ACM TechNews (HTML) Read the TechNews Online at: http://technews.acm.org
ACM TechNews
March 12, 2008

Learn about ACM's 2,500 online courses and 1,100 online books
MemberNet
CareerNews
Unsubscribe

Welcome to the March 12, 2008 edition of ACM TechNews, providing timely information for IT professionals three times a week.


HEADLINES AT A GLANCE:

 

Computer Security Team to Report Hacking Into Defibrillator-Pacemaker
New York Times (03/12/08) P. C4; Feder, Barnaby J.

Computer security researchers say they were able to gain wireless access to a combination heart defibrillator and pacemaker in a lab. The researchers were able to reprogram the device, and to cause it to deliver jolts of electricity that would potentially be fatal if the device was in a person. The researchers were also able to obtain personal patient data by monitoring signals from the tiny wireless radio that was embedded in the implant as a way to enable doctors to monitor and adjust it without surgery. However, the researchers say that people with implanted defibrillators or pacemakers are not at risk yet since the experiment required more than $30,000 worth of lab equipment and a sustained effort by a team of specialists from the University of Washington and the University of Massachusetts to interpret the data. Additionally, the device the researchers tested was placed within two inches of the test gear. The researchers say the test results suggest that too little attention is being paid to security for the increasing number of medical implants equipped with communication abilities. "The risks to patients now are very low, but I worry that they could increase in the future," says University of Washington lead researcher Tadayoshi Kohno.
Click Here to View Full Article
to the top


20th World Computer Congress
Italian Computer Association (03/12/08)

The Italian Computer Association (AICA) will organize the 20th IFIP World Computer Congress from Sept. 7-10 in Milan, Italy. An innovative program accommodates a record number of 13 technical and 17 industry conferences with cross-links and presentations on national experiences and best practices. Globalization in the Digital Scenario will be the subject of the opening session. Hosted conferences include Women and Technology, e-Inclusion, and the AICA's 46th National Congress. Industry conferences at WCC 2008 will include e-Government, Web 2.0, Smart Grids, Intelligent Building, Service Science, and ICT for Innovation in Finance. Technical conferences include Distributed and Parallel Embedded Systems, Human Computer Interaction, IFIP Artificial Intelligence 2008, 23rd IFIP International Information Security Conference, Knowledge Management in Action, Biologically Inspired Cooperative Computing, 1st IFIP Entertainment Computing Symposium, Open Source Systems 2008, and the 5th IFIP International Conference on Theoretical Computer Science. WCC 2008 will also offer a topical session on Computer-Aided Innovation. AICA is determined to make this event one of the best ever and extends a cordial invitation to ACM members to join the international ICT community at the Congress. For more information and to register, go to www.wcc2008.org.
Click Here to View Full Article
to the top


Military Networks Increasingly Are Under Attack
Wall Street Journal (03/12/08) P. A7; Dreazen, Yochi J.

Gen. Kevin Chilton, the top U.S. commander in charge of cyberspace, said the nation's military networks are being targeted by an increasing number of attacks. Chilton said there is evidence that links China to many of the incidents, though he did not formally accuse the Chinese government of involvement. A recent Pentagon report said that China was expanding its military power into cyberspace, which angered the Chinese. Although the People's Liberation Army repeatedly denies being behind the hacker attacks, the U.S. government has linked China to several cyber attacks, including the hacking of a Pentagon email system used by the Secretary of Defense's office. A 2007 Government Accountability Office report warned that the nation's infrastructure, including water-treatment and power plans, are at risk of being targeted by a cyber threat. Chilton said the military is concerned that the increasing number of "mining" attempts could just be the beginning of a growing cyber threat. He said hackers could eventually attempt to knock out classified networks or slow down the nation's government, media, and financial Web sites. "You don't shut the system down completely, but you slow it down," Clinton says. "I would consider that an attack."
Click Here to View Full Article - Web Link May Require Paid Subscription
to the top


Study: Digital Universe and Its Impact Bigger Than We Thought
Computerworld (03/11/08) Mearian, Lucas

