Escolar Documentos
Profissional Documentos
Cultura Documentos
p36
briefing
computer
security
p59
Solar Which
Leader Countries
p52
Have the
Buzz Aldrin: Fastest
Let’s Go Broadband?
to Mars p24
p26
Spanning IT to energy, the Web to biomedicine and materials, the editors of Technology Review
have pinpointed the key technologies that will drive the economy forward. REGISTER NOW!
Interested in Sponsoring?
Each year, EmTech@MIT attracts top decision makers from the technology, engineering,
investment, and management communities. Partnering with Technology Review
allows you to showcase your company’s technologies and capabilities to our influential
audience. E-mail sponsorship@technologyreview.com to learn more.
Sponsors Partners
Check out the 2010 speaker lineup and register online at: www.technologyreview.com/emtech
36 Moore’s Outlaws
The growing threat of cyber crime, espionage,
and warfare.
By DaViD Ta lb oT
28 Robot in the OR
Suntech Ceo Zhengrong Shi made China a power- The da Vinci robot can shorten
house in photovoltaics. Now he plans to make solar surgical recovery times.
power as cheap as conventional electricity. By Emily Singer
By K eViN bulliS
BriEfing
■ www.technologyreview.com/suntech Hear the CTO of Suntech
explain the company’s advanced solar technology. 59–70
Computer Security
Cyber attacks are inspiring new
defenses for networks, personal
8 Letters graphiti computers, and smart phones.
10 From the Editor 24 The Global
Broadband Spectrum rEviEws
17–22 hack
Technology Q&a 78 iPad 3G
Commercialized 26 Buzz Aldrin A peek inside the tablet reveals
A robot to help with weight loss, The Apollo astronaut says: forget how it connects to the world.
personal AC, solar recharger, por- the moon, let’s colonize Mars. By Erica Naone
table hotspot, pocket-sized bomb By Brittany Sauser
detector, electric delivery vehicle, ■ www.technologyreview.com/
and more. hack See an interactive version.
4 t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
28
DEMo
80 Inexpensive, Unbreakable
Displays
Researchers at Hewlett-Packard are
making silicon electronics on rolls of
plastic. The result could be flexible,
cheap displays. By Katherine Bourzac
■ www.technologyreview.com/
demo Watch a video of HP’s printing
process in action.
26 yEars ago in TR
See for yourself. Read “Tactile and Multisensory Spatial
88 The Long Fight Ahead Warning Signals for Drivers,” only in IEEE Xplore.
When researchers found the cause of
AIDS in the early 1980s, their work had
only just begun. By Matt Mahoney
Try IEEE Xplore free—
visit www.ieee.org/preventingaccidents
6 t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
grading our predictions read about the subject. Public opinion on I agree that newspapers and magazines
www
I always enjoy reading the new-technologies the Internet has made a difference, from could profit by offering professional
article (“10 Emerging Technologies 2010,” the revelation of the corrupt Nanjing offi- design and writing, but books may be different.
May/June 2010). It would be cial to the acquittal of Deng It is much easier to self-publish today than ever
interesting to see how well Yujiao. But its impact can before, but publishers still offer professional edit-
your predictions over the be overstated. I haven’t seen ing, art, and marketing, and I’m not sure how a
years have done. What per- evidence that online discus- self-published author would obtain those services.
centage are on track? Do you sions have changed any major And if costs of materials, printing, and shipping
do better in certain fields? If policies. Nor have they led to are reduced through digital publishing, do pub-
it turns out you are good at investigations of anyone other lishers really lose money at $9.99?
this, maybe you could sell than marginal officials. Also, mwilson1962
your picks. the impact of Google’s par- (Mark Wilson, Rochester, NY)
Ed Macho tial withdrawal from China
Hilton Head Island, SC May/June ’10 may not have had as much Publishers will only survive if they evolve their busi-
of an effect as we think on ness model instead of forcing Amazon to charge
While we haven’t formally looked at how well Chinese residents. In fact, to many Chi- more than $9.99 for Kindle books. These publish-
our predictions have done, we may do so in the nese users, the “War of Internet Addiction” ers are rushing blindly down the same path as the
future. Thanks for the suggestion! —Editors video, which satirizes the regulatory battles recording industry, maintaining an outmoded busi-
over the approval of World of Warcraft and ness model. The resulting piracy will be devastating
dreams of the future the government’s 2009 attempts to “cure” to agents, publishers, and, worse, authors.
I find every issue of Technology Review Internet addiction, probably had more of rttedrow
useful in more ways than one. First, it’s an impact. (Richard Tedrow, Bethesda, MD)
always provocative reading. Second, it Bill Bishop
provides ample material to inspire my boys Beijing, China u.s. competitiveness
with technological dreams of the future: Good Q&A with Paul Otellini (May/June 2010).
OLED lights, 3-D smart phones, jet packs, the impact of e-books He should be commended for bringing up the
renewable solar fuels, green concrete, and There’s a lot wrong with your review of decline of innovation. However, I take issue with
implantable electronics, to name a few. And e-book readers (“Going Out of Print,” May/ his assertion that U.S. corporate tax rates are
to top it off, a novel chart of U.S. energy June 2010), beginning with the assumption among the highest of developed countries. After
flows that I will be using in the next lecture that print will go the way of the CD. Accord- all the tax breaks and generous loopholes, the
for my global-warming class. ing to a PricewaterhouseCoopers survey tax rate for U.S. corporations is among the low-
David Lea published by the Financial Times on Febru- est in the developed world.
Santa Barbara, CA ary 9, the impact of e-readers is expected to outsider
rise in the United States from about 1 per- (Subramani Iyer, San Jose, CA)
china and the web cent of sales in 2008 to about 6 percent in
As a Beijing-based tech entrepreneur and 2013. Books and music are not analogous. Otellini scratches the surface of problems fac-
blogger at Digicha.com, I thought David The traditional publishing industry is ing U.S. companies. When I started in business
Talbot’s “China’s Internet Paradox” (May/ beset by many woes, including its inabil- years ago, government-funded research could be
June 2010) was one of the best articles I’ve ity to agree upon a digital strategy, but the counted on, but for the last decade we’ve been
e-reader is not the chief culprit. I discussed ruled by those interested in gaming financial
the plight of the publishing industry and its systems rather than supporting competitiveness.
join the discussion, or contact us probable outcome in a recent issue of the Corporate execs increase short-term profits by
■ technologyreview.com/community New York Review of Books. outsourcing jobs to foreign countries. Most of
e-mail letters@technologyreview.com
Jason Epstein the competent engineers I’ve known employed
write Technology Review, One Main Street,
New York, NY by U.S. companies were let go in their 50s, when
7th Floor, Cambridge, MA 02142
fax 617-475-8043 they can be most productive in creating the next
Please include your address, telephone number, The author is the creator of the trade paper- generations of technologies.
and e-mail address. Letters may be edited for back and cofounder of the New York Review fiberman
both clarity and length. of Books. —Editors (Jim Hayes, Fallbrook, CA)
www.technologyreview.com/ootf
Sponsored By
On Risk
how should technologists think about precautions?
I
have been thinking about risk. One possible intellectual tool, popular with environmental-
As I write this column in early June, British Petroleum is still ists and policy makers, is the Precautionary Principle, which
struggling to contain its leaking well in the Gulf of Mexico. After states that when something is suspected of being harmful,
the company’s drilling rig, Deepwater Horizon, exploded on the burden of proof that the thing is not harmful rests with its
April 20, as many as 19,000 barrels of oil (or as much as 800,000 proponents. This principle has a stronger and a weaker for-
gallons) spewed into the Gulf every day. A cap is now capturing mulation. The stronger calls for regulation of any potentially
a little more than 400,000 gallons a day. It is the worst environ- harmful activity, or refraining from action altogether, until
mental disaster in the history of the United States, but there may there is consensus that it is safe. The weaker does not demand
be no solution until BP completes two “relief wells” in August. regulation or bans; it weighs costs against likelihoods. The for-
In this issue of Technology Review, David Talbot writes about mer says, “Better safe than sorry”; the latter, “Be prepared.”
the increasing incidence of cyber crime and espionage, and Although a handful of international agreements have
the real (if still speculative) risk of outright cyber warfare. In endorsed the strong formulation, and while it possesses a quasi-
“Moore’s Outlaws” (p. 36), he quotes Stewart Baker, the former legal status in European Union law, it is in fact seldom applied.
general counsel of the National Security Agency and a for- (A notable exception is in the management of global fisheries.)
mer policy chief at the U.S. Department of Homeland Secu- Certainly, governments, corporations, and individuals rou-
rity: “What we’ve been seeing, over the last decade or so, is that tinely ignore it when thinking about new technologies. That’s
Moore’s Law is working more for the bad guys than the good because the idea is “paralyzing,” according to Cass Sunstein, the
guys. It’s really ‘Moore’s outlaws’ who are winning this fight. administrator of the White House Office of Information and
Code is more complex, and that means more opportunity to Regulatory Affairs (and for many years a professor of law at the
exploit the code. There is more money to be made in exploiting University of Chicago, where he wrote about behavioral eco-
the code, and that means there are more and more sophisticated nomics and risk). No one knows how new technologies will be
people looking to exploit vulnerabilities. If you look at things used in the future. There is never any consensus about risks. Cri-
like malware found, or attacks, or the size of the haul people are ses accompany the development of any new, complex system,
pulling in, there is an exponential increase.” but their exact form tends to take us by surprise.
Talbot describes experts’ concerns that computer viruses have But if the strong formulation of the Precautionary Principle
made millions of machines into “enslaved armies”—botnets— is paralyzing, the weak formulation is almost no help at all. It
awaiting instruction by malefactors. In the days leading up to provides little guidance for thinking about unlikely but poten-
April 1, 2009, a worm called Conficker was expected to receive tially catastrophic risks. We need an entirely new principle that
an update from its unknown creator, but no one knew what: “A will guide our investment in precautionary technology. When a
tweak to Conficker’s code might cause the three million or so technology fails or is unsustainable, we should be rationally con-
machines ... to start attacking the servers of some company or fident that a fix or alternative exists or will exist, because inge-
government network, vomit out billions of pieces of spam, or just nious humans have devised other technologies that will mitigate
improve the worm’s own ability to propagate.” It’s scary stuff. the crisis or stand in the outmoded technology’s place. Govern-
In the first case, a complex system of technologies (whose pur- ment has a justified role in requiring such precautionary invest-
pose is to extract crude oil five miles under the ocean’s surface) ment in new technologies.
failed; in the second, a more complex system (a global computer In the absence of a new principle, we have mere optimism.
network whose purposes are incomprehensibly various, but David Talbot’s feature, which accepts that we’re not likely to
upon which our technological civilization depends) is failing. build an entirely new, more secure Internet, describes research
These failures are not so much predictable as unsurprising. We into new technologies that may make our networks safer. For
expanded our use of vulnerable technologies, because we were now, perhaps that’s the best risk management we can expect.
mar k o stow
dependent upon them. How should we think about the risks Read about them, and write and tell me what you think at
inherent in technologies, particularly new technologies? jason.pontin@technologyreview.com. —Jason Pontin
visionaries
about to change the world?
Please send me my FREE TRIAL ISSUE of Technology Review. I understand I will be billed at the exclusive low rate of just $24.95 for one full year (6 issues), a 36%
Call 1 800 877 5230 to start your subscription now —or subscribe at http://www.trsub.com/july
Cyberspace
of the 2006 Israel-Hezbollah war; the g lo ba l h e a lt h
Preventing HIV
2008 Russian-Georgian war over South
to pReseRve the open Ossetia; the ongoing hostilities in Iraq,
inteRnet, says Ronald Afghanistan, and Somalia; and domes- RobeRt gRant aRgues
deibeRt, we Must stop tic hostilities in Burma, Tibet, Pakistan, foR tReating high-Risk
the cybeR aRMs Race. populations befoRe they
and, most recently, Thailand (among
have been exposed.
numerous other places). Be it through
I
t has become fashionable these days kinetic strikes on the infrastructure of
P
to express skepticism about “cyber information and communications tech- reventing HIV transmission is not
war”—and for good reason. The concept nology, missile attacks targeted with easy, even though most people know
is ill defined; it has been used to describe the aid of cellular geolocation, espio- how the virus is spread and are aware
everything from defacing websites to nage that makes fraudulent use of social that condoms can offer protection (see
attacking critical infrastructure to com- networks, or privateering that disables “Can AIDS Be Cured?” p. 44). An HIV vac-
mitting espionage over computer net- key computer networks at critical times, cine remains elusive: although a recent
works. More troubling is that many of warfare has taken on this dimension trial suggested some success in low-risk
the heralds of cyber war have a commer- because cyberspace is the strategic com- populations, the level of protection was
cial stake in the cyber security market. munications environment in which we not high enough, or certain enough, to
Some may have more ulterior motives all live. justify introducing the vaccine. The
for ramping up fears, such as a desire to Although invoking fears of an elec- first generation of topical microbicides,
fan the flames of Sino-American rivalry tronic Pearl Harbor may be overheated designed to allow women to protect
or to diminish privacy on the Internet. rhetoric, an arms race in cyberspace themselves if their partners refuse to use
But a troubling shift toward censor- creates an environment in which crime, condoms, was not effective in clinical
ship, surveillance, and—yes—militariza- espionage, malware, denial of service, trials. Male circumcision has been the
tion in cyberspace is very real. Internet filtering, and surveillance prosper and only clear success: three trials in Africa
N i c k R e d dyh o f f
filtering is increasingly accepted world- thrive. In the rush to reject alarmism showed that it partially protected hetero-
wide, companies have imposed about cyber war, we should not lose sight sexual men. We still need new protective
heavy-handed copyright controls, and of the very real geopolitical conflict that strategies for women and men who have
12 notebooks t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
NuVasive Inc.
FEI Company
Case Western Reserve University
Biogen Idec Foundation
LifeStraw®
Microsoft
Draper Laboratory
DISCOVERYCIUM
TITANIUM
Black Engineer
of the Year Awards
STEM Global Competitiveness
Conference
Bechtel Corporation
SpaceX
National Radio Astronomy Observatory
SciVee
Research in Motion
SchoolTube
Thirty Meter Telescope Project
by the pandemic.
