[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

ACM TechNews Alert for Monday, August 2, 2004



Title: ACM TechNews (HTML)
Read the TechNews Online at: http://www.acm.org/technews/
ACM TechNews
August 2, 2004

Dear ACM TechNews Subscriber:

Welcome to the August 2, 2004 edition of ACM TechNews, providing timely information for IT professionals three times a week. For instructions on how to unsubscribe from this service, please see below.

ACM's MemberNet is now online. For the latest on ACM activities, member benefits, and industry issues

Remember to check out our hot new online essay and opinion magazine, Ubiquity.

Sponsored by
AutoChoice Advisor Logo

Looking for a NEW vehicle? Discover which ones are right for you from over 250 different makes and models. Your unbiased list of vehicles is based on your preferences and years of consumer input. [try it]


HEADLINES AT A GLANCE:

  • Hackers Are Discovering a New Frontier: Internet Telephone Service
  • Defense Dept. Hopes to Enlist AI in War Against Terrorism
  • Computers Weighing in on the Elements of Essay
  • Voice and Language Recognition Reveals City Information
  • Academics Enlist in Spam Battle
  • Hackers Plan Global Game of 'Capture the Flag'
  • Summarizer Gets the Idea
  • EU Patent Fight Shines Spotlight on U.S.
  • Weta, Massive, Right Hemisphere to Tech Talk at SIGGRAPH
  • Fleeting Experience, Mirrored in Your Eyes
  • Search Engines Expose Vulnerabilities
  • Wanted: La Creme de la Creme
  • Hack This
  • Portlet Standards Accelerate Web Portal Development
  • The Shaky State of Security
  • Linux Advocacy Consortium Targets Higher Education
  • Mike Villas's World

     

    Hackers Are Discovering a New Frontier: Internet Telephone Service

    Internet phones are becoming more and more attractive to hackers as the technology proliferates among home and business users. Several malicious attacks directed against Net phone networks have already resulted ...

    [read more]      to the top


    Defense Dept. Hopes to Enlist AI in War Against Terrorism

    The Defense Department is investing in projects that aim to harness artificial intelligence for the purpose of identifying signs of terrorist activity early enough to prevent terrorist incidents. AI research that focuses on counterterrorism was the topic of papers presented by teams of ...

    [read more]      to the top


    Computers Weighing in on the Elements of Essay

    Essay-grading computers, such as Educational Testing Service's e-rater, are proliferating throughout the U.S. testing industry, though not all scholars welcome the transition, as the programs' emphasis on grammar, sentence structure, and coherence may overlook important elements, such as ...

    [read more]      to the top


    Voice and Language Recognition Reveals City Information

    Information Society Technologies' CATCH-2004 project established city information services and systems that can be accessed via a multimodal, multilingual, interactive interface. The project, which involved the participation of IBM France, several other European IBM technical units, ...

    [read more]      to the top


    Academics Enlist in Spam Battle

    The Conference on Email and Anti-Spam, which brought together researchers from both academic and industry labs, represented the first serious academic conference to focus on spam and spam countermeasures, according to Microsoft Research's Joshua Goodman. The hottest debate centered on ...

    [read more]      to the top


    Hackers Plan Global Game of 'Capture the Flag'

    Hackers from all over the U.S. are planning to engage in a massive game of capture the flag next February, in which they will launch a cyberattack of unprecedented scale against systems set up and maintained by other hackers. The three-day event will pit East Coast against West Coast ...

    [read more]      to the top


    Summarizer Gets the Idea

    MIT and Cornell University researchers have created a prototype system that can determine the contents of a document and build a summary that properly orders the topics, using an automatic classification algorithm or content model trained on subject-specific sets of documents and document ...

    [read more]      to the top


    EU Patent Fight Shines Spotlight on U.S.

    The European Council supports a revision in that region's patent system that would make it easier to file for software and business process patents; the effort faces resistance from the open-source community, numerous industry groups, and the European Parliament, and also highlights ...

    [read more]      to the top


    Weta, Massive, Right Hemisphere to Tech Talk at SIGGRAPH

    The SIGGRAPH Tech Talk series will include a special panel session that highlights the impact of New Zealand companies on computer graphics technology development and production. New Zealand Trade and Enterprise, a government trade and development agency, will host the session, "Middle ...

    [read more]      to the top


    Fleeting Experience, Mirrored in Your Eyes

    A pair of Columbia University researchers, Shree K. Nayar and Ko Nishino, have devised a system employing computer algorithms that analyze the mirror image reflected off the surface of the human cornea to reveal information. Nayar, a computer science professor, captured high-resolution ...

    [read more]      to the top


    Search Engines Expose Vulnerabilities

    Hackers use search engines to discover vulnerabilities in Web site source code, and security experts forecast an increase in this behavior. "People have discovered that they can make a really tight Google query that comes back with results that show lots of vulnerabilities at once," says SPI ...

    [read more]      to the top


    Wanted: La Creme de la Creme

    TopCoder uses a unique platform that lets programmers compete for design and development projects online: The company employs just 25 staff who work to provide requisite case diagrams, activity diagrams and technical constraints, proposed platform architecture, deployment diagram, and other ...

    [read more]      to the top


    Hack This

    Dealing with malware on desktop systems is often as simple as rebooting the computer, but this strategy does not apply to embedded systems, whose operation must continue even when faced with security threats. The National Institute of Standards and Technology (NIST) has prepared a list ...

    [read more]      to the top


    Portlet Standards Accelerate Web Portal Development

    The maturation of the Web has facilitated the transition of portals into the epicenter of activity for online business applications, but the augmentation of portals to accommodate more and more diverse applications has led to an increase in their complexity. Portlets have emerged as a key ...

    [read more]      to the top


    The Shaky State of Security

    The 2004 InfoWorld Security Survey of over 600 IT professionals paints a fairly bleak picture of enterprise security: Only 38 percent of respondents report strong confidence in their security, while just 8 percent report extreme confidence. IT leaders are also highly concerned ...

    [read more]      to the top


    Linux Advocacy Consortium Targets Higher Education

    A new lab membership program committed to supporting higher-education institutions was recently announced by the Open Source Development Labs (OSDL) consortium, whose mission is to speed the adoption of Linux. The new program was created to bring in affiliates among colleges and ...

    [read more]      to the top


    Mike Villas's World

    Science fiction author and former computer science professor Vernor Vinge believes an integration of powerful processors, infinite data-storage capacity, pervasive sensor networks, and deeply embedded user interfaces will take place in the next three decades and come to embody a connection ...

    [read more]      to the top


    To submit feedback about ACM TechNews, contact: technews@xxxxxxxxxx

    To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to listserv@xxxxxxxxxxxxxxxxx with the line

    signoff technews

    in the body of your message.

    Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

    ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@xxxxxxx

    We will remove your name from the TechNews list on your behalf.

    For help with technical problems, including problems with leaving the list, please write to: technews-request@xxxxxxx

    to the top

    © Copyright 2004 Information, Inc.


  • © 2004 ACM, Inc. All rights reserved. ACM Privacy Policy.