Dear ACM TechNews Subscriber: Welcome to the May 19, 2003 edition of ACM TechNews, providing timely information for IT professionals three times a week. For instructions on how to unsubscribe from this service, please see below. ACM's MemberNet is now online. For the latest on ACM activities, member benefits, and industry issues, visit http://www.acm.org/membernet Remember to check out our hot new online essay and opinion magazine, Ubiquity, at http://www.acm.org/ubiquity ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ACM TechNews Volume 5, Number 497 Date: May 19, 2003 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Site Sponsored by Hewlett Packard Company ( ) HP is the premier source for computing services, products and solutions. Responding to customers' requirements for quality and reliability at aggressive prices, HP offers performance-packed products and comprehensive services. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Top Stories for Monday, May 19, 2003: http://www.acm.org/technews/current/homepage.html "Internet Dreams Turn to Crime" "Threat Is Seen to Heirloom Software" "IRC Operators May Out-Hack Fizzer" "In Search of the World's Hotbeds of Innovation" "Business Is Toying With a Web Tool" "India Seeks To Be Global R&D Center" "The Big Undo: A Time Machine for Corporate Computing Traces, Fixes Hacker Damage" "What's Going on With the Internet?" "Driving Into the Future" "Game Over for Mod Chips?" "Senator Stumps for More IT Training Funds" "New Role: IT Pros Need to Communicate" "Wear Down Opposition" "WiFi Business Model Proves Elusive in Hype Deluge" "Event-Driven Architecture Poised for Wide Adoption" "Ethernet at Thirty" "Toward a Common Data Model for Supercomputing" "The Copyright Wars" ******************* News Stories *********************** "Internet Dreams Turn to Crime" Russian hackers are often normal programmers who cannot find legitimate work and use their government's laxity on cybercrime as cover for attacking foreign firms. U.S. authorities have a difficult time capturing offenders because of the relative ... http://www.acm.org/technews/articles/2003-5/0519m.html#item1 "Threat Is Seen to Heirloom Software" The software accompanying the birth of the PC industry less than three decades ago is in danger of extinction, warns Brewster Kahle, chairman of the Internet Archive. He spoke at the U.S. Copyright Office's meeting last week in Los Angeles about the ... http://www.acm.org/technews/articles/2003-5/0519m.html#item2 "IRC Operators May Out-Hack Fizzer" Internet relay chat administrators are considering possibly illegal actions to shut down the Fizzer virus, which has spread rapidly since May 12 through email and the Kazaa file-trading network. Fizzer connects to IRC in order to receive instructions ... http://www.acm.org/technews/articles/2003-5/0519m.html#item3 "In Search of the World's Hotbeds of Innovation" CHI Research has been tracking patents developed in different countries and calculating their worth for more than 30 years. It now says the United States is outstripping European nations such as the United Kingdom, Germany, Italy, and France in the number ... http://www.acm.org/technews/articles/2003-5/0519m.html#item4 "Business Is Toying With a Web Tool" Wiki, Web collaboration software used by informal online groups, is taking hold in the business realm. More useful for collaboration than email or face-to-face communication, wiki pages are also a cheap and easy alternative to full-blown ... http://www.acm.org/technews/articles/2003-5/0519m.html#item5 "India Seeks To Be Global R&D Center" Indian government and information technology industry officials would like to see the local industry take the next step to becoming a hub for research and development. Already a market of choice for low-cost software development, India could become a ... http://www.acm.org/technews/articles/2003-5/0519m.html#item6 "The Big Undo: A Time Machine for Corporate Computing Traces, Fixes Hacker Damage" New research from the University of Michigan may help system administrators discover the way hackers invade their systems and undo the damage. Hackers can do a considerable amount of damage to a company's networks in a very brief time, and can leave few ... http://www.acm.org/technews/articles/2003-5/0519m.html#item7 "What's Going on With the Internet?" Fundamental changes to the Internet are impossible because of the number of users and technologies involved, but