ACM TechNews (HTML) Read the TechNews Online at: http://technews.acm.org
ACM TechNews
November 26, 2007

Learn about ACM's 2,200 online courses and 1,100 online books
MemberNet
CareerNews
Unsubscribe

Welcome to the November 26, 2007 edition of ACM TechNews, providing timely information for IT professionals three times a week.


HEADLINES AT A GLANCE:

 

SC07 Holds First Cluster Challenge
HPC Wire (11/22/07) Vol. 16, No. 46, Gorda, Brent

The SC Cluster Challenge at ACM's SC07 conference offered an exhibition and competition where teams of undergraduate students could compete in a demonstration of talent, technology, and accessibility of entry-level supercomputing, specifically highlighting advancements in hardware performance, ease of use clusters, and the power and availability of simulations software. Six teams, composed entirely of students still working on their undergraduate degrees, partnered with vendors to build cluster systems capable of running HPC Challenge benchmarks and processing data sets. During the event, the facilities experienced a power interruption, which caused a hard crash for every team, forcing the students to execute a recovery. All of the teams were up and running within a few hours, with some choosing to run with automatic checkpoint restart to protect against further interruptions. At the end of the competition, the team from the University of Alberta in Edmonton, Canada, was declared the winner. While that team did not create the fastest system, a combination of good preparation and a little luck during the power outage gave the team the advantage. The competition demonstrated that college and university students are capable of executing successful simulation computing. The competition also served as a marker for undergraduate programs, with several schools choosing to modify their undergraduate curriculums to include more cluster and parallel computing courses.
Click Here to View Full Article
to the top


Amazon Hopes Kindle Will Spark Interest in E-Books
San Francisco Chronicle (11/23/07) P. D1; Abate, Tom

Amazon.com has released Kindle, an electronic book reader the company hopes will create a market for e-books much like how the iPod created a market for paid music downloads. However, e-books have a troubled past and experts question if the technology is truly ready. UC Berkeley computer scientist and electronic publishing expert Erik Wilde says Kindle has some advantages over similar e-readers, such as wireless download capabilities, but that it also has severe limitations, such as not being able to clip and email passages to friends, which would give it a huge advantage over real books. "The more I see in terms of details, the more disappointed I am," Wilde says. Associated Press technology reporter Peter Svensson says Kindle is underpowered, requiring a recharge after only a day, whereas a competing Sony product can be used for several weeks on a single charge. Kindle uses a new display technology that is more paper-like and readable than backlit screens, but lacks color and creates somewhat blurry pictures. Wilde says Kindle makes it hard to import and display PDF documents, which business travelers could find useful. The Internet Archive's Brewster Kahle says Kindle's only serious flaw is Amazon's effort to control what users can download by blocking access to digitized and copyright-free books.
Click Here to View Full Article
to the top


Can Computers Understand Us?
Manila Times (11/26/07) Suarez, Ike

The De La Salle University-Manila (DLSU) Advanced Research Institute for Informatics, Computing and Networking recently held a symposium on cutting-edge research in digital signal processing. At the symposium, Georgia Institute of Technology professor of electrical and computer engineering Chui Hui Lee said that initial progress has been made in digital signal processing that uses information technology to enable the intelligent reception, transmission, and processing of audio and video. Lee predicts that advances will continue to be made in conjunction with advances in other fields such as linguistics, neural psychology, and bioinformatics. The Internet will also become more important as it will be used to link computers and other devices for signal processing. DLSU engineer Joel Ilao discussed some of the university's work on digital signal processing and robotics, specifically an industrial robot capable of processing sights and sounds for security and marketing purposes, and another robot to monitor traffic and analyze vehicular movements, including identifying the types and number of vehicles passing through a certain area. University of the Philippines College of Engineering Dean Rowina Cristina Guevarra discussed efforts to develop hardware and software that could be used by call center agents to recognize the emotions of callers.
Click Here to View Full Article
to the top


Making 'Second Life' More Like Real Life
Associated Press (11/21/07) Tabuchi, Hiroko

