Optimizing Operational and Strategic IT

Contents | Zoom in | Zoom out
For navigation instructions please click here
Search Issue | Next Page
September/October 2014
Te c h n o l o g y S o l u t i o n s f o r t h e E n t e r p r i s e
CONSUMERIZATION
OF IT
SECURITY
P. 9
USABILITY
P. 66
ENTERPRISE IT
P. 20
www.computer.org/itpro
Contents | Zoom in | Zoom out
For navigation instructions please click here
Search Issue | Next Page
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
GRADY BOOCH
Chief ScientistM
ngineering, IB
of Software E
F
O
S
R
A
T
S
K
OC
R
A
T
A
D
G
I
B
S
C
I
T
Y
L
A
AN
GREG ARNOLD
cture
Data Infrastru
dIn
irector, Linke
D
g
n
ri
e
e
in
g
En
GUIDO SCHROED
ER
plunk
f Products, S
o
t
n
e
d
si
re
P
Senior Vice
Analytics
a
t
a
D
ig
B
Don’t Let
that
!
w h a t do es
n
t
u
w
B
o
.
s
D
c
ti
analy
r ease
Bog You
of big data
cs help inc
e er a
analy ti
ys this is th iness? Can big data
a
s
out.
e
n
o
y
r
e
Ev
r bus
st it? Find
u
u
o
y
tr
u
d
n
o
y
a
n
u
o
m er s? C a
mean to y
tisfy custo
a
s
d
n
a
ts
profi
xperts
ock Star E
R
e
th
t
e
e
eering, IBM dIn
M
ware Engin
ke
of Soft
tor, Lin
c s)
ring Direc
f Scientist
e
ie
e
h
in
C
g
,
n
r of Analy ti
h
E
c
to
o
e
c
r
o
e
B
ir
tu
y
c
D
u
d
a
ix
tr
r
3 G
ta Infras
mer Netfl
Arnold, Da President, Ly ft (For
ts, Splunk
3 Gr eg
e
of P r oduc
t
ic
n
V
e
t,
id
o
s
li
e
u
r
Po
eP
Soft ware
3 Chris
Senior Vic
fficer, GE
O
r,
e
e
d
c
e nga)
e
n
o
ie
r
c
h
Sc
r CTO, K it
Data S
e
f
3 Guido
m
ie
r
h
o
C
(F
,
k
ll
u
e
e w D e nes
ngineer, D
3 Matt h
nguished E
ti
r vices
is
e
D
S
,
IT
is
v
t
Da
atalys
C
3 Mar k
,
tics?
O
E
C
,
m
Data Analy
ig
B
t
Rosenbau
s
u
r
T
3 Mike
an We
Ho w Far C
3 Panel:
analy tics.
Be ther
r s on
AL answe
E
R
e
th
r
e fo
r 2014
21 Octobe rium
ivic Audito
San Jose C
CA
San Jose,
NOW
REGISTER is in Effect!
Pricing
Early-Bird
in this
our Place
Y
e
v
r
e
s
e
R
vent
Sold Out E
Sure-to-be
/
g
r
o
.
r
e
t
u
comp
s
c
i
t
y
l
a
n
Data-A
big data
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Technology Solutions for the Enterprise
Editor in Chief
Editorial Staff
San Murugesan, BRITE Professional Services, san@computer.org
__________
Editorial Management: Shani Murray
Associate Editors in Chief
Editorial Product Lead: Bonnie Wylie,
b.wylie@computer.org
___________
Irena Bojanova, University of Maryland University College,
irena.bojanova@umuc.edu
______________
J. Morris Chang, Iowa State University, morrisjchang@gmail.com
_____________
Linda Wilbanks, US Department of Education, linda.wilbanks@ed.go
___________
Manager, Products & Acquisitions: Kathy Clark-Fisher
Cover Designer: Jennie Zhu-Mai
Department Editors
Publications Coordinator: ____________
itpro-ma@computer.org
Data Analytics: Seth Earley, Earley & Associates, _________
seth@earley.com
Director, Products & Services: Evan Butterfield
IT in Emerging Markets: Gustavo Rossi, Universidad Nacional
de La Plata, gustavo@lifia.info.unlp.edu.ar
_______________
Senior Manager, Editorial Services: Robin Baldwin
Associate Manager, Peer Review: Hilda Carman
IT Trends: Irena Bojanova, University of Maryland University
College, ______________
irena.bojanova@umuc.edu
Membership Development Manager: Cecelia Huffman
Business Development Manager: Sandy Brown
Life in the C-Suite: Joseph Williams, Seattle Pacific University,
josephwi@spu.edu
__________
Senior Advertising Coordinator: Marian Anderson
Mastermind: George Strawn, NITRD, gostrawn@gmail.com
___________
2014 IEEE Computer Society President
Securing IT: Rick Kuhn, US Nat’l Inst. of Standards and
Technology, ________
kuhn@nist.gov
Dejan S. Milojic̆ić, d.milojicic@computer.org
____________
Smart Systems: Karen Evans, KE&T Partners, _____________
karenevans@prodigy.net
CS Magazine Operations Committee
Editorial Board
Paolo Montuschi (chair), Erik R. Altman, Maria Ebling, Miguel Encarnação,
Dave Walden, Cecilia Metra, San Murugesan, Shari Lawrence Pfleeger,
Michael Rabinovich, Yong Rui, Forrest Shull, George K. Thiruvathukal,
Ron Vetter, and Daniel Zeng
Wesley Chou, US Department of Defense
Fulvio Corno, Politecnico di Torino
Vladimir Dimitrov, University of Sofia
Reza Djavanshir, Johns Hopkins University
Jinan Fiaidhi, Lakehead University, Canada
Robert R. Harmon, Portland State University
George F. Hurlburt, STEMCorp
Maria R. Lee, Shih Chien University
Sunil Mithas, University of Maryland
Jia Zhang, Carnegie Mellon University, Silicon Valley
Liang-Jie Zhang, Kingdee Int’l Software Group
CS Publications Board
Jean-Luc Gaudiot (VP for Publications), Alain April, Laxmi N. Bhuyan,
Angela R. Burgess, Greg Byrd, Robert Dupuis, David S. Ebert, Frank Ferrante,
Paolo Montuschi, Linda I. Shafer, H.J. Siegel, and Per Stenström
Writers: Access www.computer.org/itpro/author.htm.
Letters to the Editors: Send letters to _________
itpro@computer.org.
Subscribe: Visit www.computer.org/subscribe.
Subscription Change of Address: Contact address.change@ieee.org.
___________
Missing or Damaged Copies: Contact _________
help@computer.org
Reprints of Articles: Contact ___________
itpro-ma@computer.org.
Advisory Board
Jin-Fu Chang, President, Yuan-Ze University and Board Chair,
Institute for Information Industry, Taiwan
Wushow Chou (EIC Emeritus), North Carolina State Univ.
Karen Evans, KE&T Partners
Frank E. Ferrante, FEF Group
Thomas Jepsen, IT consultant
Simon Liu, US Nat’l Agricultural Library
H. Gilbert Miller, Noblis
Sorel Reisman (chair), California State Univ., Fullerton
Henry Schaffer, North Carolina State Univ.
George Strawn, NITRD
IEEE prohibits discrimination, harassment and bullying: For more information,
visit www.ieee.org/web/aboutus/whatis/policies/p9-26.html.
Published by the
______
R EUSE R IGHTS
1) IS NOT MADE FOR PROFIT; 2) INCLUDES THIS
IEEE ENDORSEMENT OF ANY THIRD - PARTY PRODUCTS OR SERVICES. AUTHORS
AND THEIR COMPANIES ARE PERMITTED TO POST THE ACCEPTED VERSION OF IEEE- COPYRIGHTED MATERIAL ON THEIR OWN WEB SERVERS WITHOUT PERMISSION, PROVIDED THAT THE IEEE COPYRIGHT
NOTICE AND A FULL CITATION TO THE ORIGINAL WORK APPEAR ON THE FIRST SCREEN OF THE POSTED COPY. A N ACCEPTED MANUSCRIPT IS A VERSION WHICH HAS BEEN REVISED BY THE AUTHOR
TO INCORPORATE REVIEW SUGGESTIONS , BUT NOT THE PUBLISHED VERSION WITH COPY- EDITING, PROOFREADING , AND FORMATTING ADDED BY IEEE. F OR MORE INFORMATION, PLEASE GO TO:
HTTP
:// WWW. IEEE.ORG/PUBLICATIONS_STANDARDS/PUBLICATIONS/RIGHTS/PAPERVERSIONPOLICY. HTML . PERMISSION TO REPRINT/REPUBLISH THIS MATERIAL FOR COMMERCIAL , ADVERTISING, OR
_____________________________________________________
PROMOTIONAL PURPOSES OR FOR CREATING NEW COLLECTIVE WORKS FOR RESALE OR REDISTRIBUTION MUST BE OBTAINED FROM IEEE BY WRITING TO THE IEEE INTELLECTUAL PROPERTY R IGHTS O FFICE,
445 H OES L ANE, PISCATAWAY, NJ 08854-4141 OR ____________
PUBS - PERMISSIONS@ IEEE.ORG. COPYRIGHT © 2014 IEEE. A LL RIGHTS RESERVED.
AND
R EPRINT PERMISSIONS: EDUCATIONAL
OR PERSONAL USE OF THIS MATERIAL IS PERMITTED WITHOUT FEE , PROVIDED SUCH USE:
NOTICE AND A FULL CITATION TO THE ORIGINAL WORK ON THE FIRST PAGE OF THE COPY; AND
3)
DOES NOT IMPLY
A BSTRACTING AND LIBRARY USE: A BSTRACTING IS PERMITTED WITH CREDIT TO THE SOURCE. L IBRARIES ARE PERMITTED TO PHOTOCOPY FOR PRIVATE USE OF PATRONS, PROVIDED THE PER- COPY FEE
INDICATED IN THE CODE AT THE BOTTOM OF THE FIRST PAGE IS PAID THROUGH THE COPYRIGHT CLEARANCE CENTER , 222 ROSEWOOD D RIVE , DANVERS, MA 01923.
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
1
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Consumerization of IT
IN THIS ISSUE
16
Guest Editors’
Introduction: From
BYOD to BYOA,
Phishing, and Botnets
Seth Earley, Robert Harmon,
Maria R. Lee, and Sunil Mithas
20
28
34
41
Consumerization
in the IT Service
Ecosystem
Trust and Privacy
Exploitation in Online
Social Networks
Low-Cost
3D-Supported
Interactive Control
Enrique Castro-Leon
Kaze Wong, Angus Wong,
Alan Yeung, Wei Fan, and
Su-Kit Tang
Enrico Masala, Antonio Servetti,
and Angelo Raffaele Meo
Job Recruitment
and Job Seeking
Processes: How
Technology Can Help
Most available literature
on IT consumerization
focuses on current
practices. Exploring the
driving forces behind
consumerization is
essential, however, if
IT organizations are to
make sense of the current
dynamics of transformation and disruption and
formulate effective strategies in response.
This survey presents
the pitfalls of security
protection in online social
networks and identifies
common attack methods.
A harmless proof-ofconcept malware app
demonstrates the
vulnerability of online
social networks and the
significance of the user’s
mentality.
Devices for stereoscopic
vision are mostly used for
entertainment. The prototype device presented here
for 3D-video-supported
interactive control is based
on consumer devices and
open source software, paving the way for low-cost
general-purpose systems
for remote operation,
education, training, and
surveillance.
Paolo Montuschi,
Valentina Gatteschi,
Fabrizio Lamberti, Andrea Sanna,
and Claudio Demartini
This survey of current job
search and recruitment
tools focuses on applying a
computer-based approach
to job matchmaking.
The authors present a
semantic-based software
platform developed in the
framework of a European
project on lifelong learning, highlighting future
research directions.
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
September/October
2014
January/February 2008
Volume 10,
16, Number 1
5
Te c h n o l oSolutions
g y S o l ufor
tio
n sEnterprise
for the Enterprise
Technology
the
COLUMNS AND DEPARTMENTS
4 From the Editors
The Next Step for Learning Analytics
Jinan Fiaidhi
9 Securing IT
Securing BYOD
J. Morris Chang, Pao-Chung Ho, and Teng-Chang Chang
12 IT Trends
Optimizing Operational and Strategic IT
Stephen J. Andriole and Irena Bojanova
62 IT in Emerging Markets
Toward Open Government in Paraguay
Luca Cernuzzi and Juan Pane
66 Data Analytics
Usability for Internal Systems:
What’s the Payoff?
Seth Earley
70 Mastermind
Don Knuth: Mastermind of Algorithms
George Strawn
50
56
Cinema Cloud: An
Enabling Technology
for the Movie Industry
Deploying a Maritime
Cloud
Wai-Ming To, Linda S.L. Lai,
David W.K. Chung, and
Andy W.L. Chung
With the promise of high
definition and advanced
special effects, movie
theaters worldwide have
evolved from traditional
film projection to digital
cinema projection. The
Cyberport Digital Cinema
Cloud helps facilitate the
development of digital
entertainment in Hong
Kong.
27
40
IEEE CS Information
Advertiser Index
Kleanthis Dellios and
Dimitrios Papanikas
The authors offer a
roadmap for building a
Maritime Cloud, offering
virtual platforms, tools,
and data for the maritime
domain. They describe the
proposed architecture and
delivery models, evaluate
advantages and challenges,
and suggest future research
directions.
On the Web: computer.org/itpro
For more information on computing topics, visit the Computer
Society Digital Library at www.computer.org/csdl.
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
FROM THE EDITORS
The Next Step for
Learning Analytics
Jinan Fiaidhi, Lakehead University
earning analytics is an
emergent field of research and practice that
aims to use data analysis
to inform decisions made on every
tier of the educational system.1 It
helps analysts decipher trends
and patterns from educational
big data—that is, huge sets of
student-related data—to further
the advancement of personalized, supportive higher education
applications.
L
Learning Analytics
Initiatives
Learning analytics is the third
wave of developments in instructional technology, which began
with the advent of the learning
management system (LMS) in
1991. The second wave integrated the LMS into the wider
educational enterprise by involving learners on social networks
(also known as the Web 2.0 wave).
During this third wave, learning analytics as a term has been
significantly popularized by the
Educause International Conferences on Learning Analytics and
Knowledge (LAK),2 which started
in 2011 (https://tekri.athabascau.
ca/analytics).
Learning analytics focuses on
collecting and analyzing data
from a variety of sources to provide information on what works
(and what doesn’t) with respect
to teaching and learning.3,4 This
helps educational institutions
improve their quality of learning and overall competitiveness.
Consequently, many research
communities have developed a
variety of promising initiatives,
Related Learning Analytics Research
S
ee the following for more information on learning analytics
research:
t
t
t
t
t
4
the Society for Learning Analytics Research (SoLAR)—
http://solaresearch.org/,
the Learning Analytics focus group at the University of Amsterdam—
http://learning-analytics.uva.nl,
the University of Melbourne Learning Analytics research group—
https://le.unimelb.edu.au/elearning/larg.html,
______________________________
the Social Media Lab at Dalhousie University—
http://socialmedialab.ca, and
Stanford University’s Transformative Learning Technologies Lab—
https://tltl.stanford.edu/project/multimodal-learning-analytics).
_________________________________________
IT Pro September/October 2014
Published by the IEEE Computer Society
models, and applications to improve learner success. For example, Santa Monica College’s Glass
Classroom initiative,5 introduced
in December 2012, aims to enhance student and teacher performance by collecting and analyzing
large amounts of data. Using realtime feedback of the student’s
performance, Glass Classroom
adjusts the courseware to meet
educational objectives.
Another example is at the University of Wisconsin-Madison.
Since May 2012, the university
has been working to develop a
data-driven “early-warning” system that faculty and advisors can
use to support student academic
success.6 The system will help
identify academically at-risk students, using nontraditional indicators that can be gathered early in
a student’s career, even at the beginning of a semester. The system
aims to intervene early, improve
students’ academic success, and
bolster the campus’s retention and
graduation rates.
Furthermore, many research
groups and societies are providing
excellent networks for researchers who are exploring the impact
of analytics on teaching, learning,
training, and development (see
the “Related Learning Analytics
Research” sidebar). In particular,
these groups and societies are
promoting several learning analytics models, which have been
1520-9202/14/$31.00 © 2014 IEEE
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Table 1. Notable learning analytics applications.
Application
Purpose and data
Institution & URL
jPoll
This ubiquitous classroom polling and student-response
system engages students using a range of interactive
teaching situations. Originally developed as a replacement
for clicker-type technologies, it produces data based on
student opinions of teaching events.
Griffith University
http://navigator.nmc.org/project/jpoll
Moodog
This course management system provides a log analysis tool
to track students’ online learning activities. It provides
instructors with insight about how students interact with
online course materials, and it lets students compare their
own progress with others in the class. Moodog also provides
automatic email reminders to students, encouraging them to
view available materials that they haven’t yet accessed.
University of California, Santa Barbara
(An article with more information
appears elsewhere.7)
Equella
Equella provides evidence of appropriate curriculum
coverage, student engagement, and equity while students
are on clinical placement (which provides a clinical
education at an external facility).
University of Wollongong
www.pearsonlearningsolutions.com/
equella
____
E2Coach
This computer-based coaching system provides a model
for an intervention engine, capable of dealing with actionable
information for thousands of students. It’s currently being
used for a variety of applications in public health—from
cessation of smoking to losing weight.
University of Michigan
http://sitemaker.umich.edu/ecoach/
about_ecoach
_________
Signals
A system that takes course management system (CMS) data
(Blackboard data, in this case) into account in predicting
whether a student will succeed in a given course.
Purdue University
www.itap.purdue.edu/studio/signals
Sherpa
This course recommender system uses a service-oriented
architecture to guide students during registration to pick a
substitute class if their first choice is full (Phase 1). The second
phase provides administrators tools to send “nudges” to
students via portal messages, emails, SMS messages, and
text-to-speech phone calls. The third phase revamps the
student portal with a to-do list, news feed, and calendar,
pre-populated with enrollments and important dates.
South Orange County Community
College
www.socccd.edu/sherpa
developed to identify student risk
levels or success factors in real
time to increase a student’s likelihood for success and improve
learning.
Table 1 provides examples of
applications that are using
such learning analytics models.7
Higher education institutions
have shown increased interest in learning analytics as they
face calls for more transparency
and greater scrutiny of their student recruitment and retention
practices.8
Dealing with
Unstructured Data
The applications described in
Table 1 apply models of structured data, collected from student
interactions with the learning
system, to answer the following
questions:7
t When are students ready to
move on to the next topic?
t When are students falling behind in a course?
t When is a student at risk for not
completing a course?
t What grade is a student likely to
get without intervention?
t What is the best next course for
a given student?
t Should a student be referred to
a counselor for help?
These learning analytics applications use Web analytics, data
warehouses, and other data-management tools, measuring Web
traffic to assess and improve the
effectiveness of the teaching and
learning website. (They use clickstream data to record every page,
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
5
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
FROM THE EDITORS
segment, or tag requested by the
learner.) Then, they extract knowledge from structured data and
store it in databases. You define
your learning categories up front,
so it’s simple to evaluate the status
of any given category; track trends
in a category; and compare how a
category relates to others across
time, geography, and so on.
Analyzing unstructured content,
however, is different. Unstructured content refers to documents,
emails, answers, responses, and
other objects (static or dynamic)
that are made up of free-flowing
text. Analysts, including Gartner
and IDC, predict that as much as
80 percent of data is unstructured.9
This data is a treasure chest of valuable information and insight, but
it’s notoriously difficult to manage.
Gartner defines unstructured data
as content that doesn’t conform to
a specific, predefined data model. It
tends to be the human-generated
and people-oriented content that
doesn’t fit neatly into database tables.10 Text is the classic and most
dominant example of unstructured
data.
Capturing and analyzing textual
data has changed how decisions
are made and resources are allocated in businesses, healthcare,
government, and many other fields.
However, text analysis hasn’t yet
made the impact on education that
it has made in other fields, even
though learners interact with instructors, other learners, and with
the course materials mainly using
text. The proliferation of textual
data in education is overwhelming,
because such data is being constantly generated via learning blogs,
emails, educational websites, learning objects repositories, and so on.
Although the amount of textual
data is increasing rapidly, learning
systems’ ability to summarize, understand, and make sense of such
data for improved learning remains
challenging.
6
Textual Analytics in
Learning
A finer level of understanding of
student opinions, answers, and
concerns can enable educators, researchers, and university leaders to
improve teaching and thus learning.11 Text analytics typically involves
tasks such as text categorization, text
clustering, summarization, and concept extraction. Employing learning analytics based on text analytics
helps promote automated intervention and reasoning about textual interaction. It also helps archive, filter,
search, and classify text.
Thanks to advancements in
textual analysis techniques and
other machine-learning technologies, systems like the IBM Watson
can defeat top human contestants
in Jeopardy (see www.ibm.com/
smarterplanet/us/en/ibmwatson).
_______________________
According to Seth Grimes,12 text
analytics adds semantics to identify features such as
t named entities (learning objects, learners, and so on);
t pattern-based entities (such as
email addresses);
t concepts (abstractions of entities);
t facts and relationships;
t events;
t concrete and abstract attributes;
and
t subjectivity in the form of opinions, sentiments, and emotions.
Learning analytics applications
enriched with the power of textual
analytics might also perform the
following smart capabilities and
services to empower the learner
and the learning system.
Annotate Sensitive
Information
In a learning system, you need to
communicate clearly and quickly
with learners. However, creating
screen recordings can be time
consuming and frustrating. You
need the ability to capture images
to get your point across. You also
need the ability to add or annotate
text and to blur out sensitive information on these images.
Categorize Groups
of Documents
This would let applications assign unseen text to one of the
predefined categories based on a
processing algorithm. There are
many kinds of models and strategies for text categorizations, but
generally, all algorithms could be
divided into the following groups:
t supervised categorization uses prior information regarding correct categorization for tested
documents;
t unsupervised categorization doesn’t
use any prior or external information, so decisions are made
internally based on predefined
logic or models; and
t semisupervised categorization combines some approaches from
the supervised and unsupervised text categorization.
Check for Relevant Live Feeds
Live feeds are different types of
feeds, which show all messages
that are relevant to a specific user
or topic.
Other Text-Based Services
Other potential text-based services include the following:
t classify entities via manual
training and automation,
t filter content by metadata and
threshold classification,
t generate high-level summaries
and detailed reports,
t discover top meta values and related concepts,
t recommend resources,
t analyze feedbacks and opinions,
t build topic models and generate
groupings,
t measure and validate results, and
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Students
Documents
Instructors
Learning analytics
Administrators
Third party services
providers
Linked data
(Structured data)
Curriculum
Users
Blogs
QA Staff
Database management system
Feeds
Institution (s)
Web analytics
Data
sources
Probes and monitors
Predictive engine
Search results
Social networks
Adaptation engine
Intervention engine
Feedback engine
Learning
management
system
Meta
engines
Content engine
Measurement engine
Clickstream
Web 2.0
Visualization
Crowdsourcing
Learning analytics
Visits
(Unstructured data)
Datasets
Predictions
Reflection
Goals
Machine learning
Text preprocessing
Statistical analysis
Summarization
Indexing
Empirical rules
Privacy
Clustering and classifications
Ethics
Critical thinking
competence
Methods
Tagging
Semantic analysis
Constraints
Logfile analysis
Interpretation
competence
Success/failure
measures
Policies
Data mining
Searching engines
NLP pipeline
Adaptation
Personalization
Intervention
Figure 1. A comprehensive learning analytics architecture.
t identify similar documents and
responses (possible plagiarism).
Text analytics applies a variety
of natural language processing
analysis techniques along with linguistics, statistical, and data-mining techniques to extract concepts
and patterns that can be applied
to categorize and classify textual
documents. It also attempts to
transform the unstructured information into data that can be
used with more traditional learning analytics techniques. Finally,
it helps identify meaning and relationships in large volumes of
information. However, there is no
single method appropriate for all
text analysis tasks.
earning analytics approaches must take several different perspectives and
accommodate different data sources. The ideal vision for learning
analytics is to integrate analytics
for both structured and unstructured data (mainly of textual nature). Figure 1 illustrates our bird’s
eye view of a comprehensive learning analytics architecture.
The main feature of this architecture is the component that deals
with unstructured textual data (and
natural language processing). Adding this to the existing components
(that is, to the learning management system, Web 2.0, social networking, and the learning analytics
for structured data) will strengthen
L
the power of the “meta engines” to
reliably assess students skills and
provide students with formative
feedback based on their learning
processes (their actual cognitive
and intellectual development while
performing a learning activity). By
adding a component that deals with
textual data, the meta engines will
be able to capture detailed information about teaching and learning.
For example, the predictive engine will
be able to record the progress of
certain critical-thinking processes
and predict the outcome.
Similarly, the content engine will
provide more focused information
and evaluations using the indexing
and content categorizations. The
adaptation engine will provide more
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
7
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
FROM THE EDITORS
Editorial Board Changes
A
rnold Bragg has retired from IT Professional’s Advisory Board. We
thank him for his countless contributions to the publication, especially during his years as Editor in Chief.
T
homas Jepsen has retired from IT Pro’s Editorial Board and instead
will be serving as a member of the Advisory Board. We thank him
for his years of service and continued support.
—San Murugesan, Editor in Chief
Call for Issue Proposals
9.
10.
I
T Professional invites your theme proposals for its upcoming issues
in 2016. If you would like to see a topic of relevance covered or
wish to guest edit a theme issue, please send your proposal to San
Murugesan, Editor in Chief, at san@computer.org.
_____________
customized content delivery for individual students’ performance and
interests. The intervention engine will
let instructors and administrators
bypass the LMS to directly interact
with students. The feedback engine
will provide evaluations from other
meta engines (such as the predictive
engine) as feedback for students,
instructors, faculty, and administrators. Finally, the measurement engine will provide measures such as
the level of similarity between the
student’s solution and that of the
instructor.
There are many text analytics
tools and APIs that can be used to
build the learning analytics component that deals with textual unstructured data (such as LingPipe,
RapidMiner, Textanalytics, and
OpenText).13 Incorporating textual analytics into what we have
achieved so far in terms of learning analytics research and development will lay the groundwork for
redesigning educational institutions to teach 21st century skills.
References
1. NMC Horizon Report 2013, The New
Media Consortium, 2013; http://
____
net.educause.edu/ir/librar y/pdf/
HR2013.pdf.
_______
8
2. A.Cooper,“A Brief History ofAnalytics,”
JISC CETIS Analytics Series, Nov. 2012;
http://publications.cetis.ac.uk/wp_____________________
content/uploads/2012/12/Analytics_____________________
Brief-History-Vol-1-No9.pdf.
_________________
3. M. Brown, “Learning Analytics:
The Coming Third Wave,” Educause,
Apr. 2011; http://net.educause.edu/
ir/library/pdf/ELIB1101.pdf.
________________
4. K.D. Mattingly, M.C. Rice, and Z.L.
Berge, “Learning Analytics as a Tool
for Closing the Assessment Loop in
Higher Education,” Knowledge Management & E-Learning” An Int’l J., vol.
4, no. 3, 2012; www.kmel-journal.
org/ojs/index.php/online-publication/
article/viewArticle/196.
______________
5. L. Johnston, “The Glass Classroom,”
blog, 1 Dec. 2012; http://glassclass
room.blogspot.ca/2012/12/the-glass_____________________
classroom-big-data.html.
______________
6. “Learning Analytics Pilot,” University of Wisconsin-Maddison, Spring
2014; www.cio.wisc.edu/learning_________________
analytics-pilot.aspx.
___________
7. Zhang, H. & Almeroth, K. (2010).
Moodog: Tracking Student Activity in Online Course Management
Systems. Journal of Interactive
Learning Research, 21(3), 407–429.
Chesapeake, VA: A ACE, http://
____
www.editlib.org/p/32307/
_______________
8. M. Bienkowski, M. Feng, and B.
Means, “Enhancing Teaching and
11.
12.
13.
Learning Through Educational Data
Mining and Learning Analytics,” US
Department of Education and Office of Educational Technology, Oct.
2012; www.ed.gov/edblogs/technol_________________
ogy/files/2012/03/edm-la-brief.pdf.
____________________
“Six Reasons Businesses Need to Pay
Attention to Unstructured Data,”
IT Business Edge, 5 Nov. 2013; www.
___
itbusinessedge.com/slideshows/six______________________
reasons-businesses-need-to-pay_____________________
attention-to-unstructured-data.html
_____________________
“Gartner Predicts 2013: Business Intelligence and Analytics Need to Scale
Up to Support Explosive Growth in
Data Sources,” Gartner, 2013.
Unstructured Data Analytics: Unlock the
Treasures of Your Unstructured Content,
white paper, Filelytics, 2012, https://
____
www.filelytics.com/sites/default/files/
downloadable/Unstructured_Content_
______________________
Whitepaper.pdf.
________
S. Grimes, “An Introduction to Text
Analytics: Social, Online and Enterprise,” Text and Social Analytics Summit, workshop presentation, 2013;
www.slideshare.net/SethGrimes/
an-introduction-to-text-analytics_____________________
2013-workshop-presentation.
_________________
“Top 30 Software for Text Analysis
Text Mining Text Analytics,” Predictive Analytics Today, 2013; www.
___
predictiveanalyticstoday.com/top30-software-for-text-analysis-text_____________________
mining-text-analytics.
____________
Jinan Fiaidhi is a full professor and
graduate coordinator with the Department of Computer Science at Lakehead
University, Ontario, Canada. She is
also an Adjunct Research Professor with
the University of Western Ontario. Her
research interests are in collaborative
learning, learning analytics, and cloud
computing. More information about her
can be obtained from her website ____
http://
flash.lakeheadu.ca/~jfiaidhi. Contact her
________________
at _____________
jfiaidhi@lakeheadu.ca.
Selected CS articles and
columns are available for free at
http://ComputingNow.computer.org.
