Sign In

Communications of the ACM

BLOG@CACM



Design, Functionality, and Diffusion of Innovations
From BLOG@CACM

Design, Functionality, and Diffusion of Innovations

What's the relationship between functionality and design? What kinds of factors influence whether people do or don't adopt a technology?

HPC and the Excluded Middle
From BLOG@CACM

HPC and the Excluded Middle

Betwixt and between ubiquitous consumer software and the ethereal realm of ultra-high-performance computing, lies the excluded middle, the world of day-to-day computational...

­UIST 2010: Ending Keynote
From BLOG@CACM

­UIST 2010: Ending Keynote

UIST 2010 has concluded with Jaron Lanier's inspiring and profound keynote after another set of paper presentations demonstrating innovative UI technology.

HCI Track at Grace Hopper
From BLOG@CACM

HCI Track at Grace Hopper

The Grace Hopper Celebration of Women in Computing had two special technical tracks added to this year's program: open source and human-computer interaction (HCI)...

Innovation Contest and Demos at UIST 2010
From BLOG@CACM

Innovation Contest and Demos at UIST 2010

We started the day at the beautiful Judson Memorial Church, crowded with more than 300 people attending UIST 2010, which is a new record.

­UIST 2010: Cursors Rock
From BLOG@CACM

­UIST 2010: Cursors Rock

Two papers about enhanced mouse cursors quickly drew my attention today. I briefly introduce these papers among other interesting topics of the second day of UIST...

Mind Meld in Group Decision Making
From BLOG@CACM

Mind Meld in Group Decision Making

Social computing remains a hot research topic, and basic research on understanding group decision making and conditions under which crowdsourcing can lead to advantages...

Why Is Great Design So Hard (Part Two)?
From BLOG@CACM

Why Is Great Design So Hard (Part Two)?

Previously, I asked the question of why great design is so hard to integrate in organizations. In this article, I take a look at how Apple does design, and what...

Remembering Internet Dogs
From BLOG@CACM

Remembering Internet Dogs

An iconic cartoon by Peter Steiner, which appeared in The New Yorker in 1993, captured the nature of the nascent Internet. It shows a dog seated at a computer,...

Evaluating the Success of Mentoring Programs
From BLOG@CACM

Evaluating the Success of Mentoring Programs

Can HCI evaluation methods help to assess the effectiveness of mentoring programs for women?

Why Is Great Design So Hard?
From BLOG@CACM

Why Is Great Design So Hard?

Why is good design so hard to accomplish for organizations? People are coming to the realization that design really matters, but it's not that they don't want to...

Interface Design For New Mothers
From BLOG@CACM

Interface Design For New Mothers

Why is there so little research into interface design for new mothers? Interface designers—hear my cry! Here are some pointers for designing interfaces for mothers...

2010 Edition of Campus Party Colombia
From BLOG@CACM

2010 Edition of Campus Party Colombia

A quick look at this special event in Colombia at which people breathe, eat, and sweat technology.

CFP: Intelligent Transportation Systems
From BLOG@CACM

CFP: Intelligent Transportation Systems

One of the goals of this years Computers Freedom and Privacy conference is to ask the question, "Can we be 'smart' and private?"  Wednesday's panel onIntellegent...

CFP: Activism and Social Networking Advocating For Privacy
From BLOG@CACM

CFP: Activism and Social Networking Advocating For Privacy

The Computers Freedom and Privacy Conference (CFP) continued Tuesday afternoon with a panel called Activism and Social Networking: Advocating for Privacy.  Panelists...

Virtual Education: One More Step to Close the Gap
From BLOG@CACM

Virtual Education: One More Step to Close the Gap

Is virtual education a feasible option to deliver rich educational contents to country side zones where no traditional schools are available?

Choosing Successful Research
From BLOG@CACM

Choosing Successful Research

How to choose research projects that are more likely to be successful.

Malvertisements Growing as Online Security Threat
From BLOG@CACM

Malvertisements Growing as Online Security Threat

Malvertisements are attempts to inject malware and scareware into advertisements, leveraging the reach that advertising networks have. This blog entry examines...

Consumerization of IT and Research
From BLOG@CACM

Consumerization of IT and Research

When a corporate, government, or university IT department of the 1970s debated an upgrade to its IBM S/370 mainframes, it is doubtful that the IT director was in...

Robots After Roomba: The Ethics of Electronic Companions
From BLOG@CACM

Robots After Roomba: The Ethics of Electronic Companions

As robots become woven into the fabric of daily life, what ethical issues will the world face?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account