Alumni News Marc Snir Becomes Eighth Head of Department Siebel Receives Presidential Award and Medallion

Total Page:16

File Type:pdf, Size:1020Kb

Alumni News Marc Snir Becomes Eighth Head of Department Siebel Receives Presidential Award and Medallion Winter 2001 Vol. 2, No. 7 Alumni News Marc Snir becomes eighth head of department Marc Snir became head of Snir began his career at New York University in 1981 the computer science during the Ultracomputer project, an early exploration of department on August 21, large-scale, shared-memory parallel computers. The 2001. He comes from project was led by Jacob “Jack” Schwartz, a parallel IBM’s T. J. Watson Research computing pioneer and distinguished mathematician Center in Yorktown whom Snir greatly admires. This was about the same Heights, N.Y., where he has time Illinois was building Cedar, the hierarchical shared- been since 1986. A senior memory supercomputer project led by David Kuck. scientist, Snir was most Frequent exchange between researchers at Illinois and recently leader of the NYU gave Snir a good look at computing at U of I. After Scalable Parallel Systems two years at NYU, he returned to Israel and spent four Group. Before IBM, he has continued on p. 16 held academic positions Marc Snir with Hebrew University of Jerusalem and New York University. His BS (1972) and Our new Web pages are up! PhD (1979) are from The Hebrew University of Jerusa- www.cs.uiuc.edu lem. Siebel receives Presidential Award and Medallion Tom Siebel received the Presidential Award and Medal- established in 1984 lion from University of Illinois president James Stukel on by Stanley Ikenberry, October 30, 2001, for his “commitment to excellence in who was then software engineering, computer science research, and president. Siebel graduate education, and to his continuing commitment was presented the and generosity to his alma mater.” award in Palo Alto, Siebel, who founded Siebel Systems in 1993, has three Calif., during the fall degrees from the university: a BS in history (1975), MBA 2001 meeting of the (1983), and MS in CS (1985). In 1999, he donated $32 Silicon Valley million to help construct the Thomas M. Siebel Center for Roundtable, a group Computer Science. A corporate gift from Siebel Systems of alumni business in 2000 established the Siebel Scholars Fellowship Pro- leaders working on gram. the West Coast who “The U of I is recognized as a global leader in informa- advise Stukel and the tion technology,” Siebel said. “I am honored to receive UI Foundation on this recognition. As someone who has benefited greatly technology, business, Tom Siebel, with his MS advisor from the leadership of the university, it is my pleasure to and alumni issues. Geneva Belford and the Presidential play a continued role in the success of this institution. The Roundtable was medallion Ten people have received the honor since it was established in 1997. n New faculty NCSA Jiawai Han, professor, received his PhD from U of wins grant Wisconsin in 1985. He was professor of computer science for 14 years at Simon Fraser U in Vancouver, In August 2001, NCSA was named a B.C., Canada, and has been research director at corecipient of a $53 million federal DBMiner Technology since 1997. His research interests grant to create the fastest and most include spatial data mining, data mining and ware- powerful computer system ever built housing on the Web, bioinformatics, DNA, multimedia, for general scientific research. Called and deductive and object-oriented databases. the Distributed Terascale Facility, the Jiawai Han system will be able to perform 13.5 Jennifer Hou, associate professor, received her PhD trillion calculations a second. from U of Michigan in 1993. Her research focuses on Argonne National Lab, Cal Tech, protocol design and implementation for multicast and the San Diego Supercomputer routing and multicast, network modeling and simula- Center shared the award. There will tion, wireless QoS, coordinated congestion and error be four groups of computers at each control for Internet servers, real-time communications, facility linked by a Qwest fiberoptic and real-time task management. She joins the depart- cable network sixteen times faster ment from Ohio State U. than any existing high-speed research network. The system, which will use Steven LaValle, assistant professor, received his PhD 3,300 Intel processors, will go online Jennifer Hou from UI in 1995 and held positions at Stanford and in 2002 and be ready for peak perfor- Iowa State after that. His current research interests are mance in 2003. in robotics, motion planning, computational geometry, “This award reflects the National artifical intelligence, computational biology, computer Science Foundation’s confidence in vision, computer graphics, and control theory. the long and distinguished history of computer at Illinois,” said UI Chan- José Meseguer, professor, received his PhD from U of cellor Nancy Cantor. NCSA is under Zaragoza, Spain, in 1975. His research interests include the direction of Dan Reed, who was formal executable specification and verification, instrumental in the success of software composition, reflection and NCSA’s