Malvertisements are attempts to inject malware and scareware into advertisements, leveraging the reach that advertising networks have. This blog entry examines...Jason Hong From BLOG@CACM | May 11, 2010 at 10:38 AM
Startups need their current business to be successful and self-sustaining before they place serious effort in building a general software platform.Ruben Ortega From BLOG@CACM | May 11, 2010 at 09:41 AM
Brief discussion on how social networks are now the battlefield of political campaigns, death threats and more.Carlos Brewer From BLOG@CACM | May 6, 2010 at 01:44 PM
Are people being rational when they ignore the security advice we give them? If so, what advice should we give them that they would not ignore?Greg Linden From BLOG@CACM | April 25, 2010 at 09:14 PM
Since several years ago, with the beginning of nanoscience, the idea having of micro factories, like household microwave ovens, is floating in the air.Carlos Brewer From BLOG@CACM | April 25, 2010 at 09:42 AM
When a corporate, government, or university IT department of the 1970s debated an upgrade to its IBM S/370 mainframes, it is doubtful that the IT director was in...Daniel Reed From BLOG@CACM | April 24, 2010 at 09:56 AM
A brief article pointing to a new large scale study published in Nature about the effect of brain training games.Judy Robertson From BLOG@CACM | April 23, 2010 at 10:11 AM
As robots become woven into the fabric of daily life, what ethical issues will the world face?Erika S. Poole From BLOG@CACM | April 16, 2010 at 05:33 PM
A marked difference at CHI 2010 compared to last year is the amount of research around social media and the use of social media during the conference. These practices...Ed H. Chi From BLOG@CACM | April 15, 2010 at 12:00 PM
The 2010 conference in Human Factors in Computing Systems has seen a noticeable uptick in projects on and engagement with machine learning.
Michael Bernstein From BLOG@CACM | April 15, 2010 at 09:59 AM
"Messy Futures: Culture, Technology and Research" was the title of Genevieve Bell’s opening plenary speech at CHI 2010, and it gave attendees a plethora of facts...Jack Rosenberger From BLOG@CACM | April 13, 2010 at 08:48 AM
Some thoughts about novel ways to attract girls to study computing: e-textiles and computational crafts.Judy Robertson From BLOG@CACM | April 12, 2010 at 08:50 AM
Many countries have started to control access to information on Internet for their citizens, most famous case being China, but Latin America does not escape this...Carlos Brewer From BLOG@CACM | April 11, 2010 at 09:01 AM
Computer science is becoming too broad to fit under the tyranny of a single bachelors degree. Cleaving the BS in CS into new degrees is a natural growth path.Mark Guzdial From BLOG@CACM | April 8, 2010 at 09:10 AM
The SIGCSE 2010 keynotes by Sally Fincher and Carl Weiman suggest how we connect research to changing practice. It's complicated! It's enculturation. Mark Guzdial From BLOG@CACM | April 8, 2010 at 09:12 AM
The first in a couple of articles in which I look at some ways of encouraging girls to engage with technical subjects; this focuses on an emotionally sensitive...Judy Robertson From BLOG@CACM | April 7, 2010 at 02:18 PM
Recently, there has been considerable renewed interest in the CAP theorem for database management system (DBMS) applications that span multiple processing sites...Michael Stonebraker From BLOG@CACM | April 5, 2010 at 11:28 AM