In three years' time there will be a tenfold increase in the 180 exabytes of electronic data created and stored in 2006, according to a white paper from IDC. The report estimates that electronic receptacles for that data are expanding 50 percent faster than the data itself, and that information will be stored in over 20 quadrillion containers by 2011, producing a massive management conundrum for consumers as well as businesses. The bulk of the data consists of digital "shadows" such as surveillance photos, Web search histories, financial transaction journals, mailing lists, and so on. IDC chief research officer John F. Gantz says that a great deal of the data being created by consumers outside of enterprises will require enterprise protection, as 85 percent of that information sooner or later goes through a corporate asset. IDC acknowledges an underestimation of earlier digital figures for 2007, noting that the actual data total--281 exabytes--is 10 percent greater than it had projected earlier in its first "Digital Universe" study, owing to more rapid growth in digital cameras, televisions, and data, and improved comprehension of data replication. IT organizations will need to accommodate the digital universe's rapidly increasing size and sophistication by transforming their existing relationships with business units; driving the development of organization-wide policies for information governance such as security and retention of information, data access, and compliance; and expediting new tools and standards into the organization, from storage optimization, unstructured data search, and database analytics to virtualization and management and security tools.
Click Here to View Full Article
to the top


U.S. Tech Companies Add Five Workers for Each H-1B Visa They Seek
InformationWeek (03/10/08) McGee, Marianne Kolbasuk

For each H-1B visa position request, U.S. technology companies increased their employment by an average of five workers, reveals a new National Foundation of American Policy (NFAP) report. NFAP, a non-profit, non-partisan research organization, examined all H-1B Labor Condition Applications (LCA) submitted by S&P 500 technology companies to the U.S. Department of Labor between 2001 and 2005. The researchers used a "regression model that controls both general market conditions and firm size" to analyze the association between the number of positions required in H-1B LCA documents and the percentage of total employment. The analysis found that S&P 500 technology companies with more than 5,000 employees added an average of five workers for every H-1B position requested, and companies with fewer than 5,000 employees increased employment by 7.5 works for each H-1B position requested. "At the minimum, this shows that H-1Bs are complementary to other U.S. workers being hired, not displacing them," says NFAP executive director Stuart Anderson. NFAP did not examine the types of jobs that companies added, or the pay for those positions. Anderson also says the research did not conclude that companies added to their employment because they were saving money by hiring H-1B workers.
Click Here to View Full Article
to the top


NSA Shifts to E-Mail, Web, Data-Mining Dragnet
CNet (03/11/08) McCullagh, Declan

The National Security Agency may be engaging in the widespread monitoring of email, text messages, Web browsing, and other forms of electronic data-mining, without court supervision, according to an article in the Wall Street Journal. Meanwhile, documents released by a security consultant indicate that an unnamed major wireless provider has given the government access to its network, allowing customers' email, text messaging, and Web use to be monitored. Last week, assistant attorney general for National Security Kenneth Wainstein said that the surveillance of email was the real concern raised by the debate over amending the Foreign Intelligence Surveillance Act. Taken together, the reports indicate that the NSA is developing a data-mining operation similar to the much-criticized Total Information Awareness program, writes Declan McCullagh. The NSA says it abides by U.S. law, and principal deputy director of national intelligence Donald Kerr blames the critical reports on the NSA's culture of "stand-offishness."
Click Here to View Full Article
to the top


Is There Really an IT Labor Shortage?
Baseline (03/05/08) Chickowski, Ericka

IT industry executives and analysts say that skilled IT professionals are in short supply, yet a number of economists, academics, and industry experts counter that there is no hard evidence to support this assertion. Duke University professor Vivek Wadwha says that "this whole concept of shortages ... shows a lack of understanding of the labor pool in the USA." His most recent research backs his conclusion that skilled IT workers are plentiful in the United States, and studies by RAND Corporation, the Urban Institute, and Stanford University confirm Wadwha's findings. Rochester Institute of Technology professor Ron Hira says the most cogent proof that there is no IT worker shortfall is the fact that IT salaries have not significantly spiked in years, while the Urban Institute's Hal Salzman says the gap between employers' perception of a worker shortage and employees' views of a contracting job market partly stems from impractical expectations from IT industry leaders. A paper that Salzman and Georgetown University's Lindsay Lowell prepared for the Urban Institute last fall estimates that general science technology engineering and math (STEM) enrollment at U.S. universities overtook the annual net increase of jobs each year by at least a factor of two. Meanwhile, the paper says that up to two-fifths of IT workers completely lack a STEM degree and learned the technology on the job, thus widening the pool of qualified workers. Salzman attributes a decline in enrollment for IT-related degrees to flat wages that lessen the financial incentive to pursue IT careers, but he says this is not an indication that there are insufficient graduates to fill IT positions. Wadwha and others believe there is an abundance of experienced IT workers who are unemployed or underemployed because of ageism or because they dropped out of IT due to a lack of work following a downturn.
Click Here to View Full Article
to the top


