Trend Watch

Thursday, March 6, 2008

Higher-Capacity Memory

A new type of memory could soon be available to device makers.

Sharp memory: Ultrasharp silicon tips like this one, which is just 10 nanometers wide, are the core of a new memory technology that could soon provide an alternative to flash.
Credit: Nanochip

An alternative to the flash memory that stores and retrieves data with arrays of microscopic probes could soon be on the market. Nanochip, a company based in Fremont, CA, has recently raised $14 million to complete work on prototypes that it hopes to ship to electronics device makers for evaluation next year.

Nanochip's technology offers advantages to flash memory, both in terms of the amount of data that can be stored and the cost per memory chip, says Gordon Knight, the company's CEO. The first prototypes will store about 100 gigabytes, he says--more than the tens of gigabytes stored on flash memory cards today. Eventually, the devices could store terabytes' worth of data, he says. That's likely out of the reach of flash-type memory, says Stefan Lai, formerly the director of flash memory technology at Intel and now a scientific advisor to Nanochip.

In flash memory, information is stored using specialized transistors, each of which is addressed by a grid of conducting wires. The Nanochip technology, in contrast, stores information by writing data to a thin-film material using an array of microscopic cantilevers, each with an extremely sharp tip. The size of each bit will be 15 nanometers in the first devices, but it could theoretically be as small as just a couple of nanometers.

Nanochip's array-based memory provides an alternative to both flash memory and hard drives. In addition to storing more data than flash, it will be cheaper and can be about as fast, Knight says. What's more, it could last longer than flash. Compared with hard drives, the manufacturing processes used will make Nanochip's devices more economical for small portable electronics, Lai says. The company's memory devices would also be more rugged than hard drives and run virtually silently.

The idea of using microscopically sharp tips to store data is not new. In the late 1990s, IBM demonstrated its Millipede technology, which used arrays of a thousand such tips to write and read bits. (See "Bugged about the Future of Magnetic Storage?") The Millipede program is still active at IBM but so far hasn't produced a commercial memory chip. Nanochip uses a similar approach.

However, while IBM's Millipede uses a polymer material, with data stored by heating and indenting the material with the ultrasharp tip, Nanochip uses a material that can be written electronically: applying a voltage through the tip changes the electronic state of the material at the point of contact. That state can later be read using a weaker voltage. Knight says that the electronic process is faster than a thermal process.

A remaining challenge is engineering a complete chip with thousands of cantilevers. The arrays will need to be mounted on a stage that can be moved, using electrostatic forces, over the storage material and combined with electronics that make it possible to control each tip separately. Part of the challenge will be writing the algorithms for controlling the device to optimize how to store data using the moving stage, says William King, professor of mechanical science and engineering at the University of Illinois at Urbana-Champagne. (King was part of the Millipede team at IBM and is a scientific advisor to Nanochip.) In both hard drives and flash memory, he says, bits can be accessed sequentially. But in this system, to take advantage of the parallel arrays of tips, methods of storing and retrieving thousands of bits at once will need to be developed.

"It's a big challenge, but it's something I believe can be done," Lai says. "And if you solve the problems, then you have a whole new memory technology that's available."


http://www.technologyreview.com/Nanotech/20192/

The Next Generation of iPhone Hacks

Apple's plan to release a software kit that lets people create legitimate add-ons for the iPhone could make the device appeal to an even wider audience.

Virtual rock star: An iPhone owner plays a virtual guitar. Shinya Kasatani developed software called pocketguitar that lets a person play a guitar by pressing and strumming the phone’s touch screen. Apple has not approved pocketguitar, like many other third-party applications made for the iPhone. However, this month the company is planning to release a software development kit that will allow developers to make legitimate applications.
Credit: Shinya Kasatani
Multimedia
See how the virtual guitar works.

In today's cell-phone market, the iPhone stands out as the shining example of what a handheld device should have: a sleek design, easy-to-use software, and an intuitive interface. But the day Apple released it, geeks found the phone lacking, and they went to work to make their own software for it. These hackers have been crafting clever add-ons that range from instant access to a Blockbuster Online DVD queue to a pocket guitar that takes advantage of the touch screen. In addition, people have found ways to unlock the iPhone from AT&T, so that it can work on other cellular-phone networks.

