COMMUNICATIONS Cacm.Acm.Org of THEACM 02/2012 VOL.55 NO.02 Text-Mining the Voice of the People

Total Page:16

File Type:pdf, Size:1020Kb

COMMUNICATIONS Cacm.Acm.Org of THEACM 02/2012 VOL.55 NO.02 Text-Mining the Voice of the People COMMUNICATIONS cAcM.AcM.org OF THEACM 02/2012VoL.55No.02 Text-Mining the Voice of the People Bufferbloat: What’s Wrong with the Internet? Intelligent Vehicle Area Networks The Social Life of Robots Yet Another Technology Cusp Association for Computing Machinery 1&1 SERVERS NEXT GENERATION NEW HARDWARE, NEW CONFIGURATIONS, NOW WITH INTEL® Flexibility: Choose between AMD or Intel® processors Security: All 1&1 servers are housed in high-tech data centers owned and operated by 1&1 Speed: INCLUDED IN THE NEW 1&1 SERVER PORTFOLIO: Unlimited traffi c, high- speed connectivity SERVER SERVER SERVER Control: 4i XL6 XL 8i Parallels® Plesk Panel 10.4 for ■ Intel® Xeon® E3-1220 ■ AMD Hexa-Core ■ Intel® Xeon® E3-1270 unlimited domains ■ 4 Cores with up to 3.4 GHz ■ 6 Cores with up to 3.3 GHz ■ 4 (8 HT) Cores with up to 3.8 GHz Value: ® (Intel Turbo Boost (AMD Turbo Core) (Intel® Turbo Boost Technology 2.0) More power, Technology 2.0) ■ 16 GB ECC RAM ■ 24 GB ECC RAM great pricing ■ 12 GB ECC RAM ■ 2 x 1,000 GB 3 MONTHS ■ 2 X 1,500 GB SATA HDD ■ 2 x 1,000 GB SATA HDD SATA HDD FREE!* $ .99 $ .99 $ .99 99 per month 129 per month 299 per month ® 1-877-461-2631 www.1and1.com 1-855-221-2631 www.1and1.ca * 3 Months Free offer valid for a limited time only, 12 month minimum contract term applies. Set-up fee and other terms and conditions may apply. Visit www.1and1.com for full promotional offer details. Program and pricing specifi cations and availability subject to change without notice. 1&1 and the 1&1 logo are trademarks of 1&1 Internet, all other trademarks are the property of their respective owners. © 2012 1&1 Internet. All rights reserved. Frederick P. Charles P. (Chuck) Charles W. Barbara BROOKS, JR. THACKER BACHMAN LISKOV Richard M. Leslie G. Marvin Adi KARP VALIANT MINSKY SHAMIR Richard E. John Robert E. Vinton G. STEARNS HOPCROFT KAHN CERF Robert Ivan Butler Juris TARJAN SUTHERLAND LAMPSON HARTMANIS THE ACM TURING CENTENARY CELEBRATION A ONCE-IN-A-LIFETIME Andrew C. Donald E. Dana S. Raj EVENT THAT YOU’LL YAO KNUTH SCOTT REDDY NEVER FORGET… AND YOU’RE INVITED! WHAT DO YOU GET WHEN YOU PUT YOU WHEN GET YOU DO WHAT CHAIR: Fernando J. Edward A. Alan C. William (Velvel) Vint Cerf, ’04 Turing Award Winner, CORBATÓ FEIGENBAUM KAY KAHAN Chief Internet Evangelist, Google PROGRAM CO-CHAIRS: Mike Schroeder, Microsoft Research John Thomas, IBM Research Moshe Vardi, Rice University MODERATOR: Paul Saffo Frances E. E. Allen Niklaus Ken , Managing Director of Foresight, Discern ALLEN EMERSON WIRTH THOMPSON Analytics and Consulting Associate Professor, Stanford WHEN: June 15th & June 16th 2012 WHERE: Palace Hotel, San Francisco CA HOW: Register for the event at turing100.acm.org Leonard Ronald Edmund Joseph ADLEMAN RIVEST CLARKE SIFAKIS REGISTRATION IS FREE-OF-CHARGE! THE A.M. TURING AWARD, often referred to as the "Nobel Prize" in computing, was named in honor of Alan Mathison Turing (1912–1954), a British mathematician and computer scientist. He made fundamental advances in computer architecture, algorithms, formalization of computing, and artificial intelligence. Turing was also instrumental in British code-breaking work during World War II. commuNicAtioNsofthe acM Departments News Viewpoints 5 ACM Europe Council Chair’s Letter 24 Economic and Business Dimensions Revisiting ACM Europe Incentive Auctions By Fabrizio Gagliardi Reallocating valuable wireless spectrum can generate billions 6 Letters To The Editor of dollars in revenue to the U.S. Credit Non-Anonymous federal government while Reviewers with a Name also benefiting consumers. By Gregory Rosston 10 BLOG@CACM Researchers’ Big Data Crisis; 27 Education Understanding Design and Peer Instruction: A Teaching Method Functionality to Foster Deep Understanding Michael Stonebraker issues a call How the computing education to arms about research groups’ community can learn from data-management problems. 