RFI on RFID and Pervasive Wireless
Proprietary, Paperless E-Voting Is Failing--and Selling
Computer security experts hope that open-source electronic voting systems and printed audit trails will be embraced by the Election Assistance Committee (EAC) when it debates the e-voting issue in June, but former Association for Computing Machinery President ...
[read more] to the top
Is It Possible Google Is Just the Bling-Bling of the Nethead Crowd?
Computers' failure to understand "meaning" has been a godsend to Google and other search engines that have become commercial successes thanks to alternative techniques that circumvent context by weighing such factors as how many links a Web site has. Collectively, ...
[read more] to the top
Alarm Growing Over Bot Software
April 29 advisories from Symantec and Internet Storm Center CTO Joannes Ullrich warn that the most common type of bot software has received an upgrade. The resulting Agobot variant employs publicly available code to penetrate a computer's security through a flaw in the ...
[read more] to the top
Haussler Honored by Computer Science Group as an Innovator Who Changed the Scientific World
UC Santa Cruz Center for Biomolecular Science and Engineering director David Haussler and UCLA Cognitive System Laboratory director Judea Pearl have been named as co-recipients of the Association for Computing Machinery's (ACM) 2003 Allen Newell Award for their ...
[read more] to the top
Who Hacked the Voting System? The Teacher
Johns Hopkins University professor Aviel D. Rubin has become a symbol of the crusade against the perils of electronic voting with his expose of serious flaws in one popular company's e-voting software, flaws that have prompted states to reconsider or limit the use of such machines in ...
[read more] to the top
The Rise of the Humanoid Robot
RoboCup 2004 in June will be the latest display of a scientific effort with the long-term goal of developing teams of humanoid robots that can defeat the World Cup champions by the year 2050. "[Soccer is] a game that best illustrates a human's various complex skills," notes Dr. Zhou ...
[read more] to the top
File-Swapping Gets Supercharged on Student Network
Students at universities with access to Internet2 are using the university network to trade files similar to the manner in which students have used peer-to-peer services to obtain music, videos, and software for free. Students say the new file-trading network on Internet2, dubbed i2hub, ...
[read more] to the top
Building a Secure Network to Secure Networks
The Forum of Incident Response and Security Teams' (FIRST) Computer Security Incident Handling Conference in mid June will focus on the creation and management of Computer Security Incident Response Teams (CSIRTs), of which there are almost 90 in Europe, ...
[read more] to the top
In Defense of Cyberspace
Center for Information Technology Research in the Interest of Society's (CITRIS) Evaluation Methods in Internet Security Technology (EMIST) project is a series of simulated malware attacks carried out on a testbed modeled after the actual Internet, according to UC Davis computer ...
[read more] to the top
Why Certifying IT Workers Won't Help
The Royal Academy of Engineering and the British Computer Society say that a lot of IT money is wasted due to a lack of professionalism in software engineering, and argue for a professional IT community accredited by them. However, there is no evidence that links a given examination with ...
[read more] to the top
Trading in a Cloud of Electrons
Institute for the Future director Paul Saffo says the Internet continues to change culture and business, creating new value and opportunity for innovative companies and individuals. Many pundits said e-commerce would wipe out traditional retailers and other middlemen, but Saffo ...
[read more] to the top
Touch and Smell Phone
NTT DoCoMo in Japan is working on advanced mobile phone technologies, including communication with the five senses, speaking without using vocal cords, and establishing which direction a call is coming from. It is currently possible to carry out a phone conversation ...
[read more] to the top
N. Americans Plan ENUM Directory
A group of North American telecom companies is planning to form a non-profit limited liability corporation (LLC) in June to initiate the process of creating the so-called Tier 1 North American ENUM (electronic number mapping) directory, which would link phone numbers to URLs, ...
[read more] to the top
The Technology of National Security
Any technology holds the potential for abuse, and computer technology is no exception. National governments have developed powerful monitoring software, and in turn individuals and advocacy groups claim that the technology infringes on their right to privacy. A resolution will ...
[read more] to the top
Federal Programmers Get Agile
Increasing numbers of government programming projects are using agile development techniques, which advocates claim support the generation of better software in less time and for less money than traditional development approaches. Agile development methods, ...
[read more] to the top
Optical Storage Sings the Blues
Optical storage products based on blue-laser technology are envisioned as the successor to those based on red-laser technology, which operate at longer optical wavelengths: Blue lasers can read and write data much faster and write more data in the same area than devices that ...
[read more] to the top
Internet Technology to Improve Satellite Communications
Commercial and military satellite designers are betting that transmission control protocol/Internet protocol (TCP/IP) technology will transform satellite communications in the same way it has transformed workplace communications by bringing office-like connectivity to even the most ...
[read more] to the top
RFI on RFID and Pervasive Wireless
A number of pervasive wireless technologies, each with its own set of pros and cons, are competing for the enterprise sector and possibly enabling the advent of machine-to-machine (M2M) networks that would connect a wide variety of everyday appliances, from elevators to air ...
[read more] to the top
To submit feedback about ACM TechNews, contact:
technews@xxxxxxxxxx
To unsubscribe from the ACM TechNews Early Alert Service:
Please send a separate email to listserv@xxxxxxxxxxxxxxxxx
with the line
signoff technews
in the body of your message.
Please note that replying directly to this message does not
automatically unsubscribe you from the TechNews list.
ACM may have a different email address on file for you,
so if you're unable to "unsubscribe" yourself, please direct
your request to: technews-request@xxxxxxx
We will remove your name from the TechNews list on
your behalf.
For help with technical problems, including problems with
leaving the list, please write to:
technews-request@xxxxxxx
to the top
© Copyright 2004 Information, Inc.