acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

High School CS Teachers as the New Computing Professionals
From BLOG@CACM

High School CS Teachers as the New Computing Professionals

If you were a human-centered computing research in 1960's, you'd study, "Who are software engineers?" Today, the new computing professionals to study are high school...

Why We Compute
From BLOG@CACM

Why We Compute

Why do we, as researchers and practitioners, have this deep and abiding love of computing? Why do we compute? I suspect it is a deeper, more primal yearning, one...

Password Policies Are Getting Out of Control
From BLOG@CACM

Password Policies Are Getting Out of Control

 At least 9 characters long. No repeated characters. At least 1 number, 1 special character, and 1 capital letter. Cannot be same as last 10 passwords. Must change...

Interspecies Interaction Design at CHI
From BLOG@CACM

Interspecies Interaction Design at CHI

A description of new frontiers in animal/human interaction design emerging at CHI. No cats or chickens were harmed in the writing of this article.

On the Importance of Replication in HCI and Social Computing Research
From BLOG@CACM

On the Importance of Replication in HCI and Social Computing Research

How does replication of experiments and systems move HCI research forward?  Wouldn't replication simply waste valuable researcher energy that might be better spent...

Information Privacy: Changing Norms and Expectations
From BLOG@CACM

Information Privacy: Changing Norms and Expectations

That picture of you at a family reunion, squinting into the sun, can rarely be delimited by a physical location once it is placed on the web. Instead, information...

When Everything Is Embarrassing: Designing With Teenage Girls
From BLOG@CACM

When Everything Is Embarrassing: Designing With Teenage Girls

A discussion of the difficulties of conducting user-centered design with teenage girls.

Why Have There Been So Many Security Breaches Recently?
From BLOG@CACM

Why Have There Been So Many Security Breaches Recently?

We're only five months into this year, but there have been a large number of sensational security breaches. Why have there been so many, and what can we do about...

Stats: We're Doing It Wrong
From BLOG@CACM

Stats: We're Doing It Wrong

A summary of the mistakes researchers make when analysing likert type data and what the correct methods should be.

Who Needs a Tablet?
From BLOG@CACM

Who Needs a Tablet?

Tablets do not solve a mainstream problem, they only serve a niche.

The Wonderful World of Cooking Interfaces
From BLOG@CACM

The Wonderful World of Cooking Interfaces

This is an article describing some recent (and bizarre) interfaces to support cooking. The intersection of computer science and culinary art is not as small as...

Intellectual Amplification via Computing
From BLOG@CACM

Intellectual Amplification via Computing

As the recent performance of IBM's Watson system on the game show Jeopardy! illustrated, the combination of large-scale data, rich algorithm suites and powerful...

Who Needs a Netbook?
From BLOG@CACM

Who Needs a Netbook?

In only a couple years, improved smartphones and laptops have closed the niche that netbooks lived in. Rather than mourn the loss of netbooks, let's celebrate their...

Design, Functionality, and Diffusion of Innovations
From BLOG@CACM

Design, Functionality, and Diffusion of Innovations

What's the relationship between functionality and design? What kinds of factors influence whether people do or don't adopt a technology?

HPC and the Excluded Middle
From BLOG@CACM

HPC and the Excluded Middle

Betwixt and between ubiquitous consumer software and the ethereal realm of ultra-high-performance computing, lies the excluded middle, the world of day-to-day computational...

­UIST 2010: Ending Keynote
From BLOG@CACM

­UIST 2010: Ending Keynote

UIST 2010 has concluded with Jaron Lanier's inspiring and profound keynote after another set of paper presentations demonstrating innovative UI technology.

HCI Track at Grace Hopper
From BLOG@CACM

HCI Track at Grace Hopper

The Grace Hopper Celebration of Women in Computing had two special technical tracks added to this year's program: open source and human-computer interaction (HCI)...

Innovation Contest and Demos at UIST 2010
From BLOG@CACM

Innovation Contest and Demos at UIST 2010

We started the day at the beautiful Judson Memorial Church, crowded with more than 300 people attending UIST 2010, which is a new record.

­UIST 2010: Cursors Rock
From BLOG@CACM

­UIST 2010: Cursors Rock

Two papers about enhanced mouse cursors quickly drew my attention today. I briefly introduce these papers among other interesting topics of the second day of UIST...

Mind Meld in Group Decision Making
From BLOG@CACM

Mind Meld in Group Decision Making

Social computing remains a hot research topic, and basic research on understanding group decision making and conditions under which crowdsourcing can lead to advantages...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account