Read the TechNews Online at: http://technews.acm.org
ACM TechNews
December 29, 2006

MemberNet
The ACM Professional Development Centre
Unsubscribe

Welcome to the December 29, 2006 edition of ACM TechNews, providing timely information for IT professionals three times a week.

Sponsored by
Learn more about Texis, the text-oriented database 
providing high-performance search engine features combined with SQL 
operations and a development toolkit, that powers many diverse 
applications, including Webinator and the Thunderstone Search Appliance.
Learn more about Texis, the text-oriented database providing high-performance search engine features combined with SQL operations and a development toolkit, that powers many diverse applications, including Webinator and the Thunderstone Search Appliance.


HEADLINES AT A GLANCE:

 

Does I.T. Still Attract the Best and the Brightest?
NewsFactor Network (12/22/06) Ortiz Jr., Sixto

In response to the question of whether IT is once again luring the top minds after a long slump, Challenger, Gray, and Christmas CEO John Challenger answers that the IT job market is "mixed," noting that a third quarter rise in tech-sector job cuts is indicative "that companies are downgrading their outlook for the current year." Robert Half Technology executive director Katherine Spencer Lee has a more positive outlook, citing market growth driven by slight but notable pay raises. Hot areas in the IT marketplace named by Challenger and Spencer Lee include information security, software applications development, project management, Web development, and data warehousing; enthusiasm is waning for database administration, help/support desk staff, and other routine functions that can be easily offshored, according to Challenger. "It's interesting that IT workers are concerned about their jobs being outsourced while, at the same time, managers are concerned about finding enough quality talent," observes Spencer Lee, who says professionals capable of combining business savvy with IT knowledge will snap up the jobs that stay at home. To achieve success in the current IT job marketplace, prospective IT pros must realize that they can never stop learning and improving their skills, and that they must be flexible and diverse in their abilities. "Before your skills become obsolete, you want to be able to transform yourself into the 'next version' of worker that will be in demand," explains Challenger.
Click Here to View Full Article
to the top


Multicore Faces a Long Road
EE Times (12/28/06) Merritt, Rick

Not only did the electronics industry gain an understanding of the significance of multicore technology in 2006, but it realized just how much work is yet to be done. Multicore CPUs and embedded multicore systems arrived in 2006, and the number of cores on a die took the place of megahertz as the metric for microprocessors, all of which led to the acceptance by software developers "that programming as they knew it is not going to be the same any more--they will be doing parallel programming going forward," according to parallel processing pioneer and MIT professor of electrical engineering and computer science Anant Agarwal. Computer scientists must address the lack of "algorithms, languages, compilers, and expertise" that faces parallel computing, says Microsoft Research manager of programming and tools Jim Larus, as well as "a lot of practical issues, like developing better support for multithreading, synchronization, debugging, and error detection." Larus also points out that a better understanding is needed of just how people want to use parallel programming. While some in the industry want to create automated tools to transfer legacy code to multicore, parallel programming languages will be needed, since work must get down to the algorithm level. No fundamental methods for parallel programming have been established, and researchers have found that no single technique for parallel programming is universally applicable, but possibilities are being explored, such as lightweight software transaction. The Multicore Association (MCA) has been formed to address the many problems facing the field, and the Embedded Microprocessor Benchmark Consortium (EMBC) has begun developing a standard suite of tests to evaluate the performance of multicore processors.
Click Here to View Full Article
to the top


UC Tech Funding Proposed
Sacramento Bee (CA) (12/28/06) Benson, Clara

California Gov. Arnold Schwarzenegger has added $95 million to his state budget proposal for technology research initiatives at several University of California universities, administrations officials announced on Wednesday. Schwarzenegger wants to make the state "number one in everything," says his communications director Adam Mendelsohn, who adds, "California is poised to be the leader in nanotechnology and ... green technology." Most of the research produced by these initiatives would be open source; some of the money would go to partnerships and private concerns attempting to create marketable products, but UC officials said no tax dollars would be spent on this proprietary research. "This is about two things," said executive vice president for university affairs Bruce Darling. "Building the kind of research and human capital pool that will sustain California well into the future, and making sure those innovations and technologies are translated into the marketplace." The Helios Project, which conducts research on sustainable energy, would get $30 million according to the Governor's plan, a BP project to create an alternative energy research institute would get $40 million, the California Center for Science and Innovation, a partnership between the university and private companies, would get $19.8 million, and the Lawrence Berkeley National Laboratory, the Lawrence Livermore National Laboratory and UC San Diego would receive $5 to help them compete for a $200 million federal grant for the construction of a Petascale computer, which would be the world's fastest.
Click Here to View Full Article
to the top