bid. n metaprogramming, object-oriented specification and software architecture, concurrent, distributed, and Steven LaValle mobile computing, logical frameworks and formal interoperability, and logical and semantic foundations. University of Illinois Computer Science Alumni News He has been principal scientist at SRI’s Computer Science Laboratory since 1984. Editor: Judy Tolliver Computer Science Alumni News Edgar Ramos, assistant professor, received his PhD is published twice a year. Deadlines for from UI in 1995. His research areas are combinatorial submissions: March 1 for the spring and computational geometry, randomized algorithms issue, October 1 for the winter issue. and derandomization, optimization and appoximation All ideas expressed in the CS Alumni algorithms, mesh generation, topological methods and News are those of the authors or editor algorithms, and parallel algorithms. He will join the and do not necessarily reflect the official José Meseguer department in January 2002 from the Max-Planck position of the alumni or the Department Institut für Informatic. (no picture) of Computer Science. Correspondence concerning Mahesh Viswanathan, assistant professor, received his the CS Alumni News should be sent PhD from Penn in 2000. His research interests are in Editor, Department of Computer Science, analysis and validation of software systems, including 1304 West Springfield Avenue, Urbana, IL 61801, or to [email protected]. design of efficient algorithms, characterization of computational limitations, development of formal www.cs.uiuc.edu models for system specification, and implementation of The University of Illinois is an equal opportunity software tools for program analysis. n and affirmative action institution. Mahesh Viswanathan 2 CS ALUMNI NEWS From the corner office . I write my first column for tents of the building: the furnishings, artwork, and the alumni newsletter as I equipment that will fill its public spaces. The move to complete my third month Siebel Center will marke the close of nearly forty years of as head of computer association of computer science with the current Digital science. This has been an Computer Laboratory building. It is important that exhilarating experience. I history not be forgotten in this transition. With your knew that I was joining a help, we hope to ensure that the new building commemo- superb department, with a rate the history of computer research and education at long and proud tradition. Illinois with suitable exhibits and displays. However, I did not expect Siebel Center also represents an excellent opportunity the breadth and depth of to explore ways we can improve our education and day- research and education that to-day operation with a modern digital environment. Marc Snir I found, the professionalism The building has been designed to promote interaction in and dedication of the staff, small classes and small public spaces, as well as interac- the wealth of student tion remotely through digital audio and video communi- activities, and the friendliness of midwestern society. I cation. It will provide exciting opportunities to explore am also impressed by the dedication of many of our new collaborative environments and new approaches to emeritus professors, who continue to contribute their teaching. Much thinking has already gone into making skills and experience to the department. Finally, I was Siebel Center an exciting living laboratory. I expect in the not aware how large the family that I joined was. I coming months to solicit advice and help from you, our realize now that in addition to 39 faculty, 90 staff, 1,150 alumni and friends, on how to best realize this vision. undergraduate students and 420 graduate students, I I would like to close this column by briefly discussing joined a family of 6,370 alumni, all proud of the achieve- the September 11 attack and its impact on our depart- ments of the department and many helping it to continue ment. Together with the entire nation, we are mourning and improve its long tradition of excellence. the deaths of the thousands of victims. Since September The department has gone through a remarkable 11, many people in the College of Engineering have evolution under Dan Reed, my predecessor. Close to a looked for ways to apply the expertise we have at the half of the faculty has changed, as old-timers have retired university to the fight against terrorism. In our depart- or followed other opportunities, and new professors have ment, there are significant research and education activi- joined. This includes myself and five other faculty ties relating to digital security and privacy. We have members who joined this fall (see p. 2). They open and been designated as Center of Academic Excellence in strengthen important research directions for the depart- Information Assurance Education by the NSA and have ment. recently established, with Argus Systems Group, a Center Siebel Center was endowed and planned. New and for Advanced Research in Information Security to pro- exciting research projects, such as the active spaces vide a focus for collaborations with industry and other project, were started (see p.