All of these hacks, however, are done without Apple's blessing or technical support. This month, Apple is expected to release a software development kit (SDK) that will allow programmers to write legitimate software for the phone. This will enable developers to make more reliable software, and it will let the average iPhone owner easily download new programs without needing to follow arduous online instructions from blogs. And importantly, an SDK will likely spawn a new world of applications--possibly even business software--that could extend the reach of the iPhone beyond a user base of four million, as announced in January. "When you have a device like the iPhone that can attract so many people, you also have enterprise developers who want to use that interface," says Mike McGuire, an analyst for Gartner, a market research firm. He says that an SDK will lead to commercial applications for the business sector, "and that's where the real money is."

The average iPhone owner uses the handheld as Apple intended, updating the software and installing media via iTunes. "By default, the only way to get anything on the iPhone is by using iTunes," says Jerry Jones, a developer who has made an iPhone widget that accesses a user's Blockbuster movie queue, as well as a program that lets people adjust the phone's shortcuts so that a double click of the home key launches different applications than Apple's default. But if you want to add these kinds of illegitimate files to your iPhone, you must jump through some technical hoops. "Truthfully, it's not for the faint of heart," Jones says. "If you're not a technology geek, it's not super simple."

Still, there is a large community of people who are hacking their iPhones. One of the most popular programs is a game called Labyrinth that lets a user roll a virtual marble through a maze by tilting the phone (the game accesses the built-in accelerometer). Labyrinth has been downloaded hundreds of thousands of times, Jones says. Comparatively, his Blockbuster application, which targets a niche market, has been downloaded about 56,000 times. Although these numbers don't indicate how many people have hacked their phone (some people might have downloaded the software more than once to test it, for example), they show that the number of people interested in such software isn't trivial.

One hack that has garnered YouTube notoriety turns an iPhone into a guitar. Shinya Kasatani, who wrote the software, says that it is easy to use for people familiar with a real guitar: the phone's screen is turned into a virtual fret board on which a person can press and pluck. "It's basically a software-based synthesizer with a guitar user interface," Kasatani says. "The audio sample of a guitar string is loaded from a file and stretched to the desired frequency when playing." Since there wasn't an SDK, Kasatani says, he struggled with understanding the intricacies of the iPhone's built-in software. It was difficult to adjust the volume of the sound output and detect the multitouch input without a trial-and-error approach. "We, the developers, definitely need the official SDK and [programming] documentation to build stable applications," he say

When Apple releases its SDK, more applications like this could become available, just as they are on PCs and Macs today. However, details on the upcoming SDK are scant, and McGuire guesses that Apple won't open much of the functionality of the phone. "I suspect that it's not going to be a wide open SDK," he says. Programmers might have access to certain layers of the phone's underlying software, such as the instructions that allow widgets to access the Internet, but Apple may keep the instructions for accessing the accelerometer, for example, under wraps. "Apple likes to keep things locked down," McGuire says.

He adds that the control is essential to ensuring that the iPhone works well for most of the people most of the time. In addition, Apple's control is important for ensuring software stability and security--two important criteria if the phone is to be used in the business setting. "I get the impression that [Apple] wants to make [the iPhone] somewhat corporate friendly," McGuire says. "I think you're going to see a lot of focus on pulling developers in to make form-based applications"--the kind used in a sales environment, for example. He says that he suspects Apple will treat third-party software the same way that it approves iPod accessories: by requiring vendors to register with Apple to acquire a badge noting Apple's approval. In this way, Apple could maintain some control over the quality of outside applications, which could help make them more secure.

Regardless of the access the SDK provides to programmers, and the safety precautions available for certified third-party programs, the hacking community will continue to innovate around the iPhone. "Even without the official SDK," says Kasatani, "it's much more attractive than Windows Mobile." The Mac operating system and user interface are more fun to use, he says, and the multitouch display makes it especially interesting to work with.


http://www.technologyreview.com/Biztech/20193/?a=f







Robots

Honda's Asimo.

No discussion of cool tech in Japan would be complete without robots. Japanese researchers are leading the world in robot technology, and humanoid bots like Honda's Asimo are especially impressive.

The latest version of Asimo can serve drinks on a tray and has gained the ability to work intelligently with other Asimo robots in the vicinity to get jobs done faster. Two of the robots have spent most of January working at Honda's Tokyo offices, bringing tea or coffee to guests--and almost certainly entertaining the visitors at the same time.

Rival car-maker Toyota has a clutch of robots including one unveiled in December that plays the violin. (It follows a trumpet-playing robot created a year earlier, so perhaps a robot orchestra is in the making?) The company also has Robina, which is intended to serve as a guide in a public space. Toyota put it into use last year at a public hall in Japan and expects robots like Robina will be commercially realistic in the middle of the next decade.

