Understanding Spyware: Risk and Response
Mostly Good Reviews for Electronic Voting
Skepticism over the security and reliability of electronic voting systems continues to linger, despite assurances from election officials and experts that most e-voting machines performed smoothly on Election Day. Critics are still vocal about the systems' vulnerability to tampering and bugs, and ...
[read more] to the top
Future Watch: Supercomputing Technology to Keep Tabs On
Representatives of three major supercomputing efforts showcased at this week's SC2004 conference agree that supercomputer research has real business implications. One project, NASA's Columbia supercomputer, is comprised of 20 Silicon Graphics Altix machines, each boasting 512 Intel ...
[read more] to the top
Shared Awareness Key to Successful Computer-Supported Collaboration
A Penn State research project funded by the National Science Foundation has yielded a paper proposing an evaluation schema for activity awareness-based computer-supported collaborative systems, which was detailed at this week's ACM's Computer Supported Cooperative Work Conference. ...
[read more] to the top
Panel Discusses Threat of Cyberterrorism at Workshop
Separating the myths of cyberterrorism from the reality was the goal of a workshop sponsored by the Cornell Information Assurance Institute and the Peace Studies Program, noted moderator and postdoctoral associate of peace studies Giampiero Giacomello. Cornell Information Assurance Institute ...
[read more] to the top
Emotional Computing
Researchers are helping computers to recognize basic cues so they can respond to human emotion. So-called affective technology imbues computers with the ability to sense and convey emotion, through aspects of communication that have previously been ignored in the computing realm, ...
[read more] to the top
E-Mail Authentication Will Not End Spam, Panelists Say
Experts gathered at a recent Federal Trade Commission (FTC) forum said email authentication will not solve the problem of spam and online fraud: Hackers and spammers working in tandem have already created vast networks of zombie computers that could generate spam email messages with matching ...
[read more] to the top
Trying to Make the Pen as Mighty as the Keyboard
The viability of using a stylus to direct the actions of a computer is hampered by the need for users to learn a shorthand whose variations can confuse the computer, the longer time it takes to write on a screen than type, and the awkwardness of pointing at and clicking on onscreen icons. ...
[read more] to the top
Battling Hackers Is a Growth Industry
Job opportunities and salaries for technology professionals have lessened in recent years, due to competition and lower technology spending, but a new study from IDC reports that security specialists are operating in an expanding market thanks to an increase in malicious attacks on computer ...
[read more] to the top
Computer Links Open Opportunities at UL
University of Louisiana (UL) researchers expect to take advantage of new research opportunities once the state is connected to the National Lambda Rail network and the link is distributed to state research institutions via the Louisiana Optic Network Initiative (LONI), which has been pledged $40 ...
[read more] to the top
Industrial Net Security Found Lacking
British Columbia Institute of Technology security researcher Eric Byres and British PA Consulting Group have published a study that indicates that industrial cybersecurity needs to be strengthened in the face of increasing outside cyberattacks. Since 2000, Byers discovered a tenfold increase in ...
[read more] to the top
Group Aims to Create Hallmark of Security
The Applications Security Consortium's goal is to establish "minimum criteria" for protecting Web-based applications, and the group plans to make its debut at the Computer Security Institute's annual conference. Consortium members include Teros, F5 Networks, NetContinuum, and Imperva. ...
[read more] to the top
Home Is Where the Hand-Held Is
Home automation technologies are slowly spreading across the Asia-Pacific region, enabled by fast and cheap Internet access. The foundation of a smart home begins with computers linked together by a wired or wireless network, after which other appliances such as stereos and televisions can ...
[read more] to the top
In Search of Experts
The advantages of open-source deployments to enterprises, which include cost savings, independence from vendors, and standardization, are sometimes undermined by a lack of foresight among companies regarding the costs of building expertise and supporting implementations. Experts such as Yankee ...
[read more] to the top
Going Down Fast
Massive job cuts, a hiring freeze, work-related stress, and frustration have combined to bring IT worker morale to an all-time low, according to research. Morale problems among IT personnel were reported by almost 75 percent of 650 companies polled by Meta Group in June, compared to ...
[read more] to the top
Self-Navigating Vehicle
Many automotive experts believe the enabling technologies for vehicles that can automatically avoid collisions and communicate wirelessly with one another to stay abreast of traffic and road conditions are emerging, although a self-navigating car is unlikely to be realized for at least 20 ...
[read more] to the top
New Styles in Storage Architecture
Storage performance is becoming vital as life science databases expand dramatically and computational resources' processing power increases, and life science organizations are now considering new storage architecture solutions offered by upstart companies rather than industry heavyweights. ...
[read more] to the top
Understanding Spyware: Risk and Response
The evolution of spyware may be outpacing that of spyware countermeasures, but a recently identified profit potential will drive the maturation of countermeasures and close the gap between the threat and the solution, provided that IT professionals become familiar with spyware's operational ...
[read more] to the top
To submit feedback about ACM TechNews, contact:
technews@xxxxxxxxxx
To unsubscribe from the ACM TechNews Early Alert Service:
Please send a separate email to listserv@xxxxxxxxxxxxxxxxx
with the line
signoff technews
in the body of your message.
Please note that replying directly to this message does not
automatically unsubscribe you from the TechNews list.
ACM may have a different email address on file for you,
so if you're unable to "unsubscribe" yourself, please direct
your request to: technews-request@xxxxxxx
We will remove your name from the TechNews list on
your behalf.
For help with technical problems, including problems with
leaving the list, please write to:
technews-request@xxxxxxx
to the top
© Copyright 2004 Information, Inc.