83
tp://www.greatachievements.o

CS-IT.ppt - Vision And Security Technology Laboratory

Embed Size (px)

Citation preview

Page 1: CS-IT.ppt - Vision And Security Technology Laboratory

http://www.greatachievements.org/

Page 2: CS-IT.ppt - Vision And Security Technology Laboratory

CS and IT

Terrance E. Boult

El Pomar Professor of Innovation and Security

Department of Computer Science

University of Colorado at Colorado Springs

Parts of this talk graciously provided by Prof. Ed Lazowska

Page 3: CS-IT.ppt - Vision And Security Technology Laboratory

Outline

Why Study CS CS Overview Some of the Great Ideas of CS CS/IT and the myth of offshoring

Page 4: CS-IT.ppt - Vision And Security Technology Laboratory

Computer Scientist Sub-specialties

Computer Engineer (Firmware Engineer) Computer System Analyst Software Engineer Network Engineer Database Administrator System Administrator Software Developer/Programmer Application Programmer/Developer Game Developer Web programmer

Page 5: CS-IT.ppt - Vision And Security Technology Laboratory

Why Study Computer Science?

Variety of job titles■ Software Engineer (Applications or System), SystemProgrammer, System Engineer, System Analyst/Programmer,Database Administrator, Network Systems and Data Communication Analyst, Network Programmer/Administrator,Web Developer/Administrator, Computer Scientist, and Information Technology Specialist.

A Bachelor's degree in computing is required for high-pay IT positions. ■ According to U.S Department of Labor Statistics and Predication, very good opportunities are expected for college graduates with at least a bachelor’s degree in computer science and with practical work experience.

Page 6: CS-IT.ppt - Vision And Security Technology Laboratory

Why Study Computer Science? Fast–growing IT jobs

■ According to the U.S Government Labor Department job statistics and predications, the professional IT workforce is projected to add over a million new jobs between 2004 and 2014, an increase of about 30 percent.

■ According to the U.S Government Labor Department job statistics and predications, software engineers are projected to be one of the fastest growing occupations over the period 2004-2014.

■ Money Magazine May 2006 : Software Engineer is the #1 best job and the forecasted 10-year job growth is 46.07%.

■ CNNMoney.COM quotes an ACM study as saying that “Despite all the publicity in the United States about jobs being lost to India and China, the size of the IT employment market in the United States today is higher than it was at the height of the dotcom boom.”

Page 7: CS-IT.ppt - Vision And Security Technology Laboratory

Why Study Computer Science?

■ A CNN article ranks the 10 top-paying jobs (excluding medical doctors). 5 of which were jobs for which a computer science degree would be a great preparation. The average salary is between $61,250–$81,140 as follows:

• Computer System Software Engineer - $81,140• Biomedical Engineer - $70,520• Physician Assistant - $69,250• Computer Applications Software Engineer- $76,310• Environmental Engineer - $67,620• Computer System Analysis - $67,520• Database Administrator - $61,950• Physical Therapist - $61,560• Network Systems and Data Communication Analyst - $61,250• Hydrologist - $60,880

Page 8: CS-IT.ppt - Vision And Security Technology Laboratory

Projected Science & Engineering Job Openings(new jobs plus net replacements, 2004-2014)

Engineers22%

Social Scientists9%

Life scientists4%

Physical scientists4%

Mathematical scientists2%

Computer specialists59%

US Bureau of Labor Statistics, November 2005http://w w w .bls.gov/opub/mlr/2005/11/art5full.pdf

81%

Page 9: CS-IT.ppt - Vision And Security Technology Laboratory

Why Study Computer Science?

Creativity Intellectual Challenge

– Programming is extremely challenging– CS applied to other fields is a different intellectual

challenge. Helping Others

– Produce artifacts which make people’s lives easier Flexibility

– Telecommuting, working at home, … Lifelong Learning

– Computer scientists must master a moving target.

Page 10: CS-IT.ppt - Vision And Security Technology Laboratory

Impact– Advances in computing drive advances in all other

fields– Advances in computing power the economy

• Not just through the growth of the computing industry – through Multi Factor Productivity Growth throughout the economy

– Advances in computing change the way we live, the way we work, the way we learn, the way we communicate

Unbelievably cool intellectual opportunities

Why computer science & engineering?

