HCI research is moving out of the lab and onto the web. This new style of research -- Venture Research -- calls for a different set of skills and different metrics...Tessa Lau From BLOG@CACM | August 21, 2009 at 05:15 PM
Technology and information are ominpresent in Tokyo, but nobody seems to notice; a look at the future of ultra-integrated high technology.
Michael Conover From BLOG@CACM | August 20, 2009 at 09:25 AM
Real-world hyperlinks find their way into the most surprising places, and in the process become a staple of a Japanese mobile culture.Michael Conover From BLOG@CACM | July 16, 2009 at 10:50 PM
Science fiction has long told of a Universe thick with real-time speech-to-speech translation devices, and recent experiences in the land of the rising sun suggest...Michael Conover From BLOG@CACM | July 5, 2009 at 09:18 AM
July 6 2009, is the starting date for the second edition of “campus party” which is one of the most important technological shows of the world.Carlos Brewer From BLOG@CACM | July 5, 2009 at 09:29 PM
I often cringe when I hear highly technical engineers talk about people. I usually hear broad generalizations tossed about, like "people are lazy, that's why they...Jason Hong From BLOG@CACM | June 22, 2009 at 04:07 PM
Are we at a turning point in search is the real $100M question of the month. It's more about adaptation then features as most regular Internet Users head toward...Ramana Rao From BLOG@CACM | June 20, 2009 at 09:35 AM
With the Web delivering richer content to our desktops, why don't today's applications let us seamlessly create that content?Tessa Lau From BLOG@CACM | June 8, 2009 at 09:16 AM
As more information moves to the Web, we need better tools to manage it. Today's tools focus on static Web pages. However, I claim that the Web is becoming a platform...Tessa Lau From BLOG@CACM | May 22, 2009 at 10:00 AM
One potentially disturbing trend that came out in a recent eCrime meeting is that younger people 18-24 years old seem to be more susceptible to phishing attacks...Jason Hong From BLOG@CACM | May 18, 2009 at 09:10 AM
The Media Computation approach to introductory computing is mostly used for creative expression, but it can also lead to some surprises.Mark Guzdial From BLOG@CACM | May 14, 2009 at 09:24 AM
How do we create effective security warnings that people don't just swat away? Here, I report on one line of research that examines this question.Jason Hong From BLOG@CACM | April 22, 2009 at 01:49 PM
Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...Jason Hong From BLOG@CACM | April 22, 2009 at 10:11 AM
Someone may win the one million dollar Netflix Prize soon. Will the winning algorithm produce movie recommendations that people like?Greg Linden From BLOG@CACM | March 24, 2009 at 12:05 PM
The wavicle nature of our social existence provides a lens for understanding social filtering and its successes. Still, this doesn't quite get us to truly effective...Ramana Rao From BLOG@CACM | March 22, 2009 at 06:27 PM
When I first started working in the area of personal privacy I had what I would call a conventional view on privacy, which is how to minimize the flow of information...Jason Hong From BLOG@CACM | March 18, 2009 at 10:23 AM
I recently saw a Google Android phone at HotMobile 2009 and was intrigued by the drawing-based authentication mechanism built in. Basically, there's a 3x3 grid...Jason Hong From BLOG@CACM | March 5, 2009 at 02:43 PM
Three misconceptions about the field of human-computer interaction, as observed by an AI researcher turned HCI researcher in a large corporate research labTessa Lau From BLOG@CACM | March 4, 2009 at 12:00 AM
We are facing an increasing number of security failures, not because of problems with encryption algorithms, network protocols, or system implementations, but rather...Jason I. Hong From BLOG@CACM | February 13, 2009 at 02:43 PM