ACM TechNews (HTML) Read the TechNews Online at: http://technews.acm.org

ACM TechNews
August 18, 2008

Learn about ACM's more than 3,000 online courses and 1,100 online books
MemberNet
CareerNews
Unsubscribe

Welcome to the August 18, 2008 edition of ACM TechNews, providing timely information for IT professionals three times a week.


HEADLINES AT A GLANCE:

 

Officials Say Flaws at Polls Will Remain in November
New York Times (08/16/08) P. A10; Urbina, Ian

The U.S. Election Assistance Commission says that flaws in voting machines used by millions of people will not be fixed in time for the presidential election because of a government backlog in testing the machines' hardware and software. The flaws have created doubt over the ability of some machines to provide a consistent and reliable vote count, but commission officials say that they will not be able to certify that flawed machines are repaired by the November election, or provide software fixes or upgrades because of a backlog at the testing laboratories used by the commission. "We simply are not going to sacrifice the integrity of the certification process for expediency," says commission chairwoman Rosemary E. Rodriguez. Consequently, machine manufacturers and state election officials say states and local jurisdictions are forgoing important software modifications meant to address security and performance concerns. In some cases, election officials in need of new equipment are being forced to buy machines that lack up-to-date upgrades. The federal government does not require that states use machines certified by the commission, but most states rely on the commission to approve new machines and software, and at least 10 states have rules or laws requiring federal certification. For example, Ohio requires federal certification, and although there is software available to correct the state's machines, the newer software cannot be used because it has not been certified. "We need the federal oversight to create consistent standards and to hold the manufacturers to a certain level of quality, but we also have to be able to get the equipment when we need it," says Ohio secretary of state Jennifer L. Brunner. "Right now, that equipment is not coming, and we're left making contingency plans."
Click Here to View Full Article
to the top


Some Russian PCs Used to Cyberattack Georgia
USA Today (08/18/08) P. 1B; Acohido, Byron

Thousands of Russian citizens have volunteered their PCs to be used in cyberattacks against Web sites supporting Georgia, say security experts. Several hours after skirmishes between Russia and Georgia started, a call for action was posted on the Web site stopgeorgia.ru, which listed Georgia government sites as potential targets. The site also posted a software tool that emits a stream of nuisance requests from the user's PC to target Web sites. Clicking on the tool allowed users to participate in a denial-of-service attack on Georgia's Web pages, says Damballa researcher Artem Dinaburg. Thousands of pro-Russia users have been clicking on the tool and attacking a list of pro-Georgia Web sites. Russian cybercrime lords are also assisting Russia's assault by directing part of their large botnet networks to join the attack. Damballa recently identified a few hundred PCs in the United States that were also being used to attack pro-Georgia Web sites. A similar attack cut off most Internet services in Estonia for several weeks last year, and there have been at least a dozen smaller-scale attacks over political disputes between Russia and Baltic states with Western affiliations, says VeriSign's Kimberly Zenz. "This type of attack will form at least a part of all geopolitical conflicts from now on," says Team Cymru's Steve Santorelli.
Click Here to View Full Article
to the top


Spare Some Bandwidth?
Technology Review (08/18/08) Inman, Mason

Pakistani computer scientists are developing DonateBandwidth, software that will boost Internet download speeds in developing countries by enabling users to share their bandwidth. The software breaks up popular pages and media files, allowing users to access them through each other, essentially building a grassroots Internet cache. In developed countries Internet service providers (ISPs) create Web caches to copy and store Internet content locally to help improve customers' browsing speeds. However, in countries such as Pakistan, Internet connections are generally slow and expensive, and few ISPs offer caching services. Lahore University of Management Services (LUMS) computer scientist Umar Saif says in Pakistan, almost all of the Internet traffic leaves the country, even when a Pakistani user is browsing Web sites hosted in Pakistan. "The packets can get routed all the way through New York and then back to Pakistan," Saif says. Saif and his team at LUMS say DonateBandwidth works similarly to the BitTorrent peer-to-peer networking program, but can be used to share cached Web sites as well as to download files from other DonateBandwidth users. Saif's team is testing a proof-of-concept version of the program, and plans to work with the University of California, Berkeley's Eric Brewer to implement it in Pakistan.
Click Here to View Full Article
to the top


Dutch National Supercomputer Huygens Beats Human Go Professional
SARA Computing and Networking Services (08/13/08)

