I often cringe when I hear highly technical engineers talk about people. I usually hear broad generalizations tossed about, like "people are lazy, that's why they...Jason Hong From BLOG@CACM | June 22, 2009 at 04:07 PM
Are we at a turning point in search is the real $100M question of the month. It's more about adaptation then features as most regular Internet Users head toward...Ramana Rao From BLOG@CACM | June 20, 2009 at 09:35 AM
With the Web delivering richer content to our desktops, why don't today's applications let us seamlessly create that content?Tessa Lau From BLOG@CACM | June 8, 2009 at 09:16 AM
As more information moves to the Web, we need better tools to manage it. Today's tools focus on static Web pages. However, I claim that the Web is becoming a platform...Tessa Lau From BLOG@CACM | May 22, 2009 at 10:00 AM
One potentially disturbing trend that came out in a recent eCrime meeting is that younger people 18-24 years old seem to be more susceptible to phishing attacks...Jason Hong From BLOG@CACM | May 18, 2009 at 09:10 AM
The Media Computation approach to introductory computing is mostly used for creative expression, but it can also lead to some surprises.Mark Guzdial From BLOG@CACM | May 14, 2009 at 09:24 AM
How do we create effective security warnings that people don't just swat away? Here, I report on one line of research that examines this question.Jason Hong From BLOG@CACM | April 22, 2009 at 01:49 PM
Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...Jason Hong From BLOG@CACM | April 22, 2009 at 10:11 AM
Someone may win the one million dollar Netflix Prize soon. Will the winning algorithm produce movie recommendations that people like?Greg Linden From BLOG@CACM | March 24, 2009 at 12:05 PM
The wavicle nature of our social existence provides a lens for understanding social filtering and its successes. Still, this doesn't quite get us to truly effective...Ramana Rao From BLOG@CACM | March 22, 2009 at 06:27 PM
When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...Jason Hong From BLOG@CACM | March 18, 2009 at 10:23 AM
I recently saw a Google Android phone at HotMobile 2009 and was intrigued by the drawing-based authentication mechanism built in. Basically, there's a 3x3 grid...Jason Hong From BLOG@CACM | March 5, 2009 at 02:43 PM
Three misconceptions about the field of human-computer interaction, as observed by an AI researcher turned HCI researcher in a large corporate research labTessa Lau From BLOG@CACM | March 4, 2009 at 12:00 AM
We are facing an increasing number of security failures, not because of problems with encryption algorithms, network protocols, or system implementations, but rather...Jason I. Hong From BLOG@CACM | February 13, 2009 at 02:43 PM