Where Do System Standards Go
From Here?
Father of Palm Handhelds
Focuses on Making Computers Even Brainier
Palm handheld creator and Redwood Neuroscience Institute
founder Jeff Hawkins recently unveiled a for-profit company,
Numenta, that will concentrate on expanding computer
intelligence through the application of his brain research.
Hawkins theorizes that the human brain's ability to ...
[read more]
to the top
A Miss
Hit
Wired magazine editor-in-chief Chris Anderson wrote an
article last year titled "The Long Tail" that said Internet
firms such as Amazon.com, eBay, and Google based their
businesses on obscure information and products rather than
popular items; the meme gathered currency among bloggers, who
...
[read more]
to the top
Cybersecurity Regs Would Be
Tricky
Although the federal government believes establishing a
broad regulatory framework for cybersecurity would prevent
counterterrorism, a 57-page report from the Congressional
Research Service suggests the Internet is too vast to control,
especially since cooperation and coordination among ...
[read more]
to the top
Kevin Mitnick and the Art
of Intrusion--Part 1
Hacker-turned-security-consultant Kevin Mitnick, who has
compiled stories of exploits in his book "The Art of
Intrusion" as a guide to hackers' goals and attack strategies,
notes that the companies he offers his services to are too
concerned with regulation compliance and making money to
fortify ...
[read more]
to the top
On the Trail of the Zombie
PCs
Programmers participating in The German Honeynet Project
are detailing their attempts to track down and monitor
malicious "bots" used to turn vulnerable PCs into "zombie"
computers that hackers use to coordinate exploits ranging from
identity theft to spamming to disruption of online ...
[read more]
to the top
One-on-One
Department of Homeland Security (DHS) top cybersecurity
official Andy Purdy says the most worrisome threat to national
cybersecurity is the growing black market of tools that spread
spyware or launch denial-of-service attacks. These networks of
hijacked computers are currently being used by ...
[read more]
to the top
Retirement Having Little
Effect on IT Skills, Survey Finds
The federal IT workforce is aging, but its IT skills remain
strong, according to a new study by the CIO Council and the
Office of Personnel Management. The CIO Council and the OPM
surveyed 22,104 IT workers in 12 General Schedule or Foreign
Service categories involved in IT or that have ...
[read more]
to the top
Study Seeks Hi-Tech
Mountaineers
Researchers at the University of Aberdeen and the Macaulay
Institute are recruiting mountain climbers and hillwalkers to
participate in a year-long study to evaluate the ability of
geovisualization software to evaluate terrain.
Geovisualization can be used to create, inspect, and
manipulate ...
[read more]
to the top
Gadgets Rule on College
Campuses
U.S. college campuses have been invaded by an army of
laptops, cell phones, and other wireless technologies students
use to maintain constant connections between their classwork,
their peers, and their professors. Critics such as college
consultant Warren Arbogast warn that the push to ...
[read more]
to the top
NFC: Nearly
There
Philips and Nokia continue to make progress on near-field
communications (NFC), but advocates of the technology must
narrow the scope of its potential uses, convince manufacturers
to include it in their electronic devices, and find big
customers, like RFID and contactless payment have in ...
[read more]
to the top
The Brain Behind the Big,
Bad Burger and Other Tales of Business
Intelligence
The restaurant industry is the exception to the rule when
it comes to effectively using business intelligence (BI)
software to extract useful insights that can be exploited to
boost the bottom line. CKE Restaurants, parent company of the
Hardee's fast food chain, employed a BI system to ...
[read more]
to the top
The Changing Landscape of
Networks
The time has come to build a Multi-Protocol Label Switching
(MPLS)- and IP-based "infranet" that blends the reliability
and functionality of private networks with the pervasiveness
of the Internet, writes Juniper Networks founder and CTO
Pradeep Sindhu. This will eliminate the barriers ...
[read more]
to the top
Will .Mp and .Mobi Make
Life Easier for Mobile Users
Two new top-level domains--.mp and .mobi--designed to
accommodate the viewing constraints of mobile Internet devices
are expected to be available by mid 2005, despite opposition
from some who say the domains violate the device independence
of the Internet. The .mp domain is already in the ...
[read more]
to the top
Hack
License
In reviewing McKenzie Wark's book, "A Hacker Manifesto,"
Simson Garfinkel outlines Wark's central argument and notes
flaws that, in the reviewer's opinion, make the title of the
book misleading. Wark, a professor at New School University,
sees recent skirmishes over copyrights, trademarks, and ...
[read more]
to the top
If Smallpox Strikes
Portland...
A group of Los Alamos National Laboratory researchers has
developed EpiSims, software that can run computerized
simulations of disease epidemics in order to determine the
best ways health officials can respond. A disease's trajectory
throughout the social network as well as the points ...
[read more]
to the top
Location-Aware Networking:
We Know Where You Are
The deployment of enhanced 911 (E911), which is already
required in several states, calls for the implementation of a
location-aware infrastructure that supports VoIP over Wi-Fi
and similar technologies, but enterprises should examine the
opportunities--and drawbacks--location-aware networks ...
[read more]
to the top
Visual Modeling's New
Look
Visual modeling, when properly executed, can enhance
software application development by reducing manual coding,
incorporating reusability into whole segments of application
design, making maintenance less of a headache for IT
organizations, and ensuring that business and development
teams are ...
[read more]
to the top
Where Do System Standards
Go From Here?
Cisco Systems' John G. Waclawsky writes that successful
standards expand the general market because they focus on
creating end-user value by reducing product or product
components' complexity and cost, and making businesses capable
of developing new products or services. Despite the ...
[read more]
to the top
To submit feedback about ACM TechNews, contact: technews@hq.acm.org
To unsubscribe from the ACM TechNews Early Alert
Service: Please send a separate email to listserv@listserv.acm.org
with the line
signoff technews
in the body of
your message.
Please note that replying directly to
this message does not automatically unsubscribe you from the
TechNews list.
ACM may have a different email address
on file for you, so if you're unable to "unsubscribe"
yourself, please direct your request to: technews-request@acm.org
We
will remove your name from the TechNews list on your
behalf.
For help with technical problems, including
problems with leaving the list, please write to: technews-request@acm.org
to the top