11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

480 trends <strong>and</strong> emerging technologiesFor efficiency it’s important to keep all branches <strong>of</strong> a treeapproximately the same length. A B-tree (balanced tree) isdesigned to automatically optimize itself in this way.Trees lend themselves to game programs where a series<strong>of</strong> moves <strong>and</strong> their possible replies must be explored tovarying levels. A chess program will typically create a treefrom the current position, but use various criteria to determinewhich moves should be explored beyond just a fewlevels, thus “pruning” the game tree.Further ReadingBrookshear, J. Glenn. <strong>Computer</strong> <strong>Science</strong>: An Overview. 9th ed. Boston:Addison-Wesley, 2006.Lafore, Robert. Data Structures & Algorithms in Java. 2nd ed. Indianapolis:Sams, 2002.Parlante, Nick. “Binary Trees.” Available online. URL: http://cslibrary.stanford.edu/110/BinaryTrees.html. Accessed August23, 2007.trends <strong>and</strong> emerging technologiesBecause <strong>of</strong> the complexity <strong>of</strong> computer systems, s<strong>of</strong>tware,<strong>and</strong> business models, it is easy to “fail to see the forest forthe trees.” Stepping back once in a while to see what ischanging (or likely to change) is recommended. Such a perspectiveis particularly useful for pr<strong>of</strong>essionals who need toperiodically evaluate their skills against the market, investors,venture capitalists, journalists, <strong>and</strong> educators.It is nearly a commonplace to say that the future is comingat an accelerating rate (for the ultimate speculation, seesingularity, technological). What adds to the challengeis the way each new technology (<strong>and</strong> social adaptation)has multiple consequences, whether it is social networking,“viral marketing,” or individually targeted, location-awareadvertising. At the same time, attempting to distinguishshort-term hype from genuine trends is always difficult—anyone in the computing field can compile a glossary <strong>of</strong>now-obsolete buzzwords. Thus reading a variety <strong>of</strong> perspectivesfrom advocates to pundits to critics is essential.Overall TrendsThat said, the following table suggests some activities thatare in transition from a traditional model to one that reflectsemerging technological <strong>and</strong> social trends.Fromtodesktop PCmobile <strong>and</strong> pervasive computingwired networkswireless <strong>and</strong> mobile computingseparate h<strong>and</strong>ling <strong>of</strong> media integrated media serversbroadcastinguser-driven, customizable channels<strong>of</strong> mediauser as consumer user as contributor <strong>and</strong> sharerindividual consumers social networkings<strong>of</strong>tware as product s<strong>of</strong>tware as serviceproprietary codeopen sourceinterface-driven tasks search-driven interfacesarbitrarily organized data semantically retrievableinformation.e-commerceintegration <strong>of</strong> online <strong>and</strong> traditionalchannelsFor more information about emerging trends, see thefollowing entries: digital convergence, open-sourcemovement, service-oriented architecture, smartbuildings <strong>and</strong> homes, social networking, ubiquitouscomputing, user-created content, Web 2.0 <strong>and</strong>beyond, Web services.Further ReadingHaskin, David. “Don’t Believe the Hype: The 21 Biggest <strong>Technology</strong>Flops.” <strong>Computer</strong>world, April 4, 2007. Available online.URL: http://www.computerworld.com/action/article.do?articleId=9012345&comm <strong>and</strong>=viewArticleBasic. AccessedNovember 29, 2007.Piquepaille, Rol<strong>and</strong>. “Emerging <strong>Technology</strong> Trends” [blog]. ZDNet.Available online. URL: http://blogs.zdnet.com/emergingtech/.Accessed November 29, 2007.Plunkett Research. “Plunkett’s E-Commerce & Internet Industry.”Available online. URL: http://www.plunkettresearch.com/Industries/ECommerceInternet/tabid/151/Default.aspx.Accessed November 29, 2007.———. “Plunkett’s InfoTech, <strong>Computer</strong>s & S<strong>of</strong>tware Industry.”Available online. URL: http://www.plunkettresearch.com/Industries/InfoTech<strong>Computer</strong>sS<strong>of</strong>tware/tabid/152/Default.aspx. Accessed November 29, 2007.Seidensticker, Bob. Future Hype: The Myths <strong>of</strong> <strong>Technology</strong> Change.San Francisco: Berrett-Koehler, 2006.trust <strong>and</strong> reputation systemsTrust <strong>and</strong> reputation are inherently connected. Participantsin any transaction (such as respondents to classified ads orparticipants in an online auction) want assurance that theywill receive the promised value in exchange for what theyare giving up. The default anonymity <strong>of</strong> online transactions(see anonymity <strong>and</strong> the Internet) presents a challenge:How does one obtain information about someone’s reputation(how he or she has behaved previously) <strong>and</strong> thus beassured <strong>of</strong> his or her reliability?One solution is to collect <strong>and</strong> characterize the experiences<strong>of</strong> participants in previous transactions with thatperson or entity. For an auction (see auctions, online <strong>and</strong>eBay), the system can solicit <strong>and</strong> tabulate ratings (“feedback”)by participants in each transaction. However, thiskind <strong>of</strong> simple system must guard against being subvertedby people who create false identities (fronts) <strong>and</strong> transactions<strong>and</strong> use them to inflate the feedback score.A more sophisticated reputation system can be used forranking Web pages, contributions (such as blogs or productreviews), or other works. Instead <strong>of</strong> giving each participantthe same single “vote,” the feedback is weighted accordingto the responder’s own reputation. Thus if a number<strong>of</strong> people whose own product reviews have been highlyrecommended also recommend another review, that reviewwill be much more highly rated. Examples <strong>of</strong> this sort <strong>of</strong>system include the PageRank algorithm used by Google,the consumer review site Epinions.com, <strong>and</strong> the “techie”favorite Slashdot.Developing a trust <strong>and</strong> reputation system that is effectivebut unobtrusive is particularly important for the collaborativecreation <strong>of</strong> content such as for search engines<strong>and</strong> wikis (see user-created content <strong>and</strong> wikis <strong>and</strong>Wikipedia).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!