[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

ACM TechNews Alert for Friday, November 12, 2004



Title: ACM TechNews (HTML)
Read the TechNews Online at: http://www.acm.org/technews/
Current Issue: http:www.acm.org/technews/current/homepage.html
ACM TechNews
November 12, 2004

Dear ACM TechNews Subscriber:

Welcome to the November 12, 2004 edition of ACM TechNews, providing timely information for IT professionals three times a week. For instructions on how to unsubscribe from this service, please see below.

ACM's MemberNet newsletter offers the latest information on ACM activities, member benefits, and industry issues.

The The ACM Professional Development Centre offers ACM members free access to hundreds of courses and books, and the optional ITPro Collection.

Sponsored by
AutoChoice Advisor Logo

Looking for a NEW vehicle? Discover which ones are right for you from over 250 different makes and models. Your unbiased list of vehicles is based on your preferences and years of consumer input. [try it]


HEADLINES AT A GLANCE:

  • Mostly Good Reviews for Electronic Voting
  • Future Watch: Supercomputing Technology to Keep Tabs On
  • Shared Awareness Key to Successful Computer-Supported Collaboration
  • Panel Discusses Threat of Cyberterrorism at Workshop
  • Emotional Computing
  • E-Mail Authentication Will Not End Spam, Panelists Say
  • Trying to Make the Pen as Mighty as the Keyboard
  • Battling Hackers Is a Growth Industry
  • Computer Links Open Opportunities at UL
  • Industrial Net Security Found Lacking
  • Group Aims to Create Hallmark of Security
  • Home Is Where the Hand-Held Is
  • In Search of Experts
  • Going Down Fast
  • Self-Navigating Vehicle
  • New Styles in Storage Architecture
  • Understanding Spyware: Risk and Response

     

    Mostly Good Reviews for Electronic Voting

    Skepticism over the security and reliability of electronic voting systems continues to linger, despite assurances from election officials and experts that most e-voting machines performed smoothly on Election Day. Critics are still vocal about the systems' vulnerability to tampering and bugs, and ...

    [read more]      to the top


    Future Watch: Supercomputing Technology to Keep Tabs On

    Representatives of three major supercomputing efforts showcased at this week's SC2004 conference agree that supercomputer research has real business implications. One project, NASA's Columbia supercomputer, is comprised of 20 Silicon Graphics Altix machines, each boasting 512 Intel ...

    [read more]      to the top


    Shared Awareness Key to Successful Computer-Supported Collaboration

    A Penn State research project funded by the National Science Foundation has yielded a paper proposing an evaluation schema for activity awareness-based computer-supported collaborative systems, which was detailed at this week's ACM's Computer Supported Cooperative Work Conference. ...

    [read more]      to the top


    Panel Discusses Threat of Cyberterrorism at Workshop

    Separating the myths of cyberterrorism from the reality was the goal of a workshop sponsored by the Cornell Information Assurance Institute and the Peace Studies Program, noted moderator and postdoctoral associate of peace studies Giampiero Giacomello. Cornell Information Assurance Institute ...

    [read more]      to the top


    Emotional Computing

    Researchers are helping computers to recognize basic cues so they can respond to human emotion. So-called affective technology imbues computers with the ability to sense and convey emotion, through aspects of communication that have previously been ignored in the computing realm, ...

    [read more]      to the top


    E-Mail Authentication Will Not End Spam, Panelists Say

    Experts gathered at a recent Federal Trade Commission (FTC) forum said email authentication will not solve the problem of spam and online fraud: Hackers and spammers working in tandem have already created vast networks of zombie computers that could generate spam email messages with matching ...

    [read more]      to the top


    Trying to Make the Pen as Mighty as the Keyboard

    The viability of using a stylus to direct the actions of a computer is hampered by the need for users to learn a shorthand whose variations can confuse the computer, the longer time it takes to write on a screen than type, and the awkwardness of pointing at and clicking on onscreen icons. ...

    [read more]      to the top


    Battling Hackers Is a Growth Industry

    Job opportunities and salaries for technology professionals have lessened in recent years, due to competition and lower technology spending, but a new study from IDC reports that security specialists are operating in an expanding market thanks to an increase in malicious attacks on computer ...

    [read more]      to the top


    Computer Links Open Opportunities at UL

    University of Louisiana (UL) researchers expect to take advantage of new research opportunities once the state is connected to the National Lambda Rail network and the link is distributed to state research institutions via the Louisiana Optic Network Initiative (LONI), which has been pledged $40 ...

    [read more]      to the top


    Industrial Net Security Found Lacking

    British Columbia Institute of Technology security researcher Eric Byres and British PA Consulting Group have published a study that indicates that industrial cybersecurity needs to be strengthened in the face of increasing outside cyberattacks. Since 2000, Byers discovered a tenfold increase in ...

    [read more]      to the top


    Group Aims to Create Hallmark of Security

    The Applications Security Consortium's goal is to establish "minimum criteria" for protecting Web-based applications, and the group plans to make its debut at the Computer Security Institute's annual conference. Consortium members include Teros, F5 Networks, NetContinuum, and Imperva. ...

    [read more]      to the top


    Home Is Where the Hand-Held Is

    Home automation technologies are slowly spreading across the Asia-Pacific region, enabled by fast and cheap Internet access. The foundation of a smart home begins with computers linked together by a wired or wireless network, after which other appliances such as stereos and televisions can ...

    [read more]      to the top


    In Search of Experts

    The advantages of open-source deployments to enterprises, which include cost savings, independence from vendors, and standardization, are sometimes undermined by a lack of foresight among companies regarding the costs of building expertise and supporting implementations. Experts such as Yankee ...

    [read more]      to the top


    Going Down Fast

    Massive job cuts, a hiring freeze, work-related stress, and frustration have combined to bring IT worker morale to an all-time low, according to research. Morale problems among IT personnel were reported by almost 75 percent of 650 companies polled by Meta Group in June, compared to ...

    [read more]      to the top


    Self-Navigating Vehicle

    Many automotive experts believe the enabling technologies for vehicles that can automatically avoid collisions and communicate wirelessly with one another to stay abreast of traffic and road conditions are emerging, although a self-navigating car is unlikely to be realized for at least 20 ...

    [read more]      to the top


    New Styles in Storage Architecture

    Storage performance is becoming vital as life science databases expand dramatically and computational resources' processing power increases, and life science organizations are now considering new storage architecture solutions offered by upstart companies rather than industry heavyweights. ...

    [read more]      to the top


    Understanding Spyware: Risk and Response

    The evolution of spyware may be outpacing that of spyware countermeasures, but a recently identified profit potential will drive the maturation of countermeasures and close the gap between the threat and the solution, provided that IT professionals become familiar with spyware's operational ...

    [read more]      to the top


    To submit feedback about ACM TechNews, contact: technews@xxxxxxxxxx

    To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to listserv@xxxxxxxxxxxxxxxxx with the line

    signoff technews

    in the body of your message.

    Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

    ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@xxxxxxx

    We will remove your name from the TechNews list on your behalf.

    For help with technical problems, including problems with leaving the list, please write to: technews-request@xxxxxxx

    to the top

    © Copyright 2004 Information, Inc.


  • © 2004 ACM, Inc. All rights reserved. ACM Privacy Policy.