Page 11: CS-IT.ppt - Vision And Security Technology Laboratory

Exponential progress

Page 12: CS-IT.ppt - Vision And Security Technology Laboratory

Exponential Growth

Internet Hosts

0

50,000,000

100,000,000

150,000,000

200,000,000

250,000,000

300,000,000

350,000,000

400,000,000

450,000,000

1969

1971

1973

1975

1977

1979

1981

1983

1985

1987

1989

1991

1993

1995

1997

1999

2001

2003

2005

Internet Hosts

1

10

100

1,000

10,000

100,000

1,000,000

10,000,000

100,000,000

1,000,000,000

1969

1971

1973

1975

1977

1979

1981

1983

1985

1987

1989

1991

1993

1995

1997

1999

2001

2003

2005

Page 13: CS-IT.ppt - Vision And Security Technology Laboratory

Exponential progress

Page 14: CS-IT.ppt - Vision And Security Technology Laboratory

Exponential progress

Page 15: CS-IT.ppt - Vision And Security Technology Laboratory

Exponential progress

Page 16: CS-IT.ppt - Vision And Security Technology Laboratory

“I think there is a world market for maybe five computers” -- Thomas J. Watson, founder and Chairman of IBM, 1943

Exponential Growth makes many predictions look foolish

Page 17: CS-IT.ppt - Vision And Security Technology Laboratory

“Computers in the future may weigh no more than 1.5 tons” -- Popular Science, 1949

Makes many predictions look foolish

Page 18: CS-IT.ppt - Vision And Security Technology Laboratory

“There is no reason anyone would want a computer in their home” -- Ken Olsen, founder and President of Digital Equipment Corporation, 1977

Makes many predictions look foolish

Page 19: CS-IT.ppt - Vision And Security Technology Laboratory

“640K ought to be enough for anybody” -- Bill Gates, founder, Chairman, and CEO of Microsoft, 1981 [disclaimed]

Makes many predictions look foolish

Page 20: CS-IT.ppt - Vision And Security Technology Laboratory

“… the software industry is going to make more breakthroughs in these next 10 years than it's made in the last 30 … software is really going to transform not just what we think about as the computer industry, but the way that everything is done …”

W. GatesCEO Microsoft

CS and Intellectual opportunity

Page 21: CS-IT.ppt - Vision And Security Technology Laboratory

Computer-enhanced

driving

A teacherfor every learner

Flatteningthe world

Intellectual opportunity

Transforming Entertainment and art

Re-architecting the Internet

Harnessing parallelism

Transforming other fieldsof science and engineering

Page 22: CS-IT.ppt - Vision And Security Technology Laboratory

Transforming the nation’s defense

Intellectual opportunity

Security/Biometrics

Sensor Networks

Medical Imaging

PersonalizedHealth care

Page 23: CS-IT.ppt - Vision And Security Technology Laboratory

Who are Computer Scientist?

They are you and me…– Successful business owners– Politician– Home makers – Academicians– World-Class Athletes– Poets/Artist/Musicians

Page 24: CS-IT.ppt - Vision And Security Technology Laboratory

Computer Science:What can I do with this major?

Arts– Film reproduction– Animation– Computer Enhanced Graphics– Art-based Games

Business– Model Forecasting– Process Improvements– Information Technology (IT)– Business Infrastructure (Network/Communications)– Help Desk/Application Support

Page 25: CS-IT.ppt - Vision And Security Technology Laboratory

Computer Science:What can I do with this major?

Entrepreneurial– Custom PC Engineer (gaming/media

station/graphics workstations)– Equity Speculation (stock trader)– SOHO IT (small office/home office)– Software Developer– Web Developer

Page 26: CS-IT.ppt - Vision And Security Technology Laboratory

Computer Science:What can I do with this major?

Health Research– Improved web-based support for trauma recovery– Software for assessing and coping with Mental

Impairment – Clinically relevant Compression for Improved

teleradiology – Vascular Modeling for blood flow– 4D Heart modeling with SPAMM-MRI

Page 27: CS-IT.ppt - Vision And Security Technology Laboratory

Computer Science:What can I do with this major?

Security– Network Intrusion/Denial of Service/Malacious Attacks– Biometrics (face recognition/iris scans/fingerprint)– Forensics (identification/cause of death/age-progression)

Telecommunications– Call Center– Mobile Devices/Instant Messaging– VoIP (Voice Over IP)– File sharing (Lime Wire/Napster…)– POD Casting/Video Streaming

Page 28: CS-IT.ppt - Vision And Security Technology Laboratory

Outline

Why Study CS CS Overview Some of the Great Ideas of CS CS/IT and the myth of offshoring

Page 29: CS-IT.ppt - Vision And Security Technology Laboratory

Computing Systems

Computer: A machine that is designed to perform operations that are specified with a set of instructions called a program.