19 physics education. Jason Hong discusses the nature of By Beth Simon and Quintin Cutts functionality with respect to design. 13 The Science of Better Science Researchers are exploring networked 30 Inside Risks 37 Calendar computational analysis, formal Yet Another Technology Cusp: classification, and topic modeling Confusion, Vendor Wars, 122 Careers to better identify relevant scientists, and Opportunities ideas, and trends. Considering the unexpected By Gregory Goth risks associated with seemingly Last Byte minor technological changes. 16 The War Against Botnets By Donald A. Norman 128 Puzzled Increasingly sophisticated botnets Where Sets Meet (Venn Diagrams) have emerged during the last several 33 Kode Vicious By Peter Winkler years. However, security researchers, Wanton Acts of Debuggery businesses, and governments Keep your debug messages clear, are attacking botnets from a number useful, and not annoying. of different angles—and sometimes By George V. Neville-Neil winning. By Samuel Greengard 35 Privacy and Security Emotion and Security 19 The Social Life of Robots Examining the role of human Researchers are trying to build robots emotional response in making capable of working together with complex security-related decisions. minimal human supervision. By Rose McDermott But will they ever learn to get along? By Alex Wright 38 Viewpoint What Have We Learned 23 ACM Fellows Inducted About Software Engineering? Forty-six men and women are Upon closer examination, everything recognized as 2011 ACM Fellows. old appears to be new again in mons im s the realm of software engineering. d ei By Marvin V. Zelkowitz r courtesy of h P Association for Computing Machinery Advancing Computing as a Science & Profession Photogra 2 communicaTions of The acM | FebruarY 2012 | VoL. 55 | No. 2 02/2012 VoL.55 no.02 Practice Contributed Articles Review Articles 48 70 40 BufferBloat: What’s Wrong 62 Text-Mining the Voice of the People 90 Progress and Challenges in with the Internet? Statistical techniques help Intelligent Vehicle Area Networks A discussion with Vint Cerf, public leaders turn text in Vehicle area networks form the Van Jacobson, Nick Weaver, unstructured citizen feedback backbone of future intelligent and Jim Gettys. into responsive e-democracy. transportation systems. By Nicholas Evangelopoulos By Miad Faezipour, Mehrdad Nourani, 48 You Don’t Know Jack About Shared and Lucian Visinescu Adnan Saeed, and Sateesh Addepalli Variables or Memory Models Data races are evil. 70 Programming by Optimization By Hans-J. Boehm and Sarita V. Adve Avoid premature commitment, Research Highlights seek design alternatives, and 55 Advances and Challenges automatically generate 102 Technical Perspective s gary in Log Analysis performance-optimized software. Compiling What to How me a Logs contain a wealth of information By Holger H. Hoos By Rastislav Bodik to help manage systems. By Adam Oliner, Archana Ganapathi, 81 Software as a Service 103 Software Synthesis Procedures ustration by J and Wei Xu for Data Scientists By Viktor Kuncak, Mikaël Mayer, ll i Globus Online manages Ruzica Piskac, and Philippe Suter son, el fire-and-forget file transfers for Articles’ development led by n ce queue.acm.org big-data, high-performance oi r scientific collaborations. 