От: TechNews [technews@HQ.ACM.ORG]
Отправлено: 5 марта 2004 г. 23:05
Кому: TECHNEWS@LISTSERV2.ACM.ORG
Тема: TechNews Alert for Friday, March 5, 2004
Read the TechNews Online at: http://www.acm.org/technews/
ACM TechNews
March 5, 2004

Dear ACM TechNews Subscriber:

Welcome to the March 5, 2004 edition of ACM TechNews, providing timely information for IT professionals three times a week. For instructions on how to unsubscribe from this service, please see below.

ACM's MemberNet is now online. For the latest on ACM activities, member benefits, and industry issues

Remember to check out our hot new online essay and opinion magazine, Ubiquity.

Sponsored by
AutoChoice Advisor Logo

Looking for a NEW vehicle? Discover which ones are right for you from over 250 different makes and models. Your unbiased list of vehicles is based on your preferences and years of consumer input. [try it]


HEADLINES AT A GLANCE:

  • Dueling Viruses Are Latest Computer Pest
  • 'To Speak to an Operator, Start Swearing Now'
  • Lurking "Spyware" May Be a Security Weak Spot
  • Putting Wireless to the Test(bed)
  • Warning: Blogs Can Be Infectious
  • A Car That Drives Itself? He's Working on It
  • Tools Let Network Operators See Their Way to Security
  • Walking 'Signature'
  • Hands Off! That Fact Is Mine
  • Paul Debevec on Illuminating Effects
  • NASA Considers Open-Source License to Publish Software
  • The Future of Computing Part 5: Evolution and the Bump
  • IU's CAVE Offers Virtual Reality
  • The Nuclear Weapon of Digital Rights Law
  • What Tomorrow May Bring
  • Software and the Future of Programming Languages
  • Sensors on the March
  • Rekindle the Fire
  • A Good First Impression

     

    Dueling Viruses Are Latest Computer Pest

    Virus authors seem to be using their latest malware not just to hijack victims' computers, but to snipe at each other for some as yet unclear reason, according to security experts. Five new versions of the MyDoom, Bagle, and Netsky bugs were discovered on the Web in the space of three ...

    [read more]      to the top


    'To Speak to an Operator, Start Swearing Now'

    University of Southern California researchers are working on software that switches from automated telephony to a live operator by sensing that a caller is angry, which could boost customer loyalty if the technology can be practically applied. USC professor Shrikanth Narayanan explains that a ...

    [read more]      to the top


    Lurking "Spyware" May Be a Security Weak Spot

    Researchers led by Steven Gribble at the University of Washington in Seattle conducted a study of campus network traffic and discovered that 5.1 percent of all Internet-connected systems had one of four known spyware programs--Cydoor, eZula, Gator, and SaveNow--running on them, while 69 ...

    [read more]      to the top


    Putting Wireless to the Test(bed)

    U.S. university researchers have established a distributed wireless testbed for the integration and testing of new wireless communications technologies. Dubbed WHYNET and funded with a $5.5 million National Science Foundation grant, the meta-testbed consists of the linked wireless ...

    [read more]      to the top


    Warning: Blogs Can Be Infectious

    Researchers at Hewlett-Packard Labs used Intelliseek's BlogPulse Web crawler to mine numerous Weblogs, after which they mapped out the connections and topics shared among a large number of sites. Analysis showed that topics would often appear on a small number of relatively ...

    [read more]      to the top


    A Car That Drives Itself? He's Working on It

    The Defense Advanced Research Projects Agency's (DARPA) Grand Challenge is a March 13 race from Barstow, Calif., to the California-Nevada border: The racers are automated vehicles that will be required to cross some 200 miles off-road without human assistance, their only guidance ...

    [read more]      to the top


    Tools Let Network Operators See Their Way to Security

    National Center for Supercomputing Applications (NCSA) researchers have developed a new network monitoring tool that puts raw network data in visual form so human operators can process it more quickly and effectively. The idea for the new software tools came after two NCSA researchers ...

