The International Roadmap for Devices and Systems: A Beacon for the Electronics Industry
The semiconductor industry moves at a frantic pace, introducing new technologies every two years. The electronics industry announces a new product every six to nine months. It would be impossible for this to happen without a well-thought-out, long-range ...
Contributions of Quantum Factoring on Quantum Research
This installment of Computer’s series highlights work published in IEEE Symposium on Foundations of Computer Science. Although we typically highlight articles from work published in IEEE Computer Society journals, this month’s exception is due to the ...
<italic>Computer</italic> Highlights Society Magazines
The IEEE Computer Society’s lineup of 12 peer-reviewed technical magazines covers cutting-edge topics ranging from software design and computer graphics to Internet computing and security, from scientific applications and machine intelligence to ...
50 & 25 Years Ago
In the early years, Computer was only published bimonthly. Therefore, we will have to skip our interesting and/or informative extractions for August. The next one will appear in the September 2022 issue of Computer, and we hope you will eagerly wait for ...
Computing Through Time
Various puzzles, quizzes, games, humorous definitions, or mathematical that should engage the interest of readers.
Warming Your Chicken
China’s crypto currency mining business was shut down by the government. It moved to Siberia, and here is a look at how it is thriving.
In This Issue
In this theme issue on “Research Reproducibility,” I’d like to add two additional articles that have been waiting to be published.
Research Reproducibility
Reproducibility has a foundational role in ensuring robust and trustworthy research, but achieving reproducibility can be challenging. This theme issue explores these challenges along with research and implementations across communities addressing them, ...
CUF-Links: Continuous and Ubiquitous FAIRness Linkages for Reproducible Research
The ability to share data is critical to reproducible research, yet data sharing is often limited because issues of findability, accessibility, interoperability, and reusability—the FAIR principles—are not integrated into every step of the scientific ...
Advancing Reproducibility at the NSF
Recent trends in reproducibility at the National Science Foundation are examined. Reproducibility, replicability, generalizability, findability, accessibility, interoperability, and reusability guiding principles, and open science are discussed. Federal ...
Defining the Role of Open Source Software in Research Reproducibility
I explain the success of open source software (OSS) from the perspectives of connectivism and the language-action framework. Reproducibility engenders trust, which we build via conversations, and OSS practices help us to learn how to be more effective ...
Benchmarking Data Science: 12 Ways to Lie With Statistics and Performance on Parallel Computers
We humorously discuss 12 fallacies when focusing on compute performance that we have frequently observed in practice. We follow each with a recommendation to mitigate the danger and hope to contribute to good benchmarking etiquette for data science.
A Privacy-Assured Data Lifecycle for Epidemic-Handling Systems
Although the use of personal data from different contexts is essential to curbing the spread of COVID-19 in epidemic-handling systems (EHSs), it increases the chances of privacy breaches and personal data misuse. This article analyses the data lifecycle ...
Collaboration Stability: Quantifying the Success and Failure of Opportunistic Collaboration
- Huber Flores,
- Agustin Zuniga,
- Sasu Tarkoma,
- Leonardo Tonetto,
- Tristan Braud,
- Pan Hui,
- Yong Li,
- Mostafa Ammar,
- Petteri Nurmi
We quantify and derive a general model for the collaboration stability of human mobility and demonstrate its importance for networking applications. Our results demonstrate that collaboration opportunities are highly dependent on the context where they ...
Software Systems and Frameworks for Competency-Based Learning
There is a major shift today to incorporate competency-based education in all educational systems. This paradigm brings new requirements to software systems used in education. I present some efforts in this direction and show examples and case studies ...
Blockchain’s Carbon and Environmental Footprints
We analyze existing discourses surrounding blockchains’ energy consumption and look at the actors and actions involved. We also provide an evaluation of various considerations and factors that affect blockchain networks’ energy consumption and resulting ...
Privacy-Preserving Computation: Doomed to Succeed
We are on the quest for mainstream adoption of privacy-preserving computation solutions. As present challenges are solved, homomorphic encryption and related privacy-preserving techniques will change the face of information technology, security, privacy, ...
Closing the Security Agility Gap
Cybercriminals are agile when it comes to new technology. They find weak links before vulnerabilities are secured. This article discusses ways companies and average users can combat cybercriminal agility.
Can You Trust Zero Trust?
Developing and sustaining a “zero-trust architecture” is essentially impossible today. The concept is currently a moving target, and its meaning is in the eye of the beholder. One thing we know for certain is that it’s a misnomer.