Hardware: the computer equipment, such as the keyboard, the mouse, the terminal, the hard disk, and the printer.

Software: the programs that describe the steps that we want the program to perform.

Page 30: CS-IT.ppt - Vision And Security Technology Laboratory

Computer Hardware

CPU– Central Processing Unit– Processor + ALU(Arithmetic logic unit)

Internal Memory– Read-only Memory(ROM)– Random-access Memory(RAM)

External Memory– Hard-disk– Removable Media (Floppy/DVD/Flash Stick)

Page 31: CS-IT.ppt - Vision And Security Technology Laboratory

Internal organization of a computer

Page 32: CS-IT.ppt - Vision And Security Technology Laboratory

Types of computer Personal Computer(PCs)

– small inexpensive computers– commonly used in offices, homes, and

laboratories– microcomputer

Workstation– minicomputer or mainframe computer– small enough to fit on a desktop

Super computer– the fastest computer

Page 33: CS-IT.ppt - Vision And Security Technology Laboratory

COMPUTER SOFTWARE

Page 34: CS-IT.ppt - Vision And Security Technology Laboratory

Operating System

– provides an interface between the user and the hardware

– in which the user can select and execute the application software

– Contains drivers/interface for devices– contains many utilities to perform functions

such as printing files, copying files and listing files.

Page 35: CS-IT.ppt - Vision And Security Technology Laboratory

Software tools

• word processor (Microsoft word, 한글) • spread sheet (Lotus 1-2-3, Excel…) • database management system (MySQL, Oracle, dBase IV, Paradox,…)

• CAD package (AutoCAD, AutoSketch, CADKEY,…)

• mathematical computation tools and graphic tools (MATLAB, Mathmatica, MATHCAD, Maple)

• Graphics/Image Tools (Paint, Photoshop, Gimp)

Page 36: CS-IT.ppt - Vision And Security Technology Laboratory

Executing a Computer Program

1. Compiling – source program – object program

2. Linking and Loading 3. Executing 4. Debugging

Page 37: CS-IT.ppt - Vision And Security Technology Laboratory

Compiling: – Translate high-level language into machine language– source program: the original program written by

high-level language such as C++– object program: the machine language version of

source program

Linking and loading– Linking: link the other necessary machine language

statements to the object program– Loading: load the program into memory

Page 38: CS-IT.ppt - Vision And Security Technology Laboratory

Debugging– a process to correct errors(often called bugs) in a

program– compile-time error: syntactic errors– run-time error: logic errors

Page 39: CS-IT.ppt - Vision And Security Technology Laboratory

Software Life-Cycle Phases(assuming problem is already

identified)

Life Cycle Percent of EffortDefinition 3

Specification 15

Coding and modular testing 14

Integration and testing 8

Maintenance 60

Page 40: CS-IT.ppt - Vision And Security Technology Laboratory

Outline

Why Study CS CS Overview Some of the Great Ideas of CS CS/IT and the myth of offshoring

Page 41: CS-IT.ppt - Vision And Security Technology Laboratory

Basic “CS” building Blocks Computer Organization and the Binary Numbers Stored/structured Programs Symbolic Algorithm Design, e.g. text programming Numeric Algorithm Design, E.g. Floating Point Algorithm Complexity (running time) Computability and Non-computability Software Engineering: Large Scale programming Computational Modeling of complex phenomenon

Page 42: CS-IT.ppt - Vision And Security Technology Laboratory

Important “CS” Paradigms

– Simulation (and gaming)– Machine Translation (compilers/interpreters)– Virtual Environments for Computing– Computer Communications– Object-Oriented– Relation Databases– Services Oriented Computing– Parallel Computation– Artificial Intelligence

Page 43: CS-IT.ppt - Vision And Security Technology Laboratory

Great Ideas of CS and IT

Required reading from

http://www.cs.gmu.edu/cne/itcore/

For those seeking more depth check out Great Ideas in Computer Science: A Gentle Introduction. 2nd Edition by Alan W. Biermann

Page 44: CS-IT.ppt - Vision And Security Technology Laboratory

The Internet

Key Questions: – How to send a message to someone? How to send a

book or document? How to find the address of a person or object? How to guarantee delivery when network connections are unreliable? How to deliver mail or objects to addresses over unpredictable routes?