Takahashi: 10 Tech Trends of 2007
San Jose Mercury News (CA) (12/25/06) Takahashi, Dean

Staff members at the San Jose Mercury News gathered to make predictions of technology trends to emerge in 2007, some of which are simply continuations of predictions for 2006. Users will continue to have increasing control over technology and content, thanks to user-dependent technologies such as Digg, YouTube, Wikipedia, and the iPod. Applications such as games, social networks, rich media, and even GPS, will be designed specifically for cell phones, leading to their increased use as a multimedia tool. Microsoft's Vista will provide enhanced reliability, security, and compatibility, but since most business will wait for bugs to be worked out, it will not be ubiquitous for a few more years. Nintendo's Wii and DS have introduced a new audience to gaming, and the rising popularity and availability of "casual" games could make them a much bigger part of our lives. Privacy will decrease as a result of government spying, more records being kept online and on unsecured computers, and users of social networks divulging more personal information. Solar energy will be utilized more than ever, although entrepreneurs may not reach their goal of making solar thin-film technology available to the average consumer. IPTV will bring the potential of accessing hundreds of movies and TV shows on demand, and other movie downloading services will contribute to unprecedented availability. LED technology is entering the home, and many other venues, via LED bulbs that fit into traditional sockets, produce the same light as traditional bulbs, use far less energy than even fluorescent bulbs, and outlast both. As cell phones become equipped with GPS chips as a result of a federal requirement, locating others will become possible, and searches could be conducted based on a user's current location.
Click Here to View Full Article
to the top


Computer Warming a Privacy Risk
Wired News (12/29/06) Norton, Quinn

Cambridge University researcher Steven J. Murdoch has found a method for bypassing online anonymity systems by analyzing a computer's temperature over the Internet. The technique utilizes the phenomenon called "clock skew," where precise clocks in computers drift away from the correct time at varying rates, depending on heat. Every crystal has a unique clock skew, Murdoch says. A UCLA Ph.D. student displayed the ability to use clock skew to identify computers on the Internet through charting the timestamps of a machine's traffic, but this technique can get at best 64 fingerprints: a thousand computers connected in a network would contain 16 with identical clock skews. Murdoch became the first person to successfully carry out an anonymity attack online. He attacked Onion Router, or "Tor," a privacy system that allows users anonymous Internet access. He established a Tor network at Cambridge to try out his method. Murdoch says that in order to get the IP address of a hidden server on a Tor network, an attacker would request something complicated from the server, causing it to warm up, resulting in clock skew. The attacker then looks at computers he thinks may be the Tor server, searching for a change in skew over a few hours. He has found his match when he locates a computer with the specific change in its timestamps. Murdoch admits that it's not the ideal attack, but " it's a guide to what could be done in the future."
Click Here to View Full Article
to the top


Real Robots
Toronto Star (12/26/06) Gerson, Jen

A World Robotics Survey predicts that there will be four million robots in service by the end of 2007, and experts expect functional robots to be on the market within a decade, but robots are still far from being able to seamlessly interact with humans. Honda's ASIMO robot is able to recognize and react to human faces and postures, shake hands, climb stairs, and run. Stephen Keeney, one of the ASIMO project leaders, says, "We need a robot that can truly be useful in our world;" the goal behind the project is to produce robots that can provide aid to those confined to a bed or chair. Maria Bualat, leader of the NASA Ames Research Center's intelligent robotics group, says that while today's robots show progress, much more research is needed. She says, "You can tell it to go to an X and Y co-ordinate on a map and it will understand. But ask it to `go to my left' and it won't." Rather than making people adapt to robots, she wants to create robots that can operate in the unpredictable human world: "Getting the robots to gauge intent is still a bit of a leap. The robot has to be able to gauge where the human is, and to understand what we want it to do next." Robots that look exactly like humans are being designed for tasks that require interaction with humans, as they are thought to be better received by people, although the idea of the "uncanny valley" states that once they become life-like to a certain point, they will make people uneasy. Roboticist David Hanson is an outspoken advocate of making robots resemble humans as much as possible, as the Baby Boomer generation is on the verge of needing nursing care. He predicts that, "The computational and software capabilities (of robots) are going to be beyond human capability by 2025." Hanson views giving robots human faces as taking the invaluable step of "planting the seeds in technology of compassion and wisdom."
Click Here to View Full Article
to the top


