopleSoft devel. & Reporting tools, Software PROGRAMMER ANALYSTS (mult po- Oracle dbases. Travel 5%. MS CS or sitions) dsgn & dvlp Microsoft C#.Net, Engg + 3 yrs relevant exp or BS +5 yrs. WCF Services, SharePoint & SQL D/base Email [email protected]______w/ Development Stored Procedures; perform unit & inte- Job #9131 in subj. line. Laureate Edu- gration testing; & create web applic(s) cation, Inc. 650 S Exeter St. Balto. MD Engineer using ASP.NET & C#. Req. MS in Comp Sci. 21202. EOE. or Engg. Travel req. to unanticipated cli- (Req #FNC02017) ent sites in USA. Resume to Job Loc: In- DIRECTOR, RECRUITING. IT Consult- foLogitech Inc., 50 Cragwood Road, Ste ing company based in Portland, Oregon Responsible for the requirement 209, South Plainfield, NJ 07080. has an opening for a “Director, Recruit- ing”. This position is a member of the analysis, design, development and SOFTWARE DEVELOPER req. by soft- executive team responsible for plan- support of Network Management ware development co. w/ BS in rltd Comp ning, staffing, managing, personnel, System product suite developed to Sci field to provide applics, dsgn solu- process and procedure development tions & feasibility assessments. Lead & and providing day to day leadership manage Fujitsu Network Elements. mentor co. teams. Perform maintenance. of geographically diverse, fast-paced Submit resume to Fujitsu Network Support & analyze s/ware issues. Dsgn recruiting team. Requires Bachelor’s solutions for s/ware framework, algo- Degree or equivalent plus 5 yrs. pro- Communications, Staffing Depart- rithms, & code structure. Program & cre- gressive experience in job or related ment, 2801 Telecom Pkwy, ate test cases for quality control. Implmt occupation. Travel required with ex- Richardson, TX 75082. Must refer- technologies & maintain networks. Job penses paid by the employer. If inter- loc: Sterling, VA. Send res to Spurgetech ested please send this ad and your re- ence Req. #FNC02017. LLC, 21580 Atlantic Blvd., Ste # 220B Ster- sume to C3G, Attn: Linda Welsh, 121 SW ling, VA 20166. Salmon St. #1100, Portland OR 97204.

TENURE-TRACK FACULTY POSITION IN THE DEPARTMENT OF ELECTRICAL AND COMPUTER ENGINEERING AT THE GEORGE WASHINGTON UNIVERSITY The Department of Electrical and Computer Engineering at The George Basic Qualifications: Applicants for the Associate Professor Rank Washington University invites applications for a tenure-track position at are expected to have a Ph.D. in Biomedical, Computer, or Electrical the Assistant/Associate Professor Rank in the area of High-Performance Engineering, or a closely related field. They should have strong records of Computing or Computer Hardware Systems for Biomedical Engineering, attracting research funding, peer-reviewed publications, and teaching, as Bioinformatics, or Computational Biology. Successful candidates may start evidenced by teaching evaluations and recognition of teaching excellence. as early as the Fall semester 2013. Applicants for the Assistant Professor Rank must complete all degree The department has well-established graduate and undergraduate programs requirements for the Ph.D. in Biomedical, Electrical, or Computer in Electrical, Biomedical, and Computer Engineering. In addition, the Engineering, or a closely related field, before September 1, 2013, to be University has initiatives designating Biomedical Engineering, Energy, appointed as an assistant professor. In addition, applicants must: 1) High Performance Computing, and Nano-Technology as areas of demonstrate strong research potential, as evidenced by peer-reviewed excellence. Under construction is a 500,000 sq. ft. Science and Engineering publications; and 2) demonstrate substantial potential to attract extramural Hall that will open in 2015 and house state-of-the-art clean rooms, imaging research funding. facilities, and research and instructional laboratories (http://www.gwu.edu/ Applicants are expected to have significant experience in designing and scienceandengineeringhall/).______The George Washington University is located implementing experimental cross-disciplinary systems, and to have a in the nation’s capital near many federal funding agencies and government demonstrated commitment to the responsibilities listed above. research laboratories. How to Apply: To be considered, applicants must complete an online Responsibilities: The successful candidate for this position will be expected faculty application specific to the rank of interest and upload (i) a brief to develop externally-sponsored research programs, supervise graduate statement of interest, (ii) a curriculum vitae, (iii) a statement of research and students, and contribute to the teaching and academic advising of students teaching interests, (iv) a sample of three publications, (v) a representative at all levels. Teaching responsibilities include developing and delivering sample of course evaluations or teaching assessments, if applicable, and (vi) both undergraduate and graduate courses and laboratories in areas that may complete contact information for at least five references. include some combinations of digital design, embedded systems, biomedical engineering, and computational biology and bioinformatics. The successful For Associate Rank, please visit https://www.gwu.jobs/postings/11953. candidate will undertake interdisciplinary research in computer engineering For Assistant Rank, please visit https://www.gwu.jobs/postings/11952. and biomedical engineering aimed at using high-performance computing, Review of applications will begin on 1/1/2013 and will continue until the reconfigurable computing, and embedded systems to advance biomedical position is filled. engineering in areas such as computer and robotics assisted surgery, computational biology, imaging, and/or bioinformatics. The George Washington University is an Equal Opportunity/Affirmative Action Employer.

