Clem Cole and Russell Williams discuss Photoshop's long history with parallelism, and what is now seen as the chief challenge.ACM Case Study From Communications of the ACM | October 2010
Information technology has the potential to radically transform health care. Why has progress been so slow?Stephen V. Cantrill From Communications of the ACM | September 2010
Everything you always wanted to know but were afraid to ask about the decision-making process.Jan Damsgaard, Jan Karlsbjerg From Communications of the ACM | August 2010
Could ubiquitous hand-drawn code map diagrams become a thing of the past?Robert DeLine, Gina Venolia, Kael Rowan From Communications of the ACM | August 2010
Heat maps are a unique and powerful way to visualize latency data. Explaining the results, however, is an ongoing challenge.Brendan Gregg From Communications of the ACM | July 2010
A survey of powerful visualization techniques, from the obvious to the obscure.Jeffrey Heer, Michael Bostock, Vadim Ogievetsky From Communications of the ACM | June 2010
Emulating a video system shows how even a simple interface can be more complex—and capable—than it appears.George Phillips From Communications of the ACM | June 2010
An essential technique used in emulator development is a useful addition to any programmer's toolbox.Peter Phillips From Communications of the ACM | May 2010
To succeed on a global scale, businesses should focus on a trio of key elements.
Siew Kien Sia, Christina Soh, Peter Weill From Communications of the ACM | March 2010
A translator framework enables the use of model checking in complex avionics systems and other industrial settings.Steven P. Miller, Michael W. Whalen, Darren D. Cofer From Communications of the ACM | February 2010
Companies have access to more types of external data than ever before. How can they integrate it most effectively?Stephen Petschulat From Communications of the ACM | January 2010
An RFID-passport attack is more plausible than skimming RFID information. Do RFID passports make us vulnerable to identity theft?
Alan Ramos, Weina Scott, William Scott, Doug Lloyd, Katherine O'Leary, Jim Waldo From Communications of the ACM | December 2009
Long considered an afterthought, software maintenance is easiest and most effective when built into a system from the ground up.Paul Stachour, David Collier-Brown From Communications of the ACM | November 2009
As the sophistication of wiretapping technology grows, so too do the risks it poses to our privacy and security.Whitfield Diffie, Susan Landau From Communications of the ACM | November 2009
Stanford professor Pat Hanrahan sits down with the noted hedge fund founder, computational biochemist, and (above all) computer scientist.CACM Staff From Communications of the ACM | October 2009