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
SECURING IT
EDITOR: Rick Kuhn, NIST, kuhn@nist.gov
________
Securing BYOD
J. Morris Chang, Iowa State University
Pao-Chung Ho and Teng-Chang Chang, Institute for Information Industry, Taiwan
n the corporate world, Bring
Your Own Device (BYOD) is
becoming increasingly common, changing how we work.
According to a 2012 Intel study of
3,000 IT managers and 1,300 users,
productivity is viewed as the biggest
benefit of BYOD.1 An IBM Flexible Workplace Study reported increases in productivity of 20 percent
or greater stemming from BYOD
practices—the equivalent of an extra
day of work per week.2 BYOD lets
employees use their personal device to work seamlessly across their
personal user space and enterprise
workspace instead of using multiple devices depending on business
need, location, and circumstances.
Yet today’s IT departments are
concerned with the popularity of
BYOD, because mixing personal
and enterprise data presents security threats to corporate proprietary
information. Enforcing the usage
of two different mobile devices—
one corporate and one personal—
could mitigate this threat, but this
strategy faces employee resistance
because it’s inconvenient. This creates a need for IT departments to
develop company security policies
that let employees access sensitive
resources using personal devices.
I
1520-9202/14/$31.00 © 2014 IEEE
The Challenges
Malware
In a survey of 2,100 individuals,
conducted by Webroot, 41 percent
said they use a personal smartphone or tablet for work purposes.3
Furthermore, 70 percent of those
smartphones and tables used for
work had no additional security
other than what was installed when
the employee first purchased the
device. According to another survey, 98 percent of employers claim
to have a mobile security policy in
place for accessing corporate data,3
yet BYOD users tend to choose usability over security when it comes
to selecting mobile applications.
Device security, malware, and enforcement are major security concerns raised by BYOD.
Another concern is malware. The
total number of known Android
malware samples increased more
than 10 times between July 2012
(about 45,000 samples) and January 2014 (about 650,000 samples).4
These malwares tend to steal personal information, issue premium
SMSs (which result in a fee for the
sender) for financial gain, or engage in denial-of-service attacks.
The malware might not specifically
target enterprise data, but it creates concerns about backdoor data
leakage for BYOD scenarios.
Device Security
Security issues arise at all layers—
including the network layer—but
the main issues are at the device
layer. Enterprise apps on a mobile
device can leave company data
on that device, presenting a major threat if the device is ever lost
or stolen. Furthermore, if the user
mixes personal and enterprise data,
it could lead to data leakage if company information is accidentally
sent to personal contacts.
Published by the IEEE Computer Society
Enforcement
Personal devices used for work are
part of the enterprise network, so
it’s essential to ensure that all mobile devices comply with enterprise
security policies. However, it’s difficult to enforce corporate policies
on personal devices. The problem
is exacerbated by the large variety of
device hardware and fragmentation
of the operating system. Moreover,
security policies can change from
time to time to cope with new security threats. Thus, effective security enforcement requires constant
updating of both corporate and
personal devices.
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
9
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
SECURING IT
Secure Mobile Browsing
A
lthough a virtual private network can be an effective way to maintain corporate security, administrators can also let employees access
corporate intranet sites through the AirWatch Browser on employeeowned devices. A single sign-on and app tunneling lets users connect
the AirWatch Browser to enterprise intranets and third-party Web filters.
Current Solutions
The following solutions and practices can help address BYOD
security issues.
Security Policies
Typically, company BYOD policies include identifying which devices can be used in the company
network, listing both allowed and
banned apps, and describing classes of data that shouldn’t be stored
locally after being used by a mobile
app. Companies also implement
security policies (such as passwords
or screen locks) for all devices and
have strategies for lost or stolen devices and for when employees leave
the company.5 Furthermore, although a company might assume it
owns the apps and data, the device
owner might think differently.
The US White House published
a BYOD policy on August 2012
that presents three high-level suggestions for implementing BYOD
programs.6 The first suggestion is to
use virtualization to remotely access
computing resources at a corporate
facility, so corporate data isn’t stored
and corporate apps aren’t processed
on personal devices. The second
suggestion is to implement a walled
garden, so corporate data and apps
are processed separately from personal data. The final suggestion is to
apply limited separation, letting users
mix corporate and personal data on
a personal device while ensuring a
minimal level of security controls.
Mobile Device Management
Mobile Device Management
(MDM) tools are available commercially to manage mobile devices
10
and enforce company security policies on such devices. Vendors such
as VMware, MobileIron, and FiberLink provide MDM services specifically for BYOD.
Products, such as Maas360 by
FiberLink, typically use a device
enrollment process to register the
personal device into the MDM
program. This lets administrators
manage the devices remotely. It
might set customized authentication checkpoints on apps or data
or restrict certain device features
and settings. Some products (such
as AirWatch by VMware) also provide Mobile Application Management (MAM) and Mobile Content
Management (MCM) in addition
to MDM. They can also wipe the
device of enterprise content if necessary. Another technique—secure
mobile browsing—is discussed in
the related sidebar.
Separation Techniques
Techniques based on virtualization and on the operating system
(OS) to separate enterprise space
and personal space have shown
potential.
In a BYOD scenario, private
personal apps and data and important enterprise apps and data
are contained and running on the
same device. A BYOD design requires that the personal user space
in no way compromise the security of the enterprise workspace.
On the other hand, the enterprise workspace should in no way
compromise the privacy of the
personal user space. How to effectively separate the two spaces on
the same mobile device becomes
crucial for a successful BYOD design. Techniques, including virtualization, dual boot, and recently
proposed virtual mobile platforms,
can be used to achieve the separation goal. All of these techniques
have their own advantages and
drawbacks.
Vitualization. With hardware virtualization, hardware resources on
a mobile device can be multiplexed
to host multiple virtual machines.
A type 1 (T1) hypervisor runs directly on the system hardware and
provides a virtualized platform to
host multiple guest OSs (here, the
guest OSs would be the personal
OS and the enterprise OS). This
provides the best separation between the personal user space and
enterprise workspace. However,
this solution suffers from great
performance degradation due to
T1 overhead.
A type 2 (T2) hypervisor can also
be used to provide system separation. In this case, the hypervisor
runs on top of the original mobile
device OS, while the enterprise
workspace runs as a VM on the hypervisor. An example of this design
is the VMWare Mobile Workspace
(www.vmware.com/mobile-secure_______________________
desktop/overview).
This solution
____________
provides more flexibility and is
more user friendly, because the
user can simply install the hypervisor as an app in the original OS.
However, the enterprise workspace
will be at risk if the original OS is
compromised.
To enhance system performance,
OS virtualization can be used to
provide light-weight separation.
In this case, kernel-level device
namespaces are created to provide
data isolation and hardware resource (device driver) multiplexing,
allowing multiple virtual mobile devices to run on a single OS instance.
An example of this design is Cells
from Columbia University.7 OS virtualization can improve the system
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
THE WORLD’S NEWSSTAND®
performance compared to hardware
virtualization, but the adopter of
this technique should keep in mind
that both the personal user space
and enterprise workspace can be
compromised if an attacker targets
the OS kernel.
Dual boot. This possible solution
for device separation involves installing two OSs in different partitions on the same device. This
process is just like performing
traditional dual boots on desktops. Canonical provides a dual
boot app7 that modifies an Android device to let users switch between different OSs. OS dual boot
provides a clean separation, but
the long switching time degrades
usability.
phases. At the same time, they must
separate personal and organization data and clearly define device
requirements. Technologies that
support BYOD must be evaluated
based on performance, separation,
and usability. Management policies
for mobile devices and apps must be
inclusive, enforceable, and updated
ncluding BYOD security in corporate IT management policies is inevitable, and companies
must determine support capabilities,
educational needs, and deployment
www.whitehouse.gov/digitalgov/
bring-your-own-device.
7. C. Dall et al., “The Design, Implementation, and Evaluation of Cells:
A Virtual Smartphone Architecture,” ACM Trans. Computer Systems,
vol. 30, no. 3, 2012, article; ____
http://
doi.acm.org/10.1145/2324876.
2324877.
_____
To enhance system performance, OS virtualization
can be used to provide light-weight separation.
constantly. BYOD might come with
a high initial cost, but the payoff
should be worth it in the long run.
References
Virtual mobile platforms. The
Remotium Virtual Mobile Platform provides another way to
separate the personal user space
from the enterprise workspace
using the idea of remote control
(www.remotium.com).
This is
______________
similar to Microsoft Windows’ remote desktop connection. In the
Remotium solution, all enterprise
data and apps run in secure virtual
machines at Remotium’s or the
enterprise’s datacenter. Employees can then set up remote connections to the virtual machines
through a Remotium mobile client installed on each employee’s
mobile device. This is a simple and
effective approach to improve enterprise data security, because no
data is stored locally on the mobile
device. Note, however, that this solution requires a constant Internet
connection, and performance is
determined by the Internet speed.
I
1. “Insights on the Current State of
BYOD,” Intel, Oct. 2012; www.intel.
com/content/www/us/en/mobile______________________
c_____________________
omputing/consumerizationenterprise-byod-peer-research_____________________
paper.html.
_______
2. “Achieving Success with a Flexible
Workplace: 2012 IBM Flexible Workplace Study,” IBM Center for Applied
Insights, May 2012; http://www.
935.ibm.com/services/us/en/it______________________
services/workplace-services/flexible_____________________
workplace.
_____
3. “Fixing the Disconnect Between
Employer and Employee for BYOD
(Bring Your Own Device),” Webroot, July 2014; www.webroot.com/
shared/pdf/WebrootBYODSecurity
_____________________
Report2014.pdf.
__________
4. V. Svajcer, “Sophos Mobile Security Threat Report,” SOPHOS, 2014;
www.sophos.com/en-us/medialibrary/
PDFs/other/sophos-mobile-security_____________________
threat-report.pdf.
__________
5. J. Hassell, “7 Tips for Establishing
a Successful BYOD Policy,” CIO,
17 May 2012; www.cio.com/article/
2395944/consumer-technology/
______________________
7-tips-for-establishing-a-success_____________________
ful-byod-policy.html.
_____________
6. “Bring Your Own Device,” The
White House, 23 Aug. 2012;
8. “Announcing Ubuntu and Android
Dual Boot Developer Preview,” Ubuntu, 23 Dec. 2013; http://developer.
ubuntu.com/2013/12/announcing_____________________
ubuntu-and-android-dual-boot_____________________
developer-preview.
__________
J. Morris Chang is an associate professor at Iowa State University. His research
interests include cyber security, wireless
networks, and energy efficient computer
systems. He is a senior member of IEEE.
For further details, visit his webpage www.
___
ece.iastate.edu/~morris or contact him at
_____________
___________
morris@iastate.edu
Pao-Chung Ho is the Executive Vice
President of the Institute for Information
Industry, Taiwan. His research interests include embedded systems, database systems,
wireless communication networks, cybersecurity, and the Internet of Things. Contact
him at _________
pcho@iii.org.tw.
Teng-Chang Chang is a senior manager
in the Smart Network and System Institute
of the Institute for Information Industry,
Taiwan. His research interests include next
generation portable device, machine learning, and intelligent computer vision systems. Contact him at ___________
norman@iii.org.tw.
Selected CS articles and
columns are available for free at
http://ComputingNow.computer.org.
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
11
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
IT TRENDS
EDITOR: Irena Bojanova, University of Maryland University College, _______________
irena.bojanova@umuc.edu
© Tadeusz Ibrom | Dreamstime.com
Optimizing
Operational and
Strategic IT
Stephen J. Andriole, Villanova School of Business
Irena Bojanova, University of Maryland University College
T matters more today than
ever before, with companies
focusing on how technology
can help develop new products and services; find and excite
customers; support seamless communication among employees,
customers, suppliers, and partners;
and provide a secure computing
and communications infrastructure. Companies’ dependency on
IT will only grow as more business
models and processes are digitized.
Strategic technologies—social media platforms, data analytics tools,
and location-awareness apps—can
help find and profile customers,
suppliers, and partners. Similarly,
cloud computing, biometric security, and virtual computing
technologies can provide effective
operational infrastructures.
Here, we explore seven operational and strategic technology
capabilities and management practices, which are shaping today’s enterprise IT systems and applications.
I
Rent as Much as Possible
Companies are increasingly renting technology. According to the
Gartner Group, “the use of cloud
computing is growing, and by 2016
this growth will increase to become
12
IT Pro September/October 2014
the bulk of new IT spending.”1 The
cost equation is more than compelling: it’s generally far less expensive
to rent technology from the cloud
than to buy and install IT. Cloud
delivery is also support-free: companies that lease hardware and software never have to fix things when
they break or crash and are no
longer in the hardware or software
business. Those renting are more
than 90 percent satisfied.2
Some companies are already leasing everything from their cloud
providers, including operational
technology—email, word processing, spreadsheets, security, database management, and enterprise
resource planning (ERP)—and
strategic technology—customer
relationship management (CRM),
location-based services (LBS), learning management systems (LMS),
and predictive analytics. Cloud
technologies are maturing, which,
coupled with a greater awareness
of the potential benefits (and limitations), is driving the accelerated
adoption of cloud offerings.3
One of the major strengths of
cloud computing is the freedom
it provides companies to focus on
their business models and processes.
Instead of worrying about network
Published by the IEEE Computer Society
latency and server maintenance,
companies can focus on innovation,
sales, and marketing, among other
revenue-generating activities.
This focus on revenue generation will be further supported by
developments in interoperability
between clouds, allowing companies to scale a service across disparate providers, while the service
appears to operate as one system.
Cloud federation will also support
revenue generation by interconnecting cloud services of different providers and from disparate
networks. This will let a provider
rent computing resources to other
providers to balance workloads
and handle spikes in demand.4
Encourage BYOD
The Bring Your Own Device
(BYOD) technology delivery model lets employees use whatever
technology they want—especially
if it reduces technology costs and
increases productivity.
Companies are offering annual
stipends to help reduce the cost
of the technology employees prefer. Over time, many companies
will dramatically reduce and then
completely eliminate their employee technology budgets.5
1520-9202/14/$31.00 © 2014 IEEE
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
THE WORLD’S NEWSSTAND®
po
o
te
te c h s up
d
ce
er
%!
s
%!$
% %! "
% Business
operations
Se
%" %
%#
n
tio
el key b a n
a
lic
ot
p
Ap
m er s e r v i
H
to
% management
n
ck s c an
%
service
ns
S
to
io
a
ct
nd
n
Fu
tic k et b
ts
uc
od
rt
Pr
Rem
nt
e
or
ct
Data is now created by everyone—
vendors, customers, suppliers, partners, managers, executives, bloggers,
and anyone else who would like to
offer insights, solve problems, or
purchase products and services.
Organizing, analyzing, and managing all this data is an emerging core
competency.
The goal is real-time descriptive, explanatory, predictive, and
prescriptive data, information,
and knowledge about internal
and external processes and performance. The torrent of unstructured social media data has
overwhelmed conventional collection platforms: Google’s recent
unveiling of its Cloud DataFlow
Ev
Exploit Big Data Analytics
Cus
The objective is the thinnest,
most mobile devices possible. Although we still use desktops and
laptops, employees are increasingly using tablets, smartphones,
and other very “thin clients” to access local area networks, wide area
networks, virtual private networks,
and hosted applications, as well
as applications that run locally on
(some of) the devices. The economics are so powerful for thin
clients that we can expect the “fat”
corporate PC, and even the venerable laptop, to disappear from the
list of corporate technology assets.
BYOD will accelerate this trend.
There’s also a growing opportunity for businesses to exploit
the capabilities of wearables, such
as Google Glass, Apple’s iWatch,
and Plantronics’ Bluetooth headsets—among countless enabling
devices changing the way we
search, navigate, transact, and live
(see Figure 1). Next will be authentication pills and tattoos, and
the use of the human body for
data transmission.6 As the adoption of Internet of Things (IoT)
technology accelerates, wearables
will integrate, communicate, and
automatically transact.7
Figure 1. Opportunities for the business operations sector to exploit
wearables. (Source: Beecham Research. See the full chart at www.
____
beechamresearch.com/article.aspx?id=20.)
_____________________________
technology is one answer to the
challenge of real-time analytics—
and it’s validation of the role that
analytics will play going forward.8
To remain competitive, all companies will invest heavily in analytics
and business intelligence (BI).
Mine Social Data
Social BI assumes that there’s value in connecting people willing
or anxious to collaborate through
their affinity with friends, colleagues, associates, places, products,
and brands. Customer service and
new product releases are especially
vulnerable to twittering.
Companies now worry about
what’s being said about them on
Facebook, Twitter, Tumblr, Instagram, Trip-Advisor, and countless other social media sites. Some
companies just listen but others
extract meaning and purpose
from social content. Put another
way, companies need to not only
know what people are saying
about them, but why they’re saying what they’re saying—and the
response implications of the conversations on products, services,
and strategies. This is social BI.
Exploit Location Data
Location awareness fundamentally
alters business processes across
multiple functional areas, but especially in sales and marketing.
The key is to define location-based
services and discover what requirements the technology can satisfy.
For example, retailers have a vested interest in knowing the physical
location of their customers. They
want to know their customers’
movement patterns so they can
correlate locations with a variety of
attributes, such as time of day, age,
gender, wealth, and race, among
other variables. The next step is to
infer from that data precisely how
to engage that customer with the
right communications and offers.
Location-awareness thus fuels and
enables customer analytics.
The relationship between analytics, social media, and locationawareness is clear—and cumulative,
especially when location awareness
is integrated with BYOD, mobility, and cloud computing. Uber, a
rideshare, taxi, and taxi-alternative
app, is perhaps the perfect example
of this phenomenon (https://www.
________
uber.com).
Within minutes, Uber
_______
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
13
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
IT TRENDS
connects a customer (using a mobile phone) with the driver of a taxi,
private car, or rideshare program in
cities around the world.
Use Crowdsourcing
Expertise was never confined within the corporate firewall. While
companies hope to have the best
and the brightest employees solving their problems, there are always other qualified professionals
who don’t work at the company.
Today, we have the opportunity to
look to “the crowd” for help.
Vast amounts of data are being generated by in-house people
and devices, but there’s also lots of
data, ideas, and solutions available
from the crowd.7 Crowdsourcing
is a relatively new problem-solving
model. The Internet makes it possible to connect problem-creators
with problem-solvers instantly and
continuously. Small, medium, and
large companies solve problems
alongside individual contributors
and freelancers. But the definition of
“problems” is wide. In fact, there are
many crowdsourcing models that
companies can use to solve problems, perform specific tasks, and
even brainstorm. Innocentive (www.
___
innocentive.com) describes how
companies such as Coca-Cola, Unilever, Nokia, Anheuser-Busch, and
General Mills are using the crowd to
solve important problems.9
Federate
In the 20th century, technology
governance was largely about technology standards and centralized
control. As we moved into the 21st
century, governance shifted from
centralized to federated governance.
Control shifted because many of
the opportunity areas discussed
here—BYOD, crowdsourcing, social BI, and other technologies—are
impossible to centrally control.
More importantly, companies realize that trying to control IT from
a single desk makes little strategic
14
sense. Although everyone agrees
that the management of operational and infrastructure technology
should be coordinated and efficient
(increasingly by a cloud provider),
very few companies with multiple
lines of business believe that control
should include strategic applications
that the businesses need to compete.
This means that there will be
“technologists” on all of the business teams. It means that there will
be sales technologists, marketing
technologists, finance technologists,
customer service technologists, innovation technologists, and supplychain management technologists,
among others, who understand
both business processes and
models and current and emerging
digital technology—and the potential opportunities IT presents for
business activities. This is the new
face of federation.
Operational IT—a company’s
technology infrastructure—will
move. But unlike what we describe
today as “business partners,” infrastructure professionals will move
to internal “corporate auditing”
offices. They will pursue a threepronged agenda: architecture, infrastructure, and security. After
IT moves to auditing, operational
IT—responsible for infrastructure
activities such as email, storage,
back-up, and recovery—will do
what operational IT does best: deliver secure, recoverable basic services as cheaply as possible (again,
increasingly with cloud providers),
“audited” by external partners.
The auditing department is also
the best place to locate cloud and
applications service level agreement (SLA) negotiations and management. Because procurement is
often part of the larger audit team,
it’s a natural place to locate cloud
SLA management. The opportunity here is to reorganize technology activities to empower business
units through the federation of IT
rights and responsibilities.
T’s changing—again. But this
time, it’s not about bottom-up
enabling technology that satisfies old and “emerging” business
requirements. Today, IT is about
the integration of emerging business models and technologies. IT
is now an equal partner with the
business—and that partnership is
now permanent.
Perhaps the most intriguing aspect of IT’s new role is its organization and management. Cloud
delivery has fundamentally and permanently changed the relationship
between business processes and
models and current and emerging
technology. It’s also changed the
way companies acquire, deliver,
support, and measure IT. All seven
of the opportunity areas discussed
here can be pursued without internal IT bureaucracies or even
business unit budget constraints.
(That said, there will be some selected applications that traverse the
enterprise that will require at least
some federated, if not centralized,
governance.)
While the seven areas offer exciting possibilities, within five
years, there will be a whole new
set of possibilities. Technology will
continue to enable business models and processes, just as business
models and processes will stimulate the development of new technologies. The interplay between
business and technology will be
more complete and continuous.
Of course, concerns about security, privacy, trust, and control must
be taken seriously, and regulation
must occur at all levels.
I
References
1. “Gartner Says Cloud Computing Will
Become the Bulk of New IT Spend by
___
2016,” DABCC, 28 Oct. 2013; www.
dabcc.com/article.aspx?id=26469.
2. “Adoption of Cloud Computing
Continues Upward Trend as a
Mainstream IT Deployment Option,” Cloud Industry Forum, 2014;
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
THE WORLD’S NEWSSTAND®
http://cloudindustryforum.org/news/
_____________________
502-adoption-of-cloud-computing-
3.
4.
5.
6.
continues-upward-trend-as-a_____________________
mainstream-it-deployment-option.
____________________
S. Murugesan and I. Bojanova, “The
Rise of the Clouds: Progress and
Prospects,” Computing Now, Aug.
2014; www.computer.org/portal/web/
computingnow/archive/august2014.
_____________________
I. Bojanova, “Cloud Interoperability
and Federation,” blog, 8 Aug. 2013;
www.computer.org/portal/web/
Irena-Bojanova/content?g=597056
_____________________
4&type=blogpost&urlTitle=cloud_____________________
interoperability-and-federation.
___________________
“Cisco Study: IT Saying Yes to BYOD,”
Cisco, 16 May 2012; http://newsroom.
cisco.com/release/854754/CiscoStudy-IT-Saying-Yes-To-BYOD.
__________________
I. Bojanova, “Future of Mobility and
its Impact to Cloud,” blog, 28 Mar.
Computer Systems
Engineer:
M-F/8-5/40hr.wk. Design & develop solutions to complex interfaces b/t hardware &
software, operational & performance reqs. of
overall systems; define user & system objectives; assess compatibility, portability, scalability & cost of systems data, hardware, software
& emerging tech.; draft detailed org. reports;
propose design concepts/changes, project
schedules, budgets & integrate complete systems; create & reverse engineer SAP ECC6.0
Dialog Programs & Smart Forms; develop
queries for User Groups, Info. Sets; ALV; proficiency in tech. support for SAP environ (FI/
CO, MM, PP & SD, develop BAPIs, ABAP RICEF,
Dictionary), ORACLE, SQL & SAP Databases,
RFC Communication Mechanisms, ALE, IDOC,
Office 365, SharePoint & Crystal Reports. Req.:
B.S. in Computer Systems Engineering + 5 yrs.
of Computer Systems exp. Submit resume w/ad
copy to: Kim Tarzian, Rioglass Solar Inc., 13351
W. Rioglass Solar Rd., Surprise, AZ 85379.
2014; www.computer.org/portal/web/
Irena-Bojanova/content?g=5970564
_____________________
&type=blogpost&urlTitle=future-of_____________________
mobility-and-its-impact-to-cloud.
___________________
7. I. Bojanova, G. Hurlburt, J. Voas,
“Imagineering an Internet of Anything,” Computer, June 2014, pp. 72–77;
www.computer.org/csdl/mags/co/
2014/06/mco2014060072-abs.html.
_____________________
8. F. Lardinois, “Google Launches Cloud
Dataflow, A Managed Data Processing Service,” TechCrunch, 25 June 2014;
http://techcrunch.com/2014/06/25/
google-launches-cloud-dataflow-a_____________________
managed-data-processing-service.
___________________
9. “5 Examples of Companies Innovating with Crowdsourcing,” Innocentive, 18 Oct. 2013; www.innocentive.
com/blog/2013/10/18/5-examples_____________________
of-companies-innovating-with_____________________
crowdsourcing.
________
Stephen J. Andriole is the Thomas G.
Labrecque Professor of Business Technology
at the Villanova School of Business at Villanova University, where he teaches courses
in strategic IT, emerging technologies, and
innovation and entrepreneurialism. Contact
him at __________________
stephen.andriole@villanova.edu and
through LinkedIn.
Irena Bojanova is a professor and program director of Information and Technology Systems at University of Maryland,
University College. Read her cloud computing blog at www.computer.org/portal/
web/Irena-Bojanova.
___
____________ Contact her at irena.
bojanova@umuc.edu and through LinkedIn.
___________
Selected CS articles and
columns are available for free at
http://ComputingNow.computer.org.
CONFERENCES
in the Palm of Your Hand
Let your attendees have:
tDPOGFSFODFTDIFEVMF
tDPOGFSFODFJOGPSNBUJPO
tQBQFSMJTUJOHT
tBOENPSF
5IF DPOGFSFODF QSPHSBN NPCJMF BQQ
XPSLT GPS Android EFWJDFT iPhone
iPadBOEUIFKindle Fire.
'PS NPSF JOGPSNBUJPO QMFBTF DPOUBDU
$POGFSFODF1VCMJTIJOH4FSWJDFT$14
BU
cps@computer.org
__________
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
15
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
GUEST EDITORS’ INTRODUCTION
From BYOD to
BYOA, Phishing,
and Botnets
Seth Earley, Earley & Associates
Robert Harmon, Portland State University
Maria R. Lee, Shih Chien University
Sunil Mithas, University of Maryland
he consumerization of corporate IT
systems is a relatively recent development that has hit IT organizations
seemingly out of the blue. One day,
desktop computers were provisioned for users,
and applications were carefully vetted and controlled. The next thing CIOs knew, they were
dealing with laptops, smartphones, tablets, and
a raft of new tools and technologies that presented significant security, reliability, and IP
protection challenges.
Moreover, users have come to expect an information experience on par with that of their
personal lives. Google, Facebook, LinkedIn,
Twitter, Pinterest, Skype, and Dropbox are
examples of applications that have infiltrated
the enterprise’s IT infrastructure—whether as
an extension of personal productivity applications or as new social-engagement platforms
for the business side of the organization. Even
for organizations whose policies and firewalls have kept external applications out of
the internal information landscape, the game
has changed. Users have higher expectations
about the ease and speed of information access
and the user friendliness of systems required
for their jobs.
T
16
IT Pro September/October 2014
Clearly, new policies must be enacted and new
tools deployed to reduce risks and keep up with
growing user expectations, but balancing accessibility and security has proven to be a significant
challenge.
Redefining Enterprise IT
This issue of IT Professional touches on a number
of these topics. In “Consumerization in the IT Service Ecosystem,” Enrique Castro-Leon observes
that the trend has redefined IT in the enterprise:
“Consumerization has brought an inversion of
roles where now users are driving technology
adoption and change.” The consumerization of IT
is, in part, being pushed by a younger, more mobile
workforce comprising active users of new technologies and applications. Employees expect to use
their personal devices—and applications—at work,
which relates to the concept of BYOX—Bring Your
Own Device, Cloud, App, and Network. Instead of
new technology flowing down from the business
to the consumer, as it did with the desktop computer, the flow has reversed. The consumer market
often gets new technology before it enters (and is
fully leveraged by) the enterprise.
This blending of personal and business
technology is having a significant impact on
Published by the IEEE Computer Society
1520-9202/14/$31.00 © 2014 IEEE
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
THE WORLD’S NEWSSTAND®
corporate IT departments, which traditionally
have governed, deployed, and controlled the
technology that employees use to do their
jobs. Consequently, IT departments must decide how to protect their networks and manage
technology that they perhaps didn’t procure
or provision.
Castro-Leon goes on to point out that users
and the employee community don’t share this
concern: they continue to use their devices as they
have in the past, and they expect them to work
equally well in corporate settings. Indeed, users
want their information experience to be seamless,
transparent, and portable, just as they do in the
rest of their world. Google, Apple, and Facebook—
you’ve spoiled our users forever.
More fundamentally, this drive for BYOD
and consumer-focused IT is emblematic of a
larger societal trend facilitated by technology.
There has been a shift to part-time, transient,
and specialized professional workers. Just as a
tradesman used to bring his or her tools to the
shop floor at the start of the industrial revolution, the independent contractors filling roles
in IT shops, as well as other professionals, are
now beginning to bring their own laptops and
devices.
Casto-Leon thus also explores how our economy has shifted to value networks and highly
interrelated trading partners. As organizations
provide infrastructure that’s in the cloud, and
as information systems transmit data across
multiple organizations in a value chain, the
boundaries of the enterprise shift and become
blurry—especially when software is consumed
through cloud-based and hosted application
providers. Castro-Leon describes the shift from
monolithic to componentized applications, then
to Web-services-based applications, service networks, and composite applications, which makes
apparent the natural evolution of and connection to BYOD and BYOA (Bring Your Own App),
especially as we enter the next evolution of the
Internet of Things.
Enforcing Security and Privacy
The flip side of the externalization of software
applications and functionality lies in the social component. Services architectures facilitate
human-to-machine and human-to-human interactions. The latter allows for opportunities
for the attackers to exploit vulnerabilities due
to human nature and the complexity of online
social networks, as discussed in “Trust and Privacy Exploitation in Online Social Networks,”
by Kaze Wong, Angus Wont, Alan Yeung, Wei
Fan, and Su-Kit Tang.
