acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Software Engineering in the Venice of the North
From BLOG@CACM

Software Engineering in the Venice of the North

ESEC-FSE 2013 (in Saint Petersburg,, 18-26 August) is the place to be for software engineering in 2013.

A Funny Thing Happened on the Way to Academia . . .
From BLOG@CACM

A Funny Thing Happened on the Way to Academia . . .

Aria Haghighi, an award-winning natural language processing researcher, describes his trek from a tenure-track faculty job at UMass-Amherst to his decision to leave...

Priming, Assimilation Bias, Social Proof in Social Media
From BLOG@CACM

Priming, Assimilation Bias, Social Proof in Social Media

As the US election draws near, what is the role that social media play in this political process?  How do social theories and psychological tendencies affect the...

Intermittent Net and Mobile/Cloud Development
From BLOG@CACM

Intermittent Net and Mobile/Cloud Development

Intermittent Net: The Importance of Distributed Thinking in Mobile/Cloud Application Development (and Usage)

When Is ­User-Centered Design Selfish?
From BLOG@CACM

When Is ­User-Centered Design Selfish?

User-centered design is now firmly established within HCI research. It is commonly praised for democratising system development and empowering users. But is this...

Conferences vs. Journals in Computer Science: An Alternative Perspective from Education
From BLOG@CACM

Conferences vs. Journals in Computer Science: An Alternative Perspective from Education

What if computer science conferences required proposals for presentations and then selected some for consideration in journals and book chapters?  

­Using 'Averages' While Thinking About Social Behavior? That's Probably Wrong!
From BLOG@CACM

­Using 'Averages' While Thinking About Social Behavior? That's Probably Wrong!

Using "averages" as a metric while thinking about Social Systems is probably wrong.

Avoiding the Rabbit Hole of Bad Science
From BLOG@CACM

Avoiding the Rabbit Hole of Bad Science

The scandal surrounding the recently published so-called empirical evidence for precognition has caused psychologists to reconsider the way they analyze their data...

Most Smartphone Apps Are Spyware
From BLOG@CACM

Most Smartphone Apps Are Spyware

Why does  this flashlight app use an Internet connection? Why does this Bible quotes app want my location data? Why does this game want my contacts list?

We Needn't Be Malevolent Grumps in 2012
From BLOG@CACM

We Needn't Be Malevolent Grumps in 2012

I propose that 2012 is the year to solve the nastiness problem in Computer Science. Zero tolerance for rude reviewers starts from midnight tonight.

Is the Computer Security Community Barking ­Up the Wrong Trees?
From BLOG@CACM

Is the Computer Security Community Barking ­Up the Wrong Trees?

There's a big mismatch right now between what the data says about computer security vulnerabilities and what kind of research is being done and products offered...

A Futuristic Health IT Scenario
From BLOG@CACM

A Futuristic Health IT Scenario

Our technology is the change agent for healthcare in the future.

High School CS Teachers as the New Computing Professionals
From BLOG@CACM

High School CS Teachers as the New Computing Professionals

If you were a human-centered computing research in 1960's, you'd study, "Who are software engineers?" Today, the new computing professionals to study are high school...

Why We Compute
From BLOG@CACM

Why We Compute

Why do we, as researchers and practitioners, have this deep and abiding love of computing? Why do we compute? I suspect it is a deeper, more primal yearning, one...

Password Policies Are Getting Out of Control
From BLOG@CACM

Password Policies Are Getting Out of Control

 At least 9 characters long. No repeated characters. At least 1 number, 1 special character, and 1 capital letter. Cannot be same as last 10 passwords. Must change...

Interspecies Interaction Design at CHI
From BLOG@CACM

Interspecies Interaction Design at CHI

A description of new frontiers in animal/human interaction design emerging at CHI. No cats or chickens were harmed in the writing of this article.

On the Importance of Replication in HCI and Social Computing Research
From BLOG@CACM

On the Importance of Replication in HCI and Social Computing Research

How does replication of experiments and systems move HCI research forward?  Wouldn't replication simply waste valuable researcher energy that might be better spent...

Information Privacy: Changing Norms and Expectations
From BLOG@CACM

Information Privacy: Changing Norms and Expectations

That picture of you at a family reunion, squinting into the sun, can rarely be delimited by a physical location once it is placed on the web. Instead, information...

When Everything Is Embarrassing: Designing With Teenage Girls
From BLOG@CACM

When Everything Is Embarrassing: Designing With Teenage Girls

A discussion of the difficulties of conducting user-centered design with teenage girls.

Why Have There Been So Many Security Breaches Recently?
From BLOG@CACM

Why Have There Been So Many Security Breaches Recently?

We're only five months into this year, but there have been a large number of sensational security breaches. Why have there been so many, and what can we do about...
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account