The Risks Digest Index to Volume 6

Total Page:16

File Type:pdf, Size:1020Kb

The Risks Digest Index to Volume 6 The Risks Digest Index to Volume 6 Search RISKS using swish-e Forum on Risks to the Public in Computers and Related Systems ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator Index to Volume 6 Tuesday, 31 May 1988 Issue 1 (2 Jan 88) The Christmas Virus (Martin Minow) Password security in multi-user systems (J. Eric Townsend) Re: Program trading (K. Richard Magill) DES and NSA's new codes (Tom Athanasiou) Electronic Interference (Al Watters) American Express security ... (Henry Mensch) SSN / Phone Number / etc. on credit purchases (Jordan Hayes, David Albert) Issue 2 (4 Jan 88) Source Code is Counter to Viruses & Trojan Horses (Hal Guthery) Viral VAXination? (Bryce Nesbitt) Who is entitled to privacy? (Andy Freeman) SSN / Passport / IRS ... (Joe Morris, Don Wegeng, Jean Marie Diaz, Martin Minow, Brint Cooper, EAE114, John Pershing) Issue 3 (5 Jan 88) Ham radios and non-ionizing radiation (Eric Townsend) Date formats (Geoff Lane) Risks of Not Using Social Security Numbers (Bruce Baker) Source code not a defense (TMPLee, Chris Torek, William Smith, Tom Lane, Don Chiasson, Jeffrey R Kell) Unshar program (Brent L. Woods) Issue 4 (6 Jan 88) PCs die of New Year Cerebration (Scot E. Wilcoxon) More on Missouri Voting Decision (Charles Youman) Market for prankster programs? (Geoff Goodfellow) Ham radio operators and cancer (Mark Fulk, Steve Philipson) Getting into ATM rooms (Mark A. R.) Re: Knowing Source Code is not Sufficient (Michael Wagner) Trust and quoting and write-only hard disks (Michael Wagner) Issue 5 (7 Jan 88) Re: PCs die of New Year Cerebration (John Owens, Paul F Cudney) http://catless.ncl.ac.uk/Risks/index.6.html[2011-06-10 18:30:19] The Risks Digest Index to Volume 6 Source code vs. attacks -- Avoidance techniques (David Collier-Brown) Ham Radiation and Cancer (Barry Ornitz [long], Martin Ewing, Douglas Jones) Issue 6 (8 Jan 88) Engines Of Creation, Engines of Destruction (Eric S. Raymond) An Israeli virus (Mike Linnig) Getting into ATM rooms (Bob Larson, Fuat C. Baran) Power lines (Prentiss Riddle) Issue 7 (11 Jan 88 ) You don't need a computer to have a technical RISK. (Joe Morris) Leap second leaps seconds (Alan Wexelblat) Plan to automate Federal tax collection system? (John Gilmore) Creative quality control in missile systems? (Dave Curry) Re: getting into ATM rooms (Eric Skinner) Re: PCs die of New Year Cerebration (Scot E. Wilcoxon) Computer asks you your SSI number as ID (Hank Roberts) Computer Virus.... sources(!) (David HM Spector) Reagan Signs Bill Governing Computer Data (Hugh Pritchard) Indianapolis Air Force jet crash (Dave Curry) Issue 8 (12 Jan 88) Missent Missives (Martin Ewing, Leonard B. Bliss) Touch-Tone Risks (Andrew Vaught) American Express Computer Problem 2 (Frank Wales) Re: PCs die of New Year Cerebration (Scott Nelson) UK Logic Bomb Case is Thrown Out (Geoff Lane) SSN abuse warned about long ago (Richard Brown) SSN Required Disclosures -- library social security privacy (Steve Cisler) Issue 9 (14 Jan 88) "The Consultant" by John McNeil (Jim Horning) Re: Missent Missives (Ge' Weijers, Steve Caine, Brent Chapman) Re: PCs die of New Year Cerebration (Sam Cramer) SSN / Phone Number / etc. (Andrew Burt, Bruce O'Neel) Library book borrowing privacy (Geoff Goodfellow, Will Martin, Steve Cisler) SSNs (Ian