In addition to discussing issues around complex
privacy settings and the inconvenience caused by
enforcing security (which reduces sharing among
users), the authors observe that
t the strength of your security level is as weak
as that of your friend with the lowest level, and
t your data can be inferred even if you don’t
disclose it.
Furthermore, attackers have another significant opportunity to access user data: “An app
that looks like an interesting game might be
designed with the primary purpose of collecting your data. When installing such an app,
Online social networks present
a tremendous opportunity for
attackers to steal information,
spread viruses, and wreak havoc
on unsuspecting users.
you might have given the ‘game’ permission
(intentionally or unintentionally) to access your
profile, albums, and friends list.” Indeed, how
often do we casually give apps permission to access various information sources and systems
on our devices?
From malware to spam, scam, and phishing
(the authors site evidence that 70 percent of the
spam on Facebook leads to phishing websites),
to botnets, identity forgery, and excess permissions from application installation, online social
networks present a tremendous opportunity for
attackers to steal information, spread viruses, and
wreak havoc on unsuspecting users.
In case you think this is just theory, the authors present an experiment that illustrates five
attack approaches: malware, phishing, botnet,
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
17
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
GUEST EDITORS’ INTRODUCTION
identity forgery, and excess permission requests.
Although the experiment didn’t cause any harm,
the approach persuaded 97 percent of users who
installed the Facebook app to give the app permission to analyze their newsfeeds. In addition,
27 percent were tricked into a simulated upgrade
of a flash plug-in from a fake YouTube site, which
was potentially (not actually) malicious software.
The excess permissions allowed a social graph
containing almost 20,000 users, even though the
app was installed by only 276 people (with the
added bonus of social network analysis to identify hubs for more effective malware marketing).
Because users access their social networks on
the same devices that they bring to work, online
social networks can easily become a vector for
attacks on corporate data and system security
breaches.
Increasing yet Controlling
Accessibility
This issue also features related Data Analytics
and Securing IT departments, both of which
emphasize the need for enterprises to raise the
bar on usability and information access while
simultaneously establishing and monitoring
personal device usage, security, and access policies. These goals seem in opposition—on one
hand, increasing accessibility of information,
and on the other, controlling that accessibility
and dissemination. The trick is to use transparent approaches and a light touch, rather than
intrusive approaches that will only encourage
workarounds, by leveraging hardware monitoring and management technologies to isolate
corporate networks from malware and network
intrusions.
In addition to policy development, several classes of technology help IT organizations proactively
manage mobile device security threats, including
virtualization, walled gardens, and limited separation through a variety of mechanisms that allow
access of corporate and personal data on the same
device. Although these approaches are complex,
they provide viable mechanisms for dealing with
the inevitable mix of corporate and personal technologies, letting the enterprise reap the productivity benefits offered by BYOD while effectively
mitigating risks and threats.
The goal is to give users the information they
need, on the devices they use, from wherever they
18
work. That is the consumerization trend driven
by the macro forces of societal and technological
shifts.
he world has changed. This new world of
IT provides interesting opportunities and
challenges for organizations and IT professionals to deliver industrial grade “SAP-reliable”
services while keeping them “Google fast” and
“Apple simple.”1
T
Reference
1. H. McIlvaine, “SAP: Apple Simple, Google Fast,”
SAP News Center, 9 Nov. 2011; www.news-sap.
com /core-innovation-mobile-in-memor y-cloudsnabe.
____
Seth Earley is CEO of Earley & Associates (www.earley.
com).
He’s an expert in knowledge processes and customer
__
experience management strategies. His interests include customer experience design, knowledge management, content
management systems and strategy, and taxonomy development. Contact him at __________
seth@earley.com.
Robert R. Harmon is a professor of marketing and service innovation and Cameron Research Fellow at Portland
State University. His interests include IT-enabled service
innovation, technology marketing, and big data marketing.
Contact him at ___________
harmonr@pdx.edu.
Maria R. Lee is an associate professor in the Department of Information Technology and Management
at Shih Chien University, Taiwan. Her research interests include social media analytics, e-commerce, and
knowledge management. Contact her at _________
maria.lee@g2.
usc.edu.tw.
_______
Sunil Mithas is a professor at the Robert H. Smith School
of Business at the University of Maryland. His research
focuses on the strategic management and impact of information technology resources. Contact him at __________
smithas@rhsmith.
umd.edu.
_____
Selected CS articles and columns are available
for free at http://ComputingNow.computer.org.
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
CALL FOR PAPERS
39th Annual International
Computer, Software
& Applications Conference
July 1-5, 2015
Tunghai University
Taichung, Taiwan
www.compsac.org
COMPSAC 2015 Symposium on IT in Practice (ITiP)
COMPSAC is the IEEE Signature
Conference
on
Computers,
Software, and Applications. It
PZ H THQVY PU[LYUH[PVUHS MVY\T
for
academia,
industry,
and
government to discuss research
results, advancements and future
trends in computer and software
technologies and applications.
With the rapidly growing trend in
making computation and data both
mobile and cloud-based, such
systems are being designed and
deployed worldwide. However,
several challenges arise when they
are applied to different domains or
across domains. COMPSAC 2015
will provide a platform for in-depth
discussion of such challenges in
emerging application domains such
as smart and connected health,
wearable computing, internet-ofthings, cyber-physical systems,
and smart planet.
Important Dates:
January 17, 2015: Paper submissions
4HYJO!7HWLYUV[PÄJH[PVUZ
April 28, 2015: Camera-ready version
and registration due
This new COMPSAC symposium on IT in Practice (ITiP) is directed towards
the interests and needs of IT practitioners, application developers, IT
managers, and CXOs from business, industry, and government, as well
as academics and researchers. The symposium, co-sponsored by IT
Professional, is an interactive forum for sharing and gaining valuable
insights and experiences and for active engagement among technical
professionals around the globe. It aims to inspire professionals, executives,
and researchers to focus on diverse elements necessary to successfully
HYJOP[LJ[KLZPNULUNPULLYJVUÄN\YLHUKÄLSKHYHUNLVM0;HWWSPJH[PVUZPU
several domains. Topics of interest include the following:
‹
‹
‹
‹
‹
‹
‹
‹
‹
Innovative & challenging IT applications
Deploying and managing large scale IT systems
Real world issues, concerns & challenges
Development & operational experiences
IT application design & validation
Emerging trends in enterprise IT
Strategic alignment of IT
IT workforce & IT workplace
Managing IT in practice
‹
‹
‹
‹
‹
‹
‹
Opportunties & challenges of
C-level positions
Operational issues & insights
Crowd sourcing problems &
solutions
The research-practice nexus
IT-enabled business innovation
Case studies
Future perspectives
Authors are invited to submit original, unpublished research work and novel
computer applications in full-paper format. Simultaneous submission to other
publication venues is not permitted. The review and selection process for
submissions is designed to identify papers that break new ground and provide
Z\IZ[HU[PHSZ\WWVY[MVY[OLPYYLZ\S[ZHUKJVUJS\ZPVUZHZZPNUPÄJHU[JVU[YPI\[PVUZ
[V[OLÄLSK:\ITPZZPVUZ^PSSILZLSLJ[LK[OH[YLWYLZLU[HTHQVYHK]HUJLTLU[PU
[OLZ\IQLJ[VM[OLZ`TWVZPH[V^OPJO[OL`HYLZ\ITP[[LK(\[OVYZVMZ\ITPZZPVUZ
with a limited contribution or scope may be asked to revise their submissions
into a more succinct camera-ready format; e.g., workshop paper, fast abstract,
or poster to the main conference.
ITiP Symposium Co-Sponsored by:
Contact ITiP Symposium organizers
at cs_compsac-ITiP-2015@iastate.edu
_______________________
COMPSAC Sponsors:
www.compsac.org
COMPSAC Technical Co-Sponsors:
COMPSAC 2015 Local Host:
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
CONSUMERIZATION OF IT
Consumerization
in the IT Service
Ecosystem
Enrique Castro-Leon, Intel
Most available literature on IT consumerization focuses on current
practices. Exploring the driving forces behind consumerization is
essential, however, if IT organizations are to make sense of the current
dynamics of transformation and disruption and formulate effective
strategies in response.
T consumerization—also known as bring
your own device (BYOD)—refers to the practice of employees using mobile devices (such
as smartphones, tablets, or laptops) for work
activities in the workplace, at home, or while
traveling.1 BYOD can also involve bring your own
app (BYOA),2 and both practices are transforming IT by redefining its role in the enterprise. IT,
once a centralized technology purveyor, assessor,
and gatekeeper of information, is now becoming a facilitator in a more federated environment.
Consumerization has brought an inversion of
roles, where now users are driving technology
adoption and change.
This transformation hasn’t come without challenges,3 but it presents new opportunities for IT
departments to address requirements for increased
I
20
IT Pro September/October 2014
efficiency and nimbleness. BYOD practices can
also help organizations adapt to cultural change
and address the needs of the millennial generation,4,5 which expects devices to work and deliver
value in a corporate setting just as in a personal
setting. IT consumerization is thus a topic of interest to CIOs, CTOs, and solution architects alike.
However, most available literature focuses on
current practices—operational aspects1 or the
disruptive effects of BYOD policies.6 Exploring
the driving forces behind consumerization is an
essential exercise to make sense of the current
transformation and disruption dynamics and
ensure that IT continues delivering value to the
enterprise. Here, I briefly review two such forces—the changing relationship between workers
and employers and the redefining of enterprise
Published by the IEEE Computer Society
1520-9202/14/$31.00 © 2014 IEEE
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
THE WORLD’S NEWSSTAND®
boundaries, both of which have been amply
documented.2,7 Then, I delve further to identify
a third, more fundamental force behind this
transformation—the move to a service-oriented
economy.
Revising the Worker-Employer
Relationship
The first force driving BYOD policies is the
changing relationship between workers and employers. The enterprise workforce has become
more diverse, especially in the wake of the financial sector’s 2008 crisis. In the last six years,
there’s been an increase in the number of transient staff8 —that is, contractors from workforce
augmentation agencies and service providers,
such as Volt and Kelly Services, as well as independent professionals and part-time employees.
The number of full-time employees—the traditional audience for IT services—is getting proportionately smaller,9 aided by the parallel trend
of cloud computing, which is the outsourcing of
infrastructure.
Members of this more transient workforce
bring their own tools. Relatively short tenures
mean that it’s not practical for these professionals to adopt the company’s existing tools and
processes. Temporary teams might bring tools
they’re comfortable with—such as tools for
project tracking and management or customerrelations management (CRM)—and use them
outside the IT department’s purview. Because
establishing a local infrastructure wouldn’t be
practical, such tools are usually based on software as a service (SaaS) and accessed through
mobile devices.
Even when corporate applications and data are
involved, employees entering the workforce, especially temporary employees, place less value on
corporate-issued tools and would rather use their
own devices—particularly if they’re temporary
employees.7 This puts an enormous amount of
pressure on IT departments to address these requests and support personal devices.
Redefining Enterprise Boundaries
The second force driving the consumerization of
IT is the rapidly shifting definition of enterprise
boundaries. Today, large corporations, such as
aircraft and automobile manufacturers, have
effectively become gigantic systems integrators
managing complex supply chains. Smaller companies follow the same dynamic to a lesser degree or participate in various supply networks.
A highly diverse community thus routinely accesses corporate applications and data. When application components or whole applications, such
as email messaging, get outsourced to the cloud,
the notions of what’s inside or outside the enterprise become blurry, with corporate processes
using resources beyond the traditional enterprise
perimeter.
In this environment, the diverse user community isn’t concerned about distinguishing
between internal and external resources; users expect to use the devices, data, and tools in
the same way they always have. Effectively, IT
no longer has control over devices that connect
with corporate data and applications. A heavyhanded approach to managing BYOD practices
will likely alienate users, who will ultimately
sidestep IT altogether. This quandary has no
A heavy-handed approach to managing
BYOD practices will likely alienate
users, who will ultimately sidestep IT
altogether.
simple solutions, but it’s important in understanding the dynamics behind this move to
consumerization.
Transitioning to a
Service-Oriented Economy
Both of the forces just described are in fact being
driven by a third, more fundamental transformation in the economy—the long-term and apparently irreversible transformation of the industry
moving away from a manufacturing- and product-centric focus. With globalization, the world
economy has instead become service-oriented.
For all advanced economies, the economic value
from financial, travel, legal, healthcare, and other
services exceeds that of manufacturing, agriculture, and extractive industries.
If we compare the GDP service component with
all other sectors as a metric, many countries made
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
21
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
CONSUMERIZATION OF IT
High-volume
servers
World
Wide Web
Shrink-wrapped
software vendors
Invented in 1989,12 the Web worked
because of three essential technology
components: HTML, URIs/URLs,
Desktop
PC computers
and HTTP, which allows informaIn-house
Service
tion exchange across the Web. Five
developers
networks
years later, the Web had been adopted
Independent
Laptop
across the world. The Web’s value is
software
SOA, corporate
computers
Cloud
in providing a universal, compatible
vendors
servicelets
service
human-to-machine interface that alproviders
lows access to data and applications
Third-party
across the Internet regardless of difservicelets
ferences in machine architecture.
The next step in technology evoluComposite
Mobile app
tion
occurred with the technical comcorporate apps
developers
(large IT)
munity’s realization that the Web was
Tablets
good not only for human-to-machine
API
manager
communication, but also for interopportals
Smart
erable machine-to-machine commudevices
nication. This realization led to the
SMB apps
development of Web services technol(small-scale IT)
ogy in the early 2000s. The services
came in two flavors: Simple Object
Consumer BYOD, BYOA
Sensor
Access Protocol (SOAP) and Repre(personal-scale IT)
networks
sentational State Transfer (REST).
Internet of Things
Finally, around 2007, service net(embedded IT)
works emerged, enabled by the ubiquitous adoption of the cloud. BYOD
Figure 1. The evolution of the service ecosystem, with main
is an example of a service network
milestones captured in the gold ovals. The left side shows the
application.
enabling hardware in blue, while the right shows in green the key
The gold ovals in Figure 1 repreactors that played a role in the service ecosystem’s evolution.
sent successive milestones in technology evolution, with enabling
hardware technologies shown in the blue boxes
this transition decades ago. For the US, it occurred
on the left and key actors shown in the green
in the years following the Second World War.10
boxes on the right. The Web allowed access to
According to the World Bank, in 2012, the service
increasingly large amounts of data stored in
sector represented about 79 percent of the US
high-volume servers by thousands and eventuGDP.11 Even for the People’s Republic of China—
ally millions of client computers—and today by
generally perceived as the premier manufacturing
billions of tablets and smart devices. As I now
country—the figure is 45 percent and increasing.11
describe, service networks’ emergence was initially facilitated by commonly accepted protocols
The Beginnings of Service-Oriented IT
and compatible software (including open source
The IT industry hasn’t been exempted from
software) running across Internet-connected
the transition to a service economy, but the remachines.
alignment started relatively late. The transformation to service-oriented IT, out of which
consumerization is a prime manifestation, can be
The Emergence of Service Networks
traced to three historical technology transitions:
Web services protocols allow programs and users
to access resources with just a URI. All negotiat the invention of the World Wide Web,
tion and handshaking between entities happen at
t the development of Web services technology, and
the time of access; this is called late binding. Witht the emergence of service networks.
out late binding, traditional systems required
Workstations
22
Web
services
Open source
software
vendors
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
THE WORLD’S NEWSSTAND®
Before
After
A1
A1
M
q
M
q
M
q
MqM
q
Corporate access
A3
A2
A3
A2
S7
S1
S5
S6
L1
L1’
L1’’
L2
L2’
L2’’
L3
L3’
L3’’
S2
S8
BYOD, BYOA access
S3
S9
S4
Enterprise perimeter
Cloud
Developer access
Figure 2. Transition from application stovepipes to service networks. Applications structured as vertical
stacks on the left get replaced by networks of service components on the right. Applications then must offer
multimodal access to employees using laptops, employees and temporary workers using their own devices,
and external developers, including mobile application developers.
significant context and configuration before any
information exchange was possible, introducing
considerable deployment overhead and restrictions. In order for these systems to work it was
necessary to compile all the source code together
or at least require that communicating entities
within the system use a narrow range of software
versions, possibly with components from the
same vendor. This state of affairs was obviously
unrealistic for Internet applications.
Systems that support late binding are said to
be loosely coupled. The traditional, strongly coupled application architectures mentioned earlier
must be assembled using a set of compatible
components. A new revision or a customization of an application might require a different
set of components, which might be functionally
equivalent but unable to function in both the
old and the updated environments. It’s also possible that one component can support only one
instance of the application, and therefore must
be replicated for each application instance. This
approach created unnecessary replication, bloat,
and complexity due to incompatible versions.
The availability of loosely coupled Web services allowed developers to factor out common
functions, which run as self-standing services.
An application needing the capability simply invokes that particular service.
In the initial state, in which strongly coupled
architecture was the norm—until early in the
decade of 2000—applications ran in stovepipes.
The left side of Figure 2 shows this initial state,
with three applications (A1, A2, and A3) that
each run a separate copy of the application on
dedicated hardware. With loosely coupled Web
services, capabilities common across multiple
stack instances are abstracted out in the form of a
service, implemented once, and accessed as a service. The duplicated stacks characterizing tightly
coupled, stovepiped applications morph into a
graph, with each node representing a coalesced
capability delivered as a service. The stovepipe
“forest” morphs into a service network (the right
side of Figure 2). Also, the enterprise perimeter
shrinks with fewer application instances, but
it also encompasses resources deployed in the
cloud. Finally, the re-architected application
must support multimodal access.
Each network node is a service component, or
servicelet, which is a self-standing application component accessible through a URI and discoverable
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
23
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
CONSUMERIZATION OF IT
through the Universal Description Discovery and
Integration (UDDI) registry using the Web Services Inspection Language (WSDL).
As Figure 2 shows, the three stack layers have
been re-architected as generic internal services
S2, S3, and S4 that can be sourced externally
(shown as S6, S8, and S9). Application A1 has
stringent security requirements and gets deployed with servicelets running in an internal
(private) cloud. Application A3 carries more
relaxed requirements and gets implemented as
a software-as-a-service (SaaS) application using
third-party sourced servicelets. Application A2 is
somewhere in between.
Servicelets are intended to be components
and thus might not be fully formed applications.
Today, servicelets typically run in a virtualized
environment hosted in a pool of servers. Operators can rebalance workloads across this pool by
managing how they’re launched or even by moving virtual machines around according to specific performance policies.
Service Component Externalization
and Composite Applications
Applications created from service components
are called composite applications; the architectural
style for building these applications is known as
a service-oriented architecture (SOA). As defined
in the mid-2000s, SOA’s primary goal is to radically reduce costs in IT delivery to the enterprise
by eliminating duplicate or redundant functions.
Specific functions are implemented just once
as a service, instead of instantiating a new copy
for every application. An example is Intel IT’s
Common Directory Information System (CDIS),
which is a repository of employee data. Applications that use employee data—such as payroll,
expense reporting, and the employee directory—
link to the CDIS.
Large organizations were the primary SOA
adopters. Because URIs are truly universal handles, it matters little whether the resource lives
inside or outside of the organization. IT departments thus realized that it wasn’t always desirable
or cost efficient to host generic services in house,
especially when such services were unrelated to
the organization’s line of business (as with email,
messaging, and even storage services).
The cloud’s emergence around 2007 was timed
perfectly to allow developers to realize the benefits
24
of service networks. A little-documented side effect of the transition to composite applications is
that, while service components might have begun
as in-sourced service components within enterprise boundaries, in reality, there were no fundamental reasons why they couldn’t be outsourced.
Applications such as payroll, expense reporting,
and job postings could be conveniently outsourced to third parties who could take advantage
of economies of scale to run the application at a
lower cost than if it were hosted in house.5
From Service Networks
to Consumerization
The externalization drivers just described were
purely economic: third parties offered servicelets
at a lower cost than the in-sourced equivalent due
to two factors. First, as hinted at earlier, providers specializing in a specific type of service could
develop skills and knowledge to build and deliver
these services more efficiently than corporate IT
departments. Second, a virtualized cloud infrastructure let IT amortize physical assets over a
larger customer base, which allowed economies
of scale well beyond that of a corporation’s few
internal clients. However, the involvement of
multiple parties has security and quality of service implications; solutions to such issues are
still works in progress (and beyond this article’s
scope). Still, the economics of composite applications are so compelling that these issues haven’t
deterred their deployment in areas in which the
risks are manageable.
The synergy between cloud and service networks
manifested in multiple back and forth movements
in offered capabilities. The first, as I described earlier, was the externalization of servicelets. A second
manifestation was in third parties offering fully
formed applications. Pioneering examples here include Web-based mail applications (such as Google
Mail and Yahoo! Mail) and Salesforce.com’s CRM
application. Figure 1 (center) shows how legacy
applications for large IT or corporate IT were reengineered as composite applications; initially,
the applications used internal servicelets, but they
eventually included third-party servicelets as well
when economics justified the replacement. As the
industry has experienced the learning curve with
composite applications, economies of scale have
been attained that have extended composite applications’ reach to audiences without the technical
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
THE WORLD’S NEWSSTAND®
savvy or deep pockets of large corporations. This
has gradually delivered service networks’ value to
small and medium businesses (SMBs) and individual consumers, ensuring their applicability for
small-scale IT and personal IT and leading to IT’s
democratization,13 as Figure 1 shows.
Servicelets have reached individual consumers
in the form of the thousands of applications available through Google Play, the Apple App Store,
and portals such as Dropbox. In this environment,
sales managers familiar with the Salesforce.com
CRM continue using their own accounts with their
teams, and team members use their personal tablet
smart devices to link to their manager’s account.
Assuming the IT department allows such practices, BYOA and BYOD is at this point achieved.
As Figure 1 shows, the appearance of API
manager portals14 facilitated this transition to
BYOD and BYOA. The underlying dynamic
is reverse externalization, in which in addition to
using external servicelets, organizations realize that exposing certain corporate applications
externally—both as servicelets and through selfcontained Web browser access—allows them to
activate additional revenue streams or increase
their marketplace presence. Examples include
travel reservation systems, supply chain networks, and shopping networks such as Amazon
or eBay, which have become the marketplace for
a vast network of sellers and resellers.
Such capabilities are accessible to third-party
developers through API manager portals that
make it relatively easy to build mobile front ends
to cloud capabilities. Front-end services have also
gone through a notable evolution, in which traditional PC Web access has been augmented to enable application access through mobile devices.
API managers become new integration points
of formerly internal functions hosted through
cloud service providers and hosting software
from independent software vendors. Mobile app
developers become the new integrators.
“Native” servicelets are intended to support
cloud-based composite applications. In practice,
however, it’s possible to “servitize” legacy applications, retrofitting them as servicelets by slapping an API on top of the application. Conversely,
software designed as a servicelet can be made to
behave as a self-standing application through a
thin GUI that calls the servicelet’s API (see the
right side of Figure 2).
The bottom line, as Figure 2 shows, is that
the re-engineered application must support
multimodal access—that is,
t traditional access by corporate employees,
t BYOD and BYOA access by the general public,
and
t app developers interacting through the company’s published interface in an API portal.
Once servicelets “escaped” into the wild as
third-party offerings available to any developer,
new business opportunities surfaced and developers started building applications that previously would have been created inside the enterprise.
Because the ecosystem involved is essentially the
whole computer industry, including corporate
and individual consumers, the rate of evolution
has accelerated quickly. Most new applications
don’t remain in use, but the ones that survive can
develop a customer base of hundreds of thousands in just a few months.
Consumerization developed in this context,
with a profound economic effect: expensive data
centers costing hundreds of millions to billions
of dollars delivered applications accessible to
consumers for at most a few dollars per month.
The audience for these applications grew from
a single corporate customer wanting a complete
solution stack built in-house to a few hundred
large corporations, which then grew to a few tens
of thousands of small and medium businesses
(SMBs) and then tens of millions of individual
users. Under the consumerization paradigm, individual users became familiar with these applications and brought them back to the enterprise,
completing a full circle.
A strong contributing factor here is the preferences of the millennial generation, which
is just entering the workforce and grew up in
this environment. From this perspective, it
makes perfect sense to continue this modality at work, using personal devices—whether a
mobile device or a PC client—to connect to the
cloud-based applications behind them. This
is what brings us to the notion of BYOD and
BYOA today.
What about tomorrow? BYOD is primarily
(and once again) human-to-machine interaction. There are inklings of a new circle starting
with machine-to-machine interactions in the
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
25
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
CONSUMERIZATION OF IT
form of an Internet of Things—that is, devices
such as printers, Web cams, and drones acting
as network nodes. Outsourced printers are becoming ubiquitous, with printers deployed on
premises, managed by a service provider as a
service, with the customer paying for the page
count.
hanges brought by IT consumerization
will likely redefine IT’s role. What we see
now is actually the proverbial tip of the
iceberg, driven by long-running trends of economics and technology evolution. The transition
to a service economy in advanced economies is
fundamentally changing relationships between
organizations and workers and, in the process,
transforming how IT is delivered to constituents.
Consumerization also reflects the blurring of enterprise boundaries, in part due to these changing
relationships.
So, do IT departments risk irrelevance, becoming the caretaker of an ever-shrinking core
of enterprise capabilities while business units
meet their own technology needs through thirdparty services? A risk, yes. A predestined outcome? Not necessarily, given the appropriate
strategy. Outcomes from prior crises have demonstrated that IT can transform itself and deliver
better business value to the enterprise than a freefor-all alternative. This occurred in the early
1990s, when the glacial rate of development and
deployment of mainframe-based applications led
business units to started running spreadsheets on
shrink-wrapped software outside of IT’s purview.
At that point, the industry adopted client-server
and three-tier architectures on volume servers. A
second crisis was the crash in demand after the
Y2K crisis ended. IT’s response was higher efficiencies through a restructuring of applications behind the service paradigm and taking advantage of
cloud technology. Consumerization is a reflection
of these economic efficiencies now reaching individual consumers, who might also be employees.
Finally, consumerization must be recognized
as a strategic trend; looking at it solely from a
tactical approach—as end points to be managed
and regulated, for example—would be ineffective. Organizations have an opportunity to rethink current processes and look for new value
vectors and partnerships with the business.
C
26
For example, with increasing process maturity,
BYOD and BYOA instances can be integrated
into current Business Process Model and Notation (BPMN) and Business Process Execution
Language (BPEL) activities to determine how
they dovetail into existing workflows, providing objective criteria to distinguish useful applications from the frivolous. Today’s state of
the art doesn’t allow an implementation of this
capability.
Rethinking current technology adoption strategies and putting retraining plans in effect won’t
be an easy path, but it will allow IT departments
to continue delivering value to the enterprise—
and therefore ensure its continued relevance.
References
1. Bring Your Own Devices Best Practices Guide: A Practical Guide for Implementing BYOD Programs at Your
Organization, Good Technologies/Dell Inc., 2012;
http://i.dell.com /sites/doccontent /business.smb/
sb360/en
/Documents/good-byod-best-practices________________________________
guide.pdf.
______
2. J. Bughin, A.H. Byers, and M. Chui, “How Social
Technologies Are Extending the Organization,”
McKinsey Quarterly, Nov. 2011; www.mckinsey.com/
insights/high_tech_telecoms_internet/how_social_
________________________________
technologies_are_extending_the_organization.
____________________________
3. C. Boulton, “Failed iPAD Experiment Shows BYOD
Belongs in Schools,” blog, The Wall Street J., 15 Oct.
2013; http://blogs.wsj.com/cio/2013/10/15/failed-ipad____________________________
experiment-shows-byod-belongs-in-schools.
__________________________
4. A.M. Cullen, “BYOA is the New BYOD,” blog,
MobileIron, 3 Aug. 2013; www.mobileiron.com/en/
smartwork-blog/enterprise-mobility-management________________________________
byoa-new-byod.
_________
5. E. Castro-Leon, J. He, and M. Chang, “Scaling
Down SOA to Small Businesses,” Proc. IEEE Int’l
Conf. Service-Oriented Computing and Applications, 2007,
pp. 99–106.
6. Justyn Howard, “Why BYOA is Killing Your Social
Media Efforts,” Huffington Post, 23 April 2013; www.
___
huffingtonpost.com/justyn-howard/bring-your-own________________________________
apps-social-media_b_3141414.html.
_____________________
7. The Consumerization of IT: The Next Generation CIO,
report, Center for Technology Innovation, PriceWaterhouseCoopers, Nov. 2011; www.pwc.com/us/
en/technology-innovation-center/consumerization________________________________
information-technology-transforming-cio-role.jhtml.
________________________________
8. Elizabeth G. Olson, “The Rise of the Permanently
Temporary Worker,” Fortune Magazine, 5 May 2011;
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
9.
10.
11.
12.
13.
14.
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
http://for
tune.com /2011/05/05/the-rise-of-the________________________________
permanently-temporary-worker.
___________________
W. Goodwin, “IT Departments to Shrink Dramatically Within Five Years as Cloud Takes Over,” ComputerWeely.com, 17 June 2013; www.computerweekly.
com/news/2240186146/IT-departments-to-shrink________________________________
dramatically-within-five-years-as-cloud-accelerates.
_______________________________
Z. Kenessey, “The Primary, Secondary, Tertiary and
Quaternary Sectors of the Economy,” Review of Income
and Wealth, vol. 33, no. 4, 1987, pp. 359–385.
The World Bank, Services, etc., Value Added (% of GDP),
World Development Indictors, 2009–2013; http://
____
data.worldbank.org/indicator/NV.SRV.TETC.ZS.
______________________________
History of the Web, World Wide Web Foundation;
www.webfoundation.org/vision/history-of-the-web.
E. Castro-Leon, J. He, and M. Chang, The Business
Value of Virtual Service Grids, Intel Press, 2008.