Researchers at Tokyo University recently demonstrated a position-tracking system that would allow people to use their own bodies to navigate the virtual reality world "Second Life." With the new technology, which makes use of a mat printed with colorful codes and a regular Web camera to calculate the user's position in three dimensions, people will be able to turn left or crouch down to make their avatar turn left or crouch down. "This technology lets you take the actions you'd use in real life and transpose them to the virtual world," says lead researcher Michitaka Hirose. Meanwhile, researchers at Keio University are considering enabling people to control their avatars by simply thinking commands such as forward, right, or left. Junichi Ushiba makes use of an interface that attaches electrodes to the user's scalp to sense activity in the brain's sensory-motor cortex, and then software to translate the brain activity into signals that control the avatar. However, Ushiba's team is still perfecting the timing of thinking to the delivery of commands to the online characters. "I want to go left, so I think, 'left'--but then the avatar turns too far to the left before I can get rid of the command in my head," says research student Takashi Ono.
Click Here to View Full Article
to the top


Internet Users Give Up Privacy in Exchange for Trust
Economic & Social Research Council (11/26/07)

New research funded by the Economic and Social Research Council suggests that Internet users are likely to provide more personal information online if they consider the Web site to be trustworthy. "Even people who have previously demonstrated a high level of caution regarding online privacy will accept losses to their privacy if they trust the recipient of their personal information," says Dr. Adam Joinson, head of the Privacy and Self-Disclosure Online project. However, Internet users who have some concerns about a Web site will become more guarded alter their behavior. The way in which questions are worded and response options are designed, such as giving Internet users the opportunity to choose "I prefer not to say" or select their salary from a broad scale, often results in users providing as little information about themselves as possible. "One of the most interesting aspects of our findings is that even people who genuinely have a high level of concern regarding privacy online may act in a way that is contrary to their stated attitudes when they come across a particular set of conditions," Joinson says. The level of trustworthiness may ultimately determine the degree of helpful information that online services obtain from people who visit their Web sites.
Click Here to View Full Article
to the top


Standards Suggested for Writing Secure Java
Network World (11/20/07) Greene, Tim

The Secure Programming Council has created a series of documents that outline the skills coders need to write Web applications that are more capable of withstanding attacks. The first of these documents was released earlier this month and lists the skills that the council believes are essential to writing Java and JavaEE code that is free of flaws that hackers could exploit. SANS Institute director of researcher Alan Paller says that some schools and groups offer secure coding courses, but the curriculums are developed based on the instructors' knowledge and best efforts, often contain security gaps, and do not adhere to industry standards for what the course should include. Paller says the Secure Programming Council documents are intended to address such shortcomings by drawing from existing texts as well as input from secure-coding trainers and businesses that work to train in-house programmers in secure training. "It's a common body of what people need to know, benchmarks for employers and teachers," Paller says. The Java paper, "Essential Skills for Secure Programmers Using Java/ JavaEE," focuses on data dandling, authentication and session management, access control, Java types and virtual machine management, application faults and logging, encryption services, and secure architecture and coding principles. Future papers will cover C, C++, .Net languages, Perl, and PHP.
Click Here to View Full Article
to the top


If Man Is From Mars, Computers Are From Outer Space
The Inquirer (UK) (11/21/07) Grossman, Wendy M.

Donald Norman's 1988 book, "The Design of Everyday Things," argued that technology needs to adapt and be easier for humans to use. After working as a "user experience architect" at Apple from 1993 to 1997, Norman has reversed his position. In his new book, "The Design of Future Things," Norman argues that since humans are more adaptable than machines, and going forward people will need to work with more complex cars, appliances, and other technologies, then people are the ones who will have to change. Norman particularly fights the idea that as computers become more advanced they will naturally be easier to use, arguing instead that humans need to be better able at using advanced computers. "I'm thinking that people are from Earth and machines are from outer space," Norman says. Norman also questions the proponents of singularity technology. "I don't go for the singularity arguments," says Norman, "but I do worry about the hybrid, where we're going to add more and more prostheses--electronic, then nano, eventually biological--into ourselves, and so we'll be a different species with perfect memory, better eyesight, better hearing, stronger." Norman wonders what will happen when the latest human technologies are incompatible with earlier versions.
Click Here to View Full Article
to the top