Taking on a much more serious role is Twendy One, a home-help robot developed by Tokyo's Waseda University. It can do many of the basic tasks that a frail person may need help with, such as assisting people out of bed and serving up toast and drinks.

The robot is still under development but could have a bright future. Japan's population is aging fast--already, 22 percent of people are over 65--and the birth rate is slowing. That likely means a future shortage of workers. It's one of the reasons money is being poured into robot technology in this already technology-saturated nation.

http://www.pcworld.com/article/id,142120-page,5-c,electronics/article.html

A new earthquakes warning system

One area that's taken very seriously by people in Japan is earthquakes and disaster prevention. The problem is, you never know when a quake could strike, right? Well, not necessarily.

A new warning system has just gone into operation that seeks to quickly detect the weak but fast-moving primary waves from a quake and use them to estimate when the slower-moving but destructive secondary waves will hit.

The system won't help people living at the epicenter of an earthquake, since both kinds of waves arrive virtually simultaneously. But in the event of a major quake, warnings of anywhere from a few seconds to up to a minute can be supplied almost instantaneously.

That's enough time to halt trains and bring factory equipment to an emergency stop, and for homeowners to switch off the gas. Most deaths in the Kobe quake of 1995 were from fires that started after the quake, so preventing flameups is important.

http://www.pcworld.com/article/id,142120-page,4-c,electronics/article.html

Connected Cars

Connected Cars

In Japan, car navigation systems have been a must-have accessory in automobiles for years. Streets in cities like Tokyo often don't have names, so a navigation system can really save you time. But the latest systems, offered by companies like Nissan, come with something extra.

Hook your navigation system to your cell phone, and you have a connection through which you can get the latest road and traffic data. The navigation system already knows where the nearest gas station is, but with the network link it can also tell you where the cheapest station is, thanks to daily updates on gas prices.

When you're driving, the phone can connect you to an operator who will help you on your journey and even remotely reprogram your navigation system so that you never have to take your hands off the wheel.

About 10 percent of streets are covered with sensors that provide information on traffic. Nissan is experimenting with a new service that collects data about the roads you've driven and the speeds you've achieved, and feeds it to a central computer that adds the information to the traffic database for a more complete picture of jams.

Round View Monitor car safety system--click for full-size image.

High-tech is also being employed in car safety systems like the Round View Monitor. The video from four cameras around the vehicle is processed and brought together into a single image so that you get the illusion of seeing your car from above. It makes backing into tight spaces really easy and is a big-step beyond the single cameras now found on some large cars and trucks.

http://www.pcworld.com/article/id,142120-page,3-c,electronics/article.html

Mobile Wallet Service

Mobile Wallet Service

A customer uses her cell phone as a so-called mobile wallet.

Something else that's popular in cell phones these days is the "Osaifu keitai," the mobile wallet service. Phones have smart cards embedded inside, and these cards let you add applications like electronic money, your commuter pass, an airline mileage card, or a credit card just by downloading some software.

The strength of Japan's mobile wallet system is that the industry has settled on a single smart card, Sony's Felica. Once a person's phone has this hardware, he or she can add more functionality with software.

To use a cell phone as a credit card, pass it over a reader.

NTT DoCoMo, Japan's largest cellular carrier, gives all its customers an electronic credit card application called DCMX Mini. It has a 10,000-yen ($94) credit limit, and charges appear on the phone bill. Big spenders can apply for more credit and use it just like a regular credit card. All you have to do is bring your phone within an inch of the reader and the transaction can be completed.

Electronic money--something that was tried many times but failed during the dot-com bubble--is now becoming very popular, thanks to "Osaifu keitai."

Of the electronic money systems in Japan, Edy from BitWallet is the market leader, accepted in more than 71,000 convenience stores, bookshops, and coffee chains, and at vending machines. More than 37 million cards and cell phones that support Edy are on the market, and the network handles close to a million transactions per day on average.

http://www.pcworld.com/article/id,142120-page,2-c,electronics/article.html#

Flash Goes Mobile

Web to go: A new mobile browser has been launched that can display full Flash media content. This makes it possible for users to view far more of the Web on a mobile phone than they could previously.
Credit: Opera

No matter how much money you spend on a cell phone, the Web you see on its small screen isn't quite the same as the one you view on a laptop. Some features often can't run on mobile-phone Web browsers. But the latest version of Opera Mobile could bring more of the Web to your mobile world. Capable of displaying full Flash media content, Opera Mobile version 9.5 makes it possible to use cell phones and handheld computers to view online animations and movies.