Yahoo Research Goes Beyond Computing to Social Science
IDG News Service (12/28/06) Ribeiro, John

Yahoo Research has established a microeconomics department to look into how the company's products can deliver maximum value in addressing the needs of users, advertisers, and the company itself. Ethnographers, cognitive psychologists, and sociologists have been hired to develop media formats that will lead to the establishment of online communities. This interest in social communities has led to work on middleware technology specially suited for social networking, as the relational databases that were previously used for this purpose are better suited for business applications. Another aim is to achieve task-centric searching that is not keyword-based; instead it would analyze free text descriptions given by users in order to provide more helpful results. Yahoo head of research Prabhakar Raghavan says, "We have to get much smarter to understand and define the user's intent and deliver to that intent." A Yahoo research lab is being established in India, which will employ both computer scientists and staff trained in humanities-related disciplines such as economists and sociologists.
Click Here to View Full Article
to the top


New Program by UMass Amherst Computer Scientist Prevents Crashes and Hacker Attacks
University of Massachusetts Amherst (12/26/06)

A new program, named DieHard, has been developed by University of Massachusetts Amherst computer scientist Emery Berger and Microsoft researcher Ben Zorn to remedy problems caused by programming that doesn't make proper use of the large amount of memory on today's computers. While running, programs request chunks of memory space to store items such as images, but often items will be assigned a space that is already occupied, or space that is not large enough, causing overflows into other spaces. The result of these mistakes can be a crash, or worse. "Ironically, crashing is the best thing that can happen," says Berger. "An overflow also can make your computer exploitable by hackers." Another danger is that the location that a password is given can be the same for every version of a given program, allowing a hacker who has overwritten a password to find this address on all existing versions. To prevent these dangers, DieHard distributes groups of memory, assigns random addresses to items during each session, launches several versions of a program being run in case one starts to crash, and detects the probability that a certain bug has affected a user. Berger blames the current problems on programmers who are too worried about speed and efficiency, at the expense of security. "Today we have way more memory and more computer power than we need," he says. "We want to use that to make systems more reliable and safer, without compromising speed." Free versions of DieHard are available for non-commercial use for both Linux and Windows.
Click Here to View Full Article
to the top


Google's Open Source Airbag
InternetNews.com (12/27/06) Kerner, Sean Michael

Google is in the later stages of developing Airbag, a set of client and server components that can identify the cause of an application crash. The open source project contains client-side libraries that generate dumps and help send them to a crash server. A server-side library looks at the crash dumps and transforms them into information that can be used for debugging. Components can be taken from the project's Subversion (SVN) source control code repository. A tarball, a compressed archive of application files, is planned for release once Google feels the product is ready for the public. Google Software engineer Mark Mentovai says, "Because our project is so developer-centric, we don't feel compelled to provide a tarball too soon--the portion of our target audience that's comfortable with using in-development software is most likely also comfortable with source control systems like Subversion." Multi-form capability, among other things, is expected to be included in a Airbag 1.0 release. "For 1.0, we imagine that we'll be stable on all of our target platforms--Mac ppc, Mac x86, Windows x86, and Linux x86," Mentovai noted. Although there's no formal roadmap for the project, Mentovai says the informal mission statement "is to provide a set of crash reporting libraries that can be integrated into a large project, namely, Firefox." Mozilla has been discussing the possibility of incorporating Airbag into a new crash reporting system.
Click Here to View Full Article
to the top