NOVEMBER 2012 109

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Apple is looking for qualified individuals for following 40/hr/wk positions. To apply, mail your resume to 1 Infinite Loop, M/S: 104-1GM, Attn: LJ, Cupertino, CA 95014 with Req # and copy of ad. Job site & interview, Austin, TX. Principals only. EOE. Physical Design Engineer [Req. #21309883]

Responsible for physical design of high speed large blocks, about 1 million instances, floor planning, placement, timing optimization, clock tree synthesis, routing, and post route optimization. Requires Bachelor’s degree, or foreign equivalent, in Electrical Engineering, Electronic Engineering, Computer Science, or related field plus five (5) years professional experi- ence in job offered or in a related occupation. Professional experience must be post-baccalaureate and progressive in nature. Must have professional experience with: physical design of a block in the chip; closing timing at block level in a chip, deep sub-micron circuit phenomena including cross talk, temperature inversion, sub-threshold conductance and impact on leakage current and power; performing Engineering Change Order (ECO) on the physical design; performing Design Rule Checks (DRC) and Layout versus schematic (LVS) checks. Requires 4% international travel.

Apple is looking for qualified individuals for following 40/hr/wk positions. To apply, mail your resume to 1 Infinite Loop, M/S: 104-1GM, Attn: LJ, Cupertino, CA 95014 with Req # and copy of ad. Job site & interview, Maiden, NC Principals only. EOE. Senior Systems Engineer (3 Openings) [Req. #13966804]

Responsible for day-to-day standard administration (e.g., account creation, system audits, third-level troubleshooting) and engineering duties (e.g., patch installation, operating system upgrades and installs). Req’s Bachelor’s degree, or foreign equivalent in Electronic Engineering, Computer Engineering, Electrical Engineering, Physics or related. Five (5) years profes- sional experience in job offered or in a related occupation. Professional experience must be post-baccalaureate and progressive in nature. Must have academic background or professional experience with: Enterprise-level UNIX system administration/engineering; Linux platforms; writing support documentation for Linux on x86-based software; system startup/shutdown mechanics; kickstart; grid computing RPMs; Perl, shell, C programming; Apache HTTPD, PHP, or MySQL; virtualization technologies: KVM, Xen or VMware; grid computing; package management (installation and building Resource Package Managers). May require 5-10% of domestic travel time.

110 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Apple is looking for qualified individuals for following 40/hr/wk positions. To apply, mail your resume to 1 Infinite Loop, M/S: 104-1GM, Attn: LJ, Cupertino, CA 95014 with Req # and copy of ad. Job site & interview, Cuper- tino, CA Principals only. EOE.

Siri Software Engineer [Req. #20704874] Responsible for designing and implementing natural language inter- actions and work flow that provide for intelligent user assistance. Req.’s Bachelor’s degree or foreign equivalent in Computer Science, or related degree plus five (5) years experience in job offered or related occupations. Profes- sional experience must be post-baccalaureate progressive in nature. Must have professional experience with: development experience with server-side Java and web services; object-oriented programming and design skills; Writing multi-threaded code; persistence datastores (relational databases, NoSQL etc.) and data model/schema design; production-quality software release and testing.