A computer has defeated a human being in the game Go for the first time. The new Dutch supercomputer Huygens beat Go professional Kim MyungWan in an official match with a 9-stones handicap during the 24th Annual Congress for Go in Portland, Ore. Artificial intelligence (AI) researchers have turned their attention to Go after IBM's Deep Blue defeated Garry Kasparov in chess, but still were not expecting a computer program to beat a top Go player in a regular match under normal tournament conditions until 2020. Huygens, located at SARA Computing and Networking Services in Amsterdam, used the MoGo Titan application developed by INRIA France and Maastricht University. "During the official match a quarter of the supercomputer, i.e. 800 processors--nearly 15 Teraflop/s--was used," says Maastricht University Ph.D. student Guillaume Chaslot. "This is the most powerful computer system ever used for playing a computer game, and 1,000 times more powerful than the chess program Deep Blue."
Click Here to View Full Article - Web Link to Publication Homepage
to the top


HP Labs Adopts 41 University Projects
EE Times (08/14/08) Merritt, Rick

Hewlett-Packard (HP) Labs researchers have selected 41 academic projects from 34 institutions to receive up to $100,000 in funding for one year as part of HP's first annual Innovation Research Awards. Some of the projects will focus on new modeling tools to create energy-efficient data centers, more powerful lasers to create faster optical interconnects, and online agents for more accurate predictions. "Deepening HP Labs' strategic collaboration with those in academia, government, and the commercial sector ensures HP's research endeavors result in high-impact research that meets the scientific and business objectives of HP and its partners," says HP Labs director Prith Banerjee. Four of the projects focus on quantum devices that could possibly replace semiconductors. In one of those projects, University of California at Santa Barbara's John Bowers will use CMOS to design a hybrid silicon ring resonator laser that could power tiny lasers for next-generation optical interconnects. Meanwhile, University of California, Berkeley researchers are developing a tool to model the energy efficiency of data centers, and separate projects at the Georgia Institute of Technology and the University of Michigan will look at automated tools as a way of managing super-sized data centers. A Massachusetts Institute of Technology researcher will examine automated Internet tools and explore the possibility of prediction economies.
Click Here to View Full Article
to the top


Researchers Craft Multimedia Passwords
Techworld (08/14/08) Dunn, John E.

Canadian researchers have developed ObPwd, a new system that consumers can use to create secure passwords from images, MP3 files, or videos. With ObPwd (object-based password), consumers could use the picture of a cat to generate a sophisticated password that could not be cracked unless someone had access to the specific image or file used to generate the password. "Users keep a record [memorized or written] of a pointer to their content used in generating each password," writes Carleton University's Mohammad Mannan and P.C. van Oorschot in a public paper on the approach. "Users can write down the password in a secure place, or re-create it from the content when needed." They would need to remember the file used to create the password, rather than a string of text. A software version has been released in beta form as an add-on tool for Mozilla, and as a standalone Windows XP utility. However, files that are too large could slow down the generation process, and creating passwords from public material such as pictures on a Facebook page or common image files is not recommended.
Click Here to View Full Article
to the top


Will the Semantic Web Have a Gender?
Read Write Web (08/06/08) Kirkpatrick, Marshall

Computer scientists should be careful not to impose exclusively male perspectives and assumptions on the Semantic Web, says Corinna Bath, a research fellow at Austria's Institute for Advanced Studies on Science, Technology, and Society. "Binary assumptions about women and men are not reflected [upon] or the [gender] politics of [a particular] domain is ignored," she contends. "Thus, the existing structural-symbolic gender order is inscribed into computational artifacts and will be reproduced by [their] use." For instance, the Dublin Core ontology is comprised of a list of elements that can be used to describe a document, and it is likely that the list overlooks classes of relationships that are critical to understanding documents accurately, which could be revealed by different viewpoints. The current Semantic Web is primarily based on sets of subject, predicate, and object, also known as "triples," and Bath says even the modeling concepts should be challenged because "the class concept and the inheritance concept lack to represent social processes, because of limited formal expressiveness for conflict, change, and fluidity." She questions computer science modeling grounded on the conviction that a lack of doubt about something is proof that it is true, especially when not all views on the matter have been considered. Bath says the representation, storage, and distribution of knowledge is undergoing a major overhaul with the advent of the Internet, and that the manipulation and use of information will be a critical component of most of our life and work in the future. The Semantic Web's epistemologies, concepts, and leading metaphors will thus play a vital role in how information is applied, she concludes.
Click Here to View Full Article
to the top


New Technology Could Lead to Camera Based on Human Eye
Northwestern University News Center (08/07/08)