Leverage the Power of APIs to Turbocharge Your Mobile
Strategy, white paper, Intel, 2014.
Enrique Castro-Leon is an enterprise architect and technology strategist with the Intel Data Center Engineering
Group. His research interests include enterprise IT solution integration, cloud and service engineering, and internal
processes for organizational transformation under emerging
service paradigms enabled by cloud computing. He is the lead
author of The Business Value of Virtual Service Grids:
Strategic Insights for Enterprise Decision Makers
(Intel Press, 2008) and Creating the Infrastructure
for Cloud Computing: An Essential Handbook for
IT Professionals (Intel Press, 2011). Castro-Leon has a
PhD in electrical engineering from Purdue University. Contact him at enrique.g.castro-leon@intel.com.
__________________
Selected CS articles and columns are available
for free at http://ComputingNow.computer.org.
EXECUTIVE STAFF
PURPOSE: The IEEE Computer Society is the world’s largest association
of computing professionals and is the leading provider of technical
information in the field.
MEMBERSHIP: Members receive the monthly magazine Computer,
discounts, and opportunities to serve (all activities are led by volunteer
members). Membership is open to all IEEE members, affiliate society
members, and others interested in the computer field.
COMPUTER SOCIETY WEBSITE: www.computer.org
Next Board Meeting: 16–17 Nov. 2014, New Brunswick, NJ, USA
EXECUTIVE COMMITTEE
President: Dejan S. Milojicic
President-Elect: Thomas M. Conte; Past President: David Alan Grier;
Secretary: David S. Ebert; Treasurer: Charlene (“Chuck”) J. Walrad; VP,
Educational Activities: Phillip Laplante; VP, Member & Geographic
Activities: Elizabeth L. Burd; VP, Publications: Jean-Luc Gaudiot; VP,
Professional Activities: Donald F. Shafer; VP, Standards Activities: James
W. Moore; VP, Technical & Conference Activities: Cecilia Metra; 2014
IEEE Director & Delegate Division VIII: Roger U. Fujii; 2014 IEEE Director
& Delegate Division V: Susan K. (Kathy) Land; 2014 IEEE Director-Elect &
Delegate Division VIII: John W. Walz
BOARD OF GOVERNORS
Term Expiring 2014: Jose Ignacio Castillo Velazquez, David S. Ebert,
Hakan Erdogmus, Gargi Keeni, Fabrizio Lombardi, Hironori Kasahara,
Arnold N. Pears
Term Expiring 2015: Ann DeMarle, Cecilia Metra, Nita Patel, Diomidis
Spinellis, Phillip Laplante, Jean-Luc Gaudiot, Stefano Zanero
Term Expriring 2016: David A. Bader, Pierre Bourque, Dennis Frailey, Jill
I. Gostin, Atsuhiro Goto, Rob Reilly, Christina M. Schober
Executive Director: Angela R. Burgess; Associate Executive Director &
Director, Governance: Anne Marie Kelly; Director, Finance & Accounting:
John Miller; Director, Information Technology & Services: Ray Kahn;
Director, Membership Development: Eric Berkowitz; Director, Products &
Services: Evan Butterfield; Director, Sales & Marketing: Chris Jensen
COMPUTER SOCIETY OFFICES
Washington, D.C.: 2001 L St., Ste. 700, Washington, D.C. 20036-4928
Phone:
GFax: +1 202 728 9614
Email: ___________
hq.ofc@computer.org
Los Alamitos: 10662 Los Vaqueros Circle, Los Alamitos, CA 90720
Phone:
GEmail: help@computer.org
_________
MEMBERSHIP & PUBLICATION ORDERS
Phone:
GFax:
GEmail: help@computer.org
_________
Asia/Pacific: Watanabe Building, 1-4-2 Minami-Aoyama, Minato-ku, Tokyo
,;,9G$3:90
GFax:
G
Email: ____________
tokyo.ofc@computer.org
IEEE BOARD OF DIRECTORS
President: J. Roberto de Marca; President-Elect: Howard E. Michel; Past
President$0?0=*&?,0.60=; Secretary: Marko Delimar; Treasurer:
John T. Barr; Director & President, IEEE-USA: Gary L. Blank; Director
& President, Standards Association: Karen Bartleson; Director & VP,
Educational Activities: Saurabh Sinha; Director & VP, Membership and
Geographic Activities: Ralph M. Ford; Director & VP, Publication Services
and Products: Gianluca Setti; Director & VP, Technical Activities: Jacek
M. Zurada; Director & Delegate Division V: Susan K. (Kathy) Land;
Director & Delegate Division VIII: Roger U. Fujii
revised 23 May 2014
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
27
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
CONSUMERIZATION OF IT
Trust and Privacy
Exploitation in
Online Social
Networks
Kaze Wong, Macao Polytechnic Institute
Angus Wong, The Open University of Hong Kong
Alan Yeung and Wei Fan, City University of Hong Kong
Su-Kit Tang, Macao Polytechnic Institute
This survey presents the pitfalls of security protection in online social
networks and identifies common attack methods. A harmless proof-ofconcept malware app demonstrates the vulnerability of online social
networks and the significance of the user’s mentality.
nline social networks let users keep
in touch with families, friends, and
colleagues in an easy and convenient
way, but they also present various security risks. Large-sale online social networks
have become very popular owing to advances in
network and mobile technologies.1,2 Their popularity has, in turn, drawn the attention of attackers and intruders, who want to exploit this large
population to spread malware or steal personal
information. Some online social networks, such
as Facebook, LinkedIn, and Google+, require
users’ real identity. Online social networks also
preserve a great amount of users’ confidential
and financial information, including credit card
information.
O
28
IT Pro September/October 2014
There are two major types of attacks in online
social networks. The first is accomplished by
exploiting security loopholes in the networks,
and the second is accomplished by abusing trust
among users. The second type can sometimes
be easier to accomplish, because humans aren’t
always cautious. We focus here on this type of
attack, discussing the pitfalls of the security in
social networks and popular attack methods that
exploit the user’s trust. We also present a proofof-concept Facebook app to demonstrate the
risks in social networks.
Security Pitfalls in Social Networks
Online social networks involve many services,
stakeholders, user behaviors, and business
Published by the IEEE Computer Society
1520-9202/14/$31.00 © 2014 IEEE
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Related Work in IT Pro
t
considerations, resulting in a complicated security
paradigm with the following pitfalls.
t
Confusing and Complicated Settings
Social network companies are looking for ways to
make money. They’re introducing new products
and services, such as video advertising, multimedia
streaming, and automated photo tagging, and are
trying to expand payment services. They’re also
attempting to debut mobile tools and apps to
exploit the fast-growing mobile market.
Such endeavors might make the social network
look more versatile and state of the art, but they
might also complicate the network and make it
more difficult to ensure there’s a unified strategy
for controlling privacy and security.
Convenience over Security
Enforcing security measures can result in higher
operational costs and lower performance, but
social network providers are likely even more
concerned with any inconveniences the security
measures cause in terms of users sharing content
or developers distributing apps. Such inconveniences can hinder attempts to obtain a bigger
market share.
Consequently, the default privacy settings in
social networks are commonly set to a level favorable for sharing (and thus less secure).
t
t
t
K.W. Miller and J. Voas, “Who Owns What? The
Social Media Quagmire,” IT Professional, vol. 14,
no. 6, 2012, pp. 4–5; doi: 10.1109/MITP.2012.116.
M. Chau et al., “A Blog Mining Framework,”
IT Professional, vol. 11, no. 1, 2009, pp. 36–41;
doi: 10.1109/MITP.2009.1.
J.R. Michener, “Defending Against User-Level Information Exfiltration,” IT Professional, vol. 14, no. 6,
2012, pp. 30–36; doi: 10.1109/MITP.2011.112.
A.K. Jain and D. Shanbhag, “Addressing Security
and Privacy Risks in Mobile Applications,” IT Professional, vol. 14, no. 5, 2012, pp. 28–33; doi: 10.1109/
MITP.2012.72.
R. Jain and D. Sonnen, “Social Life Networks,” IT Professional, vol. 13, no. 5, 2011, pp. 8–11; doi: 10.1109/
MITP.2011.86
networks can sometimes require more than just
a technical solution.
New Incentives for Attackers
User data is essential for many business opportunities, which presents incentives for various
The strength of your security level is
as weak as that of your friend with the
lowest level of security.
Friends’ Influence on Privacy Control
Your data’s security also depends on the security settings of the friends with whom you
share content. For example, even if you have a
high security setting, if you share your content
with friends, and one of your friends is hacked,
your data will be exposed to the attacker. Thus,
the strength of your security level is as weak
as that of your friend with the lowest level of
security.
Inferred Information
Even if you don’t disclose your information,
it can be inferred by analyzing your and your
friends’ shared content. For example, suppose
that you haven’t entered any personal information in your profile. However, if your friends
tell Facebook that they are from college ABC,
and in many of your group photos, you’re with
those people at the college, then you’re probably
from the same college. Ensuring privacy in social
attacking or intrusion activities. The data—user
profiles, posted text messages, shared pictures, or
“like” actions—can be harnessed to help advertisers better market their products.
Various apps and people thus use different approaches to try to collect as much data from you
as possible. One way to achieve this legitimately
is to have your permission. In fact, an app that
looks like an interesting game might be designed
with the primary purpose of collecting your data.
When installing such an app, you might have
given the “game” permission (intentionally or unintentionally) to access your profile, albums, and
friends list.
Common Attack Methods
Here, we introduce possible attack methods for
online social networks, which we used in our
proof-of-concept Facebook app.
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
29
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
CONSUMERIZATION OF IT
Malware
Identity Forgery
Malware is malicious software that appears in the
form of codes/scripts or other kinds of software.
Hackers can use it to collect sensitive user information. Hackers can spread malware in online
social networks by sharing malicious URLs that
direct users to third-party websites, where the users are asked to download a (malware) file. If a user
downloads and executes the file, he or she will become infected and will in turn send the same malicious URLs to his or her friends. For example,
a malware named “Ice IX” has stolen credit card
information from many Facebook users.3
Identity forgery happens when an attacker accesses someone’s private information and uses it
to pretend to be that person. It occurs not only
in real world but also in online social networks.9
Spam, Scams, and Phishing
Because of the trust relationship among users of
online social networks, these networks are effective places for advertising, phishing, and scamming in the form of spam. Social spam can cause
traffic overload, result in a loss of trust,4 as well
Social spam can cause traffic overload,
result in a loss of trust, as well as
consume system bandwidth and
compromise user patience.
as consume system bandwidth and compromise
user patience.5 Besides advertising, phishing
can also take advantage of the privacy leakage
in online social networks. More than 70 percent
of the spam on Facebook advertises phishing
websites.6
Botnet
A botnet is formed by compromising a number
of computers on the Internet. Attackers can control botnets by sending messages through online social networks.7 Elias Athanasopoulos and
his colleagues performed an experiment to turn
Facebook into a botnet.8 They developed an application that would export HTTP requests to a
victim host. In an estimate of their botnet’s firepower, they claimed that if an attacker deployed
a malicious app with millions of users, the victim
host would have to serve hundreds of Gbytes of
unwanted data per day.
30
Excess Permissions
People can access online social networks using
smartphone apps. Before installation, these apps
ask users for certain permissions, such as access
to contacts or photos stored on the phone, although some permissions aren’t actually necessary for the provided function.
Another form of excess permission is requested
by third-party apps on online social networks. For
example, people can use third-party apps on Facebook to play games or share photos and videos.
Some apps request access to the personal data of
the user’s friends or request permission to post
messages on user’s behalf. This can be dangerous
if the apps use the data in unlawful ways, and it
can lead to privacy leakage.
Our Proof-of-Concept Facebook App
In our experiment, we first created a proofof-concept Facebook app, which is a harmless
malware. Our app is a social game bonus collector, which automatically collects game bonuses
shared by friends of the user. By default, after
installation, a Facebook app can access a user’s
name, gender, networks, and friend list. Our app
requests three extended permissions from the
user:
t FNBJM—permission to obtain the user’s email
address;
t SFBE@TUSFBN—permission to read all posts (status updates, pictures, or links) in the user’s
newsfeed; and
t QVCMJTI@BDUJPOT—permission to, on the user’s behalf, publish posts on the user’s wall, comment
on others’ posts, and “like” posts published by
others.
(See http://developers.facebook.com/docs/
for more
information.)
The app seemingly has two main functions: analyze the newsfeed and present a tutorial. By reading
the user’s newsfeed, the app can filter game bonus
posts and extract the links to claim the bonuses au-
reference/login/extended-permissions
____________________________
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Facebook
database
ss
ck
ce
ba
Ac
ed
Fe
Feedback
Access
tomatically. After claiming the game bonuses, the app posts to the user’s wall to
Attacker’s
advertise the app to others. A video tudatabase
Fake video website
App API
k
ac
torial, which redirects users to a videodb
e
Fe
s
Link
sharing website, teaches people how to
es
cc
A
Use
Facebook app
use the app.
App engine
Call
program
However, in reality, the app is imApp user
Our facebook app
Control
plicitly performing additional tasks. It
Attacker’s server
Facebook server
accesses the user’s friend list to conAttacker
struct a social graph and analyze the
various relationships. It also reads the Figure 1. System diagram of our proof-of-concept experiment. The
user’s newsfeed to analyze not only the diagram includes malware, phishing, botnet, identity forgery, and
user’s posts but also his or her friends’ excess permissions activities.
activities. Finally, the “watch tutorial”
function redirects users to a bogus
In our proof-of-concept Facebook app, the
website that looks similar to a well-known corfive attacking methods discussed earlier were or
porate website, where users are asked to upgrade
could be used. The malicious app, with excess
a browser plug-in before watching the video. The
permissions granted by users, can
download link then points to a malicious file.
Figure 1 shows the system architecture of our
t obtain users’ email address so attackers can
proof-of-concept program, in which we’re actspam them,
ing as an attacker. The server is fully controlled
t post to users’ wall on their behalf so the app
by us (the attacker). The Web server (www.ni______
can attract other users, and
hacking.com)
_________ is used to host a fake website that
z read all posts in users’ newsfeed for information
can do phishing and spread malware. The applianalysis.
cation server is used to host our Facebook app
program, which we refer to as the 'BDFCPPL BQQ
In addition, the fake YouTube site can lead to
FOHJOF.
phishing and botnet attacks.
Operations
Here, we outline the operations of our proof-ofconcept experiment.
First, we post a link to the app on our Facebook
walls, recommending the app to our friends (see
Figure 2a). When our friends see it and click on
the link, the installation process starts. During the
process, some access permissions are requested
(see Figure 2b).
In our app, users can choose the “analyze newsfeed”
function, as shown in Figure 2c. The function will
be provided to users, but meanwhile, our app can
secretly reads all posts from the users and stores
them in our (attacker) server for data analysis.
Or, if users choose the “watch tutorials” function,
they’re redirected to a fake YouTube site, where
they’re asked to upgrade a browser plug-in to
watch the video tutorials (see Figure 2d). When the
users click on the download link, the system links
to a malicious malware. (In our system, we just link
to the download page of Adobe Flash so that users
aren’t actually attacked.)
Results and Discussions
Our experiment shows how privacy can easily be
violated:
t user feeds can be obtained and harnessed;
z friends lists can be obtained to perform social
network analysis or to build a larger pool of
potential victims;
z phishing can be done by redirecting to a bogus
site to further steal users’ data; and
t malware can be downloaded to affect users’
computers.
As of this writing, 276 people have installed
our app. Of those, 97.1 percent have selected the
“analyze newsfeed” function, and 27.20 percent
have downloaded the potentially malicious software.
Furthermore, based on the friends lists secretly taken
by our app, we could build a social graph containing
19,763 people, representing a large pool of potential
victims. More importantly, we could analyze
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
31
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
CONSUMERIZATION OF IT
(a)
(b)
(d)
(c)
Figure 2. Screenshots of our proof-of-concept Facebook app: (a) posting an app recommendation
to the wall, (b) the malicious app requesting some permissions, (c) the app reading all posts in
the users’ newsfeeds while “analyzing” the newsfeed, and (d) a user being redirected to a fake
YouTube site.
this social network to identify the hub (the most
important person), allowing for better marketing or
more targeted attacks.
ur experiments have shown that people
grant permissions without always understanding what an app can do with them.
Users granted permission to our app mainly because they thought the app recommended by
us should be trustworthy. Clearly, trust can be
abused, creating opportunities for attackers.
What happens if someone steals your identity and
posts a malicious app to your wall?
By taking a few countermeasures, users can
avoid attacks such as the one outlined in our
experiment. Before installing an app, users
should carefully check what permissions the app
requests. If unnecessary or excessive permissions
are requested, users shouldn’t install the app.
O
32
Furthermore, users should
t be mindful when the app is trying to redirect
them to another site, because bogus sites can
be well disguised;
z validate the URL to avoid accessing phishing
sites (in our app, the URL of the redirected video
site is www.ni-hacking.com, so even though the
website looks like a YouTube site, users should
be able to identify it);
z review their privacy and security control settings
periodically, because social networks often add
new features and services that can introduce
loopholes and opportunities for attackers; and
t periodically check the information that third
parties are accessing.
Users tend to trust the content of requests
in social networks, due to their inherent
trust of their friends and the social network
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
platform. However, users need to understand
that attackers can easily exploit this trust,
despite the technical aspects of their security
settings.
UIFHPWFSONFOU)JTSFTFBSDIJOUFSFTUTJODMVEF*OUFSOFUTZT
UFNT OFUXPSL JOGSBTUSVDUVSF TFDVSJUZ BOE TPDJBM OFUXPSL
BOBMZTJT8POHIBTB1I%JO*5GSPNUIF$JUZ6OJWFSTJUZ
PG)POH,POH$POUBDUIJNBUBLZXPOH!PVILFEVIL
______________
Acknowledgments
Alan Yeung JT BO BTTPDJBUF QSPGFTTPS JO UIF %FQBSUNFOU
PG&MFDUSPOJD&OHJOFFSJOH$JUZ6OJWFSTJUZPG)POH,POH
BTXFMMBTBDPOTVMUBOUJODPNQVUFSOFUXPSLJOHBOEDPN
NVOJDBUJPO TZTUFNT GPS HPWFSONFOU BOE DPSQPSBUF DMJFOUT
)JTSFTFBSDIJOUFSFTUTJODMVEFOFUXPSLJOGSBTUSVDUVSFTFDV
SJUZ NPCJMF DPNNVOJDBUJPO TZTUFNT BOE *OUFSOFU DBDIJOH
TZTUFNT:FVOHJTBMTPBDUJWFJOQSPWJEJOHDPOTVMUBODZTFS
WJDFTUPMPDBMJOEVTUSZJOUIFBSFBTPGDPNQVUFSOFUXPSLJOH
BOEDPNNVOJDBUJPOTZTUFNT)JTDMJFOUTJODMVEFHPWFSONFOU
BHFODJFTBOEMJTUFEDPNQBOJFT$POUBDUIJNBUFFBZFVOH!
______
DJUZVFEVIL
_______
5IJTXPSLXBTTVQQPSUFECZUIF.BDBV4DJFODFBOE5FDIOPMPHZ
%FWFMPQNFOU'VOE"
References
1. K.Y. Wong, “Cell Phones as Mobile Computing
Devices,” *5 1SPGFTTJPOBM, vol. 12, no. 3, 2010,
pp. 40–45.
2. K.Y. Wong, “The Near-Me Area Network,” *&&&
*OUFSOFU$PNQVUJOH, vol. 14, no. 2, 2010, pp. 74–77.
3. E. Protalinski, “Ice IX Malware Tricks Facebook Users
to Enter Credit Cards Details,” ZDNet, 3 Apr. 2012;
http://www.zdnet.com/blog/security/malware-tricks________________________________
facebook-users-into-exposing-credit-cards/11297.
______________________________
4. A.A. Hasib, “Threats of Online Social Networks,” *OUM
+ $PNQVUFS 4DJFODF BOE /FUXPSL 4FDVSJUZ, vol. 9, no. 11,
2009, pp. 288–293.
5. F. Benevenuto et al., “Detecting Spammers and
Content Promoters in Online Video Social Networks,”
*OUM"$.$POG3FTFBSDIBOE%FWFMPQNFOUJO*OGPSNBUJPO
3FUSJFWBM(SIGIR 09) 2009, pp. 620–627.
6. H. Gao et al., “Detecting and Characterizing Social Spam
Campaigns,” 1SPD UI "OO $POG *OUFSOFU .FBTVSFNFOU,
2010, pp. 35–47.
7. R. Singel, “Hackers Use Twitter to Control Botnet,” 8JSFE,
13 Aug. 2009, www.wired.com/threatlevel/2009/08/
botnet-tweets.
________
8. E. Athanasopolous et al., “Antisocial Networks:
Turning a Social Network into a Botnet,” *OGPSNBUJPO
4FDVSJUZSpringer, 2008, pp. 146–160.
9. J. Kim, “Identity Hijacking on Social Media,” blog,
Oct. 2012; www.futureofsocialnetwork.com/2012/10/
identity-hijacking-on-social-media.html.
________________________
Wei Fan JTBEPDUPSBMTUVEFOUJOUIF%FQBSUNFOUPG&MFD
USPOJD&OHJOFFSJOHBUUIF$JUZ6OJWFSTJUZPG)POH,POH
)FSSFTFBSDIJOUFSFTUTJODMVEFDPNQMFYOFUXPSLTBOETPDJBM
OFUXPSLBOBMZTJT'BOIBTBO.1IJMJOFMFDUSPOJDFOHJOFFS
JOHGSPNUIF$JUZ6OJWFSTJUZPG)POH,POH$POUBDUIFSBU
GBOXFJGX!HNBJMDPN
_____________
Su-Kit Tang JTBMFDUVSFSBUUIF.BDBP1PMZUFDIOJD*OTUJ
UVUF .BDBV )F JT BMTP BGGJMJBUFE XJUI UIF *1W /FUXPSL
3FTFBSDI-BCPSBUPSZJOUIFJOTUJUVUF)JTSFTFBSDIJOUFSFTUT
JODMVEF UIF TFDVSJUZ PG *1W OFUXPSL QSPUPDPM PQFSBUJPOT
USVTUBOEQSJWBDZJTTVFTJOPOMJOFTPDJBMOFUXPSLTBOEQFS
GPSNBODFJNQSPWFNFOUJOBEIPDSPVUJOHVTJOHOFUXPSLDPE
JOH5BOHIBTB1I%JODPNQVUFSTDJFODFGSPN4VO:BU4FO
6OJWFSTJUZ$IJOB$POUBDUIJNBUTLUBOH!JQNFEVNP
____________
Selected CS articles and columns are available
for free at http://ComputingNow.computer.org.
Kaze Wong JTBSFTFBSDIFSBUUIF.BDBP1PMZUFDIOJD*O
TUJUVUFBOEBHSBEVBUFTUVEFOUJOFMFDUSPOJDBOEJOGPSNB
UJPOFOHJOFFSJOHBUUIF$JUZ6OJWFSTJUZPG)POH,POH)F
IBT GJOJTIFE B OVNCFS PG MBSHFTDBMF HPWFSONFOUGVOEFE
QSPKFDUTPO*OUFSOFUTFDVSJUZ)JTSFTFBSDIJOUFSFTUTJODMVEF
OFUXPSLTFDVSJUZDPNQMFYOFUXPSLTRVFVJOHTZTUFNT*O
UFSOFU DPNQVUJOH BOE NPCJMF DPNQVUJOH $POUBDU IJN BU
LB[FDZXPOH!HNBJMDPN
_______________
Angus Wong JT UIF QSPHSBN MFBEFS PG UIF &OHJOFFSJOH
4DJFODFTUFBNJOUIF0QFO6OJWFSTJUZPG)POH,POH)F
IBT VOEFSUBLFO B OVNCFS PG OFUXPSLSFMBUFE QSPKFDUT GPS
www.computer.org/itpro
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
33
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
FEATURE: ADVANCED VIDEO TELEOPERATION
Low-Cost
3D-Supported
Interactive Control
Enrico Masala, Antonio Servetti, and Angelo Raffaele Meo, Politecnico di Torino, Italy
Devices for stereoscopic vision are mostly used for entertainment. The
prototype device presented here for 3D-video-supported interactive
control is based on consumer devices and open source software, paving
the way for low-cost general-purpose systems for remote operation,
education, training, and surveillance.
or decades, researchers have been experimenting with real-time multimedia services with 3D technology support. Such
services have been used in specialized
contexts—such as in the entertainment industry,
for teleoperation, and in critical applications—but
have mostly relied on special-purpose hardware.
Given recent advances in 3D technology and the
increasing diffusion of low-cost 3D devices in
the consumer market—including 3D TVs, mobile phones, and gaming devices—wouldn’t it be
great if we could use these ordinary devices to
build low-cost 3D communication systems?
We started this line of research in 2012, motivated by the need to add a low-cost stereoscopic
remote-control module in a research project developing an open source framework for real-time
F
34
IT Pro September/October 2014
teleoperation. In fact, researchers have demonstrated that teleoperation is an application area
that stands to benefit greatly from stereoscopic
vision (see the “Related Research in 3D Remote
Control” sidebar). 3D images can enable better
perception of depth characteristics in the environment—especially in terms of the relative
object distance—thus enhancing precision and
reducing the time needed to complete tasks involving remote robot piloting and manipulation.
Of course, for each type of application, it’s necessary to verify that the achievable quality-of-experience—which might be bounded by the limited
capabilities of consumer-grade hardware—meets
the application constraints and user expectations.
Our goal was to study and design a 3D teleoperation prototype offering good performance at a
Published by the IEEE Computer Society
1520-9202/14/$31.00 © 2014 IEEE
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Related Research in 3D Remote Control
he use of 3D vision for teleoperation is a very
active research field,1 because it has been shown
that 3D viewing technologies might provide users
with higher depth perception. As expected, some
tasks benefit more than others from a better comprehension of distance,2 such as teleguide and obstacle
localization. However, even in demanding situations
such as in emergency applications, teleoperation
with 3D vision typically improves remote-control
performance.3
John McIntire, Paul Havig, and Eric Geiselman have
reviewed the literature investigating human factors
that have implications on task performance when
stereoscopic 3D displays are used.4 The tasks include
judging absolute and relative distances, finding and
identifying objects, navigating and manipulating objects in terms of position, and performing orientation
and tracking.
Researchers have also investigated acquisition
and visualization technologies. For example, work
has shown that, using efficient algorithms, correctly
calibrated stereoscopic images provide a guaranteed
depth perception.5 Other work has assessed the performance achieved using different viewing technologies during remote-control operations, providing
results in terms of usability while comparing 3D and
2D viewing, 3D and virtual-reality displays, and robot
sensors.6
Studies have also addressed the problem using
simulation. For example, researchers performed a
pick-and-place task in a simulated virtual environment
using three different systems: multiple 2D displays, a
3D perspective display, and a 3D stereoscopic display.7
Although the gain in performing simple tasks was
limited, introducing a stereoscopic display resulted in
better performances than the perspective display for
highly difficult tasks.
Finally, Salvatore Livatino and Giovanni Muscato
were interested in the effect of video feedback latency,
T
relatively low cost (less than US$1,500). Here, we
highlight the issues involved in designing such a
system and present a prototype that demonstrates
the feasibility of the low-cost approach, showing
its cost-performance tradeoff. The results pave the
way for the development of many new interactive
real-time systems in different application domains.
COTS and Open Source Solutions
To reach our goals, we focused our attention on
consumer off-the-shelf (COTS) hardware and
so they performed usability studies that substituted
real video images with synthetic images from robot
laser data.8 The authors observed that by using a
technique to minimize the amount of bandwidth (and
delay) required for the transmission, they could significantly reduce the amount of time spent performing a
given task, thus improving system usability.
References
1. S. Livatino et al., “Mobile Robot Teleguide Based on
Video Images,” IEEE Robotics & Automation, Dec. 2008,
pp. 58–67.
2. D.R. Tyczka et al., “Study of High-Definition and
Stereoscopic Head-Aimed Vision for Improved
Teleoperation of an Unmanned Ground Vehicle,” Proc. of
Society of Photo-Optical Instrumentation Engineers (SPIE)
8387, May 2012, article no. 83870L.
3. J.Y. Chen et al., Effectiveness of Stereoscopic Displays for
Indirect-Vision Driving and Robot Teleoperation, tech.
report, Army Research Lab in Aberdeen, Aug. 2010.
4. J.P. McIntire, P.R. Havig, and E.E. Geiselman, “What
Is 3D Good For? A Review of Human Performance on
Stereoscopic 3D Displays,” Proc. of Society of PhotoOptical Instrumentation Engineers (SPIE) 8383, May 2012,
article no. 83830X.
5. M. Ferre et al., “3D-image Visualization and Its
Performance in Teleoperation,” Proc. 2nd Int’l Conf.
Virtual Reality (ICVR 07), 2007, pp. 22–31.
6. S. Livatino, G. Muscato, and F. Privitera, “Stereo Viewing
and Virtual Reality Technologies in Mobile Robot
Teleguide,” IEEE Trans. Robotics, vol. 25, no. 6, 2009,
pp. 1343–1355.
7. S.H. Park, The Effects of Display Format and Visual
Enhancement Cues on Performance of Three-Dimensional
Teleoperational Tasks, PhD dissertation, Dept. of Industrial
Eng., Texas Tech University, 1998.
8. S. Livatino and G. Muscato, “Robot 3D Vision in
Teleoperation,” World Automation Congress (WAC), June
2012, pp. 1–6.
open source software. COTS components cost
much less than dedicated hardware, but they can
have (slightly) lower performance.
The scientific literature and open source domain offer many algorithms and reference
implementations for problems in the fields of
communication, visualization, stereoscopy, and
so on. The downside of open source versus commercial software again relates to performance.
