От: TechNews [technews@HQ.ACM.ORG]
Отправлено: 5 апреля 2004 г. 20:39
Кому: TECHNEWS@LISTSERV2.ACM.ORG
Тема: TechNews Alert for Monday, April 5, 2004
Read the TechNews Online at: http://www.acm.org/technews/
ACM TechNews
April 5, 2004

Dear ACM TechNews Subscriber:

Welcome to the April 5, 2004 edition of ACM TechNews, providing timely information for IT professionals three times a week. For instructions on how to unsubscribe from this service, please see below.

ACM's MemberNet is now online. For the latest on ACM activities, member benefits, and industry issues

Remember to check out our hot new online essay and opinion magazine, Ubiquity.

Sponsored by
AutoChoice Advisor Logo

Looking for a NEW vehicle? Discover which ones are right for you from over 250 different makes and models. Your unbiased list of vehicles is based on your preferences and years of consumer input. [try it]


HEADLINES AT A GLANCE:

  • Computing Power to the People
  • Poised to Strike: The Battle Waged by Computer Outlaws Enters a New and Deadly Phase of Sophistication
  • Look, Listen, Walk
  • Linux on Desktop Gaining in OS Race
  • Ambient Assistance for Travellers
  • UNC Researchers Win $2.6 Million Grant to Explore Portable 3-D Medical Services
  • Student Takes Robotic Challenge
  • Smart Devices: The CEA, France Telecom and STMicroelectronics Create MINATEC IDEAs Laboratory
  • The Penguin Is Popping Up All Over
  • Industrial Control Systems Seen as 'Undeniably Vulnerable'
  • In 2015: Sensors Everywhere, Computers Invisible
  • Talking Security With Motorola's William Boni
  • Technology Assists When Memory Falters
  • NASA Using Linux
  • Technology a Dependable Ally in Iraq War
  • Dust in the Wind
  • Privacy in the Age of Transparency

     

    Computing Power to the People

    University of San Francisco (USF) computer scientists and volunteers created the world's first "FlashMob" computer in the school's gym on April 3, 2004. The event drew about 700 donated machines, less than expected, and individual CPU failures made benchmarking the entire system impossible; ...

    [read more]      to the top


    Poised to Strike: The Battle Waged by Computer Outlaws Enters a New and Deadly Phase of Sophistication

    Existing computer security efforts are not sufficient to stop the rising tide of threats, including the synergistic activities of hackers, virus writers, and spammers. The computer security industry is currently on par with medical practice in 1820s, according to Cryptography Research ...

    [read more]      to the top


    Look, Listen, Walk

    MIT Comparative Media Studies program director Henry Jenkins writes that location-aware handhelds will enable "augmented reality," where technology makes people more engaged with their surroundings instead of unattached. Whereas most mobile technology--mobile phones, laptops, headphones, and ...

    [read more]      to the top


    Linux on Desktop Gaining in OS Race

    As far as operating system evolution goes, the Linux desktop is quickly catching up to more advanced desktop systems such as Windows and the Unix-based Mac OS X, writes Dan Gillmor. While desktop Linux installations still lack applications and easy-to-use support environments, those ...

    [read more]      to the top


    Ambient Assistance for Travellers

    Ambient intelligence pilot projects in Europe have shown the value of the technology, according to Information Society Technologies (IST) project manager Hans Myrhaug. The AMBIESENSE project enabled users with wireless-enabled PDAs to receive location-specific information as they ...

    [read more]      to the top


    UNC Researchers Win $2.6 Million Grant to Explore Portable 3-D Medical Services

    Portable, three-dimensional telepresence technology will be tested during tracheotomies performed at University of North Carolina (UNC) Hospitals. Computer science researchers at UNC Chapel Hill have developed a prototype and are testing the technology through the assistance of a three-year, $2.6 ...

