ACM TechNews (HTML) Read the TechNews Online at: http://technews.acm.org
ACM TechNews
February 28, 2007

MemberNet
The ACM Professional Development Centre
Unsubscribe

Welcome to the February 28, 2007 edition of ACM TechNews, providing timely information for IT professionals three times a week.


HEADLINES AT A GLANCE:

 

US Immigration Reform Bill Could Pass by July
IDG News Service (02/26/07) Mullins, Robert

An immigration reform bill with a provision to boost the cap on the H-1B visa program could be passed by July, according to U.S. Rep. Howard Berman (D-Calif.). "It could pass both houses by July, go to conference, and be on the president's desk by September," Berman said in a speech during the first Tech Industry Summit in San Jose, Calif. Berman, chairman of the House Judiciary Subcommittee on Intellectual Property, said he is more optimistic about the bill because Democrats have control of both chambers. The H-1B program currently has a limit of making 65,000 visas available to skilled foreign workers per year, which has already been reached for 2007. An increase to 115,000 H-1B visas per year is favored by technology companies. "About half of the students enrolled in engineering schools in the U.S. are foreign nationals who have to return to their home countries after earning their degrees, depriving U.S. companies of the chance to hire them," Microsoft's Pamela Passman said at the summit.
Click Here to View Full Article
to the top


From Math Teacher to Turing Winner
CNet (02/27/07) Lombardi, Candace

New A.M. Turing Award Winner Frances Allen spoke recently with CNet about the past, present, and future of computer science, diversity in the field, and her role in both. Allen considers her greatest achievement to be "enabling users to have access to high-performance computing ... being able to achieve high performance by the use of parallel computational computers." She says that when she began working for IBM, the term "computer science" did not exist, and the field was more open to broad experimentation. However, as the field became more structured in the 1960s and became a science, Allen noticed that it was mostly men who met the new requirements being established. She does not believe that women are less interested in science than men are, and espouses the abilities of mobile technology to allow people to work from outside the office, since the "culture of the workplace" may not cater to some women, especially mothers of young children. Mentoring has allowed Allen to make in impact on the number of women going into sciences and to be "an advocate for women," she says. Allen plans to place her $100,000 Turing prize money into a fund that will help educate poor people, with an emphasis on young women, who would not have such an opportunity otherwise. As for the future of computing, Allen "would like to see the computer languages change to be a little bit more user-friendly ... there are lots of experts in that. But we build very high-performance computing machines--and they're getting ever faster and ever bigger, not in size but in terms of their capabilities. We've got to find ways for them to be easier to use." For more information on Frances Allen and ACM's A.M. Turing Award, visit http://campus.acm.org/public/pressroom/press_releases/2_2007/turing2006.cfm< /A>
Click Here to View Full Article
to the top


The Art of Identification
Technology Review (02/28/07) Erard, Michael

Researchers at the Netherlands Institute of Cultural Heritage are working on a system that generates traceable "fingerprints" for works of art as a way to discourage the flourishing underground trade in stolen art and artifacts. The system, known as FingArtPrint, creates a fingerprint using two steps. First, a one-centimeter square of an original work of art is selected, and the color of every pixel in the area is mapped using a scientific-grade digital camera. Next, the roughness of the area is examined using a white-light confocal profilometer, a type of microscope that scans micron by micron, turning what appears to be two-dimensional into a three-dimensional landscape that is unique to the object. The color and roughness information is then combined to make a fingerprint that is stored in a computer database. To ensure the authenticity of an object, a curator or buyer would have to capture a fingerprint from the object and match it to the original fingerprint stored in the database. A test conducted by the research team showed that FingArtPrint was able to capture reliable fingerprints from a variety of works of art and could even distinguished between two sculptures made from the same mold. The system has an advantage over other techniques for verifying authenticity because it has no physical effect on the object itself. However, because FingArtPrint examines patterns of cracking or fading due to aging to create fingerprints, further aging after an original fingerprint is taken could make an original work appear to be a forgery.
Click Here to View Full Article
to the top