112 Technical Perspective By Bryce Allen, John Bresnahan, Modeling High-Dimensional Data Lisa Childers, Ian Foster, By Santosh S. Vempala Gopi Kandaswamy, Raj Kettimuthu, Jack Kordas, Mike Link, Stuart Martin, 113 Disentangling Gaussians COMMUNICATIONS about the cover: Karl Pickett, and Steven Tuecke By Adam Tauman Kalai, Ankur Moitra, CACMACMORG OF THEACM 02/ 012 VOL 55 NO 02 statistical tools are helping world leaders and Gregory Valiant Text-Mining the Voice of and government the People officials distill streams of text messages from their citizenry, turning unstructured data into responsive e-democracy. Bufferbloat What’s Wrong this month’s cover story wi h the Internet? Inte ligent Veh cle (p. 62) explores enabling Area Networks The Soc al Life of Robots technologies that let the Yet Another Technology Cusp voice of the people be A ti f C i M i heard. cover illustration llustration by agsandrew / shutterstock.com, Visualization by i by ryan alexander. February 2012 | VoL. 55 | No. 2 | communicaTions of The acM 3 commuNicAtioNsofthe acM trustedinsightsforcomputing’sleadingprofessionals. Communications of the ACM is the leading monthly print and online magazine for the computing and information technology fields. Communications is recognized as the most trusted and knowledgeable source of industry information for today’s computing professional. Communications brings its readership in-depth coverage of emerging areas of computer science, new trends in information technology, and practical applications. industry leaders use Communications as a platform to present and debate various technology implications, public policies, engineering challenges, and market trends. the prestige and unmatched reputation that Communications of the ACM enjoys today is built upon a 50-year commitment to high-quality editorial content and a steadfast dedication to advancing the arts, sciences, and applications of information technology. ACM, the world’s largest educational STAFF editorial Board and scientific computing society, delivers Director of Group PublishInG resources that advance computing as a scott e. delman Editor-In-ChieF science and profession. ACM provides the [email protected] moshe y. Vardi ACM Copyright notice computing field’s premier Digital Library [email protected] copyright © 2012 by association for Executive Editor and serves its members and the computing News
Recommended publications
  • Communications of the Acm
    COMMUNICATIONS CACM.ACM.ORG OF THEACM 11/2014 VOL.57 NO.11 Scene Understanding by Labeling Pixels Evolution of the Product Manager The Data on Diversity On Facebook, Most Ties Are Weak Keeping Online Reviews Honest Association for Computing Machinery tvx-full-page.pdf-newest.pdf 1 11/10/2013 12:03 3-5 JUNE, 2015 BRUSSELS, BELGIUM Course and Workshop C proposals by M 15 November 2014 Y CM Paper Submissions by MY 12 January 2015 CY CMY K Work in Progress, Demos, DC, & Industrial Submissions by 2 March 2015 Welcoming Submissions on Content Production Systems & Infrastructures Devices & Interaction Techniques Experience Design & Evaluation Media Studies Data Science & Recommendations Business Models & Marketing Innovative Concepts & Media Art TVX2015.COM [email protected] ACM Books M MORGAN& CLAYPOOL &C PUBLISHERS Publish your next book in the ACM Digital Library ACM Books is a new series of advanced level books for the computer science community, published by ACM in collaboration with Morgan & Claypool Publishers. I’m pleased that ACM Books is directed by a volunteer organization headed by a dynamic, informed, energetic, visionary Editor-in-Chief (Tamer Özsu), working closely with a forward-looking publisher (Morgan and Claypool). —Richard Snodgrass, University of Arizona books.acm.org ACM Books ◆ will include books from across the entire spectrum of computer science subject matter and will appeal to computing practitioners, researchers, educators, and students. ◆ will publish graduate level texts; research monographs/overviews of established and emerging fields; practitioner-level professional books; and books devoted to the history and social impact of computing. ◆ will be quickly and attractively published as ebooks and print volumes at affordable prices, and widely distributed in both print and digital formats through booksellers and to libraries and individual ACM members via the ACM Digital Library platform.
