Sign In

Communications of the ACM



HPC and the Excluded Middle
From [email protected]

HPC and the Excluded Middle

Betwixt and between ubiquitous consumer software and the ethereal realm of ultra-high-performance computing, lies the excluded middle, the world of day-to-day computational...

­UIST 2010: Ending Keynote
From [email protected]

­UIST 2010: Ending Keynote

UIST 2010 has concluded with Jaron Lanier's inspiring and profound keynote after another set of paper presentations demonstrating innovative UI technology.

HCI Track at Grace Hopper
From [email protected]

HCI Track at Grace Hopper

The Grace Hopper Celebration of Women in Computing had two special technical tracks added to this year's program: open source and human-computer interaction (HCI)...

Innovation Contest and Demos at UIST 2010
From [email protected]

Innovation Contest and Demos at UIST 2010

We started the day at the beautiful Judson Memorial Church, crowded with more than 300 people attending UIST 2010, which is a new record.

­UIST 2010: Cursors Rock
From [email protected]

­UIST 2010: Cursors Rock

Two papers about enhanced mouse cursors quickly drew my attention today. I briefly introduce these papers among other interesting topics of the second day of UIST...

Mind Meld in Group Decision Making
From [email protected]

Mind Meld in Group Decision Making

Social computing remains a hot research topic, and basic research on understanding group decision making and conditions under which crowdsourcing can lead to advantages...

Why Is Great Design So Hard (Part Two)?
From [email protected]

Why Is Great Design So Hard (Part Two)?

Previously, I asked the question of why great design is so hard to integrate in organizations. In this article, I take a look at how Apple does design, and what...

Remembering Internet Dogs
From [email protected]

Remembering Internet Dogs

An iconic cartoon by Peter Steiner, which appeared in The New Yorker in 1993, captured the nature of the nascent Internet. It shows a dog seated at a computer,...

Evaluating the Success of Mentoring Programs
From [email protected]

Evaluating the Success of Mentoring Programs

Can HCI evaluation methods help to assess the effectiveness of mentoring programs for women?

Why Is Great Design So Hard?
From [email protected]

Why Is Great Design So Hard?

Why is good design so hard to accomplish for organizations? People are coming to the realization that design really matters, but it's not that they don't want to...

Interface Design For New Mothers
From [email protected]

Interface Design For New Mothers

Why is there so little research into interface design for new mothers? Interface designers—hear my cry! Here are some pointers for designing interfaces for mothers...

2010 Edition of Campus Party Colombia
From [email protected]

2010 Edition of Campus Party Colombia

A quick look at this special event in Colombia at which people breathe, eat, and sweat technology.

CFP: Intelligent Transportation Systems
From [email protected]

CFP: Intelligent Transportation Systems

One of the goals of this years Computers Freedom and Privacy conference is to ask the question, "Can we be 'smart' and private?"  Wednesday's panel onIntellegent...

CFP: Activism and Social Networking Advocating For Privacy
From [email protected]

CFP: Activism and Social Networking Advocating For Privacy

The Computers Freedom and Privacy Conference (CFP) continued Tuesday afternoon with a panel called Activism and Social Networking: Advocating for Privacy.  Panelists...

Virtual Education: One More Step to Close the Gap
From [email protected]

Virtual Education: One More Step to Close the Gap

Is virtual education a feasible option to deliver rich educational contents to country side zones where no traditional schools are available?

Choosing Successful Research
From [email protected]

Choosing Successful Research

How to choose research projects that are more likely to be successful.

Malvertisements Growing as Online Security Threat
From [email protected]

Malvertisements Growing as Online Security Threat

Malvertisements are attempts to inject malware and scareware into advertisements, leveraging the reach that advertising networks have. This blog entry examines...

Consumerization of IT and Research
From [email protected]

Consumerization of IT and Research

When a corporate, government, or university IT department of the 1970s debated an upgrade to its IBM S/370 mainframes, it is doubtful that the IT director was in...

Robots After Roomba: The Ethics of Electronic Companions
From [email protected]

Robots After Roomba: The Ethics of Electronic Companions

As robots become woven into the fabric of daily life, what ethical issues will the world face?

What Makes a Good HCI Systems Paper?
From [email protected]

What Makes a Good HCI Systems Paper?

 Proposing a standard for reviewing HCI systems papers.
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account