Cybercrooks Deliver Trouble
Washington Post (12/27/06) P. D1; Krebs, Brian

A record-breaking rise in spam and more sophisticated cyberattacks were noted this year by computer security experts, who only expect worse things next year. "Criminals have gone from trying to hit as many machines as possible to focusing on techniques that allow them to remain undetected on infected machines longer," says Symantec's Vincent Weafer, while Postini estimates that over 90 percent of all email sent online in October was spam; computers controlled by cybercrooks, or "bots," are responsible for relaying a great volume of junk email. "We're getting an unprecedented amount of calls from people whose email systems are melting down under this onslaught," says Postini's Daniel Druker. Beyond Security's Gadi Evron reckons that at any given time there are 3 million to 4 million compromised computers actively relaying spam, while millions more are used to launch distributed denial-of-service attacks. In addition, he believes organized criminals will net about $2 billion in 2006 via "phishing" scams. Experts are also signaling that online crime is becoming a full-time venue for many, as evidenced by a movement of online criminal activity from nights and weekends to weekdays. Furthermore, experts are seeing an increase in the sophistication of techniques cybercriminals are using to dodge anti-fraud initiatives. Attacks that exploited flaws in software applications that operate on top of operating systems were also a notable development this year, as were increasing numbers of zero-day software vulnerabilities.
Click Here to View Full Article
to the top


NEH, Google Boost Internet Coding Project
UC Berkeley News (12/20/06) Maclay, Kathleen

Almost $300,000 in new funding from the National Endowment for the Humanities and from Google will allow a UC Berkeley project to continue work that is allowing users of native scripts to use the Internet. The Script Encoding Initiative (SEI) began four years ago and has encoded over 20 writing systems. The initiative plans to tackle eight scripts in 2007, and a similar number in 2008. Worldwide, there are over 80 writing systems not yet in the international character-encoding standard Unicode, half of which are used in languages spoken by linguistic minorities across the globe. These people must use nonstandard fonts that make Internet use extremely difficult, if possible at all. Deborah Anderson, a researcher in UC Berkeley's Linguistics Department and head of the SEI, says, "For scholars working with obsolete computing technologies, valuable data is destined for the electronic dustbin unless they are updated to modern computing standards. However, with these scripts in Unicode, accurate searching across the Web will be possible, and materials will be saved in a standardized format that will remain accessible for many years to come." The project aims to establish fonts for modern scripts that can be quickly utilized, as well as to discern the local conventions of each language, such as standard date, time, and currency formats, allowing the creation of software that is specific to a given tongue and the places it is used. Experts predict that given the slow pace of encoding, over 40 scripts will still not be coded in 10 years.
Click Here to View Full Article
to the top


UI, Berkeley Teams Test Program for Sharing Virtual Stage
News-Gazette (12/26/06) Kline, Greg

Researchers at the University of Illinois and the University of California, Berkeley have created Tele-Immersive Environments for EVEryone (TEEVE), an immersive 3D video-conferencing system that allows users to interact with 3D, rendered versions of each other in a virtual space. TEEVE was used in a 40-minute dance performance in which two groups of dancers located across the country from each other collaborated using big screens at two different locations, and smaller screens connected via Webcast. TEEVE data is collected by filming action and then breaking down its individual elements, such as eye movements. In combination with technology that allows this information to be coded and searched automatically, the 3D view produced by the system could represent a breakthrough in the field, and could be applied to gaming, physical therapy, and limitless other uses. There are still improvements to be made, but the dance demonstration shows the researchers' success in bringing together consumer products such as cameras and PCs with techniques developed by computer scientists that include efficiently transferring large amounts of video data across a network.
Click Here to View Full Article
to the top


Crowd Wisdom vs. Google's Genius
BusinessWeek (12/27/06) Holahan, Catherine

Jimmy Wales, founder of Wikipedia, believes the same "wisdom of crowds" philosophy that has accounted for the success of Wikipedia can be applied to a search engine. The proposed search engine, Wikiasari, would present users with a list of sites turned up by their search, using technology similar to Google's, but Wikiasari would then allow them to re-rank the results in order of usefulness. Servers would then record these new results as well as the original query, applying them to future searches. Wales does not downplay the importance of algorithms in the search process, but insists that they need the help that only human intelligence can provide in order to be as efficient as possible. Wikiasari will be based on Apache open-source Web search software, and Wales will make the code publicly available. He does not expect Wikiasari to be an immediate Google-killer, as Wikipedia took approximately three years to grow into a truly useful tool. The version released in 2007 will serve as "starting point for people to play with," Wales says. While Wikipedia has always been a nonprofit, Wikiasari will be for-profit, but Wales points to the success of Red Hat as proof that contributors will not be alienated by being asked to help a company make money: "It's all about free licensing and sharing your work with others. [Contributors] don't care about people making money; they care about people taking their work and locking it up." The idea of using human intelligence in a search tool is not a new one: StumbleUpon allows users to see which sites have been rated favorably by users of other search engines such as Google, Yahoo, or eventually Wikiasari.
Click Here to View Full Article
to the top