Stripped-down versions of the Web have been offered to mobile users in the past. But these have been widely viewed as flops, says Jon von Tetzchner, CEO of Opera Software, based in the Norwegian capital of Oslo. "There is only one Web, and that's what the end user wants," he says.

Recently, there have been improvements in the design of mobile browsers and their user interfaces in an effort to deliver a more complete Web-browsing experience via mobile devices. But even the swanky browser in Apple's iPhone doesn't support Flash, which puts a limit on the content that users can access with the device.

"A full version of Flash inside the browser makes it possible for users to view the normal versions of video-based websites like YouTube or DailyMotion," says Ian Fogg, research director with London-based analyst firm Jupiter Research.

Some phones offer a lightweight version, called Flash Lite--which is how iPhone users are able to access YouTube--but it has reduced sound and video quality, and only a small minority of devices offer it.

Opera Software was spun out of the Norwegian telecom company Telenor in 1995 and is famed for concentrating almost exclusively on mobile browsing. In addition to offering Flash, the company claims that its latest version can run 2.5 times faster than Microsoft's mobile browser. "Speed is our focus," says von Tetzchner. It is something that the company is very proud of, and it's largely due to optimizing the code so that it runs more efficiently on the limited processing resources of a mobile device, he says.

Users of the new browser will also find tabbed browsing (which allows the user to open multiple Web pages at the same time without launching multiple browser windows) and additional mobile features, such as the ability to easily send a Web link to someone as a text message. "There are a lot of improvements," says von Tetzchner. But it's still not the full Web, because there are still applications that Opera does not support, such as Windows Media. But eventually, it will all be supported, von Tetzchner says.

Despite the advantages of Opera Mobile, the company faces significant competition. Historically, Opera's main revenues have come from device manufacturers such as Nokia and Sony Ericsson, which offer the browser on their phones as preinstalled software. "But this model of supplying to the device markets is coming under pressure," says Fogg.

Increasingly, companies like Nokia are turning to open source engines, such as WebKit--the engine behind the browser on Nokia's N-Series devices and iPhones. Similarly, Google's Android platform has been heralded as the software that will bring the "desktop" experience to the mobile Web user, when it eventually comes. But von Tetzchner is pragmatic about it. "There's always going to be competition," he says.

In the meantime, having Flash on your phone may not be all it's cracked up to be. It may give you access to your favorite video websites, but only if the phone's processor and hardware are fast enough to cope. "Often they are not," says Fogg. "This may be one reason that the iPhone does not yet have Flash support."

http://www.technologyreview.com/Infotech/20198/page1/

Only in Japan: The Best Technologies You Can't Buy

True mobile TV. Connected cars. Personal robots. The coolest new gadgets and services are still found in the Land of the Rising Sun.


Just a few years ago Japan's lead in all things digital was easy to see. Japanese consumers could buy new domestic gadgets from companies like Sony, Toshiba, and Panasonic, often a year or two before they hit the market in other countries. But now things have changed. With gadgets increasingly coming out at the same time around the world, it's no longer the hardware that makes something cool, but what you can do with it.

[Note: To see some of the technology and services described here in action, watch our video, "Made in Japan: Future Tech Today."]

Mobile Digital TV

Take OneSeg, Japan's mobile digital TV system. The entire electronics industry, TV broadcasters, and the government all agreed on a single broadcasting standard, eliminating the technical competition that's holding back such services in the United States and Europe.

The result is a popular service that features all the regular terrestrial channels at no cost. Already, 14 million cell phones with the service have been sold, and the sight of people watching TV is becoming more common on trains and in cafes across Japan.

The latest phones also allow you to record TV shows. And if you're in a public space but forgot to bring your headphones, it's no problem. A couple of button presses brings up the subtitles so you can enjoy the show with the volume turned down. In addition, a companion data service provides information about the current show, promotions from the broadcaster, and, often, a link to the TV station's mobile Internet home page.

http://www.pcworld.com/article/id,142120/article.html#

Trading Technology

Internet Trading

Internet Trading unleashes the potential of the Internet by providing the broking members of an exchange with the functionality to grant limited / full access to any of their clients.

When making this connection, the broker is guaranteed complete confidentiality and the rules of the exchange are strictly adhered to. The exchange receives bids and offers from the broker, acting as an agent on behalf of a client. Every such bid or offer is checked against limits, SET UP BY THE BROKER, and when any bid or offer is satisfied all other bids and offers are re-checked. Order authorization is totally unnecessary if the order is within the limits set by the broker, however, the facility is available.