    [Show full text]
  • The Strange Birth and Long Life of Unix - IEEE Spectrum Page 1 of 6
    The Strange Birth and Long Life of Unix - IEEE Spectrum Page 1 of 6 COMPUTING / SOFTWARE FEATURE The Strange Birth and Long Life of Unix The classic operating system turns 40, and its progeny abound By WARREN TOOMEY / DECEMBER 2011 They say that when one door closes on you, another opens. People generally offer this bit of wisdom just to lend some solace after a misfortune. But sometimes it's actually true. It certainly was for Ken Thompson and the late Dennis Ritchie, two of the greats of 20th-century information technology, when they created the Unix operating system, now considered one of the most inspiring and influential pieces of software ever written. A door had slammed shut for Thompson and Ritchie in March of 1969, when their employer, the American Telephone & Telegraph Co., withdrew from a collaborative project with the Photo: Alcatel-Lucent Massachusetts Institute of KEY FIGURES: Ken Thompson [seated] types as Dennis Ritchie looks on in 1972, shortly Technology and General Electric after they and their Bell Labs colleagues invented Unix. to create an interactive time- sharing system called Multics, which stood for "Multiplexed Information and Computing Service." Time-sharing, a technique that lets multiple people use a single computer simultaneously, had been invented only a decade earlier. Multics was to combine time-sharing with other technological advances of the era, allowing users to phone a computer from remote terminals and then read e -mail, edit documents, run calculations, and so forth. It was to be a great leap forward from the way computers were mostly being used, with people tediously preparing and submitting batch jobs on punch cards to be run one by one.
    [Show full text]
  • The Strange Birth and Long Life of Unix - IEEE Spectrum
    The Strange Birth and Long Life of Unix - IEEE Spectrum http://spectrum.ieee.org/computing/software/the-strange-birth-and-long-li... COMPUTING / SOFTWARE FEATURE The Strange Birth and Long Life of Unix The classic operating system turns 40, and its progeny abound By WARREN TOOMEY / DECEMBER 2011 They say that when one door closes on you, another opens. People generally offer this bit of wisdom just to lend some solace after a misfortune. But sometimes it's actually true. It certainly was for Ken Thompson and the late Dennis Ritchie, two of the greats of 20th-century information technology, when they created the Unix operating system, now considered one of the most inspiring and influential pieces of software ever written. A door had slammed shut for Thompson and Ritchie in March of 1969, when their employer, the American Telephone & Telegraph Co., withdrew from a collaborative project with the Photo: Alcatel-Lucent Massachusetts Institute of KEY FIGURES: Ken Thompson [seated] types as Dennis Ritchie looks on in 1972, shortly Technology and General Electric after they and their Bell Labs colleagues invented Unix. to create an interactive time-sharing system called Multics, which stood for "Multiplexed Information and Computing Service." Time-sharing, a technique that lets multiple people use a single computer simultaneously, had been invented only a decade earlier. Multics was to combine time-sharing with other technological advances of the era, allowing users to phone a computer from remote terminals and then read e-mail, edit documents, run calculations, and so forth. It was to be a great leap forward from the way computers were mostly being used, with people tediously preparing and submitting batch jobs on punch cards to be run one by one.