Software Engineer (2 Openings) [Req. #20529090] Responsible for building first-class open source compiler tools and apply them in new and innovative ways. Req’s Bachelor's degree, or foreign equivalent, in Computer Engineering, Computer Science, Electrical Engineering, Mathematics, or related field. Must have academic knowl- edge or professional experience with: high-level programming languages including C and C++ programming; compiler design and implementation; performance analysis; software testing; computer architecture; ability to understand and debug computer assembly code.

Software Engineer [Req. #20528591] Develop, extend, execute, and analyze regression. Provide functional, performance test plans and automation for networking components in iOS and Mac OS X. Req’s Master's degree, or foreign equivalent, in Computer Science, or related field. One (1) year professional experience in job offered or in a related occupation. Must have academic background or professional experience with: trace route; tcpdump; network analyzers; coding in C, shell and/or python; modern networking protocols including: Transmission Control Protocol/Internet Protocol (TCP/IP), User Datagram Protocol (UDP), Network Address Translation (NAT) and Virtual Private Networks (VPN) protocols.

ASIC Design Engineer (2 Openings) [Req. #20749988] Work within a team that designs and implements various Apple chips. Requires Bachelor's degree, or foreign equivalent, in Electrical Engineering, Electronics and Communication Engineering, Computer Engineering, or related field plus five (5) years professional experience in job offered or in a related occupation. Professional experience must be post-baccalaureate and progressive in nature. Must have academic background or professional experience with: algorithms of static timing analysis of complex integrated circuit designs; hands-on experience with industry standard static timing analysis (STA) tool (Primetime suite including PT, PT-SI, PT-PX); scripting language with at least one of the following languages: Tcl, Perl, Python; hands on experience generating engineering change orders for fixing timing paths.

NOVEMBER 2012 111

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Apple is looking for qualified individuals for following 40/hr/wk positions. To apply, mail your resume to 1 Infinite Loop, M/S: 104-1GM, Attn: LJ, Cupertino, CA 95014 with Req # and copy of ad. Job site & interview, Cupertino, CA Principals only. EOE.

Technical Program Manager [Req. #20750099] Drive technical operational issues related to liquid crystal display (LCD) and final assembly processes, ensuring effective closure of technical issues and smooth process flow through the new product introduction cycle and mass production phase. Requires Bachelor's degree, or foreign equivalent, in Materials Science, Engineering, or related field plus five (5) years professional experience in job offered or in a related occupation. Professional experience must be post-baccalaureate progressive in nature. Must have professional experience with: LED and LCD display development and mass production; technical and manufacturing processes for mass production; LED and LCD display quality requirements and performance standards; quality assurance reviews; new LCD manufacturing process evaluation and setup; LCD process capability improvement. Requires up to 30% international travel.

Software Integration Engineer [Req. #20750246] Drive development and delivery of mission-critical graphics compo- nents for Apple's world-class computer products. Req’s Bachelor's degree, or foreign equivalent, in Computer Science, Electrical Engineering, or related field. Five (5) years professional experience in job offered or in a related occupation. Professional experience must be post-baccalaureate and progressive in nature. Must have academic background or profes- sional experience with: software development in computer graphics drivers or development on complex driver stack; technical leadership; management of cross-functional teams and external vendors; identification of potential solutions to complex technical issues; development of risk/benefit analysis for feature development options and introduction of late development changes into a program; communicating complex technical issues both verbally and written for consumption at all levels of management and engineering; management of multiple issues simultaneously and quickly adjusting to change in schedules and/or requirements for assigned programs.

Software Engineer [Req. #19020790] Responsible for understanding WiFi/BT CoExistence technology on a single antenna solution in 2.4GHz ISM band. Req.’s Master’s degree or foreign equivalent in Electrical Engineering, Computer Science or related degree plus two (2) years experience in job offered or related occupations. Must have professional experience with: testing WLAN and/ or Bluetooth; understanding of WLAN and Bluetooth CoExistence; reading WLAN and Bluetooth traces; debugging and finding issues in CoExistence; in-depth understanding of OS X, Windows and/or Unix; owning a complete functional area of an application or product; understanding of SQA methodologies and practices.

