ACM TechNews (HTML) Read the TechNews Online at: http://technews.acm.org
ACM TechNews
February 20, 2008

Learn about ACM's 2,200 online courses and 1,100 online books
MemberNet
CareerNews
Unsubscribe

Welcome to the February 20, 2008 edition of ACM TechNews, providing timely information for IT professionals three times a week.


HEADLINES AT A GLANCE:

 

Princeton Researchers Envision a More Secure Internet
Princeton University (02/15/08) Riordan, Teresa

Some of Princeton's top brains have divergent ideas about fortifying the security of the Internet, with Larry Peterson offering the Global Environment for Network Innovation (GENI) as a much-needed platform for investigating and validating potential security solutions. Peterson says GENI is particularly important as a tool that would allow the research community to significantly shape the Internet's future and counter industry's increasingly pervasive influence. He believes the network offers the optimum path for tackling the Internet's security challenges, arguing that "the network needs to be able to quarantine compromised machines so that we can limit their collateral damage." Edward Felten, director of Princeton's Center for Information Technology Policy, focuses on short-term, high-impact research, and is convinced that many of the Internet's security problems can be traced to how technology is used rather than the technology itself. Ruby Lee, who heads the Princeton Architecture Lab for Multimedia and Security, stresses that security should be an element of system design, and wants to embed basic security features within hardware. Her lab has demonstrated that such an innovation can be accomplished without hiking up the hardware's power consumption or impacting its performance. Felten does not agree with Peterson and Lee's contention that online security can be adequately shored up by trust features incorporated into hardware or networks, while Princeton computer scientist and GENI participant Jennifer Rexford sees advantages to approaches espoused by all three researchers. "GENI would really open up the intellectual space in thinking about the Internet," she says, even as she works on incremental security enhancements such as the improvement of routing protocols.
Click Here to View Full Article
to the top


IBM Experimenting With DNA to Build Chips
CNet (02/20/08) Kanellos, Michael

IBM scientists are researching the possibility of creating nanotube-based data storage devices and microprocessors by arranging carbon nanotubes into arrays with DNA molecules. "These are DNA nanostructures that are self-assembled into discrete shapes," says IBM scientist Greg Wallraff. "What we are really making are tiny DNA circuit boards that will be used to assemble other components." The IBM effort is based on "DNA origami" research conducted by the California Institute of Technology's Paul Rothemund. Although the technology is still in the preliminary stages, a growing number of researchers believe that designer DNA could be used to create self-assembling computer components. Self-assembly would allow the intrinsic chemical and physical properties of molecules, along with environmental factors, to guide the raw materials into complex structures. The challenge is in getting raw materials to behave in a precise and orderly manner, which is why DNA is being used. DNA consists of specific chemical bases that bind and react in somewhat predictable ways. In DNA assembly, a scientist would create scaffolds of designer DNA that are manipulated into specific shapes. When nanotubes are added to the process, interactions between the DNA and the nanotubes would cause the nanotubes to be assembled into a desired pattern. Chips made through such procedures could have features as small as two nanometers.
Click Here to View Full Article
to the top


Study Shows Women Still Face Hurdles in High-Tech Careers
Reuters (02/14/08) Cooke, Kristina

Women in the high-tech industry like their jobs, but they have more concerns about their relationship with supervisors than men, as well as men and women in other fields, according to a new Catalyst study. In addition to the way they interact with supervisors, women in IT cite the inability to offer suggestions during the decision-making process as a challenge. "In high-tech organizations people who have great technical skill often advance into managerial roles, and while these folks may be stellar technicians, they are often not given the support and training to enable them to be equally good managers," says Catalyst's Debbie Soon. Catalyst based its study on employee-satisfaction surveys from 21 global high-tech companies and an online study of nearly 500 respondents. Women often noted that their supervisors were not available when needed, did not provide regular feedback, and did not respond to suggestions. IT companies would do well to offer face-to-face training for managers and programs that focus on different leadership styles.
Click Here to View Full Article
to the top


