[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Clips May 2, 2003



Clips May 2, 2003

ARTICLES

4 Students To Pay for Music File Swapping 
U.S. Says Ukraine Still Tops Global Piracy List
Bid To Expand Agency Access To Private Data Is Rejected
2 Charged With Stealing Credit Reports 
Coxe leaving FEMA
Bug delays Outlook 2003's release 
House committee approves nanotechnology funding 
Homeland Security has not consolidated terrorist watch lists 

*******************************
Washington Post
4 Students To Pay for Music File Swapping 
Agreement Settles Suit By Recording Industry 
By Frank Ahrens
Friday, May 2, 2003; Page E01 

Four college students agreed to pay as much as $17,500 each to settle lawsuits brought by the music industry for running file-sharing services that the industry claimed were illegally swapping songs and violating copyright laws.

The Recording Industry Association of America, which represents the five major music companies and hundreds of labels, sued students at Princeton University in New Jersey, Rensselaer Polytechnic Institute in Troy, N.Y., and Michigan Technological University in Houghton. It asked federal judges to shut down the students' file-sharing services and award cash damages, which under copyright law could have been as much as $150,000 per song. The trade group claimed that the sites offered 27,000 to 1 million songs each, available for download free.

In the settlements announced yesterday, the students did not admit guilt but agreed to pay the trade group $12,000 to $17,500 each, which can come in installments over the next three years. The defendants also agreed not to knowingly infringe on song copyrights in the future and to take down their file-sharing Web sites except to post notices that they have been discontinued and to provide links to the record association's site.

The defendants are Daniel Peng of Princeton ($15,000), Jesse Jordan ($12,000) and Aaron Sherman ($17,500) of RPI and Joseph Nievelt ($15,000) of Michigan Tech.

"I don't believe that I did anything wrong," Peng, 18, said in a statement issued through his lawyers. "I am glad that the case has been settled amicably, and I hope that for the sake of artists, the larger issues can soon be resolved." None of the other defendants could be reached for comment.

The lawsuits were a new tactic by the industry: going directly after users instead of trying to shut off the technology they use. The record companies blame Internet song piracy for flagging sales of compact discs over the past few years.

The trade group had had legal success against technology, filing lawsuits that led to the 2001 shutdown of Napster, the file-sharing system that popularized song-swapping. An exception to that string of victories came last Friday, when a federal judge in California ruled that technology providers, such as the next generation of song-swapping systems after Napster, are not responsible for illegal activities committed by their users.

But also last week, a U.S. District Court judge in the District told Verizon Internet Services Inc. that it must provide the names and addresses of customers whom the music industry has identified as possible song pirates. That cleared the way for more lawsuits against individuals.

Some industry critics have suggested that such lawsuits could further alienate music consumers, some of whom argue that they were driven to piracy by the high prices of CDs.

"It's very unfortunate that the recording industry, in trying to protect their profits, has used the legal system to intimidate students who are often their best customers," said Howard S. Ende, Peng's lawyer. "Rather, the industry should be working with colleges and universities to resolve its economic problems created by the development of new technologies." 

The four defendants ran local area networks in the computer systems of their universities. LANs tie together several computers and can make the contents of each computer's hard drive available to other users on the network. The four defendants ran search engines that enabled users to find and download songs illegally, the RIAA said.

"We know of at least 18 'local area Napster networks' that have come down since we filed the lawsuits," Matthew J. Oppenheim, the RIAA's senior vice president for business and legal affairs, said in a prepared statement. "The message is clearly getting through that distributing copyrighted works without permission is illegal, can have consequences, and that we will move quickly and aggressively to enforce our rights."
*******************************
Reuters
U.S. Says Ukraine Still Tops Global Piracy List
Thu May 1, 5:45 PM ET

WASHINGTON (Reuters) - The United States on Thursday issued its annual list of countries with the worst record of protecting copyright material and other intellectual property, again identifying Ukraine as the worst culprit. 

   

The U.S. Trade Representative's Office said $75 million in U.S. sanctions on Ukraine would remain in effect because of that country's failure to adopt and enforce adequate protections against the illegal copying of optical media products such as music CDs, movie DVDs and computer software. 


The sanctions were first imposed in January 2002. 


Protection of intellectual property rights is an increasingly important component of U.S. trade policy. 


The International Intellectual Property Alliance, a consortium of publishing, film, software and recording industry groups, estimates that global piracy costs U.S. copyright industries more than $22 billion annually. 


The 50 countries listed in the USTR annual report accounted for $9.8 billion of those annual losses, the group said. 


"Open markets and rules that guarantee the protection of intellectual property are critical to the continued health of the creative sectors of our economy," U.S. Trade Representative Robert Zoellick said in a statement. 


The report noted that ongoing implementation of an World Trade Organization (news - web sites) agreement on intellectual property rights had helped to improved protection worldwide. 