Web Application Developer [Req. #20981046] Enhance our device management solutions and tools for Apple devices running iOS and OS X. Bachelor’s degree, or foreign equivalent, in Computer Science, Electronic Engineering, or related field. Five (5) years professional experience in job offered or in a related occupation. Professional experience must be post-baccalaureate progressive in nature. Must have professional experience with: developing modern, event driven web applications using AJAX technologies; developing consumer oriented GUI applications; ey/value observing and binding; object oriented design and analysis skills; understanding of the full lifecycle development process including understanding business and functional requirements, developing detailed technical designs, and implementing testable solutions.

112 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Apple is looking for qualified individuals for following 40/hr/wk positions. To apply, mail your resume to 1 Infinite Loop, M/S: 104-1GM, Attn: LJ, Cupertino, CA 95014 with Req # and copy of ad. Job site & interview, Cupertino, CA Principals only. EOE.

Software Development Engineer [Req. #21053093] Design and implement modular components of a distributed data processing and management infrastructure that spans multiple technologies. Requires Master’s degree or foreign equiva- lent in Computer Engineering, Software Engineering, or related degree plus two (2) years experience in the job offered or in a related occupation. Must have academic background or experience with: Java Programming (design & architecture, algorithms); designing and implementing systems that collect, store and analyze many Terabytes of data using Hadoop; MapReduce, HDFS, Hive, HBase Or Cassandra, ZooKeeper; using serialization, compression codecs and file-based data struc- tures (sequence file and map file); Python and Bash Scripting; high throughput and scaleable applications etc.; Oracle 10g, 11g databases.

Senior Software Engineer [Req. #21058542] Work on large-scale, server-side web applications using Java, MySQL and Oracle with the Structured Query Language (SQL), Extensible Markup Language (XML), HyperText Markup Language (HTML) and JavaScript Object Notation (JSON). Req.’s Bachelor's degree, or foreign equivalent, in Computer Science, Electronic Engineering, or related plus five (5) years professional experience in job offered or in a related occupation. Professional experience must be post-baccalaureate and progressive in nature. Must have academic background or professional experi- ence with: Java; MySQL/Oracle; Markup Language (XML); JavaScript Object Notation (JSON); Apache SOLR; J2EE (Java 2 Enterprise Edition)/WebObjects.

Lab Software Quality Assurance Engineer [Req. #21057893] Responsible for executing cellular telephony tests proto- col tests used for carrier acceptance such as those defined for AT&T. Requires Master’s degree or foreign equivalent in Electrical Engineering or related field plus two (2) years of experience in the job offered or in a related occupation. Must have professional experience with: understanding of 3GPP (3rd generation partnership project) technologies such as UMTS and GSM. Familiar with RLC (Radio Link Control), MAC (Medium Access Control) and RRC (Radio Resource Control); testing cellular telephony features such as voice call flow, audio on voice calls, TTY, SMS(short message service), cellular packet data services, supplementary services and end-to-end signaling; AT&T Carrier Acceptance testing and IOT(Interoperability Testing).

Engineering Project Planner [Req. #21103081] Coordinate all engineering development activities (Electrical, mechani- cal, operational) related to the design, Hardware integration, testing, and implementation of new products in the Input Device space. Requires Master's degree, or foreign equivalent, in Electrical Engineering, Mechanical Engineering, Industrial Engineering, or related field plus two (2) years professional experience in job offered or in a related occupation. Must have academic or professional experience with: the full life cycle of new product development from concept through produc- tion release; developing and driving daily and weekly project schedules; developing and executing presentations regarding project to upper management; consumer electronic product manufacturing processes; remotely communicating project plans and to managing activities of 3rd party overseas suppliers. 20% international travel required.

NOVEMBER 2012 113

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Apple is looking for qualified individuals for following 40/hr/wk positions. To apply, mail your resume to 1 Infinite Loop, M/S: 104-1GM, Attn: LJ, Cupertino, CA 95014 with Req # and copy of ad. Job site & interview, Cupertino, CA Principals only. EOE.

