Read the TechNews Online at: http://technews.acm.org
ACM TechNews
October 27, 2006

MemberNet
The ACM Professional Development Centre
Unsubscribe

Welcome to the October 27, 2006 edition of ACM TechNews, providing timely information for IT professionals three times a week.

Sponsored by
Learn more about Texis, the text-oriented database 
providing high-performance search engine features combined with SQL 
operations and a development toolkit, that powers many diverse 
applications, including Webinator and the Thunderstone Search Appliance.
Learn more about Texis, the text-oriented database providing high-performance search engine features combined with SQL operations and a development toolkit, that powers many diverse applications, including Webinator and the Thunderstone Search Appliance.


HEADLINES AT A GLANCE:

 

Election Cliffhanger: Will it Work?
USA Today (10/27/06) P. 15A; Wolf, Rachel

As the November 7 election approaches, poll workers are currently being trained to use electronic voting systems, with varying success. Chuck Dietrich, 75, expresses the frustration of many concerning the transformation of a seemingly simple, albeit tedious, process being made into a complicated one that is largely kept from public knowledge: "I don't see what was wrong with the paper ballots. When you go into a bank or into a store, they tell you, 'We can't help you, the computers are down.'" Dietrich, though of a generation unfamiliar with computing devices, has a more relevant outlook on the voting process than most: he is very close to the average poll worker age, which is 72. In Ohio's Cuyahoga County, and many others across the country, private instructors and technicians from Diebold (or other voting machine makers) conduct four-hour training sessions, overseen by Election Board officials, in which poll workers are familiarized with the new machine. After the course, poll workers must take a test, which 26 percent failed the first time in Cuyahoga County. Technicians in this county must also take classes, although these are eight hours long. In the upcoming election 30 percent of U.S. voting districts are using new equipment, up from nine percent in 2004, and over 20 states are using machines that produce paper printouts for the first time. Dozens of states are using new voter identification and registration systems. Candice Hoke, director for the Center for Election Integrity at Cleveland State University thinks that "we're facing a huge problem as a nation. We've made the entire election system overly complex and technologically vulnerable, and lowered public confidence in the legitimacy of the results." Ironically, the use of electronic voting machines was a reaction to problems occurring in the 2000 presidential election; a way to assure future elections went smoothly. For information about ACM's e-voting activities, visit http://www.acm.org/usacm
Click Here to View Full Article
to the top


It's Back to School for IT
CNet (10/26/06) Blake, Brian M.

Despite reports about outsourcing and offshoring of IT jobs, IT professionals who are able to align technology with business will find plenty of intriguing opportunities, writes Georgetown University computer science professor M. Brian Blake. A reported 70 percent drop between 2000 and 2005 in the number of students majoring in computer science means that those who do acquire the necessary skills will be even more highly sought after. Today's IT professional is not relegated to simply writing code, but is involved in nearly every stage of the business process. School and professors must acknowledge the changing IT environment and change the way IT skills are presented. While the basics of computer engineering must remain, certain aspects of business should be added. Real world technology and business scenarios are most effective in preparing students for the careers awaiting them. Educators must take the burden upon themselves to realize what skills are required in the workplace at the present as well as the longevity of these skills. Beyond studying programming languages, students must learn the business forces that led to their creation. A Forrester Research report recently revealed that IT professionals are often expected to collaborate with business groups involving sourcing, architecture, management, and innovation. However, Blake says a growing demand is not enough; in order to ensure the success of the next generation, educators, students and IT professionals must cooperate to create educational paths that address critical business skills which will aid traditional computer science training.
Click Here to View Full Article
to the top


ACM Names 49 Distinguished Members for Contributions to Computing
AScribe Newswire (10/25/06)

Forty-nine ACM members have been recognized as ACM Distinguished Members. ACM created the new member recognition program as a way to honor members who have made significant contributions in computing and information technology. "The computing disciplines are the drivers behind much of the world's innovations," says former ACM President David Patterson, a computer scientist at the University of California, Berkeley. "These prominent scientists, engineers, and professionals have made breakthroughs in computing that benefit our world everyday." IBM topped the corporate sector in 2006 ACM Distinguished Members with nine, followed by Sun Microsystems Laboratories with five, and HP Labs and Yahoo each with two. Among universities, the University of Minnesota and the University of California, Irvine, had two ACM Distinguished Members. The winning ACM Distinguished Members have achieved breakthroughs in areas such as computer security, robotics, computer graphics, mobile computing, wireless networking, and Web searching. For a complete list of 2006 Distinguished Members visit http://distinguished.acm.org.
Click Here to View Full Article
to the top