It gave the following examples: 


-- Egypt has passed a comprehensive intellectual property rights law that represents an improvement in all major facets of Egypt's intellectual property regime. 


-- Colombia and Hungary are now protecting confidential medical test data in line with their WTO obligations. 


-- Many countries, such as Israel, are making the necessary investments in education, police and judicial resources to improve enforcement to protect U.S. right holders. 


But ineffective enforcement of intellectual property rights, commercial piracy and counterfeiting of consumer products remained a global threat, the USTR said. 

Counterfeit products, from shampoo to auto brakes, harmed not only trademark owners but could also cause serious health and safety problems for consumers, the report said. 

Rampant piracy and lack of enforcement were problems in Russia, Taiwan, Poland, Brazil and elsewhere, the USTR said. 

Ukraine was the only country put on the Priority Foreign Country list, the most serious designation. 

China and Paraguay remain subject to special monitoring under U.S. trade laws. 

Both countries have negotiated bilateral agreements with the United States to address long-standing piracy concerns, and failure to comply with those commitments could lead to U.S. sanctions. 

Placed on the Priority Watch List, the next highest category of concern, were Argentina, the Bahamas, Brazil, the 15-nation European Union, India, Indonesia, Lebanon, the Philippines, Poland, Russia, and Taiwan. 

Among countries placed on the Watch List were Belarus, Bolivia, Canada, Chile, Colombia, Costa Rica, Dominican Republic, Ecuador, Egypt, Guatemala, Israel, South Korea, Kuwait, Mexico, Pakistan, Peru, Saudi Arabia, Uruguay, Venezuela, and Vietnam.
*******************************
Tech Daily
Security 
Bid To Expand Agency Access To Private Data Is Rejected

The Senate Intelligence Committee on Thursday rejected a plan to give the CIA and Pentagon more power in accessing personal and financial records of U.S. citizens, The New York Times reports. The plan would have permitted the CIA and the military to issue administrative subpoenas, which could have forced Internet service providers, credit-card companies, libraries and others to relinquish materials like phone records, bank transactions and e-mail logs. At present, the FBI is the only agency with such power, and its subpoenas do not require court approval. The proposal was part of a broader intelligence authorization bill now pending before Congress and prompted a fierce debate in a closed-door meeting of the committee, officials said.

Times article: http://www.nytimes.com/2003/05/02/international/worldspecial/02TERR.html
*******************************
Associated Press
2 Charged With Stealing Credit Reports 
Thu May 1, 6:05 PM ET

NEWARK, N.J. - A worker at mortgage lender Weichert Financial Services and a man she lived with have been charged with stealing thousands of client credit reports and using the information to buy goods over the Internet. 

Marie Louissaint, an administrative assistant in loan registrations for the mortgage broker, and Ronald Hyppolyte were arrested Wednesday by the FBI (news - web sites) and held without bail, Assistant U.S. Attorney Robert Kirsch said. 


He said Weichert Financial is cooperating with the investigation. 


Since November, 3,774 credit profiles were unlawfully accessed from Weichert Financial's computer system, the FBI said in a criminal complaint. 


Some of the orders placed for computer equipment to be delivered to an Irvington, N.J., address were canceled because the credit lines in various names were unauthorized, the FBI said, noting that all of the names were Weichert customers from mid-2002 through early 2003. 


Weichert spokeswoman Jennifer Engel declined to comment on Louissaint's status with the company, citing "the integrity of investigation." 


Weichert Financial, based in Morris Plains, N.J., is affiliated with Weichert, Realtors. 


Louissaint's lawyer, Angelo Servidio, did not immediately return a message seeking comment. Hyppolyte's lawyer, Robert G. Stahl, said his client has asserted his innocence. 
*******************************
Federal Computer Week
Coxe leaving FEMA
BY Dan Caterinicchia 
May 1, 2003

Now that the two programs he was brought in to oversee as program executive officer (PEO) at the Federal Emergency Management Agency have matured or moved, retired Army Col. Robert Coxe is moving along as well.

Coxe is deputy chief information officer for e-government at FEMA and the former chief technology officer of the Army. He retired from the Army last August, but said he delayed his plans to pursue a career in the private sector because of the national security missions of the two projects he came to FEMA to manage: Project SafeCom and DisasterHelp.gov.

SafeCom, a national public safety wireless interoperability initiative, is designed to enhance communications among first responders. It is moving to the Homeland Security Department's Science and Technology Directorate in an effort to kick start the program, Coxe said.

DisasterHelp.gov is a one-stop portal for emergency preparedness and response information. It eventually will support more than 4 million members of the first responder community  firefighters, police officers and emergency medical technicians  pulling together several systems, simplifying services and eliminating duplication.