Recommended publications
  • Early Stored Program Computers
    Stored Program Computers Thomas J. Bergin Computing History Museum American University 7/9/2012 1 Early Thoughts about Stored Programming • January 1944 Moore School team thinks of better ways to do things; leverages delay line memories from War research • September 1944 John von Neumann visits project – Goldstine’s meeting at Aberdeen Train Station • October 1944 Army extends the ENIAC contract research on EDVAC stored-program concept • Spring 1945 ENIAC working well • June 1945 First Draft of a Report on the EDVAC 7/9/2012 2 First Draft Report (June 1945) • John von Neumann prepares (?) a report on the EDVAC which identifies how the machine could be programmed (unfinished very rough draft) – academic: publish for the good of science – engineers: patents, patents, patents • von Neumann never repudiates the myth that he wrote it; most members of the ENIAC team contribute ideas; Goldstine note about “bashing” summer7/9/2012 letters together 3 • 1.0 Definitions – The considerations which follow deal with the structure of a very high speed automatic digital computing system, and in particular with its logical control…. – The instructions which govern this operation must be given to the device in absolutely exhaustive detail. They include all numerical information which is required to solve the problem…. – Once these instructions are given to the device, it must be be able to carry them out completely and without any need for further intelligent human intervention…. • 2.0 Main Subdivision of the System – First: since the device is a computor, it will have to perform the elementary operations of arithmetics…. – Second: the logical control of the device is the proper sequencing of its operations (by…a control organ.
    [Show full text]
  • Bibliography of Erik Wilde
    dretbiblio dretbiblio Erik Wilde's Bibliography References [1] AFIPS Fall Joint Computer Conference, San Francisco, California, December 1968. [2] Seventeenth IEEE Conference on Computer Communication Networks, Washington, D.C., 1978. [3] ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Los Angeles, Cal- ifornia, March 1982. ACM Press. [4] First Conference on Computer-Supported Cooperative Work, 1986. [5] 1987 ACM Conference on Hypertext, Chapel Hill, North Carolina, November 1987. ACM Press. [6] 18th IEEE International Symposium on Fault-Tolerant Computing, Tokyo, Japan, 1988. IEEE Computer Society Press. [7] Conference on Computer-Supported Cooperative Work, Portland, Oregon, 1988. ACM Press. [8] Conference on Office Information Systems, Palo Alto, California, March 1988. [9] 1989 ACM Conference on Hypertext, Pittsburgh, Pennsylvania, November 1989. ACM Press. [10] UNIX | The Legend Evolves. Summer 1990 UKUUG Conference, Buntingford, UK, 1990. UKUUG. [11] Fourth ACM Symposium on User Interface Software and Technology, Hilton Head, South Carolina, November 1991. [12] GLOBECOM'91 Conference, Phoenix, Arizona, 1991. IEEE Computer Society Press. [13] IEEE INFOCOM '91 Conference on Computer Communications, Bal Harbour, Florida, 1991. IEEE Computer Society Press. [14] IEEE International Conference on Communications, Denver, Colorado, June 1991. [15] International Workshop on CSCW, Berlin, Germany, April 1991. [16] Third ACM Conference on Hypertext, San Antonio, Texas, December 1991. ACM Press. [17] 11th Symposium on Reliable Distributed Systems, Houston, Texas, 1992. IEEE Computer Society Press. [18] 3rd Joint European Networking Conference, Innsbruck, Austria, May 1992. [19] Fourth ACM Conference on Hypertext, Milano, Italy, November 1992. ACM Press. [20] GLOBECOM'92 Conference, Orlando, Florida, December 1992. IEEE Computer Society Press. http://github.com/dret/biblio (August 29, 2018) 1 dretbiblio [21] IEEE INFOCOM '92 Conference on Computer Communications, Florence, Italy, 1992.