Microsoft Giving Away Developer Software
Associated Press (02/19/08) Mintz, Jessica

Microsoft has announced DreamSpark, a program that will provide students with free access to some of the company's most popular software development tools. Microsoft Chairman Bill Gates says past efforts to create education discounts limited the number of students that could use the programs, but DreamSpark could reach as many as 1 billion students. DreamSpark will allow students to download Visual Studio Professional Edition, a software development environment; Expression Studio, which includes graphic design and Web site and hybrid Web-desktop programming tools; XNA Game Studio 2.0, a video game development program; SQL Server 2005 Developer Edition; and Windows Server Standard Edition. "It's a brilliant strategic move on the part of Microsoft," says analyst Chris Swenson. "This is one of the core audiences you have to hit if you really want to make a difference in the rich Internet application market going forward." Analysts say that distributing free copies of its tools increases the chances that a Microsoft product will be used to develop the next big Web 2.0 craze, and could also help convince a generation of programmers to move away from open source software. DreamSpark will be made available to high school students around the world starting in the fall, and to college students in other countries starting next year.
Click Here to View Full Article
to the top


Negroponte: OLPC Machine Will Be $50 in 2011, Electronics Are 'Obese'
Wired News (02/17/08) Madrigal, Alexis

One Laptop Per Child has delivered thousands of $187 laptops to children in the developing world, has 500,000 machines in its pipeline, and is producing as many as 110,000 units per month, said OLPC co-founder Nicholas Negroponte during his keynote address at the American Academy for the Advancement of Science's annual meeting. Negroponte said that OLPC will lower the cost to its target of $100 before the end of 2009, and by 2011 the price will fall to $50. He said the idea is to apply Moore's Law to pricing. "If you make anything electronic today, you know that 18 months from today it will cost you half of what it does today," he said. "But if you make [electronics], you have no interest in that product being half price in 18 months." He noted that companies add electronic extras such as cameras and MP3 players, and likened laptops to SUVs that need energy to move the vehicle rather than people. Big rollouts of OLPC computers in Peru, Uruguay, and Nigeria are scheduled for the coming months. Negroponte added that OLPC is forming partnerships and making changes that will allow other companies to come aboard and help make inexpensive laptops more widely available.
Click Here to View Full Article
to the top


Friendly 'Worms' Could Spread Software Fixes
New Scientist (02/14/08) Simonite, Tom

Microsoft researchers are working to make it easier to distribute useful pieces of information such as software updates and patches by designing the updates to behave more like computer worms, spreading from computer to computer instead of having to be individually downloaded from a central server. The research used to develop such a technique may also help defend against malicious worms. Software worms spread by infecting a computer, self-replicating, and probing computers to find a new host. Microsoft research Milan Vojnovic says that method is inefficient because the worm wastes time exploring groups, or "subnets" of computers that contain few uninfected hosts. Vojnovic and his team have designed smarter strategies. The ideal approach would be to use prior knowledge of how uninfected computers are distributed on a subnet, but a company distributing a patch after a worm attack rarely has such extensive information. To compensate, the researchers have developed strategies that would allow their beneficial worms to learn from experience. A worm starts by contacting a potential new host, and after finding one uses a targeted approach to contact other computers on the same subnet. If the worm finds many uninfected hosts it stays on the subnet, but if most computers have already been updated, it switches subnets. Software patches that spread like worms could be faster and easier to distribute, and better countermeasures can be developed by understanding how malicious worms spread.
Click Here to View Full Article
to the top


College Coders Working With IBM's Project Zero
InfoWorld (02/14/08) Kanaracus, Chris