Both programs are among the 24 cross-agency e-government initiatives highlighted by the Bush administration, but as soon as SafeCom was moved, "that broke the requirement for PEO," Coxe said, because it left him with only DisasterHelp.gov, which already has a program manager.

Coxe said his last day will be June 1. Although he is not sure what his next job will be, he said it will "definitely be in the private sector" and preferably in a chief operating officer-type role.
*******************************
Government Computer News
05/02/03 
Bug delays Outlook 2003's release 
By Carlos A. Soto 

An important bug lives on in the latest beta version of Microsoft Outlook 2003, as reported by the GCN Lab [see story, www.gcn.com/22_9/news/21864-1.html], despite two widely publicized fixes. 

The Inbox bug systematically deletes e-mail messages throughout networked systems that still have Outlook 2002 installed. Deletion starts when Outlook 2003 receives new e-mails and doesn't stop until Outlook 2003 is closed. 

Shutting down Outlook 2002 and using only Outlook 2003 doesn't stop the bug from removing the e-mails in the 2002 version. Microsoft Corp. has not told the lab staff what specifically causes the bug, but one proposed workaround involves 21 steps to redirect the location of the cache and change the location of the default profile's Offline Folder File. That didn?t work in our tests. Another workaround, which also didn?t fix the Outlook bug, is to back up all user data on the server running Microsoft Exchange Server and then delete and recreate the Outlook Profiles. Backup is necessary because this procedure deletes calendar data, e-mails and so on. We found that it did remedy the frequent crashing we had found in Outlook 2003 and improved reliability. 

Microsoft has delayed final product release from early summer to late summer or early fall. We?ll report on the final version thenwithout the Inbox and other bugs, we hope.
*******************************
Government Computer News
05/01/03 
House committee approves nanotechnology funding 
By William Jackson 

The House Science Committee has approved a bill establishing a National Nanotechnology Research and Development Program, authorizing $2.4 billion in funding over the next three years. 

Floor action for HR 766 has tentatively been scheduled for next week. 

The bill, sponsored by chairman Sherwood Boehlert (R-N.Y.) and Mike Honda (D-Calif.), passed by a voice vote Thursday. The purpose is to ?ensure continued U.S. leadership in nanotechnology? R&D. The National Science Foundation has predicted there will be a $1 trillion market for devices and systems operating at the atomic and molecular level within a decade. 

The bill would establish a National Nanotechnology Coordination Office to oversee the funding, through five federal agencies, of interdisciplinary research by individuals, teams and academic institutions. The office also would encourage the transfer of technology and development of commercial applications. 

An advisory committee would evaluate the work of the office and address ethical concerns. 

Agencies receiving funds would be the National Science Foundation, the Energy Department, NASA, the National Institute of Standards and Technology and the Environmental Protection Agency. The agencies would receive $713 million in fiscal 2004, $784.5 million the following year, and $864 million in 2006.
*******************************
Government Executive
April 30, 2003 
Homeland Security has not consolidated terrorist watch lists 
By Shane Harris
sharris@xxxxxxxxxxx 

More than 100 days after its creation, the Homeland Security Department has failed to meet one of the key goals agency leaders outlined last year. 


Months before the department was established, officials said dozens of so-called watch lists of suspected terrorists, maintained by various agencies across the government, would be consolidated in the new department the first day it began operations. But according to a report (03-322) issued Wednesday by the General Accounting Office, nine agencies still develop and maintain a dozen watch lists. ?These lists include overlapping but not identical sets of data, and different policies and procedures govern whether and how these data are shared with [other agencies and organizations],? the report found. 


In addition to the lists not being consolidated, GAO?s findings show that information sharing among agencies isn?t happening as frequently as some officials have indicated. Generally, watch list data is more likely to be shared among federal agencies than with state and local governments or private sector groups, according to the report. Homeland Security officials have said repeatedly that improving information sharing among all those parties is one of the department?s highest priorities, and they?ve proposed to do that through electronic means. 


However, the extent to which that electronic sharing happens ?is constrained by fundamental differences? in the design of the systems that house the watch lists, GAO said. In other words, the agencies that would share the lists have designed their software, hardware and computer networks so incongruously that their enterprise architecture inhibits information sharing. 


The report said this proliferation of systems ?is inconsistent with the most recent congressional and presidential direction? to design enterprise architectures that are consistent among agencies. The push to do so has been led by the Office of Management and Budget, and agencies have expectantly looked to Homeland Security as a leader in the effort. 


The report?s authors said the Homeland Security Chief Information Officer, Steven Cooper, told them the department was creating a plan to consolidate the watch lists as part of its enterprise architecture. However, the department didn?t provide GAO with enough information to evaluate the effort, the authors said. 


Homeland Security officials were working on that architecture for months while they were still assigned to the White House. They didn?t respond to request for comments about GAO?s findings. 