G Batten) Issue 10 (15 Jan 88) Multimillion $ Fraud Failed due to Computer Error (Frans Heeman) Library Privacy (Michael Wagner) A reverse Heisenbug: it's there only if you look for it (Dave Platt) "The Consultant" on TV (Jim Horning) The timewarps of '88 (Rayan Zachariassen) Issue 11 (22 Jan 88) Another One-Character Error (Earl Boebert) Safety in MIL-STD-2167A (Nancy Leveson) Brady Report on the Crash (Randall Davis) Data tampering, CTFC study of Major Market Index (Randy Oppenheimer) Court drops 'logic bomb' trial (John Pettitt) http://catless.ncl.ac.uk/Risks/index.6.html[2011-06-10 18:30:19] The Risks Digest Index to Volume 6 Official word on Social Security Numbers (Rob Austein) VAX/VMS security problem (Philip Taylor via Rob Gross) TimeWarps as an omen (Jeffrey R Kell) New Year's (Robert Slade) Time-chasing (Paul Fuqua) Re: New Year's Sun clock (Martin Ewing) Issue 12 (22 Jan 88) Risks in technology transfer policy (Alan Wexelblat) Trojan-horsed smart terminals? (Tim McDaniel) The virus reaches Israel (Martin Minow) Checking for Trojan Horses and Viruses (Dennis L. Mumaugh) RISKS of uux(1) and trusting remote hosts (Abercrombie) Sheep, Goats, and responding to computer-generated requests (Martin Smith) Proposal for Fault Tolerance Newsgroup (Don Lee) Issue 13 (24 Jan 88) U.S. Fears Satellites Damaged (PGN) Signal-light malfunction blamed in L.A. train wreck (PGN) Big Error on Benefits by a State Computer (PGN) London Underground Ticket Machine fraud (John Pettitt) The responsibility of and for `bringing us C and Unix' (Geraint Jones) Technology transfer policy and Halley's Comet probe (Alex Colvin) Non-ionizing radiation (John Nowack, Jonathan Thornburg) Books about SDI software -- a request (Dan Jones) Issue 14 (25 Jan 88) Safe programming languages (Bob Estell) More about the technology transfer policy (Paul Smee) A second Sun clock error: no sanity checking (John Bruner) "Things That Go 'Beep'" (Paul Fuqua) High-voltages and Europe vs USA (Kee Hinckley) I know why Ham Radio Operators die so often!!! (silly) (Eric Townsend) Issue 15 (26 Jan 88) RISKS in Cable TV? ([...]) Re: U.S. Fears Satellites Damaged (Henry Spencer) My country's misguided technology transfer policy (Geoff Goodfellow) Calendar bomb in the Ada language (Douglas Jones) Re: PCs die of New Year Cerebration (Larry Rosenstein) GAO report on the Oct 19th crash... (Barry Shein) Re: null loops (Mike Linnig) Bloody SSNs again (Hank Roberts) Re: Non-ionizing radiation (Henry Spencer) Issue 16 (27 Jan 88) Computer error blamed for diplomatic fiasco (Bernard de Neumann) A feedback loop in tax preparation algorithms (Lawrence R. Bernstein via PGN) IBM's meaning of "open" in the abbreviation OSI (Peter Sylvester) Bank abandons fouled-up computer system (Rodney Hoffman) Business view of software productivity (Rodney Hoffman) http://catless.ncl.ac.uk/Risks/index.6.html[2011-06-10 18:30:19] The Risks Digest Index to Volume 6 VMS and login failure logins (Jerry Leichter) Software Power Switches (Mike Russell) A risk of using spelling checkers (Andy Freeman) Re: RISKS in Cable TV? (Andy Goldstein) Re: Calendar bomb in the Ada language (Jim Purtilo) Time Bombs in Bank Computers (John McLeod) Issue 17 (28 Jan 88) Two recent stories with lessons to be learned (Rich Kulawiec) Ada Standard Time (Mike Linnig) Preventing Train Collisions by Technology (Mark Brader) Tax form iteration (G. Ansok, Kenneth