Read the TechNews Online at: http://technews.acm.org
ACM TechNews
March 5, 2007

MemberNet
The ACM Professional Development Centre
Unsubscribe

Welcome to the March 5, 2007 edition of ACM TechNews, providing timely information for IT professionals three times a week.


HEADLINES AT A GLANCE:

 

Open Call From the Patent Office
Washington Post (03/05/07) P. A1; Sipress, Alan

The United States Patent Office will soon allow members of the online community to post and evaluate information concerning patent proposals on a new wiki-style Web site. "For the first time in history, it allows the patent-office examiners to open up their cubicles and get access to a whole world of technical experts," said IBM's David J. Kappos. The pilot project will start this Spring and feature a community rating system that prioritizes the most respected comments. During the pilot phase of the project about 250 software design applications will be posted on the Web site since examiners have an especially difficult time finding documentation for them. Any user can post information relating to patent proposals, but a "reputation system" will be put in place to rank submitted materials and measure the expertise of contributors. In order to develop a reliable reputation system, the Patent Office has forged partnerships with several e-commerce specialists. Patent examiners will be able to award "gold stars" to those who provide exceptionally useful information. The information submitted will eventually be voted on by registered users, with the top 10 items being sent along to an examiner who will make the final decision on the patent. "The idea is to make something as important as decision-making about innovation more transparent to the public and more accountable to the public," says new York Law School Professor Beth Noveck. The system is expected to go through some changes, specifically the voting process, which may limit the ability to vote or give more weight to some votes.
Click Here to View Full Article
to the top


Software Vulnerability Index Making Progress
IDG News Service (03/01/07) Hines, Matt

The Common Weakness Enumeration (CWE) project expects to publish the sixth iteration of their software vulnerabilities index in April, and says the final draft of the encyclopedia should be ready later in the year. The security experts involved in CWE continue to aggregate and organize the enormous amount of data on software flaws that they have collected, and lately they have focused more on testing commercial security scanning tools to determine their effectiveness. The applications target 45 percent of the 600 common vulnerabilities that have been entered into the CWE index thus far. "We found that less than half of what we already have in CWE is covered by these tools, so this helps prove that there are a lot of known issues out there that aren't being addressed," says Citigal's Sean Barnum. "We also thought that the tools would look for the same types of things, but they are actually very different, and there's not a lot of overlap; that's something that developers need to be aware of as they choose tools; you want to right set for aggregated coverage." A central resource on common flaws is viewed as a helpful tool for improving software quality, and project participants believe it could lead to a common language and standard procedures for addressing the loopholes in source code today. The Department of Homeland Security is sponsoring the CWE initiative.
Click Here to View Full Article
to the top


College Coders to Compete in Tokyo at IBM-Sponsored ACM International Collegiate Programming Contest
Market Wire (03/01/07)

The 31st annual World Finals of the ACM International Collegiate Programming Contest will take place March 12-16, 2007, in Tokyo. The United States will be heavily represented at the event with teams from 20 universities, while the Asia-Pacific region is sending 31 teams, including 12 from China and three from Japanese universities; and Europe will have 20 teams, with nine coming from Russia. There will also be teams from Brazil, India, Vietnam, Iran, South Africa, and Kazakhstan, among other countries. The teams will only have five hours to solve at least eight enormously challenging computer programming problems that will be based on real-world business issues. The ICPC champion will be the team that solves the most problems in the least amount of time, and its members will earn scholarships and receive prizes from IBM, which continues to sponsor the event. "In the first decade of IBM sponsorship, ICPC participation has skyrocketed eight-fold," says Baylor University professor and ACM-ICPC executive director Dr. William Poucher. "Together, we shine the spotlight on tomorrow's superstars." The ACM Japan Chapter and the IBM Tokyo Research Laboratory are the co-hosts.
Click Here to View Full Article - Web Link to Publication Homepage
to the top


Turing Award Recipient Discusses IBM, Then and Now
eWeek (03/01/07) Perelman, Deborah

