От: TechNews [technews@HQ.ACM.ORG]
Отправлено: 21 марта 2005 г. 20:37
Кому: TECHNEWS@LISTSERV.ACM.ORG
Тема: ACM TechNews - Monday, March 21, 2005
Read the TechNews Online at: http://www.acm.org/technews/
Current Issue: http://www.acm.org/technews/current/homepage.html
ACM TechNews
March 21, 2005

Dear ACM TechNews Subscriber:

Welcome to the March 21, 2005 edition of ACM TechNews, providing timely information for IT professionals three times a week. For instructions on how to unsubscribe from this service, please see below.

ACM's MemberNet newsletter offers the latest information on ACM activities, member benefits, and industry issues.

The The ACM Professional Development Centre offers ACM members free access to hundreds of courses and books, and the optional ITPro Collection.

Sponsored by
AutoChoice Advisor Logo

Looking for a NEW vehicle? Discover which ones are right for you from over 250 different makes and models. Your unbiased list of vehicles is based on your preferences and years of consumer input. [try it]


HEADLINES AT A GLANCE:

  • Study Criticizes Government on Cybersecurity Research
  • Web Design Hampers Mobile Internet, Pioneer Says
  • Cleaning Spam From Swapping Networks
  • H-1B Fraud Investigations Expected to Increase
  • The Information Technology Factor
  • 'Telepresence' Chair to Build Virtual Meetings
  • Growth of Wireless Internet Opens New Path for Thieves
  • Protecting the Internet: Certified Attachments and Reverse Firewalls?
  • Q&A With Mark Dean
  • 3D Printer to Churn Out Copies of Itself
  • University of Southern Miss Joins Navy CRADA
  • Zombie PCs Being Sent to Steal IDs
  • United We Find
  • The Transformation of Wireless Networks
  • The Rise of Smart Buildings
  • Experiences With Writing Grid Clients With Mobile Devices
  • Agile Breaks on Through to the Other Side
  • Follow the Money

     

    Study Criticizes Government on Cybersecurity Research

    The federal government's cybersecurity research investments are woefully insufficient, concludes a report prepared by a subcommittee of the President's Information Technology Advisory Committee (PITAC). The report says the U.S. should give $148 million annually to the National Science ...

    [read more]      to the top


    Web Design Hampers Mobile Internet, Pioneer Says

    World Wide Web inventor Tim Berners-Lee is a big believer in the potential of the mobile Internet, but believes designers will have to do a better job of simplifying Web pages for handsets. Designers have already tweaked Web pages for the visually impaired and for others, and he believes they will ...

    [read more]      to the top


    Cleaning Spam From Swapping Networks

    Cornell University researchers led by assistant computer science professor Emin Gun Sirer have developed "Credence," a new open-source software program designed to clear peer-to-peer (P2P) networks of spam by allowing different computers to "gossip" with each other to determine which P2P ...

    [read more]      to the top


    H-1B Fraud Investigations Expected to Increase

    Last November's congressional approval of the Visa Reform Act of 2004 mandated a $2,000 increase in the fee for H-1B applications and allocated $500 of each payment for H-1B antifraud probes. The additional funds from these revisions, due to go into effect this month, may put employers of ...

    [read more]      to the top


    The Information Technology Factor

    Professors Cindy Riemenschneider and Deb Armstrong of the University of Arkansas' Sam M. Walton College of Business examined why fewer women have been getting involved in IT careers in recent years, and have concluded that time management and sources of stress at home and in the office are ...

    [read more]      to the top


    'Telepresence' Chair to Build Virtual Meetings

    The University of Alberta is creating a $2 million program that delves into three-dimensional telepresence technology, and has received $1.7 million to set up an industrial research chair to aid in its exploration in collaborative virtual environments, says U of A computer science professor ...

    [read more]      to the top


    Growth of Wireless Internet Opens New Path for Thieves

    Law enforcement agents say cybercriminals use unsecured Wi-Fi networks to hide their identity and location, and that the problem is growing as more and more universities, municipalities, independent retailers increasingly offer wide-ranging Wi-Fi grids available to anyone with a Wi-Fi card. As a ...