System Design Engineer [Req. #21106087] Work on radiated performance of wireless portable devices. Requires Master’s degree, or foreign equivalent, in Electrical Engineering, Electronics Engineering, Telecommu- nication, or related field plus one (1) year professional experience in job offered or in a related occupation. Must have professional experience with: RF characteristics and requirements for modern wireless communica- tion systems such as GSM/GPRS/EDGE, 802.11, Bluetooth, including the corresponding system level specifica- tions (e.g. ETSI 51.010, 51.05); radiation performance, antenna and wave propagation; regulatory requirements and process for wireless consumer devices, including FCC, PTCRB, CTIA, ETSI, TIA/EIA; programming skills in C, C++. May have direct reports. Requires up to 10% domestic travel.

Software Engineer [Req. # 21106235] Build rich media advertising content and software using Apple’s mobile operating system, iOS, and Apple’s iAd Platform technologies. Requires Bachelor's degree, or foreign equivalent, in Information Technology, Computer Science, Software Engineering, Engineering, Mathematics, Graphic Design, Media Arts and Sciences, or related field plus two (2) years professional experience in job offered or in a related occupation. Must have academic background or professional experience with: object- oriented design and programming; constructing rich media ad units including elements of video, audio, and producing Visual Assets using Adobe Photoshop and Illustrator; programming with JavaScript; programming with Hypertext Markup.

ASIC Design Engineer [Req. #21106290] Perform Verilog coding, modeling, simulation and debug. Requires Master’s degree, or foreign equivalent, in Electrical Engineering, Computer Science or Engineering, or related field plus two (2) years experience in the job offered or in any related occupation. Must have academic back- ground or professional experience with: Computer architecture; languages (Verilog or VHDL); Scripting and/or programming languages (awk, perl, python, C/C++); EDA design tools – synthesis, simulation, timing analysis, place and route; logic/circuit design.

Audio Electrical Engineer [Req. #21225782] Responsible for Development of prototypes to evaluate new designs. Req.’s Bachelor's degree, or foreign equivalent, in Electrical Engineering or related plus five (5) years professional experience in job offered or in a related occupation. Professional experience must be post- baccalaureate and progressive in nature. Must have academic background or professional experience with: Audio codec’s, amplifiers, speakers and microphones; Audio test equipment (Audio Precision); Schematic Drawing; Board Layout.

114 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Apple is looking for qualified individuals for following 40/hr/wk positions. To apply, mail your resume to 1 Infinite Loop, M/S: 104-1GM, Attn: LJ, Cupertino, CA 95014 with Req # and copy of ad. Job site & interview, Cupertino, CA Principals only. EOE.

Software Engineer [Req. #21106011] Develop OpenCL framework for CPUs and GPUs in Mac OS X including the OpenCL runtime APIs and OpenCL language built-in functions. Req’s Master's degree, or foreign equivalent, in Computer Science, or related field. Five (5) years professional experience in job offered or in a related occupation. Must have academic background or profes- sional experience with: programming languages including C, C++; GPU architecture, CPU vector ISAs such as Intel SSE and AVX; parallel programming and performance tuning of parallel algo- rithms for CPUs and/or GPUs; software design, problem solving and debugging skills; OpenCL.

System Design Engineer [Req. #21310162] Evaluate the latest iPad, iPhone and iPod HW systems in the field. Perform very early evaluations of Prototypes and HW Systems on different wireless technologies. Requires Master’s degree or foreign equivalent in Computer Science, Electrical Engineering, System Engineering or related field. Must have academic background or professional experience with: C, C++, Python and Matlab; Communication systems, spread spec- trum and communications theory; & RF Background in UMTS/HSPA C2K/EVDO. May have direct reports. Travel required approximately 50% of time.

Sr. Software Engineer/Tech Lead [Req. #21483719] Provide design, development and cross functional interaction across multiple projects. Requires Master’s degree, or foreign equivalent, in Marketing, Engineering, Computer Science or related degree and six (6) years experience in the job offered or in a related position. In the alternative, will accept a Bachelor’s degree, or foreign equivalent and eight (8) years of post-baccalaureate progressive experience. Must have professional experience with: application development and design; variety of development tools and languages, such as Java/J2EE, JSP, Spring, Hibernate, Tomcat / WebSphere / JBoss, HTML; Oracle and performance tuning; Eclipse, XML, JSON, SVN, Maven, UML, design patterns; development in Linux environment; Object Oriented design and analysis skills; developing server side software using Java; working in a team environment; technical documentation.