Analysis: 'Total Information' Lives Again
United Press International (10/26/06) Waterman, Shaun

A computer system is being developed by the Office of the Director for National Intelligence John D Negroponte that is capable of mining great amounts of information in order to watch for terrorist planning--technology that recalls the Total Information Awareness (TIA) program. The new effort, known as Tangram, was discovered last week and has been criticized by advocates for privacy and civil liberties. "They are misdirecting resources toward this kind of fanciful, science-fiction project while neglecting the basics" of effective counterterrorism investigation, says Tim Sparapani, legislative council with the ACLU. The system is funded for $49 million in research over the next four years, and will build on earlier efforts to create "methods of...effectively searching large data stores for evidence of known [terrorist] behaviors." While intelligence officials insist that the program is within the law, similarities to TIA, which data-mined stores of information including credit-card purchases, telephone calls, and travel records, remain. Congress had cut all funding to TIA in 2003 after substantial concern arose over privacy and civil liberties implications. The Advanced Research and Development Activity, which oversaw the TIA, is also in charge of Tangram. "The administration has flat-out ignored Congress," says Sparapani. "They renamed it, retied the bow and off they went." Three contracts totaling almost $12 million have been awarded for Tangram research and development. Recipients include Booz Allen Hamilton and 21st century Technologies, both of which worked on the TIA project, and SRI International, which worked on a predecessor to TIA, known as the Genoa project. For more on TIA, visit http://www.acm.org/usacm
Click Here to View Full Article
to the top


Internet Voting Revisited
VoteTrustUSA (10/25/06) Simons, Barbara; Rubin, Avi; Jefferson, David

"Internet Voting Revisited: Security and Identity Theft Risks of the DoD's Interim Voting Assistance System," a new report from four academic computer scientists, details serious security issues with a new absentee-voting system for U.S. military personnel called the Interim Voting Assistance System (IVAS). Created by the Federal Voting Assistance Program (FVAP), IVAS is designed to help military personnel and overseas civilians register and vote in the November 7 election, but the researchers say it has similar security issues to an earlier FVAP program known as SERVE that caused that system to be scrapped. The researchers, including former ACM President Barbara Simons, note that IVAS was publicly announced just last month and has never been used in a public election or primary. The Defense Department's own internal review of IVAS also raised security questions. The DoD's internal review noted that "the transmission of voting materials by unsecured email is a concern from both a privacy and security concern...it is easily monitored, blocked, and subject to tampering." While the report admits encryption is possible, it says "there is no plan" to do so. Transmissions sent over foreign phone systems cannot be secured; the U.S. has enough trouble securing its own telecommunications. The report evaluated two IVAS voting options. Option one: the voter logs into the system and submits information before a ballot is mailed to them, and they mail it back to the DoD. Option two: after logging in and submitting their information, the voter logs onto a server where the ballot can be downloaded, printed out, filled in, and sent back to the DoD. The report says that IVAS opens up voters to potential identity theft, returning ballots electronically allows hackers an opportunity to tamper, and the ballots are handled by DoD, an unnecessary step that places the ballots in possession of the voter's employer, which can be seen as a conflict of interest. The researchers suggest making sure ballots are only sent by mail, and adequately securing the system for requesting ballots via the Internet. Barbara Simons was also co-chair of a USACM committee that studied "Statewide Databases of Registered Voters." To view their report, visit http://www.acm.org/usacm/VRD
Click Here to View Full Article
to the top


To Inspire Tech Kids, Inspire Tech Teachers
Investor's Business Daily (10/26/06) P. A4; Vallone, Julie

