[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

ACM TechNews Alert for Wednesday, August 4, 2004



Title: ACM TechNews (HTML)
Read the TechNews Online at: http://www.acm.org/technews/
ACM TechNews
August 4, 2004

Dear ACM TechNews Subscriber:

Welcome to the August 4, 2004 edition of ACM TechNews, providing timely information for IT professionals three times a week. For instructions on how to unsubscribe from this service, please see below.

ACM's MemberNet is now online. For the latest on ACM activities, member benefits, and industry issues

Remember to check out our hot new online essay and opinion magazine, Ubiquity.

Sponsored by
AutoChoice Advisor Logo

Looking for a NEW vehicle? Discover which ones are right for you from over 250 different makes and models. Your unbiased list of vehicles is based on your preferences and years of consumer input. [try it]


HEADLINES AT A GLANCE:

  • Study: Linux May Infringe on 283 Patents
  • Cyberterror Impact, Defense Under Scrutiny
  • Innovative Partnership to Revolutionize NASA Supercomputing
  • In Competitive Move, I.B.M. Puts Code in Public Domain
  • Preview: LinuxWorld to Highlight Desktop Linux, Security
  • Fingerprinting Your Files
  • Power Up With the Human Body
  • Animated Face Helps Deaf With Phone Chat
  • P2P Drag on Nets Getting Worse
  • Three Minutes With the MIT Lab Director
  • Virtual Twin Always Happy to Chat
  • 9/11 Report Iffy on Tech
  • John Kerry's Real Tech Agenda
  • Robots, Robots Everywhere
  • Tune in to the Net's Untapped Power
  • Career Watch: Q&A: Linda Beck
  • A Renaissance for Russian Science
  • Talking Computer Security
  • Can We Count on It?

     

    Study: Linux May Infringe on 283 Patents

    A study commissioned by Open Source Risk Management (OSRM) has found that the Linux kernel could potentially infringe on 283 registered software patents, 27 of which are owned by Microsoft. Free Software Foundation senior counsel and patent attorney Dan Ravicher, who ...

    [read more]      to the top


    Cyberterror Impact, Defense Under Scrutiny

    Government officials and security experts say that a coordinated cyberattack against the United States could do a great deal of damage to infrastructure, government, and business. However, it is not clear who would launch such an attack--al Qaeda, for instance, is focused more on ...

    [read more]      to the top


    Innovative Partnership to Revolutionize NASA Supercomputing

    Project Columbia is a joint venture between NASA, SGI, and Intel to increase NASA's current supercomputing capacity by a factor of 10 and provide an integrated computing, visualization, and data storage environment known as the "Space Exploration Simulator." The project will ...

    [read more]      to the top


    In Competitive Move, IBM Puts Code in Public Domain

    In an effort to help simplify the writing of Java applications, IBM will today announce a contribution of over 500,000 lines of proprietary software code to an open source software group. "We hope to spur the further development of the Java community," declares Janet Perna, IBM's general ...

    [read more]      to the top


    Preview: LinuxWorld to Highlight Desktop Linux, Security

    Approximately 11,000 people are expected to attend the LinuxWorld Conference & Expo in San Francisco this week, where a chief topic will be Linux's penetration of desktop systems. Linux products and implementation strategies will be showcased by over 190 exhibitors, including IBM, Red ...

    [read more]      to the top


    Fingerprinting Your Files

    Cryptographic hash functions are one of the most useful mathematical tools in computing today, because they allow people to easily protect passwords, stored files, and even database information. One of the most recent applications comes from three Stanford University researchers, who created ...

    [read more]      to the top


    Power Up With the Human Body

    Researchers at the National University of Singapore (NUS) and the Defense Science and Technology Agency (DSTA) have been working for two years on a system to power portable devices such as MP3 players and cell phones by harnessing electricity generated by the human body. NUS assistant ...

    [read more]      to the top


    Animated Face Helps Deaf With Phone Chat

    Researchers at Sweden's Royal Institute of Technology, University College London, the Viataal software company in the Netherlands, and the Belgium-based Babletech voice analysis firm have developed a prototype system that supplies an animated face to help people with hearing ...