    [read more]      to the top


    Student Takes Robotic Challenge

    A team of University of Louisiana at Lafayette students and teachers built an autonomous ground vehicle and entered it into the Defense Advanced Research Projects Agency's Grand Challenge last month. CajunBot was one of 15 vehicles to qualify to participate in the 142 mile challenge run; it is ...

    [read more]      to the top


    Smart Devices: The CEA, France Telecom and STMicroelectronics Create MINATEC IDEAs Laboratory

    The CEA, STMicroelectronics, and France Telecom have teamed up to establish a laboratory for studying the use of micro- and nano-technologies in new consumer products and services. The MINATEC IDEAs Laboratory is based in Grenoble, France, and will be used to evaluate ideas from their initial ...

    [read more]      to the top


    The Penguin Is Popping Up All Over

    Linux is rapidly expanding in the critical embedded operating systems market, which provides the technological underpinnings for automotive controls, consumer electronics, telecommunications devices, and a host of other electronic products. Embedded systems are growing fast as devices ...

    [read more]      to the top


    Industrial Control Systems Seen as 'Undeniably Vulnerable'

    Neither the private sector nor the Homeland Security Department have developed a comprehensive strategy to secure the real-time control systems of the nation's critical infrastructure, making the nation vulnerable to cyberterrorism, says Rep. Adam Putnam (R-Fla.), chairman of the House ...

    [read more]      to the top


    In 2015: Sensors Everywhere, Computers Invisible

    Gartner analysts at the Symposium/ITxpo 2004 predicted that pervasive and personalized networks will facilitate ubiquitous computing and render current PC devices obsolete by 2015. These self-organizing, self-managing networks will be comprised of intelligent sensors that collect event-driven ...

    [read more]      to the top


    Talking Security With Motorola's William Boni

    Motorola chief information security officer William Boni, a keynote speaker at the recent InfoSec World conference, was also instrumental in the launch of the Security Metrics Consortium, in which IT security professionals brainstorm on the key issues they face. Boni supervises security for a ...

    [read more]      to the top


    Technology Assists When Memory Falters

    Researchers at the University of Michigan are developing an advanced version of so-called minder technology that makes use of artificial intelligence to deliver more personalized reminders of what an elderly person has done and is supposed to do. The Autominder software serves as a ...

    [read more]      to the top


    NASA Using Linux

    There are between 20 and 30 Linux workstations at NASA's Ames Research Center for each rover currently exploring the surface of Mars, running Red Hat Linux 7.3. These workstations, which are equipped with dual 2.8GHz Xeon CPUs, 2GB-4GB of RAM, and an Nvidia Quadra 2000 or 3000, are used to ...

    [read more]      to the top


    Technology a Dependable Ally in Iraq War

    Military services are evaluating information technologies designed to enhance battlefield strategies in Operation Iraqi Freedom to see which ones worked and which ones need work. U.S. Strategic Command commander Adm. James Ellis told attendees at the Defense Advanced Research Projects ...

    [read more]      to the top


    Dust in the Wind

    Smart Dust is composed of tiny sensors or "motes" that can be programmed to monitor humidity, vibrations, energy use, and many other factors, and organize into ad hoc networks. Proposed by former UC Berkeley professor Kris Pister, Smart Dust was sponsored by the Defense Advanced Research ...

    [read more]      to the top


    Privacy in the Age of Transparency

    Companies and organizations must negotiate a veritable minefield to tailor and streamline their relationships with customers, suppliers, and business partners while concurrently upholding the confidentiality of their personal information; this challenge is the result of the emergence of information ...

    [read more]      to the top


    To submit feedback about ACM TechNews, contact: technews@hq.acm.org

    To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to listserv@listserv2.acm.org with the line

    signoff technews

    in the body of your message.

    Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

    ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@acm.org

    We will remove your name from the TechNews list on your behalf.

    For help with technical problems, including problems with leaving the list, please write to: technews-request@acm.org

    to the top

    © Copyright 2004 Information, Inc.


  • © 2004 ACM, Inc. All rights reserved. ACM Privacy Policy.