Key CS Ideas:– Survivable networks– IP Networks: TCP/IP and UDP/IP– Distributed Naming and Domain Name Schema– Hyperlinks and the Web

Page 45: CS-IT.ppt - Vision And Security Technology Laboratory

Interfaces

Questions:– How do I tell the computer what to do? How does the

computer translate my command into action? How does the computer let me manipulate facsimiles of objects? How do we show/manipulate 3D objects in the computer? How do we make it so different programs can reuse the same software?

Key Ideas:– Command sets and shells– Windows, icons, menus, mouse, pointers– 3D “rendering pipelines”, shaders– Application Programmer Interfaces(API) and software

Libraries

Page 46: CS-IT.ppt - Vision And Security Technology Laboratory

Information Security

Questions:– How to prevent unwanted people from accessing my

files? How to prevent sensitive information from flowing out of my system? How to prevent someone from sabotaging my system? My information? How to converse in secret? How to sign an electronic document?

Key Ideas:– Access control– Flow control– User authentication– Signed and secret communication

Page 47: CS-IT.ppt - Vision And Security Technology Laboratory

Virtual/Abstract Machines

Questions: How does the computer set a command program into execution? How can a computer be divided into smaller identical computers (orcopies of the original computer)? How can programs like Java applets be universally portable?

Key Ideas:– IBM VM model– Java VM model– Unix VM model– Layers model

Page 48: CS-IT.ppt - Vision And Security Technology Laboratory

Virtual Memories

Questions:– How does the computer incorporate many storage media

into a single memory system? How to organize memory so that I don't have to reprogram anything if I add or remove storage devices? How to keep track of objects so they can be addressed at high speed regardless of location? How to speed up a computation when memory is too small to hold everything?

Key Ideas:– Two-level (Multi-level) address mappings– The cache principle– Name spaces for just-in-time sharing

Page 49: CS-IT.ppt - Vision And Security Technology Laboratory

Concurrent Processes

Questions:– How to prevent two processes from entering a race that

makes their combined result unpredictable? How to decide reliably which of two events has occurred first when only one event can be processed at a time? How to ensure that sharable memory objects are used by just one process at a time? How to prevent a group of processes from being halted by a deadlock? How to simulate many processes with a computer having only one computing engine?

Key Ideas:– Arbiters, Critical sections, Deadlock detectors,

Semaphores– Time sharing

Page 50: CS-IT.ppt - Vision And Security Technology Laboratory

Social ComputingSocial Computing

• online communities• media-centric• web-based interaction• small cognitive overhead

‣ collaborative tagging, folksonomies‣ online collaborative gaming‣ collaborative filtering‣ recommendation/trust networks

Page 51: CS-IT.ppt - Vision And Security Technology Laboratory

CS/IT reshapes businessBridging human and computational processes

Hum

an a

ctiv

ities

(agr

eed

norm

s)

Business processes(organisations, markets,

services, products)

Com

putational

processes

ValueCreation

Hum

aniti

es

Soci

al s

cien

ces

EconomicsC

omputer

science

ComplexSystems

viewResearch focus

IT drives a novelset of transformations:What consequences for society and business?

Page 52: CS-IT.ppt - Vision And Security Technology Laboratory

Towards “Service Science”

Hum

aniti

es

Soci

al s

cien

ces

Economics

Com

puter

science

Data + Models ->Science ofServices?

Agent-based/ behavioural economics

AI Interfaces

Formal modelsServices

Services in the large:How to manage millions ofonline services?

Page 53: CS-IT.ppt - Vision And Security Technology Laboratory

Outline

Why Study CS Some of the Great Ideas of CS CS/IT and the myth of offshoring

Page 54: CS-IT.ppt - Vision And Security Technology Laboratory

54

IT is Evolved from a Support Tool into a Source of Competitive Advantage...