North Carolina State University students are using IBM's Project Zero programming framework to build Web 2.0 business applications. The project includes a scripting runtime for Groovy and PHP, as well as application programming interfaces for creating representational state transfer Web services, user interfaces, and mashups. Project Zero is available as a plug-in for the Eclipse integrated development environment and in a version for developers who prefer working from the command line. Project Zero is not an open source project, although it does follow open source's community-driven model. NCSU professor Munindar Singh says Project Zero's rapid development framework has helped students focus on higher-level issues surrounding application development. IBM's Mark Hanny says the needs of the IT industry are changing. "Professors are spending a lot more time helping people at a higher level to be the architect, to be the project managers," Hanny says. "These are the jobs that are in great demand." IBM has also partnered with the University of California, Los Angeles to create a class in which computer science students choose their own Web 2.0 project and work with IBM mentors to complete it.
Click Here to View Full Article
to the top


Virtual Evolution Breeds Answers
The McGill Daily (CAN) (02/18/08) Vol. 97, No. 37, Anderson, Ashton

Computer scientists are using genetic algorithms to re-create the process of evolution and solve some of the hardest problems researchers face today. Researchers have used evolutionary principles to design airplane wings, boat hulls, satellite antennae, robot vision, and electronic circuits. Computer scientists can solve difficult problems by evolving solutions in a virtual world. The solutions are often much different from anything human engineers would have conceived, as they are occasionally hindered by preconceived notions on how problems should be solved. A genetic algorithm starts with a group of possible solutions and narrows the answers down to the best solution by eliminating bad ideas and combining strong ideas until the perfect solution evolves. Sometimes, the algorithm can go through hundreds of thousands, if not millions, of generations of solutions before reaching a suitable answer. Still, although genetic algorithms have been successful in many cases, they are not a universal problem solver. "They are quite slow, and they require quite a bit of fiddling," says McGill University professor Doina Precup. However, despite their drawbacks, Universite de Montreal professor Michel Toulouse says they have sparked a revolution in computer science. "The beauty and success of genetic algorithms motivated other computer scientists to look to biology for inspiration," Toulouse says.
Click Here to View Full Article
to the top


With Improvements, E-Voting Could Be Good, Says Researcher
CNet (02/16/08) Vamosi, Robert

Princeton graduate student J. Alex Halderman discussed ways to improve e-voting machines during his keynote address at the ShmooCon computer hacker conference. Halderman said that direct-recording electronic (DRE) voting machines are essentially computers and are susceptible to the same problems, including viruses, bugs, and crashes. Halderman said the most troubling aspect of DRE machines is that a single person could launch an attack on all the voting machines in a county or state. During a study of Diebold DRE machines, Halderman found that the company provided potential attackers with an upgrade process that was easy to manipulate. Using a specific file name could allow a hacker to inject malicious code into one or more voting machines, and because the PCMIA card can be used to load a specific ballot within a precinct, county, or state, a single altered card could spread the infection to numerous machines. Halderman said that improvements to e-voting machines could make them reliable, which he said would please voters, since many prefer using them over paper-based systems. E-voting machines provide faster reporting, offer more accessibility to disabled voters, and allow for better and less-expensive vote auditing if paper receipts are added to the system.
Click Here to View Full Article
to the top


Program Advances 3-D Images
Stanford Daily (02/15/08) Kamat, Nikhil

Stanford computer scientists have developed Make3d, an algorithm that can render accurate three-dimensional models from ordinary pictures. Make3d, developed by computer science professor Andrew Ng and postdoctoral student Ashutosh Saxena, uses data drawn from a set of images to relate the relative depth of objects in various circumstances to properties of the two-dimensional image. The depth data is used to extrapolate the relative positions and shapes of objects in new photographs. "If you look at a single image you will notice that some parts of the image relate to the depth--for example, the sky is usually far away," Saxena says. "The machine-learning algorithm, which is a branch of artificial intelligence, learns the relations, so it learns the relation between the image and the depth or the 3D structure." Ng says that until recently the concept was considered to be technically impossible because of the difficulties in differentiating two-dimensional and three-dimensional objects. Ng and Saxena say the algorithm could be used to improve object detection for complicated structures such as faces or moving objects, accelerate the development of virtual worlds and characters for video games, or be used to improve robotic navigation and dexterity. Ng says that future uses of the algorithm could include modeling houses for real estate and modeling fly-through views for applications such as Google Earth.
Click Here to View Full Article
to the top


