[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

TechNews Alert for Monday, March 29, 2004



Title: ACM TechNews (HTML)
Read the TechNews Online at: http://www.acm.org/technews/
ACM TechNews
March 29, 2004

Dear ACM TechNews Subscriber:

Welcome to the March 29, 2004 edition of ACM TechNews, providing timely information for IT professionals three times a week. For instructions on how to unsubscribe from this service, please see below.

ACM's MemberNet is now online. For the latest on ACM activities, member benefits, and industry issues

Remember to check out our hot new online essay and opinion magazine, Ubiquity.

Sponsored by
AutoChoice Advisor Logo

Looking for a NEW vehicle? Discover which ones are right for you from over 250 different makes and models. Your unbiased list of vehicles is based on your preferences and years of consumer input. [try it]


HEADLINES AT A GLANCE:

  • Gartner: 1/4 of U.S. IT Jobs Offshored by 2010
  • National Security Spec Advances
  • Congress Moves to Criminalize P2P
  • Can India Plug Its Brain Drain?
  • Extra Headaches of Securing XML
  • Human Studies Show Feasibility of Brain-Machine Interfaces
  • IT Security and Software Development
  • Rising to the Software Challenge
  • Rules for Effective Source Code Control
  • Beyond VoIP
  • The Dating Game Goes Wireless
  • Government IT Must Consider Privacy, Ethics
  • Future Tech: Trends for the Coming Year
  • SANs Come Up to Speed
  • Positive Prognosis
  • Bigger & Better
  • Spam-Busters
  • What Are You Afraid Of?

     

    Gartner: 1/4 of U.S. IT Jobs Offshored by 2010

    One quarter of traditional U.S. IT jobs will have migrated overseas by the end of the decade, predict industry analyst researchers, but this migration may not necessarily entail layoffs of American workers in every case: Some of those positions will be created by American firms setting up shop in ...

    [read more]      to the top


    National Security Spec Advances

    This week will mark the unveiling of the Open Specification for Information Sharing (OSIS) by Regional Alliances for Infrastructure and Network Security (RAINS), a consortium of technology companies, critical infrastructure providers, universities, and public agencies. OSIS is ...

    [read more]      to the top


    Congress Moves to Criminalize P2P

    Legislation circulating in Congress would significantly stiffen the penalties for illegal file-sharing as well as make it easier for the Justice Department to sue copyright pirates. A draft bill under consideration by the House subcommittee on intellectual property would mean ...

    [read more]      to the top


    Can India Plug Its Brain Drain?

    The Indian Institutes of Technology (IIT) are setting up startup incubators to encourage the country's best and brightest engineers to stay and make their fortune at home. The list of IIT graduates who fill major positions in the technology industry is impressive, given that just about 3,000 new ...

    [read more]      to the top


    Extra Headaches of Securing XML

    Web services pose a serious security threat to enterprise networks given the lack of understanding about XML among security professionals and the low profile security has played in Web services deployment to date. Current Web services implementations are not much of a threat since ...

    [read more]      to the top


    Human Studies Show Feasibility of Brain-Machine Interfaces

    With funding from the Defense Advanced Research Projects Agency and the National Institutes of Health, Duke University Medical Center researchers have embarked upon initial human feasibility studies into a way to control external devices by thought via a series of electrodes implanted within a ...

    [read more]      to the top


    IT Security and Software Development

    As hardware and software proliferates, there is a pressing need to address interoperability and security issues, such as whether the technologies will interoperate reliably under all potential test scenarios. Unfortunately, the number of software combinations that need to work together in a secure ...

    [read more]      to the top


    Rising to the Software Challenge

    A major challenge for scientific research in computing is establishing a connection between the theory of programming and the products of software engineering practice, writes Microsoft Research professor Sir Tony Hoare; he says this task could be accomplished by organizing a grand challenge ...

    [read more]      to the top


    Rules for Effective Source Code Control

    Larkware lead developer and author Mike Gunderloy believes every software developer should use some form of source code control, which promotes more harmonious collaboration between team members and provides a secure back-up file of code as well. When choosing the best source code control system, ...

    [read more]      to the top


    Beyond VoIP

    The Internet2 Technology Evaluation Center at Texas A&M University is working to build next-generation voice-over-IP (VoIP) technologies. Walt Magnussen, director of communications for the university, says the center's Internet2 Voice Over IP Working Group is concerned with issues such as ...

    [read more]      to the top


    The Dating Game Goes Wireless

    Researchers at MIT's Media Lab have developed software that would allow cell phones to exchange photos and personal information about singles in bars, cafes, shopping malls, and workplaces who are likely to make a good match. Developed by Nathan Eagle, Pedro Yip, Steve Kannan, and Doochan ...

    [read more]      to the top


    Government IT Must Consider Privacy, Ethics

    The nonprofit group Association for Federal Infraction Resources Management (AFFIRM), which works to improve U.S. government information management, sponsored a panel at the recent FOSE government computing trade show to inspire discussion on privacy and other technology-related ethical issues. ...

    [read more]      to the top


    Future Tech: Trends for the Coming Year

    Augmented reality systems are being used by the armed forces to train people in dealing with dangerous situations. Unlike virtual reality, in which the user interacts with an artificial environment, augmented reality puts users in a real environment and superimposes digital images over their ...

    [read more]      to the top


    SANs Come Up to Speed

    The 10Gbit Fibre Channel products due out by the end of this year are likely to be undercut by a 4Gbit standard that is less expensive and compatible with existing technology. The Fibre Channel Industry Association (FCIA) approved the 4Gbit standard last June before approving ...

    [read more]      to the top


    Positive Prognosis

    The increasing digitization of medical data and the incorporation of electronics into medical equipment is spurring a new focus on early diagnosis and prevention of ailments. The growing availability of diagnostic imagery carries with it the danger of medical-data overload, ...

    [read more]      to the top


    Bigger & Better

    AT&T, Land Registry, Boeing, Experian Information Solutions, and the U.S. Defense Department are pushing the envelope in terms of database technologies. AT&T has compiled two years of telephone records into a 26.3 TB data warehouse used by 3,000 staff for marketing analysis, pricing ...

    [read more]      to the top


    Spam-Busters

    Unspam CEO Matthew Prince, one of the top spam fighters in the United States, argues that for spam to be curtailed several things must happen: Technology that can help establish and confirm a sender's identity must be developed, which will allow anti-spam laws to be more enforceable and ...

    [read more]      to the top


    What Are You Afraid Of?

    Virtual reality (VR) systems are being used to treat eating disorders, post-traumatic stress, phobias, addiction, and other conditions that are often psychological in nature. VR therapy is also being explored to reduce physical discomfort by evoking peaceful or soothing moods within patients. ...

    [read more]      to the top


    To submit feedback about ACM TechNews, contact: technews@xxxxxxxxxx

    To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to listserv@xxxxxxxxxxxxxxxxx with the line

    signoff technews

    in the body of your message.

    Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

    ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@xxxxxxx

    We will remove your name from the TechNews list on your behalf.

    For help with technical problems, including problems with leaving the list, please write to: technews-request@xxxxxxx

    to the top

    © Copyright 2004 Information, Inc.


  • © 2004 ACM, Inc. All rights reserved. ACM Privacy Policy.