    [Show full text]
  • Sample Pages
    TitlePgsInternetRev 3/5/05 8:13 AM Page 3 Defining Moments the internet revolution Kevin Hillstrom 615 Griswold, Detroit MI 48226 DM - Internet FM 3/7/05 4:46 PM Page v Table of Contents Preface . .vii How to Use This Book . .xi Important People, Places, and Terms . .xiii Chronology . .xxi NARRATIVE OVERVIEW Prologue . .3 Chapter One: Early Origins of the Internet . .5 Chapter Two: Invention of the World Wide Web . .23 Chapter Three: How the Internet Works . .33 Chapter Four: Opening the Internet for Commerce . .45 Chapter Five: The “Dot.Com Boom” Goes Bust . .57 Chapter Six: The Societal Impact of the Internet . .67 Chapter Seven: The Future of the Internet . .89 BIOGRAPHIES Marc Andreessen . .103 Creator of the Netscape Navigator Web Browser Tim Berners-Lee . .107 Inventor of the World Wide Web Sergey Brin and Larry Page . .112 Co-Founders of Google v DM - Internet FM 3/7/05 4:46 PM Page vi Defining Moments: The Internet Revolution Steve Case . .115 Co-Founder of America Online (AOL) Vinton Cerf . .120 Developer of Early Internet Architecture David Filo and Jerry Yang . .124 Co-Founders of the Yahoo! Search Engine Robert Taylor . .129 Leading Scientist in the Development of the ARPANET PRIMARY SOURCES Vinton Cerf Recalls the Early Development of the Internet . .135 Steve Crocker Launches the “Request for Comments” Series . .144 A Computer Scientist Describes the Internet Worm of 1988 . .152 The First World Wide Web Page with Hypertext Links . .164 Tim Berners-Lee Remembers Inventing the World Wide Web . .166 A Librarian Shares the Joy of “Surfing” the Internet .
    [Show full text]
  • The Law of the Horse: What Cyberlaw Might Teach
    FINALHLS.DOC 12/03/99 – 10:19 AM COMMENTARIES THE LAW OF THE HORSE: WHAT CYBERLAW MIGHT TEACH Lawrence Lessig* INTRODUCTION A few years ago, at a conference on the “Law of Cyberspace” held at the University of Chicago, Judge Frank Easterbrook told the assembled listeners, a room packed with “cyberlaw” devotees (and worse), that there was no more a “law of cyberspace” than there was a “Law of the Horse”;1 that the effort to speak as if there were such a law would just muddle rather than clarify; and that legal academics (“dilettantes”) should just stand aside as judges and lawyers and technologists worked through the quotidian problems that this souped-up telephone would present. “Go home,” in effect, was Judge Easterbrook’s welcome. As is often the case when my then-colleague speaks, the intervention, though brilliant, produced an awkward silence, some polite applause, and then quick passage to the next speaker. It was an interesting thought — that this conference was as significant as a conference on the law of the horse. (An anxious student sitting behind me whispered that he had never heard of the “law of the horse.”) But it did not seem a very helpful thought, two hours into this day-long conference. So marked as unhelp- ful, it was quickly put away. Talk shifted in the balance of the day, and in the balance of the contributions, to the idea that either the law of the horse was significant after all, or the law of cyberspace was something more. ––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––– * Jack N. and Lillian R.
    [Show full text]
  • P the Pioneers and Their Computers
    The Videotape Sources: The Pioneers and their Computers • Lectures at The Compp,uter Museum, Marlboro, MA, September 1979-1983 • Goal: Capture data at the source • The first 4: Atanasoff (ABC), Zuse, Hopper (IBM/Harvard), Grosch (IBM), Stibitz (BTL) • Flowers (Colossus) • ENIAC: Eckert, Mauchley, Burks • Wilkes (EDSAC … LEO), Edwards (Manchester), Wilkinson (NPL ACE), Huskey (SWAC), Rajchman (IAS), Forrester (MIT) What did it feel like then? • What were th e comput ers? • Why did their inventors build them? • What materials (technology) did they build from? • What were their speed and memory size specs? • How did they work? • How were they used or programmed? • What were they used for? • What did each contribute to future computing? • What were the by-products? and alumni/ae? The “classic” five boxes of a stored ppgrogram dig ital comp uter Memory M Central Input Output Control I O CC Central Arithmetic CA How was programming done before programming languages and O/Ss? • ENIAC was programmed by routing control pulse cables f ormi ng th e “ program count er” • Clippinger and von Neumann made “function codes” for the tables of ENIAC • Kilburn at Manchester ran the first 17 word program • Wilkes, Wheeler, and Gill wrote the first book on programmiidbBbbIiSiing, reprinted by Babbage Institute Series • Parallel versus Serial • Pre-programming languages and operating systems • Big idea: compatibility for program investment – EDSAC was transferred to Leo – The IAS Computers built at Universities Time Line of First Computers Year 1935 1940 1945 1950 1955 ••••• BTL ---------o o o o Zuse ----------------o Atanasoff ------------------o IBM ASCC,SSEC ------------o-----------o >CPC ENIAC ?--------------o EDVAC s------------------o UNIVAC I IAS --?s------------o Colossus -------?---?----o Manchester ?--------o ?>Ferranti EDSAC ?-----------o ?>Leo ACE ?--------------o ?>DEUCE Whirl wi nd SEAC & SWAC ENIAC Project Time Line & Descendants IBM 701, Philco S2000, ERA..