Photovoltaics
Come of Age
Anti-HIV drugs are known to help pre-
vent transmission from infected moth-
ers to infants, which has become rare in solaR panels aRe cheap
parts of the world where the drugs are enough to becoMe a
widely available. Postexposure prophy- MajoR coMponent of
gReen eneRgy, aRgues
laxis is recommended by the Centers
ken zweibel.
for Disease Control: a 28-day course of
antiretroviral medication after exposure
T
is thought to prevent transmission about he United States has supported
80 percent of the time. But this treatment research into photovoltaics for
can’t be administered unless people rec- almost 40 years, recently with a 30 the country’s energy to come from solar
ognize when they have been exposed. percent investment tax credit. Japan power. Soon, the department will pub-
Targeting preventive treatment even instituted incentives in the 1990s, when lish a new “solar vision” examining the
before exposure is one solution. Clini- photovoltaics cost at least five times as potential for a plan incorporating 10 per-
cal trials being conducted in the United much as residential electricity. In the new cent solar photovoltaics, 10 percent solar
States, Africa, Asia, and Latin America millennium, Germany instituted incen- thermal, and 10 percent wind by the same
are evaluating whether daily oral use of tives an order of magnitude larger. year. Meanwhile, further DOE work will
antiretroviral agents in high-risk groups Thanks to these efforts, the cost of look at a goal of deriving 80 percent of
can help prevent transmission. The drugs photovoltaic modules has dropped 40 our energy from renewable sources in
selected for evaluation are generally well percent in the last 18 months. Photovol- 2050. The European Climate Founda-
tolerated, last a long time in the body taic electricity now costs about 15 cents tion has released a study with McKinsey
(allowing for once-a-day dosing and per kilowatt-hour in the best sunlight. showing that renewables could produce
some forgiveness for missed doses), and That’s only twice the cost of wholesale 100 percent of European electricity by
have shown protection in animal models. electricity and wind. Costs are expected that date. The reports maintain that
While preëxposure prophylactic treat- to continue decreasing, and electricity reaching these targets will have minimal
ment seems costly, high-quality generic is worth more during the daytime than impact on electricity prices.
formulations are widely available at low at night. That means this technology is The ingredients for a fully green solu-
cost. Another possible objection is that finally cheap enough to become a signifi- tion to climate change and oil depen-
being able to take a pill a day for HIV cant element in plans to combat climate dence are in our grasp. They include
prevention might cause people to stop change and oil dependence (see “Solar’s electricity from wind and solar photo-
using condoms or to have sex with more Great Leap Forward,” p. 52). voltaics; electric vehicles to get us off
partners. But I believe it could make pre- The advantages of solar panels are clear. gasoline; smart grid and transmission
vention services attractive to people who They need no fuel or water, and sun- technologies to distribute solar and
would otherwise deny their risk. Perhaps light is nearly limitless. With 100 times wind power and to balance supply with
by serving as a daily reminder of that risk, the energy potential of wind, sunlight is demand; and domestic natural gas to fill
it could even inspire people to take more sufficient to meet all our energy needs. in the gaps. We don’t have to turn Earth’s
steps to protect themselves. Photovoltaic panels are also unique for crust into a carbon-sequestration experi-
The global spread of HIV will be their long, low-cost operating life—now ment, increase our risks with nuclear, or
stopped only if people demand highly 30 to 40 years, someday perhaps 100. And convert arable land to energy farming.
effective prevention tools and if those unlike energy sources that require a con- We are on track to deploy safe, renewable
tools become available. History shows stant input of fuel, photovoltaic electricity technologies to stabilize the price of oil
that neither will happen easily. Arming is almost free once its initial capital cost is and dial down carbon dioxide emissions
people in their struggle against HIV can recovered. as much as we want. Confirming photo-
only help. In 2008, when the U.S. Department voltaics’ place among these technologies
of Energy drafted a report looking at the is a big step in the right direction.
RobeRt gRant is an investigatoR at the glad- potential for “20 percent wind energy by
stone institutes at the univeRsity of califoR- ken zweibel is diRectoR of the gw solaR in-
nia, san fRancisco. 2030,” the plan called for only 5 percent of stitute at geoRge washington univeRsity.
14 notebooks t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
r o B ot i C s
DroP that
DoUghNUt!
aUtoM is an automated
coach designed to help
people stick to a diet and
exercise routine. each day,
users check in by using a
touch screen to enter infor-
mation about such things
as what they have eaten and
how much exercise they
have done. the robot pro-
vides personalized feedback
through synthesized speech
and facial expressions. the
company claims that people
make better progress than
they would if they followed
the same weight-loss pro-
gram using a computer or
paper log.
c h r i sto p h e r hArti n g
w w w . t e ch n o l o g y r e v i e w . c o M to market 17
sUMMer FUn
teChNology
For the great
oUtDoorS Stay Cool
the hAndy cooler is a personal
air conditioner that uses an evapora-
tive cooling system to generate a
flow of air as much as about 15 °c
below the ambient temperature.
Stay Powered
usB-enABled devices (or two AA
batteries) can be recharged with
this solar charger, which features
thin, lightweight, flexible solar cells.
18 to market t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
Stay Connected
the phs300s portable hotspot lets more people
bring their laptops on vacation: plug in a cellular
modem to connect to sprint’s 3g or 4g network, and
the connection can be shared among users over wi-fi.
w w w . t e ch n o l o g y r e v i e w . c o M to market 19
seCUrity
Bomb
Detector
the Acro explosives testers
are a set of disposable pen-size
devices capable of detect-
ing mere micrograms of most
common explosives—including
peroxide-based explosives,
which are typically hard to
detect and can be made from
household ingredients. the bot-
tom of the cap is touched to a B ioM e DiCaL
suspicious object or person and
then screwed back onto the ZaPPiNg aSthma
pen. plungers at the other end
are then depressed in sequence PatIeNts Who have asthma that is not controlled by drugs may benefit from the
to release reagents. An enzy- U.s. Food and Drug administration’s approval of the alair medical device. It
matic reaction produces a color
uses a catheter with an expanding tip made of four electrodes. Inserted in a lung
change if an explosive is present.
passageway by a medical professional, these electrodes deliver radio-frequency
W Product: Acro explosives testers energy, destroying some of the smooth muscle tissue responsible for restricting
Cost: up to $19 Availability: now
Source: www.1stdefensegroup.com
the flow of air during an asthma attack.
Company: Acro security technologies
W Product: Alair Bronchial thermoplasty system Cost: not available Availability: now Source: www.btforasthma.com
Company: Asthmatx
LigHting
greeN light
LIght-eMIttINg diodes make for
bright and long-lasting light sources, but
c o u rte sy o f Asth MAtX (Asth MA); c h r i sto p h e r hArti n g (d ete cto r); p h i li p s (li g ht)
they’re not used for general illumination
because they don’t easily provide bright
white light. that may start to change
with the 12-watt enduraLeD, a replace-
ment for a 60-watt incandescent bulb.
It uses a phosphor film placed a short
distance from a high-efficiency array of
blue LeDs : the film glows yellow, and
the combination yields white light. the
LeD draws less power than an incandes-
cent and lasts a full 25,000 hours. But the
price tag—$60—may leave many people
reluctant to change their light bulbs.
20 t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
1
Planned AMD Opteron™ processor Model 4122 1ku pricing at time of introduction
©2010 Advanced Micro Devices, Inc. All rights reserved. AMD, the AMD Arrow logo,
Opteron, and combinations thereof are trademarks of Advanced Micro Devices, Inc. 48522A
e n e r gy
Smarter
Charger
Most chargers con-
sensors
tinue to consume
power even when Harvesting Heat
they are not in use,
the te-power node uses any
but the Zero charger source of thermal energy to drive a
eliminates this waste wireless transceiver, storing power in
by turning itself off. a thin-film battery. the node is a test
Intended primarily for bed for designers looking to build the
next generation of sensor networks,
use with cell phones, in which the sensors power them-
the Zero uses a UsB selves by harvesting energy from the
port to deliver electric- environment. the battery stores the
ity and can sense when power that trickles in from sources
such as a warm industrial exhaust
no device is attached. If pipe and then releases the accu-
that happens, it stops mulated energy in a pulse powerful
drawing power from enough to operate the radio. A 10 °c
the wall socket. difference in temperature produces
enough electricity to transmit 13
bytes of information per second.
W Product: Zero charger
Cost: Around $40
Availability: summer 2010 W Product: te-power node Cost: $637
Source: www.wireless.att.com Availability: now Source: www.micropelt.com
Company: At&t Companies: Micropelt, stMicroelectronics
t r a n s p o r tat i o n
eleCtriC
Delivery
the estar was designed from the
chassis up as an electric vehicle for
use in cities. Intended to replace c o u rte sy o f At&t (c hAr g e r); M i c r o p e lt (n o d e); nAvi stAr (tr u c k)
22 to market t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
Unprecedented price per core.1 The AMD OpteronTM 6000 Series platform.
It’s more than a server platform. It’s an investment in your future. The AMD OpteronTM 6100 Series processor can give
you up to twice the performance of our previous generation.2 And double the cores at the same price.3 The AMD
Opteron 6000 Series platform delivers as many as 48 total cores in up to a 4-processor configuration at significantly
lower prices per core.1 It gives you the real world performance you need, on a consistent architecture that enables
scalability for today and tomorrow. It’s the platform to build your business on.
Learn more at amd.com/6000value1
1Based on planned 1ku pricing for AMD Opteron™ processor Model 6128 at launch ($266 ÷ 8 cores = $33/core). 2Internal testing at AMD performance
labs as of 2/17/10 showed a 2.13x performance gain (estimate) for 2x AMD Opteron processor Model 6172 (“Magny-Cours”) over 2x Six-Core AMD
Opteron processor Model 2435 (“Istanbul”) running SPECfp®-rate2006. Configuration: “Dinar” reference design, 64GB (16 x 4GB DDR3-1333)
memory, 250GB SATA disk drive, SUSE Linux® Enterprise Server 10 SP2 64-bit; Supermicro A+ Server 1021M-UR+B server, 32GB (8 x 4GB DDR2-800)
memory, 20GB SATA disk drive, Red Hat Enterprise Linux® Server 5.3 64-bit. 3Based on comparison of Six-Core AMD Opteron processor Model
2435 (6 cores; $989 suggested 1ku price) vs. AMD Opteron processor Model 6172 (12 cores; $989 planned 1ku price at launch).
© 2010 Advanced Micro Devices, Inc. All rights reserved. AMD, the AMD Arrow logo, AMD Opteron, and combinations thereof, are trademarks of
Advanced Micro Devices, Inc. Other names are for informational purposes only and may be trademarks for their respective owners.
Egypt Tunisia
Uzbekistan Sri Lanka
Indonesia Dominican Republic
INDIA Nicaragua
With its poor infrastructure,
India may have little choice
but wireless broadband. Belize
24 GRAPHITI T E CH N O L O G Y R E V I E W J U L Y /A U G U S T 2010
Speed (Mb/sec.)
JAPAN
A ubiquitous fiber network SOUTH KOREA
delivers 100-megabit- Continuing its long-term
per-second connections broadband strategy, Korea 30
directly to many homes. Korea plans to make speeds 10
times faster by 2012.
Latvia Sweden
Lithuania Netherlands
SWEDEN
20
Bulgaria Large public investment
RUSSIA Hong
ova Japan has meant that Swedes
Russia’s disjointed tele- Romania Kong
haven’t had to sacrifice
communications industry Finland speed for wide availability.
delivers service only to the Portugal Germany France
lucky few.
Estonia Switzerland
Austria Denmark
Hungary Iceland
Belgium
Ukraine Czech Republic 10
United States Norway
Russian 9
Poland Singapore Luxembourg
Federation
UNITED STATES
8
Slovenia While fast, cheap
connections are 7
Greece Australia available in many
New Zealand cities, reaching rural
U.K. Canada 6
United Arab Emirates areas will take time
Ireland
Macedonia and money.
Spain Malta 5
Saudi Arabia Turkey
Trinidad and Tobago Croatia Italy
Chile
Belarus Montenegro 4
Brazil Israel
Cyprus
Qatar Macao
3
Jamaica
Bahrain
China
Mexico
BARBADOS 2
Argentina
Wireless
broadband is
now available Barbados
islandwide.
Panama CHINA
Low penetration still means
100 million subscribers
in China, a number set to
Malaysia double by 2014.
Serbia
1
Uruguay 0.9
Venezuela 0.8
BROADBAND SUBSCRIBERS
COST 0.7
Cost as % of income Number of broadband
subscribers
Less than 0.50% 0.6
Lebanon
0.50 to 1.00%
80 0.5
1.00% to 1.99%
2.00% to 4.99% 40
5.00% to 9.99% 20 0.4
10.00% to 24.99% 10
25.00% or more 1
0.3
4 5 6 7 8 9 10 20 30 40 50 60 70 80 90
W W W . T E CH N O L O G Y R E V I E W . C O M GRAPHITI 25
26 q &a Photograph by G re G G S e G AL
w w w . t e ch n o l o g y r e v i e w . c o m photo ess ay 29
32 t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
w w w . t e ch n o l o g y r e v i e w . c o m photo ess ay 35
E
ugene Kaspersky, CEO of the Russian antivirus company ery faster, and attacks growing in number and financial impact
Kaspersky Lab, admits it crossed his mind last year that (see “The Rise in Global Cyber Threats,” p. 43). Security experts and
he might die in a plane crash caused by a cyber attack. attackers are locked in a kind of arms race. In Kaspersky’s case, his
Kaspersky is a man of eclectic tastes and boyish humor; engineers and cryptographers do everything from seeking faster
when we met in his office on the outskirts of Moscow, he was automated virus-detection methods to trolling Russian-language
munching a snack of sweetened, freeze-dried whole baby crabs hacker blogs for clues about what’s coming.
from Japan, and at one point he showed me a pair of men’s under- Ingenious solutions are multiplying, but the attacks are mul-
garments, bought on a Moscow street, that had been stamped “Pro- tiplying faster still. And this year’s revelations of China-based
tected by Kaspersky Anti-Virus.” But he grew quite serious when attacks against corporate and political targets, including Google
the subject turned to the days leading up to April 1, 2009. and the Dalai Lama, suggest that sophisticated electronic espio-
That was the date a virulent computer worm called Conficker nage is expanding as well. “What we’ve been seeing, over the last
was expected to receive an update from its unknown creator—but decade or so, is that Moore’s Law is working more for the bad guys
nobody knew to what end. A tweak to Conficker’s code might than the good guys,” says Stewart Baker, the former general coun-
cause the three million or so machines in its army of enslaved sel of the National Security Agency and a former policy chief at the
computers, called a botnet, to start attacking the servers of some U.S. Department of Homeland Security, referring to the predic-
company or government network, vomit out billions of pieces of tion that integrated circuits will double in transistor capacity about
spam, or just improve the worm’s own ability to propagate. “It’s every two years. “It’s really ‘Moore’s outlaws’ who are winning this
like if you have a one million army of real soldiers. What can you fight. Code is more complex, and that means more opportunity to
do?” Kaspersky asked rhetorically. “Anything you want.” He let that exploit the code. There is more money to be made in exploiting
sink in for a moment. “We were waiting for April 1—for something. the code, and that means there are more and more sophisticated
I checked my travel schedule to make sure I didn’t have any flight. people looking to exploit vulnerabilities. If you look at things like
We had no idea about this functionality. Security officials were malware found, or attacks, or the size of the haul people are pull-
really nervous.” In the end? “Nothing happened. Whew! Whew!” ing in, there is an exponential increase.”
