Read the TechNews Online at: http://technews.acm.org
ACM TechNews
April 12, 2006

MemberNet
The ACM Professional Development Centre
Unsubscribe

Welcome to the April 12, 2006 edition of ACM TechNews, providing timely information for IT professionals three times a week.

Sponsored by Information, Inc.

http://www.infoinc.com/sponsorthenews/contactus.html


HEADLINES AT A GLANCE:

 

CodeInvader Game Warms up Students for ACM World Finals
ITBusiness.ca (04/11/06) Lysecki, Sarah

To warm up for the World Finals of the ACM International Collegiate Programming Contest, students have been testing their Java skills on a game called CodeInvaders. Each team has three hours to write a MySpaceShip Java application that resembles a space ship. The teams are allowed to look at each other's space ships during the three hours, but are unable to see the actual lines of code that their competitors are writing. Teams collect points by retrieving energy and bringing it back to their home planet, shooting and hitting other ships, and having a high amount of energy left at the end of the game. The voluntary Java contest is just a prelude to Wednesday's main event, where teams have five hours to solve eight to 10 problems. In the months leading up to the competition, students work together to solve old problems that they can access through a portal, which also enables judges to review their work and provide feedback. Held at Baylor University in San Antonio, the 30th ACM World Finals will see 83 teams compete for four gold prizes, four silver, and four bronze. Last year Shanghai hosted the competition, and the previous year it was in Prague. The bidding process for cities to host the competition is similar to the Olympics site-selection process, said Bill Poucher, the contest's executive director, who said that he is currently looking six to eight years ahead. "We want to show off the culture and do it in the best possible way," Poucher said. "We want to do it in a way that we can say we're part of a world that wants to be problem solvers, that wants to celebrate the diversity of human life." Poucher is considering bids from Rio de Janeiro, Stockholm, Hawaii, and even an ocean liner to host the contest in the future. IBM has extended its commitment to sponsor the contest through 2012.
Click Here to View Full Article
to the top


New Database Rejects Eligible Calif. Voters
Computerworld (04/07/06) Songini, Marc L.

California's new database of registered voters, once hailed as a model for other states by the federal government, could block thousands of registered voters from casting ballots in this June's statewide election, officials warn. Since the December implementation of the database, California's registration process has invalidated numerous attempts to register, typically due to minor data-entry issues. Between Jan. 1 and March 15, 43 percent of the voter registration forms in Los Angeles County were rejected, causing election officials to wonder if eligible voters will be dropped from the voter rolls. The voter registration database, created to comply with the Help America Vote Act, accepts 74 percent of registrations on the first try, leaving the rest to be manually validated by election workers, according to a spokeswoman for Secretary of State Bruce McPherson, who runs the database. Voters must provide their county registrar with a driver's license number or other identifying information, which is then keyed into a database and uploaded to the new system, which cross-references the information with records from the Department of Motor Vehicles or other appropriate agency. If so much as a middle initial is missing, the new centralized system could reject the application. Given the lag time sometimes required to validate registrations in the new system, election officials fear that they may not be able to manually validate all the rejected registrations in time for the May 22 deadline to vote in the June 6 election. California State Sen. Debra Brown, an outspoken critic of McPherson, believes the rejection rate should be no higher than 2 percent, and that the voter database has been fraught with problems from the outset. Meanwhile, McPherson has proposed legislation to "provide common-sense flexibility so that no eligible voter should be denied the opportunity to vote because of a technicality," his spokeswoman said. ACM's U.S. Public Policy Committee released an in-depth report regarding "Statewide Databases of Registered Voters."
To view this report, visit http://www.acm.org/usacm/VRD
Click Here to View Full Article
to the top


Computing Women Seek to Dispel 'Geek Mythology'
Laboratorytalk (04/10/06)

