Everything you always wanted to know but were afraid to ask about the decision-making process.Jan Damsgaard, Jan Karlsbjerg From Communications of the ACM | August 2010
Could ubiquitous hand-drawn code map diagrams become a thing of the past?Robert DeLine, Gina Venolia, Kael Rowan From Communications of the ACM | August 2010
Heat maps are a unique and powerful way to visualize latency data. Explaining the results, however, is an ongoing challenge.Brendan Gregg From Communications of the ACM | July 2010
A survey of powerful visualization techniques, from the obvious to the obscure.Jeffrey Heer, Michael Bostock, Vadim Ogievetsky From Communications of the ACM | June 2010
Emulating a video system shows how even a simple interface can be more complex—and capable—than it appears.George Phillips From Communications of the ACM | June 2010
An essential technique used in emulator development is a useful addition to any programmer's toolbox.Peter Phillips From Communications of the ACM | May 2010
To succeed on a global scale, businesses should focus on a trio of key elements.
Siew Kien Sia, Christina Soh, Peter Weill From Communications of the ACM | March 2010
A translator framework enables the use of model checking in complex avionics systems and other industrial settings.Steven P. Miller, Michael W. Whalen, Darren D. Cofer From Communications of the ACM | February 2010
Companies have access to more types of external data than ever before. How can they integrate it most effectively?Stephen Petschulat From Communications of the ACM | January 2010
An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?
Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O'Leary, Jim Waldo From Communications of the ACM | December 2009
Long considered an afterthought, software maintenance is easiest and most effective when built into a system from the ground up.Paul Stachour, David Collier-Brown From Communications of the ACM | November 2009
As the sophistication of wiretapping technology grows, so too do the risks it poses to our privacy and security.Whitfield Diffie, Susan Landau From Communications of the ACM | November 2009
Stanford professor Pat Hanrahan sits down with the noted hedge fund founder, computational biochemist, and (above all) computer scientist.CACM Staff From Communications of the ACM | October 2009
The biosciences need an image format capable of high performance and long-term maintenance. Is HDF5 the answer?
Matthew T. Dougherty, Michael J. Folk, Erez Zadok, Herbert J. Bernstein, Frances C. Bernstein, Kevin W. Eliceiri, Werner Benger, Christoph Best From Communications of the ACM | October 2009
GPU acceleration and other computer performance increases will offer critical benefits to biomedical science.James C. Phillips, John E. Stone From Communications of the ACM | October 2009