September/
 October
1998

Copyright 1998 EDUCAUSE. From Educom Review, Volume 33, Number 5, p. 4-5. Permission to copy or disseminate all or part of this material is granted provided that the copies are not made or distributed for commercial advantage, the EDUCAUSE copyright and its date appear, and notice is given that copying is by permission of EDUCAUSE. To disseminate otherwise, or to republish, requires written permission. For further information, contact Jim Roche at EDUCAUSE, 4840 Pearl East Circle, Suite 302E, Boulder, CO 80301 USA; 303-939-0308; e-mail: [email protected]





TechWatch

Technology in the News: An Edupage Sampler
A sampler of items from Edupage, Educom's
three-times-a-week electronic digest of
information technology news.

OXFORD ONLINE
With the help of an $820,000 grant from
Microsoft co-founder Paul Allen's Virtual Education Foundation based in Washington state, venerable Oxford University will soon be offering certificate-granting Continuing Education courses over the Internet. The courses will not be part of a full degree program. An Oxford administrator says that the courses "are designed around a completely new concept of online tutorial support within reach of the distant learner." Special tutors will supervise students using e-mail, Internet class discussions, and audio conferencing. (AP 20 Jul 98)

STARTING LINE-UP FOR DIGITAL BASEBALL CARDS
Baseball cards are morphing into multimedia format, with two sets of stars available from Silicon Valley startup CyberAction and Major League Baseball Properties. The sets consist of four stars each, and each card can be "clicked" on to reveal full-motion and audio clips, player stats and personal data. The initial sets feature sluggers Mark McGwire, Ken Griffey Jr., Tino Martinez and Matt Williams, and pitchers Roger Clemens, Pedro Martinez, Tom Glavine and Randy Johnson.
(Broadcasting & Cable 13 Jul 98)

DEEP CRACK
Using a homemade supercomputer, a team of about a dozen researchers spent less than $250,000 to crack the government's data encryption standard code (D.E.S.) in record time to win a $10,000 prize in a contest sponsored by RSA Data Security Inc., a Silicon Valley company. The effort was led by John Gilmore and Paul Kocher and financed by Electronic Frontier Foundation, a San Francisco-based civil liberties and privacy organization. To unscramble a D.E.S.-encoded message, the team's computer (called "Deep Crack" in an allusion to IBM's famous chess-playing "Deep Blue") tried 17,902,806,669,197,312 keys, or about 25% of all possible combinations. Deep Crack's success is being cited as proof that the government's encryption policies are inadequate. Cryptography consultant Bruce Schneier says, "The real news here is how long the Government has been denying that these machines were possible." (New York Times 17 Jul 98)

TEEN PROGRAMMERS
The U.S. Department of Labor reports that the number of computer programmers and system analysts age 16 to 19 increased from 9,000 in 1996 to 16,000 in 1997. Doug Marcey, a 17-year-old student at George Mason University takes two classes a week at the university while he earns "about $25,000" working for a local software developer. Unlike some youngprogrammers who drop out of school, Marcey intends to complete his degree: "A lot of high school kids can do systems administration, but not a lot of kids can be software engineers." (Computerworld 13 Jul 98)

DOGBOT
Engineers at Sony's D21 lab have developed a robotic dog, complete with 64-bit central processing unit, 8 megabytes of memory, and a supersensitive camera "eye" that enables it to obey motion commands-if you stick your hand out, Dogbot will sit. The robot is reconfigurable, so that the owner can swap out limbs or even the head, and each module is "intelligent"-equippedwith its own motor and control chip. Toshitada Doi, head of the D21 lab, says he thinks there will be a consumer market among children for the dogbots sometime around 2000. (Business Week 20 Jul 98)

TAPSCOTT URGES COMPANIES TO FUND HOME COMPUTERS FOR WORKERS
Technology guru Don Tapscott, author of the new book Growing Up Digital, says that one step that responsible corporations should take to close the "digital divide" between the information haves and have-nots is to provide all of their employees with computers at home: "This proposal is not na�ve. It makes good business sense to increase fluency of human capital in the knowledge economy."
(Exec Sum 98)

HORROR MOVIE SCRIPT: WEB EATS HOLLYWOOD
Motion Picture Association of America president Jack Valenti thinks the World Wide Web is a threat to his industry, and worries that the popularity of movie and entertainment sites on the Web pose the danger of "the invasion of the copyright snatchers"-the intellectual property thieves who represent "a hazard to America's most wanted commodity. . . . If these creative enterprises are not protected from poachers, it will haunt us and shrink computer choices."
(Atlanta Journal-Constitution 17 Jul 98)