Student Facebook Use Predicted by Race, Ethnicity, Education
Northwestern University (11/19/07) Leopold, Wendy

A new study from Northwestern University found that college students' choice of social networking sites is often related to their race, ethnicity, and parental education. The study found that white students generally chose Facebook, Hispanic students prefer MySpace, and Asian and Asian-American students are least likely to use MySpace. African American students did not show a statistically significant preference toward a particular social networking site. Asian and Asian-American students were most likely to use Xanga, though a significant amount do use Facebook. The education level of the students' parents also correlates with social networking choices. Students with parents who finished college are significantly more likely to use Facebook, while MySpace users are more likely to have parents that have less than a high school education. Students who live at home with their parents are less likely to use a social networking site than students who live by themselves, with a roommate, or at school. Additionally, women were found more likely to engage in person-to-person online communication than men. The findings of the study contradict the common belief that social networking sites are being used to expand students social and cultural experiences and suggest social networking sites actually create a two-tier social system. "In a two-tier system, some college students cultivate lots of networks and social capital while others benefit considerably less from this important part of the college experience," says author of the study Eszter Hargittai. The study appears in the Journal of Computer-Mediated Communication.
Click Here to View Full Article
to the top


Researcher Lands Computer Security Grant From Air Force
University of Texas at Dallas (11/18/07)

The U.S. Air Force has awarded a $350,000 grant that will enable University of Texas at Dallas computer science professor Kevin Hamlin apply his computer security technology to larger applications and more computer architectures. Over the next three years, Hamlen will use the grant money to transition older programming languages to today's safer languages. "It's extremely difficult to write a program that does not have vulnerabilities in it, mainly because these languages were designed in the 70s and early 80s when nobody was thinking about computer security," Hamlen says. His technology is designed to automatically rewrite untrusted code before execution, which preserves the functionality of the program and effectively disables any malicious code. He has spent the last several years working on the rewriting technology. The grant money comes from the Air Force's Young Investigator Research Program, which targets talented scientists and engineers who have received Ph.D.s within the last five years.
Click Here to View Full Article
to the top


The Fruits of a Wireless World
ICT Results (11/21/07)

Prototype user-centered systems that would potentially allow millions to fully exploit third-generation mobile technology have been developed by the Wireless World Initiative. The goal of the EU-funded MobiLife project was to tap innovations in mobile applications and services in support of everyday activities by matching new applications and services with enabling technologies and service components and frameworks. The main results of the project have been documented in a "MobiLife Book" that delineates fundamentals such as definition of service architecture/infrastructure with compatible, user-centered components in mind; context awareness' importance; privacy and trust; personalization; and associated support services. The objective of the SPICE project was to produce prototype systems that would glue together the various existing platforms so that users would have a seamless and consistent experience, and its focus included prototype middleware systems that help facilitate communication and interoperation between different platforms, content management and delivery systems to effect access to content across domains, and intelligent service enablers for managing user profiles, content information, and proactive service adaptation. Realizing the radio ecophere's diversity to the greatest degree possible was the goal of the E2R project, which developed end-to-end reconfigurable systems that users, providers, operators, and regulators could select in the context of heterogeneous systems. Such systems will let users affordably access their chosen service whenever and wherever they prefer. The burgeoning population of mobile subscribers calls for more powerful wireless networks supported by more efficient utilization of available radio bandwidth, and the WINNER project sought to develop more efficient prototype radio access technologies, find mechanisms to facilitate different radio access networks to interoperate, and create efficient and effective spectrum usage techniques.
Click Here to View Full Article
to the top


Molecular 'Amplifier' Boosts DNA Computing
New Scientist (11/15/07) Ananthaswamy, Anil