To promote careers in computer science among female students at regional middle and high schools, members of the Women in Computing at Indiana University developed the Just Be incentive program. Just Be, a student-run, interactive program developed principally by graduate students Katie Siek and Amanda Stephano, drew its inspiration from Roadshow, a program with a similar aim at Carnegie Mellon University. Through the program, Indiana faculty, students, and researchers will speak at area schools about their inspiration for studying IT, and interact with the audience with a quiz aimed at dispelling popular myths about computing that often discourage women from majoring in technical fields. "When we first meet with the kids, we ask them to close their eyes and describe what they see when they imagine a computer professional at work," said Siek. "They usually conjure up images of a male, socially-challenged nerd working in isolation at a computer." The presenters then show them pictures of actual computing professionals both at work and in their free time to demonstrate that they can be normal people, too. Siek, a doctoral student in computer science, traveled to Purdue University to explain the program, and Purdue is now putting together a similar initiative. Stephano, who is working toward master's degrees in computer science and human-computer interaction design, said that Just Be aims to present a positive image of computing to boys and girls alike. To learn more about ACM's Committee on Women in Computing, visit http://women.acm.org/
Click Here to View Full Article
to the top


How to Lose the Brain Race
New York Times (04/10/06) P. A25; Clemons, Steven; Lind, Michael

Sen. Dianne Feinstein's (D-Calif.) amendments to the recently scuttled immigration reform package send a troubling message to the world, write Steven Clemons and Michael Lind. Feinstein had sought to double the fees assessed to foreign students seeking to gain entry to U.S. universities while assuring that agribusiness would be the beneficiary of 1.5 million unskilled guest workers over the next five years. Although the legislation died on the Senate floor, the notion that the U.S. economy has more to gain from admitting low-paid, low-skilled foreign laborers than from highly specialized knowledge workers and researchers is widely held in Congress, and represents a grievous misunderstanding of the nation's priorities. As the United States contemplates immigration policies that open the doors to uneducated workers while blocking entry to their highly skilled counterparts, other industrial countries are doing the opposite, welcoming the foreign talent that the United States is rejecting into their universities and research centers. The fear that foreigners crowd U.S. universities and take spots from deserving American students, which is at the core of Feinstein's proposal, turns a blind eye to the fact that foreign students, researchers, and professors make U.S. universities stronger. Though the H-1B visa program is the principal instrument of immigration for skilled workers, Clemons and Lind argue that the employer-sponsorship feature of the program forces workers to stay in jobs where they are mistreated, often being forced to work long hours for unreasonable pay. A points system that awards immigrants a score based on their skills and knowledge of the national language, similar to that adopted by Canada, Australia, and Britain, would remove much of the inequity from the system and enable workers to quit their jobs without fear of deportation.
Click Here to View Full Article - Web Link May Require Free Registration
to the top


Inspiring the Next Generation of Engineers
Electronic News (04/06/06) Davis, Jessica

Despite the contention of a Duke University study that the oft-cited and alarming statistics comparing the number of engineering degrees graduated from U.S. universities with the numbers from China and India are overstated, the United States must do more to promote engineering to children in grade school, according to executives in the semiconductor industry. A panel at last week's Embedded Systems Conference took up the issue, with some participants calling for better role modeling from parents. "Instead of being soccer dads and moms let's be science dads and moms," said Altera's Misha Burich, who believes mobilizing youth must occur on an individual and voluntary basis, rather than at the corporate level. Sampling the engineers at Altera, Burich said that he most often heard that his colleagues were drawn to engineering because of their parents. National Instruments' John Pasquarette took the education system to task, claiming that high schools do not adequately prepare students for college. In addition to sending its own engineers out into the classroom, National Instruments has partnered with Lego and Tufts University to create RoboLab, an application that enables students to design and program their own robots. Getting students excited is critical, said Pasquarette, who noted that more CEOs of Fortune 500 companies took their degrees in engineering than business. President Bush's State of the Union address was encouraging to Semiconductor Industry Association President George Scalise, who believes the announcement of the new policy to address the potential worker shortage has at least put the country on the right track.
Click Here to View Full Article
to the top


Researcher: Security Risks in Web Services Largely Ignored
IDG News Service (04/07/06) McMillan, Robert