Sloan) Boisjoly receives award (Peter Ladkin) Issue 18 (29 Jan 88) Amazing story about shuttle software whistle-blowers (Nancy Leveson) AT&T computer billing error (Dave Curry) A testing time for students (Dave Horsfall) Re: RISKS in Cable TV? (Marty Moore) Re: Calendar bomb in the Ada language (Robert I. Eachus, Marty Moore) Technology Transfer Policy (Gordon S. Little) The fine points of fixed points (Jim Horning) Horrendous proliferation of BITNET barfmail (BITNETters PLEASE READ) Issue 19 (1 Feb 88) No Time like the Present for Old Timers (Scott Dorsey) More software future shock (William Smith) TV Remote controls (Richard Dervan) Hertz Computer Hertz Repairees (Dave Wortman) Blowing Whistles or Blowing Smoke? (Guthery) Your SideKick may not be on your Side! (Scott M. Martucci) Re: Library Privacy -- the backup system (David Collier-Brown) Virus anxiety expressed in NY TIMES (Jon Jacky) Re: A feedback loop in tax preparation algorithms (Les Earnest) Issue 20 (2 Feb 88) Unusual Computer Risk -- Harem Scarem? (Mike Bell) Mistaken AIDS warnings (Al Stangenberger) Human error vs human error (and bad design) (George Michaelson) Technology Transfer Policy (Henry Spencer) Re: Blowing Whistles or Blowing Smoke? (Ronni Rosenberg, Dan Franklin, Jonathan Kamens, Phil Agre, Steve Philipson, Frank Houston) Re: Virus anxiety expressed in NY TIMES (Amos Shapir) Issue 21 (6 Feb 88) Delta Air Lines "Computer" Mistake (Chris McDonald) Missouri Voting Decision (Charles Youman) Re: Whistle-blowing (Bob Ayers) Re: RISKS in Cable TV? (Svante Lindahl) Time base on cable TV info (Kekatos) Signals on power lines (Peter da Silva) http://catless.ncl.ac.uk/Risks/index.6.html[2011-06-10 18:30:19] The Risks Digest Index to Volume 6 The risk of LOJACK (Johnathan Vail) Risks of helpful news software (Henry Spencer) "My country's misguided technology transfer policy" (Hugh Davies) Issue 22 (8 Feb 88) Software theft (PGN) Macintosh Virus Hits CompuServe (David HM Spector) King Tut, call home! (Bill McGarry) Whistle-blowers (Jon Jacky, Nancy Leveson) Even little computers aren't immune from RISKs (Dave Horsfall) Final results not necessarily correct -- blame the database (Luke Visser) Early Warning Vulnerability (Ronald J Wanttaja) Software Warranties (Nancy Leveson) Issue 23 (9 Feb 88) Don't believe everything you read in the papers. (David Purdue) Anti-virus software (Chuck Weinstock) Virus paranoia (Jeffrey Mogul) All Viruses Considered (Martin Minow) OTA Report: The Electronic Supervisor (Jan Wolitzky) Hub auto-theft lessons; $$$ risks of Lojack (rdicamil) Re: voting (Mike Tanner) Issue 24 (10 Feb 88) Alarming Wenches and Risks of Lojack (Alex Colvin, Scott A. Norton) Re: Software theft (Roy Smith) Interleaving of Early Warning Systems (Ronni Rosenberg) Shuttle Security (Jan Wolitzky) Risk Study Centers (Curtis C. Galloway) Legal Software testing (David Lesher) Re: risks of helpful usenet software (David Herron) Grants-chaos (F.H.D. van Batenburg) Re: viruses (Chaz Heritage) CompuServe virus - more details et cetera (David HM Spector) Issue 25 (11 Feb 88) Something fishy is going on with credit cards (William Daul) "Colloidal goo" considered harmful to ATM's (Jon Jacky) Lottery Random Numbers Too Random... (Henry (H.W.) Troup) New Scientist article on viruses (Bernie Cosell) Virus code and Infected Definitions (Vin McLellan) Yet Another Virus - The "Brain" Virus (Bruce N.
