RFI on RFID and Pervasive
Wireless
Proprietary, Paperless
E-Voting Is Failing--and Selling
Computer security experts hope that open-source electronic
voting systems and printed audit trails will be embraced by
the Election Assistance Committee (EAC) when it debates the
e-voting issue in June, but former Association for Computing
Machinery President ...
[read more]
to the top
Is It Possible Google Is
Just the Bling-Bling of the Nethead
Crowd?
Computers' failure to understand "meaning" has been a
godsend to Google and other search engines that have become
commercial successes thanks to alternative techniques that
circumvent context by weighing such factors as how many links
a Web site has. Collectively, ...
[read more]
to the top
Alarm Growing Over Bot
Software
April 29 advisories from Symantec and Internet Storm Center
CTO Joannes Ullrich warn that the most common type of bot
software has received an upgrade. The resulting Agobot variant
employs publicly available code to penetrate a computer's
security through a flaw in the ...
[read more]
to the top
Haussler Honored by
Computer Science Group as an Innovator Who Changed the
Scientific World
UC Santa Cruz Center for Biomolecular Science and
Engineering director David Haussler and UCLA Cognitive System
Laboratory director Judea Pearl have been named as
co-recipients of the Association for Computing Machinery's
(ACM) 2003 Allen Newell Award for their ...
[read more]
to the top
Who Hacked the Voting
System? The Teacher
Johns Hopkins University professor Aviel D. Rubin has
become a symbol of the crusade against the perils of
electronic voting with his expose of serious flaws in one
popular company's e-voting software, flaws that have prompted
states to reconsider or limit the use of such machines in ...
[read more]
to the top
The Rise of the Humanoid
Robot
RoboCup 2004 in June will be the latest display of a
scientific effort with the long-term goal of developing teams
of humanoid robots that can defeat the World Cup champions by
the year 2050. "[Soccer is] a game that best illustrates a
human's various complex skills," notes Dr. Zhou ...
[read more]
to the top
File-Swapping Gets
Supercharged on Student Network
Students at universities with access to Internet2 are using
the university network to trade files similar to the manner in
which students have used peer-to-peer services to obtain
music, videos, and software for free. Students say the new
file-trading network on Internet2, dubbed i2hub, ...
[read more]
to the top
Building a Secure Network
to Secure Networks
The Forum of Incident Response and Security Teams' (FIRST)
Computer Security Incident Handling Conference in mid June
will focus on the creation and management of Computer Security
Incident Response Teams (CSIRTs), of which there are almost 90
in Europe, ...
[read more]
to the top
In Defense of
Cyberspace
Center for Information Technology Research in the Interest
of Society's (CITRIS) Evaluation Methods in Internet Security
Technology (EMIST) project is a series of simulated malware
attacks carried out on a testbed modeled after the actual
Internet, according to UC Davis computer ...
[read more]
to the top
Why Certifying IT Workers
Won't Help
The Royal Academy of Engineering and the British Computer
Society say that a lot of IT money is wasted due to a lack of
professionalism in software engineering, and argue for a
professional IT community accredited by them. However, there
is no evidence that links a given examination with ...
[read more]
to the top
Trading in a Cloud of
Electrons
Institute for the Future director Paul Saffo says the
Internet continues to change culture and business, creating
new value and opportunity for innovative companies and
individuals. Many pundits said e-commerce would wipe out
traditional retailers and other middlemen, but Saffo ...
[read more]
to the top
Touch and Smell
Phone
NTT DoCoMo in Japan is working on advanced mobile phone
technologies, including communication with the five senses,
speaking without using vocal cords, and establishing which
direction a call is coming from. It is currently possible to
carry out a phone conversation ...
[read more]
to the top
N. Americans Plan ENUM
Directory
A group of North American telecom companies is planning to
form a non-profit limited liability corporation (LLC) in June
to initiate the process of creating the so-called Tier 1 North
American ENUM (electronic number mapping) directory, which
would link phone numbers to URLs, ...
[read more]
to the top
The Technology of National
Security
Any technology holds the potential for abuse, and computer
technology is no exception. National governments have
developed powerful monitoring software, and in turn
individuals and advocacy groups claim that the technology
infringes on their right to privacy. A resolution will ...
[read more]
to the top
Federal Programmers Get
Agile
Increasing numbers of government programming projects are
using agile development techniques, which advocates claim
support the generation of better software in less time and for
less money than traditional development approaches. Agile
development methods, ...
[read more]
to the top
Optical Storage Sings the
Blues
Optical storage products based on blue-laser technology are
envisioned as the successor to those based on red-laser
technology, which operate at longer optical wavelengths: Blue
lasers can read and write data much faster and write more data
in the same area than devices that ...
[read more]
to the top
Internet Technology to
Improve Satellite Communications
Commercial and military satellite designers are betting
that transmission control protocol/Internet protocol (TCP/IP)
technology will transform satellite communications in the same
way it has transformed workplace communications by bringing
office-like connectivity to even the most ...
[read more]
to the top
RFI on RFID and Pervasive
Wireless
A number of pervasive wireless technologies, each with its
own set of pros and cons, are competing for the enterprise
sector and possibly enabling the advent of machine-to-machine
(M2M) networks that would connect a wide variety of everyday
appliances, from elevators to air ...
[read more]
to the top
To submit feedback about ACM TechNews, contact: technews@hq.acm.org
To unsubscribe from the ACM TechNews Early Alert
Service: Please send a separate email to listserv@listserv2.acm.org
with the line
signoff technews
in the body of
your message.
Please note that replying directly to
this message does not automatically unsubscribe you from the
TechNews list.
ACM may have a different email address
on file for you, so if you're unable to "unsubscribe"
yourself, please direct your request to: technews-request@acm.org
We
will remove your name from the TechNews list on your
behalf.
For help with technical problems, including
problems with leaving the list, please write to: technews-request@acm.org
to the top
© Copyright 2004 Information,
Inc.