How Abundance Changes Software Engineering > Multimedia Research
Total Page:16
File Type:pdf, Size:1020Kb
CLOUD COMPUTING Also in this issue: > How Abundance Changes Software Engineering > Multimedia Research: What Is the Right Approach? AUGUST 2017 www.computer.org Move Your Career Forward IEEE Computer Society Membership Explore These Cloud Computing Resources Cloud Computing Professional Development Courses The Computer Society offers three professional development courses on cloud computing: • Cloud Computing in the Business Environment • Cloud Governance and Security • Cloud Economics, Migration, and Metrics All three can help you in migrating your IT infrastructure to the Cloud. IEEE Cloud Computing Initiative Helping accelerate cloud computing technology development and use, this IEEE initiative offers six interdependent resources: standards development; a Web portal (http://cloudcomputing.ieee.org); conferences; continuing education courses; publications; standards development; and a testbed. IEEE Cloud Computing IEEE Cloud Computing is your best source for peer-reviewed articles showcasing innovative research, applications results, and case studies in all areas of cloud computing. IEEE Transactions on Cloud Computing IEEE Transactions on Cloud Computing (TCC) publishes peer reviewed articles that provide innovative research ideas and applications results in all areas relating to cloud computing. Topics relating to novel theory, algorithms, performance analyses and applications of techniques relating to all areas of cloud computing are considered for the transactions. FOR DIRECT LINKS TO THESE RESOURCES, VISIT The Community for Technology Leaders www.computer.org/edge-resources IEEE COMPUTER SOCIETY http://computer.org • +1 714 821 8380 STAFF Editor Manager, Editorial Content Lee Garber Carrie Clark Contributing Staff Senior Manager, Editorial Services Christine Anthony, Brian Brannon, Lori Cameron, Cathy Martin, Robin Baldwin Chris Nelson, Meghan O’Dell, Dennis Taylor, Rebecca Torres, Bonnie Wylie Director, Products and Services Evan Butterfield Production & Design Carmen Flores-Garvey, Monette Velasco, Jennie Zhu-Mai, Senior Advertising Coordinator Mark Bartosik Debbie Sims Circulation: ComputingEdge (ISSN 2469-7087) is published monthly by the IEEE Computer Society. IEEE Headquarters, Three Park Avenue, 17th Floor, New York, NY 10016-5997; IEEE Computer Society Publications Office, 10662 Los Vaqueros Circle, Los Alamitos, CA 90720; voice +1 714 821 8380; fax +1 714 821 4010; IEEE Computer Society Headquarters, 2001 L Street NW, Suite 700, Washington, DC 20036. Postmaster: Send address changes to ComputingEdge-IEEE Membership Processing Dept., 445 Hoes Lane, Piscataway, NJ 08855. Periodicals Postage Paid at New York, New York, and at additional mailing offices. Printed in USA. Editorial: Unless otherwise stated, bylined articles, as well as product and service descriptions, reflect the author’s or firm’s opinion. Inclusion in ComputingEdge does not necessarily constitute endorsement by the IEEE or the Computer Society. All submissions are subject to editing for style, clarity, and space. Reuse Rights and Reprint Permissions: Educational or personal use of this material is permitted without fee, provided such use: 1) is not made for profit; 2) includes this notice and a full citation to the original work on the first page of the copy; and 3) does not imply IEEE endorsement of any third-party products or services. Authors and their companies are permitted to post the accepted version of IEEE-copyrighted material on their own Web servers without permission, provided that the IEEE copyright notice and a full citation to the original work appear on the first scree n of the posted copy. An accepted manuscript is a version which has been revised by the author to incorporate review suggestions, but not the published version with copy-editing, proofreading, and formatting added by IEEE. For more information, please go to: http://www.ieee .org/publications_standards/publications/rights/paperversionpolicy.html. Permission to reprint/republish this material for commercial, advertising, or promotional purposes or for creating new collective works for resale or redistribution must be obtained from IEEE by writing to the IEEE Intellectual Property Rights Office, 445 Hoes Lane, Piscataway, NJ 08854-4141 or pubs-permissions@ieee .org. Copyright © 2017 IEEE. All rights reserved. Abstracting and Library Use: Abstracting is permitted with credit to the source. Libraries are permitted to photocopy for private use of patrons, provided the per- copy fee indicated in the code at the bottom of the first page is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923. Unsubscribe: If you no longer wish to receive this ComputingEdge mailing, please email IEEE Computer