Digital cameras revolutionized how people take and use pictures, and a new technology developed at Northwestern University could advance photographic images even more by producing improved images with a wider field of view. Northwestern University professor Yonggang Huang and University of Illinois at Urbana-Champaign professor John Rogers have created an array of silicon detectors and electronics that can be conformed to a curved surface, mimicking the human eye. Rogers and Huang established experimental methods and theoretical foundations to transfer the electronics from a flat surface to a curved one. Rogers created a hemispherical transfer element made from a thin electrometric membrane that can be stretched out into the shape of a flat drumhead. While the membrane is flat, electronics can be transferred onto the elastomer, which then pops back into its hemispheric shape, which would normally cause the electronics to suffer catastrophic mechanical failure. Rogers and Huang solved this problem by creating an array of photodetectors and circuit elements that are so small, approximately 100 micrometers square, that they are not as affected when the elastomer returns to its hemispheric shape, similar to how straight buildings can exist on the curved surface of the earth. Tests showed that more than 99 percent of the devices still worked after returning to a hemispherical shape, and the silicon in the devices was compressed to only .002 percent.
Click Here to View Full Article
to the top


The Secret Lives of Supercomputers, Part 1
TechNewsWorld (08/07/08) Haskins, Walaika

The decreasing costs of building and operating supercomputers is making them more accessible for use in solving a wide variety of problems. "It is probably the biggest trend in supercomputers--the movement away from ivory-tower research and government-sponsored research to commerce and business," says IBM's Michael Corrado. Corrado notes that more than half the machines on the Top 500 Supercomputers list reside in commercial enterprises. University of Tennessee professor Jack Dongarra says companies are using supercomputers because they provide a competitive advantage. "Industry can no longer compete in the traditional cost and quality terms," Dongarra says. "They have to look for innovation, and they do that by using supercomputers, so it really becomes one of the key ingredients to their innovative capacity, production, growth--and really affects our standard of living today." He says almost every industry is now using supercomputers. Even small and medium-sized enterprises have been able to access supercomputers due to their lower costs. "This mainstreaming of supercomputing will only continue," says analyst Gordon Haff. "The very largest machines will still tend to be used for scientific research or other government-funded applications, but there's plenty of computing being applied to corporate research and even direct business applications as well."
Click Here to View Full Article
to the top


University of Arkansas Researchers Combine Technologies to Heal Patients, Virtually
University of Arkansas (08/05/08)

In an effort to make health care more efficient and cost-effective, University of Arkansas researchers have built a new kind of hospital that uses location aware systems, sensors, smart devices, radio-frequency identification, and virtual reality. Currently the Razorback Hospital can be visited by anyone in the virtual world Second Life. This past spring and summer, students and faculty members worked to create the virtual hospital and supply chain in Second Life, and the group recently offered a public demonstration and discussion. Because Second Life has no limits, the group was able to create things that they believe will exist in the real world in the near future, such as smart pill bottles that only the owner can open and keep track of the pill count, smart shelves that know when they need restocking, a restocking robot, wheelchairs that can follow waypoints to move patients around, and RFID readers and tags. The students also create internal organs for the hospital's avatars, which will allow virtual doctors to perform virtual organ transplant operations. "We feel there is huge potential here--well beyond health care or the groups we have touched so far," says project staff member Adam Barnes. "The project is really about the future world we will all live in--where every object is a network object and humans can communicate with things as well as they do with each other."
Click Here to View Full Article
to the top


Citizen-Inspired E-Government for 'Thin-Skinned' Cities
ICT Results (08/11/08)

The European cities of Dublin, Helsinki, and Barcelona have been working together on a new citizen-inspired e-government tool that will improve the cities' responsiveness to the needs of the population, as well as encourage citizen involvement in public affairs. "All three cities already had special projects underway aimed at 'e-enabling' certain parts of the city and were working closely with local universities to achieve this aim," says project coordinator John Donovan. The collaborative ICiNG project launched a platform and a range of services at the conference of European City Administrators in Barcelona, Spain, in June. Donovan says the citizen-based tools, designed by citizens for citizens, can be accessed by city authorities to improve their services. The consortium behind the project aimed to develop new e-government concepts based on a multi-modal, multi-access approach that was sensitive to the needs of citizens and the local environment. One of the first steps was to talk with local community groups to determine the real needs of the city and preferred communication methods. The ICiNG tools can be accessed though PCs, handheld devices, mobile phones, and environmental sensors, and the intelligent infrastructure makes it possible to have both a public administration services layer for officials and a community layer for the public. One of the main features of the platform is the Urban Mediator software, which allows communities to mediate local, location-based conversations, activities, and information using interactive maps to represent local information. The software also provides a set of tools to process, share, and organize this information.
Click Here to View Full Article
to the top


Computer Communications Experts Probe Latest Advances in Digital Messaging and Transmission
AScribe Newswire (08/13/08)

