acm-header
Sign In

Communications of the ACM

BLOG@CACM


bg-corner

Terms of Service, Ethics and Bias
From BLOG@CACM

Terms of Service, Ethics and Bias

Data mining researchers, application builders, and social scientists want to collect and analyze data about your activities online. But when do we cross the line...

Time Travel Is Now Possible
From BLOG@CACM

Time Travel Is Now Possible

I will be reporting on two of the sessions I attended this afternoon. One session was on analyzing interactions, which dealt primarily with methods for measuring...

Clay Shirky: Doing Work, or Doing Work?
From BLOG@CACM

Clay Shirky: Doing Work, or Doing Work?

In a keynote delivered to this year's ACM conference on Computer Supported Cooperative Work (CSCW), author and academic Clay Shirky captured the distinction between...

Paucity to Plethora: Jevons Paradox
From BLOG@CACM

Paucity to Plethora: Jevons Paradox

I suspect much of computing is still socially conditioned by its roots in computational paucity to recognize fully the true opportunity afforded by computational...

WSDM 2010: Day 3
From BLOG@CACM

WSDM 2010: Day 3

Third day of WSDM 2010.

WSDM 2010: Day 2
From BLOG@CACM

WSDM 2010: Day 2

 Report on 2nd day of WSDM 2010.

WSDM 2010: Day 1
From BLOG@CACM

WSDM 2010: Day 1

 Report on first day of WSDM 2010 conference.

Third Workshop on Search and Social Media (SSM 2010)
From BLOG@CACM

Third Workshop on Search and Social Media (SSM 2010)

 Report on Third Workshop on Search and Social Media (SSM 2010).

What Will 2010 Bring?
From BLOG@CACM

What Will 2010 Bring?

What changes will we see in 2010 in computing?

The DARPA Network Challenge and the Design of Social Participation Systems
From BLOG@CACM

The DARPA Network Challenge and the Design of Social Participation Systems

What have we learned from the DARPA Network Challenge and the design of social participation systems?  The principal concern for designers of social participation...

The Ghosts of Holiday Shopping: Past, Present and Future
From BLOG@CACM

The Ghosts of Holiday Shopping: Past, Present and Future

In many parts of the western world, the frenzy of holiday shopping has reached its crescendo.  With apologies to Charles Dickens, it is instructive to consider...

The Rise of the External Brain
From BLOG@CACM

The Rise of the External Brain

From an entirely unexpected source, we begin to realize the dream of an external brain that supplements our knowledge, wisdom, and memories.

Better GPS Software Through ­User Feedback
From BLOG@CACM

Better GPS Software Through ­User Feedback

I appreciate my GPS software can tell me where I am, but it should get better at predicting where I will go.

What the Cloud Means For HCI
From BLOG@CACM

What the Cloud Means For HCI

The CTO roundtable on cloud computing article in a past issue of CACM made me start thinking about what cloud computing really means for HCI and how people will...

Impact of the Social Web on Computing Research
From BLOG@CACM

Impact of the Social Web on Computing Research

Scientists from diverse fields are feeling the impact of Social Web systems and are publishing research papers that characterize, model, prototype, and evaluate...

Collaborating Across Boundaries
From BLOG@CACM

Collaborating Across Boundaries

In a global world, collaboration and communicating with colleagues in different geographical locations is becoming critically important.  What kinds of tools can...

Collective Intelligence: a Fad or Real Research?
From BLOG@CACM

Collective Intelligence: a Fad or Real Research?

A recent trend in HCI research is the extension of the long time goal of augmenting human intelligence to "augmenting social intelligence."  That is, enabling not...

Student Research Competition at Grace Hopper
From BLOG@CACM

Student Research Competition at Grace Hopper

Highlights of the top six posters/presentations at the Student Research Competition

Smartphones and Health Systems Research at Intel Seattle
From BLOG@CACM

Smartphones and Health Systems Research at Intel Seattle

The ubiquity of smartphones  and their increasing ability to collect and transmit information will lead the way for the next advances in health monitoring and improvement...

Designing Effective Warnings
From BLOG@CACM

Designing Effective Warnings

Computer security warnings are something we all see everyday, but many people find them annoying and ignore them. What are better ways of designing warnings?
Sign In for Full Access
» Forgot Password? » Create an ACM Web Account