NOVEMBER 2012 115

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Applied Materials, Inc. is accepting resumes for the following positions in Santa Clara/Sunnyvale, CA: Senior GIS Service Management Analyst (SCSTA): Analyzes functional requirements and recommends technical solution to stakeholders. Manages the lifecycle of IT services recommending patching, point releases and major upgrades.

Account Technologist (SCHSU): Designing, performing, collecting data, analyzing, and compiling reports on difficult process engineering experiments within safety guidelines. Position may be assigned to work at unanticipated international worksites as determined by headquar- ters (50%).

Process Support Engineer (SCAKA): Executes Process Engineering projects to qualify or improve the process performance of company's products. Position may be assigned to work at unanticipated worksites throughout the US as determined by headquarters (10%).

Please mail resumes with reference number to Applied Materials, Inc., 3225 Oakmead Village Drive, M/S 1217, Santa Clara, CA 95054. No phone calls please. Must be legally authorized to work in the U.S. without sponsorship. EOE. www.appliedmaterials.com

RadiumOne, Inc. !$6%24)3%23!,%3).&/2-!4)/.s./6%-"%2 has the following job opportunity available in Advertising Personnel Southwest, California: San Francisco, CA: Marian Anderson Mike Hughes Sr. Advertising Coordinator Email: [email protected]______Email: [email protected]______Phone: +1 805 529 6790 Lead Software Phone: +1 714 816 2139 Fax: +1 714 821 4010 Southeast: Developer Heather Buonadies Sandy Brown Email: [email protected] Develop front-end components Sr. Business Development Mgr. Phone: +1 973 585 7070 Email: [email protected]______Fax: +1 973 585 7071 of the system based on J2SE and Phone: +1 714 816 2144 J2EE technologies that provide Fax: +1 714 821 4010 Advertising Sales Representative internal and external users with Advertising Sales Represen- (Classified Line) features and functionality to tatives (display) Heather Buonadies manage advertising campaigns, Central, Northwest, Far East: Email: [email protected]______Eric Kincaid Phone: +1 973 585 7070 monitor their performance, Email: [email protected]______Fax: +1 973 585 7071 provide reporting and allow Phone: +1 214 673 3742 Fax: +1 888 886 8599 Advertising Sales targeting and optimization of Representative (Jobs Board) campaigns. Northeast, Midwest, Europe, Heather Buonadies Middle East: Email: [email protected]______Submit resume by mail to: Attn: Ann & David Schissler Phone: +1 973 585 7070 HR Services, RadiumOne, Inc., Email: [email protected],______Fax: +1 973 585 7071 [email protected]______55 Second Street, 18th Floor, San Phone: +1 508 394 4026 Francisco, CA 94105. Must refer- Fax: +1 508 394 1707 ence job code AG103.

116 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

It’s work that matters. It's what we do at Symantec. Symantec is the world leader in providing solutions to help individuals and enterprises assure the security, availability, and integrity of their information. In essence, we protect the free flow of information in a connected world. As the fourth largest independent software company in the world, Symantec has operations in more than 40 countries with 475 out of Fortune's global 500 companies using our solutions.

People look to us to safeguard the integrity of their information, ensuring it is secure and available. Achieving this ambitious goal is only possible through the combined efforts of the innovators and visionaries that Symantec continuously attracts. Symantec draws the very best people with a variety of backgrounds, experiences and perspectives and provides them with a work environment where uniqueness is valued and empowered. The creative people we attract help define the spirit of innovation at Symantec. Symantec is proud to be an equal opportunity employer.

We currently have openings for the following positions (various levels/types):

Bellevue, WA Software Engineers: (Job ID #SWEWA1012) Responsible for analyzing, designing, debugging and/or modifying software; or evaluating, developing, modifying, and coding software programs to support programming needs

Culver City, CA Software Engineers: (Job ID #SWECC1012) Responsible for analyzing, designing, debugging and/or modifying software; or evaluating, developing, modifying, and coding software programs to support programming needs.

