Wireless sensor networks—incorporating hundreds, even thousands, of tiny interconnected monitoring devices—are not only increasing in scope and function, but now interacting with environments that are physically remote, hostile, or inaccessible. With each pioneering application we move a bit closer to the vision of a pervasive globally embedded Internet.
Sensor networks operate in a wholly different stratum from our deeply wired world. And therein lay fundamental scientific, engineering, hardware, software, security, data management, programming, manufacturing, privacy, and legal challenges facing the technologists building this new way to view the activity of the world. These challenges, and real-world experience, are the focus of this month’s special section. Guest editors David E. Culler and Wei Hong invited some of the leaders in sensor network efforts to present a variety of approaches to building and managing vast numbers of tiny nodes that are self-regulating, self-repairing, programmable in place, and able to work without human intervention for years at a time. These data-collecting and -reporting networks reflect a stunning accomplishment, yet are but a hint of what is to come. The articles in this section explore the state of sensor networks as well as their emerging directions and future applications.
Also in this issue, Sipior et al. explore the many concerns associated with spam—an originally robust e-market tool now recognized primarily for its abusive qualities. The authors examine legislative and administrative initiatives intended to find a consensual balance of interests among consumers, ISPs, and marketers. Also, Vatanasombut et al. illustrate how online vendors can build a dedicated following by recognizing what novice and sophisticated users need and expect from Web sites. Looney et al. investigate the pros and cons of business models reshaping the industry, and urge potential adopters to do the same before choosing one. And Berghel and Sallach study the "radical organizational realignment" of computer and information technology in academia.
In "Viewpoint," Stephen Lau reminds us that a virus or worm doesn’t need a name or news headline to make a mess. Indeed, he designed a network-scanning system called The Spinning Cube of Potential Doom to display malicious network traffic and raise awareness of what’s really out there. And Glaser et al. contend that many companywide programming issues can be addressed more effectively through a team approach, offering a firsthand ("On Site") account of their firm’s participatory programming environment.
Diane Crawford,
Editor
Join the Discussion (0)
Become a Member or Sign In to Post a Comment