Mike Villas's World
Hackers Are Discovering a New Frontier: Internet Telephone Service
Internet phones are becoming more and more attractive to hackers as the technology proliferates among home and business users. Several malicious attacks directed against Net phone networks have already resulted ...
[read more] to the top
Defense Dept. Hopes to Enlist AI in War Against Terrorism
The Defense Department is investing in projects that aim to harness artificial intelligence for the purpose of identifying signs of terrorist activity early enough to prevent terrorist incidents. AI research that focuses on counterterrorism was the topic of papers presented by teams of ...
[read more] to the top
Computers Weighing in on the Elements of Essay
Essay-grading computers, such as Educational Testing Service's e-rater, are proliferating throughout the U.S. testing industry, though not all scholars welcome the transition, as the programs' emphasis on grammar, sentence structure, and coherence may overlook important elements, such as ...
[read more] to the top
Voice and Language Recognition Reveals City Information
Information Society Technologies' CATCH-2004 project established city information services and systems that can be accessed via a multimodal, multilingual, interactive interface. The project, which involved the participation of IBM France, several other European IBM technical units, ...
[read more] to the top
Academics Enlist in Spam Battle
The Conference on Email and Anti-Spam, which brought together researchers from both academic and industry labs, represented the first serious academic conference to focus on spam and spam countermeasures, according to Microsoft Research's Joshua Goodman. The hottest debate centered on ...
[read more] to the top
Hackers Plan Global Game of 'Capture the Flag'
Hackers from all over the U.S. are planning to engage in a massive game of capture the flag next February, in which they will launch a cyberattack of unprecedented scale against systems set up and maintained by other hackers. The three-day event will pit East Coast against West Coast ...
[read more] to the top
Summarizer Gets the Idea
MIT and Cornell University researchers have created a prototype system that can determine the contents of a document and build a summary that properly orders the topics, using an automatic classification algorithm or content model trained on subject-specific sets of documents and document ...
[read more] to the top
EU Patent Fight Shines Spotlight on U.S.
The European Council supports a revision in that region's patent system that would make it easier to file for software and business process patents; the effort faces resistance from the open-source community, numerous industry groups, and the European Parliament, and also highlights ...
[read more] to the top
Weta, Massive, Right Hemisphere to Tech Talk at SIGGRAPH
The SIGGRAPH Tech Talk series will include a special panel session that highlights the impact of New Zealand companies on computer graphics technology development and production. New Zealand Trade and Enterprise, a government trade and development agency, will host the session, "Middle ...
[read more] to the top
Fleeting Experience, Mirrored in Your Eyes
A pair of Columbia University researchers, Shree K. Nayar and Ko Nishino, have devised a system employing computer algorithms that analyze the mirror image reflected off the surface of the human cornea to reveal information. Nayar, a computer science professor, captured high-resolution ...
[read more] to the top
Search Engines Expose Vulnerabilities
Hackers use search engines to discover vulnerabilities in Web site source code, and security experts forecast an increase in this behavior. "People have discovered that they can make a really tight Google query that comes back with results that show lots of vulnerabilities at once," says SPI ...
[read more] to the top
Wanted: La Creme de la Creme
TopCoder uses a unique platform that lets programmers compete for design and development projects online: The company employs just 25 staff who work to provide requisite case diagrams, activity diagrams and technical constraints, proposed platform architecture, deployment diagram, and other ...
[read more] to the top
Hack This
Dealing with malware on desktop systems is often as simple as rebooting the computer, but this strategy does not apply to embedded systems, whose operation must continue even when faced with security threats. The National Institute of Standards and Technology (NIST) has prepared a list ...
[read more] to the top
Portlet Standards Accelerate Web Portal Development
The maturation of the Web has facilitated the transition of portals into the epicenter of activity for online business applications, but the augmentation of portals to accommodate more and more diverse applications has led to an increase in their complexity. Portlets have emerged as a key ...
[read more] to the top
The Shaky State of Security
The 2004 InfoWorld Security Survey of over 600 IT professionals paints a fairly bleak picture of enterprise security: Only 38 percent of respondents report strong confidence in their security, while just 8 percent report extreme confidence. IT leaders are also highly concerned ...
[read more] to the top
Linux Advocacy Consortium Targets Higher Education
A new lab membership program committed to supporting higher-education institutions was recently announced by the Open Source Development Labs (OSDL) consortium, whose mission is to speed the adoption of Linux. The new program was created to bring in affiliates among colleges and ...
[read more] to the top
Mike Villas's World
Science fiction author and former computer science professor Vernor Vinge believes an integration of powerful processors, infinite data-storage capacity, pervasive sensor networks, and deeply embedded user interfaces will take place in the next three decades and come to embody a connection ...
[read more] to the top
To submit feedback about ACM TechNews, contact:
technews@xxxxxxxxxx
To unsubscribe from the ACM TechNews Early Alert Service:
Please send a separate email to listserv@xxxxxxxxxxxxxxxxx
with the line
signoff technews
in the body of your message.
Please note that replying directly to this message does not
automatically unsubscribe you from the TechNews list.
ACM may have a different email address on file for you,
so if you're unable to "unsubscribe" yourself, please direct
your request to: technews-request@xxxxxxx
We will remove your name from the TechNews list on
your behalf.
For help with technical problems, including problems with
leaving the list, please write to:
technews-request@xxxxxxx
to the top
© Copyright 2004 Information, Inc.