However, with suitable modifications and component selection, open source software offers
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
35
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
FEATURE: ADVANCED VIDEO TELEOPER ATION
Wireless access point
Encoding and
transmission
software
Teleoperated machine
equipped with stereoscopic camera
Receiver and
decoding
software
PC with 3D video card, stereoscopic monitor
and 3D shutter glasses
Figure 1. A block diagram of a 3D video transmission chain suitable for remote teleoperation
systems. A stereoscopic camera mounted on the teleoperated machine wirelessly transmits to a
receiver suitable for 3D vision.
good-performance, low-cost solutions that the
final installer can customize to address the specific implementation and its goals.
Furthermore, while designing our system, we
focused on simplicity of use and customization.
We also wanted to create an open-platformbased design and use widespread standards for
coding and communication. Although our current solution is only a prototype, we hope it stimulates further research and investments in this
research area.
Architecture Design
A generic structure of a teleoperation system
based on real-time 3D video feedback has two
main parts: a mobile streaming node equipped
with a stereoscopic camera, and a client application for 3D visualization (see Figure 1).
The transmitter node is located on the teleoperated machine so that the capture device can record the vision of the area from the device’s point
of view. The system’s core must process the captured images so that a timely robust transmission can occur through a wireless channel to the
remote operation side. On the receiver side, the
software reconstructs and renders the 3D image
from the received data on a graphic display device in a format suitable for stereoscopic vision.
The key point for successful system operation
is to guarantee low end-to-end latency, which is
36
a fundamental requisite to achieve a good realtime interaction experience.1
Issues with a Consumer-Level Solution
The deployment of consumer-level solutions for
remote-control 3D video systems is made difficult by constraints that relate to the high cost
of industrial-grade components and to the use
of proprietary, closed systems. As noted earlier,
to enable consumer-level solutions at a reduced
cost, we investigated the feasibility of using
COTS hardware components, integrated using
open source software frameworks. In doing so,
we prioritized the following issues.
First, we wanted to find a mobile device with
suitable resolution and highly responsive output
of the captured images. For this reason, we excluded still-picture cameras. We also wanted to
reduce the video encoding latency using appropriate encoding algorithms.
Next, we wanted to make the system sufficiently robust to some packet losses—an event
possible in any communication scenario that can
severely affect the user’s perceived video quality.
As we will see later, suitable choices of encoding
algorithms and related configurations can help
address this issue.
Finally, we wanted to render the stereoscopic
video using a technology widely supported in an
open source environment.
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
HTC Evo 3D
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
2
Android 2.3 +
custom
software
1
Wi-Fi
Bill of materials:
1. HTC Evo 3D:
2. Wi-Fi router:
3. Nvidia Quadro 4000
4. Nvidia 3D vision kit
5. Stereoscopic monitor
Total:
$ 480
$ 60
$ 700
$ 90
$ 200
3D Visualization
(3D display+glasses)
$ 1,530
4
5
3
Linux decoder with
Nvidia Quadro 4000
(3D w/ openGL @120 Hz)
Figure 2. System architecture and components. A mobile phone with stereoscopic capabilities
wirelessly transmits to a computer that can render 3D video using active glasses. The total cost of the
system is approximately US$1,500.
Component Selection and Evaluation
The previous considerations led us to develop
the building blocks of our proposed teleoperation system based on real-time 3D video feedback (see Figure 2 and the related video at http://
____
youtu.be/5zApDO3wSq4,
__________________ which also shows the
components).
Our prototype includes the following five key
components.
A stereoscopic camera. We used a commercially available 3D mobile phone (HTC Evo 3D) that
let us achieve, at a moderate cost, stereoscopic
vision, portability, a battery-operated power supply, and wireless communication. In field experiments, we experienced a latency between 150 and
200 ms in the best conditions. This is slightly
higher than the ideal requirement (less than
150 ms), but it’s probably the most efficient solution that the COTS market can currently provide. In fact, this loss of performance is the price
to pay for keeping the overall system cost low.
We also evaluated other solutions, such as 3D
cameras, but the majority of them either didn’t
let us transmit video in real-time, or the format
(such as the Digital Video format) required further processing and thus increased system cost,
complexity, and latency.
Encoding and transmission software. We developed a custom-built open source encoding and
transmission software specifically for the HTC
Evo 3D phone to minimize encoding and transmission latency.
Networking hardware. We used standard networking hardware—a commercially available
802.11 access point for transmission over a standard Wi-Fi channel.
Receiver and decoder software. We custom
built open source receiver and decoder software
on top of the Linux OS and openGL libraries.
Stereoscopic hardware support. We used a standard desktop computer with stereoscopic hardware
support, including a graphics board, a monitor,
and an infrared emitter device for the active glasses.
The identified solution for supporting hardware
openGL is based on an Nvidia Quadro 4000 graphics board, which provides a direct connection from
the video card to the infrared emitter device without
the need for specific driver support in Linux (see the
specifications at www.nvidia.com/object/product______________________
quadro-4000-us.html).
_______________ This greatly simplified the
management of stereoscopic issues in the receiver
but also increased the final system’s cost.
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
37
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
FEATURE: ADVANCED VIDEO TELEOPER ATION
Alternative Solution
38
Because Nvidia doesn’t officially support 3D visualization for the Linux environment, we could
have implemented a cheaper solution (for approximately $900) using an experimental driver
that’s publicly available on the Internet (http://
____
sourceforge.net/projects/libnvstusb).
__________________________ The driver lets you work with much cheaper video cards
by synchronizing the infrared emitter using the
USB connector. However, we didn’t pursue this
solution, because it doesn’t currently provide stable performance.
or right) and the library automatically handles
all visualization issues, including alternating left
and right views on the screen at the correct frame
rate and synchronizing with the shutter glasses.
Our choice was to rely on open source software
at the underlying level, but the whole system can
be easily ported and extended to any platform.
The transmitter is written partly in Java and partly in C (compression routines), while the receiver
is standard C code using sockets, threads, and
openGL—a set of libraries available on the vast
majority of platforms.
System Implementation
Results
Much of our time was spent developing a video
transmission application that could achieve performance comparable to more expensive professional solutions while relying only on low-cost
COTS devices. The application (available at http://
____
media.polito.it/itpro)
______________ consists of both a transmitter and a receiver part. We implemented the video transmission on top of the Android platform
(www.android.com) using both Java code and our
optimized routines for video compression, compiled in native code to improve performance. To
achieve maximum robustness against data loss
and minimum latency, we implemented the video
codec, which segments images in independently
decodable subareas, to allow pipeline processing
and better error resilience.
Due to the strict latency constraints, it’s not
possible to retransmit data; however, encoding
and packetization is designed so that the content
of each single packet that has been successfully
received can be decoded and presented to the
user, because no packet depends on other ones
for decoding. Missing data is estimated using a
frame-copy concealment technique. Data is sent
using the standard RTP protocol2 with a header extension that simplifies recovery in case of
packet losses.
On the receiver side, the software features a
multithreaded architecture that decouples the
packet reception and decoding from data visualization so that the interaction with the devicerendering engine doesn’t affect the time required
to process the input data. For the visualization
part, we used the openGL library (www.opengl.
org/sdk), including its extension for stereoscopic
visualization. Therefore, the developer needs to
draw data only on the correct frame buffer (left
We tested the system in a practical scenario designed to investigate a set of factors that could
affect the operator’s performance in remote
teleoperation—in particular, the latency of the
video feedback for effective control and the quality of the stereoscopic images for effective 3D
perception.
The chosen components and system design already take latency and image size into account.
Nevertheless, because these two factors conflict
with each other, care should be taken to correctly
balance the two components. For example, the
more we increase image quality, the more we
burden system latency and thus reduce usability.
Figure 3a shows the total amount of delay introduced by the different components of the
communication chain: acquisition, processing,
transmission, and rendering. First of all, an intrinsic lower bound in the overall delay is given
by the sum of the camera acquisition latency, the
rendering screen refresh rate, and the network
transmission time. In our setup, this delay accounted for approximately 130 ms and was the
same for any system configuration we tested. Second, we tested whether the time required for image compression—which depends on the device’s
computational capabilities—heavily influences
the maximum frame rate that can be achieved.
The latency measurements with the different
image-quality configurations showed that the request for high quality strongly affects the time required for the image-compression process. This
behavior limits the achievable frame rate and, in
turn, increases the total end-to-end delay. For
example, with a frame resolution of 416 u 240
pixels, we were able to encode video at 20 to 22
frames per second, while with a frame resolution
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
400
350
Latency (ms)
300
250
200
150
100
50
0
(a)
1. Low quality
(416 x 240)
2. Medium quality
(640 x 352)
Intrinsic
3. High quality
(1280 x 720)
(b)
Setup dependent
Figure 3. System prototype: (a) the quality versus latency tradeoff in the test scenario and (b) the 3D vision
prototype performing the test.
of 640 u 352 pixels, we achieved 14 to 18 fps; with
1,280 u 720 pixels, only 3 to 5 fps was possible.
We designed an experiment with the smartphone camera mounted on a radio-controlled toy
car and asked users to perform an alignment task
using the 3D vision system and the car remote
controller (see Figure 3b and the related video at
http://youtu.be/1Olg1oV2fIs).
User feedback confirmed that the frame rate
allowed by the maximum resolution configuration was too low to effectively drive the car,
because its overall latency (more than 300 ms)
highly impaired user reactivity to the car movements. On the contrary, users preferred the first
two setups—even if the image quality was lower—
because their latency was within 200 ms—a
value still considered satisfactory for interactive
communications.3 In particular, because the difference in latency between the first two setups
wasn’t really perceivable, almost all users preferred the second setup (640 u 352). However,
recent findings suggest that further quality reductions might not significantly impair the ability to perform given tasks.4 This could pave the
way for adaptively choosing codec and coding
parameters, thus varying quality if necessary, depending on the network bandwidth availability.
Moreover, we also considered the case of
transmission over the wireless Internet. Experiments show that the system can work with the
video qualities shown in Figure 3a using between 800 and 1,700 kbit/s. These rates have
been experienced using a 3G connection with a
packet loss rate lower than 1 percent. However,
latency is approximately 80 ms higher compared
to Wi-Fi, and packet-delay variation (jitter) was
up to 30 ms, which delays the visualization of
some frames. Latency has an impact mainly on
the system’s perceived responsiveness, while jitter makes the video feedback subject to very short
freezes that can be annoying.
In general, the results of the evaluation process indicate that the system can be applied in a
context of remote teleoperation where real-time
video feedback requirements can be somewhat
relaxed by trading off costs with latency. With
this setup, we expect that low-cost 3D visualization systems will become popular in myriad new
contexts, from domotics and disability assistance
to gaming and entertainment. Further studies
are in development, with the aim of increasing system timeliness, even for the high-quality
video setup.
uture work might include additional optimizations to enhance the user experience. For
example, dropping the open source requirement in favor of proprietary software libraries will
let us reduce processing time by exploiting specific
hardware support for video acceleration. At the
same time, the system’s total cost can be significantly reduced using much cheaper 3D video cards
not yet supported by open source software.
F
References
1. J.C. Lane et al., “Effects of Time Delay on Telerobotic
Control of Neutral Buoyancy Vehicles,” Proc. IEEE
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
39
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
FEATURE: ADVANCED VIDEO TELEOPER ATION
Int’l Conf. Robotics and Automation (ICRA 02), vol. 3,
2002, pp. 2874–2879.
2. H. Schulzrinne et al., RTP: A Transport Protocol for RealTime Applications, RFC 3550, July 2003; http://tools.
ietf.org/html/rfc3550.
3. One-Way Transmission Time, ITU-T recommendation
G.114, May 2003.
4. E. Masala and A. Servetti, “Performance vs. Quality
of Experience in a Remote Control Application Based
on Real-Time 3D Video Feedback,” Proc. 5th Int’l
Workshop on Quality of Multimedia Experience (QoMEX
13), 2013, pp. 28–29.
Enrico Masala is an assistant professor at Politecnico di
Torino, Italy. His main research interests include the development of algorithms for quality optimization of communications over packet networks, wireline and wireless, with
a particular emphasis on multimedia and specific contexts
such as 3D video and dynamic adaptive HTTP streaming.
Contact him at enrico.masala@polito.it.
______________
Antonio Servetti is an assistant professor at Politecnico
di Torino, Italy. His research focuses on speech/audio
processing, and real-time multimedia communications.
With the advent of video and audio support in HTML5,
his interests include also multimedia Web applications
and HTTP adaptive streaming. Contact him at antonio.
servetti@polito.it.
__________
Angelo Raffaele Meo is an emeritus professor at Politecnico di Torino, Italy. He has been involved in numerous
national projects in computer engineering, investigating a
broad range of topics, including switching theory, hardware
design, signal processing, speech analysis and synthesis, and
pattern recognition. He also served as the president of the
Academy of Sciences of Torino and as the president of the
Italian government commission entrusted with the task of
promoting open source in the Italian Public Administration.
Contact him at ________
meo@polito.it.
Selected CS articles and columns are available
for free at http://ComputingNow.computer.org.
ADVERTISER INFORMATION
Advertising Personnel
Marian Anderson: Sr. Advertising Coordinator
Email: _______________
manderson@computer.org
Phone: +1 714 816 2139 | Fax: +1 714 821 4010
Sandy Brown: Sr. Business Development Mgr.
Email _____________
sbrown@computer.org
Phone: +1 714 816 2144 | Fax: +1 714 821 4010
Southwest, California:
Mike Hughes
Email: _______________
mikehughes@computer.org
Phone: +1 805 529 6790
Southeast:
Heather Buonadies
Email: _______________
h.buonadies@computer.org
Phone: +1 973 304 4123
Fax: +1 973 585 7071
Advertising Sales Representatives (display)
$GYHUWLVLQJ6DOHV5HSUHVHQWDWLYHV&ODVVLÀHG/LQH
Central, Northwest, Far East:
Eric Kincaid
Email: ______________
e.kincaid@computer.org
Phone: +1 214 673 3742
Fax: +1 888 886 8599
Northeast, Midwest, Europe, Middle East:
Ann & David Schissler
Email: ______________
a.schissler@computer.org, d.schissler@computer.org
______________
Phone: +1 508 394 4026
Fax: +1 508 394 1707
40
Heather Buonadies
Email: h.buonadies@computer.org
_______________
Phone: +1 973 304 4123
Fax: +1 973 585 7071
Advertising Sales Representatives (Jobs Board)
Heather Buonadies
Email: h.buonadies@computer.org
_______________
Phone: +1 973 304 4123
Fax: +1 973 585 7071
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
CLOUD COMPUTING
FEATURE:
SEMANTIC TECHNOLOGY
Job Recruitment
and Job Seeking
Processes:
How Technology Can Help
Paolo Montuschi, Valentina Gatteschi, Fabrizio Lamberti,
Andrea Sanna, and Claudio Demartini, Politecnico di Torino, Italy
This survey of current job search and recruitment tools focuses on
applying a computer-based approach to job matchmaking. The
authors present a semantic-based software platform developed in the
framework of a European project on lifelong learning, highlighting
future research directions.
ob seeking and recruiting processes have
drastically changed during the past decade. Today’s companies are exploiting
online technology (job portals, corporate websites, and so on) to make job advertisements reach an ever-growing audience. However,
this advantage can create a higher post-processing burden for recruiters, who must sort through
the huge amount of résumés and curricula vitae
received, often expressed in different languages
and formats. Similarly, job seekers spend considerable time filtering job offers and restructuring
their résumés to effectively communicate their
strong points and address the job requirements.
Consequently, job recruiters and seekers often
use various special-purpose tools, such as job
J
1520-9202/14/$31.00 © 2014 IEEE
aggregators (including www.jobrapido.com and
1
www.indeed.com)
and social networks (includ____________
ing www.linkedin.com, www.glassdoor.com, and
2
www.jackalopejobs.com).
To further optimize se_________________
lection processes with respect to processing time
and accuracy, job portals such as Monster (www.
____
monster.com) and Jobnet (www.jobnetchannel.
com)
___ have started to develop advanced search
engines to automatically sort résumés based on
job offer requirements. These approaches could
exploit, among others, supervised and unsupervised learning, software agents, and genetic algorithms.3–8 Nonetheless, creating such tools is
a complex task that requires identifying which
variables influence the user’s final choice and defining ad-hoc ranking algorithms.
Published by the IEEE Computer Society
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
41
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
FEATURE: SEMANTIC TECHNOLOGY
Computer-Supported Job Matchmaking Techniques
omputer-supported job matchmaking has been
explored using different methods.
C
Supervised Learning-Based Techniques
These methods exploit a set of training data to identify an inferred function that can predict the output
value for each input element.
Decision trees. Predictive models that represent the
output (the leaves) as the result of a combination of
input variables (the internal nodes). This approach has
been used to predict which job offers published online
are relevant for a job seeker.1
Neural networks. These data modeling tools can
represent complex input/output relationships by mimicking the human brain’s behavior. This technique has
been applied to matchmaking.2
In this case, job candidates (chromosomes) are recombined to find better chains (individuals) optimizing the
allocation of human resources to job positions.
Software Agents
These (semi)autonomous entities can accomplish (automated) tasks for users, such as collecting job offers
or résumés.6
Semantic Approaches
These methods target the creation of self-descriptive
and machine-understandable contents on the Web by
adding appropriate knowledge on complex networks
of relations among domain concepts. Semantic approaches let machines perform automatic processing
over big and heterogeneous data by mimicking human reasoning processes.7
References
Unsupervised Learning-Based Techniques
These methods use unlabeled data to distinguish
between and explain key features.
Ant colony optimization. This metaheuristic reproduces
the behavior of ants, who deposit an evaporating pheromone while searching for food to communicate with the
colony. Other ants won’t cover previously explored long
paths, thus avoiding the convergence to locally optimal
solutions. This method is used to identify the variables
with the strongest impact on the selection process.3
Cluster analysis. This statistics approach aims to
create clusters of objects by maximizing similarities
within a group and dissimilarities among objects
belonging to different clusters. It has been used to
support personnel assessment (in terms of identifying
lateral moves or promotions, for example) by identifying “families” of employees within a company.4
Genetic Algorithms
These heuristics were inspired by Darwin’s theory
about natural evolution, where a starting population
(individuals) evolves by changing its properties (chromosomes). This approach could be used by a company that aims to fill some job positions, starting with
internal or pre-screened external candidates.5
Furthermore, solving the job matchmaking problem—that is, finding the best match between job
offer and demand—isn’t only a matter of processes
and algorithms but also of the software system’s usability, especially for those with limited computer
skills. In this respect, semantic technology can
42
1. C.I. Muntean, D. Moldovan, and O. Veres, “A Data
Mining Method for Accurate Employment Search on
the Web,” Proc. 2010 Int’l Conf. Communication and
Management in Technological Innovation and Academic
Globalization, 2010, pp. 123–128.
2. I. Ryguła and R. Roczniok, “Application of Neural
Networks in Optimization of the Recruitment Process for
Sport Swimming,” J. Medical Informatics & Technologies,
2004, pp. 75–82.
3. N. Sivaram, “Ant Colony Optimization to Discover the
Concealed Pattern in the Recruitment Process of an
Industry,” Int’l J. Computer Science and Eng., vol. 2, no. 4,
2010, pp. 1165–1172.
4. D.L. Denning, N.E. Abrams, and M. Bays, “Personnel
Assessment Specialist Job Analysis: Interpretation and Use
Report,” Int’l Personnel Management Assoc. Assessment
Council, 1995; http://annex.ipacweb.org/library/psjoban.pdf.
5. F. Herrera et al., “Solving an Assignment-Selection
Problem with Verbal Information and Using Genetic
Algorithms,” European J. Operational Research, no. 119,
1999, pp. 326–337.
6. K. Sugawara, “Agent-Based Application for Supporting
Job Matchmaking for Teleworkers,” Proc. 2nd IEEE Int’l
Conf. Cognitive Informatics, 2003, pp. 137–142.
7. C. Bizer et al., “The Impact of Semantic Web
Technologies on Job Recruitment Processes,” Proc.
Wirtschaftinformatik, 2005, pp. 1367–1381.
help,9 because the computer-based job matchmaking process can be configured to mimic humanlike interaction and reasoning. In this article, we
present a semantic-based software tool used for job
matchmaking (see also our introductory video at
http://youtu.be/yi9gNd_9g8E). First, however, we
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Semantic Technology
emantics—the study of the meaning of words and
sentences—is often associated with disciplines
such as philosophy, communication, and semiotics.
For IT, the concept of semantics started to be extensively used in 2001 with the coining of term the
Semantic Web, which represented the revolutionary
passage from a Web of documents to a Web of data.1
Today, semantics is exploited in different contexts, ranging from Web searches to various knowledge-intensive scenarios, such as natural language
processing, bioengineering, and forensics. The
aim is to produce more accurate answers/solutions
to questions/problems. In fact, traditional search
engines could sometimes fail to return the results
expected because of the logical operators used in
the query or the broad or ambiguous meaning of
words chosen. For example, while searching for
java photos, results might contain websites hosting
pictures of the “Java island,” as well as resources to
manage images in the “Java programming language.” Semantic technology aims to address the
dilemma by labeling data with information related
to its meaning and context, such as the specification that within webpages or in the user’s query, the
word “Java” refers to the Indonesian island and not
to the object-oriented programming language.
S
review the role of technology in today’s job recruitment and job seeking processes, showing how job
matchmaking is an application area that stands to
benefit from semantic technology.
Semantic Job Matchmaking
By leveraging machine-understandable models of
the target domain, semantic-based systems can
handle a variety of both structured and unstructured content, expressed in many languages, with
different degrees of completeness, and in varying
levels of detail. A semantic-based job matchmaking system can improve job matchmaking in numerous ways.
First, it can help job recruiters express job
requirements in flexible ways, ranging from
template-based forms to natural-language descriptions. Similarly, job seekers can flexibly express skills in their résumés.
Second, a context-aware semantic-based system
can improve the user experience through better
human-computer interaction. By applying contextual information, the system can help recruiters revise their position postings to better advertise their
Moreover, with semantics, relations among
concepts can be specified. A semantic-based search
engine might manage incomplete queries and show
pictures of other islands related to Java because they’re
located in the same archipelago.
The knowledge management capabilities of semantic
technology rely on the existence of suitable models, such
as taxonomies and ontologies, to express the meaning
behind the information handled. The models self-differentiate the relations managed. For example, taxonomies
usually represent hierarchical classifications of concepts
using trees of “is a” relations (“Java is an island,” for example). Within semantic-based processing, taxonomies
are often replaced by ontologies. An ontology, defined
as a formal, explicit specification of a shared conceptualization,2 is meant to model a variably shaped network
of relations by also recording properties about concepts
(such as “Java is the most populated island of Indonesia”
or “Java is located between Sumatra and Bali”).
References
1. T. Berners-Lee, J. Hendler, and O. Lassila, “The Semantic
Web,” Scientific Am., vol. 284, no. 5, 2001, pp. 34–43.
2. T.R. Gruber, “A Translation Approach to Portable
Ontology Specifications,” Knowledge Acquisition, vol. 5,
no. 2, 1993, pp. 199–220.
requirements, and it can help job seekers revise
their résumés to better promote their qualifications.
Third, job offers and demands can be automatically matched—and a ranking of positions
and candidates obtained—by considering concepts that aren’t explicitly mentioned in the job
offers and résumés but that are semantically related to the terms that are used.
Finally, systems can suggest ways to improve
such rankings—for example, through companywide training or individual certification. (For
more information, see the “Computer-Supported
Job Matchmaking Techniques” and “Semantic
Technology” sidebars. You can also see a related
video at http://youtu.be/OGQ26dM_KjQ.)
There are a variety of approaches you can use
to develop such a semantic job matchmaking system (see Figure 1a). However, regardless of the approach used, development should occur in three
major phases (see Figure 1b).9–12 The first phase
should be devoted to creating a shared data model
(a sort of “common language”) that defines standards for representing the information relevant for
job recruitment and job seeking contexts in the
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
43
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
FEATURE: SEMANTIC TECHNOLOGY
Automatic Semi-automatic Manual
By merging
existing
formalizations
From scratch
ch
Brief indicator
Reference level
Semantic similarity
Supporting info
(a)
1. Creation of the
formal shared model
2. Annotation
3. Matchmaking
(b)
Java
Résumé
wn:Word
wn:Word
rdf:type
wn:inSynSet
wn:Noun
Cat
wn:word
wn:WordSense
wn:hasSense
wn:lexicalForm
Dog w
Name, surname
Curriculum vitae
wn:SynSet
wn:WordSense
wn:hasSense
wn:lexicalForm
wn:word
Possessed knowledge
wn:inSynSet
wn:SynSet
rdf:type
wn:Verb
Relations to other word
Relations to other synsets,
senses, such as antonym such as hypernym, hyponym
Taxonomies and/or ontologies
Personal information
First name, Surname
Address
Telephone number
E-mail address
Nationality
Date of birth
Sex
Work experience
Dates
Occupation or position held
Main activities and responsibities
Employer’s name and locality
Business or sector
Acquited LO
Java
Nationality
Jane Doe
40 Grafton way, London, WC1E 6DX
+44 20 1234567
jane.doe@email.com
British
06/10/1974
Female
Date
Assigned
definition
An island in
Indonesia
01/01/2002 – 31/12/2010
Bartender
Preparation of beverages and aliments
The british pub
Service
Knowledge of cafeteria operations
Knowledge of elements of oenology
Knowledge of elements gastronomy
Knowledge of recipes for preparing snacks and fast meals
Ability to apply techniques for preparing snacks and fast meals
Ability to use tools for beverages preparation
A platform-independent
object-oriented
programming language
Learning
outcomes
Annotated profiles
An island in
Indonesia
Object-oriented
programming language
A platformindependent
object-oriented
programming
language
A programming
language
Searched
Found
Object-oriented
programming language
Java
Match
(c)
Figure 1. Development of a semantic job matchmaking system. (a) The various approaches used for
development, (b) the three phases of development, and (c) the final results.
semantic knowledge base. This resource-intensive
step usually involves domain experts (“knowledge
engineers”) and results in the creation of domainspecific taxonomies or ontologies (see Figure 1c).
A second phase targets annotation, where information provided by users (in job advertisements
and résumés) is “augmented” with meta-information derived from the taxonomical and ontological
models defined in the previous step. The annotation can be carried out automatically, semi-automatically, or manually. Different investigations can
be done to find a reasonable mix of automation and
user involvement, though the effort is often comparable to that of constructing the model itself.9
A third phase is devoted to defining the algorithms for measuring the semantic distance
among concepts and actually computing the
match. At this stage, the relations among concepts
used for the annotation of résumés and job offers
are navigated and weighted to evaluate similarities
among competences possessed and required.
The final result produced by such a system depends on the matchmaking algorithm exploited,
the quality of the model defined, and the accuracy
of annotations made. Currently, the research is almost equally focused on the three phases, with the
aim of finding effective solutions for an improved
44
formalization, annotation, and computation of the
match, while at the same time reducing the human workload and user expertise required.
Use Case: The LO-MATCH Platform
The Learning Outcome (LO)-MATCH platform
(www.lo-match.polito.it) is a practical example of a
semantic-based matchmaking system (see a demo
of the system at http://youtu.be/l7j-7_5gFVU).
It was developed as part of the MATCH project
(http://match.cpv.org) and co-funded by the European Commission under the Lifelong Learning
Program (http://eacea.ec.europa.eu/llp), which aims
to support learning opportunities during all stages
of life, from early childhood through to old age.
With LO-MATCH, recruiters can advertise open
positions and match them with résumés posted by
job seekers to find potential candidates to interview. Similarly, job seekers can insert information
related to previous education or work experiences,
match the information with job offers published by
recruiters, and receive a ranked list of job positions.
In our platform, the match between offer and
demand is computed by considering the words
in user achievements (or requirements) as well
as the associated semantics—that is, the metainformation derived from suitable taxonomical
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
THE WORLD’S NEWSSTAND®
and ontological models. This way, dependencies
on how information in résumés and job postings
has been written are relaxed. In fact, a semantic
system can operate beyond pure keyword-based
comparisons, possibly enabling the exploration of
partially matching contents expressed in different
ways—for example, in another language, with different words, or with varying levels of detail.
System Design
While designing and implementing LOMATCH, we paid particular attention to the following requirements:
t simplify the interactions and make the technological details transparent to users, and
t be flexible and provide valorization and acknowledgment of all experiences listed by job
seekers or requested by recruiters.
We also made two key choices. First, we constructed the semantic model using the core concept of a
learning outcome, which is what the European Commission is using to create a common language to
easily translate across different countries, systems,
and sectors what an individual knows, understands,
and has accomplished in completing a learning process. We thus modeled résumés and job postings as
collections of knowledge, skills, and competence
elements, either acquired during formal or informal learning experiences or required for a given
position. LO-MATCH is one of the first attempts
to put into practice European strategies for lifelong
learning in the context of job matchmaking.
Second, we relaxed the dependencies on the
existence of an a priori strict language to formalize the domain. Although the richness of taxonomical and ontological models contributes to
determining the effectiveness of semantic approaches, their design and maintenance costs
can be very high. Moreover, sometimes defining
complex relations among model elements can be
even counterproductive. For example, what is the
actual relation between programming and debugging abilities? Is it always correct to assume that if
an individual can write a software program, then
he or she can also debug it (or vice versa)?
Ontology Development
To create the LO-MATCH ontology, project
partners started by identifying domain experts
who could populate the LO-MATCH repository
with learning-outcome-based statements belonging to professional profiles possibly owned
or searched by job seekers and recruiters.
Next, this information was automatically related to the WordNet semantic thesaurus (http://
____
wordnet.princeton.edu),
where words were
__________________
grouped in sets of synonyms, or “synsets,” with
each one expressing a distinct concept, linked by
both lexical and semantic relations.
A further ontological layer was overlapped in
the platform repository by identifying key components—such as action verbs, knowledge objects, and context elements—and linking them to
WordNet synsets.
Finally, the domain experts reviewed and finetuned this model.
