Privacy in the Age of
Transparency
Computing Power to the
People
University of San Francisco (USF) computer scientists and
volunteers created the world's first "FlashMob" computer in
the school's gym on April 3, 2004. The event drew about 700
donated machines, less than expected, and individual CPU
failures made benchmarking the entire system impossible; ...
[read more]
to the top
Poised to Strike: The
Battle Waged by Computer Outlaws Enters a New and Deadly Phase
of Sophistication
Existing computer security efforts are not sufficient to
stop the rising tide of threats, including the synergistic
activities of hackers, virus writers, and spammers. The
computer security industry is currently on par with medical
practice in 1820s, according to Cryptography Research ...
[read more]
to the top
Look, Listen,
Walk
MIT Comparative Media Studies program director Henry
Jenkins writes that location-aware handhelds will enable
"augmented reality," where technology makes people more
engaged with their surroundings instead of unattached. Whereas
most mobile technology--mobile phones, laptops, headphones,
and ...
[read more]
to the top
Linux on Desktop Gaining in
OS Race
As far as operating system evolution goes, the Linux
desktop is quickly catching up to more advanced desktop
systems such as Windows and the Unix-based Mac OS X, writes
Dan Gillmor. While desktop Linux installations still lack
applications and easy-to-use support environments, those ...
[read more]
to the top
Ambient Assistance for
Travellers
Ambient intelligence pilot projects in Europe have shown
the value of the technology, according to Information Society
Technologies (IST) project manager Hans Myrhaug. The
AMBIESENSE project enabled users with wireless-enabled PDAs to
receive location-specific information as they ...
[read more]
to the top
UNC Researchers Win $2.6
Million Grant to Explore Portable 3-D Medical
Services
Portable, three-dimensional telepresence technology will be
tested during tracheotomies performed at University of North
Carolina (UNC) Hospitals. Computer science researchers at UNC
Chapel Hill have developed a prototype and are testing the
technology through the assistance of a three-year, $2.6 ...
[read more]
to the top
Student Takes Robotic
Challenge
A team of University of Louisiana at Lafayette students and
teachers built an autonomous ground vehicle and entered it
into the Defense Advanced Research Projects Agency's Grand
Challenge last month. CajunBot was one of 15 vehicles to
qualify to participate in the 142 mile challenge run; it is
...
[read more]
to the top
Smart Devices: The CEA,
France Telecom and STMicroelectronics Create MINATEC IDEAs
Laboratory
The CEA, STMicroelectronics, and France Telecom have teamed
up to establish a laboratory for studying the use of micro-
and nano-technologies in new consumer products and services.
The MINATEC IDEAs Laboratory is based in Grenoble, France, and
will be used to evaluate ideas from their initial ...
[read more]
to the top
The Penguin Is Popping Up
All Over
Linux is rapidly expanding in the critical embedded
operating systems market, which provides the technological
underpinnings for automotive controls, consumer electronics,
telecommunications devices, and a host of other electronic
products. Embedded systems are growing fast as devices ...
[read more]
to the top
Industrial Control Systems
Seen as 'Undeniably Vulnerable'
Neither the private sector nor the Homeland Security
Department have developed a comprehensive strategy to secure
the real-time control systems of the nation's critical
infrastructure, making the nation vulnerable to
cyberterrorism, says Rep. Adam Putnam (R-Fla.), chairman of
the House ...
[read more]
to the top
In 2015: Sensors
Everywhere, Computers Invisible
Gartner analysts at the Symposium/ITxpo 2004 predicted that
pervasive and personalized networks will facilitate ubiquitous
computing and render current PC devices obsolete by 2015.
These self-organizing, self-managing networks will be
comprised of intelligent sensors that collect event-driven ...
[read more]
to the top
Talking Security With
Motorola's William Boni
Motorola chief information security officer William Boni, a
keynote speaker at the recent InfoSec World conference, was
also instrumental in the launch of the Security Metrics
Consortium, in which IT security professionals brainstorm on
the key issues they face. Boni supervises security for a ...
[read more]
to the top
Technology Assists When
Memory Falters
Researchers at the University of Michigan are developing an
advanced version of so-called minder technology that makes use
of artificial intelligence to deliver more personalized
reminders of what an elderly person has done and is supposed
to do. The Autominder software serves as a ...
[read more]
to the top
NASA Using
Linux
There are between 20 and 30 Linux workstations at NASA's
Ames Research Center for each rover currently exploring the
surface of Mars, running Red Hat Linux 7.3. These
workstations, which are equipped with dual 2.8GHz Xeon CPUs,
2GB-4GB of RAM, and an Nvidia Quadra 2000 or 3000, are used to
...
[read more]
to the top
Technology a Dependable
Ally in Iraq War
Military services are evaluating information technologies
designed to enhance battlefield strategies in Operation Iraqi
Freedom to see which ones worked and which ones need work.
U.S. Strategic Command commander Adm. James Ellis told
attendees at the Defense Advanced Research Projects ...
[read more]
to the top
Dust in the
Wind
Smart Dust is composed of tiny sensors or "motes" that can
be programmed to monitor humidity, vibrations, energy use, and
many other factors, and organize into ad hoc networks.
Proposed by former UC Berkeley professor Kris Pister, Smart
Dust was sponsored by the Defense Advanced Research ...
[read more]
to the top
Privacy in the Age of
Transparency
Companies and organizations must negotiate a veritable
minefield to tailor and streamline their relationships with
customers, suppliers, and business partners while concurrently
upholding the confidentiality of their personal information;
this challenge is the result of the emergence of information
...
[read more]
to the top
To submit feedback about ACM TechNews, contact: technews@hq.acm.org
To unsubscribe from the ACM TechNews Early Alert
Service: Please send a separate email to listserv@listserv2.acm.org
with the line
signoff technews
in the body of
your message.
Please note that replying directly to
this message does not automatically unsubscribe you from the
TechNews list.
ACM may have a different email address
on file for you, so if you're unable to "unsubscribe"
yourself, please direct your request to: technews-request@acm.org
We
will remove your name from the TechNews list on your
behalf.
For help with technical problems, including
problems with leaving the list, please write to: technews-request@acm.org
to the top
© Copyright 2004 Information,
Inc.