    [Show full text]
  • A Bibliography of O'reilly & Associates and O
    A Bibliography of O'Reilly & Associates and O'Reilly Media. Inc. Publishers Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 08 February 2021 Version 3.67 Title word cross-reference #70 [1263, 1264]. #70-059 [1263]. #70-068 [1264]. 2 [949]. 2 + 2 = 5986 [1456]. 3 [1149, 1570]. *# [1221]. .Mac [1940]. .NET [1860, 22, 186, 342, 441, 503, 591, 714, 716, 721, 730, 753, 786, 998, 1034, 1037, 1038, 1043, 1049, 1089, 1090, 1091, 1119, 1256, 1468, 1858, 1859, 1863, 1899, 1900, 1901, 1917, 1997, 2029]. '05 [461, 1532]. 08 [1541]. 1 [1414]. 1.0 [1009]. 1.1 [59]. 1.2 [1582]. 1000 [1511]. 1000D [1073]. 10g [711, 710]. 10th [2109]. 11 [1385]. 1 2 2 [53, 209, 269, 581, 2134, 919, 940, 1515, 1521, 1530, 2023, 2045]. 2.0 [2, 55, 203, 394, 666, 941, 1000, 1044, 1239, 1276, 1504, 1744, 1801, 2073]. 2.1 [501]. 2.2 [201]. 2000 [38, 202, 604, 610, 669, 927, 986, 1087, 1266, 1358, 1359, 1656, 1751, 1781, 1874, 1959, 2069]. 2001 [96]. 2003 [70, 71, 72, 73, 74, 279, 353, 364, 365, 789, 790, 856, 987, 1146, 1960, 2026]. 2003-2013 [1746]. 2004 [1195]. 2005 [84, 151, 755, 756, 1001, 1041, 1042, 1119, 1122, 1467, 2120, 2018, 2056]. 2006 [152, 153]. 2007 [618, 726, 727, 728, 1123, 1125, 1126, 1127, 2122, 1973, 1974, 2030].
    [Show full text]
  • The Imaginary of Internet Patrice Flichy
    1 The imaginary of Internet Patrice Flichy I The Ideal Scientific Community Summary The Internet is the result of an imagined, technological construction in a particular social environment: academic computer science departments. This article considers the intentions and socio-technological choices of the initial designers of the Internet era. It focuses on the definition of the concept of network computing, the setting up of the network and its uses, the creation of a single world network and finally, hypertext projects and tools for accessing information. The earliest Internet model built in this framework has remained an unavoidable reference for all Internautes to this day. How can the success of the Internet be explained? Most analysts see the world as undergoing a major technological revolution comparable to the development of the steam engine or electricity, with the Internet at the summit of the third wave so dear to Alvin Toffler: high- tech, anti-industrial and based primarily on services and technology. This technological determinism often goes hand in hand with technological optimism which sees the Internet as the spearhead of a profound social transformation affecting the corporate world, the state and social relations alike. Others, however, consider that the prophets of the Internet have a short memory. A few years ago their peers and sometimes they themselves claimed that the image would replace writing, the videotext would supplant the press, offices would be paper-free and the cable would be the downfall of mass media since everyone would henceforth be able to express themselves without recognized intermediaries. Understandably, with this discourse on the communication revolution repeated every time a new medium starts to appear, attentive observers sometimes have the impression that history is stuttering.