System Deployment
We deployed a simplified user interface, targeting
real-world users, enabling both the elicitation of
acquirements or requirements and the computation of the match. Figure 2 shows some screenshots of how a job seeker can use the platform.
When a new résumé or a job offer is entered
into LO-MATCH, the system complements it
with additional information derived from the underlying knowledge base. Among possible operations in this and later phases, job recruiters and
seekers can browse annotated profiles or perform
a free text search and receive suggestions to better define required expertise (for the job posting)
or personal experience (for the résumé). This
feature strongly relies on the semantic-similarity
properties among learning outcomes and it is
aimed at filling possible information gaps and
asymmetries throughout the process.
In our design, semantic similarity plays a central role in computing the match between job
offers and demands:
t Starting from WordNet and the profiles knowledge base, semantic similarity is determined from
concepts found and their network of relations.
t Job seekers and recruiters can flexibly tune the
weights of the relations influencing the match,
moving from pure keyword-based search to the
full exploitation of semantic relations potential.
t The final outcome of the matchmaking is a list of
companies and candidates that better match candidates’ characteristics and recruiters’ requests,
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
45
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
FEATURE: SEMANTIC TECHNOLOGY
Selection of learning outcomes
Job offers rank
Comparison of required
learning outcomes
(left) with possessed
ones (right)
Figure 2. The LO-MATCH platform interface. The job seeker chooses learning outcomes that better
describe him- or herself. The platform presents a ranked list of matching job offers by showing
possessed learning outcomes that match up with those required by the position.
each linked to a semantic similarity-based score
as well as to its distance from the corresponding
expectations and needs.
The last feature is particularly useful for both
user groups:
t Job seekers can get hints about missing competences to increase their chances of being hired
by a given company.
t Recruiters can quickly and easily examine the
different résumés, as well as identify candidates’
46
weak points, needing monitoring and reinforcement once hired.
Figure 3 shows a simplified example of how
learning outcomes are compared in LO-MATCH.
Learning outcomes possessed by job seekers are
annotated (dotted line) according to the WordNet
semantic thesaurus (central sphere), containing
concepts (keyword boxes) and relations among
them (solid lines among boxes).
Assuming that a recruiter is looking for an individual who can “autonomously exploit current
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
apparel software applications,” the
platform could suggest a candidate
who can “draw dresses manually”
(because of the relation between “apparel” and “dresses”) as well as someone who can “use, under supervision,
CAD applications for the fashion industry” or “develop technical drawings using a PC program” (because of
the relations between “software,” “PC
program,” and “CAD,” among others). Once heterogeneously shaped
contents have been brought to a
common understanding, semantic
distance between concepts can be exploited to provide the recruiter with
ranked results so he or she can make
a final decision.
To work out design sketches
by hand
To autonomously exploit
current apparel software
applications
Semantic
thesaurus
sketches
by hand
apparel
software
manually
drawings
To draw
dresses
manually
Recruiter
PC program
draw
Job seeker
(JS)
CAD
dresses
To use under
supervision CAD
applications for
the fashion
industry
Developing technical
drawings using a PC
program
JS
JS
S
JS
Testing and User Feedback
In the MATCH project, the LO- Figure 3. Comparison of annotated learning outcomes in LO-MATCH.
MATCH platform represents the Learning outcomes possessed by job seekers are annotated (dotted
technological tool supporting a broad line) according to the WordNet semantic thesaurus (central sphere),
job placement methodology aimed at containing concepts (keyword boxes) and relations among them
fostering the growth of cross-national (solid lines among boxes).
and -cultural occupational opportunities in Europe. A piloting phase
shared the same professional experiences—
was carried out, focused on migrants. Although
mainly as house or hotel cleaners, cooking assismigrants are often qualified for available positants, health and social care operators, or shop
tions, their previous learning in their home counassistants. Most of them also had previous fortry might be only partially acknowledged abroad.
mal learning at the secondary or vocational level.
Furthermore, migrants might have difficulty inThe platform let operators link both formal and
teracting with job centers and hiring staff in the
nonformal learning to professional profiles reclanguage of the receiving country.
ognized in the receiving country. For migrants
Consequently, during piloting, the role of the
without any previous experience, the platform
platform was twofold. First, it enabled the deindicated ways to fill the education and training
velopment of an accreditation procedure for
gaps by showing learning outcomes most frerecognizing, validating, and certifying prior
quently requested for the available positions.
learning—that is, for constructing the migrant’s
Résumés were then matched against job offers
professional dossier (including the résumé) and
published by 54 employers and job agencies from
issuing a corresponding vocational certificate.
the various participating countries. In almost all
Second, it was used to implement the matchmakcases, the one-stop shop experience was followed
ing by comparing certified learning outcomes
by an interview at the employer premises (with the
with annotated job offers.
hiring staff confirming the validity of the platThe methodology was implemented in “oneform-based selection process) or with the suggesstop shops”—that is, platform-enabled job cention of (further) education or training actions.
ters managed by the Chambers of Commerce
During piloting, several issues were raised about
and training institutions of six project countries.
platform usability that should be addressed before
There, from February to December 2012, qualilarge-scale exploitation. One issue was related to
fied operators provided guidance and coaching
the requirement to operate either in English or in
to more than 100 migrants. Almost all of them
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
47
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
FEATURE: SEMANTIC TECHNOLOGY
the profile original language (because of the underlying ontology). Also, some employers complained about the need to insert data into “yet
another platform.” A further problem related to
the constrained set of reference profiles, which
limited the expressive power of résumés. The last
issue was the lack of a way to record evidence of
previous formal and nonformal learning.
The project formally ended in March 2013,
and there are plans to further address these issues and prepare the platform for “prime time”
use. Such plans include introducing computersupported translation functionalities, extending
the ontology, and implementing suitable data integration strategies to automatically feed into the
platform data coming from external repositories
of national and sectorial profiles and job offers.
ob matchmaking is an important issue in
today’s global, distributed, and heterogeneous job market. Future research should
be tailored to reduce the dependency on experts
and users by developing automatic strategies for
a seamless integration of existing profiles, résumés, and job advertisement repositories with
matchmaking platforms. Additional research and
implementations could also be targeted to further
strengthen system flexibility, identify suitable approaches for fully exploiting existing standards
and classifications, and define and implement
validation methodologies to evaluate and check
the effectiveness and performance of automatic
job matchmaking techniques.
J
3.
4.
5.
6.
7.
8.
9.
10.
Acknowledgments
This work has been partially supported by the MATCH “Informal and non-formal competences matching devise for migrants
employability and active citizenship” project (510739-LLP-12010-1-IT-GRUNDTVIG-GMP). This project has been funded
with support from the European Commission. This document reflects only the authors’ views; the Commission can’t be held responsible for any use that might be made of the information contained
herein. We thank the anonymous reviewers for their comments.
11.
12.
Facebook and LinkedIn,” Proc. Int’l Conf. on Supporting
Group Work, 2009, pp. 95–104.
C.I. Muntean, D. Moldovan, and O. Veres, “A Data
Mining Method for Accurate Employment Search
on the Web,” Proc. 2010 Int’l Conf. Communication and
Management in Technological Innovation and Academic
Globalization, 2010, pp. 123–128.
I. Ryguła and R. Roczniok, “Application of Neural
Networks in Optimization of the Recruitment Process for Sport Swimming,” J. Medical Informatics &
Technologies, 2004, pp. 75–82.
N. Sivaram, “Ant Colony Optimization to Discover
the Concealed Pattern in the Recruitment Process of
an Industry,” Int’l J. Computer Science and Eng., vol. 2,
no. 4, 2010, pp. 1165–1172.
D.L. Denning, N.E. Abrams, and M. Bays, “Personnel Assessment Specialist Job Analysis: Interpretation and Use Report,” Int’l Personnel Management Assoc.
Assessment Council, 1995; http://annex.ipacweb.org/li_________________
brary/psjoban.pdf.
___________
F. Herrera et al., “Solving an Assignment-Selection
Problem with Verbal Information and Using Genetic
Algorithms,” European J. Operational Research, no. 119,
1999, pp. 326–337.
K. Sugawara, “Agent-Based Application for Supporting Job Matchmaking for Teleworkers,” Proc. 2nd IEEE
Int’l Conf. Cognitive Informatics, 2003, pp. 137–142.
M. Fazel-Zarandi, M.S. Fox, and E. Yu, “Ontologies
in Expertise Finding Systems: Modelling, Analysis,
and Design,” Ontology-Based Applications for Enterprise
Systems and Knowledge Management, IGI Global, 2013,
pp. 158–177.
M. Mochol, H. Wache, and L. Nixon, “Improving the
Accuracy of Job Search with Semantic Techniques,”
Proc. 10th Int’l Conf. Business Information Systems, 2007,
pp. 301–313.
B. Ionescu et al., “Semantic Annotation and Association of Web Documents: A Proposal for Semantic
Modelling in the Context of E-Recruitment in the IT
Field,” Accounting and Management Information Systems,
vol. 11, no. 1, 2012, pp. 6–96.
H. Lv and B. Zhu, “Skill Ontology-Based Semantic
Model and Its Matching Algorithm,” Proc. 7th Int’l
Conf. Computer-Aided Industrial Design and Conceptual
Design, 2006, pp. 1–4.
References
1. R. Applegate, “Job Ads, Jobs, and Researchers:
Searching for Valid Sources,” Library & Information
Science Research, vol. 32, no. 2, 2010, pp. 163–170.
2. M. Skeels and J. Grudin, “When Social Networks
Cross Boundaries: A Case Study of Workplace Use of
48
Paolo Montuschi is a professor of computer engineering
at Politecnico di Torino, Italy. His research interests are in
computer arithmetic, architectures, graphics, electronic publications, and semantics and education. He is an Associate Editor-in-Chief of IEEE Transactions on Computers and
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
member of the steering committee of IEEE Transactions
on Emerging Topics in Computing. He is the Chair of
the Computer Society Magazine Operations Committee and
a member of both the IEEE PSPB and PSC. He is a Fellow of
IEEE, a Computer Society Golden Core Member, and a life
member of the International Academy of Sciences of Turin.
Please visit his personal page at http://staff.polito.it/paolo.
montuschi/
paolo.montuschi@polito.it.
______ and contact him at _______________
Valentina Gatteschi is a research assistant at Politecnico di
Torino, Italy. Her research interests are in semantic processing.
Gatteschi has a PhD in computer engineering from Politecnico
di Torino. Contact her at valentina.gatteschi@polito.it.
________________
Fabrizio Lamberti is an assistant professor at Politecnico
di Torino, Italy. His research interests include computational
intelligence, semantic processing, distributed computing,
human-computer interaction, computer graphics, and visualization. Lamberti has a PhD in computer engineering from Politecnico di Torino. He is an IEEE Computer
Society member and IEEE senior member. Please visit his
personal page at http://staff.polito.it/fabrizio.lamberti and
contact him at ________________
fabrizio.lamberti@polito.it.
Andrea Sanna is an associate professor at Politecnico di
Torino. His research interests include computer graphics,
virtual reality, parallel and distributed computing, scientific visualization, and computational geometry. Sanna has
a PhD in computer engineering from Politecnico di Torino.
He is a senior member of ACM. Please visit his personal
page at http://sanna.polito.it and contact him at ____
andrea.
sanna@polito.it.
_________
Claudio Demartini is a professor at Politecnico di Torino, Italy, where he teaches information systems and innovation and product development. His research interests
include software engineering, architectures, and Web semantics. He is a senior member of the IEEE and a member
of the IEEE Computer Society and the Academic Senate
of Politecnico di Torino. Please visit his personal page at
http://staff.polito.it/claudio.demartini/ and contact him at
claudio.demartini@polito.it.
________________
CALL FOR ARTICLES
IT Professional seeks original submissions on technology
solutions for the enterprise. Topics include
z
z
z
z
z
z
z
emerging technologies,
cloud computing,
Web 2.0 and services,
cybersecurity,
mobile computing,
green IT,
RFID,
z
z
z
z
z
z
z
social software,
data management and mining,
systems integration,
communication networks,
data center operations,
IT asset management, and
health information technology.
We welcome articles accompanied by Web-based demos.
For more information, see our author guidelines at
www.computer.org/itpro/author.htm.
WWW.COMPUTER.ORG/ITPRO
______________________________________
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
49
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
FEATURE: CLOUD COMPUTING
Cinema Cloud:
An Enabling Technology
for the Movie Industry
Wai-Ming To and Linda S.L. Lai, Macao Polytechnic Institute, China
David W.K. Chung, Hong Kong Cyberport Management, China
Andy W.L. Chung, XNT, China
With the promise of high definition and advanced special effects,
movie theaters worldwide have evolved from traditional film projection
to digital cinema projection. The Cyberport Digital Cinema Cloud helps
facilitate the development of digital entertainment in Hong Kong.
lthough the movie industry invests
heavily in developing sophisticated
tools and techniques for producing
special effects, paradoxically, movie
distribution continues to rely on the traditional
mode of physical distribution. In the past, studios produced authorized copies in the form of
roll film. Currently, studios produce authorized
copies in digital form that are stored on hard
disks. Copies are distributed to authorized movie
theaters through a secure delivery system, and
the keys are sent via email. The key is a coded file
made specifically for each theater that controls
the digital projector regarding which version of
the movie will be played within a specific period.
The entire physical distribution process involves
duplication, transportation, and validation—
which can take days to weeks to complete.
A
50
IT Pro September/October 2014
Furthermore, digital movies are demanding
on computer systems. In a digital movie, projection resolution is represented by the horizontal
pixel count, usually in the 2K (2,048 u 1,080
2.2 megapixels) or 4K format (4,096 u2,160 8.8
megapixels). Thus, even in the 2K format, a fulllength, 90-minute movie with subtitles requires a
storage capacity of 75 to 150 Gbytes, whereas in
the 4K format, the same movie requires a storage
capacity of 360 to 900 Gbytes. At 24 frames per
second, the bandwidth for real-time playback of
a video is approximately 21 to 42 megabits per
second for the 2K format and 100 to 250 Mbps
for the 4K format.1 Hence, companies such as
Barco, Christie, Kinoton, NEC, and Sony have
developed special digital cinema projectors. In
addition, some companies, such as Barco, Dolby,
Doremi (partnering with NEC), GDC, Qube, and
Published by the IEEE Computer Society
1520-9202/14/$31.00 © 2014 IEEE
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Satellite
Sony, have supplied servers that are
transmission
responsible for the control and automation of an entire multiplex.
Digital cinema
Nevertheless, the cost and technipackages (DCPs)
cal knowledge for installing, operatDCC network
International
ing, and maintaining such a complex
network
system are high. The future cost of
Live alternative
upgrading the system could be even
content
higher. Deploying cloud computing can help minimize the investment from movie theater operators
while enhancing the workflow. In
particular, using cloud computing
Digital cinema 1
as a framework that enables conveDigital cinema 2
Digital cinema 3
nient, on-demand network access to
a shared pool of configurable com- Figure 1. Schematic diagram of Cyberport’s Digital Cinema Cloud
puting resources (for example, wired (DCC). The DCC serves as a hub that receives, transmits, and
and wireless networks, servers, stor- manages the broadcasting of movies and events securely.
age, applications, and services) can
offer greater flexibility and reliability
to users—that is, movie distributors
and theater operators.2
transferring and replicating large-size digital files
over WANs presents challenges using traditional
With funding provided by the Film DevelopTCP-based replication tools. The latency and
ment Council of Hong Kong, in 2010, Hong Kong
packet loss created over long distances disrupt
Cyberport Management initiated and managed a
replication over TCP. Based on the trial tests,
pilot project called the Digital Cinema Exchange.
TCP’s throughput dropped to less than 10 perThe project aimed to establish Cyberport’s Digicent of the maximum amount possible, and the
tal Cinema Cloud (DCC) and deploy its services
round-trip time (RTT) increased to 300 millisecto all movie theaters in Hong Kong and possibly
onds, representing a 5 percent packet loss.
parts of mainland China.
In the DCC, we adopted heterogeneous networks and various network protocol technologies,
Configuring a Cinema Cloud
such as forward error correction and multicasting
Cyberport’s DCC is a platform as a service that
via IPv6, to overcome these problems and restricoperates in a private cloud environment. Figtions. By connecting DCC and multiple theaters
ure 1 shows the system architecture of Cyberas a virtual private network, the system achieved
port’s DCC.
a low RTT, with less than 5ms latency. The use of
Figure 1 illustrates that the DCC receives digiIPv6 multicast applications also greatly reduced
tal cinema packages and alternative content (see
network resources and traffic loading. In terms
the related sidebar) via a satellite link or an interof communication bandwidth, DCC can easily
national network and then distributes the conhandle 100 to 350 Gbytes in the JPEG2K format
tent to local digital movie theaters. Cyberport is
for a movie, and up to 50 Mbps for stereoscopic
equipped with a 10-gigabits-per-second back3D content in MPEG-2 or MPEG-4 format for
bone network, whereas most Hong Kong digilive movie signal to multiple theaters.
tal theaters subscribe to a 100 Mbps high-speed
broadband connection to Cyberport’s DCC. As
of February 2014, 48 local theaters with 206
Digital Theaters in China
screens are streaming movies from the DCC, up
The film and movie theater industries have enfrom 11 local theaters with 60 screens in 2010.
joyed significant growth in China, even under the
Cyberport established a centralized digital-asthreat of the rise of home entertainment via the
set-management system to manage different meInternet.3,4 In 2013, China’s box office takings
dia files in a secure environment. Nevertheless,
surged by 27.5 percent to ¥21.8 billion.5 Out of
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
51
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
FEATURE: CLOUD COMPUTING
Alternative Content
lternative content refers to events and programs other than movies—such as operas,
musicals, stage performances, rock concerts,
and sports—that can be projected in digital
cinemas, particularly in stereoscopic 3D format.1
This type of content represents a new source
of revenue for the cinema industry. According to Chris McGurk, chairman and CEO of US
Cinedigm Digital Cinema, alternative content in
digital movie cinemas could be a US$1 billion
business worldwide. 2
In Hong Kong, Cyberport’s DCC has broadcasted live events to cinemas, including more
than 20 sports games in stereoscopic 3D format
and 30 Japanese pop concerts in 2D format in the
past two years. At one time, two live pop concerts
were transmitted simultaneously to theaters via
the multicast networks—that is, multiple-content
to multiple-location screening. Although the
A
revenue generated from alternative content is low
compared with the traditional movie box office,
the growth potential is tremendous, because
people who don’t have the time or desire to travel
might be interested in watching overseas live
events on big screens, preferably in stereoscopic
3D format.
References
1. European Digital Cinema Forum, “The EDCF Guide
to Alternative Content in Digital Cinema,” 2008;
www.edcf.net/edcf_docs/edcf_alt_content_for_
dcinema.pdf.
_______
2. “Cinedigm CEO: Alternative Content in Movie
Theaters Could Be A $1 Billion Business,”
The Hollywood Reporter, 15 Mar. 2012; www.
___
hollywoodreporter.com/news/cinedigm________________________
alternative-content-1-billion-business-chris__________________________
mcgurk-300763.
_________
Number of cinema screens in China
to be 20,285 by the end of April 2014,
implying that, on average, 17 movie
20,000
Others
theater screens are opening each day.
195
Digital
18,000
Figure 2 shows the total number of
3D Digital
3,891
movie theater screens grew in China
16,000
from 2007 to 2013.6 The figure in14,000
dicates that the number of digital
893
screens (2D and 3D) increased from
12,000
2,725
700 in 2007 to 4,100 in 2010, then to
10,000
18,000 in 2013.
893
8,000
Figure 3 shows the number of
14,109
3,038
movie
theater screens in the US.7 The
6,000
2,156
total number of screens increased
9,500
4,000
slightly from 38,975 in 2007 to 39,783
3,123
2,080
3,297
2,827
in 2013, whereas most digital screens
5,355
2,000
2,020
900
(3D and 2D) were used to replace an670
618
700
82
130
0
alog screens from 2007 to 2013. The
2012
2013
2009
2010
2011
2007
2008
number of digital screens accounted
Year
for 92.5 percent of all US screens
in 2013.
Figure 2. Number of movie theater screens in China. The number of
In comparing the information predigital screens (both 2D and 3D) increased from 700 in 2007 to 4,100
sented in Figures 2 and 3, the number
in 2010, then to 18,000 in 2013.
of screens in China is approximately
45.7 percent of that in the US. On the
other hand, China’s population is approximately 1.35 billion, whereas that of the US
these earnings, ¥12.8 billion were revenues from
is 0.31 billion. Thus, the number of people per
local movies and ¥9 billion from foreign films. At
screen in the US is 8,000, whereas this number
the end of 2013, China had 18,195 movie theater
in China is 74,200. The number of movie thescreens, around 99 percent of which were digiater screens in China is expected to have annual
tal. The total number of screens was estimated
52
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
THE WORLD’S NEWSSTAND®
double-digit percentage growth over
the next decade as it follows a logistic
growth curve.4
In realizing the rapid development
of digital movies and digital theaters
in mainland China, Cyberport’s DCC
is actively testing the reliability, flexibility, and scalability of cloud infrastructure. Moreover, Cyberport has
met with China’s content providers
to discuss streaming alternative content to Hong Kong and other regions
or streaming movies and alternative
content to mainland China.
Number of cinema screens in the U.S.
40,000
2,981
6,533
35,000
13,959
30,000
25,000
24,812
34,342
33,319
Using cloud technology in the movie
industry presents clear advantages, as
illustrated in Table 1.
19,570
31,815
20,000
22,319
12,686
15,000
6,898
10,000
5,000
0
4,149
3,646
986
2007
4,088
1,427
2008
The Digital Cinema Cloud
Advantages
3,289
2009
Others
14,483
7,837
12,935
2010
Year
2011
Digital
13,559
2012
2013
3D Digital
Figure 3. The number of movie theater screens in the US. The total
number of screens increased slightly from 38,975 in 2007 to 39,783 in
2013, whereas most digital screens (2D and 3D) were used to replace
analog screens from 2007 to 2013.
One obvious advantage of the DCC
is that it lowers the cost and difficulty of film animation sequences, which can
be particularly expensive due to the amount of
computing power they typically require.8 Using
cloud computing servers for film animation is
justified, given the periodic nature of animation
production as well as the occasional need to
procure an extensive amount of power, which,
as Qi Zhang, Lu Cheng, and Raouf Boutaba
noted, is one of the main strengths of cloud
computing.8
In addition to these technological advantages,
accessing and licensing creative productions,
such as movies and songs, will become easier.
Daniel Gervais noted that cloud computing
offers the advantage of enabling significantly
easier distribution of works directly to theaters
and allows for better tracking of the distribution of these works.9 Furthermore, he argued
that film studios must embrace this technology
rather than try to maintain control of distribution through physical devices, as has been
attempted in recent years, because consumers
are increasingly unwilling to accept this type of
restriction on their media use.9 Gevais states
that using cloud-based distribution approaches can enable better control of media, such as
films, and offer fewer distribution points than
are currently used; as such, the potential for
loss of property rights will be restricted, and
the extent of intellectual property loss will be
controlled.
Concerns
Cloud technology isn’t without its drawbacks for
the movie industry. One of the most important
concerns is the management and control of intellectual property. Intellectual property is one
of the main issues in contractual relationships
for cloud computing, because cloud computing
is inherently more open and more prone to jurisdictional and other legal issues (although not
necessarily more prone to data security breaches) than self-hosted or on-site computing services. The potential for an intellectual property
breach should not be overstated. As one report
noted, “75 to 80 percent of intellectual property
breaches are a result of attacks made inside the
company.”10 Based on this figure, the greatest potential problem for intellectual property
will actually not be from the cloud computing
services.
Additionally, auditability and privacy can be added to cloud services, and highly sensitive data can
be retained in-house, to prevent breaches. However, privacy and protection of intellectual property
remain pertinent concerns. Other concerns must
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
53
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
FEATURE: CLOUD COMPUTING
Table 1. Key benefits of adopting the Digital Cinema Cloud.
Group receiving benefits
Benefits
Film distributors and producers
Secure centralized storage in Hong Kong
Minimized risk of movie piracy with centralized digital-watermark technology
Reduced delivery time and cost
Reduced risk of physical damage during delivery
Theater operators or owners
Reduced cost of international bandwidth
Shorter delivery time and lower associated costs
Greater flexibility for show times
Lower running costs in the long-term
Post-production companies
(particularly those in Hong Kong)
Less time spent transferring files between companies for footage production
Enhanced efficiency for a number of post-production processes
Audience
Simultaneous worldwide releases of major feature films
Opportunities to participate in overseas live events
Enhanced quality of experience
Those with special needs can enjoy films and live events using personal
headsets
be considered for cloud computing when applied
to the movie industry. Some of the problems generally include cost of services, service quality and
reliability, and the potential that the provider could
go out of business (which could constrain the
availability of existing data). These concerns grow
even larger with customer lock-in, which constrains the ability of the user to move out of the
provider’s services.
Cinema Cloud Opportunities
One of the major opportunities for theaters
using digital screens and cloud distribution is
that cloud computing enables efficient storage
and streaming of ultra-high-definition (UHD)
media formats. Okung-Dike Ntofon, Dimitra
Simeonidou, and David Hunter discussed the
emergence of future media technologies such
as 4K and 8K technologies, which can be classified as UHD.11 They noted that these formats are significantly higher definition, but
also have significantly higher size and quality
of service requirements. To overcome these requirements, Ntofon, Simeonidou, and Hunter
proposed the implementation of an Advanced
Media Services Cloud, which can be deployed
over optimal networks.11 The development of
this cloud will enable digital and cloud media
producers to deliver higher quality media to
consumers in their homes or other locations,
although success is dependent on the implementation of appropriate optical networks
and the adoption of UHD technology at the
consumer level.
54
However, theaters using digital screens and
cloud computing also offer opportunities to
challenge the current industry model. Inexpensive cloud computing means that independent
filmmakers can extensively use CGI and special
effects in their films—an opportunity previously only afforded to big-budget studio films.12
Gregory Graham has also noted that film production and distribution has been substantially
eased for independent filmmakers since the introduction of cloud computing, offering them
a much easier avenue to reach viewers as well
as theaters.12 Thus, cloud computing offers an
opportunity to change the fundamental nature
of the film industry by realigning the productive power of major studios and independent
outfits.
lthough digital transmission of the
movie content has been available for
more than 10 years,13 the large-scale
deployment of digital screens has only occurred
recently due to 3D blockbusters. In China, a
number of movie production companies are
currently working on 3D movie projects, and
Cyberport’s DCC will help them present their
movies to audiences in a more secure and effective manner.
The movie industry presents opportunities for
IT growth—in particular, through the deployment of cloud-based services, ranging from digital archiving to high intensity processing, B2B
monetization, and business analytics.14 Indeed,
A
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
THE WORLD’S NEWSSTAND®
Hewlett-Packard has launched the HP Public
Cloud to explore opportunities brought by the
rapid growth of IT use in the entertainment industry, including movies.15
Acknowledgment
A grant (RP/ESCE-01/2013) from the Macao Polytechnic Institute supported this research.
References
1. “The EDCF Guide to Digital Cinema Mastering,”
European Digital Cinema Forum, 2007; www.cinema
technologymagazine.com/pdf/EDCF%20Mastering29
pageswithcubelogo.pdf.
______________
2. W.M. To, L.S.L. Lai, and A.W.L. Chung, “Cloud
Computing in China: Barriers and Potential,”
IT Professional, vol. 15, no. 3, 2013; doi:10.1109/
MITP.2012.64.
3. L.S.L. Lai and W.M. To, “The Emergence of China
in the Internet Market,” IT Professional, vol. 14, no. 1,
2012; doi:10.1109/MITP.2012.16.
4. L.S.L. Lai and W.M. To, “Internet Diffusion in China: Economic and Social Implications,” IT Professional, vol. 14, no. 6, 2012; doi:10.1109/MITP.2012.65.
5. “China’s Box Office Takings Surge Since 2002,” China Daily, 6 June 2014; usa.chinadaily.com.cn/business/2014-06/06/content_17568703.htm.
________________________
6. “The Development of Movie Industries in China” [in
Chinese], The Administration Center of Digital Film
Content, 2014; www.dmcc.gov.cn/publish/main/175/
2014/20140109170500645862417/201401091705006
________________________________
45862417_.html.
__________
7. “Theatrical Market Statistics—2013,” Motion Picture Association of America, 2014; www.mpaa.org/
wp-content/uploads/2014/03/MPA
A-Theatrical________________________________
Market-Statistics-2013_032514-v2.pdf.
_______________________
8. Q. Zhang, L. Cheng, and R. Boutaba, “Cloud Computing: State of the Art and Research Challenges,” J. Internet Server Applications, vol. 1, no. 1, 2010;
doi:10.1007/s13174-010-0007-6.
9. D. Gervais, “The Landscape of Collective Management Schemes,” Columbia J. Law and the Arts, vol.
34, no. 4, 2011; http://works.bepress.com/daniel_
gervais/35.
______
10. M. Creeger, “Cloud Computing: An Overview,” 1 June
2009; http://queue.acm.org/detail.cfm?id=1554608.
11. O-D. Ntofon, D. Simeonidou, and D. Hunter,
“Cloud-Based Architecture for Deploying UltraHigh-Definition over Intelligent Optical Networks,”
Proc. 16th Int’l Conf. Optical Network Design and Modeling
(ONDM), 2012; doi:10.1109/ONDM.2012.6210201.
12. G. Graham, “Storm Fronts and Filmmaking: Cloud
Computing Regulation and the Impact on Independent Filmmakers,” Pittsburgh J. Technology Law and
Policy, vol. 13, 2012; http://tlp.law-dev.library.pitt.edu/
ojs/index.php/tlp/article/view/109/114.
_______________________
13. European Digital Cinema Forum, “The EDCF Guide
to Alternative Content in Digital Cinema,” 2008;
w w w.edcf.net /edcf_docs/edcf_ alt _content _for_
dcinema.pdf.