Security professionals should look more closely at Web services, which are being increasingly targeted by attackers, warned Alex Stamos, a founding partner of Information Security Partners in San Francisco, during a presentation at the CanSecWest/core06 conference. "Web application security is the red-headed stepchild of the security industry," he said, adding that hackers could use Web services such as AJAX and the XQuery query language to uncover secret information and attack systems. He explained how a hacker could enter malicious code into a Web form, then have the code dial a customer service number of a company and trick the customer service representative into executing it unintentionally. Stamos also said an attacker could create malicious XML queries that use an enormous amount of memory or overwhelm database applications with requests, in order to carry out denial-of-service attacks. Including filtering capabilities in products, which would help them to detect requests that should not be performed, would be a way for Web applications vendors to help improve security, said Stamos. Web applications were linked to nearly 70 percent of vulnerabilities disclosed during the second half of 2005, according to security vendor Symantec.
Click Here to View Full Article - Web Link May Require Free Registration
to the top


Speedy Robot Legs It to Break Record
New Scientist Tech (04/05/06) Simonite, Tom

A team of German and Scottish researchers has built the world's fastest two-legged robot, setting a new speed record of 3.5 leg-lengths per second. At 30 centimeters high, RunBot easily surpassed the mark of 1.4 leg-lengths held by MIT's Spring Flamingo, a robot which is four times taller than RunBot. With only a few sensors, RunBot is only able to detect a foot touching the ground and a leg swinging forward with the help of a program that imitates the neuron's ability to control reflexes in animals. "We wanted to show that a very simple system with a simple neuronal controller could walk in a natural manner--and fast," said Florentin Worgotter of the University of Gottingen, who developed RunBot in collaboration with researchers at the University of Glasgow and the University of Stirling. RunBot's locomotion is sustained by its sensors, which send one leg swinging forward when they detect the other hitting the ground. The knee of the leg in motion bends until a sensor in the hip directs it to straighten up in preparation for touching the ground, and the cycle then repeats. Worgotter said the system's lack of complexity distinguishes it from many other robots, and noted that he and his team set out to mimic the relatively simple neural processes at work in basic human motion. Using software that imitates neuronal control enables the robot to learn more quickly, Worgotter claimed. "If a change doesn't help its speed, RunBot tries something else," he said. That feature enabled the robot to increase its initial speed by three times during testing. Though RunBot currently walks the periphery of a circular room while attached to a boom in the center, Worgotter is developing a freestanding version that he does not expect to require significant modifications.
Click Here to View Full Article
to the top


Research Reveals Phishing Hooks
BBC News (04/05/06)

A recent study found that while most people could identify a phishing site as bogus, sophisticated scams could fool around 90 percent of users, most of whom tend to ignore the visual clues provided by their browsers. The study, which looked specifically at banking Web sites, was conducted by Rachna Dhamija of the Harvard Center for Research on Computation and Society and University of California, Berkeley, computer science professors Doug Tygar and Marti Hearst. The researchers concluded that Web designers must develop new ways of signaling to users that a site is unsecured. Approximately 5 percent of phishing recipients open the email, visit the bogus site, and furnish sensitive information, which provides ample incentive for phishers to keep up their efforts. The researchers recommend that users look at the address bar to check for fake sites that incorporate a well-known name into the URL to lend it an air of legitimacy. They also caution users to retype links instead of clicking on them, check the sites for spelling and grammatical errors, look for "https" on bank sites rather than "http," and to use an anti-phishing toolbar. On average, 40 percent of the 22 test subjects failed to recognize a fake Web site, and the most authentic-looking spoofed site fooled 90 percent. Most participants simply did not know what features typically distinguish fake sites from real ones. Most did not look at the address bar, status bar, or other identifying features, and many ignored explicit security warnings in pop-up windows. "The indicators of trust presented by the browser are trivial to spoof," the researchers concluded. "These results illustrate that standard security indicators are not effective for a substantial fraction of users, and suggest that alternative approaches are needed."
Click Here to View Full Article
to the top


E-Learning Tool Creates Virtual University
Computerworld New Zealand (04/06/06) Hedquist, Ulrika