Sen. Joseph Lieberman, D-Conn., Tuesday criticized the administration for not giving Homeland Security a more central role in the management of terrorist data and intelligence. Specifically, he said the administration?s plan to build a new terrorist intelligence center under the management of the CIA was ?misguided and potentially calamitous? because it wouldn?t solve years? old rivalries between the agency and the FBI, which will move its counterterrorism division to the new center. Those rivalries, Lieberman said, have inhibited information sharing. 
*******************************



From owner-technews@xxxxxxxxxxxxxxxxx Fri May  2 17:29:27 2003
Return-Path: <owner-technews@xxxxxxxxxxxxxxxxx>
Received: from sark.cc.gatech.edu (sark.cc.gatech.edu [130.207.7.23])
	by cleon.cc.gatech.edu (8.12.9/8.12.8) with ESMTP id h42LTRIw022576;
	Fri, 2 May 2003 17:29:27 -0400 (EDT)
Received: from postel.acm.org (postel.acm.org [199.222.69.7])
	by sark.cc.gatech.edu (8.12.9/8.12.8) with ESMTP id h42LT6ji022763;
	Fri, 2 May 2003 17:29:07 -0400 (EDT)
Received: from postel (postel.acm.org [199.222.69.7])
	by postel.acm.org (8.9.3/8.9.3) with ESMTP id RAA38294;
	Fri, 2 May 2003 17:28:58 -0400
Received: from LISTSERV2.ACM.ORG by LISTSERV2.ACM.ORG (LISTSERV-TCP/IP release
          1.8d) with spool id 0060 for TECHNEWS@xxxxxxxxxxxxxxxxx; Fri, 2 May
          2003 17:05:52 -0400
Approved-By: technews@xxxxxxxxxx
Received: from hq.acm.org (hq.acm.org [199.222.69.30]) by postel.acm.org
          (8.9.3/8.9.3) with ESMTP id RAA21008 for
          <technews@xxxxxxxxxxxxxxxxx>; Fri, 2 May 2003 17:02:20 -0400
Received: by hq.acm.org with Internet Mail Service (5.5.2656.59) id <JMT9R7XF>;
          Fri, 2 May 2003 17:02:23 -0400
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2656.59)
Content-Type: text/plain; charset="iso-8859-1"
Message-ID:  <8DFA8DABC2E6FA438EDCFD26881380A5D37A62@xxxxxxxxxx>
Date:         Fri, 2 May 2003 17:02:14 -0400
From: technews <technews@xxxxxxxxxx>
Subject:      ACM TechNews - Friday, May 2, 2003
To: TECHNEWS@xxxxxxxxxxxxxxxxx
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by cleon.cc.gatech.edu id h42LTRIw022576
Content-Length: 12990
Status: 
X-Status: 
X-Keywords:                   

Dear ACM TechNews Subscriber:

Welcome to the May 2, 2003 edition of ACM TechNews,
providing timely information for IT professionals three times a
week.  For instructions on how to unsubscribe from this
service, please see below.

ACM's MemberNet is now online. For the latest on ACM
activities, member benefits, and industry issues, 
visit http://www.acm.org/membernet

Remember to check out our hot new online essay and opinion
magazine, Ubiquity, at http://www.acm.org/ubiquity

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ACM TechNews
Volume 5, Number 490
Date: May 2, 2003

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - -
POWERFUL SYSTEMS, POWERFUL SAVINGS
IBM offers ACM members discounts on hundreds of products for
the home and office including desktops, notebooks, servers, 
monitors, software, hardware and accessories. Also, ask about 
additional promotional offers! Call 1-800-426-7235 ext. 3559 to 
save 10% everyday on purchases.  Please visit our Web site at
http://www.ibm.com/businesscenter/ACM

TURN UP THE VOLUME ON IBM AND SAVE
The more you buy, the more you save. Ask about Volume Discounts
when you buy multiple select IBM ThinkPad® notebooks and 
NetVistaTM desktops*. Call 1-800-426-7235 ext. 3559 today.

Hurry! Free Palm Zire Handheld! Keep your life in balance.  Get 
organized while increasing your mobility!  Buy any IBM NetVista(tm) 
desktop or IBM ThinkPad® notebook and ask for a Palm(tm) Zire(tm) at no 
additional cost ($99.99 Value).  Or upgrade to the Palm Tungsten(tm) T 
and SAVE $100.  Offer ends 5/19/03 or while supplies last.**  Visit 
http://www.ibm.com/businesscenter/acm or call 800-426-7235, ext. 3559
OR
Free ThinkPad Carrying Case and free Travel Surge Protector!  Travel 
with style and security. What could be more perfect for the traveling 
professional? Ask for a FREE ThinkPad® Leather Carrying Case and a 
Free Travel Surge Protector with retractable phone cord with the 
purchase of any ThinkPad Notebook. Offer ends 5/19/03.**  Visit
http://www.ibm.com/businesscenter/acm or call 800-426-7235, ext. 3559