The client has a restricted set of ATS functions, for example they cannot make a request for a double, or an RFQ. In real time however, they can bid, offer, hit a bid or offer, view their orders, trades, positions, and margin requirement.

As the Internet ATS server behaves just as a dealer would who receives a call from a client, a dealer who is logged in will see all the client orders as they are created and as they become trades and positions.

The Internet ATS software package consists of three separate modules, each performing specific functions.

ATS Inet server

Provides the interface between the client, broker and the appropriate exchange through which all deals take place. Stores a client database. The ATS Inet server runs at the broker. The broker can add new clients, delete clients or modify existing client data. Adding a client will grant them access to the relevant exchange system via the internet, if the client has the ATS Client Interface installed on their PC and has access to the internet. When a client is added the broker can choose to which degree the client is restricted to deal by setting the margin limits of the client, deciding whether the client can hit only, view depth and whether the client needs authorization to make deals. A client may also be denied dealing at all and will only be able to view the live data that is transmitted from the relevant exchange. If a client is deleted from the database, they will no longer be able to access the relevant financial market via the internet until they are added to the system again. The client's particulars may also be modified so that more/fewer restrictions are placed on them, according to the current wishes of the broker.

ATS Client Interface

Provides the means through which a client of the broker can view live exchange data, provides the means through which a client of the broker can make deals through the internet. The ATS Client Interface runs at the client. The client must be a registered exchange client, have access to the internet and have the ATS Client Interface installed on their PC. The client will have to supply their personal password before they are allowed to connect to the ATS Inet server. They will then be able to see live data streaming in from the relevant exchange on their terminal, and will be able to perform whatever functions their broker has allowed.

Monitor

The main function of the Monitor is to enable the broker to authorize the deals that a client wishes to make. The Monitor runs at the broker. Brokers will be able to see all those deals for which they wish to deny or grant approval, according to the criteria set up in the ATS Inet server for each client. When a client attempts to make a bid or offer that requires such approval, the client's code and details of the transaction will appear on the screen. The broker can then accept or decline the proposed deal at the click of a button.

Security and data integrity

A number of security measures have been built into the Internet ATS:

Encryption / Decryption

Any deals (bids/offers), or password changes made by the client is sensitive data that needs to be secured. The sensitive data is encrypted at the Client Interface and decrypted at the Internet server by making use of a complex encryption/decryption algorithm. The data is encrypted using an untraceable key, which includes random elements and changes daily. The key is calculated independently at both the Client Interface and the Internet server, making use of identical formulae, and is therefore never transmitted with the sensitive data.

Time encapsulation

Potentially, a hacker can intercept a sensitive message and re-send it a number of times to the Inet server without tampering with the message itself. Any number of identical transactions, unwanted by the client, can be performed at the exchange in this way as long as the margin limit of the client is not transgressed. In order to prevent this, the current time is recorded as part of the sensitive message, and is subsequently encrypted at the Client Interface and decrypted at the Internet server.

When a valid sensitive message has been sent (for example a client has made a valid bid) the time that is encapsulated within the message is stored at the Internet server. When the client sends a subsequent sensitive message, the time that is encapsulated in the second message is compared to the time that had been stored previously. Logic dictates that the time encapsulated in the second message must be a copy of an earlier message. Since the time that is encapsulated is also encrypted within the sensitive message, this cannot be tampered with and the potential scenario, as described, will not occur.

Password Issues

Password lengths must be a certain length and must contain at least 5 different characters. The client must change their password regularly. Recent passwords are stored at the Internet server and new passwords are checked against these so that passwords are not re-used often. If consecutive logins are unsuccessful, it is assumed that someone is tampering with the client's system.

In this case the Internet server changes the client's password to a random number, and a message is sent to the client to contact their broker who will be able to notify them what their password had been changed to. The client will then be able to re-iogin and change their password again should they wish to do so. Each time that a sensitive message is sent (for example on making a bid), the client must provide their password. In this way tampering by other people is minimized when the client is away from their computer.