    [Show full text]
  • Oral History Interview with David J. Wheeler
    An Interview with DAVID J. WHEELER OH 132 Conducted by William Aspray on 14 May 1987 Princeton, NJ Charles Babbage Institute The Center for the History of Information Processing University of Minnesota, Minneapolis Copyright, Charles Babbage Institute 1 David J. Wheeler Interview 14 May 1987 Abstract Wheeler, who was a research student at the University Mathematical Laboratory at Cambridge from 1948-51, begins with a discussion of the EDSAC project during his tenure. He compares the research orientation and the programming methods at Cambridge with those at the Institute for Advanced Study. He points out that, while the Cambridge group was motivated to process many smaller projects from the larger university community, the Institute was involved with a smaller number of larger projects. Wheeler mentions some of the projects that were run on the EDSAC, the user-oriented programming methods that developed at the laboratory, and the influence of the EDSAC model on the ILLIAC, the ORDVAC, and the IBM 701. He also discusses the weekly meetings held in conjunction with the National Physical Laboratory, the University of Birmingham, and the Telecommunications Research Establishment. These were attended by visitors from other British institutions as well as from the continent and the United States. Wheeler notes visits by Douglas Hartree (of Cavendish Laboratory), Nelson Blackman (of ONR), Peter Naur, Aad van Wijngarden, Arthur van der Poel, Friedrich L. Bauer, and Louis Couffignal. In the final part of the interview Wheeler discusses his visit to Illinois where he worked on the ILLIAC and taught from September 1951 to September 1953. 2 DAVID J.
    [Show full text]
  • Self-Colonizing Eeurope
    Self‐Colonizing eEurope: The Information Society Merges onto the Information Superhighway STEPHANIE R. SCHULTE The 2002 German film Halbe Miete (Half the Rent) follows a computer hacker in his thirties named Peter as he “unplugs,” that is, as he makes the conscious decision to live his life off‐line.1 The gaunt hacker emerges from his darkened computer room to discover that his girlfriend has died in their apartment under ambiguous circumstances. Distraught, he puffs a cigarette in a daze until his cellular telephone rings and frightens him; instead of answering, Peter flips the phone over, removes the data chip from the back, and burns the chip with his cigarette. In this moment, Peter literally and symbolically destroys his means of digital communication and deliberately disconnects from telecommunications networks; in Peter’s words, “I am no longer reachable.” In few American films about the internet in the 1990s or early 2000s does a main character decide to unplug, or completely disengage.2 Instead, the main characters in films like The Matrix and The Net almost always battle with evil forces over control of the internet, ultimately using the technology as a weapon with which to defeat their foe. In short, in American film, “winning” means mastery of the internet, not avoidance or rejection. Although American films far outsell German films in Germany, even domestic German‐language films like Halbe Miete, this alternative representation suggests that the internet was “thinkable” in different terms in Germany and that a certain anti‐internet sentiment made sense. As German cultural studies has shown, this skepticism toward technology stemmed in part from Germany’s legacy of anticapitalism, meaning that technology became equated with the capitalist domination critiqued by German thinkers.3 This comparative article is about the varying national imaginings of the internet in Europe and the United States, how they intersected with and were promoted by different policies regulating the technology.
    [Show full text]
  • Orderly Expansion of the International Top-Level Domains: Concurrent Trademark Users Need a Way out of the Internet Trademark Quagmire, 15 J
    The John Marshall Journal of Information Technology & Privacy Law Volume 15 Issue 3 Journal of Computer & Information Law Article 6 - Spring 1997 Spring 1997 Orderly Expansion of the International Top-Level Domains: Concurrent Trademark Users Need a Way Out of the Internet Trademark Quagmire, 15 J. Marshall J. Computer & Info. L. 521 (1997) David B. Nash Follow this and additional works at: https://repository.law.uic.edu/jitpl Part of the Computer Law Commons, Intellectual Property Law Commons, International Law Commons, Internet Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation David B. Nash, Orderly Expansion of the International Top-Level Domains: Concurrent Trademark Users Need a Way Out of the Internet Trademark Quagmire, 15 J. Marshall J. Computer & Info. L. 521 (1997) https://repository.law.uic.edu/jitpl/vol15/iss3/6 This Comments is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in The John Marshall Journal of Information Technology & Privacy Law by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. ORDERLY EXPANSION OF THE INTERNATIONAL TOP-LEVEL DOMAINS: CONCURRENT TRADEMARK USERS NEED A WAY OUT OF THE INTERNET TRADEMARK QUAGMIRE I. INTRODUCTION "If you want to attach your network to the Internet,' but you don't like NSI's 2 policies, for whatever reason, you quickly learn that NSI is the only game in town."3 Any organization that wants a domain name in an international top-level domain ("iTLD") has to register with the In- terNIC4 domain name registry which is administered by Network Serv- 1.
