Mind the (online) gap

Mind the (online) gap

Mind the (online) gap
Instant messaging, blogs, Facebook, MySpace there are limitless ways your child communicates online with the offline world. And the risks and opportunities are only increasing.

A new Tel Aviv University research study has observed that, despite what parents might believe, there is an enormous gap between what they think their children are doing online and what is really happening.

In her study, Prof. Dafna Lemish from the Department of Communication at Tel Aviv University surveyed parents and their children about the childrens activities on the Internet. The data tell us that parents dont know what their kids are doing, says Prof. Lemish.

Her study was unique in that parents and children from the same family were surveyed.



Strange Encounters


In one part of the study, Prof. Lemish surveyed over 500 Jewish and Arab children from a variety of ages and socio-economic backgrounds, asking them if they gave out personal information online. Seventy-three percent said that they do. The parents of the same children believed that only 4 percent of their children did so.

The same children were also asked if they had been exposed to pornography while surfing, or if they had made face-to-face contact with strangers that they had met online. Thirty-six percent from the high school group admitted to meeting with a stranger they had met online. Nearly 40% of these children admitted to speaking with strangers regularly (within the past week).........

Copper connections for high-speed computing

Copper connections for high-speed computing
Caption: Graduate student Todd Spencer and Regents' professor Paul Kohl have developed an improved signal transmission line, made of an organic substrate, to link high-speed signals between computer chips.

Credit: Georgia Tech Photo: Gary Meek
As computers become more complex, the demand increases for more connections between computer chips and external circuitry such as a motherboard or wireless card. And as the integrated circuits become more advanced, maximizing their performance requires better connections that operate at higher frequencies with less loss.

Improving these two types of connections will increase the amount and speed of information that can be sent throughout a computer, as per Paul Kohl, Thomas L. Gossage chair and Regents professor in Georgia Techs School of Chemical and Biomolecular Engineering. Kohl presented his work in these areas at the Materials Research Society fall meeting.

The vertical connections between chips and boards are currently formed by melting tin solder between the two pieces and adding glue to hold everything together. Kohls research shows that replacing the solder ball connections with copper pillars creates stronger connections and the ability to create more connections.

Circuitry and computer chips are made with copper lines on them, so we thought we should make the correlation between the two with copper also, said Kohl.

Solder and copper can both tolerate misalignment between two pieces being connected, as per Kohl, but copper is more conductive and creates a stronger bond.........

Attack on computer memory reveals vulnerability

Attack on computer memory reveals vulnerability
A team of academic, industry and independent scientists has demonstrated a new class of computer attacks that compromise the contents of secure memory systems, especially in laptops.

The attacks overcome a broad set of security measures called disk encryption, which are meant to secure information stored in a computers permanent memory. The scientists cracked several widely used technologies, including Microsofts BitLocker, Apples FileVault and Linuxs dm-crypt, and described the attacks in a paper and video published on the Web Feb. 21.

The team reports that these attacks are likely to be effective at cracking a number of other disk encryption systems because these technologies have architectural features in common.

Weve broken disk encryption products in exactly the case when they seem to be most important these days: laptops that contain sensitive corporate data or personal information about business customers, said Alex Halderman, a Ph.D. candidate in Princetons computer science department. Unlike a number of security problems, this isnt a minor flaw; it is a fundamental limitation in the way these systems were designed.

The attack is especially effective against computers that are turned on but are locked, such as laptops that are in a sleep or hibernation mode. One effective countermeasure is to turn a computer off entirely, though in some cases even this does not provide protection.........

Ranger Supercomputer For Texas Computing Center

Ranger Supercomputer For Texas Computing Center
Understanding HIV drug-resistance: A snapshot of the HIV-1 protease (a key protein that is the target for the protease inhibitor drugs) from a computational simulation. Mutations from the "wildtype" can occur within the active site (G48V) and at remote locations along the protein chain (L90M ). The "asp dyad" is at the centre of the active site, where polyprotein changes are snipped by the enzyme; this is the region that any drug must occupy and block.

Credit: Peter Coveney, University College London. Texas Advanced Computing Center.
Ranger, the most powerful supercomputing system in the world for open science research, entered full production on Feb. 4. Open science research makes clear accounts of methodology, along with data and results extracted therefrom, freely available. Ranger, which will enable the leading scientists in the country to advance and accelerate computational research in all scientific disciplines, was dedicated by the National Science Foundation (NSF) and the Texas Advanced Computing Center (TACC) on Feb. 22 at the University of Texas at Austin. NSF's Office of Cyberinfrastructure Director Daniel E. Atkins represented NSF at the ceremony and delivered remarks on this historic occasion.