Set out below are our technological specifications for each module of our Internet Automated Trading System:

Internet SERVERS:

  • 100 % IBM compatible 350 Mhz Pentium
  • 64MB RAM
  • 1.4MB stiffy drive 1 GB Hard Drive VGA
  • Windows NT Server
  • Windows IIS or equivalent
  • Novell 32 Client

Internet CLIENTS and MONITOR:

  • 100 % IBM compatible 200 Mhz Pentium
  • 32MB RAM
  • 1.4MB stiffy drive 1 GB Hard Drive
  • VGA
  • Windows 95/98/NT


http://www.sttsoftware.co.za/productInternetTrading.html#

Options Trading Technology

The Optioneer strategy uses proprietary technology that has been formulated to give you two valuable indicators that identify trade entry and exit points.

  • Probability or "P" Factor: The probability of the market being outside the Strike price by contract expiration date.
  • Risk or "R" Factor: The risk associated with entering the market.
The tried formulas which enable both "R" and "P" factors to be determined are calculated daily by Optioneer Systems and posted on the web site. Without these two indicators we believe it is very difficult to assess one's position on a daily basis.

Through regular practice in smaller trades, skills can be honed, while at the same time gaining confidence and building market knowledge

http://www.optioneer.com.au/options-trading-technology

Information technology governance

Information Technology Governance, IT Governance or ICT (Information & Communications Technology) Governance, is a subset discipline of Corporate Governance focused on information technology (IT) systems and their performance and risk management. The rising interest in IT governance is partly due to compliance initiatives (e.g. Sarbanes-Oxley (USA) and Basel II (Europe)), as well as the acknowledgment that IT projects can easily get out of control and profoundly affect the performance of an organization.

A characteristic theme of IT governance discussions is that the IT capability can no longer be a black box. The traditional handling of IT management by board-level executives is that due to limited technical experience and IT complexity, key decisions are deferred to IT professionals. IT governance implies a system in which all stakeholders, including the board, internal customers and related areas such as finance, have the necessary input into the decision making process. This prevents a single stakeholder, typically IT, being blamed for poor decisions. It also prevents users from later complaining that the system does not behave or perform as expected:

A board needs to understand the overall architecture of its company's IT applications portfolio … The board must ensure that management knows what information resources are out there, what condition they are in, and what role they play in generating revenue

Definitions

There are narrower and broader definitions of IT governance. Weill and Ross focus on "Specifying the decision rights and accountability framework to encourage desirable behaviour in the use of IT."[2]

In contrast, the IT Governance Institute expands the definition to include underpinning mechanisms: "… the leadership and organisational structures and processes that ensure that the organisation’s IT sustains and extends the organisation’s strategies and objectives. [3]

While AS8015, the Australian Standard for Corporate Governance of ICT, defines Corporate Governance of ICT as "The system by which the current and future use of ICT is directed and controlled. It involves evaluating and directing the plans for the use of ICT to support the organisation and monitoring this use to achieve plans. It includes the strategy and policies for using ICT within an organisation."


Background

The discipline of information technology governance derives from corporate governance and deals primarily with the connection between business focus and IT management of an organization. It highlights the importance of IT related matters in contemporary organizations and states that strategic IT decisions should be owned by the corporate board, rather than by the chief information officer or other IT managers.

The primary goals for information technology governance are to (1) assure that the investments in IT generate business value, and (2) mitigate the risks that are associated with IT. This can be done by implementing an organizational structure with well-defined roles for the responsibility of information, business processes, applications, infrastructure, etc.

Decision rights are a key concern of IT governance, being the primary topic of the book by that name by Weill and Ross.[4] According to Weill and Ross, depending on the size, business scope, and IT maturity of an organization, either centralized, decentralized or federated models of responsibility for dealing with strategic IT matters are suggested. In this view, the well defined control of IT is the key to success.

After the widely reported collapse of Enron in 2000, and the alleged problems within Arthur Andersen and WorldCom, the duties and responsibilities of the boards of directors for public and privately held corporations were questioned. As a response to this, and to attempt to prevent similar problems from happening again, the US Sarbanes-Oxley Act was written to stress the importance of business control and auditing. Sarbanes-Oxley and Basel-II in Europe have been catalysts for the development of the discipline of information technology governance since the early 2000s. However, the concerns of Sarbanes Oxley (in particular Section 404) have less to do with IT decision rights as discussed by Weill and Ross, and more to do with operational control processes such as Change management.

Following Corporate Collapses in Australia around the same time, working groups were established to develop standards for Corporate Governance. A series of Australian Standards for Corporate Governance were published in 2003, these were:

  • Good Governance Principles (AS8000)
  • Fraud and Corruption Control (AS8001)
  • Organisational Codes of Conduct (AS8002)
  • Corporate Social Responsibility (AS8003)
  • Whistle Blower protection programs (AS8004)

In 2005, AS8015 Corporate Governance of ICT was published

http://en.wikipedia.org/wiki/Information_technology_governance

A Better Way to Capture Carbon

New materials provide a potentially cheaper way to reduce carbon dioxide emissions from power plants.

