32 & 16 Years Ago
A summary of articles published in Computer 32 and 16 years ago.
IEEE Computer Society Awards
IEEE Computer Society celebrates its 70th anniversary by looking back at the accomplishments of its members and volunteers. This issue celebrates IEEE Computer Society awards.
User Interface Design in the 21st Century
The articles in this special issue report on user interface design on the frontiers of computing. They investigate topics with significant potential or risk, showing the maturity of new concepts and evidence of usefulness. Each article summarizes ...
Cuddly User Interfaces
Cuddly User Interfaces employ soft objects as interfaces between people and smart systems. They can contribute to the realization of ubiquitous computing because soft objects are familiar to us and induce a low psychological burden.
Graphical Instruction for Home Robots
Three projects--a cooking robot, a garment-folding robot, and an integrated household task-management interface for managing multiple robots--demonstrate proof-of-concept prototypes showcasing the future of home robots and their interaction design.
In Search of Coproduction: Smart Services as Reciprocal Activities
Service coproductions are reciprocal activities with no sharp boundary between providers and recipients; instead, all participants collaborate to enact the service. User participation is validated by recognition instead of extrinsic economic exchange. ...
Programming with Examples to Develop Data-Intensive User Interfaces
The programming-with-examples workflow lets developers create interactive applications with the help of example data. It takes a general programming environment and adds dedicated user interfaces for visualizing and managing the data. This lets both ...
Programmers Are Users Too: Human-Centered Methods for Improving Programming Tools
Human-centered methods can help researchers better understand and meet programmers' needs. Because programming is a human activity, many of these methods can be used without change. However, some programmer needs require new methods, which can also be ...
A Model-Based Approach to Designing Self-Aware IT Systems and Infrastructures
Results of a five-year research project and several industrial collaborations have produced tools that model the individual effects and complex dynamic interactions between an IT system's application workload and resource contention at multiple levels in ...
A Fast Boot, Fast Shutdown Technique for Android OS Devices
Increasingly complex Android OS applications demand additional software initialization and configuration during startup, which slows system boot time and inconveniences users. The authors propose an approach based on existing snapshot-imaging techniques ...
Enabling Stem Cell Characterization from Large Microscopy Images
Microscopes can now cover large spatial areas and capture stem cell behavior over time. However, without discovering statistically reliable quantitative stem cell quality measures, products cannot be released to market. A Web-based measurement system ...
Free Tuition for Community College: A Role for the Tech Community?
The Obama administration recently made three major announcements about a proposal to make community college tuition free. This shift offers the tech community an opportunity to share its unique viewpoint on the cost and structure of community colleges. ...
The Dictator's (False) Dilemma
One of the more persistent Cold War memes, the so-called dictator's dilemma refers to a worldview in which technology is a threat to dictatorships and a beacon of prosperity to free societies. But is this a valid dichotomy?
The H-1B Visa Controversy
The H-1B visa and other foreign-worker programs, as currently structured, aren't in the US national interest. Fortunately, there are simple, easily implementable solutions, should the government find the political will to take action.
Let the Sun Shine
Clemson University students designed an inexpensive sensor node and cloud computing infrastructure to collect real-time, localized solar irradiation data. This data can be used by consumers and utilities to predict the availability of solar-generated ...
"Good Enough" Security: The Best We'll Ever Have
Given that no system is completely immune from attack, cybersecurity advances, while important, should take a backseat to improving human awareness of security risks. An objective, consensus-based rating system is one means to achieve this end.
Aware of the Situation
Situational awareness draws upon ideas and applications that have permeated computing technology from its very inception. The Web extra at https://youtu.be/6j9QmxSvw44 is an audio recording of author David Alan Grier expanding on his Errant Hashtag column,...