A significant advancement in DNA computing was recently made with the discovery of a method for amplifying weak chemical signals that can be tailored to specific molecules. Conventional electronics use electrons to carry information, but DNA-based circuits use high and low concentrations of DNA fragments. Chemical amplification is essential if DNA computing is ever going to have practical applications. A polymerase chain reaction (PCR) can take a small amount of DNA and amplify it, but the process requires enzymes. Erik Winfree, who developed the building blocks for DNA circuits at the California Institute of Technology with David Zhang, has demonstrated how to perform DNA amplification without enzymes, making the process simpler and more usable as it can be applied to any DNA strand. Through a process that binds and separates strands of DNA, the team was able to amplify the DNA up to 900 times. The reaction is also programmable so that exact sequences of various molecules can be chosen to fit the design of a particular DNA-based digital circuit. The process is not as effective as PCR, but it does establish some principles on how to design such systems from scratch without using enzymes.
Click Here to View Full Article
to the top


Making Communications Technology More Social
Age (Australia) (11/20/07) Head, Beverley

University of Melbourne researchers are exploring how technology can be used to support phatic communications, the chitchat that makes communication personal and establishes human relationships. Melbourne professor Dr. Martin Gibbs, who has been researching domestic communications since 2004, says globalization and increased time pressures places a strain on phatic communication, as even close friends and family often resort to using technology designed for occasional and rapid bursts of information exchange in business for causal and personal communication. Gibbs believes that specially developed phatic technologies could help people re-connect on a more personal level and lead to "socially beneficial applications of technology," which could be used to help people quit smoking or take better care of their health. Some social networking tools support some elements of phatic communications, but Gibbs believes that specially designed phatic communications technologies will become increasingly important, and has designed several concept technologies to demonstrate how phatic technology could evolve. One such technology is Collage, a wall-mounted touch screen device that allows families in different locations to interact with one another by sending pictures and text messages using Collage devices in their homes. As more pictures and messages are added to the screen, older ones get covered and pushed to the background, like a digital fridge with art work. "The notion of phatic technology is that it is designed for social support rather than information exchange," Gibbs says. "It needs a different approach to business technologies, which are all about efficiencies and productivity."
Click Here to View Full Article
to the top


Your Next Poker Partner May Be Software
Sydney Morning Herald (Australia) (11/14/07) Moses, Asher

Software capable of defeating even the best human poker players could create a serious problem for the multibillion dollar online poker industry and players, who could someday be scammed by software-aided cheaters. Although such software is still under development, computer programs are already able to beat most humans at checkers, backgammon, scrabble, bridge, and connect four. In July, two of the world's best poker players narrowly defeated a computer program at Texas Hold 'Em during the first Man-Machine Poker Championship. The program, called Polaris, was developed over the course of 16 years by the computer poker research group at the University of Alberta. Polaris contains several fixed strategies, but is also able to adapt based on moves and mistakes made by the opponent. "We won, not by a significant amount, and the bots are closing in," says Phil Laak, one of the competing world champion players. Professor Jonathan Schaeffer, founder of the poker research group, says that despite the rapid progress it could be several years before computer programs seriously challenge the top humans in no-limit games and games with three or more people at the table. Schaeffer also says the university will do everything in its power to prevent people from misusing the poker program in online gaming.
Click Here to View Full Article
to the top


Europe Researches Millimeter-Scale Swarming Robots
EE Times (11/19/07) Ben-Artzi, Amir

Researchers in Europe are working to develop millimeter-scale robots that will be able to communicate with each other. The project, codenamed I-SWARM, brings together experts in micro-robotics, distributed and adaptive systems, as well as self-organizing biological swarm systems, and is coordinated by Joerg Seyfried at the University of Karlsruhe in Germany. The researchers will use the latest techniques to develop an artificial ant, which could allow for the production of swarms of up to 1,000 microrobots. The robots would use solar power; have limited, pre-rational on-board intelligence; and feature different types of sensors, manipulators, and computational power.
Click Here to View Full Article
to the top


What Women Want
CIO (11/15/07) Vol. 21, No. 4, P. 28; Orlov, Laurie M.