To combat the shrinking interest in computer science and engineering among college students, many organizations are targeting school teachers. Programs where teachers get hands-on exposure to technology, in order to help students understand how such disciplines apply to the real world, are increasingly sprouting up. Bing Chen, head of the Computer and Electronics Engineering department at the University of Nebraska, and his colleagues created the Silicone Prairie Initiative on Robotics in IT (Spirit) program for both teachers and students. This summer, 32 teachers from local schools were invited to participate in a two-week hands-on engineering workshop. "Frankly, our math and science teachers are not given many opportunities to explore engineering," says Chen. "Our workshop was designed to give them exposure and build skill sets in this area." San Jacinto College in Pasadena, Texas, administers a program called the National Middle School Aerospace Scholars (Namas) that invites 150 teachers from eight states to year-round workshops where they learn about the aerospace industry. The program takes advantage of the nearby NASA Johnson Space Center. These programs all focus on making sure teachers are able to incorporate what they learn into their curriculum in order to cultivate interest in science and engineering. Simona Bartl, who coordinates a program in Marine Biotechnology and Bioinformatics run by California State University, explains that "only a few [teachers] had experienced doing actual research and being in the lab with scientists. Most had gone through science (teacher) education programs, where they just not exposed to these aspects of the field." By giving teachers a better understanding of what science is, on a day to day basis, students will be given real-world experience and relevant advice that can open them up to the opportunities presented by the all-too-neglected fields of science and engineering.
Click Here to View Full Article - Web Link to Publication Homepage
to the top


Weight Gain of U.S. Drivers Has Increased Nation's Fuel Consumption
University of Illinois at Urbana-Champaign (10/24/06) Kloeppel, James E.

The weight gain of U.S. drivers is directly responsible for raising gasoline consumption by 938 million gallons annually since 1960, according to researchers at the University of Illinois at Urbana-Champaign and Virginia Commonwealth University. What is more, each extra pound in every vehicle today requires drivers to use more than 39 million gallons of extra gasoline each year, says the paper written by Sheldon H. Jacobson, a professor of computer science at Illinois, and VCU faculty member Laura A. McLay. Jacobson, director of Illinois' simulation and optimization laboratory, decided to study the issue after seeing gas prices average over $3 a gallon, and wondering whether weight gain of Americans was a contributing factor to the record level costs. "The key finding is that nearly 1 billion gallons of fuel are consumed each year because of the average weight gain of people living in the United States since 1960--nearly three times the total amount of fuel consumed by all passenger vehicles each day based on current driving habits," they write. "Although the amount of fuel consumed as a result of the rising prevalence of obesity is small compared to the increase in the amount of fuel consumed stemming from other factors such as increased car reliance and an increase in the number of drivers...it still represents a large amount of fuel, and will become even more significant as the rate of obesity increases." The research, funded by the National Science Foundation, will appear in the October-December issue of the Engineering Economist.
Click Here to View Full Article
to the top


New Software Method for Producing Medical Guidelines
IST Results (10/27/06)

The medical guidelines that provide doctors with state-of-the-art rules are receiving a boost from software engineering. An IST project, Protocure II, began by looking at the guidelines as modular software programs that can be written in a programming language, continuing on the theme of Protocure I, which looked at the guidelines as a computer program. "We created the tools to translate the guidelines into a programming language, verify them, and keep them up to date," explains Mar Marcos of the department of computer engineering and science at the University of Jaume I in Spain. The project has resulted in a process for producing machine-readable and machine-verifiable language based on XML that is able to translate raw data. Guidelines can now be used by doctors as a rather simple, and easily accessible, decision-support system. Protocure II is expected to underpin a movement toward true "living guidelines" that could be changed as quickly as medical advances occur. The implementation of guidelines must be done by IT specialists, presenting a momentary problem, but Marcos says a future project may take on this issue.
Click Here to View Full Article
to the top


It's the Next Best Thing to a Babel Fish
New Scientist (10/26/06) Biever, Celeste

Carnegie Mellon University researchers have improved upon a prototype system that can translate unspoken Mandarin Chinese words into synthesized speech in English or Spanish. Though the sub-vocal speech recognition system demonstrated in October 2005 could only translate about 100 words, speech researcher Tanja Schultz and colleague Alex Waibel have now developed software that will allow the system to recognize a potentially limitless lexicon. The software is designed to recognize words as well as phonemes and their order of placement, enabling the system to determine the likely sequence of unvoiced words it does not understand or recognize. Schultz plans to integrate the phonemes recognition software with the system once improvements have been made to the phonemes sequence accuracy rate of 62 percent. "The ultimate goal is to be in position where you can just have a conversation," CMU speech researcher Alan Black says of the system, which does not require users to speak out loud and push a button to play the translation. CMU's automated device is designed to detect electrical signals in the face and throat muscles as the user mouths words.
Click Here to View Full Article
to the top