Recommended publications
  • Acm's Fy14 Annual Report
    acm’s annual report for FY14 DOI:10.1145/2691599 ACM Council PRESIDENT ACM’s FY14 Vinton G. Cerf VICE PRESIDENT Annual Report Alexander L. Wolf SECRETAry/TREASURER As I write this letter, ACM has just issued Vicki L. Hanson a landmark announcement revealing the PAST PRESIDENT monetary level for the ACM A.M. Turing Alain Chesnais Award will be raised this year to $1 million, SIG GOVERNING BOARD CHAIR Erik Altman with all funding provided by Google puter science and mathematics. I was PUBLICATIONS BOARD Inc. The news made the global rounds honored to be a participant in this CO-CHAIRS in record time, bringing worldwide inaugural event; I found it an inspi- Jack Davidson visibility to the award and the Associa- rational gathering of innovators and Joseph A. Konstan tion. Long recognized as the equiva- understudies who will be the next MEMBERS-AT-LARGE lent to the Nobel Prize for computer award recipients. Eric Allman science, ACM’s Turing Award now This year also marked the publica- Ricardo Baeza-Yates carries the financial clout to stand on tion of highly anticipated ACM-IEEE- Cherri Pancake the same playing field with the most CS collaboration Computer Science Radia Perlman esteemed scientific and cultural prizes Curricula 2013 and the acclaimed Re- Mary Lou Soffa honoring game changers whose con- booting the Pathway to Success: Prepar- Eugene Spafford tributions have transformed the world. ing Students for Computer Workforce Salil Vadhan This really is an extraordinary time Needs in the United States, an exhaus- SGB COUNCIL to be part of the world’s largest educa- tive report from ACM’s Education REPRESENTATIVES tional and scientific society in comput- Policy Committee that focused on IT Brent Hailpern ing.
    [Show full text]
  • Software Technical Report
    A Technical History of the SEI Larry Druffel January 2017 SPECIAL REPORT CMU/SEI-2016-SR-027 SEI Director’s Office Distribution Statement A: Approved for Public Release; Distribution is Unlimited http://www.sei.cmu.edu Copyright 2016 Carnegie Mellon University This material is based upon work funded and supported by the Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineer- ing Institute, a federally funded research and development center. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the United States Department of Defense. References herein to any specific commercial product, process, or service by trade name, trade mark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by Carnegie Mellon University or its Software Engineering Institute. This report was prepared for the SEI Administrative Agent AFLCMC/PZM 20 Schilling Circle, Bldg 1305, 3rd floor Hanscom AFB, MA 01731-2125 NO WARRANTY. THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN “AS-IS” BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. [Distribution Statement A] This material has been approved for public release and unlimited distribu- tion.
    [Show full text]
  • Corporate Finance, Learning & Development, Product Development
    UG Grad Grad Name Email Major Year work Location Bio Corporate Finance, Learning & Development, Product Development stevenwcran English Mr. Crane spent two years teaching high school English and now works in corporate finance. He has never taken any [email protected] from accounting or finance classes but has instead relied on the broad value of a liberal arts education to learn things on the job. Steve Crane m English 2003 DePaul He received his degree in English from UIUC in 2003 and completed an MA in English from DePaul University in 2009. Scott Farley is currently the Director of Learning & Development (L&D) for Joy Global, a manufacturing corporation that supplies heavy equipment to the mining industry. In this role, Scott is responsible for employee training, including course design and development, course logistics, and facilitation. Additionally, Scott is focused on driving talent development through succession planning, programs for “high-potentials,” and strategic workforce planning. Scott graduated with honors from UIUC in 1992, with a B.A. in English. After graduating, he took a temporary call center job with Motorola Inc. that turned into a fourteen-year stint with the telecommunications giant. Mid-way through that time, while working as a project manager on a major system implementation, Scott was asked to deliver training for sales and customer service personnel. From that point, he took a new career direction, focusing on training and employee development. While at Motorola, Scott completed an MBA at Lake Forest Graduate School of Management. Knowledge gained through that program was essential when working with business partners to understand how best to impact their business goals and results.
    [Show full text]
  • Computer Viruses and Malware Advances in Information Security
    Computer Viruses and Malware Advances in Information Security Sushil Jajodia Consulting Editor Center for Secure Information Systems George Mason University Fairfax, VA 22030-4444 email: [email protected] The goals of the Springer International Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source for advanced and timely topics in information security research and development. The scope of this series includes all aspects of computer and network security and related areas such as fault tolerance and software assurance. ADVANCES IN INFORMATION SECURITY aims to publish thorough and cohesive overviews of specific topics in information security, as well as works that are larger in scope or that contain more detailed background information than can be accommodated in shorter survey articles. The series also serves as a forum for topics that may not have reached a level of maturity to warrant a comprehensive textbook treatment. Researchers, as well as developers, are encouraged to contact Professor Sushil Jajodia with ideas for books under this series. Additional tities in the series: HOP INTEGRITY IN THE INTERNET by Chin-Tser Huang and Mohamed G. Gouda; ISBN-10: 0-387-22426-3 PRIVACY PRESERVING DATA MINING by Jaideep Vaidya, Chris Clifton and Michael Zhu; ISBN-10: 0-387- 25886-8 BIOMETRIC USER AUTHENTICATION FOR IT SECURITY: From Fundamentals to Handwriting by Claus Vielhauer; ISBN-10: 0-387-26194-X IMPACTS AND RISK ASSESSMENT OF TECHNOLOGY FOR INTERNET SECURITY.'Enabled Information Small-Medium Enterprises (TEISMES) by Charles A.