How IT Makes Johnny More Productive
Computerworld (02/26/07) Malymuka, Kathleen

Marshall Van Alstyne won the award for best paper at the International Conference on Information Systems in December for his pioneering research into the effects of IT use on productivity at the individual desktop level. By measuring dollars generated, contracts executed, and start and stop dates of projects, compared with what IT applications employees were using, Alstyne found that overall, increased IT use resulted in decreased speed, but multitaskers, though slower at completing individual tasks, were found to be more productive overall. The relationship between multitasking and productivity appears as "an inverted U-shape," according to Alstyne, where productivity increases to a point of multitasking, then begins to wane as multitasking increases past this point. His advice is to cultivate IT skills, but to be aware of "your limits." Emailing and databases were found to facilitate multitasking most efficiently. A social networking statistic called "betweenness" was measured by observing the frequency that someone appears in the shortest communication path between two other people. Another indicator dubbed "reach" was found by measuring the number of people that a worker talks to and then the number of people they talk to. Increased betweenness and reach were both found to be related to increased productivity. Alstyne recommends that businesses "invest in IT skills. High IT skill levels reduce the perception of information overload and facilitate multitasking, which is directly associated with increases in revenue."
Click Here to View Full Article
to the top


BCS: Funding Cuts Will Harm Computing Research
ZDNet UK (02/27/07) Espiner, Tom

The British Computing Society (BCS) criticized the United Kingdom government recent announcement to cut science and technology research funding. The government said that funding for research councils was cut 68 million pounds this year, down to 128 million pounds, with science and technology councils receiving the worst of the cuts. Funding for the Engineering and Physical Sciences Research Council (EPSRC) has been lowered to 29 million pounds. "It is unclear what the impact will be on EPSRC's future ability to fund computing research," said BCS vice president Steve Furber. "The government seems to be signaling to potential science applicants that computing research is not accorded a high priority." BCS says that with less money going to research, there will be less financial incentive for IT and engineering graduates to stay in the U.K. Last November, the BCS cited a 30 percent decrease in the number of students pursuing full-time undergraduate computer science degrees, a trend that, when combined with an IT sector that is losing skilled workers, could do significant damage to the U.K. economy, according to BCS President Nigel Shadbolt. Research councils have also expressed concern over the budget cuts, especially since a good deal of their budgets are committed several years into the future.
Click Here to View Full Article
to the top


European Research Goes for Gold
BBC News (02/27/07) Amos, Jonathan

After five years of planning, the European Research Council (ERC) has been established, with the goal of increasing the global competitiveness of Europe's scientific community. In the past, the EU's Framework Programme was in charge of funding public research, and was known to be overly bureaucratic and to favor intricate collaborations. But the ERC, which will receive 7.5 billion euros by 2013, will not require specific themes, collaboration, or the return of a proportion of grant money to contributing nations. A main point of the ERC's philosophy is the importance of emerging researchers, those who have held a Ph.D. less than nine years. The administrative structure will support the young researchers, allowing them to put their own teams together. One ERC application, being created by Dr. Kalina Bontcheva, a Sheffield University computer science professor who specializes in natural language processing, will investigate the use of "virtual characters" to help people interface with computers. "We want to make it easier for people to interact with our advanced search technology," says Bontcheva. "You could then ask these characters what you want and they would understand you and go away and get the information for you." The success of the program will be measured by the amount of scientific papers published by ERC researchers, citations they receive, and the ability to both bring researchers back to Europe and attract new ones. "We have a collection of small scientific communities, and that means you have a tendency to select the best in small parts, rather than looking for what will survive in global competition," says ERC President Fotis Kafatos. "The ERC is about pooling our efforts so that all of Europe can be a big player."
Click Here to View Full Article
to the top


Professor Fights a Mathematical Battle to Keep the Virtual World Running Smoothly
University of New Mexico (02/26/07)