    [Show full text]
  • Transcript of 790112 Hearing in Avila
    MUCH.EAR REGULAT0RY COMMjSS10N 1N THE NATTER OF.. PACXPZC 'GAS 5 KLECYRXC, @~=~A."tZ (09.ah2.o Canyon Unit:s 2. @md 2) C4~'.ref Mog 50 275 50-323 Av9.1a Beach, Ca2.if'araia P/ace- 12 Zanuaxy 3.979 8S45 -87's Date- Pages Telephone: (202) ~&7.3700 ACE'- FEDEBALREPOBTEBS, INC. zBMRR 603 / Officisl0 epertere 444 North Capital Street Washington, D.C. 20001 P NAT1ONWlDE t QVPRAG"-" - DAlLY 4: "ti .d3.GCIQ $PJX LEQ st'Z Q Qp L%21EBXCZi QELCH i'i c:LBQCQD Zi7C&~iLZ~ 8 . QULRPORZ COPE'IXSSZOi'. »»»»&»~»~»»»»»» Xn the ma"h~-; of: Qh PBCXPXC GAS E«ELZCTRXC COK?2ZY Doclc8t. LioG ~ 50 275 Si3»323 {99.K~33.0 CaIlj«cn UILi~cs 1 RnQ 2) »» I»»»»w»»»»»»»»»»»»A W»»»041»»4!l»»+ Clwv&1 l GZ RCl>~l g r, ~+ BGil «+4Yli8 '«~P XLITIg h SKVi1Q Bek~Chg CQ1".foh'~liibo PZ''i QQ'i~ 3 2 JQ'iQ~ J 1979 T59 18cYzinLJ iIL "i QQ c~+QvQ»8Q'~it,'GQ I;-~zP~~P. "ERG zeconvene6, gursvan to aa~ouz.~anal", at, 9:30 ".rl. SWORE ELX>~FTH BGh" BS ~ Chaizm~~a~ McL?9.c 84CpCrg GiDQ X>9.cc'QQ9.ng BQ "mQ DR. VTZL~IM4 E. SKHTXH, kf~ebar. GL-rrrZ O. mXGHr., r~~e=-. >i -PEKtQKCPS h OII b85M1f Of APP13.CRIIt. PGCi Pic QBG 5 H18CM2. ~ CCRPB'QP ' BE7CE @%TON F«I~) ~ 3210) Mo rZIlg.~~q M PhaeniX, 2-i"OIla 8S02.2 mu:oxen .H. zUaaUSH, HBQO akim PBXXI*P CKlHZp ~BC/lb Lec~Q1 08QcL~SQ p Pacific Gas F "1ec+-ic I Hc~l" Ith, CQGlpanp'g 77 BQ«L1o BMOCp Pz«iElcisco g Cafe.fo~ia 943.06 ;4 )I '> 1 $ 1 ~ 5 il1 ~ i ~ I h ~ ti RPPElu~CCES: (Cant'cO On behalf of.
    [Show full text]
  • Challenges in Generating the Next Computer Generation
    2. Challenges in Generating the Next Computer Generation GORDON BELL A leading designer of computer structures traces the evolution of past and present generations of computers and speculates about possiblefuture courses of develop- ment for the next generations. WHENthe Japanese told us about the Fifth Generation, we knew we were in a race. Ed Feigenbaum and Pamela McCor- duck characterized it in their book, The Fifth Generation, but did not chart the racetrack. In the 1970~~while writing Com- puter Structures with Allen Newell, and recently in orga- nizing the collection of The Computer Museum, I identified the pattern repeated by each generation. In order to win, or even to be in the race, knowing the course is essential. The Cycle of Generations A computer generation is produced when a specific cycle of events occurs. The cycle proceeds when motivation (e.g. the threat of industrial annihilation) frees resources; CHALLENGES IN GENERATING THE NEXT COMPUTER GENERATION 27 techno log^ and science provide ideas for building with both industry and academe providing the push. new mach'ines; The Japanese Approach to the Next Generation organizations arise to build the new computing structures; and (after the fad) "If a computer understands English, it must be Japanese."(A pearl from Alan Perlis, speaking at The Computer Museum, use of the resulting products confirm a generation's September 1983) existence. The Japanese Fifth Generation plan, formulated in 1980, A generation results from at least two trips around this is based on worldwide research. Because the Japanese cycle, each succeeding trip an accelerated version of the pre- understand large-scale, long-term interactive processes, vious one, as in a cyclotron.
    [Show full text]