Source of differentiation

and advantage

Support core business

processes

Supportback office

Copyright © The Boston Consulting Group

1960's 1970's 1980's 1990's 2000's

Airlines Retailing Automotive

Health Care

Financial Services

2010's

IT evolution over timeIT evolution over time

ITroleIT

role

IT needs to be linked with business strategy to generate value for the businessIT needs to be linked with business strategy to generate value for the business

Copyright © The Boston Consulting Group

Development Exhausted Or New Future Push To Be Expected? (1)

Page 55: CS-IT.ppt - Vision And Security Technology Laboratory

Outsourcing in Retrospect

Outsourcing IT has been used by organizations for a long time– ADP (1949)– CSC (1959)– EDS (1963)

Drivers – Cost effectiveness, Avoid buying expensive machines, Avoidance of building in-house IT Skills, Access to special skills and functional capabilities

Page 56: CS-IT.ppt - Vision And Security Technology Laboratory

Methods of OutsourcingOutsourcing traditionally involves the transfer of non-core competencies to

an organization which specialises in the provision of that service.

Outsourcing generally has two key objectives for an organization:Cost Savings – these are achieved either through lower labor costs within the

outsourced organization;• Quality/Efficiency Gains – by outsourcing to a company which specializes in a

particular function, there will be process improvements and a greater level of quality and service by using a specialized workforce when compared to in-house resources.

There are currently three main recognized models of outsourcing;Onshore – the outsourcer will be located in the same country as the client and may

deploy some resources onsite at the client;• Offshore – uses an offshore based provider (e.g. India, Sri Lanka, Mexico, South

Africa, etc.) to take full advantage of reduced labor costs and large pools of skilled resources. Management and IP can be tricky.

• Nearshore – similar to offshoring but utilizes organization s closer to home e.g. Eastern Europe for UK firms, Canada/Mexico for US. The proximity of the outsourced organization balances the fact this is likely to cost more than offshoring;

Page 57: CS-IT.ppt - Vision And Security Technology Laboratory

Onshore Outsourcing

Onshore Outsourcing does not tend to generate large reductions in labour costs and so the key driver tends to be to benefit from the

expertise of the third party provider.

Key Advantages:

• Expert Services – companies are able to outsource some of their non-core competencies to an organization who specialises in the provision of those services. This therefore ensures the right level of skilled resources to carry out the processing;

• Focus on Core Competencies – the client is free to focus on their key business areas that affect their bottom line without having to be concerned about the non-core competencies;

• Business Environment – working within a business environment and support function that everyone is comfortable with.

Page 58: CS-IT.ppt - Vision And Security Technology Laboratory

Onshore Outsourcing

Key Disadvantages;

• Reliance on Supplier – in order to realize any of the benefits of this type of arrangement the supplier must be a proven expert in the field and have expert resources to support the client. Due to the lower cost savings the client will be looking for large scale process/quality improvements;

• IT Requirements – to leverage the benefits it is likely to be necessary for the client to have a common IT infrastructure across all operations, which may require some large scale IT investment as part of the initiative;

• Minimized Cost Savings - the cost savings of this type of model are likely to be minimal.

Page 59: CS-IT.ppt - Vision And Security Technology Laboratory

Offshore Outsourcing

The Offshore model offers the greatest benefits to clients in terms of cost savings, availability of skilled resources and time zone advantages

Key Advantages:• Cost Savings – due to lower wage costs and the economic structure of

many offshore locations, organization s tend to be able to make much greater cost savings by outsourcing processes to an offshore location;

• Time Zone Benefits – the different time zones allow companies who have outsourced offshore to potentially benefit from a 24-7 operation and to have offshore processing done outside of the client’s standard hours;

• Availability of Skilled Resources – offshore countries tend to have large scale skilled resource pools making it simple for clients to scale up their operations.

Page 60: CS-IT.ppt - Vision And Security Technology Laboratory

Offshore OutsourcingThe Offshore model offers the greatest risks to clients in terms of

IP, Security, lack of control and management effort needed.

Key Disadvantages;• Data and IT Security – clients have to be aware of potential risks with

client data and confidentiality and this will often drive the set up of the IT infrastructure and may restrict some processes from migrating offshore;

• Geopolitical Risks – companies need to assess the stability of the Country when considering an offshoring initiative as this could impact their agreements with suppliers;

• Lack of Control – some companies perceive a lack of control from having their outsourced operations so far away.

• Time-zone management issues: difficulty managing and keeping in sync shared information/resources across non-overlapping “shifts”

Page 61: CS-IT.ppt - Vision And Security Technology Laboratory

International Outsourcing: An Emotional Debate

"What's going on with this offshoring of American jobs to India and China is nothing but terrorism – economic terrorism.“

Frank LaGrotta, Pennsylvania House of Representatives, March 2004

“The savings produced through worldwide sourcing are invested in new products and services, in new market expansion, and, most importantly, in creating new jobs and increasing real wages for American workers.”