Kaspersky cried out. He crossed himself, clasped his hands in a As these low-grade conflicts continue, the threat of outright
prayerlike pose, and gazed toward the ceiling. cyber war is rising, too. More than 100 nations have developed
The unknowns about Conficker in the spring of 2009 (the organizations for conducting cyber espionage, according to the
infection remains widespread but, so far, inactive) reflect larger FBI, and at least five nations—the United States, Russia, China,
unknowns about just how bad cyber security will get (see Brief- Israel, and France—are developing actual cyber weapons, accord-
ing, p. 59). The trends aren’t promising: tour Kaspersky’s labs—or ing to a November 2009 report by the computer security company
those of any computer security company or research outpost—and McAfee. (In May the U.S. Senate confirmed the director of the
you quickly learn that malware is tougher to detect, spam deliv- National Security Agency, General Keith Alexander, as head of the
w w w . t e ch n o l o g y r e v i e w . c o m feature story 37
episodes—an exceptional botnet investigation in Holland, a probe the FBI got a tip about the Dutchman and passed it to the high-
of China-based espionage in India and other nations, and the 2007 tech unit of the Dutch National Police, who arrested him. Then,
Internet attacks on the small Baltic state of Estonia—to glean les- in an unusual touch, the Dutch investigators sought the help of
sons in how to better police and secure the flawed cyberspace we’ve antivirus companies to craft instructions for erasing the infection
got, and prepare for the cyber war we hope will never come. from victims’ computers and to take over the botnet’s command-
find cyber penetrations if ISPs to retaliate by blocking traffic. It’s much cheaper to provide
the extra bandwidth than to actually deal with the problem, says
they look. … Today, the Michel van Eeten, a technology policy professor at Holland’s Delft
attacker has the advantage University of Technology, who studies botnets. He describes the
and is innovating faster plan when it realized that 40,000 confused and angry customers
than defenders.”
would be dialing in to customer support lines every month, won-
dering why they got cut off and how to cleanse their machines.
“ISPs typically take care of the bots that trigger countermeasures
against the ISP itself,” van Eeten says, “but not too many more,
no reply. A few days later, however, he noticed the appearance of a because of the cost impact of scaling up such an effort.”
kind of botnet fig leaf: the malicious sites’ Web addresses now led to As for the Dutch case, it revealed that even successful investiga-
phony e-commerce home pages. In March, the computer security tions are tough to prosecute. Today Nasiri is awaiting trial in Hol-
firm Symantec said that Grum was responsible for 24 percent of all land on Dutch charges. But a Brazilian man originally charged along
spam on the Internet, up from 9 percent at the end of 2009. with him escaped trial. The U.S. indictment had alleged that the
Steephost’s owners, who could not be reached for comment, Brazilian orchestrated the receipt of 23,000 euros from a buyer and
had little to worry about in thumbing their noses at the likes of arranged to receive electronic media from Nasiri containing the bot
Lanstein. Botnets operate freely across national borders, and law code. It seemed he’d been caught red-handed. Last year, however,
enforcement lags far behind. A treaty that seeks to boost inves- the United States dropped the charges, citing the unavailability of
tigative coöperation, the European Convention on Cybercrime, a key witness. The Dutch police say they escorted him to Amster-
has been signed by 46 countries—mostly in Europe, but includ- dam’s Schiphol airport and he jetted back to Brazil, a free man.
ing the United States, Canada, South Africa, and Japan. But it has
not been signed by China, Russia, or Brazil, which (along with the ESpionaGE
United States) jockey for leadership as the world’s major hosts of In 1959 the Tibetan spiritual leader, the Dalai Lama, fled to Dharam-
cyber attacks. Some signatories, such as Ukraine, are not known sala, a scenic town in the Himalayan foothills of northern India that
for enthusiastic efforts to stop botnets. And attempts to craft a is still home to Tibet’s exiled government. There, a local café called
global version have stalled (see “Global Gridlock on Cyber Crime,” Common Ground also serves as a nongovernmental organization
w w w . t e ch n o l o g y r e v i e w . c o m feature story 39
blog.com
groups.google.com hi.baidu.com
blogspot.com twitter.com
Canada
United Kingdom Russian
Uzbekistan Federation
Denmark
United States Belarus Pakistan Nepal Japan
China
Iran S. Korea
Qatar Taiwan
14
1
Compromised computers Source: Information Warfare Monitor
PCs per country, 139 total and Shadowserver Foundation
that tries to bridge the gap between Chinese and Tibetan cultures. establishment; the compromised data included personal, finan-
But in 2009, a computer scientist visiting the café discovered a cial, and business information belonging to Tibetans, Indians,
bridge of a different sort: an electronic spy pipeline. The researcher, and human-rights figures around the world (see “Espionage in the
Greg Walton, noticed that computers in the town’s Wi-Fi mesh Cloud,” above). The discovery came before China-based attacks
network, called TennorNet, were “beaconing” to a command-and- against Google and other Western companies prompted Google
aLL C harts by tO M My McCaLL
control server in Chongqing, China. to pull out of China (see “China’s Internet Paradox,” May/June 2010
The scope of the espionage extended far beyond the café. and at technologyreview.com). “We lack good metrics to figure out
According to researchers from the Ottawa cyber forensics com- how big the espionage problem is, but it seems clear that it’s getting
pany SecDev Group (including Walton) and the University of a lot worse—and fast,” says Paxson. “Google China was a wake-up
Toronto, victims included agencies of the Indian national security call, and there’s a lot more of it out there.”
w w w . t e ch n o l o g y r e v i e w . c o M feature story 41
D I M ITAR D I LKO F F/AF P/G ETTy I MAG E s; RAI G O PA J U LA/AF P/G ETTy I MAG E s
this problem. Research groups at Georgia Tech, the University of
California, San Diego, the University of Washington, and other Cyber Summit
institutions are working on ways to establish the provenance of On a crisp April morning this year, more than 140 diplomats, policy
data. In an approach being developed by researchers at San Diego makers, and computer scientists arrived in the mountain town of
and the University of Washington, the identity of the original com- Garmisch-Partenkirchen, Germany. Their host was the Russian
puter that issued a packet of data would stay attached to that data, Interior Ministry. The topic of the conference that brought them
in encrypted form. The digital “key” to this identity would be held there: how to secure the “information sphere,” as the Russians put
by a trusted third party—perhaps accessible only by court order. it. But this meant different things to people from different coun-
“All the instruments of national power, ranging from diplomatic tries. Painter, the White House aide, emphasized fighting cyber
to military force to economic influence, are pretty worthless if
you can’t attribute who mounted an attack,” says Stefan Savage,
www Watch a video about worsening security and the risk of cyber war:
a computer scientist at the University of California, San Diego, technologyreview.com/cybersecurity
who is developing the technology. But while the technology can
Source: Symantec (malicious code); Akamai State of the Internet report for 4th quarter 2009 (global sources); 2009 Com-
ASecurity
puter look at one botnet,
Institute survey of called Grum, shows
443 U.S. businesses, how
government much
agencies, and other organizations (types of attacks).
damage it can cause.
w w w . t e ch n o l o g y r e v i e w . c o M feature story 43
I
n an aging research building at the University of South-
ern California, a $14.5 million biomedical experiment is
under way that until a few years ago would have made many
AIDS researchers snicker at its ambition. Mice are the main
research subjects (for now), and some 300 of them live in a room
the size of a large walk-in closet. Signs plastered to the room’s outer
door include blaze-orange international biohazard symbols and a cells, making ordinary mice worthless as disease models. Human
blunter warning that says, “This Room Contains: HIV-1 Infected immune-system stem cells are transplanted into pups bred from
Animals.” Yet the hazard is accompanied by an astonishing hope. these mice when they are two days old, and over the next few
In some of the infected mice, the virus appears to have declined to months, those cells mature and diversify into a working immune
such low levels that the animals need no further treatment. system. Then the mice are infected with HIV, which attacks the
This is a feat that medications have not accomplished in a immune cells. But before transplanting the original human cells,
single human, although daily doses of powerful anti-HIV drugs the researchers introduce an enzyme that interferes with the gene
known as antiretrovirals can now control the virus and stave off for a protein the virus needs to stage the attack. This modification
AIDS for decades. Every person who stops taking the drugs sees makes a small percentage of the mature immune cells highly resis-
levels of HIV skyrocket within weeks, and immune destruction tant to HIV, and because the virus kills the cells it can infect, the
follows inexorably. The lack of a cure—a way to eliminate HIV modified cells are the only ones that survive over time. Thus, the
from an infected person or render it harmless—remains an intrac- HIV soon runs out of targets. If this strategy works, the virus will
table and perplexing problem. quickly become harmless and the mice will effectively be cured.
“This doesn’t look like a multimillion-dollar operation at all, does Results from the mouse experiments are encouraging so far,
it?” jokes Paula Cannon, a lead researcher on the project, as she and Cannon hopes they will lay the groundwork to begin human
enters the ill-smelling room, which has shelves lined with mice studies soon. “I want to cure AIDS by my 50th birthday,” she says;
living together in plastic cages that resemble large shoeboxes. As she is now 47. And though she says she is only half serious, her
she leads a tour of the cramped space, Cannon wears a face mask, ambition is clear: “I’m looking for a home run.”
a hairnet, a gown over her clothes, latex gloves, and cloth shoe In the HIV research community, “cure” has long been consid-
coverings over her stylish heeled boots. She takes these precau- ered the dirtiest of four-letter words: over the years, various prom-
tions not to protect herself but to ensure that she won’t transmit a ising approaches have failed, leaving overhyped headlines, crushed
dangerous infection to this colony of mice—which is worth some- hopes, and dispirited scientists in their wake. HIV simply excels
where around $100,000. at dodging attack, both by mutating and by lying low in a latent, or
The experiment costs so much in part because Cannon and her inactive, form in which it still remains viable. In such a dormant
team had to purchase mice bred to have no immune systems of state the virus can survive for decades, completely untouched
their own; the AIDS virus normally cannot copy itself in mouse by the drugs now on the market. Any attempt to flush this latent
w w w . t e ch n o l o g y r e v i e w . c o m feature story 45
w w w . t e ch n o l o g y r e v i e w . c o m feature story 47
Dna
Flushed out
HIV that hides in resting
immune cells must be awak-
ened before it can be eradi-
cated. In the general scheme
Histone
for accomplishing this, the
HIV is activated by opening
the tightly coiled viral DNA,
Transcription leading to the production of
factor viral particles. Drugs prevent
the resulting new viruses from
activated
infected T cell
infecting healthy cells, and
the HIV is eventually flushed
out of the body. In a variation
that Paula Cannon is testing
in mice, T cells are modified to
resist HIV, denying the virus
new targets if resting infected
cells become active.
acetylation
Protected
healthy cell
w w w . t e ch n o l o g y r e v i e w . c o m feature story 49
of viruses. It’s a Herculean task ple off drugs and pray the virus doesn’t come back?” asks Hazuda.
identify the location of the latent reservoirs and to flush the virus TesTing HoPe
out of them and into the bloodstream, so the drugs can do their There is no cure for polio, hepatitis B, measles, chicken pox, influ-
work. Researchers know that one place the latent virus hides is enza, and a long list of other viruses. Though the immune system
in resting CD4 cells, but Siliciano has published molecular evi- and drugs can ultimately defeat many viruses, they are notori-
dence that this cannot be the only reservoir. one recent report ously difficult to stop before they cause damage—especially a virus
from scientists at the University of Michigan suggests that inac- that integrates itself into chromosomes and can lie dormant for
tive HIV can lurk in bone-marrow stem cells, and the virus could years. So it’s no surprise that a cure still sounds far-fetched to many
also be in the brain, gut, and lymph nodes. Checking for HIV in experts. Progress, if it occurs, will probably move in fits and starts,
any of these tissues is much more difficult than analyzing a blood especially given the frequent disconnect between what happens
sample, so it won’t be easy to determine how effective a therapy in lab experiments and in humans. But the astonishing success of
has been at wiping it out. the Berlin transplant suggests that it’s possible, and the limitations
Regardless of where latent HIV is, the virus must be awak- of the best available drugs show that it’s necessary.
ened before drugs can target it. In the late 1990s, David Ho and a If Paula Cannon and collaborators at the City of Hope National
few other research groups made a crude attempt to do this. They Medical Center in Duarte, CA, receive a green light from the U.S.
explored the idea of prodding resting CD4 cells to “activate” and Food and Drug Administration, they plan to begin testing their
start making copies of themselves; in the process, those latent cells gene therapy in a small number of HIV-infected adults who, like
that harbored HIV would transcribe their viral DNA and then the Berlin patient, need ablation and a bone-marrow transplant
die. Ho’s group treated one patient with a monoclonal antibody to treat cancer—in this case, a B-cell lymphoma. The subjects’ own
that triggers activation. “He got pretty sick, and we just stopped stem cells will be modified with the zinc finger nucleases that dis-
it,” Ho remembers. “It was too scary.” A similar attempt almost rupt the gene for the CCR5 receptor. The protocol will be extremely
killed another patient. “For the past decade, it’s just been thought conservative. The patients’ stem cells will be harvested four times,
of as way too high risk,” says Daria Hazuda, who does HIV drug and as an insurance policy, the researchers will keep the first batch—
discovery at Merck Research laboratories. the best ones—in reserve, untouched, in case something happens
But safer methods of rousing latently infected cells could now to the genetically engineered cells. Cannon also plans to stitch the
be within reach. “In the last 10 years, there have been enormous zinc finger nuclease into an adenovirus to mimic a technique that
new insights into transcriptional control mechanisms of HIV,” has already received approval in Carl june’s studies.
says jonathan Karn, who studies HIV gene expression at Case Cannon is confident that the human studies will prove the mer-
Western Reserve University in Cleveland. “That’s been feeding its of the idea, even if it’s only on a modest scale at first. “our little
indirectly into understanding latency and how you silence the piece of the puzzle is that we’re trying to get zinc finger nucle-
virus and how it becomes reactivated.” ases to work in stem cells and not do any harm,” she says. If her
Hazuda is now collaborating with Karn, Margolis, Richman, research group can crack open the door, she predicts, colleagues
and other academic researchers to seek new drugs that can flush will come rushing in to help find more effective, safer, cheaper
latent reservoirs. She’s scouring Merck’s shelves for promising ways to functionally cure HIV-infected people of all ages every-
experimental compounds as well as drugs that have already made where. “There’s nothing like success to galvanize the community,”
it to market for other diseases. And she expects more companies she says. “If we can produce a one-shot treatment that basically
to join in soon, partly because testing methods have lately made means people don’t have to take antiretrovirals, it’s going to spread
great strides. Powerful new drug screening assays have been intro- like wildfire.”
duced, and novel monkey and mouse models are available. New
Jon cohen, a corresPondent with Science, has written For the new
techniques in genomics and systems biology may also reveal bio- Yorker, the AtlAntic MonthlY, And the new York tiMeS MAgAzine. he is the
author oF ShotS in the dArk: the wAYwArd SeArch for An AidS VAccine. his
markers that allow researchers to gauge whether potential drugs latest Book, AlMoSt chiMpAnzee, coMes out in sePteMBer.
w w w . t e ch n o l o g y r e v i e w . c o m feature story 51
T
eight-megawatt solar farm
in Alamosa, CO.
o see the future of solar power, take an hour-long train ride
inland from Shanghai and then a horn-blaring cab trek
through the smog of Wuxi, a fast-growing Chinese city of
five million. After winding through an industrial park, you
will arrive at the front door of Suntech Power, a company that in
the few years since its founding has become the world’s largest
maker of crystalline-silicon solar panels.