Lab Works to Develop Fast, Handheld Computers
Daily Californian (02/15/08) Dongallo, Angelica

Technology that would enable computers to operate at faster speeds is the focus of a new laboratory at the University of California, Berkeley. Founded in January, the Parallel Computing Lab will allow an interdisciplinary group of researchers to pursue prototypes that would make parallel computing more accessible to the average computer programmer. Effective parallel programs have only been written by specialists, says lab investigator Ras Bodik. Overheating computer cores was a problem associated with improving the speed of computers until the emergence of parallel computing. The technology could allow handheld devices such as cell phones to replace laptop computers, enable people to browse YouTube in minutes instead of hours, or help improve the understanding and diagnosis of diseases. Microsoft and Intel recently said they will award UC Berkeley a grant to pursue parallel computing research. "It's one of the biggest changes in the computer industry in the last 30 years, which is why the industry's paying attention to academic ideas quite a bit," Bodik says.
Click Here to View Full Article
to the top


How Can We Be Sure We'll Remember Our Digital Past?
Christian Science Monitor (02/14/08) P. 13; Gaylord, Christian

The obsolescence of technology goes hand in hand with its advancement, and this represents a major problem to institutions that wish to preserve knowledge recorded on storage media and formats that are rapidly becoming outmoded, according to San Diego Supercomputer Center director Dr. Francine Berman, whose Blue Ribbon Task Force on Sustainable Digital Preservation will investigate the challenge over the next several years. The maintenance of archaic computers is an expensive proposition, while a more likely method is to migrate the data by upgrading the file format every generation, but problems with this concept include who will foot the bill for this service, according to Berman. Data accessibility and sustainability models being discussed by task force members include a pay-per-use model in which users would pay a fee to download old books and other kinds of information; a privatized model whereby businesses that already host files or images online agree to maintain them long-term; and a public-good model in which preservation is underwritten by endowments or governments. The NSF, the Library of Congress, and several other organizations are supporting Berman's task force, with the NSF also offering $100 million for five organizations to create a "DataNet" for sustainable data preservation. The European Union's Planets project describes itself as an attempt by several national libraries to save $4.3 billion in European data "at risk of digital obsolescence." Meanwhile, computer experts recommend that households start backing up their files, and it is a matter of preference which preservation format is best for each household. "Only 10 to 30 percent of consumers back up their stuff, and really it's closer to 10," warns CNet editor Natalie Del Conte.
Click Here to View Full Article
to the top


Why Should Women Want to Be in IT?
IT Business Canada (02/15/08) Orlov, Laurie M.

A lack of definition in the enterprise IT field is a major reason why women are so discouraged from pursuing careers in that sector, and former Forrester Research analyst Laurie M. Orlov writes that an emphasis on programming, robotics, engineering, and computer science obstructs the actual nature of enterprise IT jobs and the skills and background they necessitate. "Now you need business analysts, program managers, vendor managers, relationship managers, information architects or process analysts," she says. "These jobs (any of which can lead to CIO) demand employees with excellent communication skills that many of the women you know have: The ability to speak, negotiate, influence others, write, analyze, manage projects or programs, and lead cultural change." What is needed, Orlov argues, is the circulation of better information about business technology's true nature and the various backgrounds successful women in business technology can have, along with the backing and participation of the 86 percent of top male IT executives. CIOs and senior managers can give tech-centric personnel a better grounding in business so that they can more effectively engage with other departments and recognize the career paths that may swerve to and from their organization's business areas. Orlov makes the case that senior women in IT should promote business technology careers to young women in view of rising salaries, companies' fervent desire for workforce diversity, the positions' opportunity to give women an education on how companies function, and the work-life balance IT jobs facilitate. Furthermore, women with IT jobs that are gauged by deliverables know that the most valuable element of the job is the work itself.
Click Here to View Full Article
to the top