Software QA Engineers: (Job ID #SQACC1012) Responsible for developing, applying and maintaining quality standards for company products. Develop and execute software test plans. Analyze and write test standards and procedures.

Engineering Managers: (Job ID #EMCC1012) Direct and supervise team of engineers (QA and/or development teams); Develop standards for products and/or oversee development and execution of software and/or analysis of test results.

Sr. Manager, Development(Job ID #DEVCC1012) Responsible for working with development team to produce functional specification, architectural documents and engineering plans for software products. Responsible for technical development and management of multiple teams for complex projects.

Heathrow, FL Software Engineers: (Job ID #SWEFL1012) Responsible for analyzing, designing, debugging and/or modifying software; or evaluating, developing, modifying, and coding software programs to support programming needs.

Submit resume to [email protected] . Must reference position & Job ID# listed above. EOE. For additional information about Symantec and other positions visit our website at http://www.symantec.com.

NOVEMBER 2012 117

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

______

118 COMPUTER

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

It’s work that matters. It's what we do at Symantec. Symantec is the world leader in providing solutions to help individuals and enterprises assure the security, availability, and integrity of their information. In essence, we protect the free flow of information in a connected world. As the fourth largest indepen- dent software company in the world, Symantec has operations in more than 40 countries with 475 out of Fortune's global 500 companies using our solutions.

People look to us to safeguard the integrity of their information, ensuring it is secure and available. Achieving this ambitious goal is only possible through the combined efforts of the innovators and visionaries that Symantec continuously attracts. Symantec draws the very best people with a variety of backgrounds, experiences and perspectives and provides them with a work environment where uniqueness is valued and empowered. The creative people we attract help define the spirit of innovation at Symantec. Symantec is proud to be an equal opportunity employer.

We currently have openings for the following positions (various levels/types):

Herndon,VA

Engineering Managers: (Job ID #EMVA1012) Direct and supervise team of engineers (QA and/or development teams); Develop standards for products and/or oversee development and execution of software and/or analysis of test results.

Lindon, UT

Technical Support Engineers: (Job ID #TSEUT1012) Provide technical assistance and support to internal and/or external computer systems users and clients. Provide level 3 support to customers with issues on assigned product (Symantec Endpoint Management Products).

Roseville, MN

Software Engineers: (Job ID #SWEMN1012) Responsible for analyzing, designing, debugging and/or modifying software; or evaluating, developing, modify- ing, and coding software programs to support programming needs.

San Francisco, CA

Software Engineers: (Job ID# SWESF1012) Responsible for analyzing, designing, debugging and/or modifying software; or evaluating, developing, modifying, and coding software programs to support programming needs.

Software QA Engineers: (Job ID# SQASF1012) Responsible for developing, applying and maintaining quality standards for company products. Develop and execute software test plans. Analyze and write test standards and procedures.

Engineering Managers (Job ID# EMSF1012) Direct and supervise team of engineering (QA and/or development teams). Develop standards for products and/or oversee development and execution of software and/or analysis of test results.

Manager, Development (Job ID# DEVSF1012) Manage Anti-Spam Core Development Team. Design and architect solution to share the Anti-Spam code base across Symantec products. Design and architect solution to share the Anti-Spam code base across Symantec products.

Technical Directors (Job ID# TDSF1012) Define and drive the strategic direction of technology for business and products. Research product prototypes and investigate new technologies. Review and drive continuous improvement in products, infrastructure and development practices. Define architecture and product specifications, and determine new product life cycles.

Submit resume to [email protected]______. Must reference position & Job ID# listed above. EOE. For additional information about Symantec and other positions visit our website at http://www.symantec.com.

