Open Calendar Sharing and
Scheduling With CalDAV
Paper Makes a Comeback as
Electronic Elections Spur Opposition
The last two presidential elections, with their close,
highly contested outcomes, have convinced voting-rights
organizations and computer scientists that a paper trail must
be established to ensure the validity of the final numbers and
voters' protection against electoral fraud or ...
[read more]
to the top
American Universities Fall
Way Behind in Programming
American universities hit an all-time low in the world
finals of the ACM's International Collegiate Programming
Contest, with the University of Illinois tying for 17th place.
The top four spots were captured, in descending order, by
Shanghai Jiao Tong ...
[read more]
to the top
Sharing the Wealth at
IBM
The business world's eyes are focused on IBM's move to make
patents available for free, which the company hopes will be an
even more profitable strategy than keeping them to itself. The
move started in January when IBM declared that it would freely
release 500 software patents for use in ...
[read more]
to the top
Rules Aimed at Digital
Misdeeds Lack Bite
With ongoing cybersecurity breaches at large
consumer-oriented firms, federal and state lawmakers are
working on new laws that would mete harsher punishments to
online criminals and make legal prosecution of online crimes
easier. At least a dozen federal and state bills have been
proposed ...
[read more]
to the top
MIT, Quanta Cook Up Devices
of Tomorrow
MIT and Quanta Computer signed a five-year, $20 million
agreement on April 8 to develop designs for next-generation
computing and communication devices through the integration of
research from MIT's Computer Science and Artificial
Intelligence Laboratory (CSAIL) and Quanta's hardware
marketing ...
[read more]
to the top
Database Sea Change Drawing
Near
Database vendors are battling to consolidate transaction
and analysis capabilities and offer improved total cost of
ownership and the ability to handle unstructured data in a
relational database. Vendors are eager to sell database
products that will give them leverage to sell other products
...
[read more]
to the top
The Battle Between
Tinseltown and Techville
The debate before the Supreme Court over whether
file-trading networks such as Grokster and Streamcast should
be legally liable for digital piracy brings the battle between
the entertainment and tech industries into sharp focus, with
the former arguing that the future of creativity is at stake
...
[read more]
to the top
Collar Cultivates Canine
Cliques
Dog owners can track their pets' activities, map out their
social networks, and network through their pets with a
wearable computer system developed by MIT researchers engaged
in the Social Networking in Fur (SNIF) project. The scientists
have developed a prototype collar and leash equipped with an
...
[read more]
to the top
Hoping Girls Get a Kick Out
of Computers
The University of Maryland, Baltimore County's Center for
Women and Information Technology (CWIT) this weekend will hold
its annual Computer Mania Day, an event designed to fuel an
interest in information technology among young girls. Computer
Mania Day is expected to draw more than 600 ...
[read more]
to the top
UCD Scientist Patents
'Smart' Email
Email could become more of a business application if the
communications tool had intuitive capabilities, believes Dr.
Nicholas Kushmerick, a senior lecturer in the Department of
Computer Science at University College Dublin. Kushmerick,
also a part-time visiting scientist for IBM's Center ...
[read more]
to the top
A Law Mandating Music File
Compatibility?
Reps. Lamar Smith (R-Texas) and Howard Berman (D-Calif.)
advocate a proposal to establish a national interoperability
standard for all online music platforms that was unanimously
rejected by music industry and consumer groups at an April 6
congressional hearing. The motivation behind ...
[read more]
to the top
Permanent
Record
Government agencies can learn a valuable lesson from the
life work of Frenchman Jean-Francois Champollion, who
deciphered the markings on the Rosetta Stone, making it
possible to finally read Egyptian hieroglyphics. In Australia,
the National Archives of Australia (NAA) has taken the ...
[read more]
to the top
Software Agents Give Out
PR Advice
Corporations and governments constantly monitor Web sites,
blogs, and news reports concerning their organizations in
order to counter negative views, otherwise known as engaging
in media spin. A British software firm says it has created a
program that can automatically assess the tone of a document
...
[read more]
to the top
In the Internet's
High-Speed Lane
Broadband Internet is changing the social, educational, and
economic activity of young people, and savvy companies are
exploring how best to take advantage of the new connectivity.
Half of U.S. households with teenagers now have broadband
Internet connections compared with 35 percent ...
[read more]
to the top
If You Build It, Will They
Come?
Undergraduate humanities and social science faculty often
do not make use of available digital resources because of the
worries technology introduces in the classroom, the time
involved, and the lack of technical support, according to an
ongoing study at the University of California at Berkeley's
...
[read more]
to the top
Professors Join the Fray
as Supreme Court Hears Arguments in File-Sharing
Case
Scholars and technology experts are worried that making
peer-to-peer (P2P) file swapping networks accountable for
copyright infringement would hurt technological innovation,
threaten free speech, and limit scholarship, and they filed
legal briefs recommending that the Supreme Court avoid such a
...
[read more]
to the top
Open Source to the
Rescue
Open source software became Friendster's savior when heavy
traffic threatened to overwhelm the wildly successful social
networking Web site. The service was originally driven by a
Java back end running on Apache Tomcat servers with a MySQL
database, but this architecture could not deal ...
[read more]
to the top
Web
Mobs
Web mobs are criminal organizations that operate
exclusively online, selling stolen and counterfeit credit card
numbers, email accounts, and other forms of personal ID. EBay
chief security strategist Howard Schmidt warns that Web mobs
can destroy the carefully cultivated trust between ...
[read more]
to the top
Open Calendar Sharing and
Scheduling With CalDAV
Open Source Application Foundation development manager Lisa
Dusseault and University of California-Santa Cruz computer
science professor Jim Whitehead write that the desire for a
calendar access protocol supporting standard
within-organization meetings, collaborative calendar sharing,
and ...
[read more]
to the top
To submit feedback about ACM TechNews, contact: technews@hq.acm.org
To unsubscribe from the ACM TechNews Early Alert
Service: Please send a separate email to listserv@listserv.acm.org
with the line
signoff technews
in the body of
your message.
Please note that replying directly to
this message does not automatically unsubscribe you from the
TechNews list.
ACM may have a different email address
on file for you, so if you're unable to "unsubscribe"
yourself, please direct your request to: technews-request@acm.org
We
will remove your name from the TechNews list on your
behalf.
For help with technical problems, including
problems with leaving the list, please write to: technews-request@acm.org
to the top
© Copyright 2005 Information,
Inc.