Opinion
Architecture and Hardware Editorial pointers

Editorial Pointers

Posted
  1. Article

Service-oriented computing adds a new layer to the Web services coverage we’ve presented in Communications—that is, its very foundation. In the past we’ve explored the technical challenges in providing goods and services in electronic, mobile environs; we’ve detailed the service interfaces and architectures for creating cross-platform interoperability; we’ve tackled the business and marketing hurdles in building effective services online; and we’ve considered the software and system tools needed for drawing the attention of potential, loyal customers on a global scale.

This time we examine the multiple layers of service-oriented computing—the technologies that really make it happen. Guest editors Michael Papazoglou and Dimitris Georgakopoulous called on noted researchers and product developers to create a shared vision for and evolution of Web services, addressing design, development, and programming services approaches, as well as the supporting technologies and infrastructures. The section focuses on issues relating to Web service standards and their application to business solutions.

We also take hold of the intangible by constructing some real solutions for creating conceptual models and system architectures. Guest editor Dov Dori explains that while traditional blueprints offer precise representations of physical structures, creating workable representations of complex—and abstract—systems involves a far different set of tools. The articles in this section guide developers through the abstract world of systems analysis, offering ways to best assess and choose approaches, as well as the practices needed for constructing them.

In other news, robot pioneer Hans Moravec, who built his first robot at age 10, chronicles the achievements of his field and predicts that the "minds" needed for today’s mechanical bodies are finally in sight. In addition, Sai Ho Kwok describes how the watermark-based copyright protection system will not be easily breakable by attackers when it’s backed by a proper anti-deadlock strategy and watermark clearance center.

When considering software purchases, Michael Cusumano advocates consumers consider a company’s character as well as the products it provides. And Pamela Samuelson presents another example of technology advancements far outpacing the laws to govern them—often prompting the need to stretch existing laws to cover digital quandaries. Case in point: Spam. Do existing trespassing laws written to protect plots of land really cover property rights on the Internet?

Diane Crawford
Editor

Join the Discussion (0)

Become a Member or Sign In to Post a Comment

The Latest from CACM

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More