Society Customer Service at [email protected] and type “unsubscribe ComputingEdge” in your subject line. IEEE prohibits discrimination, harassment, and bullying. For more information, visit www.ieee.org/web/aboutus/whatis/policies/p9-26.html. IEEE Computer Society Magazine Editors in Chief Computer IEEE Micro IEEE Intelligent Systems Sumi Helal, Lancaster University Lieven Eeckhout, Ghent V.S. Subrahmanian, University University of Maryland IEEE Software IEEE MultiMedia Diomidis Spinellis, Athens IEEE Computer Graphics Yong Rui, Lenovo Research University of Economics and and Applications and Technology Business L. Miguel Encarnação, ACT, Inc. IEEE Annals of the History IEEE Internet Computing IEEE Pervasive Computing of Computing M. Brian Blake, University of Maria Ebling, IBM T.J. Watson Nathan Ensmenger, Indiana Miami Research Center University Bloomington IT Professional Computing in Science IEEE Cloud Computing San Murugesan, BRITE & Engineering Mazin Yousif, T-Systems Professional Services Jim X. Chen, George Mason International University IEEE Security & Privacy Ahmad-Reza Sadeghi, Technical University of Darmstadt www.computer.org/computingedge 1 AUGUST 2017 • VOLUME 3, NUMBER 8 THEME HERE 8 18 23 Open Source Quality of Cloud Extending the Solutions for Services: Expect Cloud to the Cloud Computing the Unexpected Network Edge 6 Spotlight on Transactions: Computer Engineers’ Challenges for the Next Decade: The Triangle of Power Density, Circuit Degradation, and Reliability JÖRG HENKEL AND PAOLO MONTUSCHI 7 Editor’s Note: Computing in the Cloud 8 Open Source Solutions for Cloud Computing G.R. GANGADHARAN 13 Standards at the Edge of the Cloud ALAN SILL 18 Quality of Cloud Services: Expect the Unexpected DAVID BERMBACH 23 Extending the Cloud to the Network Edge RUBEN S. MONTERO, ELISA ROJAS, ALFONSO A. CARRILLO, AND IGNACIO M. LLORENTE 28 Evidence and Forensics in the Cloud: Challenges and Future Research Directions KIM-KWANG RAYMOND CHOO, CHRISTIAN ESPOSITO, AND ANIELLO CASTIGLIONE 34 FocusStack: Orchestrating Edge Clouds Using Focus of Attention BRIAN AMENTO, ROBERT J. HALL, KAUSTUBH JOSHI, AND K. HAL PURDY 42 Connecting Fog and Cloud Computing DAVID S. LINTHICUM 46 How Abundance Changes Software Engineering DIOMIDIS SPINELLIS 50 Multimedia Research: What Is the Right Approach? ALAN HANJALIC Departments 34 4 Magazine Roundup FocusStack: 53 Computing Careers: Cloud-Computing Careers Orchestrating Edge Clouds Using Focus of Attention Subscribe to ComputingEdge for free at www.computer.org/computingedge. CS FOCUS Magazine Roundup digit or character input, which has shortcomings. In “May the Force Be with You: The Future of Force-Sensitive Authenti- cation,” from Internet Comput- ing’s May/June 2017 issue, the authors examine the potential of force-PINs, which augment digit-PIN security by assigning a pressure value to each digit or character. he IEEE Computer issue on new computer-design Society’s lineup of 13 developments explores several of Computing in Science & Tpeer-reviewed technical these architectural approaches. Engineering magazines covers cutting-edge topics ranging from software IEEE Software Previous research suggests that design and computer graphics access and exposure to comput- to Internet computing and secu- Over time, software developers ing, social support, a sense of rity, from scientifi c applications have defi ned and used various belonging in computing, and a and machine intelligence to reliability-engineering models. computing identity all contrib- cloud migration and microchip Now, reliability engineering will ute to women pursuing comput- design. Here are highlights from have to adapt to today’s more con- ing as a fi eld of study or career. recent issues. nected world. The three articles in “Multiple Factors Converge to IEEE Software’s July/August 2017 Infl uence Women’s Persis- Computer special issue illustrate several tence in Computing: A Quali- ways this is already happening. tative Analysis,” from CiSE’s As we approach the limits of May/June 2017 issue, discusses Moore’s law, we increasingly rely IEEE Internet Computing a recent study that explores on computer architecture inno- what helps young women per- vations to scale performance. Most smartphone-authentication sist in computing despite the Computer’s August 2017 special schemes still rely on simple obstacles they encounter. 4 August 2017 Published by the IEEE Computer Society 2469-7087/17/$33.00 © 2017 IEEE IEEE Security & Privacy position-based dynamics for mesh- there has ever actually been such free cutting simulation. a utility. Our society is undergoing perva- sive computerization and digita- IEEE Intelligent Systems IEEE Pervasive Computing lization, which is aff ecting many aspects of our personal and pro- Over the last two decades, man- The authors of