NOVEMBER 2012 119

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

FORWARD SLASH Love the Show! AUDIO David Alan Grier and Erin Dian Dumbacher

There are some problems that engineered approaches can’t solve, and building a reputation—a problem of marketing and people—is one of them.

hat part of build- can’t solve, and building a reputa- time trying to engineer your ideas for ing engineering’s tion—a problem of marketing and the crowd, you’re relying on nothing reputation is accom- people—is one of them. Most of us more than the luck of the draw. W plishment, and what learned the lesson in high school that I had a few friends who tried to part is theatrics? hard work plus talent doesn’t always make a career in popular music. All //DAG// The other end of the table equal popularity. of them quickly learned the lesson was the first to recognize the tele- A confession: I was one of those that they needed talents beyond vision host in the restaurant. One annoying, backward-walking campus the ability to sing well, look good in moment, we were a group of tech- tour guides at my university. I talked spandex, or write a compelling lyric. nologists talking about predictive about class size and residence halls, None really mastered the skill of rock analytics and Bayesian nets, and the student life, and professors. My job stardom, though the most innovative next, we were giddy fans who were was to sell the school, but those who of my friends, Danny, got his picture enthused by a celebrity in our midst. trained me told me to also focus on on a national magazine cover and was “Rock star!” shouted Ahmed. Serge my own experiences. If I piqued the popular in four or five major college added, “Love the show!” interest of a prospective student with towns. When he finally concluded that But the moment quickly passed. a story from my internship or a fun he wasn’t going to become a true rock The celebrity nodded his head to night out with friends on campus, the star, he was more relieved than sad. acknowledge our attention and then potential student might be more likely He remarked that he would no longer left the restaurant with his entourage. to listen to the “boring” application have to force his body into jeans that We returned to our conversation. The requirements. All I had to do was talk were too tight or press his music into benefits of a brush with fame, if there about my experiences, one carefully ears that wanted to hear something were any to be had, didn’t linger with crafted anecdote at a time. else. us. The problem for engineering is one At the restaurant, our group Time and again, I receive sug- of communication, not of reputation. wasn’t that interested in the power of gestions about how we might make People appreciate engineering celebrity. None seemed very interested software engineering more appealing accomplishments, they just don’t in building mass recognition. All had to the youth of today, all of which are always know about them. The recent, moved onto new projects. “We work well intentioned. They’re offered by risky landing of a massive rover on with technology,” said one, “and we people who are honestly concerned Mars, for example, was the talk of do it very well.” about the field’s future. Many of them both blogs and mainstream news suggest that we should promote a cycles. It even had its own rock star, David Alan Grier is an IEEE Fellow young engineer, a rock star of the a NASA JPL program manager with a and author of the forthcoming book technological work. In the process, Mohawk hairdo. The Company We Keep. Contact him they overlook that such a strategy //DAG// Engineers might not fit at [email protected]______or on Twitter @ requires the potential rock star to have naturally into the world of mass pop- dagrier. the skills required to identify, build, ularity: to appeal to a mass market, Erin Dian Dumbacher is a research and hold mass market appeal. you need to study that market, learn director and consultant in Washing- //EDD// Brace yourself for what the aspirations of the group, and test ton, DC. You can reach her at erin.___ you’re about to read: there are some ideas to engage those aspirations. If [email protected]______or problems that engineered approaches you (or your manager) don’t spend follow her on Twitter @erin_dian.

120 COMPUTER Published by the IEEE Computer Society 0018-9162/12/$31.00 © 2012 IEEE

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

Now... 2 Ways to Access the IEEE Member Digital Library

With two great options designed to meet the needs—and budget—of every member, the IEEE Member Digital Library provides full-text access to any IEEE journal article or conference paper in the IEEE Xplore® digital library.

Simply choose the subscription that’s right for you:

IEEE Member Digital Library IEEE Member Digital Library Basic

Designed for the power researcher who Created for members who want to stay needs a more robust plan. Access all the up-to-date with current research. Access IEEE IEEE content you need to explore ideas content and rollover unused downloads for and develop better technology. NPOUIT

tBSUJDMFEPXOMPBETFWFSZNPOUI tOFXBSUJDMFEPXOMPBETFWFSZNPOUI

Get the latest technology research.

Try the IEEE Member Digital Library—FREE! www.ieee.org/go/trymdl

IEEE Member Digital Library is an exclusive subscription available only to active IEEE members.

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND® qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®

______

qM qMqM Previous Page | Contents |Zoom in | Zoom out | Front Cover | Search Issue | Next Page qMqM Computer Qma gs THE WORLD’S NEWSSTAND®