University of New Mexico computer science professor Jared Saia has completed algorithms that are able to support computer systems that have hundreds of millions of users and provide formidable resistance to an attack. Based on the Byzantine Agreement that traitors are working behind the scenes to plot an attack, the algorithms make use of mathematical tools such as expander and extractor graphs that can be used to develop reliable distributed systems, in addition to the probabilistic method. They are robust and scalable. Saia says that people collaborating on a Web-based project should be able to proceed with their work even if one-third of the participants are working to sabotage the effort. He now plans to focus on turning his research into a commercial product. Saia recently received a National Science Foundation Career award, and he will use the $400,000 award over five years and other grant money that he has received from the NSF and Sandia National Labs over the years to press ahead with the project.
Click Here to View Full Article
to the top


Experts: No Cure in Sight for Unpredictable Hard Drive Loss
Ars Technica (02/25/07) Anderson, Nate

A study by Google researchers entitled "Failure Trends in a Large Disk Drive Population" concluded that individual drive malfunctions cannot be effectively predicted with Self-Monitoring, Analysis, and Reporting Technology (SMART) information, and that there is no correlation between drive failure and temperature and CPU utilization levels. Alfredo Milani-Comparetti, creator of the SpeedFan temperature and SMART monitoring tool, found Google's argument that SMART cannot be employed to model individual drive failure to be "very odd," and he thinks his tools and SMART data together can help people spot failing hard drives. SpinRite creator Steve Gibson notes that drive watchers have long regarded the SMART system's value with skepticism, although he acknowledges that the optimal methodology for determining whether a drive is failing or not is sector reallocation counts. Gibson observes that the "very high temperatures" that can impact drive lifetimes often occur in home PCs. "Failure rates are always much higher than the manufacturers claim," he says, but the manufacturers' need to continue selling drives to remain in business creates an incentive for not boosting their products' reliability. This month's FAST '07 conference cited an exemplary report on disk failures from Carnegie Mellon computer science professors concluding that the rate of drive failures is actually much higher than indicated in the manufacturer's mean time to failure. Also discovered in the study is a steadily rising rate of failure that starts at a very early point in a drive's lifetime. "This is an interesting observation, because it does not agree with the common assumption that after the first year of operation, failure rates reach a steady state for a few years, forming the 'bottom of the bathtub,'" the researchers wrote.
Click Here to View Full Article
to the top


Group Might Be the Key to Bridging the Digital Divide
Investor's Business Daily (02/27/07) P. A4; Kontzer, Tony

Although there have been several programs aimed at bringing computers and the Internet to the Third World, they have mostly worked in isolation and have struggled to make a real impact. But a new project operating out of the University of California, Berkeley, known as the RiOS (research, innovation, organization, and societies) Institute aims to enhance the effectiveness of such programs by supplying technology development organizations with business advice and supplying businesses with technology development advice. Since its inception at a conference in Silicon Valley, RiOS has signed a 10-year pact to work with the United Nation's Global Alliance for Information and Communications Technology Development. "There's no use having lots of programs to get technologies out to societies that can derive no value from them," said Cassatt CEO Bill Coleman. Coleman says that without true economies, "the digital divide doesn't mean anything" to many countries. Providing computers so that people can do something like play video games is useless, "But if you can create jobs, then you're making a fundamental change," says the World Bank's Djordjija Petkoski. One example of the type of work RiOS plans is a program conducted by the Development of Disadvantaged People, which allowed women in India to produce 225 liters of drinking water a day, for only one dollar, and sell the water for profit. "What used to be philanthropic activity is now becoming a more important part of doing business," says RiOS executive director Paul Braund. "There's no single government and no single company that can deal with all these issues."
Click Here to View Full Article
to the top