Grid Computing Moves From Research to Industry
Cordis News Service (12/21/06)

The 3rd "GRIDS@WORK" event was held in Sophia Antipolis, France, from Nov. 27 to Dec. 1, hosting over 200 delegates from 25 countries who discussed industrial requirements concerning the implementation of grids as the driving force behind tomorrow's "network-of-networks." The event was put together by ETSI, INRIA, the European Network of Excellence CoreGRID, and ECRIM, who led the event. The central theme of the GRIDS@WORK week was how grids will be central to the creation of jobs and commercial products that target the enterprise market, promoting grid sharing initiatives that will establish a service-oriented infrastructure for business, industry, and society that is similar to a utility. Franco Accordino of the European Commission said, "Now we are in an evolutionary phase where industrial partnerships have been established to exploit the economic potential of the grid beyond research labs." The ETSI GRID Technical Committee has taken up the task of setting formal standards for Europe and testing specifications for grid interoperability. Many involved predict that Europe's advancements in the use of grids will serve as a "lighthouse" for the rest of the world. ECRIM's Bruno Le Dantec, head of CoreGRID's Administrative and Financial Coordination, said, "Through the organization of such an event, our Network of Excellence is advancing further towards sustainable integration by involving industrial stakeholders in defining strategies to achieve economic impact, becoming the European-wide research laboratory in distributed grid, peer-to-peer, and service-oriented technologies."
Click Here to View Full Article
to the top


Brazil Makes Strides in Software
OhmyNews International (12/22/06) Rix, Antonio Carlos

Brazil is experiencing significant growth in its international software trade, and hopes to continue increasing its global standing in the field. Not only are many Brazilian software companies exporting, but multinational companies are investing in the nation: IBM has opened development offices in there, and Dell, Motorola, and Hewlett-Packard, among others, have R&D facilities in Brazil, according to Eduardo Victor, director of a Brazilian software company specializing in foreign trade operations. Victor also points out that Brazil produces world-class banking software, which, along with outsourcing, is the country's leading software export. He suggests an engineering exchange program that would benefit Brazil, other participating nations, and the engineers themselves; he is currently looking for people interested in the program. Victor and co-worker Menotti Franceschini say that Brazil has many universities with quality software engineering and telecommunication departments. They say the country is also full of "good professionals" and has "a stable economy now, and very competitive costs."
Click Here to View Full Article
to the top


Lessons for the Mentor
CIO Australia (12/11/06) Kunkel, Barbara

Barbara Kunkel, CIO of a national law firm and member of the CIO Executive Council, understands the need to help young people interested in IT develop their potential, and has created a summer university internship program to provide much-needed resources to her department, while helping young women get a foothold in IT. She lists five lessons she has learned from her work with the interns: Assignments given to interns must be clearly connected to the overall work environment and objectives so interns are constantly reminded that their work makes a difference; teams are preferable to working alone for interns; interns will get more out of their work if they are challenged to think creatively; communication is a top priority, as young people respond to feedback; and a social environment in the work experience is extremely important. Kunkel used these concepts to sculpt a "work curriculum," similar to that of a college course. By linking assignments with objectives, she could see the interns' confidence and creativity flourishing, despite their being intimidated by the scope of the task set in front of them. Each week Kunkel met with interns to talk about expectations. Kunkel also demanded communication from the interns in the form of a weekly email, discussing their current assignment, as well as emails introducing themselves to the entire IT department. She claims her experience proves that effective mentoring is an undeniable way to nurture talent, calling it "one of the highlights of my career."
Click Here to View Full Article
to the top


Making the Move to Multicore
SD Times (12/15/06)No. 164, P. 22; Morgan, Lisa L.