Solar panels cover the entire front face of the sprawling eight-
story headquarters. nearly 2,600 two-meter-long panels form
the largest grid-connected solar façade in the world. Together
with an array of 1,800 smaller panels on the roof, it can generate
a megawatt of power on a sunny day. it’s expected to produce over
a million kilowatt-hours of electricity in a year—enough for more
than 300 people in China.
in 2001, when Suntech was founded, all the solar-panel factories
in China operating at full capacity would have taken six months
to build enough panels for such a massive array. Suntech’s first
factory, which opened in 2002, cut that time to a little more than
a month. Today, the company can make that many panels in less
than one 12-hour shift. By the end of this year, the workers could be
done by lunchtime. Suntech’s production capacity has increased
from 10 megawatts a year in 2002 to well over 1,000 megawatts
today. Chinese solar manufacturing as a whole has increased its
capacity from two megawatts in 2001 to over 4,000 megawatts.
That rapid growth, fueled by relentless cost cutting, has allowed
Chinese manufacturers to overtake those in the united States,
Japan, and Germany in less than a decade to become the biggest
source of solar panels in the world. Worldwide, Chinese solar panels
accounted for about half of total shipments in 2009. And that share
is expected to grow this year. Of the 10 largest solar-panel manufac-
turers, half are based in China. in 2007, u.S. manufacturers supplied
43 percent of the panels for a solar rebate program in California. The
rest came almost exclusively from Japan and Germany; only 2 per-
cent came from China. now Chinese companies supply 42 percent
of the panels, and the u.S. share has dropped to 15 percent.
in 2004, it cost about $3.20 per watt, on average, to make sili-
con solar panels. By now, according to solar-industry analysts at
Photon Consulting in Boston, a Chinese manufacturer can make
them for as little as $1.28 per watt, while the lowest-cost Western
manufacturer will produce comparable technology for about $2.00
per watt. not only has this cost advantage made Chinese manu-
facturers dominant in the industry, but it’s also helped redefine the
prospects for solar power, pushing it closer to what insiders call
“grid parity”—the point where it is just as cheap as electricity on the
power grid, most of which is generated with fossil fuels. “in about
five years’ time, we should be able to reach grid parity in at least 30
to 50 percent of the global market,” says Zhengrong Shi, Suntech’s
b r ian bai ley
founder and CEO, speaking from his spacious office looking out
over the back of his company’s massive solar façade.
w w w . t e ch n o l o g y r e v i e w . c o m feature story 53
King of Solar” (Fortune) are arranged carefully around his spacious new South Wales, who was famous for inventing an approach to
w w w . t e ch n o l o g y r e v i e w . c o m feature story 55
facture solar cells nearly twice as powerful as the ones that rolled
Source: Photon Consulting
off the line of his first factory. Green had been making them for *For the lowest-cost manufacturers in each country
years in his lab. If you alter the electronic properties of the very
highest-grade silicon wafers in precise patterns and then trace
extremely fine electrical contacts on their front and back surfaces The University of New South Wales had been trying unsuc-
to extract electronic current, the resulting cells capture much more cessfully to commercialize the technology for 20 years, but Shi
of that current than conventional cells do. The only problem is was determined to find a way. The key was to identify low-cost
that Green’s methods rely on advanced and expensive process- methods of achieving the same effects with readily available,
ing technology borrowed from the semiconductor industry. The commercial-grade silicon. Pointing to its 45 patents and 65 pend-
cells cost about 100 times as much to make as conventional solar ing patents, Suntech claims it has now succeeded, but it’s secretive
cells like the ones Suntech has been producing so far. about the details. Only three employees have seen the whole pro-
w w w . t e ch n o l o g y r e v i e w . c o m feature story 57
W H AT ’ S t h e B U S I N E S S P RO B L E M ?
PROTECTION
PROTECTION
THE ROAD
T:10.5 in
S:10 in
T O O L I T T L E P R OT E C T I O N O N T H E R O A D
the QWEST SOLUTION: No matter where your workers go, risks to your network will
follow. Qwest’s suite of security solutions can help make sure your critical information
is accessible to those who need it on the road, while protecting it from those who don’t.
So your business can safely stay on the go. Solve more problems at qwestsolutions.com.
BriefinG
61 inDuStry ChAllenGeS
62 CASe StuDy
62 poliCy
63 reSeArCh to WAtCh
Computer
64 the BiG piCture
65 oVer the horiZon
66 mArKetWAtCh
67 CompAnieS to WAtCh
SeCurity
Large-scale
cyber attacks
drive new
defenses
w w w . t e ch n o l o g y r e v i e w . c o m briefing 59
N o one is exempt from cyber attack. that often have more functions than users wrap outdated software in a protected ’05
In January, Google admitted that its really need. Security is often an after- layer or make it possible to do business
systems had been breached and intel- thought. But if any one of those functions safely on infected machines. But as long
lectual property stolen; in April, it was has a mistake in design or implementa- as new software is written, new vulnera-
revealed that hackers had stolen military tion, that’s all it takes to give attackers the bilities will keep surfacing. —Erica Naone
documents from India’s government; and opening they need.
stories about the online theft of credit- One widely used attack takes advantage
card numbers and other personal infor- of a vulnerability known as a buffer over- Crime WAVe
mation are constantly streaming in. Why flow. When information sent to a program More money is being lost to
are computer systems so vulnerable? over the network exceeds the space that cyber crooks.
It comes down to how most software the programmer has set aside for incom-
Annual losses of referred complaints Timeline???
is designed, says Andy Ellis, senior direc- ing data, the excess is stored in other parts
tor of information security and chief of the computer’s memory. Forcing this to $560 million 8 million
security architect for Akamai, an Internet happen can change the system’s behavior, 7
infrastructure company based in Cam- even inducing it to execute malicious code.
6
bridge, MA. Companies build systems Attackers also trick users into install-
Bao fan / I mag I n e c h I na/ap; all c harTS By To m my mccall
$575
183
experts say that internal security poli- 2
126
cies are often lax or poorly implemented,
1
The median loss per incident in the giving people ample opportunity to steal
18
cyber crimes reported to U.S. govern- from or sabotage their employers. 0
’01 ’02 ’03 ’04 ’05 ’06 ’07 ’08 ’09 11/08 2009
ment agencies in 2009; e-mail scams There have been some glimmers
were responsible for most reports.
of hope. Many programs now install Source: Internet Crime Complaint Center
60 briefing t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
Akamai’s
Annual operations
losses cen-
of referred complaints Timeline???
ter can monitor attacks,
$560 millionis no defini-
but there 8 million
tive way of gauging how
7
secure the network is.
6
265 4
3
183
INTERPOLATED
2
c o U rTe Sy o f akamaI
126
1
18
0
‘01 ‘02 ‘03 ‘04 ‘05 ‘06 ‘07 ‘08 ‘09 11/08 2009 2010
w w w . t e ch n o l o g y r e v i e w . c o m briefing 61
an open-source framework that tests nesses additional services. But the very the true origin of attacks. Some Euro-
systems for security holes, thus helping openness and easy availability of Metas- pean politicians say that the European
organizations separate threats from mere ploit modules suggest another problem. Union should create a cyber security czar.
vulnerabilities. Metasploit’s research- Rapid7 feared that acquiring Metasploit Other experts think countries should
ers and members of the open-source would cause a backlash from customers just work out agreements one on one.
62 briefing t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
This focused-ion-
beam workstation was
among the tools Chris-
topher Tarnovsky used
to crack a secure chip.
research to watch
Hope in Hardware
Cross-border cyber attacks suspected to
1.8 billion
Network access
44% and encrypt e-mail. Another approach ’02 ’03 ’04 ’05 ’06 ’07 ’08 ’09 ’10
controls
is the Trusted Platform Module (TPM), Source: IDC
Source: Forrester a fingernail-size microchip that can
The number of attacks faced by con- be built into computers. An advantage
gress and government agencies in the
United States every month. of TPM’05 is that ’06
the chips
’07 are already
’08 ’09 the Xbox 360. The modules give each
in many laptop and desktop comput- of these systems an unforgeable serial
ers, as well as in game consoles such as number and a secure place to store digi-
w w w . t e ch n o l o g y r e v i e w . c o m briefing 63
Antispyware 192
software 63% 6.1
Patch 57
briefing: computer
management 44% security
1
Network access ’02 ’03 ’04 ’05 ’06 ’07 ’08 ’09 ’10
controls 44%
Source: Forrester
Planetary
Pestilence
block users
126 from accessing the websites of 2
tal cryptographic keys, which can then be secure—an important step forward, Tarnovsky was able to force a module to
be used instead of passwords. since today’s operating systems are too release its secret information. Such an
Unlike smart cards and USB tokens, complex to be secured completely. Such attack might let someone who had stolen
TPMs can also be used for something a system might make online banking a laptop unlock remote websites or pose
called “remote attestation,” which lets a safer for consumers, for example. And as the laptop’s owner, but fortunately, it
computer prove to another that its last year researchers from the Technical would be impractical to do this on a large
operating system hasn’t been modified University Munich in Germany showed scale. —Simson Garfinkel
by a third party. And since TPMs are how to use the modules with OpenID,
already widely deployed, they represent an authentication protocol increasingly
the best immediate hope for hardware- used by blogs and many of the smaller DAtA Shot
based security. social-networking websites.
Unfortunately, relatively few applica-
tions take advantage of these modules,
but people in both industry and aca-
It takes a significant effort to crack
the chips, as Christopher Tarnovsky, a
former U.S. Army computer security
1988
The year the first major computer worm
c o U rTe Sy o f Team c myr U
demia are looking to change that. For specialist, demonstrated in February. By was released on the Internet. The worm
example, MIT professor Srini Devadas dissolving the chip’s outer casing with crashed systems at universities, hos-
and his students have shown how TPM acid, removing a protective inner mesh pitals, and military facilities. Its creator,
microchips can improve security with- with rust remover, and tapping the com- robert morris, was fined $10,000.
out requiring the operating system to munications channels with tiny needles,
64 briefing t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
least for the computers we use today; it puters, a bit need not be just a 0 or a 1; it such a computer may not be available for
could take thousands of years for even can exist in an infinite number of inter- many years, if ever, it’s important to begin
the most powerful supercomputer to mediate states.) A practical quantum developing and deploying better cryp-
identify the original numbers and crack computer is probably at least decades tography now so it has time to diffuse
an encrypted message. away, but simple demonstrations have throughout cyberspace. —Robert Lemos
w w w . t e ch n o l o g y r e v i e w . c o m briefing 65
Antispyware
software 63% 6.1
Patch
wall, and perhaps an intrusion detection management 44%
system. Today, the growing variety of
Network access
attacks has given rise to nearly 70 differ- controls 44%
ent security niches, including markets for
Source: Forrester Research
firewalls that specifically protect Web- Source: Forrester
10 companies, including the e-mail pro- The labyrinth of modern security cre- for mobile devices is predicted to reach 7
tection firm MessageLabs and the encryp- ates opportunities for companies offer- $4 billion by 2014, according to ABI
6
tion provider PGP. McAfee acquired ing managed security and cloud-based Research. —Robert Lemos
seven companies, including e-mail secu- services. For example, experts from IBM 5
rity firm MX Logic, for $1.1 billion during or SecureWorks will, for a monthly fee, 4
265
the same period. But the market remains monitor a business’s firewall logs, man-
fragmented: last year the top five secu- age intrusion detection systems, block SeCurity
183 ip
3
rity software companies accounted for 47 spam, and protect Web-based applica- 2
many126of the acquisitions being made by
tions from malicious traffic. These kinds
larger security firms are driven by the 1
of services are getting more popular— desire
18 to acquire the intellectual
DAtA Shot especially cloud-based systems, which property‘01of smaller firms. 0
‘02 ‘03 ‘04 ‘05a‘06
good
‘07 ‘08 ‘09 11/08 200
require no on-site hardware. A quarter example is Symantec’s acquisition of
38%
The proportion of businesses surveyed
of firms now outsource their e-mail fil-
tering, and that number could grow to
more than a third this year, according to
Brightmail in 2004: Brightmail owned
three influential patents for e-mail
filtering that have been widely cited by
microsoft, IBm, mcafee, and others. To
Forrester Research.
c o U rTe Sy o f m oTo r o la
66 briefing t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
Akamai Technology: Akamai’s security services are built on top of expand its market by allowing it to sell new products to
Operates a private the software and hardware it uses for its private content existing customers, who work in sectors such as media,
data network delivery network. This network allows owners of high- e-commerce, and financial services. Strategy: The com-
www.akamai.com traffic websites to mirror their content, such as video or pany hopes that the reputation and resources it’s built up
Founded:1998 Web applications, around the world for faster delivery around content delivery will attract customers interested
Management: Paul Sagan
to visitors. Because the company already inspects traf- in trying cloud-based security products—and that they’ll
(CEO), Michael Afergan (CTO)
Employees: 1,750 fic as it passes through the network, adding on-demand eventually decide to purchase its content delivery services
Revenues: $859.8 billion security features for customers is relatively easy. Its Web as well. Challenges and next steps: Akamai foresees diffi-
R&D: $43.7 million application firewall, for example, can stop malicious culties integrating disparate services when customers use
Market cap: $6.9 billion
attacks before they reach the customer’s infrastructure. multiple security vendors. It plans to continue expanding
Market: Akamai expects that its security features will its own range of in-house services.