SUN DREAMS OF JINI TO PROVIDE MAGIC COMPUTING FABRIC
Sun Microsystems has announced a product called Jini, which uses Sun's Java programming language to allow "distributed computing" across potentially millions of digital computing devices, including palm-size computers, mainframes, telephones, TVs, stereos, kitchen appliances, automobiles, heating and air conditioning systems, etc., etc. University of Pennsylvania computer scientist David Farber says: "We now have all the ingredients to build a distributed computing fabric which approaches science fiction. You will be able to sit with your laptop, and it will be able to reach out across the network. And for the moments you need the power, it will become the largest supercomputer in the world." (New York Times 15 Jul 98)

IS WEB-POSTING "PRIOR PUBLICATION"?
Scholarly journals have varying policies when it comes to publishing works that have already appeared in electronic form on the Web-an issue that is increasing in importance as scholars post drafts of articles, called electronic preprints or e-prints, for comment by colleagues around the world. "We now need to think about what we mean by a finished piece of writing in ways we didn't have to before," says the editor of American Historical Review. The proliferation of e-prints could make it difficult to determine which version of an article is the "authentic" one, say some editors, but it appears that e-prints are gradually gaining favor, with more and more journal publishers agreeing to publish articles that previously appeared in e-print form. "We do think that the preprint-server concept is very much the wave of the future," says Mark Mandelbaum, director of publications for the Association for Computing Machinery. ACM is finalizing plans for its own e-print server, which will serve to speed up the process of peer review, says Mandelbaum.
(Chronicle of Higher Education 17 Jul 98)

ISPs HAGGLE FOR CASH UP-FRONT
Internet service providers, increasingly dissatisfied with the all-you-can-eat business model, are beginning to offer customers discounts for prepaying their Internet bills. BellSouth.net and Mindspring Enterprises both have recently started offering customers an alternative plan that reduces the monthly cost of an Internet connection to $17.95 or less. In both cases, they'll waive the initial set-up fee for new customers, too. "It's something competitors offer, and we look at it as an acquisition tool," says BellSouth.net's director of product marketing. "But more than that, it's a way to reward customers who have proven they're going to stay with the service for more than a year."
(tele.com Jul 98)

MAKE BIG $$$$ ON INTERNET COLLECTING FROM SPAMMERS
A Seattle man has collected $200 from a company that violated Washington state's new "anti-spam" law banning unsolicited commercial e-mail that misrepresents its source or provides misleading header information that suggests the material comes from someone else. The law applies only to e-mail received in or sent from Washington state.
(San Jose Mercury News 16 Jul 98)

 

  NEW STUDY ESTIMATES COST OF CAMPUS COMPUTER ATTACKS
A new study of 30 hacker attacks and other computer problems, conducted by researchers at the University of Michigan, found the cost of the attacks varied widely, depending on the incident. Most of the attacks affected few people and cost less than $15,000 each to fix, but in a few severe cases, repair costs topped $100,000 and service was disrupted for more than 1,000 users. The study was one of the first to attempt to put a price tag on university computer problems, which include hacker attacks, accidental data losses, power outages and thefts of computer equipment.
The researchers found that the way an institution dealt with the problem had as much to do with the final cost as the nature of the attack. For instance, the more people who were involved in solving the problem, or the longer a problem was allowed to continue in an effort to nab the perpetrator, the more expensive the incident was. The study's leader, Virginia Rezmierski, says the data provide a starting point for more research that could lead to guidelines on how a university should react to such threats.
(Chronicle of Higher Education 17 Jul 98)

EDS AND HACHETTE SWAP TECHNOLOGY FOR "CONTENT"
The Dallas, Texas-based C20 Internet consulting and services division of Electronic Data Systems (EDS) has signed a $30-million deal to develop, launch and manage Web sites for Hachette Filipacchi New Media, which produces thirty publications, including Road & Track, Travel Holiday, and Eating Well. There will be no up-front transfer of money. Instead, the consulting firm will get a share of revenue generated from Hachette's sales of accessories, vacation packages and cookbooks made over the Internet. Hachette president Jim Docherty says, "We were paying them for awhile to develop and host our sites, but then a lightbulb went off in both places. We had the content and advertisements, but not the technology. And they had no content. This way, they don't pay for content, and we don't pay for technology. Everybody makes out on the deal. To have a whole room full of programmers isn't my view of a long-term profitable picture. This lets us stick to publishing." (Computerworld 6 Jul 98)