Bringing Second Life to Life: Researchers Create Character With Reasoning Abilities of a Child
Rensselaer Polytechnic Institute (03/10/08) Cleveland, Amber

Rensselaer Polytechnic Institute researchers are engineering virtual characters with belief systems and the ability to reason based on the beliefs of others. The researchers say that the engineered characters will be able to predict and manipulate the behavior of human characters. At a recent conference on artificial intelligence, they unveiled a Second Life character named Eddie that has the reasoning abilities of a 4-year-old child. "Current avatars in massively multiplayer online worlds--such as Second Life--are directly tethered to a user's keystrokes and only give the illusion of mentality," says Selmer Bringsjord, lead researcher and head of Rensselaer's Cognitive Science Department. "Truly convincing autonomous synthetic characters must possess memories; believe things, want things, remember things." Engineering these virtual characters requires combining logic-based artificial intelligence and computational cognitive modeling techniques with supercomputer processing power, Bringsjord says. The goal is to build artificial agents that are able to ascribe the mental states of other agents, making the virtual characters more interesting and useful.
Click Here to View Full Article
to the top


Cyber Preparedness Symposium Leaves Unanswered Questions
Dark Reading (03/07/08) Wilson, Tim

At the recent National Symposium on Unifying Cyber Preparedness Efforts, industry leaders and academic researchers agreed that better collaboration is needed to prepare for cybersecurity threats, but they couldn't agree on how to work together or even on what the threats are. The half-day discussion wavered between defending against attacks on the nation's government and infrastructure to resolving specific consumer PC vulnerabilities. Capitol College organized the symposium to discuss how government industry, critical infrastructure providers, Congress, and academia can cooperate to build a cross-disciplinary effort to prepare for and fight cyber threats. "We're simply stalled, as a nation, when it comes to cyber security," says Capitol College's Vic Maconachy, former head of the National Security Agency's information assurance training program. "We can no longer wait for somebody to take the lead." Maconachy urged government, industry, and academia to pledge to get involved in the cyber security effort, and to identify, coordinate, and combine the "silos of excellence" in cybersecurity.
Click Here to View Full Article
to the top


Web of Entities: Prepare to 'Okkamise'!
ICT Results (03/06/08)

European researchers are developing the Okkam project, semantic Web-based technology designed to make it easier to publish, link, and find information using a "Web of entities." Objects in Okkam can include "entities" such as people, locations, organizations, and events, as well as documents, says Trento University's Paolo Bouquet, an Okkam team member. The core Okkam infrastructure will store and provide access to "global identifiers," which can be used by anyone across formats and applications. "One of the biggest risks we face is people thinking the identifiers are a controlling device, a 'Big Brother' scenario," Bouquet says. He says the information users gather "is the bare minimum to improve Web searches. So you can quickly discern, for example, whether 'Paris' is the capital of France or a bistro in Boston, and whether it's a Web-page or an obscure mention in a Voltaire manuscript." He says large companies will be able to quickly and accurately benchmark new products of processes against competitors or run internal knowledge management tasks. Corporate partners are testing how Okkam can help manage information on their public Web portals, while other Okkam partners are defining the authoring environment for scholarly and news content. Bouquet expects to have a base of about 1 million entities by the end of 2008, with the goal of adding a million more each year through the life of the project.
Click Here to View Full Article
to the top


Saving Energy in Data Centers
Technology Review (03/11/08) Naone, Erica

Microsoft Research's Networked Embedded Computing group is working to make data centers more energy efficient in two ways. First, new algorithms make it possible to lighten the work load for servers and put them in sleep mode. Then sensors are used to identify which servers would be the best to shut down based on the environmental conditions in different parts of the server room. Microsoft researchers says eliminating hot spots and minimizing the number of active servers could reduce data center energy consumption by 30 percent. The Web-enabled sensors monitor both heat and humidity and can be networked and used with Web services. Microsoft's Feng Zhao says he envisions the sensors, which are still just prototypes, as a new type of scientific instrument that could be used in a variety of projects. Meanwhile, the algorithms, which distribute the load to free up servers during off-peak times so they can go into sleep mode, are designed for connection servers, which are used with services users may log into for several hours. The long sessions require complex planning to avoid disconnecting users and other service problems. The researchers have developed two algorithms, one that predicts how many servers will be needed hours ahead of time, and one that distributes traffic according to those predictions and shuts down relatively empty servers.
Click Here to View Full Article
to the top