    [Show full text]
  • Lecture 10: File Systems File Systems, Databases, Cloud Storage
    Lecture 10: File systems File systems, databases, cloud storage • file: a sequence of bytes stored on a computer – content is arbitrary (just bytes); any structure is imposed by the creator of the file, not by the operating system • file system: software that provides hierarchical storage and organization of files, usually on a single computer (or nearby) – a significant part of the operating system • database: an integrated collection of logically related records – data is organized and structured for efficient systematic access – may be distributed across lots of machines & geographically dispersed • database system: software that provides efficient access to information in a database – not usually part of the operating system • cloud storage: the same thing, but on someone else's computer(s) File systems: managing stored information • logical structure: users and programs see a hierarchy of folders (or directories) and files – a folder contains references to folder and files – "root" folder ultimately leads to all others – a file is just a sequence of bytes contents determined and interpreted by programs, not the operating system – a folder is a special file that contains names of other folders & files plus other information like size, time of change, etc. contents are completely controlled by the operating system • physical structure: disk drives operate in tracks, sectors, etc. – other storage devices have other physical properties • the operating system converts between these two views – does whatever is necessary to maintain the file/folder
    [Show full text]
  • Unix and Shell Programming
    UNIX AND SHELL PROGRAMMING OBJECTIVE: UNIX – Born in the dark and somber portals of Bell Labs, it was a dream that one man nurtured and cherished. Like a parent, he reared the infant with compassion and zeal. And as the fledgling grew and spread its wings, it caught the attention of the world. This chapter will explore through the basics of UNIX, along with certain commands which itself are categorized accordingly. The File System and Some File Handling Commands: The file system is one of the its simplest and it lets users not to access files not belonging to them, You will be learning about categorization of files, the significance of HOME directory, mkdir, rmdir, and absolute, relative path name. Kenneth T. Moras 8/21/2007 BRIEF HISTORY 1966 The Multiplexed Time Sharing and Computing System or MULTICS project was a joint attempt by General Electric (GE), AT&T Bell Labs and the Massachusetts Institute of Technology (MIT) at developing a stable multiuser operating system The aim is to create an operating system that could support a lot of simultaneous users (thousands!). Multics stands for Multiplexed Information and Computer service. Left Ken Thompson, Right Dennis Ritchie The people involved in the project at this time are Ken Thompson, Dennis Ritchie, Joseph Ossanna, Stuart Feldman, Doug McIIroy and Bob Morris. Although a very simple version of MULTICS could now run on a GE645 computer, it could only support 3 people and therefore the original goals of this operating system had not been met, the research and development is just so expensive and Bell Labs withdraws their sponsorship.
    [Show full text]
  • Enterprise Computing
    Computing at Extreme Scale – The Challenge and Excitement of Modern Computing Stuart Feldman Unicamp, VP, Engineering Campinas, Brasil Google 11 August 2008 1 Outline Future of Computers Expanding Frontiers of Computer Science Demands of modern online information systems: search and ads Google’s unique approaches to infrastructure: hardware, software, middleware Successes and Problems The Future – Concerns and Opportunities 2 Who Am I Vice President-Engineering for Google’s “East Coast” engineering offices • includes Canada, Brazil, Chicago, Texas Also, Past President of the ACM On a number of boards and committees • US National Science Foundation (2) • Business Schools • Australia’s NICTA Past • PhD in theory of galaxies • Early member of the “Unix bunch” at Bell Labs • Wrote Make, first Fortran 77 compiler, etc. • Went to Bellcore Research – software engineering and a detour to large-scale development • Went to IBM Research – Internet, E-commerce, long-term computer science research. 3 Future of Computers 4 Scale Measures Number of users Amount of Data • Ever • Stored • Recent • New • Simultaneous • Changed Amount of Networking and Amount of computing Communication • Total operations • Messages per second • Operations per byte of data • Bytes per second • Bytes of data analyzed per second • Kilometer-bytes per second 5 Processors Hardware progress has driven field forever • Range of possibility relevant to topics, details, constraints Current state • Stuck on practical thread speed • Able to execute lots of independent threads- multicore and massive multicore • Wirth’s Law as well as Moore’s • Specialized hardware possibility 6 Other Hardware Other relevant changes • Interconnect • Network • Memory • Storage hierarchy 7 Challenges Long term bets • Quantum computing • Molecular, etc.
    [Show full text]
  • Trusting Our Electronic Assistants
    From the Editor-in-Chief . Trusting Our Electronic Assistants BEING INTERACTIVE Munindar P. Singh • [email protected] With the rapid deployment of the Elements of Trust Internet, we now routinely interact Trust goes beyond security in that it with strangers—at both personal and concerns managing interactions at the corporate levels—and increasingly with application level. Security is about the strangers’ electronic minions. It is authenticating another party and not uncommon to buy goods—even authorizing its actions. Trust is about mundane items such as groceries— the given party’s acting in our best online. Innovations in computing pro- interest and choosing the right actions vide tools that can help us as we inter- from among those authorized. act with others. For example, programs We sometimes see trust as the can reside not only on our desktops belief that all parties will comply with but also in smart phones, PDAs, and even refrigera- legal contracts. Obviously, contracts are important tors, to help with our shopping (http://www.usato- in maintaining social order and stability; however, day.com/life/cyber/tech/review/ctd560.htm). These being trustworthy entails quite a bit more. Many programs serve end users while also meeting certain activities are performed without an explicit con- business needs, such as supply chain management. tract, so trust involves other important elements. All interacting parties face dynamically changing To begin with, trustworthiness is having the right situations. Let’s say you need unusual groceries for a capabilities. Nobody likes to trust someone who is special recipe, but the grocery store is out of those incompetent or simply unaware of important material particular ingredients.