computer scientists Wu-chi Feng and Wu-chang Feng say current problems such as denial-of-service attacks and spam can be solved. The ... http://www.acm.org/technews/articles/2003-5/0519m.html#item8 "Driving Into the Future" Model U, a futuristic SUV prototype from Ford Motor Company, features a number of innovative technologies including a speech recognition system. Bryan Goodman of Ford Research and Advanced Engineering says the speech-based system is intended to allow ... http://www.acm.org/technews/articles/2003-5/0519m.html#item9 "Game Over for Mod Chips?" The April sentencing of David "krazy8" Rocci to spend an unprecedented five months in prison and pay $25,000 in fines reflects the threat that the Digital Millennium Copyright Act (DMCA) poses to mod chips and the idea of user innovation. ... http://www.acm.org/technews/articles/2003-5/0519m.html#item10 "Senator Stumps for More IT Training Funds" Sen. Patty Murray (D-Wash.) says the Workforce Investment Act, a federal government training initiative, needs to focus more on new industry skills such as IT training. The $6.6 billion act was created in 1998 to provide vocational training to current and ... http://www.acm.org/technews/articles/2003-5/0519m.html#item11 "New Role: IT Pros Need to Communicate" Social skills and teamwork are becoming increasingly important skills for IT workers, according to a new survey of IT recruitment consultants by City & Guilds. IT workers with developed general business and communications skills are more ... http://www.acm.org/technews/articles/2003-5/0519m.html#item12 "Wear Down Opposition" Some academics subscribe to the theory that the move toward wearable technology is part of an evolutionary trend stretching back more than seven centuries. In the past few months, Motorola and other companies have unveiled a plethora of wearable ... http://www.acm.org/technews/articles/2003-5/0519m.html#item13 "WiFi Business Model Proves Elusive in Hype Deluge" WiFi, a technology intended to let people connect to the Internet away from home via notebook PCs and handheld wireless appliances, is expected to be established in some 15,000 sites across Europe by the end of 2003. Unlike other widely hyped new technologies, ... http://www.acm.org/technews/articles/2003-5/0519m.html#item14 "Event-Driven Architecture Poised for Wide Adoption" Event processing is currently limited to developers at financial institutions and software experts assembling operating systems or systems management applications, but Gartner analyst Roy Schulte declared at last week's Web Services and Application Conference ... http://www.acm.org/technews/articles/2003-5/0519m.html#item15 "Ethernet at Thirty" Ethernet has evolved over the last three decades from a concept that few people had faith in into a burgeoning public-domain technology characterized by inexpensive components, compatibility, transparency, and widespread adoption in the ... http://www.acm.org/technews/articles/2003-5/0519m.html#item16 "Toward a Common Data Model for Supercomputing" The Hierarchical Data Format 5 (HDF5) general purpose I/O library co-developed by the University of Illinois' National Center for Supercomputing Applications, Lawrence Livermore, Sandia, and Los Alamos national laboratories aims to write data from multiple ... http://www.acm.org/technews/articles/2003-5/0519m.html#item17 "The Copyright Wars" Although the development of technologies that support on-demand digital entertainment--broadband, digital compression, and recordable DVD drives--is proceeding apace, a lack of standards over how copyright owners should be compensated for the use of ... http://www.acm.org/technews/articles/2003-5/0519m.html#item18 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ -- To review Friday's issue, please visit http://www.acm.org/technews/articles/2003-5/0516f.html -- To visit the TechNews home page, point your browser to: http://www.acm.org/technews/ -- To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to listserv@listserv2.acm.org with the line signoff technews in the body of your message. -- Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list. -- To submit feedback about ACM TechNews, contact: technews@hq.acm.org -- ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@acm.org We will remove your name from the TechNews list on your behalf. -- For help with technical problems, including problems with leaving the list, please write to: technews-request@acm.org