Attention Please! Next-Generation E-Learning Is Here
ICT Results (02/14/08)

European researchers working for the AtGentive project have developed two new software platforms that incorporate artificial intelligence and social networking into their approach toward e-learning. AtGentive coordinator Thierry Nabeth says the first generation of e-learning platforms focused on replicating the classroom experience, but student's often had difficulty staying motivated and the learning program failed to keep their attention. To overcome this problem, one of the AtGentive platforms uses techniques similar to those found on Web sites such as Facebook that make them so popular as a means of staying in touch with others. The platforms also use artificial intelligence to keep students interested. "Artificial agents are autonomous entities that observe users' activities and assess their state of attention in order to intervene so as to make the user experience more effective," Nabeth says. "The interventions can take many forms, from providing new information to the student, guiding them in their work, or alerting them when other users connect to the platform." The artificial intelligence agents provide a smart form of proactive coaching for students by assessing, guiding, and stimulating them. The agents can alert students when others have read their articles, or when they receive feedback on their contributions to a collaborative project. The agents are also able to detect when students are not interacting with the system and try to get them to rejoin the lesson.
Click Here to View Full Article
to the top


Gliding to Gold - World-Beating Software Could Boost British Swimming
Engineering & Physical Sciences Research Council (02/13/08)

New software being developed by sports scientists at the University of Edinburgh's Center for Aquatics Research and Education and Sheffield Hallam University could provide instant, in-depth feedback to a swimmer's glide technique, helping swimmers improve a key aspect of their performance more quickly and effectively than previously possible. The software would provide information on head position, body posture and alignment, and other elements of a swimmer's technique. It could also actively suggest ways swimmers could improve their posture to minimize resistance and pinpoint the optimum moment to begin kicking. The researchers say the software's advantages over other systems currently in use include the ability to provide instant feedback so swimmers and coaches can use it at the poolside and implement its recommendations while a training session is still in progress. To use the program, a swimmer is marked at body joints using water-resistant markers. The swimmer is then videotaped in action using underwater and poolside cameras. The images are fed into a computer where the software tracks the movements and runs them through a mathematical model. A replay of the swim instantly appears on a poolside plasma screen. The research is backed by funding from the Engineering and Physical Sciences Research Council.
Click Here to View Full Article
to the top


AMD Drives Shift in Computer Software
EE Times (02/12/08) Merritt, Rick

Advanced Micro Devices says that developers need to rewrite software to prepare for the multicore processors that will use a variety of cores in the future. AMD has started talks with Microsoft and other partners, and believes the work will ease the job of programming heterogeneous computer microprocessors that mix x86, graphics, and other cores. "Over the next few months or quarters, I think we will sharpen our views and put out a proposal--and perhaps a consortium behind it," says AMD senior fellow Chuck Moore, the chief architect of the initiative. "It's not just an AMD thing. It's an open system, and lets other players innovate at different layers." AMD believes software needs to be redefined in an open way similar to how the Open Systems Interconnection stack redefined networking software in the late 1970s. Establishing new levels of abstraction would allow applications developers to write parallel programs without having to know the details of every multicore processor. The new computer stack could include an expanded set of runtime environments above the operating system that could help find, schedule, synchronize, and manage chip-level resources for applications programmers. Virtualization software could be used below the operating system to track and correct programming errors more efficiently.
Click Here to View Full Article
to the top


Mistakes, Not Hackers, Are to Blame for Many Data-Security Glitches on Campuses, Report Says
Chronicle of Higher Education (02/12/08) Young, Jeffrey R.