Amazon Technology: Aside from its large presence as an online company also offers its services to large organizations.
Sells cloud-based storage retailer, Amazon is a provider of cloud computing services Strategy: Amazon uses its cloud services to power and
and processing that offer on-demand storage and processing along with secure its own storefront, making the retail site a strong
www.amazon.com basic security. The company protects customers’ data by advertisement for its cloud services. The company plans
Founded:1994 maintaining backups, physically preventing unauthor- to offer more elaborate services built on top of its basic
Management: Jeffrey Bezos
ized access to data centers, and stopping data from being processing and storage offerings. Challenges and next
(CEO), Andrew R. Jassy
(senior vice president, Amazon intercepted as it travels through Amazon’s infrastructure. steps: Since security is a top concern for businesses reluc-
Web Services) Market: Amazon Web Services is best known for its appeal tant to move into the cloud (see “Security in the Ether,” Jan-
Employees: 24,300 to startups and small businesses, since it allows them to uary/February 2010 and at technologyreview.com), Amazon
Revenues: $24.5 billion
R&D: $1.2 billion avoid many of the capital costs involved in building infra- must maintain the perception that it’s able to safeguard its
Market cap: $55.9 billion structure for things like hosting Web applications. But the customers’ data.
EMC Technology: RSA is EMC’s security division. Its core tech- tion, which allow its customers to verify transactions and
Owns a critical nology is the RSA algorithm, which is used worldwide to communications that occur online. Strategy: RSA’s parent
encryption technology encrypt sensitive information sent over the Internet. It company, EMC, is eyeing the growing importance of cloud
www.rsa.com uses a technique in which two parties who wish to com- computing services and developing its own offerings in
Founded: 1979 municate can openly exchange so-called public keys; any- this market. The company hopes that integrating its secu-
Management: Arthur Coviello
(president, RSA), Bret
thing encrypted with a public key can only be decrypted rity expertise into its overall cloud business will increase
Hartman (CTO, RSA) by each party’s corresponding private key. RSA also offers customers’ confidence in the products. Challenges and
Employees: 43,200 products that watch corporate systems for evidence of next steps: An attack on its algorithm by academic
Revenues: $14.0 billion malware activity. Market: RSA has more than 9,000 cus- researchers gained attention earlier this year, but this type
R&D: $1.6 billion
Market cap: $38.3 billion tomers worldwide. The company focuses on providing a of attack currently requires a huge investment of time and
broad set of Internet security tools, including authentica- resources, so it is not a practical threat, at least for now.
F-Secure Technology: F-Secure offers products such as antivirus mobile operators, but the company has also tried it on the
Specializes in security soft- and antispyware software. The Finnish company’s mobile PC side with broadband operators. F-Secure says it has
ware for smart phones security products, designed to protect against malware more than 200 partnerships with operators globally.
www.f-secure.com infection on smart phones, are based on a database of all Challenges and next steps: The company believes that
Founded: 1988 known mobile malware. Market: F-Secure moved into the building add-on firewall or antivirus products is reaching
Management: Kimmo Alkio
mobile market early and has captured the lion’s share of it its limit of effectiveness; now it is looking to incorporate
(CEO), Pirkka Palomäki (CTO)
Employees: 720 through deals with companies including Vodaphone, its security software throughout operating systems and
Revenues: $179.2 million T-Mobile, Orange, and Nokia. It also sells security applications. It also believes that cyber attackers will shift
R&D: $40.1 million products for personal computers. Strategy: F-Secure their attention to new targets. Securing location
Market cap: $396.0 million
focuses on providing products and services that operators information derived from smart phones, for example, is a
can resell. The strategy has worked particularly well with growing challenge.
Google Technology: Google’s Chrome browser makes extensive use and consumers whose computer use revolves around a Web
Building a more secure of a technique known as sandboxing, in which operations browser. Strategy: Google believes that its browser and
operating system that handle Web pages can’t access the local system. Google operating system will encourage users to spend more time
www.google.com is also developing an operating system called Chrome, online, potentially using more of the company’s services.
Founded: 1998 which uses cloud technology to stay secure. Chrome OS is It also hopes its products will push other vendors to make
Management: Eric Schmidt
(CEO), Sergey Brin (CTO)
designed to check itself periodically to search for any dif- products that improve the online experience for everyone.
Employees: 19,835 ferences between the software installed on a user’s machine Challenges and next steps: Google has also introduced a
Revenues: $23.7 billion and Google’s official version. Because the operating sys- program to pay researchers if they find significant secu-
R&D: $2.8 billion tem is designed to store its data in the cloud rather than on rity vulnerabilities in the Chrome browser. It has not yet
Market cap: $161.0 billion
the machine, it can be reinstalled without inconvenienc- announced a release date for Chrome OS, but the underly-
ing the user if anomalies are detected. Market: Businesses ing code has been released to the open-source community.
w w w . t e ch n o l o g y r e v i e w . c o m briefing 67
Hewlett-Packard Technology: HP’s TippingPoint division sells an intru- that protects against vulnerabilities before they’re pub-
Pays researchers a bounty for sion prevention system. It features “virtual software licly known. The initiative has also brought notoriety and
security information patch” technology, which offers protection for vulner- visibility to the company through bug-finding contests
www.tippingpoint.com abilities in products that haven’t yet been patched by the such as Pwn2Own, which attract top security research-
Founded:1939 vendors. Partly to gain information for this service, Tip- ers from around the world. Challenges and next steps:
Management: Alan Kessler
pingPoint runs the Zero Day Initiative, which purchases The Zero Day Initiative’s model of paying researchers for
(president, TippingPoint), Dave
Larson (vice president, inte- information on vulnerabilities from security researchers. information about vulnerabilities is uncommon in the
grated product strategy) Market: Tipping Point sells its services primarily to cor- industry. Criminals have long been willing to buy such
Employees: 304,000 porate enterprises, government agencies, service provid- information, but creating a legitimate market for it is new.
Revenues: $114.6 billion
R&D: $2.8 billion ers, and academic institutions. Strategy: The Zero Day TippingPoint must prove that the system works economi-
Market cap: $111.4 billion Initiative gives TippingPoint a chance to offer a product cally and fend off controversy about it.
McAfee Technology: McAfee offers a wide variety of security prod- controlled through a single interface. Challenges and
Building a one-stop shop for ucts, but its flagship is a unified platform that ties together next steps: In addition to threats from companies such
computer security the company’s research into cyber threats, computer and as Symantec and Trend Micro, McAfee faces competi-
www.mcafee.com network security products, and risk and compliance capa- tion from smaller companies that offer similar products at
Founded:1987 bilities. The company also offers other integrated systems much lower or zero cost. The company is concerned that
Management: David DeWalt
on a software-as-a-service basis. Market: McAfee targets the trend toward netbooks and other inexpensive com-
(CEO), George Kurtz (CTO)
Employees: 6,100 diverse customers, offering products aimed at consum- puting technologies may indicate customers’ willingness
Revenues: $1.9 billion ers, small businesses, midsize companies, and large cor- to emphasize price above functionality. If that’s the case,
R&D: $324.4 million porations. Strategy: The company hopes that the breadth the competitors will have an advantage. A recent snafu in
Market cap: $5.2 billion
of its product line will make it attractive to companies which an update damaged users’ machines showed that
looking for comprehensive security services that can be McAfee is vulnerable to negative publicity.
Microsoft Technology: The company has developed a range of anti- However, the company feels there’s a limit to what can be
Its popular software is a malware defenses to make its operating systems more accomplished by focusing on technical improvements to
favorite target for hackers secure. It has introduced programs such as End to End individual products. It looks to the End to End Trust initia-
www.microsoft.com Trust, an attempt to develop technologies that can contrib- tive to address Internet security issues that are beyond its
Founded: 1975 ute to a more secure Internet. Market: Microsoft’s products direct control. Challenges and next steps: Microsoft will
Management: Steve Ballmer
(CEO), Craig Mundie (chief
have captured a broad segment of the market and are par- remain the primary focus of attention for cyber attack-
research and strategy officer) ticularly popular with enterprise customers. Its browser, ers. Many users are often slow to upgrade to new versions
Employees: 92,736 Internet Explorer, is used by more than half of Internet of its products, making it hard for the company to roll out
Revenues: $58.4 billion users worldwide. Strategy: Microsoft’s Trustworthy Com- improved security technologies. For its existing platforms,
R&D: $9.0 billion
Market cap: $235.4 billion puting initiative began in 2002, and its products’ reputa- Microsoft is trying to educate third-party developers to
tion for security has been slowly improving ever since. design security into Windows applications from the start.
Symantec Technology: In addition to the antivirus software for rity is beginning to converge with storage and systems
Relies heavily on partnerships which it is best known, Symantec offers products for management, and it is focusing on creating integrated
to distribute its products security, backup and recovery, storage, compliance, and products that draw on its expertise in these different
www.symantec.com systems management. Market: While Symantec sells areas. Challenges and next steps: Because Symantec’s
Founded: 1982 many products directly, it also offers them through other strategy calls for a great deal of coöperation with part-
Management: Enrique Salem
companies, such as Internet service providers and com- ners such as computer manufacturers, the company faces
(CEO), Mark Bregman (CTO)
Employees: 17,400 puter manufacturers. The company says it maintains challenges from other vendors that make similar soft-
Revenues: $6.2 billion partnerships with about 40,000 companies worldwide. ware. If Symantec does happen to lose its relationship
R&D: $880.0 million Strategy: Symantec is expanding from products that are with a manufacturer to another security vendor, it will
Market cap: $11.7 billion
delivered as services or installed as add-on appliances in have to continue developing its products without the ben-
customers’ data centers. The company believes that secu- efit of its special access to end users.
Trend Micro Technology: Trend Micro sells antivirus, antispam, and in the antispam, antispyware, encryption, and data-center
Targets small businesses network security software for businesses and consum- security arenas. It has focused recently on offering prod-
www.trendmicro.com ers. It has recently developed a cloud-based system to ucts aimed at small businesses, which lack both the legal
Founded: 1988 identify and stop threats as they emerge. The company is protections afforded to consumers (such as protection
Management: Eva Chen also developing services for companies hoping to protect from credit card fraud) and the resources that larger com-
(CEO), Oscar Chang (chief
development officer)
information they’ve stored in clouds. Market: Two-thirds panies can bring to bear against cyber crime. Challenges
Employees: 4,434 of the Tokyo-based company’s worldwide revenue comes and next steps: In order to keep up with the increasing
Revenues: $1.0 billion from business customers, and the remaining third from sophistication of cyber criminals, Trend Micro is moving
R&D: N/A consumers; about 40 percent of its sales come from Japan. to add various products designed to protect virtualized
Market cap: $3.9 billion
Strategy: The company is expanding its global presence. environments and data centers and to protect access to
It has also grown by acquiring several companies working data as it moves across the Internet.
68 briefing t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
Facebook Technology: As Facebook has grown and become a more network effect of the millions of people who already use its
Guarding users’ data frequent target of attacks, the company has developed service. Facebook has also developed defenses to prevent
www.facebook.com strategies for protecting users’ data, even when it can’t con- malware from being delivered to users through the applica-
Founders: Mark Zuckerberg, trol whether their machines are infected with malware. For tions that it hosts from third-party developers. Challenges
Chris Hughes, Dustin example, the company can deactivate links shared on the and next steps: Facebook is under increasing pressure to
Moskovitz, Eduardo Saverin
site if they turn out to be malicious, and it works with major secure the customer data it has collected. In particular, the
Management: Mark
Zuckerberg (CEO), Sheryl vendors to patch applications. Market: Through partner- company must enhance the security of the interfaces that
Sandberg (COO) ships that Facebook is developing with marketers, the large allow other sites to tap into that information. The company
Funding: Over $700 million amounts of data it has collected on its customers will be came under fire recently after a number of security vulnera-
Key investors: Peter Thiel,
Accel Partners, Greylock Part- used to advertise to them. Strategy: The company, which bilities were found in its new Open Graph platform, which
ners, Digital Sky Technologies works to establish itself as a trusted site, benefits from the allows third-party sites access to user data.
Flylogic Technology: Flylogic’s expertise lies in breaking a device’s ship between hardware manufacturers and security con-
physical defenses in order to extract the information stored sultants is still largely adversarial. Flylogic’s strategy is to
Engineering inside, allowing the company to identify vulnerabilities and carefully publicize some of the vulnerabilities it finds while
Researches vulnerabilities
in hardware advise customers on better designs. The company employs working with manufacturers to help them improve. The
www.flylogic.net tools that allow a user to look deep into the architecture company hopes to establish repeat business with major
Founders: Christopher of a chip and perform fine-grained operations on it. Once chip manufacturers. Challenges and next steps: Chips
Tarnovsky this tool reveals how to get into the integrated circuit, Fly- are growing smaller and more complex. But for the most
Management: Christopher
Tarnovsky (principal)
logic is often able to come up with a simpler way to crack part, these changes have occurred without taking secu-
Funding: Self-funded the chip. Market: The company targets both chip makers rity into account. Flylogic must continue developing new
and the manufacturers of devices with embedded chips, techniques for dealing with smaller physical devices while
such as cell phones and smart cards. Strategy: The relation- building positive relationships with manufacturers.
