От: TechNews [technews@HQ.ACM.ORG]
Отправлено: 22 августа 2005 г. 23:14
Кому: TECHNEWS@LISTSERV.ACM.ORG
Тема: ACM TechNews - Monday, August 22, 2005
Read the TechNews Online at: http://www.acm.org/technews/
Current Issue: http://www.acm.org/technews/current/homepage.html
ACM TechNews
August 22, 2005

Dear ACM TechNews Subscriber:

Welcome to the August 22, 2005 edition of ACM TechNews, providing timely information for IT professionals three times a week. For instructions on how to unsubscribe from this service, please see below.

ACM's MemberNet newsletter offers the latest information on ACM activities, member benefits, and industry issues.

The The ACM Professional Development Centre offers ACM members free access to hundreds of courses and books, and the optional ITPro Collection.

Sponsored by
AutoChoice Advisor Logo

Looking for a NEW vehicle? Discover which ones are right for you from over 250 different makes and models. Your unbiased list of vehicles is based on your preferences and years of consumer input. [try it]


HEADLINES AT A GLANCE:

  • Live Webcast of Cerf and Kahn's ACM Turing Lecture Tonight
  • Professor Tries to Instill Passion for Math, Science
  • High-Profile Online Data Thefts Irk Pols
  • When PCs Pollute
  • Daisy Has All the Digital Answers to Life on Earth
  • VR Goggles Heal Scars of War
  • Tech Beyond Black Boxes? It Just Won't Fly
  • Enhanced: More Women in Science
  • Chinese Developers Should Take Global Open-Source View
  • Can a Simple Password Stop Domain Name Hijacking?
  • Computer Characters Mugged in Virtual Crime Spree
  • Software Broadens the Language of Search
  • Software Development Survey Says People, Not Tools, Matter Most
  • How Bots Can Earn More Than You
  • Science Intelligence
  • Can Google Stay Google?
  • The African Hacker
  • Morphware

     

    Live Webcast of Cerf and Kahn's ACM Turing Lecture Tonight

    Vinton G. Cerf and Robert E. Kahn, recipients of ACM's 2004 A.M. Turing Award, will present their lecture "Assessing the Internet: Lessons Learned, Strategies for Evolution, and Future Possibilities" tonight at the University of Pennsylvania's Irvine Auditorum. ACM ...

    [read more]      to the top


    Professor Tries to Instill Passion for Math, Science

    Carnegie Mellon University computer science professor Lenore Blum recently earned the Presidential Award for Excellence in Science, Mathematics, and Engineering Mentoring for her work to encourage young girls to pursue math and science careers. She believes girls generally spend less time around ...

    [read more]      to the top


    High-Profile Online Data Thefts Irk Pols

    The recent spate of highly publicized data breaches compromising the personal and financial information of millions of Americans has incited the third piece of congressional legislation addressing the issues of data protection and disclosure since April. The Personal Data Privacy and ...

    [read more]      to the top


    When PCs Pollute

    Greenpeace has issued a report concluding that the recycling of electronic materials is unregulated and environmentally hazardous, as many workshops overseas where electronic equipment is disassembled contain high levels of toxic materials. Greenpeace advocates takeback programs that would hold ...

    [read more]      to the top


    Daisy Has All the Digital Answers to Life on Earth

    British researchers have announced plans to build a digital library of all life on Earth using pattern-recognition software. The Digital Automated Identification System (Daisy) combines artificial intelligence and computer vision technology so that naturalists can access detailed information about ...

    [read more]      to the top


    VR Goggles Heal Scars of War

    An experimental virtual-reality system that vividly replicates combat trauma is being used to treat soldiers suffering from shellshock. The Institute for Creative Technologies at the University of Southern California developed the system last year with the U.S. Office of Naval ...

    [read more]      to the top


    Tech Beyond Black Boxes? It Just Won't Fly

    The recent Greek airplane crash highlights the problem of relying on "black box" flight recorders that are themselves vulnerable to damage or destruction, yet relaying key data from the aircraft to the ground every few microseconds has been deemed too costly and complex an engineering feat ...

    [read more]      to the top


    Enhanced: More Women in Science

    In the 25 years since the inception of the Women in Science and Technology Act, women have made significant advances into the fields of math and science, though their participation remains disproportionately low in academia. Despite the recent debate over innate intelligence and cognitive ...

    [read more]      to the top


    Chinese Developers Should Take Global Open-Source View

    Speakers at the LinuxWorld Conference and Expo in Beijing said Chinese companies and developers can and should play a key role in the development of open-source software, both in a technical and non-technical capacity. Novell CEO Jack Messman lauded the Chinese government's support for ...

    [read more]      to the top


    Can a Simple Password Stop Domain Name Hijacking?

    Using a password at the time of a domain transfer between registrars could safeguard against identity fraud targeting Internet domain names, which has emerged as one of the most significant threats to networks today. Securing the domain name transfer process has been slow, due partially to the ...

    [read more]      to the top


    Computer Characters Mugged in Virtual Crime Spree

    The increasingly porous boundary between the real and virtual worlds is illustrated by the arrest of a Chinese exchange student in Japan on suspicion of controlling software "bots" to assault and rob game characters of virtual possessions, which were then fenced for real money through an ...

    [read more]      to the top


    Software Broadens the Language of Search

    IBM has released Unstructured Information Management Architecture (UIMA), open source software for the annotation, searching, and sharing of metadata that IBM and the Defense Advanced Research Projects Agency (DARPA) expect will implement a new type of software application capable of extracting ...

    [read more]      to the top


    Software Development Survey Says People, Not Tools, Matter Most

    Management and technology approaches are more significant factors in determining the quality of software development projects than tools, according to a new study from Quantitative Software Management. In its report on "the Best and Worst in Class" projects, QSM found that the best ...

    [read more]      to the top


    How Bots Can Earn More Than You

    It has been demonstrated, both in simulation and in the real world, that software robots or bots can outperform and even out-earn humans in areas such as the stock market. Such bots vied against each other in an agent trading competition at the International Joint Conference on Artificial ...

    [read more]      to the top


    Science Intelligence

    Business and science are experiencing a convergence between technologies, architectures, and procedures for information technology, according to Bolder Technology President Richard Hackathorn, who believes business and science can become more intelligent through a unified information ...

    [read more]      to the top


    Can Google Stay Google?

    The meteoric rise of Google belies fears that it could suffer the fate of many companies in Silicon Valley's unforgiving arena: That competitors will catch up and send Google on a downward spiral into obscurity. Co-founder Sergey Brin says part of the secret to Google's success is the ...

    [read more]      to the top


    The African Hacker

    Ghanaian software entrepreneur Hermann Chinery-Hesse created his company, Soft Tribe, to capitalize on his epiphany that Africans cannot take advantage of IT by merely importing European or American software--they must customize the programs for local conditions. Chinery-Hesse is a ...

    [read more]      to the top


    Morphware

    Morphware processors occupy a middle tier between general-purpose processors that execute a broad set of commands and application-specific integrated circuits optimized for speed. Morphware rapidly carries out one application and then reconfigures its wiring in accordance with software ...

    [read more]      to the top


    To submit feedback about ACM TechNews, contact: technews@hq.acm.org

    To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to listserv@listserv.acm.org with the line

    signoff technews

    in the body of your message.

    Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

    ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@acm.org

    We will remove your name from the TechNews list on your behalf.

    For help with technical problems, including problems with leaving the list, please write to: technews-request@acm.org

    to the top

    © Copyright 2005 Information, Inc.


  • © 2005 ACM, Inc. All rights reserved. ACM Privacy Policy.