Architecture and Hardware Editorial pointers

Editorial Pointers

  1. Article
  2. Footnotes

When embedded network sensing shifted from the laboratory to the natural environment, it was done under the meticulous design of scientists. Computer nodes embedded in the physical world would observe ecosystems, collecting field data intended to give researchers an unprecedented window into how nature works. But like most technologies with great repurposing potential, networked sensing is moving at a far faster and fortuitous pace into the urban landscape, driven more by opportunism than real science.

In this month’s cover story "Urban Sensing: Out of the Woods," Dana Cuff, Mark Hansen, and Jerry Kang of UCLA trace how urban sensing will be "unleashed" in city settings through the proliferation of cell phones, GPS technologies, and RFID tags. Collecting data on citizens brings great opportunities as well as a host of ethical and privacy concerns. The authors call for a collaborative effort among scientists, artists, urbanists, and business people to establish a trustworthy infrastructure for city-based networked sensing.

In other technologies and services spawned by cell phones and mobile devices, Junglas and Watson demonstrate the differences between location-tracking and location-aware services. And Soh and Tan examine how the mobile games market’s enormous business opportunity also comes with a significant threat to the incumbent billion-dollar gaming industry.

Liping Zhao offers a word of advice for today’s programmer: The next time you design a program, think carefully about which symmetries to keep and which ones to break, and why. In "Applications of Critical Thought for IT Professionals," Bernd Carsten Stahl and Carole Brooke offer some "critical" guidelines for IT professionals that require effort, resources, and the courage to question oneself.

Two articles this month focus on security weaknesses among business practices and the global user community. Wright et al. present a fictional scenario of daily life in a world networked through ambient intelligence. The year is 2018 and the story unravels a tale of corporate ethical choices. In the end, they wonder, is this world of 10 years hence really any different from today’s? Meanwhile, Larose, Rifon and Enbody speculate how to encourage Internet users to assume more responsibility for protecting themselves online.

In this month’s "Viewpoint," Chenglie Hu argues the study of data types is crucial for learning programming. Novices, he says, who do not learn data types the correct way will face great difficulty trying to learn object-oriented programming. Phillip Armour highlights the pitfalls of "accurately" estimating software projects in "The Business of Software." And, on page 22, ACM is pleased to announce its newly inducted ACM Fellows.

Diane Crawford

Back to Top

Join the Discussion (0)

Become a Member or Sign In to Post a Comment

The Latest from CACM

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More