Researchers at the Auckland University of Technology and the University of Auckland have teamed up to develop eXe, an open-source e-learning tool that will enable professors to develop e-learning content without having to write code. "The aim of the eXe project is to make the writing of e-learning materials as easy as possible for teachers and academic staff, and then [to] link the material into their learning management systems so all students can access it," said Andrew Higgins, director of e-learning at AUT. Using eXe, faculty will be able to build Web pages with documents, videos, PowerPoint presentations, and assignments. Open source was a logical choice with a limited development budget, so the team built the core of the application in-house, and invited the international development community to contribute ideas or code. Beyond the university professors in New Zealand, eXe could support the creation of virtual universities in developing countries that lack the resources to build traditional schools. Higgins has placed interactive e-learning guidelines online, enabling users to add new research and updates. He has also secured a contract to develop a trusted, open-source e-portfolio system for users to keep research, notes, school work, and presentations online. "You can allow different sorts of access for different people," Higgins said. "For example, your university tutor, a potential employer, or your brother or sister. You can build on it for life-long learning and, when you grow old, share it with your grandchildren."
Click Here to View Full Article
to the top


Computer Will Soup up IU's Research
Indianapolis Star (04/06/06) O'Neal, Kevin

Indiana University will soon be the owner of a $9 million IBM supercomputer--one of the 20 fastest in the world--that will be able to perform more than 20 trillion calculations a second. The new machine is 20 times faster than Indiana's last supercomputer purchase, providing enough processing power to support research in the formation of planets, weather patterns, and molecular-level biology. A high-speed fiber-optic network will enable researchers at other Indiana campuses to utilize the computing power of the new system. Supercomputers are now critical to universities seeking to conduct high-level research, said Jack Dongarra, professor at the Innovative Computing Laboratory at the University of Tennessee. The ability to conduct research of that caliber puts schools in line for research grants, of which Indiana expects to receive $477 million worth this year. With the new supercomputer, Indiana has set an annual goal of $800 million in research grants. Nearby Purdue University also welcomes Indiana's new computer. "This is like a rising tide that lifts our boat," said Steve Talley, Purdue's media relations manager for IT. "It shows that they are one of the leading research institutions in the nation." The computers at Indiana and Purdue are connected, so Purdue researchers will also be able to tap into the new computer. Purdue recently has been concentrating its efforts on distributed computing, and already maintains a supercomputer of its own. Indiana's new computer is expected to rival the performance of a 2,200-processor machine at Virginia Tech that ranked No. 20 on the most recent list of the world's top 500 supercomputers.
Click Here to View Full Article
to the top


Get Ready for the Real Bionic Man
ABC News (04/04/06) Mundell, E.J.

The latest innovations in the integration of machines with human life were the subject of a special press conference last week during the annual Experimental Biology 2006 meeting in San Francisco. Though TV's Col. Steve Austin remains one of the more common images of a human-machine hybrid for many Americans, researchers say bionics have been with us for some time, especially when one considers that many people use eyeglasses to see and a cell phone for communication. "But now, it's becoming more organic, more integrated--we already have artificial hips, remember," says Homayoon Kazerooni, a professor of mechanical engineering and director of the Robotics and Human Engineering Laboratory at the University of California, Berkeley. Kazerooni introduced BLEEX, a wearable robotics system with its own set of legs, in 2004, and says a final version of the exoskeleton, which can help humans lift heavy loads over long distances, should be available soon. William Craelius, a Rutgers University researcher who created Dextra, the first multi-finger artificial hand, also participated on the panel. Dextra can perform simple movements such as opening doors and turning keys, but the kind of dexterity associated with the human hand is still a decade away, says Craelius. The panel also discussed developments involving a bionic eye, an artificial wrist, and computer simulations of real-life human movement.
Click Here to View Full Article - Web Link to Publication Homepage
to the top


Collaboration Will Investigate Vulnerabilities of Rapidly Growing Internet Phone and Multimedia Systems
EurekAlert (04/04/06)

