Finding your balance in the products and services debate
Software companies must balance product and service revenues to survive bad times and grow rapidly in good times.
The missing customer
Peter J. Denning, Robert Dunham
We can no longer afford to treat our customers as abstract entities. They are real people with real concerns seeking our professional...
The rise and fall of an e-commerce program
E-commerce may be here to stay, but how to teach it is still up for debate at many institutions.
Bounty hunting in the patent base
Like Robin Hood and his band of merry men, patent bounty hunters and software agent communities may one day patrol the patent...
If there was a Moore's Law for user interfaces, it would state that the number of computers per user will double every two years...
What's in the eyes for attentive input
Eye-tracking systems hold some of the greatest potential among AUIs. Here, two systems that focus on eye gazing demonstrate how...
Interacting with groups of computers
Jeffrey S. Shell, Ted Selker, Roel Vertegaal
AUIs recognize human attention in order to respect and react to how users distribute their attention in technology-laden environments...
Models of attention in computing and communication: from principles to applications
Eric Horvitz, Carl Kadie, Tim Paek, David Hovel
Creating computing and communication systems that sense and reason about human attention by fusing together information from...
Focusing on the essential: considering attention in display design
Patrick Baudisch, Doug DeCarlo, Andrew T. Duchowski, Wilson S. Geisler
Attentive displays address the need for rendering power and computer display resolution. The five examples presented here illustrate...
Attuning notification design to user goals and attention costs
D. Scott McCrickard, C. M. Chewar
Why is the attentive user interface paradigm important for human-computer interaction? The human attention system is so sensitive...
Adaptive brain interfaces
José del R. Millán
Users interact with physical devices through nothing more than the voluntary control of their own mental activity.
A framework for using insurance for cyber-risk management
Lawrence A. Gordon, Martin P. Loeb, Tashfeen Sohail
Seeking to protect an organization against a new form of business losses.
Spatial data integration in a collaborative design framework
Gustavo da Rocha Barreto Pinto, Sergio Palma J. Medeiros, Jano Moreira de Souza, Julia Celia Mercedes Strauch, Carlete Rosana Ferreira Marques
Building an extended architecture to eliminate boundaries to accessing and sharing data.
The new productivity paradox
Mark C. Anderson, Rajiv D. Banker, Sury Ravindran
High valuation multiples on IT spending suggest that companies are underinvesting in IT.
Third-generation information architecture
Roger Evernden, Elaine Evernden
Addressing the imbalance favoring technology over information structure and design, it redirects corporate information strategy...
Deficiencies in LDAP when used to support PKI
Problems arise when a protocol initially developed to simplify access to a distributed directory failed to take into account...
Object-oriented programming of integrated circuits
Gary F. Templeton
New programming architecture is revolutionizing how programmers control hardware circuitry.
Risks of total surveillance
Barbara Simons, Eugene H. Spafford