'Thinking' Computers Get Creative
Chicago Tribune (10/26/06) Van, Jon

Although human-like intelligence is now being simulated by supercomputers, the definition of true artificial intelligence, and how it will be achieved, is not set in stone. Stephen Thaler's Imagination Engines has developed machines that can compose music, create consumer products, and advise federal agencies. Thaler, who calls his computers contemplative and deliberative, thinks he has achieved AI, while other computer scientists say true AI is still decades away. The next step, many believe, will be computers that can have original ideas and work alongside human scientists as colleagues. IBM's Blue Gene, another example of a thinking machine, is being used at the IBM computational biology center, where it is able to create models suggesting cell functions. "It's not giving me something that someone already knows, but in greater detail," says Ajay Royyuru, senior manager at center. "It's actually giving me something completely different that no one had a clue about." Blue Gene once suggested that water plays a role in the reaction in our brains that allows us to perceive light, which had never been theorized, but after investigation it was found to be most likely true. Thaler's machines are neural networks, electronic circuits configured by hardware and software to emulate the human brain, able to learn through trial and error. The machine "gets smarter and smarter:" it is equal to the human thought processes, claims Thaler. Kristian Hammond, co-director of Northwestern University's intelligent-information computer lab believes machines will one day have human intelligence, but not from the inspiration to do just this, but by countless small progressions intended to increase the computer's utility.
Click Here to View Full Article - Web Link May Require Free Registration
to the top


NIST to Certify Voting Machine Security, Standards
eWeek (10/26/06) Rash, Wayne

The U.S. National Institute of Standards and Technology (NIST) will aid the federal Election Assistance Commission (EAC) in its efforts to verify that electronic voting machines meet federal standards. NIST will assist the EAC in creating standards that vendors of e-voting machines must comply with, as they submit their products for testing with private laboratories. "NIST will address security and wireless access," says Brian Hancock, director of voting systems certification for the EAC. Other standards exist such as for usability, performance, and accessibility, and NIST will also focus on these areas as well. Hancock says the EAC wants NIST to concentrate on developing tests, which will be carried out by private labs, that are transparent. Meanwhile, Ian Piper, a representative of the Election Technology Council of the Information Technology Association of America, who is also director of compliance for vendor Diebold Election Systems, says the EAC needs to make testing standards more consistent and stop changing requirements all the time. Over a third of U.S. voters will cast their ballots on e-voting machines this year, says EAC Chairman Paul DeGregorio. For information about ACM's e-voting activities, visit http://www.acm.org/usacm
Click Here to View Full Article
to the top


Sensor and Sensibility
ITBusiness.ca (10/24/06) Buckler, Grant

New uses for microelectronic sensors are being envisioned, but the gap between knowledge of these devices and their uses must be kept in mind for progress to be made. At this week's CMC 2006 Annual Symposium, keynote speaker Dr. Allesandro Cremonesi called the potential for microelectronics being applied to different technologies "more than Moore." The convergence he speaks of applies to innovations such as digital cameras that combine electronics and optics in a single system on a chip. Combined electronics with fluidics and biotechnology can be used in health-care technology, such as sensors that monitor vital signs and integrated analysis tools. Cremonesi pointed out the ability of sensors to foresee problems in cars so they can be addressed before causing a breakdown. He sees integrated microsystems making the same type of preventative monitoring possible for our bodies. Although the potential for the use of convergence in health care exists, Boneza Kaminska, Canada Research Chair in wireless sensor networks at the Simon Fraser University School of Engineering Sciences, says that engineers' lack of understanding the needs of medicine presents a stumbling block. In her own work, Dr. Kaminska tried the latest wireless sensors, but found older, bulkier analogue equipment more useful. Despite the equipment passing every test, the data obtained by the digital devices "started to drift" in real world applications, and was useless. Kaminska calls this an example of technology professionals being more concerned with testing the equipment they develop than understanding in-depth what the end users really need. Despite shortcomings by developers, Cremonesi predicts a new frontier in microsystems, as a shift is made from information and communications to efforts that could prolong human life.
Click Here to View Full Article
to the top


Honey Bee Genome Holds Clues to Social Behavior
University of Illinois at Urbana-Champaign (10/23/06) Kloeppel, James E.