    [Show full text]
  • Child Porn Players Are in Our Communities. Why Aren't We Doing Something About It? Carol Capó 7:58 P.M
    Hello Visitor LOGIN OR REGISTER OBITUARIES JOBS CARS REAL ESTATE APARTMENTS CLASSIFIEDS PLACE AN AD 42° F HOME NEWS SPORTS MONEY SHOPPING LIFE & FAMILY MILITARY HEALTH ENTERTAINMENT Search Go! CRIME BREAKING NEWS TRAFFIC HAMPTON NEWPORT NEWS WILLIAMSBURG GLOUCESTER YORK ISLE OF WIGHT NATION/WORLD HOTYEAR TOPICSIN REVIEWChristmas Movies Tonight, Wed. & Thurs. Closings Dec. 24-25 Holiday Events Dec. 18-24 Shopping Christmas Home > News > Opinion Child porn players are in our communities. Why aren't we doing something about it? Carol Capó 7:58 p.m. EDT, October 12, 2009 Carol Capó E-mail Print Share Text Size Purell doesn't make enough hand sanitizer to make you feel clean after you learn about some of your neighbors. There's not enough Pepto-Bismol to settle your stomach after you think about what they're up to. In a nutshell, here it is: Hundreds of people in our area are collecting Bio | E-mail | Recent columns and trading hard-core child porn. Topics I got some numbers from the staff of Steve Shannon, who's running Poquoson (Poquoson, Virginia) for attorney general. When he met with the Editorial Board last week, Wyoming he talked about his experience prosecuting child abuse cases and Gloucester (Gloucester, Virginia) his commitment to going after people who use the Internet to prey on children. He told me about software that pinpoints the locations of See more topics » computers that trade child porn over the Web — and can even show them on maps. Let's start with the number of computers on which investigators Ads by Google found sadistic child porn: Free Sex Offender Report Where do Sex Offenders live in Your • Newport News: 887 Neighborhood? Find out in 60 secs! • Hampton: 674 NeighborhoodScan.com •Williamsburg: 229 Sex Offenders near You Find Sex Offenders living near you! Free •Yorktown: 226 Pics, Alerts & 24/7 monitoring FreeSexOffenderReports.com • Gloucester: 43 Sex Offender Registry • Poquoson: 31 Check to see if anyone is a sex offender.
    [Show full text]
  • An Interview With
    An Interview with LANCE HOFFMAN OH 451 Conducted by Rebecca Slayton on 1 July 2014 George Washington University Washington, D.C. Charles Babbage Institute Center for the History of Information Technology University of Minnesota, Minneapolis Copyright, Charles Babbage Institute Lance Hoffman Interview 1 July 2014 Oral History 451 Abstract This interview with security pioneer Lance Hoffman discusses his entrance into the field of computer security and privacy—including earning a B.S. in math at the Carnegie Institute of Technology, interning at SDC, and earning a PhD at Stanford University— before turning to his research on computer security risk management at as a Professor at the University of California–Berkeley and George Washington University. He also discusses the relationship between his PhD research on access control models and the political climate of the late 1960s, and entrepreneurial activities ranging from the creation of a computerized dating service to the starting of a company based upon the development of a decision support tool, RiskCalc. Hoffman also discusses his work with the Association for Computing Machinery and IEEE Computer Society, including his role in helping to institutionalize the ACM Conference on Computers, Freedom, and Privacy. The interview concludes with some reflections on the current state of the field of cybersecurity and the work of his graduate students. This interview is part of a project conducted by Rebecca Slayton and funded by an ACM History Committee fellowship on “Measuring Security: ACM and the History of Computer Security Metrics.” 2 Slayton: So to start, please tell us a little bit about where you were born, where you grew up.