Carbon-capturing crystals: This is an optical micrograph of a new material that can pull carbon dioxide from a stream of gases, making it possible to sequester the greenhouse gas.
Credit: Omar Yaghi

Researchers have developed porous materials that can soak up 80 times their volume of carbon dioxide, offering the tantalizing possibility that the greenhouse gas could be cheaply scrubbed from power-plant smokestacks. After the carbon dioxide has been absorbed by the new materials, it could be released through pressure changes, compressed, and, finally, pumped underground for long-term storage.

Such carbon dioxide capture and sequestration could be essential to reducing greenhouse-gas emissions, especially in countries such as the United States that depend heavily on coal for electricity. The first stage, capturing the carbon, is particularly important, since it can account for 75 percent of the total costs, according to the Department of Energy.

The new materials, described this week in Science, were created by researchers at UCLA led by Omar Yaghi, a chemist known for producing materials with intricate microscopic structures. They absorb large amounts of carbon dioxide but do not absorb other gases.

Techniques already exist for capturing carbon dioxide from smokestacks, but they use large amounts of energy--15 to 20 percent of the total electricity output of a power plant, according to one estimate, Yaghi says. That is because existing materials, known as amines, need to be heated to release the carbon dioxide they've absorbed. Indeed, capturing and compressing carbon dioxide through these existing methods can add 80 to 90 percent to the cost of producing electricity from coal, says Thomas Feeley, a project manager at the National Energy Technology Laboratory.

Feeley says that Yaghi's materials "compare favorably" with other experimental materials that absorb carbon dioxide that are being developed to help bring down these costs. Yaghi says that his materials could lower costs considerably since they use less energy, although exactly how much will require testing the materials at power plants.

Beyond being potentially useful in smokestacks, the materials could be employed in coal gasification plants. In these plants, coal is first processed to produce a mixture of carbon dioxide and hydrogen gas. The hydrogen is then used to generate electricity. The carbon dioxide could be captured using a solvent that increases energy consumption. But as in the smokestack-based process, the new UCLA materials could require less energy.


The materials belong to a class called zeolitic imidazolate frameworks (ZIFs). They're made of metal atoms bridged by one of a number of ring-shaped organic molecules called imidazolates. Prior to Yaghi's research, 24 types of ZIFs had been developed over the course of 12 years. Yaghi made 25 new versions in just three months. These materials can be extremely versatile, since the metal atoms can act as powerful catalysts, and the organic molecules can serve as anchors for a number of functional molecules.


ZIF proliferation: New automated techniques allow researchers to quickly synthesize dozens of new materials called zeolitic imidazolate frameworks (ZIFs). Credit: Omar Yaghi

The new materials absorb carbon dioxide in part because they're extremely porous, which gives them a high surface area that can come into contact with carbon dioxide molecules. The most porous of the materials that Yaghi reports in Science contain nearly 2,000 square meters of surface area packed into one gram of material. One liter of one of Yaghi's materials can store all of the molecules of carbon dioxide that, at zero °C and at ambient pressure, would take up a volume of 82.6 liters.

While the exact mechanisms are not fully understood, Yaghi thinks that the slightly negative charge of organic molecules in his material attracts carbon dioxide molecules, which have a slightly positive charge. As a result, carbon dioxide is held in place, while other gases move through the material. This method of trapping carbon dioxide is better than some other methods because it does not involve strong covalent bonds, so it doesn't take much energy to release the gas.

The next step for the materials is commercialization. This means scaling up production and incorporating the materials into a system at a power plant, such as by packing the materials into canisters that can be filled with pressurized exhaust gases--something that the UCLA group says could be possible in two to three years. Yaghi estimates that the materials could easily be made in large quantities, since they are similar to other materials he has developed that can now be made by the ton by BASF, the giant chemical company. "Now it's in the hands of industry," Yaghi says. And he has developed automated techniques that could lead to more materials that could have even better properties.

http://www.technologyreview.com/Energy/20295/page1/

Wiring Up DNA

Measuring the conductivity of DNA could provide a way to detect mutations.