Independent Technology: The company employs experts capable of providing technical support to law firms, and testing soft-
extensive, hands-on analysis of systems security. Its con- ware in the absence of information about its underlying
Security sultants have been responsible for feats such as finding architecture. Strategy: The company has positioned itself
Evaluators early bugs in the iPhone and Android platforms, elec- at the high end of security analysis. It tells customers that
Performs high-end
security analysis tronic voting machines, and Blu-ray and HD-DVD play- by hiring experts as good as any would-be attacker, it can
ers, as well as flaws in an early encryption protocol used analyze their systems and eliminate weaknesses before
securityevaluators.com
Founders: Avi Rubin, Stephen to secure wireless access points. The company has devel- outsiders can find them. Challenges and next steps: The
Bono, Matthew Green, Adam oped specialized tools for testing system security, but it company has been primarily concerned with technical
Stubblefield uses them internally rather than selling them to custom- rather than financial issues; it currently has only one man-
Management: Avi Rubin
(president) ers. Market: Independent Security Evaluators has business ager. It is now examining how to grow past its current size
Funding: Self-funded units focused on three areas: enhancing network security, without changing its technically focused culture.
IOActive Technology: IOActive’s staff has been responsible for sev- sive power outage. Market: The company has custom-
Uncovers security flaws eral high-profile discoveries of security vulnerabilities, ers in a variety of market segments, including power,
in infrastructure including one in the Internet’s fundamental structure: its games, hardware, finance, travel, and social network-
www.ioactive.com experts helped find and patch a flaw in the domain name ing. Strategy: IOActive recruits big names on the security
Founders: Joshua Pennell system, which is responsible for matching the URLs that speaker circuit and builds its reputation on their discov-
Management: Jennifer
users type into their browsers with the corresponding eries. Challenges and next steps: IOActive must walk a
Steffens (CEO), Dan Kaminsky
(director of penetration testing) numeric addresses used to route traffic. More recently, careful line in order to publicize its achievements without
Funding: Not disclosed IOActive’s experts analyzed and found vulnerabilities alienating the companies it hopes to win as customers. For
in the design of the infrastructure for a smart electrical example, when the company revealed problems it uncov-
grid. They also demonstrated an attack that could spread ered with smart electricity meters, its experts did not name
malware throughout the grid, potentially causing a mas- any specific brands affected.
Ksplice Technology: For customers, rebooting after installing secu- structure providers, companies that offer cloud computing
Lets system administrators rity updates is annoying; for companies, the downtime can services, and Web hosting companies. Strategy: The com-
install security patches be costly, in terms of lost internal productivity, lost cus- pany intends to build its business foundation on compa-
without downtime tomer sales, or both. Ksplice’s technology, which works nies that use Linux, but the long-term vision is to extend
www.ksplice.com with the Linux operating system that many businesses use its technology to handle middleware and application soft-
Founders: Jeff Arnold, Tim
to run servers, allows security updates to be converted into ware above the level of the operating system. Challenges
Abbott, Waseem Daher,
Anders Kaseorg a form that can be installed without rebooting. The tech- and next steps: Ksplice began as a very small startup and is
Management: Jeff Arnold nology works by analyzing the effect an update would have now expanding. It has previously been interested in estab-
(CEO), Tim Abbott (CTO) on a system. A Ksplice patch then makes those changes lishing partnerships with the companies that issue secu-
Funding: Self-funded
without disrupting other processes needed to keep the sys- rity updates, which would allow it to serve a much larger
tem running. Market: Ksplice is currently targeting infra- portion of the market.
w w w . t e ch n o l o g y r e v i e w . c o m briefing 69
Panda Security Technology: Most antivirus products work by storing structure. The company foresees increasing interest in
Creates cloud-based virus signatures on users’ machines; matching these sig- managed services in this market. Strategy: Panda hopes
security products natures against Internet traffic or files on storage devices the shift to cloud computing will help it pick up mar-
www.pandasecurity.com allows the software to recognize threats when they ket share. A key part of the company’s strategy is to give
Founders: Mikel Urizarbarrena appear. Panda’s products store and analyze signatures in away its cloud antivirus product to consumers. Not only
Management: Juan Santana
the cloud. This means signatures can be kept up to date has this helped build worldwide name recognition, but
(CEO), Rick Carlson (presi-
dent, Panda Security U.S.) more easily, and users’ computers aren’t slowed by the it allows the company to collect information about the
Funding: $13.8 million computational demands of the analysis. Market: Panda is behavior of malware on a global scale. Challenges and
Key investors: Investindus- currently strong in the U.S. small-business market, where next steps: Panda is working to expand globally. In order
trial, Gala Capital, HarbourVest,
Atlantic Bridge its services are particularly appealing because they’re low to accomplish this, it must take on bigger antivirus com-
cost and don’t require customers to maintain any infra- panies with more established names.
Rapid7 Technology: Rapid7’s NeXpose scans customers’ net- for security services. Strategy: Rapid7 feels that the secu-
Helps companies identify works, databases, and Web applications systems, iden- rity industry has credibility issues: customers are over-
their most dangerous tifying vulnerabilities and ranking their severity. The whelmed by an array of products and uncertain about
vulnerabilities Metasploit Framework, a popular open-source platform which vulnerabilities deserve their attention. The com-
www.rapid7.com that it recently acquired, allows customers to do their pany’s strategy is to help customers identify and mitigate
Founders: Tas Giakouminakis,
own testing to identify the system flaws that attackers the risks that have the biggest impact on their business.
Chad Loder, Alan Matthews
Management: Mike Tuchen can actually exploit. Metasploit is known for maintain- Challenges and next steps: The company is now seeking
(CEO), Tas Giakouminakis ing a large database of public, tested exploits. Market: The to make its security products more accessible and easier
(CTO) company is focused on selling to the security officers of to use. To that end, it has been releasing products such as
Funding: $9 million
Key investors: Bain Capital medium to large companies. By diversifying its products, Metasploit Express—a low-cost, packaged version of the
Ventures it hopes to build customer loyalty in a confusing market Metasploit Framework.
Technology: Malware infecting users’ machines often at other businesses concerned about fraud. Strategy: Tra-
Trusteer tries to access sensitive data as it flows through the user’s ditionally, different companies have provided different
Sells tools to financial browser. Trusteer provides technology that companies, types of fraud prevention products: some focused on con-
institutions to prevent fraud particularly banks, can use to protect their customers. sumer products that protect the user’s desktop, and others
www.trusteer.com A recently launched service, Flashlight, provides tools focused on protecting vendors’ systems. Trusteer hopes to
Founders: Mickey Boodaei that banks can use to identify the exact piece of malware bridge the two services, providing a more comprehensive
Management: Mickey
Boodaei (CEO), Amit Klein responsible for any incidents that occur, easing the process defense against fraud. Challenges and next steps: Trusteer
(CTO) of investigating breaches and helping companies improve intends to expand its line of fraud prevention products for
Funding: $14 million their defenses. Market: The company is currently focused online service providers. It hopes to diversify beyond the
Key investors: U.S. Venture
Partners; Shlomo Kramer, on providing fraud prevention services to financial insti- financial sector, looking at ways to prevent fraud in other
CEO of Imperva tutions, but it also has products aimed at home users and types of enterprises.
Verdasys Technology: Verdasys’s software protects systems by their own employees. However, many attacks from out-
Develops security designed to inserting itself deeper into the operating system than side happen when bad actors are able to pose as insiders
defend against insider attacks most attackers can reach. From that position, it’s able or steal credentials. The company is now working to offer
www.verdasys.com to assess all attempts to access data on the machine or data protection of all kinds. Challenges and next steps:
Founders: Seth Birnbaum, device. If the attempt doesn’t meet the criteria laid out Customers are tired of buying a bunch of separate secu-
Allen H. Michels, Nicholas
by corporate policy, the software blocks it. Market: The rity products. Like others, Verdasys is working to inte-
Stamos, Tomas Revesz
Management: Seth Birnbaum company focuses on protecting the data of top-tier global grate a variety of protections into its own products, both
(CEO), Dan Geer (VP and companies. It has strong operations in China and Tai- by expanding its technology and by figuring out how that
chief scientist emeritus) wan and is moving into the European market, specifi- technology can work in conjunction with, for example,
Funding: Self-funded
cally Germany and France. Strategy: Verdasys started advanced malware detection. The company is also plan-
out by trying to protect companies against threats from ning its first product that will support Macs.
WhiteHat Technology: WhiteHat provides a software-as-a-service cations are popular targets; the company estimates that 75
approach to Web application security. Its platform iden- to 80 percent of attacks on businesses come through this
Security tifies and manages website vulnerabilities and can be conduit. WhiteHat must stay on top of new trends while
Securing Web applications
integrated with other security technologies to protect developing its distribution channels to fend off competi-
www.whitehatsec.com
Founders: Jeremiah Grossman websites. Market: The company focuses on highly regu- tion from companies such as HP and IBM. Securing web-
Management: Stephanie lated segments of the market, such as financial compa- sites is complicated by a divide between security teams and
Fohn (CEO), Jeremiah nies, e-commerce, and health care. Strategy: WhiteHat website development teams, which often don’t report to the
Grossman (CTO)
Funding: $13.2 million
has been establishing partnerships to provide its services same managers in a company. Often, security problems are
Key investors: Altos Ventures, through other businesses. For example, a recent deal with identified but not resolved. To differentiate itself, WhiteHat
Garage Technology Ventures, Verizon will bring its software to the telecommunications is trying to make it as simple as possible for companies to
Horizon Ventures, Startup giant’s customers. Challenges and next steps: Web appli- act on the information about vulnerabilities that it provides.
Capital Ventures
70 briefing t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
reviews
F
or millions of people around the world, cations Commission created the National wholly unforeseen developments.
broadband Internet access is big part Broadband Plan, which directs up to $15.5 But Shane Greenstein, a professor of
of modern life. We download movies and billion in public funds toward improving management and strategy at Northwest-
music, play online games, share photos, and U.S. connectivity. The plan aims not only ern University’s Kellogg School of Man-
upload information to social-networking to ensure affordable and reliable broadband agement, says the advantages are in fact
sites—all at ever-increasing speeds. Rates of for every community but also to equip the far less obvious. “The research challenge
at least 50 megabits per second—enough to majority of households (some 100 million is substantial,” says Greenstein, one of a
download a DVD-quality movie in about 10 homes) with lines running at speeds of at handful of academics who have studied the
minutes—have become mainstream in cit- least 100 megabits per second. It’s an attempt economic impact of broadband. “One prob-
ies from Seoul to Stockholm. In to shove the United States into lem is that the real impact generally doesn’t
the United States, however, the The NaTioNal the high-speed age—and all of come in the sector where the investment
broadband landscape is differ- BroadBaNd PlaN it, the FCC suggests, is achiev- takes place. For example, when broadband
FCC
ent: the average download speed www.broadband.gov/ able by 2020. first arrived, who knew that restructuring
plan/
is about 10 megabits per second, Yet the case for federal invest- the music industry would be the first thing
according to the broadband ment boils down to one funda- to happen?” A lack of empirical research,
testing firm Ookla, and only 23 people in 100 mental question: how much public good will Greenstein suggests, is also the result of a
have broadband subscriptions, according $15.5 billion buy? Answering that with any kind of institutional blindness apparent on
to the International Telecommunications accuracy, it turns out, is nearly impossible. nearly every side: “It’s in no one’s interest
Union (see “The Global Broadband Spectrum,” Serious studies on the economic and social to be a skeptic, because it undermines one
p. 24). Statistics from the Organization for effects of wider, faster Internet access are of the mythologies of broadband—that it is
Economic Coöperation and Development surprisingly few—and many of those that do a technological panacea.”
rank the United States behind more than exist are dated. The answer also depends on A 2007 study by researchers at MIT
a dozen other countries—including South how the FCC balances the plan’s two goals and at another Washington think tank,
Korea, Japan, Canada, the U.K., Sweden, of inclusivity and innovation. the Brookings Institution, did find some
and Belgium—in both broadband penetra- It is often taken for granted that greater benefits when it attempted to discern the
tion and average advertised speed. access to high-speed Internet services will effect of increased broadband penetration
Faced with these statistics—and the wide- boost the economy while improving health on job opportunities at a state level. More
spread assumption that access to high-speed care, education, civic engagement, and more. high-speed access barely seemed to change
broadband is critical to the country’s eco- Such assumptions are built into the plan activity in sectors such as construction, but it
nomic health—the U.S. Federal Communi- and endorsed by various experts. In March appeared to improve opportunities in knowl-
72 reviews t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
that productivity increased significantly after reviewing projects across the continent Achieving ever-higher speeds may also
when service was upgraded from narrow- suggest that heavy government investment require significant government interven-
w w w . t e ch n o l o g y r e v i e w . c o m reviews 73
S
as Amsterdam and Stockholm. But it will irtris Pharmaceuticals was, until recently, of starvation. The sirtuins’ role in aging was
be tricky to follow this path in the United the golden child of antiaging research. first identified in 1993 by Guarente and his
States, because the industry has been set up Founded by Harvard biochemist David colleagues. (Sinclair would later join the lab
differently. In the 1990s, the FCC decided Sinclair and venture capitalist Christoph as a postdoc.) As Stipp explains, the role of
to encourage competition between infra- Westphal, it produced research suggesting these enzymes in aging made sense to sci-
structures such as cable and DSL, rather something almost too good to be true: that entists who had known for years that caloric
than between different providers using a a chemical in red wine could help you live a restriction, or nutritionally adequate diets
shared backbone. As a result, companies longer, healthier life. With its young, pho- about 30 percent lower in calories than aver-
in the United States have been less will- togenic founders, the startup was a media age, could extend the lives of yeast, worms,
ing to shoulder the cost of investing in darling, the subject of dozens of and mice (the effect was also later
new broadband technology, since doing breathless magazine and news- The YouTh Pill
demonstrated in rhesus mon-
so would give them little advantage over paper articles. Pharmaceutical David Stipp keys). Realistically, however, few
Current, 2010
any direct competitor. giant GlaxoSmithKline was so people can stick to this type of
Yet private investment will be vital to impressed that it spent $720 mil- diet. So for more than a decade,
increasing broadband speeds. Korea’s rapid lion to buy Sirtris in 2008. the primary goal of antiaging researchers
advances in the past decade were attribut- David Stipp’s new book The Youth Pill has been to mimic caloric restriction with
able in no small part to funding from com- traces this meteoritic rise and other events a pill, a prospect that Stipp describes as “the
panies. And there are encouraging signs in the history of antiaging research, detail- great free lunch.” Such a drug, he writes,
that something similar is beginning to ing how the science and personalities came would theoretically postpone aging in peo-
happen in the United States; in the most together at just the right moment to create ple, extending their years of good health
obvious example, Google is planning to roll the successful company. In the mid to late and limiting their years of decline.
