ESEC-FSE 2013 (in Saint Petersburg,, 18-26 August) is the place to be for software engineering in 2013.Bertrand Meyer From BLOG@CACM | January 22, 2013 at 09:15 AM
Aria Haghighi, an award-winning natural language processing researcher, describes his trek from a tenure-track faculty job at UMass-Amherst to his decision to leave...Aria Haghighi From BLOG@CACM | November 21, 2012 at 03:40 PM
As the US election draws near, what is the role that social media play in this political process? How do social theories and psychological tendencies affect the...Ed H. Chi From BLOG@CACM | October 24, 2012 at 05:24 PM
Intermittent Net: The Importance of Distributed Thinking in Mobile/Cloud Application Development (and Usage)
George K. Thiruvathukal From BLOG@CACM | October 3, 2012 at 11:50 AM
User-centered design is now firmly established within HCI research. It is commonly praised for democratising system development and empowering users. But is this...Judy Robertson From BLOG@CACM | September 15, 2012 at 04:04 PM
What if computer science conferences required proposals for presentations and then selected some for consideration in journals and book chapters? Juan E. Gilbert From BLOG@CACM | July 27, 2012 at 11:45 AM
The scandal surrounding the recently published so-called empirical evidence for precognition has caused psychologists to reconsider the way they analyze their data...Judy Robertson From BLOG@CACM | March 20, 2012 at 10:44 AM
Why does this flashlight app use an Internet connection? Why does this Bible quotes app want my location data? Why does this game want my contacts list?Jason Hong From BLOG@CACM | February 17, 2012 at 02:23 PM
I propose that 2012 is the year to solve the nastiness problem in Computer Science. Zero tolerance for rude reviewers starts from midnight tonight.Judy Robertson From BLOG@CACM | December 31, 2011 at 09:55 AM
There's a big mismatch right now between what the data says about computer security vulnerabilities and what kind of research is being done and products offered...Jason Hong From BLOG@CACM | December 15, 2011 at 04:08 PM
If you were a human-centered computing research in 1960's, you'd study, "Who are software engineers?" Today, the new computing professionals to study are high school...Mark Guzdial From BLOG@CACM | October 28, 2011 at 09:39 AM
Why do we, as researchers and practitioners, have this deep and abiding love of computing? Why do we compute? I suspect it is a deeper, more primal yearning, one...Daniel Reed From BLOG@CACM | September 2, 2011 at 09:23 AM
At least 9 characters long. No repeated characters. At least 1 number, 1 special character, and 1 capital letter. Cannot be same as last 10 passwords. Must change...Jason Hong From BLOG@CACM | August 23, 2011 at 09:44 AM
A description of new frontiers in animal/human interaction design emerging at CHI. No cats or chickens were harmed in the writing of this article.
Judy Robertson From BLOG@CACM | June 24, 2011 at 09:38 AM
How does replication of experiments and systems move HCI research forward? Wouldn't replication simply waste valuable researcher energy that might be better spent...Ed H. Chi From BLOG@CACM | June 22, 2011 at 09:31 AM
That picture of you at a family reunion, squinting into the sun, can rarely be delimited by a physical location once it is placed on the web. Instead, information...Daniel Reed From BLOG@CACM | May 11, 2011 at 12:46 PM
We're only five months into this year, but there have been a large number of sensational security breaches. Why have there been so many, and what can we do about...Jason Hong From BLOG@CACM | April 27, 2011 at 12:50 PM