In a recent interview, ACM A.M. Turing Award winner Frances Allen spoke about the changes she has witnessed in the IT industry regarding women and what can be done to bring more women into the field. "In 1960 it was just fine for women to be managing; it was nothing exceptional," says Allen. But once "computing became a profession," engineering courses were required, and there were very few women in engineering school at the time. "This is the point when I think things changed dramatically for women," Allen says. "As a field, it really hasn't recovered from that." The gender gap has been closing in every other science, but computing has not witnessed the same integration. Although Allen spends a lot of time pondering it, she admits to not understanding what keeps women from pursuing careers in computing, but she suggests attention be paid to two aspects. First, to the curriculum and the experiences it affords, since "the decision to go into computing is difficult for both boys and girls," Allen says. "Many choose it as a major and then drop out." Second, the workplace needs attention, since studies have shown that diversity yields better results. Allen laments that the enthusiasm in the field has decreased since 1960. She believes women could provide the element missing from the industry. She says, "I think they could make contributions--maybe on the ease of use of computers, or in the style of work."
Click Here to View Full Article
to the top


Computer-Science Slide
Fort Wayne Journal Gazette (IN) (03/04/07) Stockman, Krista J.

The perception that computing jobs are hard to come by is prevalent among today's students, although it could not be further from the truth: The sector is the fastest growing in all of science and engineering. There will be 1.4 million new computing jobs over the next 10 years, according to Purdue University College of Science Dean Jeffrey Vitter. He blames parents for telling their children not to study computing based on a false belief in the scarcity of jobs in the field. Schools have the responsibility to implement computers more effectively into the classroom at all grade levels to expose students to real-world applications of technology, rather than letting them think that computer science is simply about sitting in front of a computer all day writing code. "What we're trying to do in our school system is if people feel computer science is something only computer geeks do, they have to understand that the whole world is going to computer-based technology to conduct business," says Cisco's Andy Melin. Students usually show an early interest in computers, but schools must do more to turn this enthusiasm into motivation to enter the field, especially in females. In order to maintain a competitive advantage, the nation must make a greater effort to fill this growing job pool, Vitter says. He says, "We will be at a competitive disadvantage if we cannot fill the job pool."
Click Here to View Full Article
to the top


Clash of the Robots
InternetNews.com (03/02/07) Hickins, Michael

Tests conducted by the National Institute of Standards and Technology have shown that the communication abilities of search and rescue robots could suffer from crossed and disrupted signals. Military robots are given special frequencies on which to operate, but urban search and rescue robots use the unlicensed industrial, scientific, and medical (ISM) band, used by most commercial electronic devices. Features such as mobility and dexterity have received a great deal of attention, while "wireless capability has been almost an afterthought," explains NIST wireless systems expert Kate Remely. "It's certainly not an insurmountable problem, but it needs to start being considered by the manufacturers," she says. The NIST field test of 14 robots showed that signals from other systems caused 10 of the robots to stop functioning completely, and neither the use of ISM frequencies or protocols intended to minimize interference could ensure optimal communication between robot and human operator. Radio interference occurred when the ISM bands became too crowded or one user had a significantly higher power output than the others. Solutions being explored include changes in frequency coordination, transmission protocols, power output, access priority, and implementing relay transformers to increase the range of wireless signals.
Click Here to View Full Article
to the top


Computer Sleuths Try to Crack Pioneer Anomaly
New Scientist (03/02/07) Clark, Stuart

Scientists looking into the anomaly that caused two pioneer spacecrafts to veer off course by hundreds of thousands of kilometers should know within a year whether the problem was caused by human error or unexpected gravitational behavior. Both spacecrafts were found to have decelerated slightly, even as they traveled in different directions, suggesting that the gravitational pull was stronger than Newton's law would indicate. One suspected cause of the anomaly is heat escaping from Radioisotope Thermal Generators (RTGs) on board the spacecrafts. Software developer Viktor Toth has obtained all 40 gigabytes of telemetry data from each of the spacecrafts' 120 sensors and created programs that can analyze it. "I essentially wrote new software to do what the old software used to," explains Toth. The telemetry data, which contains information on the crafts' internal behavior, can be compared to the crafts' tracking data to find if the changes in the amount of heat escaping throughout the crafts' lifespan corresponds with the anomaly. In order to analyze the tracking data, each piece of information must be translated into a common form, since tracking systems have changed so frequently. This data set should be completely translated by June 2007, when it can be used to indicate the direction in which the anomaly acted; if it acted in the direction of Earth, the crafts' technology is to blame, but if it acted in the direction of the Sun, new gravitational physics may be needed to understand what happened.
Click Here to View Full Article
to the top