CIA WARNS AGAINST "INFORMATION WARFARE"
CIA Director George Tenet told the Senate Government Affairs Committee recently that China and several other nations are developing "extraordinary" information warfare capabilities, and warned that everyone-from foreign nations' intelligence and military forces, to industrial competitors, to everyday citizens-are at risk. According to Tenet, "It is clear that nations developing these programs recognize the value of attacking a country's computer systems both on the battlefield and in the civilian arena." National Security Agency head Lt. Gen. Kenneth Minihan concurred, saying "We are seeing the tip of the iceberg. Even when attacks are detected and reported, we rarely know who the attacker was." (Information Week 6 Jul 98)

INFORMATION AGE HAVES AND HAVE-NOTS
Asked about the impact of computers and the Internet on society, Vanderbilt University management professor Donna Hoffman says: "Will we really transform society through the use of computers and the Internet? Well, the jury is still out. I certainly think the potential is there, but it will be realized only if we can get access in the hands of everyone. Otherwise, we are not likely to see revolutionary changes. And we will still have the schisms and chasms in society where there will be sectors of society in which people are able to partake of the wonderful riches online, and at the same time other groups are effectively excluded. I don't think there will be much evidence of the transforming powers found in creating new sources of value until we have people online who we never thought would come online. If we're serious about change, we need to be thinking of getting entire countries-the developing countries and societies-online."
(Exec Sum 98)

TINY TURBINES TO POWER LAPTOPS
Scientists at MIT's gas-turbine lab predict that sometime around 2000 engines the size of shirt buttons will begin replacing the batteries now powering handheld computers, cell phones and camcorders. Lab director Alan Epstein says a turbine-driven power pack could be made about 25% smaller than today's lithium batteries and last twice as long between refuelings. The MIT model resembles a miniature jet engine and runs on butane. The U.S. Army, which is funding the research, is planning to use the new engines to power GPS receivers, night-vision goggles and other military gear. (Business Week 13 Jul 98)

THE WIRELESS REVOLUTION
The Yankee Group telecommunications research staff predicts that by 2005 wireless phones will account for 20% of worldwide phone traffic, up from 4% in 1997. Evidence of this trend? BellSouth reports that in Louisiana 15% of its wireless customers don't have a regular phone and 65% use their wireless phones at home, up 56% from last year. (USA Today 10 Jul 98)

FINGERPRINT I.D. SYSTEM
Compaq is introducing a Fingerprint Identification Technology. The system, which is about the size of a deck of cards and plugs into the office computer, will allow an employee to hold his or her finger to a camera for matching with a stored print map of the authenticated fingerprint in order to convince the computer to allow access. The technology was developed in collaboration with San Bruno, California-based Identicator Technology; similar products are already on the market, but Compaq's is relatively cheap at $99. (USA Today 8 Jul 98)

ONLINE COUPONS USED OFFLINE
Manufacturers, retailers and direct marketers are increasingly using the World Wide Web to offer coupons that can be printed out and used in stores. The advantage of this method of coupon distribution is that it allows merchants who keep customer purchasing histories to target their customers with great precision. Marian Salzman of Young & Rubicam says: "This is going to be very sophisticated consumer-sleuthing. The degree of intelligence that you can compile this way is really mind-boggling." (Computerworld 6 Jul 98)

NO MORE MEDIA ELITE
The economist and journalist Robert J. Samuelson says that new communications and computer technologies threaten the incomes, social importance and political influence of the so-called "media elite" who run the TV networks and large newspapers. One evidence for his statement is a survey from the Pew Research Center for the People and the Press, showing a startling eclipse of TV networks' nightly news programs, which in 1993 were regularly watched by 60% of Americans over 18, compared to only 38% in 1998. Similarly, Internet use has soared: in 1995, 4% of adults went online to get news once a week, compared to 20% today. (Washington Post 8 Jul 98)

IS Y2K BUG A DATE PROBLEM OR A MATH PROBLEM?
Although his solution doesn't work on every system menaced by the "Year 2000 problem" (in which software coded with 2-digit dates in the year fields will cause incorrect calculations when the 20th century yields to the new one), entrepreneur Allen Burgess had a breakthrough insight: "I woke up in the middle of the night and had the idea. It's not a date problem. It's a math problem. We had to find and fix the math." So Waltham, Massachusetts company Data Integrity developed a Y2K tool (called the Millennium Solution) that is being used by Citibank, Credit Suisse, First Boston, NationsBank, and the U.S. Interior Department. One part of the Millennium Solution searches for math in a software program; if a two-digit date is found to be part of the math calculation, the Millennium Solution uses a trick of addition to get the calculation to work correctly. For example, to calculate age in 01 (i.e., 2001) of a person born in 67 (i.e., 1967): 01 - 67 = minus 66. Add 50. Add 50 again. Correct answer: 34 years old. (USA Today 7 Jul 98)

 

Educom Review Table of Contents