Sign In

Communications of the ACM

BLOG@CACM



Smartphones and Health Systems Research at Intel Seattle
From BLOG@CACM

Smartphones and Health Systems Research at Intel Seattle

The ubiquity of smartphones  and their increasing ability to collect and transmit information will lead the way for the next advances in health monitoring and improvement...

Designing Effective Warnings
From BLOG@CACM

Designing Effective Warnings

Computer security warnings are something we all see everyday, but many people find them annoying and ignore them. What are better ways of designing warnings?

Venture Research
From BLOG@CACM

Venture Research

HCI research is moving out of the lab and onto the web.  This new style of research -- Venture Research -- calls for a different set of skills and different metrics...

­Ubiquity
From BLOG@CACM

­Ubiquity

Technology and information are ominpresent in Tokyo, but nobody seems to notice; a look at the future of ultra-integrated high technology. 

Advertainment
From BLOG@CACM

Advertainment

Real-world hyperlinks find their way into the most surprising places, and in the process become a staple of a Japanese mobile culture.

What's That You Say?
From BLOG@CACM

What's That You Say?

Science fiction has long told of a Universe thick with real-time speech-to-speech translation devices, and recent experiences in the land of the rising sun suggest...

Campus Party Colombia
From BLOG@CACM

Campus Party Colombia

 July 6 2009, is the starting date for the second edition of “campus party” which is one of the most important technological shows of the world.

Designing Effective Interfaces For ­Usable Privacy and Security
From BLOG@CACM

Designing Effective Interfaces For ­Usable Privacy and Security

I often cringe when I hear highly technical engineers talk about people. I usually hear broad generalizations tossed about, like "people are lazy, that's why they...

Changing Search Behavior on the World Wild Web
From BLOG@CACM

Changing Search Behavior on the World Wild Web

Are we at a turning point in search is the real $100M question of the month.  It's more about adaptation then features as most regular Internet Users head toward...

The Future of Applications?
From BLOG@CACM

The Future of Applications?

With the Web delivering richer content to our desktops, why don't today's applications let us seamlessly create that content?

Building a Smarter Web
From BLOG@CACM

Building a Smarter Web

As more information moves to the Web, we need better tools to manage it. Today's tools focus on static Web pages. However, I claim that the Web is becoming a platform...

Helping Younger People Protect Themselves from Security Attacks
From BLOG@CACM

Helping Younger People Protect Themselves from Security Attacks

One potentially disturbing trend that came out in a recent eCrime meeting is that younger people 18-24 years old seem to be more susceptible to phishing attacks...

Media Computation: For Creativity and Surprises
From BLOG@CACM

Media Computation: For Creativity and Surprises

The Media Computation approach to introductory computing is mostly used for creative expression, but it can also lead to some surprises.

Designing Effective Security Warnings
From BLOG@CACM

Designing Effective Security Warnings

How do we create effective security warnings that people don't just swat away? Here, I report on one line of research that examines this question.

Security Education Can Really Work (but Only If It's Done Right)
From BLOG@CACM

Security Education Can Really Work (but Only If It's Done Right)

Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...

Hello, Computer
From BLOG@CACM

Hello, Computer

Reflections on the present and future of speech-based interfaces.

What Is a Good Recommendation Algorithm?
From BLOG@CACM

What Is a Good Recommendation Algorithm?

Someone may win the one million dollar Netflix Prize soon.  Will the winning algorithm produce movie recommendations that people like?

Social Wavicles and Personalized Flows
From BLOG@CACM

Social Wavicles and Personalized Flows

The wavicle nature of our social existence provides a lens for understanding social filtering and its successes.  Still, this doesn't quite get us to truly effective...

Privacy As... Sharing More Information?
From BLOG@CACM

Privacy As... Sharing More Information?

When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...

Google Android Authentication
From BLOG@CACM

Google Android Authentication

I recently saw a Google Android phone at HotMobile 2009 and was intrigued by the drawing-based authentication mechanism built in. Basically, there's a 3x3 grid...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account