Researchers Peel the Onion Router
IDG News Service (03/02/07) Kirk, Jeremy

Researchers at the University of Colorado in Boulder say they have cracked The Onion Router (Tor), but add that such networks remain effective. In fact, their Web site describes Tor as the "most secure and usable privacy-enhancing system available." Nonetheless, the researchers say they have built their own Tor network, which includes malicious servers that were able to draw a substantial amount of routing requests by misrepresenting their bandwidth capability, and used an algorithm to connect the "path" of a Web site request. According to their paper, paths could be calculated, revealing where the traffic came from, more than 46 percent of the time. Tor is designed to provide anonymity to users by facilitating the development of networks of servers that send traffic over a number of different routes. However, the researchers say law enforcement officials or organizations such as the Recording Industry Association of America would be able to use their approach to track down Tor users. "We have never seen such an attack 'in the wild,' and we think it no more likely that this paper would make such an attack easier or more likely than it was a few years ago when another version of it was documented," responded Tor executive director Shava Nerad in a blog.
Click Here to View Full Article
to the top


Confronting Parallelism: The View From Berkeley
HPC Wire (03/02/07) Vol. 16, No. 9,

Two co-authors of "The View from Berkeley," a new paper detailing the challenges of parallelism, spoke about their work with HPC Wire, discussing the need for a "manycore" architecture over "multicore" architecture, and the problems facing the software industry, among other things. The main hurdle for future parallel architectures is to find a way for programs to be easily written for manycore processors. The paper recommends RISC over CISC, autotuners instead of compilers, and human-centric design rather than machine-centric design. Underlying these arguments is the idea that parallelism is really a retreat from the challenges that have made uniprocessor architectures ineffectual. A new project, known as RAMP, aims to build low-cost scalable hardware/software prototypes, two of which have already been built to show the project's potential. The current state of parallel software development has led to "what can only be characterized as widespread panic in the mainstream software development community," says co-author John Shalf, a computer scientist with NERSC. "To maximize programmer productivity, programming models should be independent of the number of processors, allow programmers to use a richer set of data types and sizes, and they should support successful and well-known parallel models of parallelism: Independent task parallelism, word-level data parallelism, and bit-level data parallelism," says co-author and former ACM president David Patterson, a UC Berkeley professor of computer science. The paper also discusses the value of learning from embedded computing and the serious problems facing legacy codes. If the HPC community is unable to effectively implement large-scale parallelism, multicore will become influential in the centralization of computing through software as a service.
Click Here to View Full Article
to the top


Walking Robot Steps Up the Pace
BBC News (03/02/07)

Dexter is a humanoid robot that can learn from its own mistakes, rather than relying on movements dictated by programmers. Designed by Anybots, an independent research group of three engineers, Dexter records about 200 statistics 100 times per second, including joint positions, force applied on the feet, and the body's orientation, which is measured in humans by the inner ear. Dexter began with only a basic idea of what walking should look like, and "the first time it [tried] it just fell over right away," says Anybots founder Trevor Blackwell. The goal is develop a robot that can adapt to different environments and roles, without needing specific programming as Honda's Asimo does. Before being able to do something, Dexter requires some encouragement but also uses self-motivation. Anybots hopes that Dexter will have taught itself to run in a few months.
Click Here to View Full Article
to the top


