11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

emulation 179Job Market ConsiderationsIn the late 1990s, a number <strong>of</strong> sources forecast a growinggap between the number <strong>of</strong> positions opening in computerrelatedfields <strong>and</strong> the number <strong>of</strong> new people entering thejob market (estimates <strong>of</strong> the gap’s size ranged into the hundreds<strong>of</strong> thous<strong>and</strong>s nationally). Particularly in the Internetsector, dem<strong>and</strong> for programmers <strong>and</strong> system administratorsmeant that new college graduates with basic skills couldearn unprecedented salaries, while experienced pr<strong>of</strong>essionalscould <strong>of</strong>ten become highly paid consultants. Despite thegrowing emphasis on computing in secondary <strong>and</strong> highereducation, computer science <strong>and</strong> engineering c<strong>and</strong>idateswere in particularly short supply. As a result, many companiesreceived permission to hire larger numbers <strong>of</strong> immigrantsfrom countries such as India.The “dot crash” <strong>of</strong> 2001–2002 saw a sharp if temporarydecline in dem<strong>and</strong> for computer pr<strong>of</strong>essionals, particularlyin the Web <strong>and</strong> e-commerce sectors, but it impacted hardwaresales as well. The industry then saw a resurgence, butwith an emphasis on somewhat different skill sets. Skills instrong dem<strong>and</strong> toward the end <strong>of</strong> the 2000 decade include:• detection, prevention, <strong>and</strong> investigation <strong>of</strong> computerattacks (see computer crime <strong>and</strong> security <strong>and</strong> computerforensics)• improvements in operating system <strong>and</strong> s<strong>of</strong>twaresecurity• use <strong>of</strong> open-source s<strong>of</strong>tware <strong>and</strong> operating systems(see open-source movement <strong>and</strong> Linux)• surveillance <strong>and</strong> physical security (see biometrics)• transaction analysis for both security <strong>and</strong> marketingapplications (see data mining)• e-commerce applications <strong>and</strong> management (see customerrelationship management)• rapid development <strong>of</strong> efficient, highly interactive Webservices (see Ajax, Web 2.0 <strong>and</strong> beyond, <strong>and</strong> scriptinglanguages)• hardware <strong>and</strong> s<strong>of</strong>tware for mobile <strong>and</strong> wireless devices(particularly delivery <strong>and</strong> integration <strong>of</strong> media)• content management for Web sites <strong>and</strong> media services• scientific computing, particularly genetic <strong>and</strong> biologicalapplications (see bioinformatics)On the other h<strong>and</strong>, with the successful passing <strong>of</strong> theY2K crisis, the outlook for mainframe programmers (particularlyusing COBOL) is increasingly dim. Prospects arealso poor for certain operating, network, <strong>and</strong> database systemswith declining market share (such as OS/2, Novellnetworking, <strong>and</strong> some older database systems). It is truethat as baby boomer programmers retire, there will besome dem<strong>and</strong> for maintenance or conversion <strong>of</strong> obsolescentsystems. Finally, as global trends toward outsourcing <strong>and</strong>relocating <strong>of</strong> lower-level support <strong>and</strong> even programmingcontinue, it may become harder for domestic workers tobegin to climb the IT ladder.Socially, the key challenges that must be met to ensurea healthy computer-related job market are the improvement<strong>of</strong> education at all levels (see education <strong>and</strong> computers)<strong>and</strong> the increasing <strong>of</strong> ethnic <strong>and</strong> gender diversity in thefield (which is related to the fostering <strong>of</strong> more equal educationalopportunity), <strong>and</strong> adapting to changes in the globaleconomy (see globalism <strong>and</strong> the computer industry).Further ReadingBr<strong>and</strong>el, Mary. “12 IT Skills that Employers Can’t Say No To.”<strong>Computer</strong>world, July 11, 2007. Available online. URL: http://www.computerworld.com/action/article.do?comm<strong>and</strong>=viewArticleBasic&articleId=9026623. Accessed July 22, 2007.Farr, Michael. Top 100 <strong>Computer</strong> <strong>and</strong> Technical Careers. 3rd ed. St.Paul, Minn.: JIST Works, 2006.Henderson, Harry. Career Opportunities in <strong>Computer</strong>s <strong>and</strong> Cyberspace.2nd ed. New York: Facts On File, 2004.Information <strong>Technology</strong> Jobs in America. New York: Info TechEmployment Publications, 2007.U.S. Department <strong>of</strong> Labor. Occupational Outlook H<strong>and</strong>book,2006–07 edition. Available online. URL: http://www.bls.gov/oco/. Accessed July 22, 2007.Vocational Information Center. <strong>Computer</strong> <strong>Science</strong> Career Guide.Available online. URL: http://www.khake.com/page17.html.Accessed July 22, 2007.emulationOne consequence <strong>of</strong> the universal computer concept (seevon Neumann, John) is that in principle any computercan be programmed to imitate the operation <strong>of</strong> any other.An emulator is a program that runs on one computer butaccurately processes instructions written for another (seealso microprocessor <strong>and</strong> assembler). For example, fans<strong>of</strong> older computer games can now download emulationprograms that allow modern PCs to run games originallyintended for an Apple II microcomputer or an Atari gamemachine. Emulators allowing Macintosh <strong>and</strong> Linux users torun Windows programs have also achieved some success.In order to work properly, the emulator must set up asort <strong>of</strong> virtual model <strong>of</strong> the target microprocessor, includingappropriate registers to hold data <strong>and</strong> instructions <strong>and</strong> asuitably organized segment <strong>of</strong> memory. While carrying outinstructions in s<strong>of</strong>tware rather than in hardware imposesa considerable speed penalty, if the processor <strong>of</strong> the emulatingPC is much faster than the one being emulated, theemulator can actually run faster than the original machine.An entire hardware <strong>and</strong> s<strong>of</strong>tware environment can alsobe emulated; this is called a virtual machine. For example,programs such as VMware can be used to run Windows,Linux, <strong>and</strong> BSD UNIX, each in a separate “compartment”that appears to be a complete machine, with all the necessaryhardware drivers <strong>and</strong> emulated facilities.The term virtual machine can also refer to language suchas Java, where programs are first compiled into a platformindependentintermediate “byte code,” which is then runby a Java virtual machine that produces the instructionsneeded for a given platform.In the past, emulation was sometimes used to allow programmersto develop s<strong>of</strong>tware for large, expensive mainframeswhile using smaller machines. Emulators can also

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!