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - -

Top Stories for Friday, May 2, 2003:
http://www.acm.org/technews/current/homepage.html

"What's Spam By Any Other Name?"
"Web-Based Attacks Could Create Chaos in the Physical World"
"Making Intelligence a Bit Less Artificial"
"FCRC Draws Researchers from a Host of Disciplines"  
"Off the Hype Meter"
"Robot Science Puts On a Friendly Face"
"Scientists Examine IT's 'Human Factor'"
"Artificial Intellect Really Thinking?"
"Seashell Offers Digital Memories"
"Scientists Study Quantum Computing Feasibility"
"The Great IT Complexity Challenge"
"Harvard Event Showcases Russia as Outsourcing Site"
"A Misnomer Taken to the 'Extreme'"
"Data Security Measures Failing to Match Legal Expectations"
"Group Offers Help for Women in the Tech Sector"
"Big Brother: Is He Watching You?"
"Exporting IT Jobs"
"Bright New World"
"Get Real"
"Personalizing Web Sites With Mixed-Initiative Interaction"

******************* News Stories ***********************

"What's Spam By Any Other Name?"
The first day of the FTC's three-day spam conference in
Washington was marked by disagreement among email experts over
what actually constitutes spam:  Anti-spam advocates and certain
companies defined all unsolicited bulk email as spam, while some ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item1

"Web-Based Attacks Could Create Chaos in the Physical World"
Internet security researchers presented a paper at a recent
ACM Workshop on Privacy in an Electronic Society detailing how
criminals or terrorists with a minimum of computer skills and
resources could disrupt real-world operations by swamping ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item2

"Making Intelligence a Bit Less Artificial"
Amazon, NetFlix, and other online retail services rely on
automated recommender systems to anticipate customer purchases
based on past choices; however, a February report from Forrester
Research found that just 7.4 percent of online consumers often ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item3

"FCRC Draws Researchers from a Host of Disciplines"  
Attendees of the Federated Computing Research Conference (FCRC)
in June will find a wide assortment of affiliated research fields
under one roof. The annual conference, to be held June 7-14 in 
San Diego, Calif., will assemble meetings, workshops, and tutorials ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item4

"Off the Hype Meter"
The technology industry hype machine is running on overdrive even
though the products currently available leave a lot to be
desired, writes Jon Oltsik, who compares the promised benefits of
"hot" technologies with their actual performance.  He notes that ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item5

"Robot Science Puts On a Friendly Face"
Academic and corporate research labs worldwide are engineering
robots designed to increase human comfort levels by taking on
mundane tasks as well as carry out more sophisticated operations.
Carnegie Mellon University, through partnerships with other ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item6

"Scientists Examine IT's 'Human Factor'"
Researchers working on the National Science Foundation's (NSF)
Management of Knowledge-Intensive Dynamic Systems (MKIDS) 
program are leveraging information technology to determine how 
social networks among persons and groups shape the organizational ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item7

"Artificial Intellect Really Thinking?"
A computer can be labeled as artificially intelligent, but the
intelligence--if indeed that is what it is--actually resides in
the program, writes Fred Reed.  However, he points out that such
programs, once deconstructed, consist of incremental steps that ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item8

"Seashell Offers Digital Memories"
BTexact has developed a methodology in which physical mementos
can be scanned into a computer and connected to related digital
content--emails, photos, video, Web sites, text messages, etc.  
This content can be accessed by placing the memento--a child's ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item9

"Scientists Study Quantum Computing Feasibility"
Supercomputers with billions of times the speed and computing
power of current models could become a reality thanks to a
multidisciplinary quantum computing research effort at the
University of California, Berkeley.  "What would take millions of ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item10

"The Great IT Complexity Challenge"
Autonomic computing promises to clear up complexity in company IT
operations, freeing people from mundane maintenance tasks and
handing those functions over to computers themselves.  Major IT
vendors are latching on to autonomic computing not only as a way ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item11

"Harvard Event Showcases Russia as Outsourcing Site"
The second annual Russian IT Seasons event held this week at
Harvard University is an opportunity for Russian firms to
highlight the advantages of outsourcing software research and
development to their country, including lower wages and a large ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item12

"A Misnomer Taken to the 'Extreme'"
Extreme programming is a methodology that ensures the best
results when programming teams are faced with ambiguous and
shifting project expectations.  Despite its name, extreme
programming actually incorporates all the most conservative ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item13

"Data Security Measures Failing to Match Legal Expectations"
Increased governmental regulations concerning companies' computer
security and data privacy policies have heightened firms' legal
exposure, according to experts.  The Health Insurance Portability
and Accountability Act, the Gramm-Leach-Bliley Act, the ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item14

"Group Offers Help for Women in the Tech Sector"
The Association for Women in Computing (AWC) is a professional
group created to give women a leg up in the technology sector.  
The organization currently consists of 2,000 members and about 20
active chapters throughout 13 U.S. states and the District of ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item15