Hackers were not responsible for the increase in the number of colleges that reported computer-security incidents in 2007, according to a study conducted by Adam D. Dodge, the assistant director for information security at Eastern Illinois University. The study, which analyzed reports on computer security by news and computer-security organizations, found that while the number of colleges that reported computer-security incidents rose from 65 in 2006 to 112 last year, the number of attacks committed by intruders remained essentially flat. Instead, the increase in the number of computer-security incidents at colleges was due to an increase in the number of mistakes made by college officials and an increase in the number of thefts of property, the study concluded. Dodge found that 49 colleges unintentionally released sensitive information in 2007, up from 20 the previous year. Meanwhile, 36 colleges reported 39 cases of theft of college computers or storage devices last year, up from 26 cases of theft at 24 institutions in 2006. Eugene H. Spafford, director of the Center for Education and Research in Information Assurance and Security at Purdue University, warned against drawing too many conclusions from the study, since it relies on other reports and has only been taken for two years. "Campus systems continue to be prized because of high bandwidth, number of systems (particularly student-owned), and collections of personal information of people with good credit histories," he says.
Click Here to View Full Article
to the top


Web Tool Predicts Election Results and Stock Prices
New Scientist (02/11/08)No. 2642, P. 30; Palmer, Jason

Massachusetts Institute of Technology's Peter Gloor has developed Condor, software that monitors activity on the Web to predict the future of stock prices and election results. Condor has successfully predicted the results of an Italian political party's internal election as well as stock market fluctuations. Condor starts by taking a search term, such as the name of a political candidate or a company, and running it through a Google search. Condor then takes the URLs of the top 10 results and plugs them into the Google search field, prefaced with the term "link:". Google then returns the sites that link to the 10 original sites, which Condor then reinserts into Google. Condor then maps the links between all the sites it has found, even if they do not contain the original search term, and finds the shortest way to get from one site to the other through the links they contain. The more often a site is involved in moving between sites, the higher its "betweenness" score. Condor averages the betweenness scores for all of the sites to produce an overall score for the original search term. The score provides some indication of popularity. In December of 2006, Gloor entered a range of film titles from that year and found that of the 10 with the highest betweenness scores, five won Oscars, four were nominated, and only one did not receive an award. Gloor is working on altering Condor so that it only searches blogs or chat sites.
Click Here to View Full Article
to the top


Replicating Virtual Servers Vulnerable to Attack
Network World (02/15/08) Greene, Tim

Jon Oberheide, a PhD candidate at the University of Michigan, says there is a big security risk related to virtualization. He says that one of the most attractive features of virtualization--the ability to spontaneously replicate virtual servers in order to meet demand--increases the risk of attacks such as data theft and denial of service. Oberheide attributes this increased risk to the fact that authentication between machines is weak when a virtual machine moves from one physical server to another, and because virtual-machine traffic between physical machines is unencrypted. However, there are two solutions to these problems, Oberheide says. A short-term solution is to install hardware-based encryption on all the physical servers that might send or receive virtual machines, while a long-term solution is to incorporate strong authentication into virtual machine software. Oberheide has developed a proof-of-concept tool he used in a lab to launch man-in-the-middle attacks against virtual machines as they moved from one physical server to another. Nemertes Research analyst Andreas Antonopoulos says Oberheide's work is fascinating, and adds that virtual servers face much more basic challenges. "Our entire security infrastructure has been built around a static model, and as we're virtualizing everything else, the virtualization of security is lagging by a tremendous amount," he says. "That's causing real problems in architecture decisions today."
Click Here to View Full Article
to the top


To submit feedback about ACM TechNews, contact: [email protected]

To be removed from future issues of TechNews, please submit your email address where you are receiving Technews alerts, at:
http://optout.acm.org/listserv_index.cfm?ln=technews

To re-subscribe in the future, enter your email address at:
http://signup.acm.org/listserv_index.cfm?ln=technews

As an alternative, log in at myacm.acm.org with your ACM Web Account username and password, and follow the "Listservs" link to unsubscribe or to change the email where we should send future issues.

to the top

News Abstracts © 2008 Information, Inc.


© 2008 ACM, Inc. All rights reserved. ACM Privacy Policy.