Hot-wired: By placing a double-stranded DNA segment in a gap in a single-walled carbon nanotube, researchers have measured the electrical properties of the biological molecule. Since even a single mismatch in the DNA letters affects the conductivity of the segment, the system could eventually be the basis of chemical sensors to detect mutations in DNA.
Credit: Colin Nuckolls

By wiring up DNA between two carbon nanotubes, researchers have measured the molecule's ability to conduct electricity. Introducing just a single letter change can drastically alter the DNA's resistance, the researchers found, a phenomenon that they plan to exploit with a device that can rapidly screen DNA for disease-linked mutations.

Measuring the electrical properties of DNA has proved tricky because the molecule and its attachments to electrodes tend to be very fragile. But in the new study, Colin Nuckolls, a professor of chemistry at Columbia University, in New York, teamed up with Jacqueline Barton, a professor of chemistry at Caltech, in Pasadena, CA, who's an expert in DNA charge transport. Nuckolls's group had previously developed a method for securely hooking up biological molecules to single-walled carbon nanotubes, which act as the electrodes in a miniscule circuit.

The researchers used an etching process to slice a gap in a carbon nanotube; they created a carboxylic acid group on the nanotube at each end of the gap. They then reacted these groups with DNA strands whose ends had been tagged with amine groups, creating tough chemical amide links that bond together the nanotubes and DNA. The amide linkages are robust enough to withstand enormous electrical fields.

The team estimated that DNA strands of around 15 base pairs (around 6 nanometers) in length had a resistance roughly equivalent to that of a similar-sized piece of graphite. This is a finding that the researchers might have expected since the chemical base pairs that constitute DNA create a stack of aromatic rings similar to those in graphite.

"In my opinion, the results of this work will survive, in contrast to many other publications on this topic," says chemist Bernd Giese, of the University of Basel, Switzerland. Previous estimates of DNA's conductivity have varied dramatically, Giese says, partly because it was unclear if the delicate DNA or its connection to electrodes had become damaged by the high voltages used. "One thinks one has burned the DNA to charcoal," Giese says. "It's extremely complicated experimentally."

Barton and Nuckolls performed two tricks with their wired-up DNA. For their first, they introduced a restriction enzyme that bound and cut the DNA at a specific sequence. When severed, the current running through the DNA vanished. "It's a way of biochemically blowing a fuse," Nuckolls says. It also demonstratesthat the DNA keeps its native structure in the circuit; if it had not, the enzyme would not recognize and cut the molecule.


For their second trick, the researchers introduced a single base-pair mismatch into the DNA so that, for example, a C was paired up with an A (rather than its normal partner, G). This tweak boosted the molecule's resistance some 300-fold, probably because it distorts the double helical structure. They could do this easily by connecting only one of DNA's two strands into the circuit. The second strand - which can either be a perfect match to the first or contain a mismatch - can lift on or off.

Showing the electrical effect of such sequence mismatch and enzyme cutting is the real strength of the experiments, says Danny Porath, of Hebrew University, in Jerusalem, Israel, who has also measured current through DNA. "They play with the parameters and show that conductivity of DNA clearly depends on them, and that's beautiful," he says.

Nuckolls is now working to exploit this discovery to detect single nucleotide polymorphisms (SNPs), the one-letter variations in DNA that are linked to, for example, susceptibility to Alzheimer's, diabetes, and many other major diseases. Nuckolls hopes that his method can be used to identify SNPs more rapidly and with greater sensitivity than existing methods. In such a device, a reference strand of DNA is wired into the circuit and other strands allowed to pair up with it. If the second strand carries a different base at the position of the SNP, this would be enough to trigger a change in the current through a nanoscale circuit, just as the base-pair mismatch did. Nuckolls says that he is already working with electrical engineers to create a sensor that can slot into existing semiconductor chips, making it cheap and readily available. "It's one of our big focuses, and we're pretty close," he says.

The team is likely to have competition. Late last year, a group led by Wonbong Choi, of Florida International University, in Miami, reported that it had strung 80 base pairs of DNA between two carbon nanotubes and sent current through the DNA. Choi says that he is working to create a sensor that can rapidly reveal the presence of specific genetic sequences--such as the avian influenza virus--by looking at changes in current through the tiny circuit.

Barton, meanwhile, is intent on finding out whether the conductivity of DNA serves any biological purpose in the cell. She has evidence that proteins bound to DNA may detect DNA damage by changes in its electrical properties, perhaps triggering repair of the damage. "We think it's something nature takes advantage of," she says. "It's a radical idea, but I think as we get more and more evidence, the case will be built."

http://www.technologyreview.com/Nanotech/20205/page2/

Trend Watch