    [Show full text]
  • BBST Course 3 -- Test Design
    BLACK BOX SOFTWARE TESTING: INTRODUCTION TO TEST DESIGN: A SURVEY OF TEST TECHNIQUES CEM KANER, J.D., PH.D. PROFESSOR OF SOFTWARE ENGINEERING: FLORIDA TECH REBECCA L. FIEDLER, M.B.A., PH.D. PRESIDENT: KANER, FIEDLER & ASSOCIATES This work is licensed under the Creative Commons Attribution License. To view a copy of this license, visit http://creativecommons.org/licenses/by-sa/2.0/ or send a letter to Creative Commons, 559 Nathan Abbott Way, Stanford, California 94305, USA. These notes are partially based on research that was supported by NSF Grants EIA- 0113539 ITR/SY+PE: “Improving the Education of Software Testers” and CCLI-0717613 “Adaptation & Implementation of an Activity-Based Online or Hybrid Course in Software Testing.” Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation. BBST Test Design Copyright (c) Kaner & Fiedler (2011) 1 NOTICE … … AND THANKS The practices recommended and The BBST lectures evolved out of practitioner-focused courses co- discussed in this course are useful for an authored by Kaner & Hung Quoc Nguyen and by Kaner & Doug Hoffman introduction to testing, but more (now President of the Association for Software Testing), which then experienced testers will adopt additional merged with James Bach’s and Michael Bolton’s Rapid Software Testing practices. (RST) courses. The online adaptation of BBST was designed primarily by Rebecca L. Fiedler. I am writing this course with the mass- market software development industry in Starting in 2000, the course evolved from a practitioner-focused course mind.
    [Show full text]
  • African American Newsline Distribution Points
    African American Newsline Distribution Points Deliver your targeted news efficiently and effectively through NewMediaWire’s African−American Newsline. Reach 700 leading trades and journalists dealing with political, finance, education, community, lifestyle and legal issues impacting African Americans as well as The Associated Press and Online databases and websites that feature or cover African−American news and issues. Please note, NewMediaWire includes free distribution to trade publications and newsletters. Because these are unique to each industry, they are not included in the list below. To get your complete NewMediaWire distribution, please contact your NewMediaWire account representative at 310.492.4001. A.C.C. News Weekly Newspaper African American AIDS Policy &Training Newsletter African American News &Issues Newspaper African American Observer Newspaper African American Times Weekly Newspaper AIM Community News Weekly Newspaper Albany−Southwest Georgian Newspaper Alexandria News Weekly Weekly Newspaper Amen Outreach Newsletter Newsletter Annapolis Times Newspaper Arizona Informant Weekly Newspaper Around Montgomery County Newspaper Atlanta Daily World Weekly Newspaper Atlanta Journal Constitution Newspaper Atlanta News Leader Newspaper Atlanta Voice Weekly Newspaper AUC Digest Newspaper Austin Villager Newspaper Austin Weekly News Newspaper Bakersfield News Observer Weekly Newspaper Baton Rouge Weekly Press Weekly Newspaper Bay State Banner Newspaper Belgrave News Newspaper Berkeley Tri−City Post Newspaper Berkley Tri−City Post
    [Show full text]
  • Software Studies: a Lexicon, Edited by Matthew Fuller, 2008
    fuller_jkt.qxd 4/11/08 7:13 AM Page 1 ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• S •••••••••••••••••••••••••••••••••••••new media/cultural studies ••••software studies •••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• O ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• F software studies\ a lexicon ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• T edited by matthew fuller Matthew Fuller is David Gee Reader in ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• This collection of short expository, critical, Digital Media at the Centre for Cultural ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• W and speculative texts offers a field guide Studies, Goldsmiths College, University of to the cultural, political, social, and aes- London. He is the author of Media ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• thetic impact of software. Computing and Ecologies: Materialist Energies in Art and A digital media are essential to the way we Technoculture (MIT Press, 2005) and ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• work and live, and much has been said Behind the Blip: Essays on the Culture of •••••••••••••••••••••••••••••••••••••
    [Show full text]
  • MAN Hea STUCK in I458N0W
    iianritpBlpr) Manchester — A City of Village Charm Hpralft Saturday, Jan. 24,1987 30 Cents MAN HEa % ^3 a STUCK IN CUR I458N0W Brrr! Wind chill V is 30 below zero Bv The Associated Press The body of a 67-year-old New York state man was discovered in his snowbound car on Interstate 95 in Norwalk Friday, nearly half a day after a winter storm had finished dumping up to a foot of snow on Connecticut, state police said. State police spokesman Lt. Edward Dailey said the body of Arthur Young of Rye, N.Y., was found by his son at about 1; 30 p.m. near the Norwalk-Darien border and exit 13. Young didn’t return home from his Westport [ft workplace Thursday evening and his son retraced his usual route Friday before finding the car three- quarters buried in a snowbank, Dailey said. It was the only storm-related death reported on Connecticut roads. Meanwhile, shelters for the homeless in the state braced for bitterly cold temperatures Friday as forecasters predicted overnight lows of 10 to IS with a wind chill factor down to 30 below zero. !CIM Saturday’s high was expected to be just 15 degrees, the National Wedther Service said. Residents continued digging out from a major winter stohn that dumped up to a foot of snow on te state Thursday. Bradley International Airport in Windsor Locks opened one runway early Friday and resumed full air carrier operations, airport manager Robert Juliano said. The second main runway, used in case of wind shifts, was opening Friday afternoon.