Technology Keeps Tabs on Newborns
Star Phoenix (02/26/07) French, Janet

A system developed by Monique Frize, a professor at Carleton University's systems and computer engineering department, could allow computers to monitor babies' vital signs to predict health problems and alert doctors. Doctors would use the system as a decision support tool, since predicting whether a sick baby will live or die is a very difficult and sensitive task. Although the computer's decision may not change a doctor's mind, it could alert them to watch for warning signs or to act faster. To train the computers to make predictions, the Frize compiled health information from about 24,000 babies whose outcomes were already known. Frize also created a program for predicting premature births, using information from a U.S. Center for Disease Control Database. She hopes that she can develop tests for mores specific conditions such as Down syndrome. "My machine works with just data," Frize said. "You don't have to do any tests on the person. You just glean some information, you put it in and it seems to be as accurate as some of the invasive techniques." Babies are normally hooked up to many machines that analyze data independently, and Frize's aim is to integrate this analysis into a single machine that takes information from several sources. She is also involved in a project that is exploring the use of infrared light to visualize pain in patients.
Click Here to View Full Article
to the top


EPA Begins Evaluation of Data Center Power, Cooling Issues
eWeek (02/23/07) Preimesberger, Chris

An EPA workshop was held last week to establish a new "Energy Star" certification for data center power consumption. The workshop included representatives from major IT companies, power and cooling service providers, and others who have an interest in the matter. "We don't want to look at incremental change," said the EPA's Andrew Fanara. "We're thinking 'whole system design' change here. We need to produce more energy-efficient servers, no question about it. This is the group that's going to help quantify all this." A recent report from the Lawrence Berkeley National Laboratory approximated that the electricity used by servers doubled between 2000 and 2005, due in large part to the significant increase in the number of active servers as well as critical ancillary systems such as cooling and lighting. Stanford University scientist Jon Koomey, who worked on the Berkeley National Laboratory report, says, "There's a lot of opportunity for improvement." Rep. Ann Eshoo (D.-Calif.), who co-authored the bill that called on the EPA to review the issue, says, "The cumulative energy cost for servers and data centers in the U.S. is approximately $3.3 billion annually, and studies have shown energy-efficient servers can save up to 80 percent in electricity and cooling costs." The workshop produced several industry-centric groups that will add to the EPA's final report to Congress by focusing on areas such as software, architecture, and processors.
Click Here to View Full Article
to the top


Scientists: Data-Storing Bacteria Could Last Thousands of Years
Computerworld (02/27/07) Mearian, Lucas

New technology developed by researchers at Keio University Institute for Advanced Biosciences and Keio University Shonan Fujisawa Campus offers huge possibilities for long-term data storage. Current disk and storage systems can store data for up to 100 years in most situations, while the use of bacteria DNA could provide a medium for storing data for thousands of years. The researchers used the technology to create an artificial DNA that can carry more than 100 bits of data within the genome structure. The artificial DNA carries data, makes numerous copies of its DNA, and inserts the originals and the copies, or the backup files, into the bacterial genome sequence. The Japanese researchers say the first application of the technology could be to track medication. The new technology has the potential to enable the storage of text and images for many millennia.
Click Here to View Full Article
to the top


Videos Have Net Bursting at the Seams
Chicago Tribune (02/23/07) Van , Jon

The growing popularity of sending video clips over the Internet is testing network limits and requiring significant investment from operators, but whether or not regulation is needed to keep pipes from becoming clogged is a point of much contention. "We don't see anything catastrophic near term, but over the next few years there's this fundamental wall we're heading towards," said Qwest CTO Pieter Poll. Traffic volume has outpaced computer power, and a recent report by Deloitte Consulting predicted that Internet demand would exceed capacity in 2007. Deloitte partner David Tansley says that "so many business models assume Internet capacity to be ubiquitous and inexpensive that capacity isn't seen as a limiting factor in applications." He says network operators will soon need to extend capacity, although some will not have the required capital. Telecoms have always viewed the Internet as a scarce resource, and are now claiming that it needs to be regulated in order to survive, an argument that Internet executives call posturing, citing past efforts to regulate VoIP on the grounds that it would exceed network capacity. Changing habits, such as the trend of sending video from user to user, have made telecoms' job of predicting demand quite difficult. Internet companies have always treated the Internet as an abundant resource, noting that technology such as VoIP has come on gradually, allowing networks to step up to meet demands. As high-definition video becomes easier to record and access, the bandwidth crunch will continue, although "With appropriate continuing investment, the Internet is capable of handling any applications," claims Level3 Communications vice president John Ryan. "What we're starting to see is a distinction between those operators who have the capital to fund expansion and those that don't."
Click Here to View Full Article
to the top