Microsoft Researches User Interface for the Illiterate
Computerworld (03/07/08) Gaudin, Sharon

Scientists in Microsoft Research's laboratory in Bangalore, India, displayed a prototype of a user interface for the illiterate last week during Microsoft's seventh annual TechFest. For people who are unable to read, write, and interact with computers, "a textual interface where they have to read and write just is not useful," says laboratory managing director P. Anandan. "You can show a lot more in a picture." A new interface would have to rely on better icons, Anandan says. He says iconic images might mean different things to people in different countries, different cultures, and even in different towns. But Anandan also believes the creation of richer and more meaningful icons will ultimately improve more traditional interfaces as well. Microsoft has been developing a user interface for illiterate users since 2005, but has no plans to include the technology in a product anytime soon.
Click Here to View Full Article
to the top


The Microchips That Could Heat Your Home
New Scientist (03/08/08) Graham-Row, Duncan

IBM engineers in Switzerland have developed a cooling system that uses waste heat from computer chips to heat homes. IBM wants to recapture the wasted heat from corporate data centers and use it to heat nearby homes and offices. Computer circuits are normally cooled by blowing cold air over them. Bruno Michel, an engineer specializing in thermal research at IBM's Zurich lab, says because water conducts heat 4,000 times better than air, switching to a water-cooled system would make it easier to recover waste heat. IBM's home heating system uses a "microfluidic" heat sink made from a network of water-carrying microchannels drilled into silicon on top of the chip. Water is pumped into the silicon, where it absorbs the heat and is pumped to a heat exchanger where the heat can be used for residential heating. For the most efficient heat transfer, a thin layer of water has to flow as close to the chip's electronics as possible, get as hot as possible, and remove the heat quickly. Michel says the current prototype, if integrated into the processor and memory chips used in servers, would be able to recover as much as three-quarters of the energy computers use, enabling a medium-sized data center that consumes 1 megawatt of electricity to heat about 70 homes.
Click Here to View Full Article
to the top


Coming Soon: Nothing Between You and Your Machine
New York Times (03/09/08) P. BU4; Markoff, John

The concept of direct human/computer interaction is being furthered by the convergence of more powerful and affordable computer hardware and a younger generation of software designers who "come from a world of fluid media, and ... multitask at an extraordinary level," says former Yahoo executive Joy Mountford. For example, the Cooliris startup's PicLens software plug-in for Web browsers allows online images, video, and other digital media to be explored directly without navigating Web pages through the elimination of the browser frame and the establishment of a 3D space resembling an infinite corridor of images. "People should think of a computer interface less as a tool and more as a extension of themselves or as extension of their mind," says Cooliris CTO Austin Shoemaker. Meanwhile, multitouch displays have been realized by researchers at the consulting firm Applied Minds and New York University's Courant Institute of Mathematical Sciences, who created a "touch table" world map that allows images to be manipulated by direct tactile contact. Not only is new hardware fueling the switch to more immersive displays, but so is a surge in more powerful programming tools that offer sophisticated visual effects. In addition, a new generation of consumer-oriented wireless handsets is being equipped to employ voice commands as an interface tool. "The old paradigm is breaking down," says Palm software director Paul Mercer. "It used to be that you needed to be a visionary and technologist like Michelangelo, but we're turning that corner."
Click Here to View Full Article
to the top


Purdue Leads Center to Simulate Behavior of Micro-Electromechanical Systems
Purdue University News (03/07/08) Venere, Emil; Fiorini, Phillip

Purdue University has launched the Center for Prediction of Reliability, Integrity and Survivability of Microsystems (PRISM) as part of a new collaborative effort with the University of New Mexico and the University of Illinois, Urbana-Champaign to research the behavior and reliability of miniature switches. About 35 researchers, including faculty members, software professionals, and students will be involved in PRISM, which is backed by a five-year, $17 million agreement from the National Nuclear Security Administration. Mechanical engineering professor Jayathi Y. Murthy will serve as the director of the new center, which will advance the emerging field of "predictive science," or using computational simulations to predict the behavior of complex systems. PRISM is one five new centers that will develop advanced science and engineering models and software for simulations that predict the reliability and durability of microelectromechanical systems. PRISM researchers will develop miniature switches, or MEMS devices, to replace conventional switches and other electronic components. MEMS, which combine electronic and mechanical components on a microscopic scale, are far lighter and smaller than conventional technology. MEMS can also be manufactured in large quantities at low costs. The simulations will make it possible to accurately predict how MEMS devices will stand up to the rigors of varying and extreme environments, and what their lifespan will be in the field.
Click Here to View Full Article
to the top