Designers of embedded and enterprise systems are interested in multicore architectures, which offer less power consumption and heat dissipation because multicore processors function at lower frequencies than unicore processors. Other advantages of a multicore architecture include faster speed, parallelism, and lower hardware and cooling costs. Most RTOS vendors support both Asymmetric Multiprocessing (AMP) and Symmetric Multiprocessing (SMP), while some blend the best features of AMP and SMP in a third mode known as Bound Multiprocessing (BMP). SMP's chief advantage is higher processing power than unicore processors, and small-scale embedded systems in need of a performance upgrade are best suited for SMP, according to Green Hills Software CTO David Kleidermacher. On the other hand, Wind River Systems CTO Tomas Evensen says SMP's ability to control all cores with just one operating system is ideal for larger enterprise systems, and he expects more AMP systems to penetrate the embedded domain because of their suitability for dedicated tasks. AMP allows the dedication of OSes, tasks, and peripheral usage to a single core on an as-needed basis, which some say simplifies the move from unicore to multicore designs in terms of debugging. BMP, meanwhile, can facilitate control of all cores by one OS while simultaneously enabling the dedication of tasks or resources to specific cores, which reduces overhead and boosts performance. Evensen says the mode varies for each application.
Click Here to View Full Article
to the top


Old File Formats Battle Extinction Threat
Techworld (12/19/06) Mellor, Chris

Several national libraries, research institutes, and IBM and Microsoft have formed Preservation and Long-tern Access through NETworked Solutions (PLANETS), with European Union financial support, to prevent a threatened vanishing of electronic document file formats that have fallen out of use. If the problem is not addressed soon, documents written in old applications will no longer be readable. Adam Farquhar, head of e-architecture at the British Library, which is leading the PLANETS Project, says, "As past and current computer hardware and software becomes obsolete, digital information reliant on this technology becomes increasingly hard to find, view, search and re-use. There is a growing consensus on the need to act now to avoid a gaping hole in our cultural and scientific record." PLANETS estimates that out of the 100 million documents produced in the EU each year that are worth saving, 2 million are in formats that are at risk of being lost, which means that millions of Euros worth of information is at risk. The IBM concept of a Universal Virtual Computer is being considered by PLANETS. The UVC is based on a paper by Raymond Lorie of IBM's Almaden Research Center, which states that "an application program written today would generate a data file, which is archived for the future. In order for the file to be understood at a later date, a program P would also be archived, which can decode the data and present it to the client in an understandable form. Program P would be written for a UVC machine. ... In the future, the UVC Interpreter interprets the UVC instructions that emulate the old instructions; that emulation essentially produces an equivalent of the old machine, which then executes the original application code. The execution yields the same results as the original program." The UVC offers a platform independent layer that would assure that the programs developed for it would run anytime, past or future.
Click Here to View Full Article
to the top


Work-Life Balance
Economist (12/19/06) Vol. 381, No. 8509, P. 97

Many organizations are coming to the realization that some Internet-based services created by the consumer technology industry are more capable of meeting their needs than those developed by their own IT departments. Employees have been using services such as Google Mail and Skype for some time, often against company regulations; but now these services for which no training is needed are being condoned and even promoted for their superior usefulness. A huge company such as Google is far more capable of making improvements on its Web-based software than an in-house IT staff, explains Arizona State head of IT Adrian Sannier, who has begun allowing students to take their "asu.edu" addresses to Gmail. He compares the advantage offered by Google's software to "receiving technology from an advanced civilization." Students can share calendars and coursework using the online word processing and spreadsheet tools offered by Google, and the only cost for the school is for support. Security is also an incentive to defer to Google, despite fears of placing data in the hands of another party: Sannier says he would only be able to have a staff of 30 dedicated to security, while "Google has an army; all of their business fails if they are unable to preserve security and privacy." A bundle known as "Google Apps for Your Domain," which includes a calendar and instant messaging, is currently in the beta-test stage, but Google enterprise division boss Dave Girouard claims that "tens of thousands" of organizations have expressed interest in replacing some of their current software systems with the suite. Though many companies will probably keep "mission critical" software in-house for the time being, some experts point out that many security threats are simply a result of traditional software firms being afraid of losing business.
Click Here to View Full Article
to the top


To submit feedback about ACM TechNews, contact: [email protected]

To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to [email protected] with the line

signoff technews

in the body of your message.

Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@ acm.org

We will remove your name from the TechNews list on your behalf.

For help with technical problems, including problems with leaving the list, please write to: [email protected]

to the top

News Abstracts © 2006 Information, Inc.


© 2006 ACM, Inc. All rights reserved. ACM Privacy Policy.