Will C# Ring True for Embedded Apps?
EE Times (02/26/07)No. 1464, P. 46; Goering, Richard

Embedded designers have been slow to embrace the C# language that Microsoft has developed. Primarily limited to the desktop, C# does not have as many symbolic requirements as C++ and as many declarative requirements as Java. "We're trying to bring that sort of capability into a new environment," says Colin Miller, Microsoft director of the .Net Micro Framework. The company recently introduced a free software development kit that embedded developers will be able to use to build applications in C# with a subset of the .Net libraries that are available for the desktop. Miller notes that C# runs inside a managed environment, is more foolproof than C/C++, and makes debugging easier, facilitating desktop developers' transition to deeply embedded applications. Researchers at the University of Montreal saw the same potential in the use of .Net and C# for system-level design a few years ago. Professor El Mostapha Aboulhamid described C# as bringing together "what is nice in Java and what is nice in C++."
Click Here to View Full Article
to the top


To Be Almost Human or Not to Be, That Is the Question
Electronic Design (02/15/07) Vol. 55, No. 4, P. 37; Harris, Daniel

Researchers developing robots as caregivers and assistants to the handicapped and the elderly are on the horns of a dilemma: Whether to strive for a more humanoid appearance and function or embrace a more artificial, science-fiction model. Advocating the first case are scientists such as professor Hiroshi Ishiguro of Osaka University's Department of Adaptive Machine Systems, while project leader of Honda America's North American Advanced Step in Innovative Mobility (ASIMO) Stephen Keeney and other researchers support the second option. ASIMO uses a variety of sensors and algorithms to access distance and direction, process moving objects, and interact with people, but Keeney says the robot's human features--legs instead of treads or wheels, hands to manipulate objects, etc.--are incorporated so it can fulfill its function as a caregiver. "We should always be cognizant that ASIMO is a machine and should be approachable and not be scary to children," notes Keeney. "It is a comfortable middle ground between machine and humanoid androids that others are working on." Ishiguro's goal is to create androids that are indistinguishable from humans at first sight with such technologies as tactile sensors, actuators, and human-looking artificial skin. Of particular interest to the scientist is the use of androids to provide entertainment, fulfill communication needs, and serve as companions, and one of the bigger obstacles researchers face is the Uncanny Valley, which is people's tendency to reject machines that look, move, and act human beyond a certain point of acceptability. Human-like movement is key to the success of androids, according to Ishiguro, and other necessary breakthroughs include the ability to comprehend answers, deduce information based on conversations, and distinguish individuals within a crowd.
Click Here to View Full Article
to the top


Interview: Once More With Feelings
New Scientist (02/24/07) Vol. 193, No. 2592, P. 48; Gefter, Amanda

AI pioneer and author Marvin Minsky believes that by studying human emotion artificial intelligence researchers can gain insight into what makes them so resourceful. Humans are able to look at something in many different ways and use different mental and physical resources to solve problems, while computers usually have only one way of thinking about something. Minsky believes that emotional states are actually simpler than most other ways of thinking. He says emotions simply block certain mental processes, or resources, allowing a system to have many processes, yet only make use of what it needs. Computers have never been capable of what we call "common sense," since people are able to take in millions of fragments of information and thousands of processes, while computers only are fed information about a single subject, although some projects are now collecting massive amounts of everyday knowledge and looking for ways to organize and apply it in computers. Minsky, recipient of ACM's A.M. Turing Award in in 1969, has developed the "Critic-Selector" model of mind, which imagines the brain as a machine containing numerous resources that make up "ways to think" when combined in certain ways. The Critic element would be aware that a task was too difficult as it was being carried out and try to approach the problem from a new angle, or divide it into parts, and the Selector could turn processes on or off to suit relevant needs. AI has not progressed much since the 1980s, according to Minsky, because "AI researchers have developed many techniques for solving various types of problems, but few of them have tried to come up with schemes that combine multiple ways of thinking."
Click Here to View Full Article - Web Link to Publication Homepage
to the top