IBM, Hitachi to Research Near-Atomic-Scale Chip Characteristics
EDN (03/10/08) Mutschler, Ann Steffora

IBM and Hitachi have launched a two-year agreement to pursue semiconductor metrology research. They believe their initiative will spur further investigation into next-generation semiconductor technology, which will be needed as the industry continues to strive for ways to improve the performance of computer chips. "Hitachi's cutting-edge semiconductor characterization capabilities and IBM's state-of-the-art CMOS research capabilities can help the two companies accelerate the pace of semiconductor innovation for the 32-nanometer generation and beyond," says Bernie Meyerson, CTO for IBM's systems and technology group. "By combining individual research strength and intellectual property we reduce the significant costs associated with research needed to advance the next generation of chip technology." The joint research will take place at IBM's Thomas J. Watson Research Center in Yorktown Heights, N.Y., and at the College of Nanoscale Science and Engineering's Albany NanoTech Complex.
Click Here to View Full Article
to the top


The Digital Home: An All-In-One Device
Fraunhofer-Gesellschaft (02/26/08) Rose, Matthias

Fraunhofer researchers are working on wirelessly connecting electronic devices for broadcasting and entertainment on home networks. Their project, Wireless Media and Control at Home (WiMAC(at)home), is designed to simplify home electronics by connecting HDTVs, DVD recorders, MP3 players, surround sound systems, and computers together on one network. The system centers on a specially-designed TV that can store music, videos, and photos. Broadcast television can also be distributed in a protected environment in compliance with copyright regulations. The TV can be connected to automated home systems such as heating appliances, alarm systems, and air conditioning, enabling users to control their environment through the TV. All WiMAC devices configure themselves automatically, and new components can be incorporated through Universal Plug and Play technology. The system is based on specification from the Digital Living Network Alliance, a global collaboration between computer and consumer electronics manufacturers who have established standards for home networking. WiMAC(at)home also automatically plays the music or video in whatever room the user is in, switching rooms as the user moves about the house. The user is tracked through a WLAN-enabled device such as a smart phone.
Click Here to View Full Article
to the top


Out of the Blue
Seed (03/03/08) Lehrer, Jonah

The Blue Brain project at Ecole Polytechnique Federale de Lausanne is an initiative to precisely replicate an actual brain's neuronal activity with a supercomputer composed of thousands of microchips and capable of 22.8 trillion operations per second. Blue Brain is overseen by EPFL neuroscientist Henry Markram, who is hopeful that the conceptual models the project yields will give birth to an entirely new category of neuroscience that integrates all the data the field has accumulated over the decades. The project's feasibility phase, in which the supercomputer accurately simulated a neocortical column, is concluding, and the next phase will involve scaling it up so that an entire brain can be modeled. "Once we can model a brain, we should be able to model what every brain makes," Markram theorizes. "We should be able to experience the experiences of another mind." A key challenge of the project was the simulation of ion channels, and the Blue Brain team genetically engineers Chinese hamster ovary cells to express a particular type of channel, and then subjects the cells to various physiological conditions. A robot is utilized to record neuronal activity and generate hundreds of data points daily, which are programmed into the supercomputer to aid simulation. The virtual neocortical column modeled by Blue Brain was stimulated by simulated electrical impulses, which triggered interactions that accurately mirrored actual neural activity. The researchers then refined the software to boost its level of realism. Markram speculates that precisely simulating a human brain would require an astronomical volume of processing capacity that would consume a vast quantity of power, but he is confident that a single machine will be able to model a complete human brain in 10 years or less if computing speeds and energy efficiency continue to improve at their current rate.
Click Here to View Full Article
to the top


To submit feedback about ACM TechNews, contact: [email protected]

To be removed from future issues of TechNews, please submit your email address where you are receiving Technews alerts, at:
http://optout.acm.org/listserv_index.cfm?ln=technews

To re-subscribe in the future, enter your email address at:
http://signup.acm.org/listserv_index.cfm?ln=technews

As an alternative, log in at myacm.acm.org with your ACM Web Account username and password, and follow the "Listservs" link to unsubscribe or to change the email where we should send future issues.

to the top

News Abstracts © 2008 Information, Inc.


© 2008 ACM, Inc. All rights reserved. ACM Privacy Policy.