Harris N. Miller, President, ITAA, March 2004

Page 62: CS-IT.ppt - Vision And Security Technology Laboratory

US Real GDP per Worker Grew 254%:More Goods & Services or Less Employment?

Major concern by early 1960s that “automated factories” would create vast production worker unemployment.

From Dwight Jaffee’s talk at Understanding Global Outsourcing, Conf. 2004

Page 63: CS-IT.ppt - Vision And Security Technology Laboratory

Last 55 Years: Stable Unemployment Rate and Rising Labor Force Participation

0

1

2

3

4

5

6

7

8

9

10

11

12

194

8

195

0

195

2

195

4

195

6

195

8

196

0

196

2

196

4

196

6

196

8

197

0

197

2

197

4

197

6

197

8

198

0

198

2

198

4

198

6

198

8

199

0

199

2

199

4

199

6

199

8

200

0

200

2

56

58

60

62

64

66

68

Unemployment Rate (Left Axis) Labor Force Participation Rate (Right Axis)

200

3

Displaced workers have left no trace in terms of a rising unemployment rate or a falling labor participation rate.

From Dwight Jaffee’s talk at Understanding Global Outsourcing, Conf. 2004

Page 64: CS-IT.ppt - Vision And Security Technology Laboratory

The Observational Equivalence of Technological Change and Offshoring

Although the US experience of last 55 years is dominated by technological change, not offshoring, they are observationally equivalent.

Ingram/Krugman parable tells of US entrepreneur creating consumer goods from wheat and lumber.Moral: same result with technology or offshoring.

Robert Feenstra demonstrates that technological change and imported intermediate imports have identical effects in raising labor productivity.

From Dwight Jaffee’s talk at Understanding Global Outsourcing, Conf. 2004

Page 65: CS-IT.ppt - Vision And Security Technology Laboratory

Service Sector Jobs Lost to Offshoring

Bardhan, Jaffee, & Kroll [2003] demonstrate that 6 service jobs were created for every production job lost in US computer manufacturing. But are we now losing these service jobs?

Service offshoring uses occupations, not industries. Ex: call center operators, software developers, etc.

Core features of jobs “at risk” to offshoring:– Face to face contact not required.– Communication based on telephone or broadband.– Scripted or semi-automated data related services.

From Dwight Jaffee’s talk at Understanding Global Outsourcing, Conf. 2004

Page 66: CS-IT.ppt - Vision And Security Technology Laboratory

No Empirical Effects (yet) on Wages in “At-Risk” Occupations

There is no sign (yet) that offshoring is creating falling wages (either absolute or relative) in “at-risk” occupations

Table 5 Average Annual Wage, At-Risk and Total OccupationsOccupations Code 1999 2000 2001 2002 May 2003All Occupations 31,571 32,890 34,020 35,560 36,210At Risk Occupations, Total 35,035 37,724 39,162 40,380 41,486 Business/Finance Support 13-xxxx 46,934 50,049 52,559 55,517 57,775 Computer and Mathmatical 15-xxxx 54,930 58,050 60,350 61,630 63240 Graphics/Design/Writing 17-, 27-xxxx 38,999 40,742 42,023 43,268 43,419 Office Support 43-xxxx 26,966 28,741 29,791 30,561 30,951 Medical/Legal/Sales Misc. 27,107 28,319 29,249 30,411 31,211

At Risk Occupations, Total 1.11 1.15 1.15 1.14 1.15 Business/Finance Support 13-xxxx 1.49 1.52 1.54 1.56 1.60 Computer and Mathmatical 15-xxxx 1.74 1.76 1.77 1.73 1.75 Graphics/Design/Writing 17-, 27-xxxx 1.24 1.24 1.24 1.22 1.20 Office Support 43-xxxx 0.85 0.87 0.88 0.86 0.85 Medical/Legal/Sales Misc. 0.86 0.86 0.86 0.86 0.86

Wages relative to US All Occupations

Source: Occupation Employment Survey (OES), Bureau of Labor Statistics

From Dwight Jaffee’s talk at Understanding Global Outsourcing, Conf. 2004

Page 67: CS-IT.ppt - Vision And Security Technology Laboratory

Projected Science & Engineering Job Openings(new jobs plus net replacements, 2004-2014)