    [Show full text]
  • National Science Foundation Advisory Committee for Cyberinfrastructure Task Force on Software for Science and Engineering Final Report, March 2011
    National Science Foundation Advisory Committee for CyberInfrastructure Task Force on Software for Science and Engineering Final Report, March 2011 Task Force Co-Chairs from the ACCI David Keyes, KAUST and Columbia Valerie Taylor, TAMU ACCI Members Tony Hey, Microsoft Stuart Feldman, Google Community Panelists Gabrielle Allen, LSU Phillip Colella, LBNL Peter Cummings, Vanderbilt Frederica Darema, AFOSR Jack Dongarra, UT Thom Dunning, UIUC Mark Ellisman, UCSD Ian Foster, ANL and UofC William Gropp, UIUC Chris Johnson, Utah Chandrika Kamath, LLNL Ravi Madduri, ANL Michael Mascagni, FSU Steve Parker, NVIDIA Padma Raghavan, PennState Anne Trefethen, Oxford Scott Valcourt, UNH Principal NSF Liaison Abani Patra, SUNY Buffalo NSF Liaisons Fahmida Choudhury, SBE, Clark Cooper, ENG, Peter McCartney, BIO, Manish Parashar, OCI, Tom Russell, OIA Barry Schneider, OCI, Jen Schopf, OCI, Nigel Sharp, MPS Although this report was prepared by a task force commissioned by the National Science Foundation, all opinions, findings, and recommendations expressed within it are those of the task force and do not necessarily reflect the views of the National Science Foundation. Preface The Software for Science and Engineering (SSE) Task Force commenced in June 2009 with a charge that consisted of the following three elements: Identify specific needs and opportunities across the spectrum of scientific software infrastructure. Characterize the specific needs and analyze technical gaps and opportunities for NSF to meet those needs through individual and systemic approaches. Design responsive approaches. Develop initiatives and programs led (or co-led) by NSF to grow, develop, and sustain the software infrastructure needed to support NSF’s mission of transformative research and innovation leading to scientific leadership and technological competitiveness.
    [Show full text]
  • What's the Greatest Software Ever Written? Page 1 of 13
    What's The Greatest Software Ever Written? Page 1 of 13 What's The Greatest Software Ever Written? Witness the definitive, irrefutable, immutable ranking of the most brilliant software programs ever hacked. By Charles Babcock, InformationWeek Aug. 14, 2006 URL: http://www.informationweek.com/story/showArticle.jhtml? articleID=191901844 Most red-blooded technologists will offer a quick opinion on what's the greatest software ever, but when you take the time to evaluate what makes software truly brilliant, the choices aren't so obvious. One of the most significant pieces of programming I know wasn't even software. Before the British built the Colossus machine, which translated German teletype code during World War II, it took the Allies up to six hours to decode a message and a day or more to pore over intelligence, draw conclusions, and pass along information to military command. After Colossus, the Allies gained a picture of German military activity across the English Channel as the day unfolded--intelligence that gave Gen. Dwight Eisenhower the confidence to launch the D-Day invasion. Colossus was built in 1944 to perform Boolean operations on a paper data tape that streamed through the machine at 30 miles an hour. Its logic was literally wired into the machine. It is, perhaps, the greatest software that never got written. So where does that leave us? First, let's set criteria for http://www.informationweek.com/shared/printableArticleSrc.jhtml?articleID=191901844 8/14/2006 What's The Greatest Software Ever Written? Page 2 of 13 what makes software great. Superior programming can be judged only within its historical context.
