[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

ACM TechNews Alert for Monday, May 3, 2004



Title: ACM TechNews (HTML)
Read the TechNews Online at: http://www.acm.org/technews/
ACM TechNews
May 3, 2004

Dear ACM TechNews Subscriber:

Welcome to the May 3, 2004 edition of ACM TechNews, providing timely information for IT professionals three times a week. For instructions on how to unsubscribe from this service, please see below.

ACM's MemberNet is now online. For the latest on ACM activities, member benefits, and industry issues

Remember to check out our hot new online essay and opinion magazine, Ubiquity.

Sponsored by
AutoChoice Advisor Logo

Looking for a NEW vehicle? Discover which ones are right for you from over 250 different makes and models. Your unbiased list of vehicles is based on your preferences and years of consumer input. [try it]


HEADLINES AT A GLANCE:

  • Proprietary, Paperless E-Voting Is Failing--and Selling
  • Is It Possible Google Is Just the Bling-Bling of the Nethead Crowd?
  • Alarm Growing Over Bot Software
  • Haussler Honored by Computer Science Group as an Innovator Who Changed the Scientific World
  • Who Hacked the Voting System? The Teacher
  • The Rise of the Humanoid Robot
  • File-Swapping Gets Supercharged on Student Network
  • Building a Secure Network to Secure Networks
  • In Defense of Cyberspace
  • Why Certifying IT Workers Won't Help
  • Trading in a Cloud of Electrons
  • Touch and Smell Phone
  • N. Americans Plan ENUM Directory
  • The Technology of National Security
  • Federal Programmers Get Agile
  • Optical Storage Sings the Blues
  • Internet Technology to Improve Satellite Communications
  • RFI on RFID and Pervasive Wireless

     

    Proprietary, Paperless E-Voting Is Failing--and Selling

    Computer security experts hope that open-source electronic voting systems and printed audit trails will be embraced by the Election Assistance Committee (EAC) when it debates the e-voting issue in June, but former Association for Computing Machinery President ...

    [read more]      to the top


    Is It Possible Google Is Just the Bling-Bling of the Nethead Crowd?

    Computers' failure to understand "meaning" has been a godsend to Google and other search engines that have become commercial successes thanks to alternative techniques that circumvent context by weighing such factors as how many links a Web site has. Collectively, ...

    [read more]      to the top


    Alarm Growing Over Bot Software

    April 29 advisories from Symantec and Internet Storm Center CTO Joannes Ullrich warn that the most common type of bot software has received an upgrade. The resulting Agobot variant employs publicly available code to penetrate a computer's security through a flaw in the ...

    [read more]      to the top


    Haussler Honored by Computer Science Group as an Innovator Who Changed the Scientific World

    UC Santa Cruz Center for Biomolecular Science and Engineering director David Haussler and UCLA Cognitive System Laboratory director Judea Pearl have been named as co-recipients of the Association for Computing Machinery's (ACM) 2003 Allen Newell Award for their ...

    [read more]      to the top


    Who Hacked the Voting System? The Teacher

    Johns Hopkins University professor Aviel D. Rubin has become a symbol of the crusade against the perils of electronic voting with his expose of serious flaws in one popular company's e-voting software, flaws that have prompted states to reconsider or limit the use of such machines in ...

    [read more]      to the top


    The Rise of the Humanoid Robot

    RoboCup 2004 in June will be the latest display of a scientific effort with the long-term goal of developing teams of humanoid robots that can defeat the World Cup champions by the year 2050. "[Soccer is] a game that best illustrates a human's various complex skills," notes Dr. Zhou ...

    [read more]      to the top


    File-Swapping Gets Supercharged on Student Network

    Students at universities with access to Internet2 are using the university network to trade files similar to the manner in which students have used peer-to-peer services to obtain music, videos, and software for free. Students say the new file-trading network on Internet2, dubbed i2hub, ...

    [read more]      to the top


    Building a Secure Network to Secure Networks

    The Forum of Incident Response and Security Teams' (FIRST) Computer Security Incident Handling Conference in mid June will focus on the creation and management of Computer Security Incident Response Teams (CSIRTs), of which there are almost 90 in Europe, ...

    [read more]      to the top


    In Defense of Cyberspace

    Center for Information Technology Research in the Interest of Society's (CITRIS) Evaluation Methods in Internet Security Technology (EMIST) project is a series of simulated malware attacks carried out on a testbed modeled after the actual Internet, according to UC Davis computer ...

    [read more]      to the top


    Why Certifying IT Workers Won't Help

    The Royal Academy of Engineering and the British Computer Society say that a lot of IT money is wasted due to a lack of professionalism in software engineering, and argue for a professional IT community accredited by them. However, there is no evidence that links a given examination with ...

    [read more]      to the top


    Trading in a Cloud of Electrons

    Institute for the Future director Paul Saffo says the Internet continues to change culture and business, creating new value and opportunity for innovative companies and individuals. Many pundits said e-commerce would wipe out traditional retailers and other middlemen, but Saffo ...

    [read more]      to the top


    Touch and Smell Phone

    NTT DoCoMo in Japan is working on advanced mobile phone technologies, including communication with the five senses, speaking without using vocal cords, and establishing which direction a call is coming from. It is currently possible to carry out a phone conversation ...

    [read more]      to the top


    N. Americans Plan ENUM Directory

    A group of North American telecom companies is planning to form a non-profit limited liability corporation (LLC) in June to initiate the process of creating the so-called Tier 1 North American ENUM (electronic number mapping) directory, which would link phone numbers to URLs, ...

    [read more]      to the top


    The Technology of National Security

    Any technology holds the potential for abuse, and computer technology is no exception. National governments have developed powerful monitoring software, and in turn individuals and advocacy groups claim that the technology infringes on their right to privacy. A resolution will ...

    [read more]      to the top


    Federal Programmers Get Agile

    Increasing numbers of government programming projects are using agile development techniques, which advocates claim support the generation of better software in less time and for less money than traditional development approaches. Agile development methods, ...

    [read more]      to the top


    Optical Storage Sings the Blues

    Optical storage products based on blue-laser technology are envisioned as the successor to those based on red-laser technology, which operate at longer optical wavelengths: Blue lasers can read and write data much faster and write more data in the same area than devices that ...

    [read more]      to the top


    Internet Technology to Improve Satellite Communications

    Commercial and military satellite designers are betting that transmission control protocol/Internet protocol (TCP/IP) technology will transform satellite communications in the same way it has transformed workplace communications by bringing office-like connectivity to even the most ...

    [read more]      to the top


    RFI on RFID and Pervasive Wireless

    A number of pervasive wireless technologies, each with its own set of pros and cons, are competing for the enterprise sector and possibly enabling the advent of machine-to-machine (M2M) networks that would connect a wide variety of everyday appliances, from elevators to air ...

    [read more]      to the top


    To submit feedback about ACM TechNews, contact: technews@xxxxxxxxxx

    To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to listserv@xxxxxxxxxxxxxxxxx with the line

    signoff technews

    in the body of your message.

    Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

    ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@xxxxxxx

    We will remove your name from the TechNews list on your behalf.

    For help with technical problems, including problems with leaving the list, please write to: technews-request@xxxxxxx

    to the top

    © Copyright 2004 Information, Inc.


  • © 2004 ACM, Inc. All rights reserved. ACM Privacy Policy.