Foolproof Quantum Cryptography
Technology Review (03/02/07) Graham-Rowe, Duncan

Current quantum-cryptographic systems are hindered by the fact that sending information more than a short distance allows the encryption keys to be intercepted in a manner that is undetectable. When sending bursts of light over optical fibers, stronger pulses often contain more than one photon, meaning single photons can be intercepted without the transmitter or receiver being aware. Toshiba has developed an "unconditional security" system that allows stronger signals to be sent, using individual "decoy photons" sent along with the signals in order to detect eavesdropping. Using this system, eavesdroppers' attempts to block single photons and siphon off multiple photons from other pulses will result in more decoy pulses than the rest of the signal being blocked, and by measuring the ratio of decoy pulses that make it through to signals that make it through, an attack can be identified. This ability to detect eavesdropping allows stronger signals to be used, and therefore allows encryption keys to be sent greater distances. The new challenge confronting researchers is to create a system that more reliably produces single photons, which would eliminate the need for "decoy pulses." Toshiba envisions an array of quantum dots each measuring 45 nanometers in diameter and capable of emitting only single photons.
Click Here to View Full Article
to the top


Winning Computer Program Created by a Graduate Student Beats World Champion Scrabble Player
Daily Illini (02/28/07) Sackley, Kristen

University of Illinois-Champagne graduate student Mark Richards created Inference Player, a Scrabble-playing program that was able to beat the computer world champion by implementing a strategy that considers what tiles the other player could have. "What normal programs do is they generate all the possible plays and they rank them not only according to how many points they score on the current turn but on the quality of the letters they leave behind," said Richards. "But what they often fail to take into consideration is what does my opponent have." Using open source Scrabble-playing software, Richards manipulated the program to narrow down the possibilities of what the opponent has by assuming that all letters remaining on the rack after a move could not have been used to make any words worth more points than that which the opponent just played. His computer science professor, Eyal Amir, points out that opponent modeling is useful in many real-world applications, though the technology is only in its infancy. Richards' work has been commended by many programming publications, and he plans to investigate other uses of the program's thought process.
Click Here to View Full Article
to the top


Black Hat Demonstrations Shatter Hardware Hacking Myths
eWeek (03/01/07) Vaas, Lisa

At the Black Hat Briefings in Arlington, Va., two long-standing hardware security beliefs, that reimaging would remove a rootkit hit on a system and using a PCI card or a FireWire bus was the best way to search a PC's volatile RAM memory, were proven false in two demonstrations. The first demonstration exploited a way to subvert system memory through software, destroying the long-held conviction that "going to hardware" to secure incident response worked as a security failsafe. Following such an attack, the only way to correct the system's memory corruption would be to reboot, erasing all evidence of the subversion and leaving digital forensic teams unable to figure out, or prove in court or to auditors, what the attackers did on the company's computers. The second demonstration proved that rootkits can persist on a device, or firmware, rather than on only a disk, and can survive a machine being reimaged, and can even survive reformatting. Though these hacks are not widely known or frequently deployed, they prove that a significant number of assumptions about hardware security are false.
Click Here to View Full Article
to the top


Get Ready for the Data Dump
InternetNews.com (03/05/07) Boulton, Clint

Information management technology will need to improve in order to handle the enormous increase in digital information in the years to come, according to IDC chief research officer John Gantz. A new IDC report predicts that digital information will increase sixfold from 161 billion GB last year to 988 billion GB by 2010. Businesses will need to use more advanced techniques for transporting, storing, securing, and replicating the information, says Gantz. "You can't treat all data, all packets, and all bytes the same," he says. "That's where you get into interesting situations of classifying data and determining what you save and what you don't." The Internet, which has grown from 48 million users in 1996 to 1.1 billion users in 2006, is a key reason for the proliferation of digital information, and IDC expects another 500 million users will be online by 2010. The largest number of bytes, more than 500 billion, will be from images taken from digital cameras, camera phones, medical scanners, and security cameras. Individuals will generate close to 70 percent of the information, and most of it will reach businesses.
Click Here to View Full Article
to the top


Face of the Future
Engineer (02/26/07)