The NSF has awarded four grants totaling $600,000 to the University of North Texas to lead a consortium of universities in the development of a secure, geographically diffuse test bed for VoIP over three years. The project will focus on preventing voice spam and DoS attacks, improving the quality of service and 911 reliability, and exploring vulnerabilities that arise when using VoIP with traditional phone networks. "Proactively securing the next-generation infrastructure for voice communications is critical for us all," said Ram Dantu, the project's leader. "Our research will identify vulnerabilities in the technology and establish solutions--before damage is done." With Vonage, AT&T, and other companies aggressively rolling out VoIP services, one study has projected that about 24 million U.S. households will use VoIP by 2008, while government agencies have already begun implementing VoIP strategies. In 1880, four years after inventing the telephone, Alexander Graham Bell and Charles Sumner Tainter patented the photophone, which transmitted sound via a beam of light in a similar fashion as today's optical-signal networks. Today, security is a much greater concern, and NSF program director Rita Virginia Rodriguez hopes that the project will make significant strides toward providing both immediate and long-term solutions for securing VoIP calls.
Click Here to View Full Article
to the top


Developers Ramp Open Source
EE Times (04/03/06)No. 1417, P. 63; Varhol, Peter

The Eclipse Foundation continues to develop the Eclipse open-source integrated development environment, and more embedded developers are turning to the platform to build systems and software. This summer, a bundled system, code-named Callisto, that combines Eclipse with several advanced plug-ins will be unveiled and will address some of the platform's complexity issues. With Callisto, vendors that use Eclipse will have a better chance to ensure that their plug-ins and enhancements run on compatible configurations. EclipseCon drew about 1,000 participants last year, but the conference for Eclipse members and users saw the number rise to more than 1,400 this year for the Santa Clara, Calif., gathering. Embedded developers are embracing Eclipse because it is free, is updated by downloading its latest version, and because it is accessible on a number of platforms, due to it running on Java. "I assembled my own set of development tools on Eclipse," says Don Weldon, a lead developer for a small design shop in Mountain View, Calif., who attended EclipseCon. "It meets my needs, and I know exactly how to use it." QNX will ship its Momentics tools on Eclipse 3.2 about three months after the introduction of Callisto.
Click Here to View Full Article
to the top


How Linking PCs Spreads Load and Saves Money
New Zealand Herald (04/04/06) Hendery, Simon

The Search for Extraterrestrial Intelligence (SETI) project shows that grid computing offers researchers a viable alternative to using supercomputers. Taking advantage of the idle PC time of hundreds of thousands of Internet-connected home computers across the globe, the project has created a virtual supercomputer for analyzing telescope data for possible intelligent broadcasts from deep space. Meanwhile, Oracle has become a believer in running a cluster of low-cost servers, rather than a larger single server, because the approach makes it easier for users to increase resources as they are needed. The traditional approach involves the somewhat costly task of replacing the server whenever larger and more expensive hardware platforms are needed. "It's about taking the smallest, most affordable computing elements available and using collections of these to deliver a higher quality of service, better performance and better reliability at a dramatically lower cost," says Roland Slee, vice president of Oracle Asia-Pacific. Google makes use of cluster computing to power its search engine, which is backed by several thousand PCs that are connected over a number of locations. However, Jeff Wacker, a futurist with global computing giant EDS, does not believe such linking of PCs will deflate interest in supercomputers. And he expects business to combine grid, cluster, and utility computing in the years to come.
Click Here to View Full Article
to the top


Seeing Is Believing
Scientist (04/01/06) Vol. 20, No. 4, P. 46; Harding, Anne

Efforts to improve data visualization techniques are being fueled by both the ballooning volumes of information available to life scientists and the burgeoning amount of computer power at their disposal. Current data visualization challenges stem from the complexity as well as the quantity of information, according to UC-San Diego's Philip Bourne, who co-directs the Research Collaboratory for Structural Bioinformatics Protein Data Bank. "You've got this convergence of different data types and you need new tools and new ways of looking at that, and you really want to see that together," he says. Cold Spring Harbor Laboratory scientist Lincoln Stein favors the use of "lightweight and easily configurable" systems, and notes that first-generation data visualization programs were too tightly integrated with the data, making adaptation to individual users' needs an extremely arduous process. Stein, Bourne, and other researchers are looking to increase data visualization programs' flexibility and ease of use with workbenches or toolkits whose configurable elements and compatible interfaces facilitate adaptation. Next-generation visualization software may be designed to enable users to immerse themselves in the data. Such technology would allow scientists to study the data from every perspective in a collaborative manner, according to Stein. He says this dovetails with visualization's biggest overall advantage: Its ability to cultivate interdisciplinary collaboration by helping researchers in diverse fields comprehend problems in order to address them more effectively.
Click Here to View Full Article - Web Link to Publication Homepage
to the top


