Privacy in the Age of Transparency
Computing Power to the People
University of San Francisco (USF) computer scientists and volunteers created the world's first "FlashMob" computer in the school's gym on April 3, 2004. The event drew about 700 donated machines, less than expected, and individual CPU failures made benchmarking the entire system impossible; ...
[read more] to the top
Poised to Strike: The Battle Waged by Computer Outlaws Enters a New and Deadly Phase of Sophistication
Existing computer security efforts are not sufficient to stop the rising tide of threats, including the synergistic activities of hackers, virus writers, and spammers. The computer security industry is currently on par with medical practice in 1820s, according to Cryptography Research ...
[read more] to the top
Look, Listen, Walk
MIT Comparative Media Studies program director Henry Jenkins writes that location-aware handhelds will enable "augmented reality," where technology makes people more engaged with their surroundings instead of unattached. Whereas most mobile technology--mobile phones, laptops, headphones, and ...
[read more] to the top
Linux on Desktop Gaining in OS Race
As far as operating system evolution goes, the Linux desktop is quickly catching up to more advanced desktop systems such as Windows and the Unix-based Mac OS X, writes Dan Gillmor. While desktop Linux installations still lack applications and easy-to-use support environments, those ...
[read more] to the top
Ambient Assistance for Travellers
Ambient intelligence pilot projects in Europe have shown the value of the technology, according to Information Society Technologies (IST) project manager Hans Myrhaug. The AMBIESENSE project enabled users with wireless-enabled PDAs to receive location-specific information as they ...
[read more] to the top
UNC Researchers Win $2.6 Million Grant to Explore Portable 3-D Medical Services
Portable, three-dimensional telepresence technology will be tested during tracheotomies performed at University of North Carolina (UNC) Hospitals. Computer science researchers at UNC Chapel Hill have developed a prototype and are testing the technology through the assistance of a three-year, $2.6 ...
[read more] to the top
Student Takes Robotic Challenge
A team of University of Louisiana at Lafayette students and teachers built an autonomous ground vehicle and entered it into the Defense Advanced Research Projects Agency's Grand Challenge last month. CajunBot was one of 15 vehicles to qualify to participate in the 142 mile challenge run; it is ...
[read more] to the top
Smart Devices: The CEA, France Telecom and STMicroelectronics Create MINATEC IDEAs Laboratory
The CEA, STMicroelectronics, and France Telecom have teamed up to establish a laboratory for studying the use of micro- and nano-technologies in new consumer products and services. The MINATEC IDEAs Laboratory is based in Grenoble, France, and will be used to evaluate ideas from their initial ...
[read more] to the top
The Penguin Is Popping Up All Over
Linux is rapidly expanding in the critical embedded operating systems market, which provides the technological underpinnings for automotive controls, consumer electronics, telecommunications devices, and a host of other electronic products. Embedded systems are growing fast as devices ...
[read more] to the top
Industrial Control Systems Seen as 'Undeniably Vulnerable'
Neither the private sector nor the Homeland Security Department have developed a comprehensive strategy to secure the real-time control systems of the nation's critical infrastructure, making the nation vulnerable to cyberterrorism, says Rep. Adam Putnam (R-Fla.), chairman of the House ...
[read more] to the top
In 2015: Sensors Everywhere, Computers Invisible
Gartner analysts at the Symposium/ITxpo 2004 predicted that pervasive and personalized networks will facilitate ubiquitous computing and render current PC devices obsolete by 2015. These self-organizing, self-managing networks will be comprised of intelligent sensors that collect event-driven ...
[read more] to the top
Talking Security With Motorola's William Boni
Motorola chief information security officer William Boni, a keynote speaker at the recent InfoSec World conference, was also instrumental in the launch of the Security Metrics Consortium, in which IT security professionals brainstorm on the key issues they face. Boni supervises security for a ...
[read more] to the top
Technology Assists When Memory Falters
Researchers at the University of Michigan are developing an advanced version of so-called minder technology that makes use of artificial intelligence to deliver more personalized reminders of what an elderly person has done and is supposed to do. The Autominder software serves as a ...
[read more] to the top
NASA Using Linux
There are between 20 and 30 Linux workstations at NASA's Ames Research Center for each rover currently exploring the surface of Mars, running Red Hat Linux 7.3. These workstations, which are equipped with dual 2.8GHz Xeon CPUs, 2GB-4GB of RAM, and an Nvidia Quadra 2000 or 3000, are used to ...
[read more] to the top
Technology a Dependable Ally in Iraq War
Military services are evaluating information technologies designed to enhance battlefield strategies in Operation Iraqi Freedom to see which ones worked and which ones need work. U.S. Strategic Command commander Adm. James Ellis told attendees at the Defense Advanced Research Projects ...
[read more] to the top
Dust in the Wind
Smart Dust is composed of tiny sensors or "motes" that can be programmed to monitor humidity, vibrations, energy use, and many other factors, and organize into ad hoc networks. Proposed by former UC Berkeley professor Kris Pister, Smart Dust was sponsored by the Defense Advanced Research ...
[read more] to the top
Privacy in the Age of Transparency
Companies and organizations must negotiate a veritable minefield to tailor and streamline their relationships with customers, suppliers, and business partners while concurrently upholding the confidentiality of their personal information; this challenge is the result of the emergence of information ...
[read more] to the top
To submit feedback about ACM TechNews, contact:
technews@xxxxxxxxxx
To unsubscribe from the ACM TechNews Early Alert Service:
Please send a separate email to listserv@xxxxxxxxxxxxxxxxx
with the line
signoff technews
in the body of your message.
Please note that replying directly to this message does not
automatically unsubscribe you from the TechNews list.
ACM may have a different email address on file for you,
so if you're unable to "unsubscribe" yourself, please direct
your request to: technews-request@xxxxxxx
We will remove your name from the TechNews list on
your behalf.
For help with technical problems, including problems with
leaving the list, please write to:
technews-request@xxxxxxx
to the top
© Copyright 2004 Information, Inc.