14. “Cloud Computing for the Media and Entertainment
Industry,” IBM, 2010; http://www-304.ibm.com/
easyaccess/fileserve?contentid=224012.
________________________
15. C. Winter, “The Media & Entertainment Industry
Drives Cloud Innovation,” 2013; www.hpcloud.com/
blog/media-entertainment-industry-drives-cloud________________________________
innovation.
_______
Wai-Ming To is a professor in the School of Business at
the Macao Polytechnic Institute, China. His research interests
include environmental management and total quality management. To has a PhD in structural dynamics from Imperial College London, UK. Contact him at wmto@ipm.edu.mo.
___________
Linda S.L. Lai is an associate professor in the School of
Business at the Macao Polytechnic Institute, China. Her research interests include knowledge management and electronic
commerce. Lai has a PhD in information management from
Lancaster University, UK. Contact her at sllai@ipm.edu.mo.
__________
David W.K. Chung is the chief technology officer of Hong
Kong Cyberport Management, where he is responsible for
IT&T services operations and technology center management. His research interests include cloud computing and
knowledge management. Chung has a PhD in engineering
management from the City University of Hong Kong. Contact him at ________________
davidchung@cyberport.hk.
Andy W.L. Chung is the founder of XNT, a company
specializing in creative digital applications, phone games,
and cloud applications. His research interests include environmental modeling and game design. Chung has an MSc
in environmental engineering and management from the
Hong Kong University of Science & Technology. Contact
him at _______
info@xnt.hk.
Selected CS articles and columns are available
for free at http://ComputingNow.computer.org.
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
55
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
FEATURE: CLOUD COMPUTING
Deploying a
Maritime Cloud
Kleanthis Dellios and Dimitrios Papanikas, University of Piraeus, Greece
The authors offer a roadmap for building a Maritime Cloud, offering
virtual platforms, tools, and data for the maritime domain. They
describe the proposed architecture and delivery models, evaluate
advantages and challenges, and suggest future research directions.
ociety depends on physical, cybernetic,
and network infrastructures to provide information and communications
technology (ICT) services and systems
and to interact with numerous complex and heterogeneous IT systems. Nowadays, the need for
modern ICT systems is particularly apparent in
the transportation sector, including the maritime
domain,1 which includes a complex digital environment for coordinating numerous entities, such
as ports, ships, port authorities, maritime and insurance companies, and government ministries.
The EU Maritime Transport Strategy recognizes
the critical role of ICTs for increasing productivity,2
but the involved parties—from participating enterprises to governments and standardization bodies—face numerous challenges when it comes to
ensuring the standardization, interoperability, and
S
56
IT Pro September/October 2014
availability of information.3 Because the maritime
environment comprises numerous heterogeneous
IT systems hosting a wide range of e-services,
managing unlimited I/O information and data,
cloud computing technology offers a possible solution. Here, we explore how traditional maritime IT
systems could be expanded to develop and deploy a
harmonized maritime cybernetic environment—a
Maritime Cloud that is able to host cross-border
and trustworthy e-maritime services.4
The Maritime Domain
We can group the various maritime entities and
assets as follows:
t UIF QIZTJDBM FOWJSPONFOU—port infrastructure,
facilities, authorities; maritime and insurance companies; shipping and cargo industry,
Published by the IEEE Computer Society
1520-9202/14/$31.00 © 2014 IEEE
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Maritime cloud architecture
Virtual switch0-management
Virtual switch2-VM PortGroup
Virtual machines workloads balance
Hypervisor n
Hypervisor 1
Virtual security
manager
Backup
appliance
Cloud
portal
Virtual switch - 2 GbE
High availability virtual machine
monitoring
Virtual LAN
10GbE Ethernet channel
High throughput - low latency cluster interconnection
Storage pool & appliance
GbE NIC 1
Cluster file system
GbE NIC 2
SSD + SAS
Figure 1. IT architecture design of the Maritime Cloud stack.
manufacturers, and suppliers; government
ministries; the financial and banking domain;
linked transportation infrastructure; and human
resources; and
t UIFDZCFSOFUJDFOWJSPONFOU—infrastructure (buildings, ships), platforms (servers, networking terminals, databases), telecommunication systems
(networking terminals, satellites, geographic
information systems), software and manuals
(information and data), e-services (applications, frameworks, test environments), other
equipment (such as fire alarm and extinguisher
systems and surveillance systems), internal
(administrators, personnel) and external users
(port authorities, maritime companies), and objects (ships, cargo).
Because the maritime environment consists of such
a heterogeneous variety of hardware and software
without any middleware solution for managing
big data, adopting new technologies is becoming a
major burden for the maritime domain. Although
cloud computing technology is still evolving, it
could help manage big data and integrate new
technologies. Most users are already interacting
with cloud-enabled services (that is, email, social
media, online gaming, and mobile applications),
and new datacenters are continuously being built
to improve IT agility,5,6 resulting in reduced energy
consumption and carbon footprints.7,8
In fact, the US Navy successfully adopted the
cloud computing concept in 2011, creating a private cyber environment, exploiting land, marine,
and aerial technological resources as well as dynamic, static, and collaborative infrastructures and
shared computer systems and resources.9 Building a cloud model for the commercial and enterprise maritime environment to help manage the
complexity and heterogeneity of distributed and
decentralized infrastructures and integrate existing services would reduce management effort via
geographically remote networks. It would also deliver services and provide access to data, enhancing operational capabilities and improving the
way in which IT supports the modern e-maritime
domain.
Constructing the Maritime Cloud
The Maritime Cloud stack is based on the proposed architecture of unified cloud entities, as
described by Lamia Youseff 10 and widely adopted
by IBM. Figure 1 depicts the proposed Maritime
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
57
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
FEATURE: CLOUD COMPUTING
Cloud architecture and stack, comprising the
following five layers.
Hardware Layer
The hardware layer is the physical hardware and
firmware, including the maritime IT infrastructure
and physical facilities forming the backbone of the
Maritime Cloud stack. It can be used in cases of
government organizations or ministries investing
in datacenters and IT infrastructure. It includes
servers and storage solutions.
For example, storage solid state drives (SSDs)
provide a reliable, high-performance serial attached SCSI (SAS) storage solution. The SAS
interface with SSDs is used for I/O-intensive,
demanding enterprise environments such as the
maritime domain, high-performance computing, video on demand, and large-scale datacenters
for other mission-critical applications. A virtual
switch can also be included in this layer as part
of the server firmware. Datacenter management
and power consumption optimizations are also
included.
Kernel Layer
The kernel layer is responsible for memory management, process management, task scheduling, and disk management. Yet kernels are often
overlooked, despite being one of the most critical
pieces when creating a cloud architecture. This
layer includes the software interface for hosting
three major components: the hardware, guest
systems, and console operating system. It adds
a management interface for the interaction of
the core server system and the virtual machines
(VMs) running on the server. It provides the software kernel (to be implemented as the OS kernel), a hypervisor (virtualization manager), VM
monitoring, and cluster middleware.
Infrastructure Layer
This fundamental layer provides resources to the
other layers of the stack, including applications.
The Maritime Cloud services of this layer can be
categorized into
t DPNQVUBUJPOBM SFTPVSDFT (infrastructure as a service, or IaaS), including virtualization concepts
(that is, paravirtualization and hardware-assisted virtualization) for providing computational resources to Maritime Cloud users;
58
t EBUBTUPSBHFBTBTFSWJDF (DaaS), letting Maritime
Cloud users store their data and access them
anytime from anywhere; and
t TDIFEVMFEBOESFMJBCMFDPNNVOJDBUJPODBQBCJMJUZBTB
TFSWJDF (CaaS), including traffic isolation, dedicated bandwidth, communication encryption,
and network monitoring.
The data storage helps administrators develop
virtual storage class data services, offer scalability, and present a choice of storage protocols,
all with better throughput to meet storage requirements. A distributed storage manager enables VM load balancing based on storage I/O
and capacity within a cluster VM, with the VM
workload balance based on CPU and memory
resource utilization. The virtualized high-performance cluster system provides storage virtualization optimized for VMs and efficiently
stores the entire VM state in a central location
that supports virtualization-based distributed
infrastructure services. Tiered storage allows
the entire system to consolidate and deploy different types of storage within the same networkattached storage-based system.
The communication capability includes the
network interface controller (NIC) acting as
the base of the entire selected network protocol stack, allowing communication between the
physical layer and data link layer among groups
of the same LAN and large-scale network communications through routable protocols (that
is, IP). NIC virtualization provides information
on NIC functionality for the virtualized 10-Gb
Ethernet (GbE) channel. It allows sharing a single 10-GbE network port, and its virtual Media
Access Control provides statistics per server on
transmitted and received (Tx/Rx) traffic. The
Link Aggregation Control Protocol for gigabit
interfaces configures the GbE port channels,
allowing bundling of multiple GbE links into a
single logical interface on a router. It is defined in
the IEEE 802.3ad specification as aggregation of
multiple link segments.
The virtual switch is the software program that
allows one VM to communicate with another; it
actually inspects the data packets before passing
them forward. The hypervisor or the VM monitor
(VMM) acts as the software-based virtual datacenter for delivering, providing, and consuming
services, and it offers automated storage services.
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Platform Layer
This layer uses IT automation to integrate service
provisioning and allow administrators and architects to develop complex automation tasks, also
delivering service-level agreements (SLAs) for
all applications. It supplies the Maritime Cloud
stack’s software developers with programming
framework environments and APIs to develop and
deploy Maritime Cloud interactive and scalable
applications.
Application Layer
This is the top layer of the Maritime Cloud stack.
Here, users access the deployed services provided
through the Maritime Cloud portals.
forms, the databases, and the development tools
(for example, Java runtimes and webservers). Because not all cloud models are appropriate for
the e-maritime ecosystem, and because maritime
entities have different requirements and expectations, developers need to capture and consider
requirements before designing, creating, or using
a Maritime Cloud platform model. For example,
e-maritime environments usually host, store,
and exchange information to provide maritime
participants with e-services, so interoperability
and security are major challenges at all levels of
an appropriate delivery of a Maritime Cloud platform model design.
Software as a Service
Delivery Models
The following Maritime Cloud delivery models
are based on National Institute of Standards and
Technology definitions.
Infrastructure as a Service
Maritime IaaS is the bare infrastructure on which
maritime IT requirements will be deployed, as
previously described, in the Maritime Cloud
hardware, kernel, and infrastructure layer of the
Maritime Cloud stack. The M-IaaS delivery model is responsible for providing server, storage, networking, and load-balancing services, and system
management.
The Maritime Cloud infrastructure architecture can be designed using the existing maritime
IT without excluding the hardware components
of other organizations or companies related to the
maritime sector. Existing maritime IT infrastructure and systems can be refurbished and fully
utilized.
Platform as a Service
Maritime platform as a service (M-PaaS) is the
premium infrastructure and united platform that
provides tools and facilities for designing, developing, testing, deploying, and hosting maritime
application solutions and services. Developers
can create fully customizable e-maritime platforms while integrating existing systems and
following business models and standards. Furthermore, M-PaaS enables database integration,
security, scalability, storage, and management.
The crucial modules in a Maritime Cloud environment are the operating systems and plat-
Maritime software as a service (M-SaaS) is the
delivery model where all maritime software, applications, and services are provided on demand.
As the final component of the Maritime Cloud
delivery model, it can lead to the creation of
new cross-border and trustworthy e-maritime
services. M-SaaS is replacing the NIST-defined
SaaS model in the Maritime Cloud delivery
model, so that all involved maritime entities can
collaborate under the same Maritime Cloud and
use the same proposed Maritime Cloud architecture and stack.
Numerous e-maritime services can be included in the M-SaaS layer, including
t vessel services that deliver e-information and
vessel authentication and monitoring (via RFID
and geographic information systems);
t cargo services that deliver e-documentation
and cargo authentication (again, via RFID and
geographic information systems);
t logistics services that provide logistics operations such as e-orders, e-invoicing, e-payments,
and e-reservations;
t multichannel communication (Wi-Fi, VPN)
services that communicate with all maritime
entities; and
t integration services that deliver customs declarations and controls (for example, taxes and
penalties) and offer e-health and e-tourism
support.
Each one of these Maritime Cloud delivery models and services can also be parameterized to
meet the maritime domain’s needs.
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
59
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
FEATURE: CLOUD COMPUTING
Cyber Ocean Deployment
Cloud computing technology can be exploited for
building various types of Maritime Cloud models
in order to deploy them in the maritime domain
and offer e-maritime cloud services worldwide.
Private Maritime Clouds can be limited to specific purposes, serving only the Maritime Cloud
architects and developers at a regional level, and
within the limits (and JEFOUJUZ BDDFTT NBOBHFNFOU
restrictions) of the Maritime Cloud platform’s
users.
Developers can also create community Maritime
Clouds by expanding the capabilities of private
Maritime Clouds and allowing them to be used by
other parties with similar interests, target groups,
and policies (that is, security, privacy, certification, and accreditation). A community Maritime
Cloud can be deployed at the national, regional, or
worldwide level, offering cross-border e-maritime
services accessed by the same entities as in the
private Maritime Cloud but also by suppliers and
end-user partners. Moreover, Maritime Clouds
can provide unlimited access through public Maritime Cloud portals for the general public to access
maritime services. The public Maritime Cloud can
be deployed at the national, regional, or worldwide
level, offering cross-border e-maritime services to
clients and customers.
Finally, a hybrid cloud is a combination of the
previous types. In a future maritime hybrid cloud,
models can be deployed to offer e-maritime services to the general public but also consolidate
legacy applications and data designed for all sides
of the maritime spectrum.
Benefits and Risks
Of course, any decision about diving into the cyber ocean and using the Maritime Cloud must be
based on a detailed analysis of potential benefits
and risks.
If properly designed and implemented in the
maritime domain, cloud computing offers numerous benefits. A Maritime Cloud can provide
increased operational management, improved asset utilization (that is, servers), and improved productivity, especially in application development. It
can achieve energy efficiency and proper human
resource management, and reduce the time and
cost of maintenance and management of IT resources. Users get rapid access to Maritime Cloud
services.
60
A Maritime Cloud also offers efficient optimization of valuable storage, enabling continuous improvement and agility. In addition, by
enhancing maritime mobility with network scalability, it can provide an efficient network load
balance. It can contribute to a stable e-maritime
environment, scale up the number of supported end users, and satisfy their requirements.
Emerging technological trends like BYOD (bring
your own device) can be combined, utilized, and
implemented into standardized processes and
methods of certification and accreditation of a
Maritime Cloud environment.
Green IT (energy-efficient computing) is
part of the IT life cycle and environment, both
physical and cybernetic. By efficiently managing virtualized resource pools and optimizing
application performance, a Maritime Cloud can
minimize energy consumption in datacenters.
Environmental protections can help users adopt
eco-friendly approaches and technologies. By
reducing the IT infrastructure, adopting a Maritime Cloud architecture, or recycling the life of
already existing maritime IT infrastructures, users can also reduce energy costs and system footprints (that is, servers and datacenters) inside a
maritime environment.
Having fewer application licensing costs, better server utilization, less infrastructure costs,
more efficient data storage, less energy use, easy
and free application development and testing,
and instant e-maritime service provision makes
it possible for Maritime Cloud developers to reduce costs and create immediate profit as a vital
benefit and advantage for the maritime domain at
any level—regional, national, and global.
However, despite the initial success of cloud computing, a significant number of risks exist, because
cloud infrastructures and platforms in their current
form don’t employ standardized methods of storing
user data and applications. Issues to be addressed
include the so-called CIA triad—confidentiality,
integrity, and availability—regarding users’ privacy,
data security, legacy system performance, and disaster recovery, and the transition issues that arise
when establishing, maintaining, sustaining, and
managing a new Maritime Cloud environment.
The security, privacy, and trust issues involving Maritime Cloud data migration, management, portability, and interoperability, along with
secure data and application storage, all affect the
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
THE WORLD’S NEWSSTAND®
Maritime Cloud stack and architecture. Maintaining forensics, information management,
and reporting while implementing continuous
monitoring for intrusion detection triggers and
diagnostics must be under continuous consideration, especially when interacting with highmobility, limited-bandwidth, and long-latency
environments.
he adoption of cloud computing technology can revolutionize the maritime domain,
enabling a collaborative environment offering cross-border e-maritime services to all participants and users, and providing reliable information
and immediate processing. IT professionals and
experts can take advantage of highly efficient
cloud infrastructures while increasing agility.
On-demand, ubiquitous network access and location-independent resource pooling are exactly
what the maritime domain needs. In addition,
large-scale infrastructures can lower energy use
and emissions by using cloud computing technology. The maritime deployment models we’ve
presented can be implemented at any level to deliver a variety of innovative e-maritime services.
However, it’s essential to develop a standardized migration strategy for moving to the Maritime Cloud. This will require generating a new
set of e-maritime cloud services to solve interoperability issues among cross-border maritime
standardization bodies, organizations, and working groups—such as the International Maritime
Organization (www.imo.org), the European
Maritime Safety Agency (www.emsa.europa.eu),
and the European Commission’s Innovation
and Networks Executive Agency (http://tentea.
ec.europa.eu/en/about_us/organisation)—leading
___________________________
to a universal maritime policy. Topics such as security, data interoperability, SLAs, and mobility
are open issues for future research work.
T
References
1. “Transportation Systems Sector-Specific Plan: An Annex to the National Infrastructure Protection Plan,”
US Dept. of Homeland Security, 2010; www.dhs.gov/
xlibrary/assets/nipp-ssp-transportation-systems-2010.pdf.
________________________________
2. “Maritime Transport Strategy 2018,” European Commission, Jan. 2009; http://ec.europa.eu/transport/
themes/strategies/2018_maritime_transport_strategy_
________________________________
en.htm.
____
3. “National Plan to Achieve Maritime Domain Awareness,” Air University, Oct. 2005; www.au.af.mil/au/
awc/awcgate/uscg/mda_plan.pdf.
____________________
4. K. Dellios and D. Polemi, “Maritime Clouds for the
European Ports,” 1SPDUI1BOIFMMFOJD$POG*OGPSNBUJDT
(PCI 12), 2012, pp. 422–426.
5. D. Wyld, .PWJOHUPUIF$MPVE"O*OUSPEVDUJPOUP$MPVE
$PNQVUJOHJO(PWFSONFOU, IBM Center for the Business
of Government, 2009; www.businessofgovernment.
org/sites/default/files/CloudComputingReport.pdf.
6. V. Kundra, 4UBUFPG1VCMJD4FDUPS$MPVE$PNQVUJOH, white paper, CIO Council, May 2010; http://cio.gov/wp-content/
uploads/downloads/2012/09/StateOfCloudComputing
________________________________
Report-FINAL.pdf.
___________
7. A. Berl et al., “Energy-Efficient Cloud Computing,”
$PNQVUFS+, vol. 53, no. 7, 2010, pp. 1045–1051.
8. 4NBSU&OBCMJOHUIF-PX$BSCPO&DPOPNZJOUIF*OGPSNBUJPO"HF, tech. report, Climate Group, 2008; www.
____
smart2020.org/_assets/files/02_Smart2020Report.pdf.
9. D. Perera, “Navy Embraces Cloud Computing,” 'JFSDF(PWFSONFOU*5, 13 July 2011; www.fiercegovernmentit.
com/story/navy-embraces-cloud-computing/201107-13#ixzz1iz116Lqm.
_____________
10. L. Youseff, M. Butrico, and D. Da Silva, “Toward a
Unified Ontology of Cloud Computing,” 1SPD (SJE
$PNQVUJOH &OWJSPONFOUT 8PSLTIPQ (GCE 08), 2008,
pp. 1–10; www.cs.ucsb.edu/~lyouseff/
CCOntology/
_________________________
CloudOntology.pdf.
____________
Kleanthis Dellios JTB1I%DBOEJEBUFJOUIF%FQBSUNFOU
PG *OGPSNBUJDT BU UIF 6OJWFSTJUZ PG 1JSBFVT )F SFDFJWFE
BO .4D JO BEWBODFE JOGPSNBUJPO TZTUFNT GSPN UIF TBNF
VOJWFSTJUZ)JTSFTFBSDIJOUFSFTUTJODMVEFDPNQVUFSTFDVSJUZ
CJPNFUSJDUFDIOPMPHZFHPWFSONFOUBOEJOUFMMJHFOUUSBOTQPSU TZTUFNT %FMMJPT JT B DFSUJGJFE *4.4 "VEJUPS *40
*&$
$POUBDUIJNBULEFMMJPT!VOJQJHS
__________
Dimitrios Papanikas JTB1I%DBOEJEBUFJOUIF%FQBSUNFOU PG *OGPSNBUJDT BU UIF 6OJWFSTJUZ PG 1JSBFVT )F SFDFJWFEBO.4DJOBEWBODFEJOGPSNBUJPOTZTUFNTGSPNUIF
TBNFVOJWFSTJUZ)JTSFTFBSDIGPDVTFTPOTPGUXBSFFOHJOFFSJOHJOGPSNBUJPOTZTUFNTTFDVSJUZWVMOFSBCJMJUZBTTFTTNFOU
BOEQFOFUSBUJPOUFTUJOHUFDIOPMPHZ1BQBOJLBTJTBDFSUJGJFE
*4.4 "VEJUPS *40*&$ $POUBDU IJN BU
QBQBOJL!VOJQJHS
___________
Selected CS articles and columns are available
for free at http://ComputingNow.computer.org.
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
61
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
IT IN EMERGING MARKETS
EDITOR: Gustavo Rossi, Universidad Nacional de La Plata, gustavo@lifia.info.unlp.edu.ar
_________________
Toward Open
Government in
Paraguay
Luca Cernuzzi, Universidad Católica Nuestra Señora de la Asunción, Paraguay
Juan Pane, Centro de Estudios Ambientales y Sociales (CEAMSO), Paraguay
araguay, with its population of approximately
6.8 million, has one of
the lowest gross domestic products (GDPs) per capita of
Latin America.1,2 Furthermore, IT
penetration in the country is quite
low. As of 2012, only 27.08 percent
of individuals used the Internet—
the lowest percentage in South
America—and only 29.48 percent
of households had a computer.1
The private IT market, independently from the government’s
efforts to promote IT, has grown
remarkably in the last two decades. It first grew in the mobile
telecommunication industry, then
the growth moved into the financial market, and it’s now affecting other industries, including
agriculture.
Academia is also supporting IT
growth. Currently, 34 universities
offer 46 computer science programs
and a few professional-oriented
master’s programs in IT. There
are also some promising research
groups (two universities offer doctoral programs in IT). However, in
the absence of an effective national
quality-control system, the quality of university programs varies.
P
62
IT Pro September/October 2014
Therefore, although there are some
highly skilled IT professionals, it’s
still difficult to find enough local
personnel to cover the demand of
the growing market.
In the last few years, the central
government has put IT on its policy
agendas. The goal has been to introduce IT-based solutions to improve
public administration processes;
deliver quality public services; and
improve transparency, citizen participation, and accountability. In April
2012, Paraguay joined the Open
Government Partnership (OGP;
www.opengovpartnership.org),
which helps countries make their
governments more “open, accountable, and responsive to citizens.”
Here, we outline Paraguay’s journey toward open government (or ogovernment) and the technical and
organizational challenges it faces.
Moving Beyond
E-Government
In 1997, Paraguay implemented a
metropolitan network to connect
105 government agencies via a national Internet-based virtual private
network (VPN). However, the communication infrastructure wasn’t
enough to improve processes and
Published by the IEEE Computer Society
services, because the accompanying
IT solutions were developed in isolation, often by foreign companies.
On several occasions, high-quality
software solutions, deployed by foreign teams, failed due to the lack of
local support (the solutions weren’t
sustainable). Moreover, significant
effort was required to make these
isolated solutions interoperable.
In 2010, the government decided to design a “master plan” for
information and communication
technology (ICT) and, two years
later, it created an ICT secretary
position. Part of its master plan was
to emphasize the use of free software. Yet despite advances in the
infrastructure and the creation of
an ICT master plan to modernize
government processes and better
empower citizens, challenges still
remained. In particular, the government struggled to do the following:
t apply citizen-centric approaches to system development,
t improve local capabilities for
technology development and
support, and
t improve information availability and accessibility for all
stakeholders.
1520-9202/14/$31.00 © 2014 IEEE
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Table 1. The 5-Stars Open Data Standard (http://5stardata.info).
The latter introduces the challenge of open data, which enables
transparency and is the foundation of open government.
Open Government
The o-government philosophy fosters a more horizontal and democratic way of governing, which
benefits citizen participation, promotes transparency and strengthens technology with the aim of
improving the quality of public services. The key components to any
o-government initiative are transparency, participation and collaboration, and accountability.
Transparency
Transparency refers to openness
of information about government
activities and decisions in a way
that is comprehensive, timely,
and accurate, following open data
standards. Transparency is the
key enabler for citizens to understand the workings of their government, and it’s important in
preventing and detecting corruption and inefficiencies in government services.
Participation and
Collaboration
Participation and collaboration
lead to citizen engagement and
empowerment, which are essential for effective governance and
policy making. This allows public
opinion to influence how the government works, which helps improve the delivery of services.
Accountability
Accountability is the process by
which citizens can hold the government responsible for its management of public goods.
Open Data
Open data, which is the base of
transparency, refers to data or content that “is open for anyone to freely
use, reuse, and redistribute… subject
No. of stars
Deployment scheme
Example
1
Make the information available online
PDF files
2
Use structured data
Excel files
3
Use nonproprietary formats
CVS files
4
Use URIs
Http://data…
5
Link the data to related data
Hyperlinks
only, at most, to the requirement to
attribute and/or share-alike” (http://
____
opendefinition.org).
____________ Interoperability
and re-use is achieved by following standards such as the 5-Stars
Open Data Standard, defined by
Tim Berners-Lee (see Table 1).3
The higher the number of stars,
the more re-usable and interoperable the data will become; however,
the technical effort needed will also
be higher. Considering that different institutions in the government
have different technical capabilities,
there should be a tradeoff between
high-level standards and available
resources when opening data.
There are several benefits to open
data. First of all, in terms of government, open data is a key enabler
for transparency, citizen participation, and accountability. Second,
it fosters innovation, the discovery
of new knowledge, and improved
services. Third, some estimate that
open data could have an economic
benefit of up to US$3 trillion, resulting from increased efficiency,
the development of new products
and services, and cost savings from
higher quality products.4
Furthermore, the costs of developing government data visualization can be outsourced to
interested stakeholders. Projects
such as WhereDoesMyMoneyGo.
org and OpenSpending.org are
examples of how the government,
by publishing budgets in a reusable format, enabled effective visualization tools by third parties.
O-Government Challenges
The challenges for an optimal
implementation of o-government
in Paraguay, starting from transparency, span several dimensions,
but for the most part, success will
depend more on political willingness than technical capabilities.
Fortunately, citizen- and government-led initiatives aim to address
the following challenges.
Legal
Despite an Article in the Paraguayan National Constitution that
states that all individuals have the
right to receive truthful, responsible, and unbiased information,
and that all sources of public-sector information should be freely
available, the most important legal challenge for o-government
in Paraguay is to create a law that
regulates access to public-sector
information. Furthermore, there
are no legal definitions of publicsector information, data, or datasets, or of open data.
Recent developments, such as
the Supreme Court decision to
grant access to information regarding the salaries of public officials, and the partial approval of a
Public Sector Information Access
Law, show there’s a high degree
of interest by both the lawmakers
and the public in overcoming current legal challenges.
Organizational
There’s also a need for proper organizational tools and procedures
for releasing public data. The Administrative Law of Paraguay only
allows public officials to do what’s
explicitly permitted; anything else
is forbidden and subject to legal
consequences. This implies that
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
63
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
IT IN EMERGING MARKETS
in the absence of organizational
procedures for releasing public
sector information, public officials aren’t allowed to publish
data.
Another challenge is the insufficient number of experts available
to work on the technical and legal aspects of opening data. The
final challenge refers to the lack of
knowledge about o-government
principles that sometimes creates
a resistance to change by public
officials.
Technical
The government must select open
data standards that foster transparency and help create technological
tools, such as forums and feedback
mechanisms for collaborative consultation processes that support citizen engagement and community
to create and maintain an informed
community that can actively participate in o-government initiatives
using the available legal and technological tools.
Considering this, Tim Davies
used Berners-Lee’s standard to
create a set of principles, called
5-Stars Open Data Engagement,5
that guide the process of opening
data:
1.
2.
3.
4.
5.
be demand driven (),
provide context (),
support conversation (),
build capacity and skills ()
and
collaborate with the community ().
The idea of this principle is that
an informed community can guide
the process of opening technically
The challenge is to create and maintain an
informed community that can actively participate
in o-government initiatives.
management. However, it should
also provide an IT infrastructure
that can guarantee continuous
availability of such tools.
Furthermore, Paraguay needs
to create tools such as catalogs,
indexes, and search and navigation mechanisms that help
citizens find and use open data.
Such data should include metadata that specifies the spatial and
temporal validity to make the
semantics of each piece of information explicit. Interoperability
must also be ensured at the vocabulary, schema, metadata, and
data levels.
Adoption
Adoption deals with creating awareness of o-government and of how
citizens and public officials can use
open information. The challenge is
64
correct data, maximizing the adoption of standards and open data.
o ensure the sustainability
of o-government programs,
Paraguay must guarantee
local availability of capabilities
and resources—which requires
having qualified IT staff in government, academia, and the private sector. To facilitate this, in
academia, we’re working to build
a transnational triple-helix system,6 which, by fostering and promoting the interchange of competences, personnel, and skills
among countries, should lead to
mutual growth. We must prepare
PhD students to lead the transformation process, and we must create higher-education partnerships
and collaborations on common
T
problems and share knowledge regarding how such a collaborative
system might work.
References
1. “ICT Eye,” Int’l Telecommunications Union, 2013; www.itu.int/
ITU-D/ICTEYE/DisplayCountry.