Researchers at the University of Illinois at Urbana Champagne hope to gain insight into the molecular basis of human social behavior through the study of honey bees. The team set out to locate social cues in the genome of honey bees, a form of pressure that causes bees to change their function in response to the hive's needs. "The honeybee has been called a model system for social behavior," says Saurabh Sinha, a computer science professor and an affiliate of the school's Institute for Genomic Biology. He explains that "by studying the social regulation of gene expressions, [the team] hope[s] to extrapolate the biology to humans." Social cues are caused by genes being turned on or off by DNA strings that can bind certain molecules known as transcription factors; when a certain site is bound by the right transcription factor the gene is turned on, and turned off when the site is unbound. Using a computer algorithm, Sinha's team was able to scan 3,000 genes and employ statistical techniques to research certain transcription factors associated with genes that were in different states, either turned on or off, between nurse bees and foragers. "We found five different transcription factors that showed a statistically significant correlation with socially regulated genes," says Sinha. The results of the study imply that honey bees may be useful in understanding the functions by which social factors regulate gene expression in the human brain.
Click Here to View Full Article
to the top


Deficit of Young IT Minds Can't Fill Demand
Des Moines Register (IA) (10/22/06) Elbert, David

The United States is not turning out enough high school students who are interested in studying information technology and college students who are interested in pursuing IT-related careers, according to Iowa State University IT security expert Doug Jacobson. As a result, employers and technology companies may not be able to fill their need for IT workers in the years to come. About five or six years ago, people started believing IT employment had bottomed out, Jacobson says. At the time, there was "sort of a triple witching hour," says Jacobson, which involved the Y2K fizzle, the dot-com crash, and fear that IT jobs would also be overrun by outsourcing. News reports of technology companies going out of business or downsizing gave students across the country the impression that the prospects for a career in IT were limited, and young people were no longer interested in studying computer science, software engineering, or other IT fields, he says. However, technology is a field in which innovation continuously sparks new opportunities. Today, big financial services continue to add IT workers, and local tech companies continue to expand.
Click Here to View Full Article
to the top


U.S. Control of Internet Remains Touchy
Associated Press (10/26/06) Gatopoulos, Derek

About 1,200 attendees are expected at the first Internet Governance Forum to be held in Athens starting Monday. A key topic at the forum is sure to be the U.S. Commerce Department's extension of its memorandum of understanding with ICANN. "Concerning ICANN...we believe, like the European Union, it should slowly become independent, and not to be subject any government influence," says Greek Transport Minister Michalis Liapis. "We would like to see ICANN become autonomous and work under the rules of the free market. And I think that is the direction we are headed." Another topic will be the perceived need for more domain names written in non-Latin characters, an issue, warns event organizer and special adviser to U.N. Secretary-General Kofi Annan Nitin Desai, that could fracture the Internet if not addressed to the liking of countries such as China, where most people do not know the Latin alphabet and where use of the Internet is booming. Liapis said he hoped that Greece's hosting of the event would eventually boost broadband penetration in the country, now only at 3 percent, the lowest in the E.U. excluding the nations that joined two years ago.
Click Here to View Full Article
to the top


Australia Cannot Economically Sustain ICT Gender Imbalance
Computerworld Australia (10/24/06) Rossi, Sandra

Australia will need to attract more women to information technology if the nation wants to have a competitive advantage in the global market, suggests international leadership expert Dr. Catherine Norton. Women account for about 20 percent of the nation's ICT workforce. Norton is scheduled to deliver a series of workshops on the leadership style of women in November in Brisbane, Perth, Melbourne, and Sydney. The Australian Women in Science and IT Entity (AWISE) and the Australian Government Office for Women are supporting and funding the workshops, which will address the communication, organization, and analytic skills that women bring to IT and science. Also next month in Sydney, researchers will discuss the paper "Women and Men in IT: Breaking Through Sexual Stereotypes," which addresses the factors that determine interaction in the workplace. The presentation will also focus on the impact of gender difference on high-performing teams, and how workplace leaders can get the most out of gender diversity.
Click Here to View Full Article
to the top