    [read more]      to the top


    Walking 'Signature'

    Researchers are working on gait signature technology whose applications, if perfected, could include security surveillance, medical diagnosis of movement disorders, and computer animation. Human motion signatures would be determined by the same techniques facial-recognition software employs to ...

    [read more]      to the top


    Hands Off! That Fact Is Mine

    The Database and Collections of Information Misappropriation Act, which is expected to be reviewed by the House Commerce Committee on March 4, is drawing controversy because its provisions essentially permit certain companies to own and license facts, making anyone who copies and ...

    [read more]      to the top


    Paul Debevec on Illuminating Effects

    Paul Debevec of the Institute of Creative Technologies (ICT) has spent much of his career developing techniques to integrate computer graphics with computer vision to achieve more realistic visual effects, and he notes that attaining such realism greatly depends on giving computer-generated ...

    [read more]      to the top


    NASA Considers Open-Source License to Publish Software

    NASA is creating a license so that it can release its own applications as open-source software, and says that a final version should be ready by early summer. NASA has submitted a draft to the Open Source Initiative, which accredits open-source software standards. NASA lawyer Bryan Geurts ...

    [read more]      to the top


    The Future of Computing Part 5: Evolution and the Bump

    Computing continues to evolve smoothly as software tools become more lithe and powerful and hardware scales in speed, but eventually limits to hardware development will force a jolting change in computing. Software evolution is shedding more complexity as programmers take to scripting ...

    [read more]      to the top


    IU's CAVE Offers Virtual Reality

    Computer science majors are not the only students at Indiana University taking advantage of the high-tech Cave Automated Virtual Environment inside Lindley Hall. Studio art majors Jackie Nykiel and Lisa Reinwald used the CAVE to design a replica of an ancient Buddhist temple surrounded by a ...

    [read more]      to the top


    The Nuclear Weapon of Digital Rights Law

    The European Union Directive for the Enforcement of Intellectual Property Rights has raised the ire of a number of civil liberties groups, which describe the draft legislation as going way beyond the controversial Digital Millennium Copyright Act in the United States. The Electronic ...

    [read more]      to the top


    What Tomorrow May Bring

    The U.S. government is investing in pattern recognition software as a tool for anticipating and stopping terrorist incidents by organizing vast amounts of raw, unstructured data--email, voice transcripts, surveillance photos, etc.--into a minable model. Examples include an expansion of the ...

    [read more]      to the top


    Software and the Future of Programming Languages

    Few people truly understand the scale and reach of software or the programming languages that support it; but such understanding is critical to addressing security, maintenance, and functionality issues that will grow in complexity as the embedded software base expands. It is estimated ...

    [read more]      to the top


    Sensors on the March

    Sensor technology has made enormous strides recently thanks to power supply and programmability breakthroughs, and further milestones on the horizon will help make sensors and sensor networks even more efficient, flexible, and interoperable. So that sensors can conserve battery power, a ...

    [read more]      to the top


    Rekindle the Fire

    Scott Studham of Pacific Northwest National Laboratory writes that cost-effective commodity supercomputing clusters are effective tools for carrying out "first-principles simulations" of such things as weather systems and basic science, which are based on fundamental physical ...

    [read more]      to the top


    A Good First Impression

    B.J. Fogg, director of the Stanford University Persuasive Technology lab, has determined through research that the first impression of a Web site's visual design is the single most important factor people use to establish a site's credibility or lack of same. He says this is a disappointing ...

    [read more]      to the top


    To submit feedback about ACM TechNews, contact:

  • technews@hq.acm.org

    To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to

  • listserv@listserv2.acm.org with the line

    signoff technews

    in the body of your message.

    Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

    ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to:
  • technews-request@acm.org

    We will remove your name from the TechNews list on your behalf.

    For help with technical problems, including problems with leaving the list, please write to:
  • technews-request@acm.org

  • to the top

    © Copyright 2004 Information, Inc.


  • © 2004 ACM, Inc. All rights reserved.
  • ACM Privacy Policy.