out one-gigabit-per-second fiber lines to at 1990s, Stipp explains, what had been con- In 2003, Sinclair made headlines around
least 50,000 and up to 500,000 people in sidered a fringe field began evolving into a the world when he announced that the red-
trial locations across the country. But an focused attempt to uncover the biochemis- wine component resveratrol, which had
FCC task force has suggested that more try of aging. Scientists including Cynthia previously been linked to a reduction in
than $300 billion of private funding would Kenyon at the University of California, San heart disease, extended life span in yeast. He
eventually be required on top of the govern- Francisco, and Leonard Guarente at MIT argued that the compound activated one of
ment’s expenditure in order to boost speeds began to find genes linked to longevity in the sirtuins and proposed that it mimicked
to 100 megabits per second or higher for lower organisms such as yeast and worms, the effects of caloric restriction. Sinclair
the entire nation. prompting a conceptual shift in our under- and Westphal launched Sirtris in 2004 with
In the end, the success of the National standing of aging. Rather than inevitable the aim of developing molecules that could
Broadband Plan will be judged according to decay, their work suggested, aging was a stimulate the enzyme much more potently.
the targets that the FCC has set for increas- genetically controlled process—and thus The company is developing treatments not
ing both penetration and speeds by 2020. one that could be manipulated. for aging itself—which the U.S. Food and
But the tension between those two distinct Sirtris was one of the companies to Drug Administration doesn’t consider an
goals leaves a desirable outcome very much emerge as this view of aging gained currency. illness—but for diseases of aging, such as
in doubt. At the heart of its drug development pro- diabetes, Alzheimer’s, and cancer.
gram are a class of enzymes called sirtuins: As Stipp recounts, hopes for antiaging
BoBBie Johnson is a freelance writer Based
in san francisco. Previously, he was the tech- the molecular signals that they send appear drugs captured media attention and inves-
nology corresPondent for the Guardian
newsPaPer. to silence aging-related genes during times tors’ imaginations. But a different con-
74 reviews t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
drugs. (Both Kenyon and Guarente have are produced, so are more defective proteins,
since left Elixir. Guarente joined Sirtris’s which can accumulate in cells and contrib- Karen weintraub is a Freelance writer based
in cambridge, ma. she is the Former deputy
scientific advisory board in 2007.) Peter S. ute to the symptoms we see as aging. health/science editor at the Boston GloBe.
w w w . t e ch n o l o g y r e v i e w . c o m reviews 75
A
decade ago, Germany launched a policies for dealing with climate change, “That’s a failure of public policy.”
renewable-energy plan on an unprec- the effectiveness of the German experiment As for the job-creation benefit, it may turn
edented scale. Its parliament, the Bundestag, is a subject of debate. From one perspec- out to be ephemeral. Solar panels and wind
enacted a law obligating the nation’s electric tive, the Renewable Energy Sources Act of turbines can be manufactured nearly any-
utilities to purchase green power at sky-high 2000 has exceeded its aims. Germany’s first where in the world. Now, partly because of
rates—as much as 60 cents per kilowatt- target was to get at least 10 percent of its competition from low-cost manufacturing
hour for solar—under fixed contracts last- electric power from renewable sources by in China (see “Solar’s Great Leap Forward,”
ing up to 20 years. (German 2010. The German grid now p.52), many German manufacturers of this
The reNewaBle
market prices for electricity, eNergY SourCeS aCT gets more than 16 percent technology are struggling. Q-Cells, Con-
largely produced by coal and Passed by the german of its electricity from these ergy, and Solarworld have seen their stock
Bundestag February 25,
nuclear plants, were about 2000 sources, and the government lose much of its value since the start of
12 cents per kilowatt-hour.) amended in 2004, 2008
www.bmu.de/english
has raised its target for 2020 2008. Anton Milner, the founding CEO of
The idea behind this “feed- from 20 percent to 30 percent. Q-Cells, resigned in March after the com-
in tariff ” was that anyone would be able to The country avoided pumping about 74 pany reported an annual loss of 1.36 billion
build a renewable-power plant—or install million metric tons of carbon dioxide into euros ($1.67 billion). In May, to keep pace
rooftop solar panels—and be guaranteed the atmosphere in 2009. The German envi- with the plunging cost of solar panels, the
predictable profits by feeding energy into ronment ministry also touts a side benefit: Bundestag cut the rates it set for selling solar
the grid, where utilities would buy it at pre- nearly 300,000 new jobs in clean power. power to the grid by 11 to 16 percent on top
mium prices. The higher costs would be As a result, the feed-in tariff has the sup- of a scheduled annual decrease of 10 per-
passed on as monthly surcharges to rate- port not only of the left-leaning politicians cent. To try to compete with imports, solar
payers, spread out among all homes and who originally backed it but also of most companies have fired hundreds of workers,
businesses in a country of about 80 million of the skeptics in the right-leaning parties and the nation’s solar trade association has
people. Fossil and nuclear fuels amount to that fought against it, says Claudia Kemfert, warned of even more layoffs.
“global pyromania,” said Hermann Scheer, who heads the energy department at the Meanwhile, some of the countries that
the German politician who championed German Institute for Economic Research copied key features of the German policy
the policy. “Renewable energy is the fire in Berlin. “The skepticism is over,” she says. have also seen their booms start to fizzle. In
extinguisher.” “We’re celebrating the success.” 2008, Spain set an all-time record for photo-
Lai F/ r e d u x
Now, as the United States and other But from another perspective, the Ger- voltaics, installing 2.46 gigawatts’ worth of
nations look toward creating their own man policy is a government boondoggle. solar panels in a single year—41 percent of
76 reviews t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
What today’s
engineers, rocket
scientists, and
astrophysicists
all new installation worldwide, according to United States. So would a national feed-in
Solarbuzz, a research and consulting firm. tariff be an acceptable alternative? Or would
do for fun.
But in Spain, buying all that high-priced it also be politically doomed, since it, too,
power became a burden to the utilities. That, would raise electricity prices? To make a case
along with a longer contract term and aggres- for it, politicians would need to convince the
sive pricing, caused the tariffs to be drasti- American public that renewable power is
cally cut. Without the high incentives, in worth it, pointing to Germany as the exam-
2009 Spain installed only 6 percent of the ple. Indeed, the German experiment does
world’s new solar-power capacity. show that a large industrial society can reach
Nevertheless, interest in feed-in tariffs is ambitious goals for scaling up new sources
growing in the United States. At least two of clean electricity, with users paying the
cities—Sacramento, CA, and Gainesville, way. Germany expects to produce most of its
FL—have enacted local plans. California, electricity from renewable sources by 2030.
Hawaii, and Vermont have passed laws that Meanwhile, the United States produces only
would create their own feed-in tariffs, and about 7 percent of its electricity from such
at least 15 other states have considered it. sources, most of that from long-standing
What might these policies cost? In Ger- hydroelectric plants.
many, electricity prices have soared more The real significance of the German plan,
than 60 percent over the past decade. But though, may not be as a model for other
Germany’s environmental ministry says countries but as a source of permanent
the tariff system is responsible for less change in the world’s energy economy. In
than a 10th of that increase, or about $3 this sense, Germany can be compared to
per month for a typical household. Since early adopters of new gadgets, who often pay
German households consume about half as outrageous prices even though they know
much electricity as U.S. homes, the extra that others will get improved technology
cost for renewable energy has not been a for much less a few years later.
deal-breaker for the public, says Kemfert, Consider the changes in the market for
who contends that a majority of Germans wind power. By 2006, Germany had by far
support it. Overall, the tariff cost Germany the largest wind-power base in the world,
an estimated $11 billion in 2008 alone, about with 20.6 gigawatts of capacity. The massive
a third of 1 percent of its GDP. scale brought the cost down, and wind began
But why even bother with feed-in tariffs? approaching grid parity in many parts of the
Many economists favor either a carbon tax world. In 2009, the United States and China
or a cap-and-trade system in which electric- were able to surpass Germany in capacity,
Exercise your skill, expand
ity plants buy permits to burn fossil fuel. “It but at far more attractive prices.
your mind, and challenge
would be better to tax brown power than Thanks in part to the Germans, the same
your creativity with everything
subsidize green power,” says Borenstein. thing now appears to be happening in solar,
from games to gadgets from
Coal is the biggest carbon emitter among with prices of photovoltaic panels plung-
Edmund Scientific.
all energy sources, and it currently accounts ing 40 percent last year alone. Yes, the crit-
for about half the electricity produced in ics are right that Germany’s spending was For the latest trends in toys
the United States as well as in Germany. wildly inefficient. But what Germany did and technology, call for your
Phasing out coal should be the main goal, was prime the global markets, showing that free catalog or shop online at
and pursuing that goal by putting a price renewable technologies can be a big busi- scientificsonline.com
on carbon, he says, allows the market to ness worthy of investment. As a result, the
decide which renewable sources are most United States may not need to copy Ger-
cost-effective. That’s more efficient than many’s experiment to reap the rewards.
letting the government set prices.
evan i. schwartz is an author and Journalist.
However, neither cap-and-trade nor a he produced and cowrote saved By the sun, a
pbs/nova documentary Featuring a segment 1-800-728-6999 • www.scientificsonline.com
direct tax may be politically feasible in the about the german solar policy.
w w w . t e ch n o l o g y r e v i e w . c o m
E communIcatIons boaRd
w w w . t e ch n o l o g y r e v i e w . c o m hack 79
demo
Inexpensive,
Unbreakable
Displays
ReseaRcheRs at hP aRe
scaling uP a PRocess foR
making silicon electRonics
on Rolls of Plastic.
By k ATH e r I n e B OurzAC
C
arl Taussig unfurls a roll of silvery transistor arrays on the 33-centimeter-wide frontplanes and backplanes are protected
plastic patterned with arrays of small plastic rolls. HP researchers are now engi- by a rigid case. It also doesn’t use silicon; it
iridescent squares, each a few centimeters neering a process for a planned pilot plant, uses lower-performance organic transistors
across. The plastic in his hands, along with where the company will produce the arrays that aren’t fast enough for video. HP hopes
the scraps and scrolls of the material scat- at volumes of about 46,500 square meters to gain an edge, Taussig says, by lowering the
tered on benchtops and desks in the rooms a year through a partnership with Phicot, cost of the display while producing speedy,
of Hewlett-Packard Labs in Palo Alto, CA, a manufacturer of thin-film electronics video-capable transistors.
may look like silver wrapping paper, but based in Ames, IA. Part of the reason silicon-on-plastic dis-
each square contains thousands of silicon The idea is to combine these transistor plays haven’t been produced before is that
transistors. The transistors can switch pix- arrays with flexible “frontplanes”—the part it’s difficult to deposit high-quality silicon
els in displays on and off as fast as those in of a display that creates the images and that at temperatures low enough to avoid melt-
conventional flat-screen monitors and tele- the transistors control. “Our goal is to make ing the plastic. Hewlett-Packard ’s partner,
visions, but they’re far cheaper to fabricate displays at a cost of $10 per square foot,” Phicot, has managed to solve that prob-
and more resilient. Taussig says. That’s about a 10th the price of lem. HP has addressed another challenge:
In today’s displays, whether they’re flat- today’s displays. Silicon-on-plastic displays unlike glass, which provides a mechanically
panel TVs or iPads, the electronics that might be used in laptops, or a few thin sheets stable surface, plastic tends to distort. By
control the pixels are made of amorphous might be stuffed into briefcases, replacing finding a way to make nanoscale features
silicon on glass. Taussig’s goal is to replace printouts and pads of paper. Taussig also on plastic, HP is opening the way to the
these heavy, fragile, expensive displays with imagines “ginormous displays” pasted to large volumes and low costs that Taussig
lightweight, rugged, inexpensive ones made walls to show videos and ads. has in mind.
on plastic—without compromising perfor- HP may not be the first company to mar-
mance. He is using high-volume roll-to-roll ket with a plastic display—Plastic Logic, On a ROll
mechanics, the type of high-speed manu- which plans to release an e-reader soon, The key to forming nanoscale electronics
facturing process used in newspaper pro- is likely to earn that distinction. But Plas- on distortion-prone plastic is a process
j e n s i s ka
duction, to make high-performance tic Logic’s display isn’t flexible—the plastic called self-aligned imprint lithography,
80 demo t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
which Taussig’s team invented in 2001, and with several thin layers of metal, amorphous uniformly, gradually eating into the thin
which his group first applied to displays in silicon, and other materials needed to make films until the three-dimensional pattern
2006. Thin-film transistors have several the electronic circuits. To create the three- of the polymer template is transferred to
layers, and in conventional manufacturing, dimensional template, he loads the roll the layers below.
the materials in each layer are deposited onto a spindle and threads it into a machine. To start this carving process, the pat-
separately. After each layer is deposited, it’s The film moves through the machine, and terned plastic film is fed into a wet-etching
carved into precise patterns before the next a stationary blade spreads a uniform coat- machine. Once inside, the template is thor-
layer is added. This process requires care- ing of liquid polymer over it. A stamp cre- oughly coated with chrome etchant, which
ful alignment of the photolithographic ates intricate impressions in the polymer eats away roughly one micrometer from
masks used to outline each pattern. coating, and these are instantly frozen in the entire surface. The thinnest parts of
Taussig’s process, on the other hand, uses place by an ultraviolet light, which solidi- the template disappear, exposing parts of
a single, three-dimensional template to fies the polymer. a thin film of metal below. Then the etchant
pattern all the layers, eliminating the need From the edge, the three-dimensional carves into that exposed metal. The film is
to align different masks. “It’s immune to template that’s been created resembles a transferred to a plasma etching machine,
distortion, which is the biggest challenge microscopic city skyline. What follows which bombards the template with fluo-
when making electronics roll-to-roll,” is a series of etching steps, with the tem- rine ions. They carve deeper into the film,
Taussig says. plate controlling how far the underlying this time cutting away parts of a silicon
researcher Albert Jeans shows off the layers of metal and silicon are carved into layer. next it’s back to the wet etcher to
starting material: a roll of plastic film coated at each one. each step erodes the template carve more metal layers. each step carves
w w w . t e ch n o l o g y r e v i e w . c o m demo 81
82 demo t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
O
ne of the greatest achievements of Lecture Titles
the mind is calculus. It belongs in 1. Two Ideas, Vast Implications
the pantheon of our accomplish- 2. Stop Sign Crime—The First Idea
ments with Shakespeare’s plays, Beethoven’s of Calculus—The Derivative
symphonies, and Einstein’s theory of relativ- 3. Another Car, Another Crime—
ity. Calculus is a beautiful idea exposing the The Second Idea of Calculus—
rational workings of the world. The Integral
Calculus, separately invented by Newton 4. The Fundamental Theorem of Calculus
and Leibniz, is one of the most fruitful strat- 5. Visualizing the Derivative—Slopes
egies for analyzing our world ever devised. 6. Derivatives the Easy Way—
© Digital Stock.