"Big Brother: Is He Watching You?"
Legislators and privacy supporters are critical of the
government's efforts to clamp down on terrorism using the latest
technologies to gather, analyze, and share surveillance data on
Americans; they fear that such measures will create an Orwellian ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item16

"Exporting IT Jobs"
The number of U.S. companies hiring cheap offshore labor for
routine IT operations is increasing as a result of their need to
reduce IT costs and balance out desired, salaried employees and
workers they can temporarily hire on an as-needed basis.  CIOs ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item17

"Bright New World"
Optical applications are being rethought thanks to the advent of
plasmonics, which has the potential to revolutionize
nanotechnology.  Experiments by Thomas Ebbesen and Peter Wolf of
NEC Research Institute established that light directed on a metal ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item18

"Get Real"
The chief value of instant messaging and other forms of real-time
communication (RTC) services is presence, and this is
fundamentally changing business communication, writes A Working
Model managing director Stowe Boyd.  To take advantage of this ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item19

"Personalizing Web Sites With Mixed-Initiative Interaction"
Saverio Perugini and Naren Ramakrishnan of Virginia Polytechnic
Institute believe that a truly personalized Web site will
personalize the user's interaction, and a mixed-initiative
architecture where the user can control the interaction is the ...
http://www.acm.org/technews/articles/2003-5/0502f.html#item20

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

-- To review Wednesday's issue, please visit
http://www.acm.org/technews/articles/2003-5/0430w.html

-- To visit the TechNews home page, point your browser to:
http://www.acm.org/technews/

-- To unsubscribe from the ACM TechNews Early Alert Service:
Please send a separate email to listserv@xxxxxxxxxxxxxxxxx
with the line 

signoff technews

in the body of your message.

-- Please note that replying directly to this message does not
automatically unsubscribe you from the TechNews list.

-- To submit feedback about ACM TechNews, contact:
technews@xxxxxxxxxx

-- ACM may have a different email address on file for you,
so if you're unable to "unsubscribe" yourself, please direct
your request to: technews-request@xxxxxxx 

We will remove your name from the TechNews list on 
your behalf.

-- For help with technical problems, including problems with
leaving the list, please write to:  technews-request@xxxxxxx

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - -
Site Sponsored by:
   IBM personal computers and software
   Purchase discounted IBM personal computers, 
   servers, and hundreds of additional products
   and services as an ACM member.

*Discount is available directly from IBM on selected products. 
Savings referenced off regular IBM Web price. Offers cannot 
be combined with other discounts, rebates or special offers. 
Offer valid in US only and subject to availability. IBM, NetVista
and ThinkPad are trademarks of IBM Corporation in the 
U.S. and/or other countries.

** Offer valid from IBM in the US only thru 5/19/03 or while supplies last.

Shipping and handling not included. Limit 10 per customer.  May not be 
combined with other offers or promotions.  IBM makes no representation 
or warranty regarding third party products or services.  IBM, NetVista 
and ThinkPad are trademarks of IBM Corporation in the U.S. and/or 
other countries. Other company, product and service names may be 
trademarks or service marks of others.

Warranty Information:  For a copy of applicable product warranties, 
write to: Warranty Information, P.O. Box 12195, RTP, NC 27709, 
Attn: Dept. JDJA/B203.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - -
 


From owner-technews@xxxxxxxxxxxxxxxxx Fri Apr 18 14:11:43 2003
Return-Path: <owner-technews@xxxxxxxxxxxxxxxxx>
Received: from sark.cc.gatech.edu (sark.cc.gatech.edu [130.207.7.23])
	by cleon.cc.gatech.edu (8.12.9/8.12.8) with ESMTP id h3IIBhIw008992;
	Fri, 18 Apr 2003 14:11:43 -0400 (EDT)
Received: from postel.acm.org (postel.acm.org [199.222.69.7])
	by sark.cc.gatech.edu (8.12.9/8.12.8) with ESMTP id h3IIBgDN016637;
	Fri, 18 Apr 2003 14:11:43 -0400 (EDT)
Received: from postel (postel.acm.org [199.222.69.7])
	by postel.acm.org (8.9.3/8.9.3) with ESMTP id OAA42648;
	Fri, 18 Apr 2003 14:02:35 -0400
Received: from LISTSERV2.ACM.ORG by LISTSERV2.ACM.ORG (LISTSERV-TCP/IP release
          1.8d) with spool id 0007 for TECHNEWS@xxxxxxxxxxxxxxxxx; Fri, 18 Apr
          2003 13:40:54 -0400
Approved-By: technews@xxxxxxxxxx
Received: from hq.acm.org (hq.acm.org [199.222.69.30]) by postel.acm.org
          (8.9.3/8.9.3) with ESMTP id NAA13736 for
          <technews@xxxxxxxxxxxxxxxxx>; Fri, 18 Apr 2003 13:39:21 -0400
Received: by hq.acm.org with Internet Mail Service (5.5.2656.59) id <2C8HCFVY>;
          Fri, 18 Apr 2003 13:39:24 -0400
X-MS-TNEF-Correlator: <8DFA8DABC2E6FA438EDCFD26881380A5D37A43@xxxxxxxxxx>
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2656.59)
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding:  quoted-printable
Message-ID:  <8DFA8DABC2E6FA438EDCFD26881380A5D37A43@xxxxxxxxxx>
Date:         Fri, 18 Apr 2003 13:39:24 -0400
Sender: ACM TechNews Early Alert Service <TECHNEWS@xxxxxxxxxxxxxxxxx>
From: technews <technews@xxxxxxxxxx>
Subject:      ACM TechNews - Friday, April 18, 2003
To: TECHNEWS@xxxxxxxxxxxxxxxxx
Content-Length: 10578
Status: 
X-Status: 
X-Keywords:                   