"Ranger is the first leadership computational resource provided under the National Science Foundation 'Track 2 initiative' and the first machine funded through the newly formed Office of Cyberinfrastructure," he said. The Track 2 initiative is NSF's four-year activity designed to fund the deployment and operation of up to four leading-edge computing systems that will greatly increase the availability of computing resources to U.S. researchers. The Ranger award, the largest NSF grant to the University of Texas at Austin, was made after the evaluation of selection criteria that were "multi-faceted, including not only raw performance of the machine, but also effective education and outreach commitments, institutional competency and commitment for service to the national research community," noted Atkins.........

Magnetic levitation gives computer users sense of touch

Magnetic levitation gives computer users sense of touch
Computers, long used as tools to design and manipulate three-dimensional objects, may soon provide people with a way to sense the texture of those objects or feel how they fit together, thanks to a haptic, or touch-based, interface developed at Carnegie Mellon University.

Unlike most other haptic interfaces that rely on motors and mechanical linkages to provide some sense of touch or force feedback, the device developed by Ralph Hollis, research professor in Carnegie Mellons Robotics Institute, uses magnetic levitation and a single moving part to give users a highly realistic experience. Users can perceive textures, feel hard contacts and notice even slight changes in position while using an interface that responds rapidly to movements.

We believe this device provides the most realistic sense of touch of any haptic interface in the world today, said Hollis, whose research group built a working version of the device in 1997. With the help of a $300,000 National Science Foundation grant, however, he and colleagues have improved its performance, enhanced its ergonomics and lowered its cost. The grant also enabled them to build 10 copies, six of which are being distributed to haptic scientists across the U.S. and Canada.

We have gone from the prototype to a much more advanced system that other scientists can use, Hollis said. Putting the instrument in the hands of other scientists is critical in a young, developing field such as haptic technology, he emphasized. Though haptic interfaces have uses in engineering design, entertainment, assembly, remote operation of robots, and in medical and dental training, their full potential has yet to be explored. Thats especially the case for magnetic levitation haptic interfaces because so few have been available for use by researchers, he added.........

Posted by: Ethan Read more Source

Locks On Microchips Could Reduce Hardware Piracy

Locks On Microchips Could Reduce Hardware Piracy
Hardware piracy, or making knock-off microchips based on stolen blueprints, is a burgeoning problem in the electronics industry.

Computer engineers at the University of Michigan and Rice University have devised a comprehensive way to head off this costly infringement: Each chip would have its own unique lock and key. The patent holder would hold the keys. The chip would securely communicate with the patent-holder to unlock itself, and it could operate only after being unlocked.

The technique is called EPIC, short for Ending Piracy of Integrated Circuits. It relies on established cryptography methods and introduces subtle changes into the chip design process. But it does not affect the chips' performance or power consumption.

Michigan computer engineering doctoral student Jarrod Roy will present a paper on EPIC at the Design Automation and Test in Europe conference in Gera number of on March 13.

Integrated circuit piracy has risen in recent years as U.S. companies started outsourcing production of newer chips with ultra-fine features. Transferring chip blueprints to overseas locations opened new doors for bootleggers who have used the chips to make counterfeit MP3 players, cell phones and computers, among other devices.

This is a very new problem, said Igor Markov, associate professor in the Department of Electrical Engineering and Computer Science at U-M and a co-author of the paper.........

Posted by: Ethan Read more Source

Microchip fingerprints used to lock out chip pirates

Microchip fingerprints used to lock out chip pirates
Pirated microchips -- chips stolen from legitimate factories or made from stolen blueprints -- account for billions of dollars in annual losses to chipmakers.

But a series of novel techniques developed at Rice University over the past year could stop pirates by allowing chip designers to lock and remotely activate chips with a unique ID tag. When a chip is locked with the new technology, only the patent-holder can decipher the key and activate the chip -- meaning knockoffs and stolen chips are worthless.

"Ours is the first remote-activation scheme that protects integrated circuits against piracy by exploiting their inherent, unclonable variability," said the technology's original inventor, Farinaz Koushanfar, assistant professor in electrical and computer engineering at Rice. "We use slight variations that arise in modern manufacturing to create a unique, digital identification that acts like a fingerprint for each chip, and we integrate that into the chip's functionality".

The original work was presented last August at the USENIX Security Symposium in Boston. Since the invention of the method, Koushanfar has collaborated with many scientists to build upon her original scheme. Last October, at the International Conference in Computer Aided Designs, Koushanfar and Rice graduate student Yousra Alkabani, in collaboration with Miodrag Potkonjak from UCLA, showed the first method that could continuously check, control, enable and disable a chip's operation online by integrating the chip's fingerprints into its functionality and actively checking them during operation.........



BBC News | News Front Page | World Edition

Yahoo! News: Most Viewed