    [Show full text]
  • United States Patent (10) Patent No.: US 7,092.914 B1 Shear Et Al
    US007092914B1 (12) United States Patent (10) Patent No.: US 7,092.914 B1 Shear et al. (45) Date of Patent: *Aug. 15, 2006 (54) METHODS FOR MATCHING, SELECTING, 3,806,874 A 4, 1974 Ehrat NARROWCASTING, AND/OR CLASSIFYING BASED ON RIGHTS MANAGEMENT (Continued) AND/OR OTHER INFORMATION FOREIGN PATENT DOCUMENTS (75) Inventors: Victor H. Shear, Bethesda, MD (US); AU A-36815,97 2, 1998 David M. Van Wie, Sunnyvale, CA (US); Robert P. Weber, Menlo Park, (Continued) CA (US) OTHER PUBLICATIONS (73) Assignee: Intertrust Technologies Corporation, David Arneke and Donna Cunningham, Document from the Sunnyvale, CA (US) Internet: AT&T encryption system protects information services, (News Release), Jan. 9, 1995, 1 page. (*) Notice: Subject to any disclaimer, the term of this Continued patent is extended or adjusted under 35 (Continued) U.S.C. 154(b) by 0 days. Primary Examiner Thomas A. Dixon (74) Attorney, Agent, or Firm—Finnegan, Henderson, This patent is Subject to a terminal dis- Farabow. Garrett & Dunner, LLP claimer. s s (57) ABSTRACT (21) Appl. No.: 09/498,369 (22) Filed: Feb. 4, 2000 Rights management information 1s used at least in part in a matching, narrowcasting, classifying and/or selecting pro Related U.S. Application Data cess. A matching and classification utility system comprising a kind of Commerce Utility System is used to perform the (63) Continuation of application No. 08/965,185, filed on matching, narrowcasting, classifying and/or selecting. The Nov. 6, 1997, now Pat. No. 6,112,181. matching and classification utility system may match, nar rowcast, classify and/or select people and/or things, non (51) Int.
    [Show full text]
  • Annual Report for Fiscal Year 2015
    ACM Annual Report for Fiscal Year 2015 Letter from the President As I think back over the last year, I find it a fantastic time to be a member of the world’s largest profes- sional and student membership society in computing. We continue to build on the services and resources our volunteers and staff provide to the worldwide community, from the foremost collection of comput- Alexander L. Wolf, ACM President ing literature to the forefront of computing education and professional development, from expert advice on public policy and professional ethics to the advance- ment of a balanced and representative work force. Also as I think back over the last year, I note it was a year of important firsts. ACM presented its first million-dollar A.M. Turing Award, bringing the financial clout of this renowned honor in computing in line with the world’s most prestigious cultural and scientific prizes. Thanks to the generous support of Google, this new monetary level raises the Turing Award’s visibility as the premier recognition of computer scientists and engineers who have made contributions of enduring technical importance to the computing community. ACM hosted its first conference targeted spe- cifically at the computing practitioner community. Indeed, the Applicative conference was so successful we expect its successor, slated for June, to double in attendance. In addition, ACM recently introduced ACM, the Association for its first acmqueue app—an interactive, socially net- worked, electronic magazine designed to more easily Computing Machinery, is an reach where its audience now lives and works. international scientific and ACM established its first award to recognize the computing talents of high school seniors.
    [Show full text]