Are people being rational when they ignore the security advice we give them? If so, what advice should we give them that they would not ignore?Greg Linden From BLOG@CACM | April 25, 2010 at 09:14 PM
Since several years ago, with the beginning of nanoscience, the idea having of micro factories, like household microwave ovens, is floating in the air.Carlos Brewer From BLOG@CACM | April 25, 2010 at 09:42 AM
When a corporate, government, or university IT department of the 1970s debated an upgrade to its IBM S/370 mainframes, it is doubtful that the IT director was in...Daniel Reed From BLOG@CACM | April 24, 2010 at 09:56 AM
A brief article pointing to a new large scale study published in Nature about the effect of brain training games.Judy Robertson From BLOG@CACM | April 23, 2010 at 10:11 AM
As robots become woven into the fabric of daily life, what ethical issues will the world face?Erika S. Poole From BLOG@CACM | April 16, 2010 at 05:33 PM
A marked difference at CHI 2010 compared to last year is the amount of research around social media and the use of social media during the conference. These practices...Ed H. Chi From BLOG@CACM | April 15, 2010 at 12:00 PM
The 2010 conference in Human Factors in Computing Systems has seen a noticeable uptick in projects on and engagement with machine learning.
Michael Bernstein From BLOG@CACM | April 15, 2010 at 09:59 AM
"Messy Futures: Culture, Technology and Research" was the title of Genevieve Bell’s opening plenary speech at CHI 2010, and it gave attendees a plethora of facts...Jack Rosenberger From BLOG@CACM | April 13, 2010 at 08:48 AM
Some thoughts about novel ways to attract girls to study computing: e-textiles and computational crafts.Judy Robertson From BLOG@CACM | April 12, 2010 at 08:50 AM
Many countries have started to control access to information on Internet for their citizens, most famous case being China, but Latin America does not escape this...Carlos Brewer From BLOG@CACM | April 11, 2010 at 09:01 AM
Computer science is becoming too broad to fit under the tyranny of a single bachelors degree. Cleaving the BS in CS into new degrees is a natural growth path.Mark Guzdial From BLOG@CACM | April 8, 2010 at 09:10 AM
The SIGCSE 2010 keynotes by Sally Fincher and Carl Weiman suggest how we connect research to changing practice. It's complicated! It's enculturation. Mark Guzdial From BLOG@CACM | April 8, 2010 at 09:12 AM
The first in a couple of articles in which I look at some ways of encouraging girls to engage with technical subjects; this focuses on an emotionally sensitive...Judy Robertson From BLOG@CACM | April 7, 2010 at 02:18 PM
Recently, there has been considerable renewed interest in the CAP theorem for database management system (DBMS) applications that span multiple processing sites...Michael Stonebraker From BLOG@CACM | April 5, 2010 at 11:28 AM
What are the implications of electronic voting? Which countries are using this system? What are the advantages of using such systems? And what are the problems...Carlos Brewer From BLOG@CACM | April 4, 2010 at 09:48 AM
Let's rethink computer science education in face of Web 1.0, Web 2.0, and beyond. The Internet have changed everything we know about how computing is done. It's...Ed H. Chi From BLOG@CACM | April 1, 2010 at 10:09 AM
Investing in a large amount of software testing can be difficult to justify, particularly for a startup company. How much software testing is enough?Ruben Ortega From BLOG@CACM | March 29, 2010 at 10:51 AM
Computer science education gets a boost from an historic document released by governors and education leaders in the United States and you can show your support...Cameron Wilson From BLOG@CACM | March 26, 2010 at 11:01 AM