Follow the Money
Study Criticizes Government
on Cybersecurity Research
The federal government's cybersecurity research investments
are woefully insufficient, concludes a report prepared by a
subcommittee of the President's Information Technology
Advisory Committee (PITAC). The report says the U.S. should
give $148 million annually to the National Science ...
[read more]
to the top
Web Design Hampers Mobile
Internet, Pioneer Says
World Wide Web inventor Tim Berners-Lee is a big believer
in the potential of the mobile Internet, but believes
designers will have to do a better job of simplifying Web
pages for handsets. Designers have already tweaked Web pages
for the visually impaired and for others, and he believes they
will ...
[read more]
to the top
Cleaning Spam From Swapping
Networks
Cornell University researchers led by assistant computer
science professor Emin Gun Sirer have developed "Credence," a
new open-source software program designed to clear
peer-to-peer (P2P) networks of spam by allowing different
computers to "gossip" with each other to determine which P2P
...
[read more]
to the top
H-1B Fraud Investigations
Expected to Increase
Last November's congressional approval of the Visa Reform
Act of 2004 mandated a $2,000 increase in the fee for H-1B
applications and allocated $500 of each payment for H-1B
antifraud probes. The additional funds from these revisions,
due to go into effect this month, may put employers of ...
[read more]
to the top
The Information Technology
Factor
Professors Cindy Riemenschneider and Deb Armstrong of the
University of Arkansas' Sam M. Walton College of Business
examined why fewer women have been getting involved in IT
careers in recent years, and have concluded that time
management and sources of stress at home and in the office are
...
[read more]
to the top
'Telepresence' Chair to
Build Virtual Meetings
The University of Alberta is creating a $2 million program
that delves into three-dimensional telepresence technology,
and has received $1.7 million to set up an industrial research
chair to aid in its exploration in collaborative virtual
environments, says U of A computer science professor ...
[read more]
to the top
Growth of Wireless Internet
Opens New Path for Thieves
Law enforcement agents say cybercriminals use unsecured
Wi-Fi networks to hide their identity and location, and that
the problem is growing as more and more universities,
municipalities, independent retailers increasingly offer
wide-ranging Wi-Fi grids available to anyone with a Wi-Fi
card. As a ...
[read more]
to the top
Protecting the Internet:
Certified Attachments and Reverse
Firewalls?
Spam, phishing, DDoS attacks, worms, and other
network-oriented malware are driven by groups of zombie
machines, but reverse firewalls on network attachment devices
such as routers and DSL equipment could help stop those
operations, writes former ICANN board member Karl Auerbach.
The telephone ...
[read more]
to the top
Q&A With Mark
Dean
IBM Almaden Research Center director Mark Dean says in an
interview that a great deal of his time is dedicated to
cultivating an interest in science and engineering among
African-Americans, noting that promoting and hiring minorities
is a major effort for IBM. Dean, an African-American, says the
...
[read more]
to the top
3D Printer to Churn Out
Copies of Itself
University of Bath researcher Adrian Bowyer is developing a
3D printer that can replicate itself and has the potential to
dramatically lower the cost of rapid prototyping, in which
objects stored on a computer are printed out in layers. Bowyer
says his self-replicating rapid prototyper (RepRap), ...
[read more]
to the top
University of Southern
Miss Joins Navy CRADA
The University of Southern Mississippi (USM) will
collaborate with the Open Source Software Institute (OSSI) and
the U.S. Naval Oceanographic Office on a three-year research
and development program investigating the adoption and use of
open source software by the Navy as part of a Cooperative ...
[read more]
to the top
Zombie PCs Being Sent to
Steal IDs
Researchers with the Honeynet Project have released
findings about bot net activity since last summer. The
collections of hijacked computers are increasingly used for
financial purposes rather than online vandalism, such as
denial-of-service attacks against Web sites. Bot net activity
appears ...
[read more]
to the top
United We
Find
Collaborative-filtering systems' appeal lies in their
potential to alert consumers to items of interest they might
otherwise miss, and to help online vendors boost sales via
cross-selling. Collaborative filtering has been around since
the early 1990s at Xerox PARC, but only just recently ...
[read more]
to the top
The Transformation of
Wireless Networks
Wireless carriers and technology companies are testing new
services based on IP multimedia subsystem (IMS) standards that
aim to break down the walls between cellular, wireline, and
cable platforms. IMS leverages Internet protocol (IP) to
achieve converged telecommunications where cell phone ...
[read more]
to the top
The Rise of Smart
Buildings
IT and building automation systems (BAS) experts say their
two worlds are merging with the initial development of
Web-based control standards and migration to IP networks;
innovative building operators and BAS companies are already
using IP and Web technologies to more effectively manage their
...
[read more]
to the top
Experiences With Writing
Grid Clients With Mobile Devices
Researchers at the University of Southampton's School of
Electronics and Computer Science relate their experiences in
deploying mobile Grid clients for the Finance Education in a
Scalable Software Environment (Finesse) e-learning system with
the goal of establishing whether such ...
[read more]
to the top
Agile Breaks on Through to
the Other Side
Agile software development approaches such as eXtreme
Programming (XP) can boost productivity and enable products to
arrive at projected delivery dates and fulfill expectations by
skipping the bureaucracy typical of the classical "waterfall"
software development model, where programming often ...
[read more]
to the top
Follow the
Money
Experts are predicting trouble ahead for U.S. innovation in
terms of federal funding for speculative research into radical
technologies, which has declined recently in favor of defense
and homeland security solutions that use relatively mature
technologies. "If we don't pay attention to the ...
[read more]
to the top
To submit feedback about ACM TechNews, contact: technews@hq.acm.org
To unsubscribe from the ACM TechNews Early Alert
Service: Please send a separate email to listserv@listserv.acm.org
with the line
signoff technews
in the body of
your message.
Please note that replying directly to
this message does not automatically unsubscribe you from the
TechNews list.
ACM may have a different email address
on file for you, so if you're unable to "unsubscribe"
yourself, please direct your request to: technews-request@acm.org
We
will remove your name from the TechNews list on your
behalf.
For help with technical problems, including
problems with leaving the list, please write to: technews-request@acm.org
to the top
© Copyright 2005 Information,
Inc.