    [Show full text]
  • Portability - a No Longer Solved Problem Stuart Feldman Bellcore W
    CONTROVERSY Portability - A No Longer Solved Problem Stuart Feldman Bellcore W. Morven Gentleman National Research Council of Canada ABSTRACT: Of Man's First Disobedience, .. or Not long ago, the problem of software portability seemed on the way to solution. Now, the need and demand for portability is enormously greater, but solution seems much further away. Reasons include stricter requirements for portability, different expec- tations by and of the people doing the work, and a far wider range of environments in which software must function. This paper describes how this came about and modern approaches to the problem. 1. The Innocents Abroad Program portability is an old goal. There have been many notable successes, but there has been a major shift in expectations and satisfaction in the past decade. The flrst efforts were in the areas of mathematical and systems software, and a great deal of l. All the section headings refer to actual works; no prize is offered to those who identify them. -PHS @ Computing Systems, Vol. 3 'No. 2 ' Spring 1990 359 research led to good practical solutions involving clever software and concentrated activity. Thus, we find ourselves in the para- doxical situation of having better techniques and knowledge but in more trouble and with more grumpy customers. We contend that almost any program can be made portable, usually at acceptable production cost and execution effectiveness. There are many impressive examples. Even embedded systems with exotic peripherals and real-time constraints, have been suc- cessfully ported. However, the scale and scope of the problem have increased dramatically, and techniques need to be extended and upgraded to meet current demands.
    [Show full text]
  • Scrum Essentials Cards 83 the Popular Agile Framework Scrum Can Improve the Way a Development Team Works Together
    Volume 18 | Issue 3 May-June 2020 The Life of a scrum Data Byte essentials Data on the cards Outside vs. Data on the Inside The History, Status and Future of FPGAs ::::: Complete table of contents on the following two pages Features contents Data on the The History, Outside vs. Data Status, and Future MAY-JUNE on the Inside 43 of FPGAs 71 Services are essential to From the early days of building large applications telecom, through the today. Each service high-performance 2020 has its own data, and computing and data that data may reside centers of today, field- inside or outside of that programmable gate service. Where it resides arrays have been hitting determines how that data a nerve in the ASIC should be treated. community. PAT HELLAND OSKAR MENCER ET AL. Scrum Essentials Cards 83 The popular agile framework Scrum can improve the way a development team works together. Here we present a set of cards based on the Essence standard, which can make Scrum more effective. JEFF SUTHERLAND IVAR JACOBSON Volume 18 Issue 3 BRIAN KERR 2 acmqueue | may-june 2020 2 columns / departments I COMMIT TO MEMORY The Life of a Data Byte 5 As we all know, the state- of-the-art in storage media has come a ridiculously long way, from paper tape to flash. And it’s still evolving to ever faster, smaller storage technology. JESSIE FRAZELLE I contents EVERYTHING SYSADMIN Five Nonobvious Remote Work Techniques 29 If ever there were a time to refine the practice of working remotely, it is now.
    [Show full text]
  • Axiom Bibliography 1
    The 30 Year Horizon Manuel Bronstein W illiam Burge T imothy Daly James Davenport Michael Dewar Martin Dunstan Albrecht F ortenbacher P atrizia Gianni Johannes Grabmeier Jocelyn Guidry Richard Jenks Larry Lambe Michael Monagan Scott Morrison W illiam Sit Jonathan Steinbach Robert Sutor Barry T rager Stephen W att Jim W en Clifton W illiamson Volume Bibliography: Axiom Literature Citations i Portions Copyright (c) 2005 Timothy Daly The Blue Bayou image Copyright (c) 2004 Jocelyn Guidry Portions Copyright (c) 2004 Martin Dunstan Portions Copyright (c) 2007 Alfredo Portes Portions Copyright (c) 2007 Arthur Ralfs Portions Copyright (c) 2005 Timothy Daly Portions Copyright (c) 1991-2002, The Numerical ALgorithms Group Ltd. All rights reserved. This book and the Axiom software is licensed as follows: Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: - Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. - Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. - Neither the name of The Numerical ALgorithms Group Ltd. nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
    [Show full text]