Follow the Money
Study Criticizes Government on Cybersecurity Research
The federal government's cybersecurity research investments are woefully insufficient, concludes a report prepared by a subcommittee of the President's Information Technology Advisory Committee (PITAC). The report says the U.S. should give $148 million annually to the National Science ...
[read more] to the top
Web Design Hampers Mobile Internet, Pioneer Says
World Wide Web inventor Tim Berners-Lee is a big believer in the potential of the mobile Internet, but believes designers will have to do a better job of simplifying Web pages for handsets. Designers have already tweaked Web pages for the visually impaired and for others, and he believes they will ...
[read more] to the top
Cleaning Spam From Swapping Networks
Cornell University researchers led by assistant computer science professor Emin Gun Sirer have developed "Credence," a new open-source software program designed to clear peer-to-peer (P2P) networks of spam by allowing different computers to "gossip" with each other to determine which P2P ...
[read more] to the top
H-1B Fraud Investigations Expected to Increase
Last November's congressional approval of the Visa Reform Act of 2004 mandated a $2,000 increase in the fee for H-1B applications and allocated $500 of each payment for H-1B antifraud probes. The additional funds from these revisions, due to go into effect this month, may put employers of ...
[read more] to the top
The Information Technology Factor
Professors Cindy Riemenschneider and Deb Armstrong of the University of Arkansas' Sam M. Walton College of Business examined why fewer women have been getting involved in IT careers in recent years, and have concluded that time management and sources of stress at home and in the office are ...
[read more] to the top
'Telepresence' Chair to Build Virtual Meetings
The University of Alberta is creating a $2 million program that delves into three-dimensional telepresence technology, and has received $1.7 million to set up an industrial research chair to aid in its exploration in collaborative virtual environments, says U of A computer science professor ...
[read more] to the top
Growth of Wireless Internet Opens New Path for Thieves
Law enforcement agents say cybercriminals use unsecured Wi-Fi networks to hide their identity and location, and that the problem is growing as more and more universities, municipalities, independent retailers increasingly offer wide-ranging Wi-Fi grids available to anyone with a Wi-Fi card. As a ...
[read more] to the top
Protecting the Internet: Certified Attachments and Reverse Firewalls?
Spam, phishing, DDoS attacks, worms, and other network-oriented malware are driven by groups of zombie machines, but reverse firewalls on network attachment devices such as routers and DSL equipment could help stop those operations, writes former ICANN board member Karl Auerbach. The telephone ...
[read more] to the top
Q&A With Mark Dean
IBM Almaden Research Center director Mark Dean says in an interview that a great deal of his time is dedicated to cultivating an interest in science and engineering among African-Americans, noting that promoting and hiring minorities is a major effort for IBM. Dean, an African-American, says the ...
[read more] to the top
3D Printer to Churn Out Copies of Itself
University of Bath researcher Adrian Bowyer is developing a 3D printer that can replicate itself and has the potential to dramatically lower the cost of rapid prototyping, in which objects stored on a computer are printed out in layers. Bowyer says his self-replicating rapid prototyper (RepRap), ...
[read more] to the top
University of Southern Miss Joins Navy CRADA
The University of Southern Mississippi (USM) will collaborate with the Open Source Software Institute (OSSI) and the U.S. Naval Oceanographic Office on a three-year research and development program investigating the adoption and use of open source software by the Navy as part of a Cooperative ...
[read more] to the top
Zombie PCs Being Sent to Steal IDs
Researchers with the Honeynet Project have released findings about bot net activity since last summer. The collections of hijacked computers are increasingly used for financial purposes rather than online vandalism, such as denial-of-service attacks against Web sites. Bot net activity appears ...
[read more] to the top
United We Find
Collaborative-filtering systems' appeal lies in their potential to alert consumers to items of interest they might otherwise miss, and to help online vendors boost sales via cross-selling. Collaborative filtering has been around since the early 1990s at Xerox PARC, but only just recently ...
[read more] to the top
The Transformation of Wireless Networks
Wireless carriers and technology companies are testing new services based on IP multimedia subsystem (IMS) standards that aim to break down the walls between cellular, wireline, and cable platforms. IMS leverages Internet protocol (IP) to achieve converged telecommunications where cell phone ...
[read more] to the top
The Rise of Smart Buildings
IT and building automation systems (BAS) experts say their two worlds are merging with the initial development of Web-based control standards and migration to IP networks; innovative building operators and BAS companies are already using IP and Web technologies to more effectively manage their ...
[read more] to the top
Experiences With Writing Grid Clients With Mobile Devices
Researchers at the University of Southampton's School of Electronics and Computer Science relate their experiences in deploying mobile Grid clients for the Finance Education in a Scalable Software Environment (Finesse) e-learning system with the goal of establishing whether such ...
[read more] to the top
Agile Breaks on Through to the Other Side
Agile software development approaches such as eXtreme Programming (XP) can boost productivity and enable products to arrive at projected delivery dates and fulfill expectations by skipping the bureaucracy typical of the classical "waterfall" software development model, where programming often ...
[read more] to the top
Follow the Money
Experts are predicting trouble ahead for U.S. innovation in terms of federal funding for speculative research into radical technologies, which has declined recently in favor of defense and homeland security solutions that use relatively mature technologies. "If we don't pay attention to the ...
[read more] to the top
To submit feedback about ACM TechNews, contact:
technews@xxxxxxxxxx
To unsubscribe from the ACM TechNews Early Alert Service:
Please send a separate email to listserv@xxxxxxxxxxxxxxxx
with the line
signoff technews
in the body of your message.
Please note that replying directly to this message does not
automatically unsubscribe you from the TechNews list.
ACM may have a different email address on file for you,
so if you're unable to "unsubscribe" yourself, please direct
your request to: technews-request@xxxxxxx
We will remove your name from the TechNews list on
your behalf.
For help with technical problems, including problems with
leaving the list, please write to:
technews-request@xxxxxxx
to the top
© Copyright 2005 Information, Inc.