    [read more]      to the top


    P2P Drag on Nets Getting Worse

    Organizations are increasingly burdened by peer-to-peer (P2P) traffic because it cuts into employee productivity, network bandwidth, and enterprise security. P2P traffic is at an all-time high across the Internet, consuming anywhere from 30 percent to 70 percent of ISP ...

    [read more]      to the top


    Three Minutes With the MIT Lab Director

    In an interview, Michael Bove, director of MIT's new Consumer Electronics Lab, says the facility is focusing on five key areas: Power efficiency and tapping new sources of power; sensors and communicating the information collected by sensors; cooperative wireless communications systems; ...

    [read more]      to the top


    Virtual Twin Always Happy to Chat

    University of Wollongong accountancy lecturer George Mickhail is now available to students anytime and anywhere--as a Web-based version of himself driven by artificial intelligence. Virtual George, as the program is called, started life in 2003 as a text interface, but has evolved into a ...

    [read more]      to the top


    9/11 Report Iffy on Tech

    The bulk of the 9/11 Commission's 567-page report focuses on the failings of structure and intelligence agencies, but the document does contain advisories for technology improvements, most notably a total back-office renovation of information sharing. The report recommends that "information ...

    [read more]      to the top


    John Kerry's Real Tech Agenda

    Sen. John Kerry (D-Mass.), Democratic presidential nominee, has had a mixed history in regards to his position on technology issues, writes Declan McCullagh. In 2002, Kerry ignored Intel executive VP Leslie Vadasz's warning to the Senate Commerce committee that a bill proposed by Sen. Fritz ...

    [read more]      to the top


    Robots, Robots Everywhere

    Robotics Trends President Dan Kara projects that 4 million personal robots will ship in 2006, while the United Nations Economic Commission for Europe forecasts that over 2.1 million personal robots will be sold between 2003 and 2006. Many of these machines will only function to entertain, but the ...

    [read more]      to the top


    Tune in to the Net's Untapped Power

    Computer security consultant Dan Kaminsky blew the lid off of the domain name service's (DNS) true abilities at the recent DefCon hacker conference. Kaminsky illustrated how DNS can be used to broadcast audio clips across the Internet or as hacker tunnels into otherwise secure networks. Roughly ...

    [read more]      to the top


    Career Watch: Q&A: Linda Beck

    Linda Beck, Earthlink's executive VP of operations, believes women make ideal managers in tech organizations based on the strength of their communication and social skills, and she has pursued her role as a mentor to other women in IT careers with enthusiasm. Beck explains that IT ...

    [read more]      to the top


    A Renaissance for Russian Science

    Russia will see 11 percent more science graduates this year amidst a resurgence in student interest, according to Auriga research. Russian computer programmers are well-known for their creativity and grasp of complex mathematical algorithms, and they are unique in that many have ...

    [read more]      to the top


    Talking Computer Security

    In a roundtable discussion with CyberDefense Magazine, eBay VP and former White House Special Adviser for Cyberspace Security Howard Schmidt, PatchLink Chairman Sean Moshir, and Foundstone President Stuart McClure talk about the current status of the computer security industry as well as ...

    [read more]      to the top


    Can We Count on It?

    Electronic voting systems touted as the solution to the election debacle of 2000 have come under fire by local governments, special interest organizations, and others who cite their lack of reliability and security, and are particularly distrustful of the machines' source code. The move to ...

    [read more]      to the top


    To submit feedback about ACM TechNews, contact: technews@xxxxxxxxxx

    To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to listserv@xxxxxxxxxxxxxxxxx with the line

    signoff technews

    in the body of your message.

    Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

    ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@xxxxxxx

    We will remove your name from the TechNews list on your behalf.

    For help with technical problems, including problems with leaving the list, please write to: technews-request@xxxxxxx

    to the top

    © Copyright 2004 Information, Inc.


  • © 2004 ACM, Inc. All rights reserved. ACM Privacy Policy.