A recent trend in HCI research is the extension of the long time goal of augmenting human intelligence to "augmenting social intelligence." That is, enabling not...Ed H. Chi From BLOG@CACM | October 5, 2009 at 09:47 AM
The ubiquity of smartphones and their increasing ability to collect and transmit information will lead the way for the next advances in health monitoring and improvement...Ruben Ortega From BLOG@CACM | October 2, 2009 at 02:59 PM
Computer security warnings are something we all see everyday, but many people find them annoying and ignore them. What are better ways of designing warnings?Jason Hong From BLOG@CACM | September 30, 2009 at 02:30 PM
HCI research is moving out of the lab and onto the web. This new style of research -- Venture Research -- calls for a different set of skills and different metrics...Tessa Lau From BLOG@CACM | August 21, 2009 at 05:15 PM
Technology and information are ominpresent in Tokyo, but nobody seems to notice; a look at the future of ultra-integrated high technology.
Michael Conover From BLOG@CACM | August 20, 2009 at 09:25 AM
Real-world hyperlinks find their way into the most surprising places, and in the process become a staple of a Japanese mobile culture.Michael Conover From BLOG@CACM | July 16, 2009 at 10:50 PM
Science fiction has long told of a Universe thick with real-time speech-to-speech translation devices, and recent experiences in the land of the rising sun suggest...Michael Conover From BLOG@CACM | July 5, 2009 at 09:18 AM
July 6 2009, is the starting date for the second edition of “campus party” which is one of the most important technological shows of the world.Carlos Brewer From BLOG@CACM | July 5, 2009 at 09:29 PM
I often cringe when I hear highly technical engineers talk about people. I usually hear broad generalizations tossed about, like "people are lazy, that's why they...Jason Hong From BLOG@CACM | June 22, 2009 at 04:07 PM
Are we at a turning point in search is the real $100M question of the month. It's more about adaptation then features as most regular Internet Users head toward...Ramana Rao From BLOG@CACM | June 20, 2009 at 09:35 AM
With the Web delivering richer content to our desktops, why don't today's applications let us seamlessly create that content?Tessa Lau From BLOG@CACM | June 8, 2009 at 09:16 AM
As more information moves to the Web, we need better tools to manage it. Today's tools focus on static Web pages. However, I claim that the Web is becoming a platform...Tessa Lau From BLOG@CACM | May 22, 2009 at 10:00 AM
One potentially disturbing trend that came out in a recent eCrime meeting is that younger people 18-24 years old seem to be more susceptible to phishing attacks...Jason Hong From BLOG@CACM | May 18, 2009 at 09:10 AM
The Media Computation approach to introductory computing is mostly used for creative expression, but it can also lead to some surprises.Mark Guzdial From BLOG@CACM | May 14, 2009 at 09:24 AM
How do we create effective security warnings that people don't just swat away? Here, I report on one line of research that examines this question.Jason Hong From BLOG@CACM | April 22, 2009 at 01:49 PM
Although many people in computer security think that user education is hopeless, security education can really work, but only if it's done right. I report on a...Jason Hong From BLOG@CACM | April 22, 2009 at 10:11 AM
Someone may win the one million dollar Netflix Prize soon. Will the winning algorithm produce movie recommendations that people like?Greg Linden From BLOG@CACM | March 24, 2009 at 12:05 PM
The wavicle nature of our social existence provides a lens for understanding social filtering and its successes. Still, this doesn't quite get us to truly effective...Ramana Rao From BLOG@CACM | March 22, 2009 at 06:27 PM