Calculus has made it possible to build bridges Symbol Pushing
that span miles of river, travel to the moon, 7. Abstracting the Derivative—
and predict patterns of population change. Circles and Belts
The fundamental insight of calculus unites 8. Circles, Pyramids, Cones, and Spheres
the way we see economics, astronomy, popu- a Distinguished Teaching Professor at The 9. Archimedes and the Tractrix
lation growth, engineering, and even baseball. University of Texas at Austin. Professor 10. The Integral and the
Calculus is the mathematical structure that Starbird has won several teaching awards, most Fundamental Theorem
lies at the core of a world of seemingly unre- recently the 2007 Mathematical Association of 11. Abstracting the Integral—
lated issues. America Deborah and Franklin Tepper Haimo Pyramids and Dams
National Award for Distinguished College or 12. Buffon’s Needle or p from Breadsticks
Expanding the Insight University Teaching of Mathematics, which is 13. Achilles, Tortoises, Limits,
Yet for all its computational power, calcu- limited to three recipients annually from the and Continuity
lus is the exploration of just two ideas—the 27,000 members of the MAA. 14. Calculators and Approximations
derivative and the integral—both of which 15. The Best of All Possible
About The Teaching Company®
arise from a commonsense analysis of motion. Worlds—Optimization
All a 1,300-page calculus textbook holds, We review hundreds of top-rated profes- 16. Economics and Architecture
Professor Michael Starbird asserts, are those sors from America’s best colleges and universi- 17. Galileo, Newton, and Baseball
two basic ideas and 1,298 pages of examples, ties each year. From this extraordinary group 18. Getting off the Line—Motion in Space
applications, and variations. we choose only those rated highest by panels 19. Mountain Slopes and Tangent Planes
of our customers. Fewer than 10% of these 20. Several Variables—Volumes Galore
Professor Starbird teaches that calculus world-class scholar-teachers are selected to
does not require a complicated vocabulary 21. The Fundamental Theorem Extended
make The Great Courses®. 22. Fields of Arrows—Differential Equations
or notation to understand it. “Calculus is a
crowning intellectual achievement of human- We’ve been doing this since 1990, pro- 23. Owls, Rats, Waves, and Guitars
ity that all intelligent people can appreciate, ducing more than 3,000 hours of material in 24. Calculus Everywhere
enjoy, and understand.” modern and ancient history, philosophy, liter-
ature, fine arts, the sciences, and mathematics
This series is not designed as a college cal- for intelligent, engaged, adult lifelong learn-
culus course; rather, it will help you see calcu- ers. If a course is ever less than completely
lus around you in the everyday world. Every satisfying, you may exchange it for another, or
step is in English rather than “mathese.” The we will refund your money promptly.
course takes the approach that every equation
is also a sentence that can be understood, and
solved, in English. SAVE $185!
About Your Professor OF F ER GOOD UNTI L SEpTEmb ER 14 , 2 0 1 0
Professor Michael Starbird is a distin- 1-800-TEACH-12 (1-800-832-2412) Special offer is available online at
guished and highly popular teacher with Fax: 703-378-3819 www.TEACH12.com/5tech
an uncommon talent for making the won-
Charge my credit card:
ders of mathematics clear to nonmathemati- The
Great Courses ®
us to fill your order immediately: 99% of all n Check or Money Order Enclosed Phone (If we have questions regarding your order—required for international orders)
orders placed by 2 pm eastern time ship that
* Non-U.S. Orders: Additional shipping charges apply.
same day. Order before September 14, 2010, For more details, call us or visit the FAQ page on our website.
n FREE CATALOG. Please send me a free copy of
to receive these savings. your current catalog (no purchase necessary).
** Virginia residents please add 5% sales tax.
Special offer is available online at www.TEACH12.com/5tech
Offer Good Through: September 14, 2010
A Memory
in future computers, which a 0, depending on the initial reduce the cost
would save energy. states of the two elements. of solar Power
and Logic Methods: HP research- The memristors could also Source: “efficient black
Device
ers fabricated memristors serve as a “latches”—that is, Silicon Solar cell with a
DenSity-graDeD nanoporouS
of various sizes on a silicon they retained data, “remem- Surface”
howard branz et al.
hP researchers substrate by growing metal bering” whether they had Applied Physics Letters 95:123501–
demonstrate logic nanowires, coating them recently switched to a 1 or a 0. 123503
with memristors
with titanium dioxide, and next steps: The basic mate- results: A simple chemi-
Source: “ ‘MeMriStive’ SwitcheS
topping them with another rial properties of the metal cal technique can create a
enable ‘Stateful’ logic
operationS via Material series of metal nanowires oxides used to make memris- highly antireflective surface
iMplication”
r. Stanley williams et al.
oriented perpendicular to tors are still not well under- on silicon solar cells. The new
Nature 464: 873–876 the first group. A memristor stood, so it’s not clear whether method for making this so-
is formed where the two lay- the devices will be as reliable called “black silicon” results in
results: Researchers at
Hewlett-Packard have shown
that nanoscale circuit ele-
ments called memristors,
which have previously been
made into memory devices,
can perform full Boolean logic,
the type used for computation
in computer processors.
why it matters: Memristor
logic devices are about an
order of magnitude smaller
than devices made from
transistors, so they could
pack more computing power
into a given space. Memris-
tor arrays that perform both
logic and memory functions
could eliminate the need
to transfer data between a
84 t e ch n o l o g y r e v i e w j u l y / a u g u s t 2010
between the surrounding air it rotates the towel with a out of 50 times. results: Researchers success-
and the bulk silicon, reducing two-fingered gripper and next steps: The robot cur- fully reconstructed the Web
reflection. uses high-resolution cam- rently takes about 20 min- search histories of specific
next steps: The research- eras to view it from mul- utes to fold a single towel; the Google users by stealing the
ers are working to increase tiple angles. An algorithm researchers are adapting the users’ credentials and
the cell efficiencies further developed by researchers at algorithm to speed up the impersonating them. They
and performing more detailed the University of California, process. They also plan to were able to identify about
calculations to determine how Berkeley, enables the robot to program robots to fold other 65 percent of what the users
RNA
tion credentials that it uses to undergo a second round in nanoparticles made of a
to identify particular users of flexibility. Pinpointing the sugar-based polymer, another
of its search service. By specific molecules that made particles target polymer that binds weakly to
intercepting these creden- it possible could inspire new rna interference water to enhance the particles’
to tumor cells
tials, the researchers were treatments. stability, and a protein that
able to impersonate a given Methods: The research- Source: “evideNce of rNai iN is displayed on the particles’
huMaNS froM SySteMically
user. Then they performed ers took neurons of a specific adMiNiStered sirNa via exterior and binds with recep-
automated test searches in type, called inhibitory neu- tarGeted NaNoparticleS” tors on cancer cells, signaling
Mark e. davis et al.
the user’s name and pieced rons, from the brains of fetal Nature 464: 1067–1070 the cells to absorb them. Once
together the Web search mice and grafted them into inside those cells, the nano-
history from the personal- newborn or young mice. Then results: Researchers at particles release the RNA mol-
ized recommendations that they gauged neural plastic- Caltech used specialized nano- ecules to attack their targets.
Google provided. ity by measuring changes in particles to deliver a type of Next steps: Researchers are
c o u rte sy o f d e r e k s o uthw e ll
Next steps: The researchers the animals’ brains after they gene-silencing RNA to cancer studying patients with other
plan to analyze other search were blinded in one eye. The cells in human subjects. Biop- tumors in an early-stage trial.
engines for similar leaks. They mice experienced the normal sies from three melanoma They won’t be able to assess
also continue to track the period of neural flexibility in patients who had been given how effective the treatment is
progress at fixing the prob- the visual system at around 28 the therapy showed that the at shrinking tumors until test-
lems they found. days. But a second period of particles entered cancer cells ing it in more patients.
RESTO RATION
TIME TRAVEL
THE BRAIN
MOORE’S
THROU GH
p10
LAW p36
N
p70
p18
IMAGES OF INNOVATION
82 full-color pages GROUND
ZERO
access port affords A circular
a 10-meter-di a glimpse into
SPE CIAL
ameter target
ber where, in the cham-
coming months,
powerful lasers
will be fired with
ISS UE
of Technology Review’s
goal of setting the
off
nuclear explosions.small thermo- on the
Until
beams very recently, industry
The laser
will enter through the
to harvesting square
flat
portswasat limited
the bottom (and piles
more its surface—like
salt onports, the
through
not pictured,
top). table salt that at
The circular
of ordinary local
the
access openings allow to
workersforare loading in trucks
instruments
monitor the explosions. that will
haul away, below. But with batter-
into the center eat up Extending 40 percent
ies expected to of the chamber
technology stories
for the forthcoming Chevy Volt,
which will run for 40 miles on
the
battery power alone. But will
Volt ever run on Bolivian lithium?
“For the next five years, automo-
tive won’t make a dent in lithium
supplies,” says Mark Verbrugge,
director of the Chemical Sciences
ONLY P H OTO E
S SAY
Igniting Fusio
n
$9.95!
RESEARCHER
SOON ATTEM S AT A CALIFO RNIA
NATIONAL
REACTIONS PT TO START SELF-S LAB WILL
USING THE USTAIN ING
IF IT WORKS WORLD’S FUSION
, IT COULD LARGE ST
TO ABUND BE A FIRST LASER S.
ANT FUSION STEP ON
POWER. THE ROAD
By KEVIN
BULLIS Photograph of the Uyuni salt flat:
See more photos
s by JASON
www MADARA
technologyreview.com/lithium
2008
/ FE B R U A R Y
WH ERE NES T E CH N O L O
GY REVIEW
JANUARY 56 IMAGES OF
INNOVATIO
N IMAGES OF INNOVATION
27
CEL L PHO R E V I E W. C O M
GO TO DIE
W W W . T E CH N O L O G Y
IMAGES OF
INNOVATIO
N 57
GENTLEMEN
The smart money is on smart women. Date a few.
B
y early 1984, the Reagan adminis- but that was far from clear at the time. sloW burn In 1984, some thought an
AIDS vaccine was only a few years away.
tration had spent three years being National Institutes of Health researcher
accused of inaction on AIDS—ever Robert Gallo had identified a virus that
since the Centers for Disease Control first he called HTLV-III, and a French group Once (and if) that is accomplished, animal
began tracking cases. Now the adminis- led by Luc Montagnier had found one tests must then be conducted to show that the
tration was keen to trumpet its progress. dubbed LAV a year earlier. They were the AIDS virus actually causes the disease, and
To have heard Margaret Heckler tell it at same virus (it was renamed HIV in 1986), that the vaccine is capable of safely neutral-
her April 23 news conference, it was all over but the competing claims would not be izing it. Human field trials are also required
but the shouting. Only a year earlier, said sorted out until 1987, when the research- before the vaccine can be widely used. All this
the secretary of health and human services, ers grudgingly shared credit—and royal- suggests that an AIDS vaccine is probably
she had “made the conquest of AIDS the ties on the patent for the blood test, which six to eight years away ... .
federal government’s number-one priority.” the U.S. Food and Drug Administration Obviously, Randal was being overly
And now not only had the “probable cause” approved in 1985. optimistic about a vaccine herself. But
of acquired immune deficiency syndrome Meanwhile, as Randal pointed out, she advocated trying to help those
been found; it had also become possible— Heckler’s predictions about a vac- already affected, an approach that many
thanks to a newly developed blood test—to cine were wildly overoptimistic, mostly researchers take today (see “Can AIDS Be
identify AIDS victims and AIDS-tainted because of the nature of the viruses that Cured?” p. 44).
blood “with essentially 100 percent cer- researchers were focusing on. In the meantime, no one is known to have
tainty.” And to top this dazzling array of Although we don’t know precisely which recovered from AIDS, and the problem is not
accomplishments, Heckler announced that a virus is responsible for AIDS, scientists are going away. The number of cases contin-
preventive vaccine should be “ready for test- fairly certain that the disease involves a spe- ues to double about every six months, and
ing in approximately two years.” cial class of viruses, known as retroviruses because the incubation period is so long, a lot
Science journalist Judith Randal, in a (to which both HTLV-III and LAV belong). more cases are certainly in the pipeline. Since
column for TR, had her doubts: The genes of most viruses are made of DNA, more than 4,600 AIDS patients have been
Not so fast, madam secretary. The truth which then makes RNA. But in retroviruses diagnosed in the United States alone, that
is that the cause of AIDS may or may not the reverse occurs, and the genes are made of means there could well be 100,000 or more in
have been found. And there is no evidence RNA, which then makes DNA. this country before the end of the decade.
that anything discovered to date will make Making a vaccine for a virus—let alone a Granted, treatment may very well have
a dime’s worth of difference to people who retrovirus—is difficult and time consuming. improved by that time. But this, too, is
already have AIDS or get it in the next few The virus must be grown in laboratory cul- unpredictable. A year ago researchers held
years. Even the blood test is not yet a fait ture and used intact to make a product that great hope for one type of interferon as well
accompli. And as for the vaccine, only the will generate antibodies, the molecules in the as a drug called interleukin two. However,
wildest of optimists expect it to be a reality body’s immune system that attack foreign neither medication is panning out. With a
before the end of the decade. substances. To make sure the vaccine won’t disease as complex as this one, the light at the
Heckler was right about research- cause the disease, weakened or dead strains end of the tunnel has a nasty habit of flicker-
ers’ having identified the cause of AIDS, of the virus must be developed. … ing brightly and then going dim.
ANTH O NY R U S S O
Technology Review (ISSN 1099-274X), Reg. U.S. Patent Office, is published bimonthly by the Massachusetts Institute of Technology. Entire contents ©2010. The editors seek diverse views, and authors’ opinions do not represent the official
policies of their institutions or those of MIT. Printed by Brown Printing Company, Waseca, MN. Periodicals postage paid at Boston, MA, and additional mailing offices. Postmaster: send address changes to Technology Review, Subscriber
Services Dept., PO Box 16327, North Hollywood, CA 91615, or via the Internet at www.technologyreview.com/customerservice. Basic subscription rates: $39 per year within the United States; in all other countries, US$52. Publication Mail
Agreement Number 40621028. Send undeliverable Canadian copies to PO Box 1051 Fort Erie, ON L2A 6C7. Printed in U.S.A. ABC audited