    [read more]      to the top


    Protecting the Internet: Certified Attachments and Reverse Firewalls?

    Spam, phishing, DDoS attacks, worms, and other network-oriented malware are driven by groups of zombie machines, but reverse firewalls on network attachment devices such as routers and DSL equipment could help stop those operations, writes former ICANN board member Karl Auerbach. The telephone ...

    [read more]      to the top


    Q&A With Mark Dean

    IBM Almaden Research Center director Mark Dean says in an interview that a great deal of his time is dedicated to cultivating an interest in science and engineering among African-Americans, noting that promoting and hiring minorities is a major effort for IBM. Dean, an African-American, says the ...

    [read more]      to the top


    3D Printer to Churn Out Copies of Itself

    University of Bath researcher Adrian Bowyer is developing a 3D printer that can replicate itself and has the potential to dramatically lower the cost of rapid prototyping, in which objects stored on a computer are printed out in layers. Bowyer says his self-replicating rapid prototyper (RepRap), ...

    [read more]      to the top


    University of Southern Miss Joins Navy CRADA

    The University of Southern Mississippi (USM) will collaborate with the Open Source Software Institute (OSSI) and the U.S. Naval Oceanographic Office on a three-year research and development program investigating the adoption and use of open source software by the Navy as part of a Cooperative ...

    [read more]      to the top


    Zombie PCs Being Sent to Steal IDs

    Researchers with the Honeynet Project have released findings about bot net activity since last summer. The collections of hijacked computers are increasingly used for financial purposes rather than online vandalism, such as denial-of-service attacks against Web sites. Bot net activity appears ...

    [read more]      to the top


    United We Find

    Collaborative-filtering systems' appeal lies in their potential to alert consumers to items of interest they might otherwise miss, and to help online vendors boost sales via cross-selling. Collaborative filtering has been around since the early 1990s at Xerox PARC, but only just recently ...

    [read more]      to the top


    The Transformation of Wireless Networks

    Wireless carriers and technology companies are testing new services based on IP multimedia subsystem (IMS) standards that aim to break down the walls between cellular, wireline, and cable platforms. IMS leverages Internet protocol (IP) to achieve converged telecommunications where cell phone ...

    [read more]      to the top


    The Rise of Smart Buildings

    IT and building automation systems (BAS) experts say their two worlds are merging with the initial development of Web-based control standards and migration to IP networks; innovative building operators and BAS companies are already using IP and Web technologies to more effectively manage their ...

    [read more]      to the top


    Experiences With Writing Grid Clients With Mobile Devices

    Researchers at the University of Southampton's School of Electronics and Computer Science relate their experiences in deploying mobile Grid clients for the Finance Education in a Scalable Software Environment (Finesse) e-learning system with the goal of establishing whether such ...

    [read more]      to the top


    Agile Breaks on Through to the Other Side

    Agile software development approaches such as eXtreme Programming (XP) can boost productivity and enable products to arrive at projected delivery dates and fulfill expectations by skipping the bureaucracy typical of the classical "waterfall" software development model, where programming often ...

    [read more]      to the top


    Follow the Money

    Experts are predicting trouble ahead for U.S. innovation in terms of federal funding for speculative research into radical technologies, which has declined recently in favor of defense and homeland security solutions that use relatively mature technologies. "If we don't pay attention to the ...

    [read more]      to the top


    To submit feedback about ACM TechNews, contact: technews@hq.acm.org

    To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to listserv@listserv.acm.org with the line

    signoff technews

    in the body of your message.

    Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

    ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@acm.org

    We will remove your name from the TechNews list on your behalf.

    For help with technical problems, including problems with leaving the list, please write to: technews-request@acm.org

    to the top

    © Copyright 2005 Information, Inc.


  • © 2005 ACM, Inc. All rights reserved. ACM Privacy Policy.