Dear ACM TechNews Subscriber:

Welcome to the April 18, 2003 edition of ACM TechNews,
providing timely information for IT professionals three times a
week.  For instructions on how to unsubscribe from this
service, please see below.

ACM's MemberNet is now online. For the latest on ACM
activities, member benefits, and industry issues,=20
visit http://www.acm.org/membernet

Remember to check out our hot new online essay and opinion
magazine, Ubiquity, at http://www.acm.org/ubiquity

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ACM TechNews
Volume 5, Number 484
Date: April 18, 2003

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - =
- -
- - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - =
- -
- - - - - - - - - -
POWERFUL SYSTEMS, POWERFUL SAVINGS
IBM offers ACM members discounts on hundreds of products for
the home and office including desktops, notebooks, servers,=20
monitors, software, hardware and accessories. Also, ask about=20
additional promotional offers! Call 800-426-7235 ext. 3559 to=20
save 10% everyday on purchases.

TURN UP THE VOLUME ON IBM AND SAVE
The more you buy, the more you save. Ask about Volume Discounts
when you buy multiple select IBM ThinkPad=AE notebooks and=20
NetVistaTM desktops*. Call 800-426-7235 ext. 3559 today.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - =
- -
- - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - =
- -
- - - - - - - - - -

Top Stories for Friday, April 18, 2003:
http://www.acm.org/technews/current/homepage.html

"Eluding the Web's Snare"
"Debate: Should You Hire a Hacker?"
"Wi-Fi Could Let Iraq Skip Steps to Leap Into Broadband"
"Women Need Widescreen for Virtual Navigation"
"Fiber Loop Makes Quantum Memory"
"Glowing Beads Make Tiny Bar Codes"
"Battlefield Internet Gets First War Use"
"Expert Warns of Cyberthreats"
"Feds, Tech Industry Partner to Fight Cyberterrorism"
"Making More of a Noise"
"Tech Sector Starts to Feel the Effects of SARS Virus"
"Uncle Sam: Share Your System Secrets"
"Analyst Predicts Next-Generation Super Network"
"Study: Techies Could Use Some PR"
"H-1B Debate Flares as EE Jobless Rate Hits 7 Percent"
"Listening In"
"Almost Human"
"Teen Technology Goes to Battle"

******************* News Stories ***********************

"Eluding the Web's Snare"
Results from the Pew Internet and American Life Project's 2002
survey show that 42% of American adults still do not
regularly use the Internet despite many of them being able to if
they chose to do so.  Project director Lee Rainie said the ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item1

"Debate: Should You Hire a Hacker?"
Reformed hackers make terrific security advisors for
corporations, argued onetime hacker Kevin Mitnick during a panel
session at the RSA Security Conference today.  Taking the
opposing view was fellow panelist Christopher Painter, current ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item2

"Wi-Fi Could Let Iraq Skip Steps to Leap Into Broadband"
The reconstruction of Iraq following the downfall of Saddam
Hussein's regime could involve a Wi-Fi deployment that outpaces
that of the U.S., because Iraq will not be plagued by
traditional phone and cable networks that would otherwise hamper ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item3

"Women Need Widescreen for Virtual Navigation"
Computer scientists from Microsoft's Redmond, Wash., research lab
and Carnegie Mellon University told attendees at a Florida
computer usability conference last week that men are better than
women when it comes to navigating through virtual environments ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item4

"Fiber Loop Makes Quantum Memory"
New quantum computing research has yielded a short-term memory
device that uses an optical fiber loop to store quantum
information.  Johns Hopkins University's Applied Physics
Laboratory has created a simple device that traps photons in an ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item5