Translation by Machine: A Bridge Across the Multicultural Gap
Futurist (04/06) Vol. 40, No. 2, P. 56; Belluomini, David

Language translation technology is needed to overcome the language barrier civilian law enforcement faces in increasingly multicultural U.S. cities, writes Fresno Police Department Lt. David Belluomini. He cites findings from the 2000 U.S. Census that nearly 47 million out of 262 million American residents ages 5 and up spoke a language other than English or in addition to English. Experiments funded by the Defense Advanced Research Projects Agency and other government efforts have thus far yielded one-way text-to-speech and speech-to-speech devices, while automated two-way translation devices are projected as a future development. The most ardent advocates for dynamic two-way translation could be the communities that stand to derive the biggest advantages from it, such as law enforcement, according to Belluomini. The odds are good in almost any U.S. city that an English-only police officer will deal with a non-English speaker or someone for whom English is a second language. Belluomini organized a focus group of bilingual social workers, IT experts, and law enforcement professionals to discuss machine or computer communication's social, technological, and practical implications; from the meeting came the conclusion that machine translation would initially be practiced slowly and cautiously, but become more common with the improvement of the technology and increased social readiness. The group thought younger recipients would be more receptive to the technology, and that non-emergency applications were the best starting point for machine translation. Belluomini says, "As policing and other public-service agencies experiment with new forms of human interaction through the use of technology, the gates will be thrown open for improvement and innovation, making the use of two-way machine language translation communication a distinct possibility for law enforcement within the next five years."
Click Here to View Full Article - Web Link to Publication Homepage
to the top


Forging a National Cyber Security Strategy
SC Magazine (03/01/06) P. 48; Purdy Jr., Andy

Deputy director of the Department of Homeland Security's (DHS) National Cyber Security Division (NCSD) Andy Purdy details his agency's mission of developing a comprehensive and cohesive plan to ensure the security of America's critical data through intense public-private collaboration and the various tools, resources, and insights this effort involves. He describes the first priority of the National Strategy to Secure Cyberspace as the development of a national cyberspace security response system, a core element of which is strong situational awareness in conjunction with information sharing among federal departments as well as between the government and the private sector. The NCSD, in partnership with the Office of Management and Budget (OMB), has released the U.S. Emergency Readiness Team (US-CERT) Federal Concept of Operations (CONOPS) mandating agencies' reportage of cyberincidents, along with data on their initiatives to lower cyber risk in accordance with the Federal Information Security Management Act (FISMA), to the team. DHS also supports the multi-state ISAC to effect information sharing and collaborate on awareness-raising efforts among state and local governments. Pursuant to a national cybersecurity response system's situation awareness component is the construction of an international watch and warning network. Purdy writes that increasing reliance on cyber resources calls for effective disruption recovery planning by federal agencies, enterprises, and private networks. The National Recovery Plan (NRP) offers guidance on such areas as emergency support functions for communications. The DHS' Preparedness Directorate, of which the NCSD is a component, is concentrating on readiness and is working to guarantee proper coordination between the mission areas to expedite general preparedness.
Click Here to View Full Article - Web Link to Publication Homepage
to the top


To submit feedback about ACM TechNews, contact: [email protected]

To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to [email protected] with the line

signoff technews

in the body of your message.

Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@ acm.org

We will remove your name from the TechNews list on your behalf.

For help with technical problems, including problems with leaving the list, please write to: [email protected]

to the top

News Abstracts © 2006 Information, Inc.


© 2006 ACM, Inc. All rights reserved. ACM Privacy Policy.