The European Union is funding a robot research program, Ubiquitous Robots in Urban Settings, that aims to produce robots capable of several applications, including acting as "robo-cops" in urban areas. These robots would patrol and monitor urban areas for suspicious activity and would be able to react to and interpret pedestrians, vehicles, and other moving objects. Using data that has been programmed into them, the robots would be capable of detecting abnormalities such as suspicious activity, litter, or vandalism. "For example, if you have a robot with a camera that looks down a road and it knows it is normal behavior for people to just walk along, then it will know that if somebody shimmies up a drainpipe, it is something the system has never seen before," explains University of Surrey professor Richard Bowden. When the robot spots suspicious activity, it would then share data with other networked robots, including its location, and send an alarm. This would effectively serve as a higher form of CCTV--one capable not just of videotaping criminal actions, but detecting and reporting these actions at their source.
Click Here to View Full Article
to the top


Herding the Mob
Wired (03/07) Vol. 15, No. 3, P. 110; Newitz, Annalee

The increasing popularity of online recommendation systems in which services, vendors, Web sites, and others are ranked according to group feedback is inevitably attracting the criminal element. Manipulation of eBay's feedback scheme, the premier standard for recommendation systems, is not difficult. A scammer can work the system by selling lots of low-end items to build up a high feedback score, and then cheat customers on big-ticket sales. A study conducted by UC Berkeley Haas School of Business professor John Morgan uncovered more than 6,000 instances in which buyers and sellers engaged in eBay transactions for the express purpose of raising each other's rankings. Crowd scoring systems are also being used to rate online stories and postings for the benefit of readers, but such a setup can also be rigged through Sybil attacks, when a single individual opens multiple accounts and has them all recommend the same item. The largest and most well-known news and article aggregator site, Digg, employs watchdogs who are expert in the legitimate ways that stories are assigned popularity, and who constantly modify algorithms that target nonstandard voting patterns that could indicate attempts at crowdhacking. University of Michigan information studies professor Paul Resnick is confident that the continuing development of algorithms designed to filter out crowdhackers will ultimately lead to victory. "A good reputation system makes people more trustworthy, because word gets around if they're not," he maintains.
Click Here to View Full Article
to the top


3D You
Government Technology (02/07) Vol. 20, No. 2, P. 26; Vander Veen, Chad

Researchers at Intel and Carnegie Mellon University are working to bridge the chasm between science fiction and science fact with the development of "dynamic physical renderings," or 3D holograms that have texture, weight, and mass. The project took root with CMU computer scientists Todd Mowry and Seth Goldstein's vision of remote, 3D representations of people that could be used for telepresence applications; these representations would be constructed from claytronics atoms (catoms). The research team is hoping to roll out a 3D fax machine in a few years that would capture and replicate any arbitrary, stationary object out of catoms that are 1 millimeter in diameter, according to Goldstein. The perfection of the technology would yield catoms so small that they could reproduce any texture precisely. Addressing the hardware challenge of building and powering the catoms is an easier task than developing the software, which must relay to each catom instructions for movement, the color of light they should emit, the configuration they must assume to properly duplicate texture, and so on. "On the software front, we've made great strides in the last year and a half or so--identifying ways to form shapes and route power and start to control some of these devices--but we have a long way left to go," notes Mowry. Being considered as a solution to most of the problems researchers face is a vat where catoms are stored, which is powered with a direct link between the vat and the completed object. The project's sponsors include CMU, Intel, the Defense Advanced Research Projects Agency, and the National Science Foundation.
Click Here to View Full Article
to the top


To submit feedback about ACM TechNews, contact: [email protected]

To unsubscribe from the ACM TechNews Early Alert Service: Please send a separate email to [email protected] with the line

signoff technews

in the body of your message.

Please note that replying directly to this message does not automatically unsubscribe you from the TechNews list.

ACM may have a different email address on file for you, so if you're unable to "unsubscribe" yourself, please direct your request to: technews-request@ acm.org

We will remove your name from the TechNews list on your behalf.

For help with technical problems, including problems with leaving the list, please write to: [email protected]

to the top

News Abstracts © 2007 Information, Inc.


© 2007 ACM, Inc. All rights reserved. ACM Privacy Policy.