Opinion
Architecture and Hardware Editorial pointers

Editorial Pointers

Posted
  1. Article

Wireless sensor networks—incorporating hundreds, even thousands, of tiny interconnected monitoring devices—are not only increasing in scope and function, but now interacting with environments that are physically remote, hostile, or inaccessible. With each pioneering application we move a bit closer to the vision of a pervasive globally embedded Internet.

Sensor networks operate in a wholly different stratum from our deeply wired world. And therein lay fundamental scientific, engineering, hardware, software, security, data management, programming, manufacturing, privacy, and legal challenges facing the technologists building this new way to view the activity of the world. These challenges, and real-world experience, are the focus of this month’s special section. Guest editors David E. Culler and Wei Hong invited some of the leaders in sensor network efforts to present a variety of approaches to building and managing vast numbers of tiny nodes that are self-regulating, self-repairing, programmable in place, and able to work without human intervention for years at a time. These data-collecting and -reporting networks reflect a stunning accomplishment, yet are but a hint of what is to come. The articles in this section explore the state of sensor networks as well as their emerging directions and future applications.

Also in this issue, Sipior et al. explore the many concerns associated with spam—an originally robust e-market tool now recognized primarily for its abusive qualities. The authors examine legislative and administrative initiatives intended to find a consensual balance of interests among consumers, ISPs, and marketers. Also, Vatanasombut et al. illustrate how online vendors can build a dedicated following by recognizing what novice and sophisticated users need and expect from Web sites. Looney et al. investigate the pros and cons of business models reshaping the industry, and urge potential adopters to do the same before choosing one. And Berghel and Sallach study the "radical organizational realignment" of computer and information technology in academia.

In "Viewpoint," Stephen Lau reminds us that a virus or worm doesn’t need a name or news headline to make a mess. Indeed, he designed a network-scanning system called The Spinning Cube of Potential Doom to display malicious network traffic and raise awareness of what’s really out there. And Glaser et al. contend that many companywide programming issues can be addressed more effectively through a team approach, offering a firsthand ("On Site") account of their firm’s participatory programming environment.

Diane Crawford,
Editor

Join the Discussion (0)

Become a Member or Sign In to Post a Comment

The Latest from CACM

Shape the Future of Computing

ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.

Get Involved

Communications of the ACM (CACM) is now a fully Open Access publication.

By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.

Learn More