Ubiquity Interviews USC's Dr. Alice Parker
Ubiquity (10/24/06) Vol. 7, No. 41,

University of Southern California electrical engineering professor Dr. Alice Parker's primary area of interest these days is constructing a synthetic cortex, a challenge that involves studying the sensory inputs that engage the cortex. "We are looking at models of the neuron that take into account complex aspects of neural behavior, in the interest of producing accurate models, and models that are flexible enough to model changes in neural behavior under different circumstances," she explains. Parker notes that nanotechnology--carbon nanotubes especially--is particularly promising as an enabling technology for a synthetic cortex. The USC electrical engineering professor says her current research focus is rooted in her first interest, which was building neural chips and neural network chips. Parker notices that it is more common for doctoral students to be motivated by the desire to solve problems or improve the world by contributing to technology, while masters' students tend to think in terms of their career prospects; she partially attributes this mindset to a lack of independent thought that is institutionalized in grades K through 12. Bright students in resource-scarce schools would certainly benefit from distance learning, although Parker remarks that the sector lacks software and system technology to facilitate optimal interaction between distance students and on-campus students at a reasonable price. She says the Internet has greatly expanded the potential for student collaboration and made research publications more readily available. "I think some of the technologists are going to need to focus on software and applications to figure out how can we best support the software enterprise, because it's a critical one and it's one that is very difficult to envision proceeding the same direction it's been going," Parker argues.
Click Here to View Full Article
to the top


Ballbots
Scientific American (10/06) Vol. 295, No. 4, P. 72; Hollis, Ralph

The ballbot is a robot that uses a spherical drive wheel design to fulfill one of the key criterions of interaction between humans and intelligent mobile machines, which is for the machines to maintain balance and move about gracefully. The majority of current experimental mobile robots have wide wheelbases, which can interfere with their movements in crowded environments with a large human presence. The tall, slender ballbots, on the other hand, can move quickly in any direction. This could be the flexible locomotion methodology that is necessary for future robots to interact with people in their daily lives, writes ballbot designer Ralph Hollis of Carnegie Mellon University's Robotics Institute. The ballbot taps major recent breakthroughs in computing, fiber-optics, and microelectromechanical systems (MEMS) that have facilitated the creation of inexpensive devices that mimic the traditional spinning gyroscope's function. The machine features orthogonally mounted fiber-optic gyroscopes and accelerometers to sense motion in the pitch, roll, and yaw directions and produce the vertical orientation data needed for maintenance of balance, while motive force is supplied by the drive ball mechanism; the ball is turned by motorized drive rollers, the ballbot's travel is measured by optical encoders, and the machine deploys tripod legs to stay upright when deactivated. The ballbot's vertical direction is determined by orientation sensors, and this direction is then compared with the machine's current attitude. The ballbot's developers plan to add a pair of limbs and a head with binocular vision.
Click Here to View Full Article - Web Link to Publication Homepage
to the top


First Steps in the Verified Software Grand Challenge
Computer (10/06) Vol. 39, No. 10, P. 57; Woodcock, Jim

Industrial and academic researchers believe it is feasible to use formal techniques to ensure the productivity and reliability of software design, development, integration, and maintenance, and the international computer science community has made a commitment to realize such a vision within the next 15 to 20 years by creating an integrated, automated toolset developers can use to determine the correctness of software. This mandate is called the Verified Software Grand Challenge. The goals of the Grand Challenge are to set up a unified program construction and analysis theory, construct a comprehensive and integrated set of tools that support verification activities, and compile a repository of formal specifications and verified codes. The development of mature tools and standards via community collaboration will consume the first five years of the project, while the results of experiments will be accumulated and progress evaluated through the Verified Software Repository. The willingness of the verification community to engage in collaborative and competitive projects was demonstrated by the Mondex case study, which will be followed by pilot projects of greater scope and sophistication. An ideal pilot project is complex enough to make traditional techniques of assessing correctness inapplicable. It is also simple enough for specification, design, and a committed team to complete the verification in two years. Furthermore, the ideal pilot project has an impact outside of the verification community, uses freely available existing documentation, and complies with diverse approaches.
Click Here to View Full Article - Web Link to Publication Homepage
to the top


To submit feedback about ACM TechNews, contact: [email protected]

To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to [email protected] with the line

signoff technews

in the body of your message.

Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@ acm.org

We will remove your name from the TechNews list on your behalf.

For help with technical problems, including problems with leaving the list, please write to: [email protected]

to the top

News Abstracts © 2006 Information, Inc.


© 2006 ACM, Inc. All rights reserved. ACM Privacy Policy.