Engineers22%

Social Scientists9%

Life scientists4%

Physical scientists4%

Mathematical scientists2%

Computer specialists59%

US Bureau of Labor Statistics, November 2005http://w w w .bls.gov/opub/mlr/2005/11/art5full.pdf

81%

Page 68: CS-IT.ppt - Vision And Security Technology Laboratory

Outsourcing can provide fair globalization between countries

United States

-60

-40

-20

0

20

40

60

80

1996

1997

1998

1999

2000

2001

2002

2003

Exports

ImportsTrade Balance

India

-60

-40

-20

0

20

40

60

80

1996

1997

1998

1999

2000

2001

2002

2003

ExportsImportsTrade Balance

E

Source: IMF Balance of Payments Statistics Yearbook 2004.

Imports and Exports of Computer and Information Services and Other Business Services, 1986-2003 (in billion current US$)

Page 69: CS-IT.ppt - Vision And Security Technology Laboratory

Jobs Lost to Technological Change or Offshoring: Conclusions

Job losses are essential response to technological change (Schumpeter’s “creative destruction”) and to offshoring (Rodrik’s “no pain, no gain”).

US labor markets reveal remarkable flexibility in creating new jobs in response to jobs lost to the forces of technological change and offshoring.

From Dwight Jaffee’s talk at Understanding Global Outsourcing, Conf. 2004

Page 70: CS-IT.ppt - Vision And Security Technology Laboratory

Outsourcing & national policy responses

Skill-bias makes transition of workers from one job to another difficult.

Consequences of outsourcing similar to those of technical change.

No easy solution available, but a number of tools:– Skills upgrading crucial as a long-term strategy; – role for active labour market policies, with their limitations (Auer

et al. 2004);– social protection may be necessary to make outsourcing

politically viable.

Cushion the labour market effects and re-employ workers who lost their jobs:

From “International Outsourcing: Trends and Policy Issues”Malte Lübker Policy Integration Department, ILO, 2005

Page 71: CS-IT.ppt - Vision And Security Technology Laboratory

Off shoring and IT’s future • Off shoring has benefits for receiving countries, but

can also bring value gains to sending countries.

• We should not call for an end of outsourcing, try to stop, nor endorse protectionism.

• We should concentrate on making outsourcing compatible with goals of fair globalization, decent work and improving value for everyone.

• We need to educate people to survive the transitions. Learn to adapt or be obsolete.

• We should fight only by adding more value, in other ways, than the labor savings generates.

Page 72: CS-IT.ppt - Vision And Security Technology Laboratory

Innovation as the value driver

"Innovation generates the productivity that economists estimate has accounted for half of U.S. GDP growth over the past 50 years. ...

It’s not only about offering new products and services, but also improving them and making them more affordable."

From Innovate America

Page 73: CS-IT.ppt - Vision And Security Technology Laboratory

Education needs for 2020The National Academy of Engineering (NAE) report

Educating the Engineer of 2020 concludes: “If the United States is to maintain its economic

leadership and be able to sustain its share of high technology jobs, it must prepare for this wave of change. While there is no consensus at this stage, it is agreed that innovation is the key and engineering is essential to this task; but engineering will only contribute to success if it is able to continue to adapt to new trends and provide education to the next generation of students so as to arm them with the tools needed for the world as it will be, not as it is today.”

Page 74: CS-IT.ppt - Vision And Security Technology Laboratory

Innovation importance growing

A 2006 survey by the Business Roundtable found:       33% of opinion leaders and 18% of voters said

improving U.S. science and technology capabilities to increase U.S. innovation and competitiveness is our country’s single most important objective;

      62% of both groups said that addressing this problem is equally important to other challenges such as national security, transportation, health care, energy and the legal system;

       76% of opinion leaders and 51% of American voters rank a focus on education as the most important way to solve the problem;

Page 75: CS-IT.ppt - Vision And Security Technology Laboratory

But there is a problem

Only 5% of the survey parents said they would try to persuade their child toward careers in STEM (Science, Technology, Engineering, and Mathematics), while 65% said they would allow the child to pursue whatever career path he/she prefers and 27% said they would encourage the child to pursue a STEM career but balance it with the child’s preference.

In a 2003 national survey commissioned by GE, only 9% of college students polled indicated that they felt the United States is doing enough to foster innovation among young people.

Page 76: CS-IT.ppt - Vision And Security Technology Laboratory

Production of Engineers (1999)- National Science Foundation

Country BS Engineers + CS

Percent of Grads - Eng.