W3C Publishes Eight New XML-Family Specs
SD Times (02/15/07)No. 168, P. 5; Worthington, David

XQuery, Extensible Stylesheet Language Transformation (XSLT) 2.0, XML Path Language (XPath) 2.0, and five other specifications were published by the World Wide Web Consortium (W3C) in order to hasten enterprise initiatives to connect databases to the Web and influence the integration of databases and document systems. "These specifications provide a much needed bridge between two worlds: Documents with complex but irregular internal structure on the one hand, and databases and simple data with atomic values on the other," said Michael Sperberg-McQueen of the W3C. The goal of XQuery is to deliver a unified interface for multiple-source data access using tools for querying structured and semi-structured data that is not restricted by schemas. XPath 2.0 is described by W3C as a superset of the original language as well as a subset of XSLT 2.0 and XQuery, with the added functions of stronger text processing via regular expressions, support for conditional statements by path expressions, and additional data type support that augments the language's information processing capacity. "XPath is widely regarded as the standard mechanism for locating objects in XML," reported IBM research fellow Don Chamberlin. "The fact that this is adopted in common for XSLT and XQuery is very important to the industry because these have become a suite of standards and are converging into a compatible family." Broadening the range of XML transformations with an expanded library of functions that maintains most backward compatibility is the purpose of XSLT 2.0, and the standard's authors claim that the spec eases error filtering, primarily due to data conversions between XML schemas. The other five specs are complementary to XQuery, XPath 2.0, and XSLT 2.0 as supporting technology.
Click Here to View Full Article
to the top


Enabling the 21st Century Health Care Information Technology Revolution
Communications of the ACM (02/07) Vol. 50, No. 2, P. 34; Agrawal, Rakesh; Grandison, Tyrone; Johnson, Christopher

The U.S. government's push to create a health care information infrastructure requires technologies that support the sharing of electronic medical records while protecting the privacy of patients, and the authors write that such technologies are components of their Hippocratic Database (HDB). HDB's Active Enforcement (AE) component is responsive to emergent privacy and security requirements, permits the negotiation of policies covering the disclosure of personal information between patients and health care institutions, and enables cell-level management rather than row- or column-level management in the database, using the three-stage process of policy creation, preference negotiation, and application data retrieval. HDB AE provides a general methodology for managing and classifying policy and preference information, transparent policy enforcement for enterprise applications, underlying database-technology agnosticism, and enhanced query processing speed. There are methods AE can be combined with to allow queries over encrypted data without incurring a performance penalty. HDB's Sovereign Information Integration component enables autonomous entities to exchange information securely and privately through the use of a Web services framework that applies a series of commutative encryption functions to uniquely recognizable information in different orders and at different sites, yielding encrypted values that can be matched against each other while maintaining the privacy and security of the data sets. The government's vision of a health care information framework calls for efficient and cost-effective data access tracking systems for determining the identification of people who access patient information and whether such access is authorized, and HDB meets this challenge with its Compliance Auditing solution. Compliance Auditing employs a logical logging system to register all queries and contextual data and an audit application to recreate the state of the database at any given past time using query logs and backlog tables. HDB can de-identify information for research and analysis through its Privacy-Preserving Data Mining component and its optimal k-anonymization component.
Click Here to View Full Article - Web Link to Publication Homepage
to the top


To submit feedback about ACM TechNews, contact: [email protected]

To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to [email protected] with the line

signoff technews

in the body of your message.

Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@ acm.org

We will remove your name from the TechNews list on your behalf.

For help with technical problems, including problems with leaving the list, please write to: [email protected]

to the top

News Abstracts © 2007 Information, Inc.


© 2007 ACM, Inc. All rights reserved. ACM Privacy Policy.