Networking computing professionals have gathered in Seattle to learn more about the latest developments in network security, wireless protocol design, peer-to-peer games, and data center architecture. Scheduled for Aug. 17-22, ACM's SIGCOMM 2008 offers 20 demonstrations, five one-day workshops, and its first session on data center networking. University of Massachusetts professor Don Towsley will discuss the success of Internet analysis and mathematical modeling during his keynote address, "Modeling the Internet Is Fun! But can you make a living?" SIGCOMM 2008 will also offer 36 paper presentations, including Accountable Internet Protocol, which describes a design for providing strong guarantees of the authenticity of an Internet address, and Spamming Botnets: Signatures and Characteristics, which discusses a spam signature generation framework that identified spam campaigns and unique botnet host IP addresses. The SIGCOMM Award for lifetime contributions and the SIGCOMM Test-of-Time Award will be among the honors presented at SIGCOMM 2008.
Click Here to View Full Article
to the top


Vegetable Scales With a Mind of Their Own
Fraunhofer-Gesellschaft (08/08)

About 300 supermarkets in Europe are testing intelligent self-service scales that are capable of recognizing what a customer has placed on them. "The scales automatically recognize which fruit or vegetables are to be weighed and asks the customer to choose between only those icons that are relevant--such as tomatoes, vine-ripened tomatoes, and beefsteak tomatoes," says Sascha Voth, a scientist with the Fraunhofer Institute for Information and Data Processing IITB in Karlsruhe. Customers confirm the particular fruit or vegetable on a touch screen. The scales have a Webcam module for integrating a camera into the unit. "An image evaluation algorithm compares the image with stored data and thus automatically recognizes which type of fruit this is," Voth says. The scales can recognize items through a plastic bag, determine the changes in color and brightness of produce, and work in different kinds of illumination.
Click Here to View Full Article
to the top


A 'Next-Gen' Tool to View Genomic Data
Broad Institute of MIT and Harvard (08/04/08)

Researchers at the Broad Institute have developed the Integrative Genomics Viewer (IGV), a novel and freely available visualization tool intended to help users simultaneously integrate and analyze different types of genomic data, and give them the flexibility to focus on specific genomic regions of interest or zoom out for a wider, whole genome view. The Broad Institute's Jill Mesirov says the new tool creates a Google Maps-like view of integrative genomic data, and combines different types of genomic data into a single, holistic view. IGV will allow researchers to choose a Google Maps-like "street view" of the As, Cs, Ts, and Gs that create a genome, while simultaneously visualizing additional layers of complex information about gene expression and sequence alterations in the genetic code. Other genomic details can also be viewed in IGV, and more importantly all data types can be overlaid or superimposed to determine how changes at one level will affect another. Users can select a variety of options, viewing data as a heat map, histogram, scatter plot, or another format of their choice. The new visualization tool is free and publicly available to researchers on the Internet. Broad Institute director of cancer informatics development Michael Reich says the IGV was designed from the ground up to handle all types of genomic data, and to provide a strong platform for future growth and refinement.
Click Here to View Full Article
to the top


When the Meteor and the 1PB Database Collide
Computerworld (08/08/08) Lai, Eric

The Panoramic Survey Telescope and Rapid Response System (Pan-STARRS) is a joint venture between the U.S. Air Force and a number of universities that aims to track asteroids and other near-Earth objects through satellite and telescopic observation. Economically compressing, storing, and crunching the massive volume of raw image data produced by Pan-STARRS is an enormous database engineering challenge, and Johns Hopkins University professor Alex Szalay says Pan-STARRS will utilize a cluster of 50 PC servers linked to 1.1 petabytes of disk storage through fast Infiniband networking gear. Pan-STARRS' choice to use Microsoft's SQL Server 2008 for database management rather than a program better established for ultralarge data warehouses is based on factors that include cost and Microsoft's long association with the astronomical community, mostly through the offices of database researcher Jim Gray, who played a critical role in the construction of earlier databases of astronomical and Earth imagery. Pan-STARRS, which Gray partly conceived, will contain 300 terabytes of data by the end of the decade, and Szalay says some individual tables will be as large as 20 TB. Being a clustered system means that the data in Pan-STARRS will be partitioned, with an independent names database functioning as the index. Szalay says most searches will be facilitated through a graphical interface that "looks and feels a lot like MapQuest or Google Maps."
Click Here to View Full Article
to the top


To submit feedback about ACM TechNews, contact: [email protected]

To be removed from future issues of TechNews, please submit your email address where you are receiving Technews alerts, at:
http://optout.acm.org/listserv_index.cfm?ln=technews

To re-subscribe in the future, enter your email address at:
http://signup.acm.org/listserv_index.cfm?ln=technews

As an alternative, log in at myacm.acm.org with your ACM Web Account username and password, and follow the "Listservs" link to unsubscribe or to change the email where we should send future issues.

to the top

News Abstracts © 2008 Information, Inc.


© 2008 ACM, Inc. All rights reserved. ACM Privacy Policy.