____________________
aspx?code=PRY#jump.
______________
2. “Measuring Latin American GDP,”
World Economics, Jan. 2014; www.
___
w
o r l d e c o n o m i c s. c o m / Pa p e r s /
_____________________
Measuring%20Latin%20American%
_____________________
20GDP_7fbab7d6-44fd-4f40-b4bb____________________
233fb5aeaab5.paper.
___________
3. T. Berners-Lee, “Design Issues:
Linked Data,” World Wide Web Consortium (W3C), 2010; www.w3.org/
DesignIssues/LinkedData.html.
__________________
4. J. Manyika et al., Open Data: Unlocking Innovation and Performance with
Liquid Information, McKinsey Global
Inst., 2013.
5. T. Davies, “5-Stars of Open Data En___
gagement?” blog, 21 Jan. 2012; www.
timdavies.org.uk/2012/01/21/5-stars_____________________
of-open-data-engagement.
_______________
6. H. Etzkowitz et al., “UniversityIndustry-Government Interaction:
The Triple Helix Model of Innovation,” Asia Pacific Tech Monitor, vol. 24,
no. 1, 2007, pp. 14–23.
Luca Cernuzzi is a professor at the
Universidad Católica Nuestra Señora de
la Asunción, Paraguay. Contact him at
lcernuzz@uca.edu.py.
____________
Juan Pane is an open data consultant at
the Centro de Estudios Ambientales y Sociales (CEAMSO), Paraguay, and a lecturer
at the Universidad Nacional de Asunción.
Contact him at ___________
jpane@pol.una.py.
Selected CS articles and
columns are available for free at
http://ComputingNow.computer.org.
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Technology Solutions for the Enterprise
2015
Editorial Calendar
January/February
July/August
IT Security
Data Analytics
Richard Kuhn, US National Institute of Standards
and Technology
Morris Chang, Iowa State University
Tim Weil, Coalfire Systems
Seth Earley, Earley & Associates
Jinan Fiaidhi, Lakehead University, Canada
Vladimir Dimitrov, University of Sofia
Maria R. Lee, Shih Chien University
March/April
September/October
IT-Enabled Business Innovation
Wearable Computing
Robert Harmon, Portland State University
Haluk Demirkan, University of Washington
Irena Bojanova, UMUC
Maria R. Lee, Shih Chien University
May/June
November/December
Internet of Everything
Smart Systems
Irena Bojanova, UMUC
George Hurlburt, STEM Corp
Jeff Voas, US National Institute of Standards and
Technology
Fulvio Corno, Politecnico di Torino
Robert Harmon, Portland State University
For more information, see
www.computer.org/itpro/cfps
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
DATA ANALYTICS
EDITOR: Seth Earley, Earley & Associates, seth@earley.com
_________
Usability for
Internal Systems:
What’s the Payoff?
Seth Earley, Earley & Associates
onsumer applications
are raising the bar
when it comes to usabilit y expectations,
and such expectations are being
carried over into corporate environments. IT organizations thus
should be paying close attention
to elements that make internal
systems and applications intuitive
and easy to use. But what’s the
justification for doing so? Easier
access to information doesn’t
provide business value unless
there’s a corresponding improvement in efficiency or a new capability. Organizations are often
hard pressed to justify the significant investments required to
address enterprise-wide applications when the outcome is uncertain and the payoff unclear.
For external applications, the
stakes are far more clear. A user
experience arms race is taking
place in the marketplace—with
multibillion dollar rewards for
those who get it right. For the ones
left behind, failing to measure up
can mean lost opportunities and
market share or, in more extreme
circumstances, it can lead to irrelevance in the eyes of customers.
C
66
IT Pro September/October 2014
Focusing on External Apps
Usability and the user experience are key differentiators for
pure-play Internet businesses. Although they sound similar, there’s
a significant difference between
the two concepts. The user experience entails everything that a
user sees, feels, and thinks about
an organization. Usability is more
about the mechanics of a site or
application. Can users get to the
information they need with minimal friction? Can they accomplish
their tasks easily and elegantly? Is
the site intuitive?
Measuring Usability
Usability is measured by articulating tasks for target users to accomplish and letting them execute
those tasks in the application or
website—whether on a desktop,
laptop, tablet, or smartphone. The
success of those tasks and the ease
with which they’re executed (along
with some other metrics such as
number of false paths or restarts)
become aggregated across user
groups and multiple scenarios to
develop usability measures.
Complexities arise when considering that different users have
Published by the IEEE Computer Society
different levels of fluency with
technology or might have different educational and cultural
backgrounds. Therefore, an important part of usability is selecting the correct demographic for a
user group. For Internet retailers,
for example, the target users are
defined through market research
and by capturing data and indicators about current customers
and extrapolating to understand
desired customers. User groups
are screened as part of the study
design and set up.
Personas—archetypical customer composites representing characteristics of a target user—are used
to get into the mind of the users
to imagine how they might react.
Personas are typically given a name
for easy reference—“Bob” might
represent a 25-year old tech-savvy
college graduate who lives alone
and is interested in martial arts.
The seemingly trivial or unrelated
details help round out the type of
person that system designers think
“Bob” is. This way, they can make
design choices they believe would
suit him.
Some of this conjecture is
more art than science, but most
1520-9202/14/$31.00 © 2014 IEEE
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
THE WORLD’S NEWSSTAND®
enterprises dealing with a broad
range of user types on their public
commerce-focused websites find
personas to be extremely valuable.
The point is that a deep, rich understanding of the customer can
be represented in model development. Taking this a step further,
usability specialists, marketers,
and business analysts build libraries of scenarios for personas
that describe a “day in the life”—
the tasks and activities that these
“personas” engage in while going
about their business. Use cases
can be defined or derived from
scenarios and provide yet another
level of detail around user understanding. These use cases can be
more along the lines of task descriptions than the strict use cases developed for system testing.
Formal test use cases for system
functionality are derived from
task descriptions.
When placed into the online
context, each step of a task typically requires interaction with data
and content or the ability to locate
a particular piece of information.
Therefore, this process of understanding users—from the macro
level down to the detailed task and
use case level—defines content
access, information management,
and functional requirements.
Understanding the
User Experience
The user experience is a broader
concept. It typically begins with
awareness and brand perceptions.
Once a user becomes interested
in a product or service—whether
through word of mouth, social
media, a newspaper article, an
email communication, or a Web
search—engagement can begin in
any number of ways.
If the company has a physical
presence, the user (now a potential
consumer) might walk into a store.
He or she might do more research
online and get more information
from a third-party site, a friend on
Facebook, or the company site itself. Each one of these mechanisms
creates a perception on the part of
users that impacts what they do
next. At some point, they might
decide to make a purchase. If this
takes place online, the architecture
of the website and its ease of use
have a direct impact on whether
the individual follows through
with the purchase. Conversion is
an important metric for online retailers; however, it is merely the final step in a potentially long chain
of events.
Imagine a scenario in which an
organization has spent millions of
dollars on its website and tested
the usability until it was optimized
across all of the target audiences.
The organization has spent all of
its resources on the site and didn’t
leave enough money for call center training and support systems.
A new customer who has a problem with shipping or billing that
poorly integrated. The call center
isn’t aware of marketing’s new offer. Billing hasn’t heard about and
adjusted for the upcoming service
outage. Customer support doesn’t
have the latest fix for the problem
that cropped up with the newest model. Online offers are out
of synch with items in the store
because of delays in getting all of
the systems updated with the correct information. The customer
experience, also referred to as the
“customer journey,” is then taking place over rutted roads with
detours and snarled intersections,
poor and confusing signage, and
dead ends.
Linking Internal and
External Performance
Analytics and big data play a crucial role in the customer experience. We now have data streams
that are emitted as “exhaust” from
every process. Internal systems can
measure the performance of the
Conversion is an important metric for online
retailers; however, it is merely the final step in
a potentially long chain of events.
can’t be resolved online might call
the company, get placed on hold
or transferred multiple times, become disconnected, or reach a
poorly trained offshore representative who can’t solve the problem.
News of this experience reaches
discussion boards, Twitter, Facebook, and the company’s community of users. Clearly, the site’s
excellent usability can’t overcome
this terrible user experience.
Although exaggerated, this type
of scenario is happening across
thousands of organizations. In
this scenario, parts of the user
experience are broken. Legacy
systems that are stitched together
have evolved over time and are
various departments supporting
each stage of the customer journey—learning about the product
or service (marketing), purchasing
(sales) and receiving (shipping and
logistics) the product, enjoying
the defect-free product (service),
handling the billing and payment
component (finance), and providing additional post purchase repairs or services (support). This
model might vary somewhat based
on the industry, product, and service, but for the most part, it’s fairly
universal. At each step, internal department and process performance
can be measured via financial measures, key performance indic ators,
and dashboards.
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
67
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
DATA ANALYTICS
An external set of metrics referred
to as the voice of the customer
(VOC) consists of surveys, pointof-sale feedback, website comments, service calls, complaints,
feedback to call centers, social
media commentary, and discussions. This input is mostly in the
form of unstructured data, which
requires text analytic methodologies
to derive insights. User reactions
and feedback can also be derived
from online behaviors—for example, clickstream analysis can track
when users are attempting to locate information or are interacting
with specific Web content.
Because website and e-commerce investments have obvious
links to sales and conversions,
content that directly supports the
customer experience receives a
great deal of attention and resources. However, because the customer experience consists of a chain
of interactions, poor internal user
experiences and the consequent
inefficiencies in internal systems
can’t help but have a downstream
impact on the customer experience. This chain of interactions is
increasingly taking place on mobile devices. Many retailers view
mobile devices as being part of a
behavior pattern (rather than as a
marketing channel) and as a way
to bridge the physical and virtual
worlds. As such, the rise of “omnichannel” communication, engagement, and commerce requires
that the value chain of interactions—the customer journey—be
smooth and consistent.
Omnichannel marketing thus
means understanding that customers might start on one device
and then move to another or end
up at a physical location. Furthermore, content and communications should be the same whether
in a newspaper, on a radio ad, on
a mobile application, on a website,
or in the store itself. Customer
service systems and floor sales
68
associates all should have the
same information and key content for supporting the customer.
Internal systems and processes
need to be integrated and continuous so that the customer receives
consistent messaging, offers, and
functionality, creating an overall
positive, friction-free experience.
Dashboards can be designed using text analytics to correlate VOC
data with internal process performance. Dashboards containing
operational analytics from financial
systems and business intelligence
applications are nothing new.
Associating external user data harvested from various sources with
internal operational metrics can
provide a real-time scorecard of
how internal enterprise processes
affect external user perceptions.
Broken and inefficient internal
processes have an impact on downstream and external processes.
Making the Investment
The challenge is to improve internal processes across the enterprise to create greater efficiencies
that will then enhance the customer journey.
Implement Master
Data Management
Programs such as master data
management (MDM) and semantic integration can greatly improve information flows and ease
of integration across departments,
systems, and processes. MDM
requires a significant investment
of time, money, and attention to
fix data inconsistencies at their
source so that downstream applications and stakeholders can trust
data quality and not go through
costly data cleansing activities.
Semantic integration helps different stakeholders in the enterprise
“speak the same language” and
use consistent terminology.
All organizational environments change over time. Systems
and processes grow organically to
solve problems, applications might
be deployed from various vendors
who develop their tools using different mental models, and modern
corporations grow through acquisition. Change is ongoing, so this
problem never goes away. The only
way to address it is to put into place
organizational structures whose
sole purpose is to continually rein
in the chaos and invest the energy
needed to reverse information and
system entropy.
Tame Unstructured Data
Users’ higher expectations for
greater levels of quality and usability in corporate information
systems require that IT organizations overinvest where they have
traditionally underinvested. IDC
estimates that 90 percent of information is unstructured.1 Yet
unstructured information management remains the stepchild
of IT organizations, because the
impact on critical processes isn’t
directly observed. Poor information hygiene for unstructured
information is insidious, because
it grinds down internal processes
slowly over time, reducing the
ability to quickly react and adapt.
Process improvement begins
by examining those systems that
directly and indirectly support
the customer and assessing places
where terminology is inconsistent
or causes friction points due to incorrect or outdated architectures.
Content, process, and application
audits, along with domain modeling, can reveal where clashes
in terminology, ambiguity, poor
data quality, and manual integration choke points cause the
greatest pain and problems with
customer-facing processes. Interventions can then be prioritized to
remedy these problems using enterprise information architecture
development approaches and validating design by testing scenarios,
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
tasks, and use cases with the usability methodologies previously
described.
of adaptability, agility, and greater
customer intimacy.
Build the Infrastructure
t a recent conference on
retail systems and processes, the presenter asked
“Who has completely integrated
their back-end information?” No
hands were raised. “Who has
clean data for personalization?”
Again, no one raised their hand.
“We are all in this together,” she
concluded. CIOs might think this
is a retail and e-commerce story,
but it’s not. Every organization
will be transforming at least some
of its processes through digital
capabilities. We are, indeed, all in
this together.
Achieving meaningful results requires that this process be conducted at the enterprise level.
For many IT organizations, that
doesn’t sound feasible. After all,
how can we document scenarios
and use cases for thousands of
activities? The answer is that you
don’t document all of them—only
critical processes that allow for
extrapolation of organizing principles to validate an enterprise
framework.
Much of this work is infrastructure—part of the cost of doing
business. Foundational work of
this type is required for higher
value functionality. It needs to be
justified by articulating the vision
A
Reference
1. D. Schubmehl, “Unlocking the
Hidden Value of Information,”
IDC, 15 July 2014; ______
https://idccommunity.com/groups/it_agenda/
_____________________
business-analytics-big-data/unlocking_
_____________________
the_hidden_value_of_information.
_____________________
Seth Earley is CEO of Earley &
Associates (www.earley.com). He’s an
expert in knowledge processes and customer experience management strategies.
His interests include customer experience
design, knowledge management, content
management systems and strategy, and
taxonomy development. Contact him at
seth@earley.com.
__________
Selected CS articles and
columns are available for free at
http://ComputingNow.computer.org.
%2=8-1)%2=;,)6)%'')77
DIGITAL MAGAZINES
Keep up on the latest tech innovations with new digital magazines from the IEEE Computer Society. At more than 65%
off regular print prices, there has never been a better time to
try one. Our industry experts will keep you informed. Digital
magazines are:
1
1
1
1
1
1
Easy to save. Easy to search.
Email notification. Receive an alert as soon as each digital magazine is available.
Two formats. Choose the enhanced PDF version OR the
web browser-based version.
Quick access. Download the full issue in a flash.
Convenience. Read your digital magazine anytime, anywhere—on your laptop, iPad, or other mobile device.
Digital archives. Subscribers can access the digital issues
archive dating back to January 2007.
Interested? Go to www.computer.org/digitalmagazines
to subscribe and see sample articles.
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
69
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
MASTERMIND
EDITOR: George Strawn, NITRD, gostrawn@gmail.com
____________
Don Knuth:
Mastermind of
Algorithms
George Strawn, NITRD
ome algorithms make for
“better” programs than
others—that is, programs
that execute in less time
or require less memory. How can
we quantify differences to determine which algorithms are better?
No one has done more to answer
this question than Don Knuth,
who has been called the “father of
the analysis of algorithms.”
In his precollege days in Milwaukee, Knuth already showed
signs of having a special talent, and
his performance as an undergraduate at Case Institute of Technology was so outstanding that the
faculty awarded him a concurrent
master’s degree. He undertook
graduate study in mathematics
at Cal Tech and received his PhD
in 1963. Knuth remained on the
Cal Tech faculty until 1968, when
he moved to Stanford University,
where he remains to this day as an
Emeritus Professor.
In 1962, while still a mathematics graduate student, Knuth
decided to write a book on programming languages and compilers—subjects for which he was
already an important contributor.
The first eight chapters would
S
70
IT Pro September/October 2014
cover computing “preliminaries,”
and the last four chapters would
deal with his intended subjects.
However, as he gathered material,
he noticed that the book was becoming very long. He decided that
a thorough treatment was better
than a brief one, so the “preliminaries” became a series of books
that defined the analysis of algorithms. The series was called
The Art of Computer Programming,1
because Knuth viewed computer
programming as an art as well as
a science. Three volumes containing the first six chapters were published between 1968 and 1974 (the
latest editions of these volumes
were published in 1997 and 1998).
Remarkably, the first part of volume 4 wasn’t published until 2011!
Here, I describe some of the
content of the first three volumes, indicate one reason for the
publishing hiatus, and report on
Knuth’s intentions for the future
of the series.
Volume 1: Fundamental
Algorithms
The basic concepts covered in
Chapter 1 begin with assembling
the mathematics and statistics
Published by the IEEE Computer Society
used throughout the volumes to
analyze algorithms. The analyses
include both the memory requirements and the execution time of
the algorithm. Regarding execution time, Knuth tackles both the
worst-case time, which depends
on worst-case input, and the average-case time, which depends on
the statistical distribution of possible inputs.
After laying out the math,
Knuth defines a hypothetical
computer called MIX and then
discusses assembly language programming in MIX. Even in the
late 1960s, assembly language
programming was starting to go
out of fashion, but he defended
the choice as required for a careful analysis of run time. He also
gave a high-level description of
each algorithm to be analyzed. Finally, he defined an MIX simulator, so that MIX programs could
be run as well as written.
The information structures described in Chapter 2 proved to be
the basis for many of the following texts on algorithms and data
structures. The basic information
structures presented are linear lists
and trees. The implementation
1520-9202/14/$31.00 © 2014 IEEE
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
THE WORLD’S NEWSSTAND®
techniques considered are sequential and linked allocation. Among
other names, a sequentially allocated linear list is also called an
array. Trees are often implemented by linking the subtrees to the
parent nodes by pointers. Various
combinations of these structures
and implementation techniques
provide the foundation for constructing complex data structures.
However, the emphasis needs to
be on the operations to be applied
to a given data structure. That is,
the best way to implement a data
structure depends on the mix of
operations expected to be used in
the application.
Chapter 2 ends with a discussion of storage allocation methods: techniques for carving out a
bit of memory in which to create
a data structure. Unfortunately,
even today, one of the notorious
mistakes programmers make is
failing to check for “buffer overflow” when allocating space for
new data (that is, allocating space
beyond that reserved for the purpose). Nefarious hackers often
use this flaw to insert malicious
code into a computer.
Volume 2: Seminumerical
Algorithms
Random number generation is the
subject of Chapter 3. Knuth made
clear he was discussing pseudorandom sequences: deterministic
but with characteristics of randomness. Determinism was important, because programs could
then be debugged and otherwise
rerun with the same (pseudo)random sequence as input. Because
modeling and simulating physical
systems were—and are—such important computing applications,
and because such simulations
often involve random selections
from a distribution of values, doing the randomization correctly
can be the difference between a
good simulation and garbage.
Knuth analyzes the linear congruential method, Xi 1 (a u Xi b)
mod c. That is, the next random
number, Xi 1, is computed from
the previous random number, Xi,
and is the remainder of dividing
the expression (a u Xi b) by c. If
a, b, and c are carefully chosen, this
simple technique returns a pseudorandom sequence of numbers
uniformly distributed between zero
and one. He then shows how such a
sequence can be turned into a random sequence from any number of
other probability distributions.
Computer arithmetic is the subject of Chapter 4. One clever reviewer of Volume 2 said, “Oh, no!
I don’t want to know that much
about computer arithmetic.” However, some computer programmers
need to understand how to connect abstract numerical operations
file to be sorted fits into the computer’s main memory. External
sorting is required when disks or
tapes are necessary to hold the file.
Knuth says that sorting algorithms
were among the first to be developed for the earliest computers. He
suggests that the study of sorting
algorithms can teach us much more
than sorting. For example, it can
teach us how to analyze algorithms
and how to approach a computing problem from many directions.
One of the slowest internal sorting
algorithms described is called bubble
sort, and one of the fastest is called
quick sort. Knuth’s analysis shows
that quick sort would, on average,
require approximately six minutes
on a one gigaop computer to sort
a list of a billion numbers. Bubble
sort, on the same computer, would
require approximately 192 years!
One of the notorious mistakes programmers make
is failing to check for “buffer overflow” when
allocating space for new data.
with real computers (hence the
designation as seminumerical). For
example, how should exponentiation be implemented? If one naively assumes that computing x64
requires 63 multiplications (that’s
the way it’s defined), then reading
this chapter would be instructive.
If the variable x is replaced by the
value x2 six times, the result is x64,
so it actually requires only six multiplications. A slight generalization
of this squaring process works for
raising a number to any integer
power. If there are n bits in the exponent, the algorithm requires at
most 2n multiplications.
Volume 3: Sorting
and Searching
Sorting, the subject of Chapter 5,
is divided into internal and external
sorting. Internal sorting is when the
Searching is the subject of
Chapter 6, and it’s divided into
three techniques: searching by
comparison of keys, digital searching,
and hashing. Searching by comparison of keys in an ordered file of
n keys never takes more than log2
n searches. In digital searching, the
search key is considered to be a
sequence of small numbers, which
act as indices into arrays that contain pointers to the part of the file
where the key might be found. In
hashing, the key is considered as
a single number. In one hashing
method, the key is divided by the
length of the array that contains
the keys. The array length should
be chosen as a prime number, and
the remainder of the division then
produces a random index into the
array where the key will be located,
with no searching required.
computer.org/ITPro
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
71
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
MASTERMIND
Two keys occasionally hash to
the same index, called a collision,
and Knuth discusses collision resolution techniques. Each of these
search methods can be used for
both internal and external searching applications. As with sorting,
a good algorithm will underlie a
speedy search, which Google and
other search engines can achieve.
TeX and Metafont
One reason for the long publishing pause between Volume 3 and
the first part of Volume 4 was that
Knuth got interested in improving the technology to typeset his
books. Type setting had started to
go digital in the 70s, but was immature. Finding no digital system
up to his standards, he decided to
create one. Perhaps the fact that his
father had owned a small printing
business gave him a leg up for this
project. He called it TeX, taken
from the Greek letters tau epsilon
chi and pronounced “tech.”2 One
enthusiastic observer called it the
greatest advance in printing since
Gutenberg, and it was honored
by the printing, publishing, and
scholarly communities alike.
In a related development, he
created Metafont,3 a system for developing digital fonts, and he used
it to define a font he called Computer Modern for use in his books
(and elsewhere). TeX was under
development for several decades
and has now been stabilized in a
final version. A new packaging of
TeX, called TeXML, provides an
XML front end to the TeX system.
nuth retired early (in 1992
at the age of 54), because
he thought that he would
need about 20 years of full-time
work to complete The Art of Computer Programming. He now projects that Volume 4 (with chapters
on combinatorial searching and
recursion) and Volume 5 (with
chapters on lexical scanning and
syntactic techniques) will be completed by 2020 (when he will be
82). He states the following on his
webpage (http://www-cs-faculty.
stanford.edu/~uno):
_____________
K
After Volume 5 has been completed, I will revise Volumes
1–3 again to bring them up to
date.... Then I will publish a
“reader’s digest” edition of Volumes 1–5, condensing the most
important material into a single
book. And after Volumes 1–5
are done, God willing, I plan
to publish Volume 6 (on the
theory of context-free languages) and Volume 7 (on compiler
techniques), but only if the
things I want to say about those
topics are still relevant and still
haven’t been said. Volumes 1–5
represent the central core of
IT Professional (ISSN 1520-9202) is published bimonthly by the IEEE Computer Society. IEEE
Headquarters, Three Park Avenue, 17th Floor, New York, NY 10016-5997; IEEE Computer Society Publications Office, 10662 Los Vaqueros Circle, PO Box 3014, Los Alamitos, CA 907201314; voice +714 821 8380; fax +714 821 4010; IEEE Computer Society Headquarters, 1828
L St. NW, Suite 1202, Washington, DC 20036. Annual subscription: $49 in addition to any
IEEE Computer Society dues. Nonmember rates are available on request. Back issues: $20 for
members, $143 for nonmembers.
Postmaster: Send undelivered copies and address changes to IT Professional, Membership Processing Dept., IEEE Service Center, 445 Hoes Lane, Piscataway, NJ 08854-4141.
Periodicals Postage Paid at New York, NY, and at additional mailing offices. Canadian GST
#125634188. Canada Post Publications Mail Agreement Number 40013885. Return undeliverable Canadian addresses to PO Box 122, Niagara Falls, ON L2E 6S8, Canada. Printed
in the USA.
Editorial: Unless otherwise stated, bylined articles, as well as product and service descriptions, reflect the author’s or firm’s opinion. Inclusion in IT Professional does
not necessarily constitute endorsement by the IEEE or the Computer Society. All submissions are subject to editing for style, clarity, and space.
computer programming for sequential machines; the subjects
of Volumes 6 and 7 are important but more specialized.
Regardless of its incomplete
status, many people have judged
The Art of Computer Programming
to be the most monumental series
of books on computer programming. For example, at the end
of 1999, it was named one of the
best 12 physical-science monographs of the century by American
Scientist.4 Knuth has also received
numerous honors, including the
Turing Award (1974) and the National Medal of Science (1979).
I’ll leave the final word to Bill
Gates, who is quoted on the jacket
of the third edition of Volume 1 (Addison-Wesley Professional, 1997) as
saying, “If you think you’re a really
good programmer... read [The] Art of
Computer Programming... You should
definitely send me a résumé if you
can read the whole thing.”
References
1. D.E. Knuth, The Art of Computer
Programming, Volumes 1–4A, 1st ed.,
Addison-Wesley Professional, 2011.
2. D.E. Knuth, The TeXbook, 1st ed.,
Addison-Wesley Professional, 1984.
3. D.E. Knuth, The Metafont Book, 1st
ed., Addison-Wesley, 1986.
4. P. Morrison, “100 or So Books
that Shaped a Century of Science,”
___
Am. Scientist, Nov/Dec 1999; www.
americanscientist.org/bookshelf/
_____________________
pub/100-or-so-books-that-shaped_____________________
a-century-of-science.
_____________
George Strawn is director of the National Coordination Office for the Networking and Information Technology Research
and Development Program (NITRD).
Contact him at _____________
gostrawn@gmail.com.
Selected CS articles and
columns are available for free at
http://ComputingNow.computer.org.
72
IT Pro September/October 2014
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
2015
Richard E. Merwin
Distinguished
Service Award
CALL FOR AWARD NOMINATIONS
Deadline 15 October 2014
ABOUT THE MERWIN AWARD
The highest level volunteer service award of the Computer Society for
outstanding service to the profession at large, including significant
service to the Computer Society or its predecessor organizations.
ABOUT DICK MERWIN
Dick Merwin was a pioneer in digital computer engineering who
participated in the development of the ENIAC, MANIAC and
STRETCH computers. Despite a busy and productive technical
career, Merwin found time to be active in professional societies,
including the Computer Society, ACM and AFIPS. His generosity
of spirit and genuine helpfulness was an important element in the
progress of the computer profession.
STEPHEN L. DIAMOND
AWARD
2014 Richard E. Merwin
Distinguished Service Award
A bronze medal and $5,000 honorarium are awarded.
PRESENTATION
The Richard E. Merwin Award is presented at the Computer Society’s
Annual Awards Ceremony.
For distinguished leadership
and service to the IEEE,
IEEE Computer Society and
the Computing profession.
REQUIREMENTS
This award requires 3 endorsements.
AWARDS HOMEPAGE
NOMINATION SUBMISSION
www.computer.org/awards
Nominations are being accepted electronically
http://www.computer.org/portal/web/awards/merwin
CONTACT US
awards@computer.org
________________
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
M
q
M
q
M
q
MqM
q
Technology Solutions for the Enterprise
THE WORLD’S NEWSSTAND®
DOMAINS | MAIL | HOSTING | eCOMMERCE | SERVERS
NEW
HOSTING
POPULAR APPS - NOW EVEN BETTER!
WordPress & Powerful App Platforms!
Supports over 140 popular apps including WordPress,
Drupal™, Joomla!™, TYPO3, and more
Q Security & version upgrade notifications
Q Trial version available for all applications
Q App Expert Support
Q 1&1 CDN powered by CloudFlare™ and 2 GB
guaranteed RAM for peak performance
Q
Powerful Tools
PHP 5.5, Perl, Python, Ruby
1&1 Mobile Website Builder
Q NetObjects Fusion® 2013 included
Q
Q
Successful Marketing
Facebook® advertising credits
Listing in business directories
Q 1&1 Search Engine Optimization
Q 1&1 E-Mail Marketing Manager
Q
Q
COMPLETE
PACKAGES
State-of-the-Art Technology
FOR PROFESSIONALS
Maximum availability (Geo-Redundancy)
Q 300 Gbit/s network connection
Q
All Inclusive
1 FREE domain: .com, .net, .org, .biz, .info
Unlimited Power: webspace, traffic, mail accounts, MySQL databases
Q Secure e-mail addresses with virus and spam protection
Q Linux or Windows operating system
Q
Q
1
TRIAL
30 DAY MONEY
BACK GUARANTEE
1
MONTH
FLEXIBLE PAYMENT
OPTIONS
0
Starting at
$ .99
per month*
®
1
CALL
SPEAK WITH AN
EXPERT 24/7
1 (877) 461-2631
* Offer valid for a limited time only. The $0.99/month price reflects a 12-month pre-payment option for the 1&1 Basic Hosting Package. Regular price of $5.99/month after 12 months.
Some features listed are only available with package upgrade. Visit www.1and1.com for full promotion details. Program and pricing specifications and availability subject to change
without notice. 1&1 and the 1&1 logo are trademarks of 1&1 Internet, all other trademarks are the property of their respective owners. ©2014 1&1 Internet. All rights reserved.
Rubik’s Cube® used by permission of Rubik’s Brand Ltd
1and1.com
Previous Page | Contents | Zoom in | Zoom out | Front Cover | Search Issue | Next Page
Technology Solutions for the Enterprise
M
q
M
q
M
q
MqM
q
THE WORLD’S NEWSSTAND®