China 195,354 44.30%

India 145,000 15.44%

Japan 103,440 19.43%

Russia 82,409 14.85%

US 60,914 5.08%

South Korea 45,145 22.09%

Page 77: CS-IT.ppt - Vision And Security Technology Laboratory

Five years later . . . .

China graduated 650,000 engineers in 2005.– 2,000 considered to be “world-class”– The half considered equivalent to average US

graduates– Half are engineers in “name” (e.g. auto mechanical

engineer)

Prediction – Asia will have 90% of all practicing engineers by 2010.

- Asia Section, The Economist, 2004, p. 35

Page 78: CS-IT.ppt - Vision And Security Technology Laboratory

Opposite Trend Occurring in US

2004 Reports by ASEE and NAE concluded that: “US engineers lead the world in innovation. This great

national resource is at serious risk because America has an engineering deficit.”

While U.S. college graduation rates increased by 26% from 1985 to 2000, graduation rates for engineers decreased by 23 percent during the same period. 

88% of K-12 teachers believe that engineering is important for understanding the world around us while only 30% of teachers feel that their students could succeed as engineers.

Reference: "Engineering in the K-12 Classroom: An Analysis of Current Practices and Guidelines for the Future" (http://www.engineeringk12.org)

Page 79: CS-IT.ppt - Vision And Security Technology Laboratory

U.S. Engineering Enrollment by Level and by

Year

Source: Science & Engineering Indicators – 2002

DownwardTrend Since

1993

DownwardTrend Since

1983

Undergraduate

GraduateGraduate

Page 80: CS-IT.ppt - Vision And Security Technology Laboratory

Source: Science & EngineeringIndicators – 2002

Bachelor DegreesEarned in S&EFields

Page 81: CS-IT.ppt - Vision And Security Technology Laboratory

U.S. University Trends in Defense-Related S&E Graduate Student Enrollment (1994-2001)

-2000

3000

8000

13000

18000

23000Science Disciplines

Aliens with Temporary Visas

U.S. Citizens + Permanent Resident Aliens

U.S. Citizen + Perm8 Yr. Delta

-27.2%-9.9%

-25.3%

+14.1%

Ph

ysic

s

Ch

emis

try

Mat

h/A

pp

lied

Co

mp

ute

r S

ci.

Physics

Chemistry

Math/Applied

Computer Sciences

Physics

Chemistry

Math/Applied

Computer Sciences

1994 / 2001

Ph

ysic

s

Ch

emis

try

Mat

h/A

pp

lied

Co

mp

ute

r S

ci.

Table I-2

*Source: National Science Foundation – Graduate Students and Post Doctorates in Science and Engineering: Fall 2001

Page 82: CS-IT.ppt - Vision And Security Technology Laboratory

U.S. University Trends in Defense-Related S&E Graduate Student Enrollment (1994-2001)

-5000

0

5000

10000

15000

20000Engineering Disciplines

U.S. Citizens + Perm.Resident Aliens

U.S. Citizen + Perm8 Yr. Delta

Aliens with Temporary Visas

-26.2%

-18.9%

-21.7%

-33.0%

-32.1%

-29.7%

-24.7%

-49.1%Aer

osp

ace

Ch

emic

al

Ele

ctri

cal

En

gin

eeri

ng

Sci

ence

s

Ind

ust

rial

/M

fg.

Mec

han

ical

Met

allu

rgy/

Mat

eria

ls

Nu

clea

r

Aer

osp

ace

Ch

emic

al

Ele

ctri

cal

En

gin

eeri

ng

Sci

ence

sIn

du

stri

al/

Mfg

.

Mec

han

ical

Met

allu

rgy/

Mat

eria

ls

Nu

clea

r

Aerospace

Chemical

Electrical

Engineering Science

Industrial/Manufacturing

Mechanical

Metallurgical/Materials

Nuclear

Aerospace

Chemical

Electrical

Engineering Science

Industrial/Manufacturing

Mechanical

Metallurgical/Materials

Nuclear

1994 / 2001

Table III

*Source: National Science Foundation – Graduate Students and Post Doctorates in Science and Engineering: Fall 2001

Page 83: CS-IT.ppt - Vision And Security Technology Laboratory

Access, VPN and RATS

Ecollege http://uccsonline.net The user ID is. your UCCS student number

and the default password is UCCS

http://www.uccs.edu/~helpdesk

http://it.eas.uccs.edu/helpsheets.htm