"Glowing Beads Make Tiny Bar Codes"
Corning scientists have devised a process to synthesize minuscule
barcoded beads through the fusion of glass doped with lanthanide
metal oxide ions, which glow at certain wavelengths under
ultraviolet light.  The mixture is drawn into a rectangular ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item6

"Battlefield Internet Gets First War Use"
Wednesday's raid by the U.S. Army's 4th Infantry Division on the
Taji air base in Iraq inaugurated the Force 21 Battle Command
Brigade and Below (FBCB2), an advanced networking system that
monitors the movement of combat vehicles in a sort of ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item7

"Expert Warns of Cyberthreats"
Samuel Berger, who served the Clinton administration as national
security advisor, told reporters at this week's RSA Conference
that the U.S. should increase funding for both physical
and cyberspace-related security measures, and warned the ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item8

"Feds, Tech Industry Partner to Fight Cyberterrorism"
The federal government and leading technology vendors have agreed
to develop voluntary computer security standards meant to raise
the baseline of Web security and customer trust online; companies
that pass the standards, which will not be quickly outmoded ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item9

"Making More of a Noise"
While currently inflexible and expensive to deploy, voice
technology is making improvements and gaining acceptance in
certain areas.  Experts say voice commands would be most useful
in factory or vehicle settings where users cannot easily use ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item10

"Tech Sector Starts to Feel the Effects of SARS Virus"
Arabia.com, based in the British islet of Guernsey, has announced
that it plans to sell Iraq.com but will not release its target
price.  In other Internet and computing news, Intel has cancelled
forums to be held in Beijing and Taipei because of the SARS ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item11

"Uncle Sam: Share Your System Secrets"
The Homeland Security Department issued a proposal on Tuesday
that will supposedly quell industry groups' fears about
disclosing infrastructure security data to the government by
promising to keep such data confidential.  The proposal ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item12

"Analyst Predicts Next-Generation Super Network"
Gartner expects all future communications needs to be supported
by a hybrid next-generation network (NGN) that melds the Internet
with wireless and public switched telephone, and industry experts
predict such a network will arrive within two years.  The ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item13

"Study: Techies Could Use Some PR"
A Deloitte & Touche/IDG Research Services survey of 200 IT
managers finds that two-thirds of respondents have been unable to
relate the value of their IT departments' contributions to
executives, which has led to a "murky view of technology" among ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item14

"H-1B Debate Flares as EE Jobless Rate Hits 7 Percent"
The Bureau of Labor Statistics (BLS) disclosed last week that 7%
of U.S. electronic engineers were unemployed in the first
quarter of 2003, compared to 3.9% in the fourth quarter of
2002.  The BLS also reported that unemployment among computer ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item15

"Listening In"
The signals intelligence (Sigint) network of ground-based
antennas and orbiting satellites was once considered the most
effective electronic surveillance system in the world, but that
effectiveness was undercut in recent years by the collapse of the ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item16

"Almost Human"
Human simulation technology has advanced significantly over the
past few years, and Maryland-based companies such as SIMmersion,
BreakAway Games, and Immersion Medical are cresting the
simulation technology wave and refining programs that can be ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item17

"Teen Technology Goes to Battle"
Peer-to-peer technology, popular among song-trading teenagers on
the Internet, is seeing action in the military and in
humanitarian efforts.  The U.S. Defense Department is employing
off-the-shelf products such as Microsoft NetMeeting, and software ...
http://www.acm.org/technews/articles/2003-5/0418f.html#item18

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

-- To review Wednesday's issue, please please visit
http://www.acm.org/technews/articles/2003-5/0416w.html

-- To visit the TechNews home page, point your browser to:
http://www.acm.org/technews/

-- To unsubscribe from the ACM TechNews Early Alert Service:
Please send a separate email to listserv@xxxxxxxxxxxxxxxxx
with the line=20

signoff technews

in the body of your message.

-- Please note that replying directly to this message does not
automatically unsubscribe you from the TechNews list.

-- To submit feedback about ACM TechNews, contact:
technews@xxxxxxxxxx

-- ACM may have a different email address on file for you,
so if you're unable to "unsubscribe" yourself, please direct
your request to: technews-request@xxxxxxx=20

We will remove your name from the TechNews list on=20
your behalf.

-- For help with technical problems, including problems with
leaving the list, please write to:  technews-request@xxxxxxx

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - =
- -
- - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - =
- -
- - - - - - - - - -
Site Sponsored by:
   IBM personal computers and software
   Purchase discounted IBM personal computers,=20
   servers, and hundreds of additional products
   and services as an ACM member.

*Discount is available directly from IBM on selected products.=20
Savings referenced off regular IBM Web price. Offers cannot=20
be combined with other discounts, rebates or special offers.=20
Offer valid in US only and subject to availability. IBM, NetVista
and ThinkPad are trademarks of IBM Corporation in the=20
U.S. and/or other countries.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - =
- -
- - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - =
- -
- - - - - - - - - -