To move forward with programming languages we must first break free from the tyranny of ASCII.
Poul-Henning Kamp From Communications of the ACM | November 2010
Component models can help diagnose architectural problems in both new and existing systems.Kevin Montagne From Communications of the ACM | October 2010
Information technology has the potential to radically transform health care. Why has progress been so slow?Stephen V. Cantrill From Communications of the ACM | September 2010
Everything you always wanted to know but were afraid to ask about the decision-making process.Jan Damsgaard, Jan Karlsbjerg From Communications of the ACM | August 2010
Could ubiquitous hand-drawn code map diagrams become a thing of the past?Robert DeLine, Gina Venolia, Kael Rowan From Communications of the ACM | August 2010
Heat maps are a unique and powerful way to visualize latency data. Explaining the results, however, is an ongoing challenge.Brendan Gregg From Communications of the ACM | July 2010
A survey of powerful visualization techniques, from the obvious to the obscure.Jeffrey Heer, Michael Bostock, Vadim Ogievetsky From Communications of the ACM | June 2010
Companies have access to more types of external data than ever before. How can they integrate it most effectively?Stephen Petschulat From Communications of the ACM | January 2010
Participatory sensing technologies could improve our lives and our communities, but at what cost to our privacy?Katie Shilton From Communications of the ACM | November 2009
All revision-control systems come with complicated sets of trade-offs. How do you find the best match between tool and team?Bryan O'Sullivan From Communications of the ACM | September 2009
MonALISA developers describe how it works, the key design principles behind it, and the biggest technical challenges in building it.
Iosif Legrand, Ramiro Voicu, Catalin Cirstoiu, Costin Grigoras, Latchezar Betev, Alexandru Costan From Communications of the ACM | September 2009
Scale up your datasets enough and your apps come undone. What are the typical problems and where do the bottlenecks surface?Adam Jacobs From Communications of the ACM | August 2009
To shield the browser from attacks, Google Chrome developers eyed three key problems.Charles Reis, Adam Barth, Carlos Pizano From Communications of the ACM | August 2009
Users with no security training download Web browsers from the Internet without precaution, and demand that they be fast and easy to use. What can be done to make ...Thomas Wadlow, Vlad Gorelik From Communications of the ACM | May 2009