Women's impulse to avoid IT careers might be better explained by focusing less on what they hate about the field and more on what aspects of the field are attractive to women, and CIOs acknowledge that the marketing effort for IT is seriously lacking and suffers from obsolete, inaccurate characterization, writes consultant Laurie M. Orlov. "This emphasis on programming, robotics, computer science, and engineering won't get women interested in working for your IT organization," she contends. "In fact, it is exactly that tech focus that obscures the true nature of enterprise IT jobs and the background and skills necessary to excel at them." What the field requires is candidates from a wide spectrum of undergraduate and graduate curricula who desire to learn how companies function, who are capable of working with global project teams, and who can perceive business processes rather than electronic connections, Orlov says. The expected outsourcing of traditionally "geeky" IT jobs is creating a hunger for business analysts, program managers, vendor managers, relationship managers, information architects, and other professionals with exceptional communications, negotiation, and management skills, and Orlov says the secret to eliminating the stereotypical image of IT workers is to tap "better information about what business technology really is, how women of a variety of backgrounds can be and are successful, and finally ... the explicit support and engagement of the 86 percent of top IT executives who are men." Strategies Orlov advocates to attract more women to IT include promoting a business technology concentration in the workplace, reaching out to women in undergraduate business schools and liberal art colleges, and marketing business technology careers to young women.
Click Here to View Full Article
to the top


Q&A: Intel's CTO Sees Computing's Future in Multicore Machines
Computerworld (11/19/07) Vol. 41, No. 47, P. 38; Anthes, Gary

Intel senior fellow Justin R. Rattner believes, after being largely ignored by the market, the time has come for parallel and distributed processing. Rattner says microprocessor speeds will only be capable of modest growth, as power conservation has become such an important issue. The inability to improve microprocessor speed will give rise to multicore and many-core processors, which will require a new generation of programming tools. "Given the rudimentary state of parallel software, the investment across the entire computing industry will be very large," Rattner says. "Retraining existing programmers and educating a new generation of developers coming out of school is another formidable challenge. It will take years, if not decades, to reach the point where virtually all programmers assume the default programming model is parallel rather than serial." Rattner predicts that in five years all new software will be written for multicore processors, though a lot of existing software such as work processors will not need to be rewritten. Rattner says hundreds of universities worldwide are reintroducing parallel programming in their curricula, and Intel and other companies are working on funding programs to restart academic research in parallel programming and architectures.
Click Here to View Full Article
to the top


Transistors Go Vertical
IEEE Spectrum (11/07) Vol. 44, No. 11, P. 14; Adee, Sarah

Current leakage is a growing problem as transistors shrink with each new generation of microchip, and a transistor redesign is necessary to head off this problem. Three-dimensional rather than planar transistors are gaining credibility, as demonstrated by the proposals that chip manufacturers will present at the International Electronic Device Meeting in December. The FinFET is the most common multigate transistor design, and it requires the channel that links the source and drain to be a thin, finlike wall that protrudes out of the silicon substrate--but etching it out of the silicon is a major challenge. University of California, Berkeley professor Tsu-Jae King Liu, co-inventor of the FinFET, says DRAM manufacturers will be the most likely early adopters of multigate technology. Leo Mathew of Freescale Semiconductor, which will be among those unveiling multigate devices at the December conference, says the manufacturer's new transistor features a finlike channel that resembles an upside-down T. STMicroelectronics has its own concept, a dual-gate planar transistor in which the gates vertically sandwich the channel connecting the source and drain. Key to this breakthrough is finding a way to precisely align the gates. "It has the same electrical advantages as FinFET, but with probably the highest performance ever published," claims STMicroelectronics' Thomas Skotnicki.
Click Here to View Full Article
to the top


To submit feedback about ACM TechNews, contact: [email protected]

To be removed from future issues of TechNews, please submit your email address where you are receiving Technews alerts, at:
http://optout.acm.org/listserv_index.cfm?ln=technews

To re-subscribe in the future, enter your email address at:
http://signup.acm.org/listserv_index.cfm?ln=technews

As an alternative, log in at myacm.acm.org with your ACM Web Account username and password, and follow the "Listservs" link to unsubscribe or to change the email where we should send future issues.

to the top

News Abstracts © 2007 Information, Inc.


© 2007 ACM, Inc. All rights reserved. ACM Privacy Policy.