Web Development

RSS
Sort By:

JavaScript and the Netflix User Interface

Conditional dependency resolution

by Alex Liu | October 14, 2014

1 comments

Making the Web Faster with HTTP 2.0

HTTP continues to evolve

by Ilya Grigorik | December 3, 2013

CACM This article appears in print in Communications of the ACM, Volume 56 Issue 12

1 comments

20 Obstacles to Scalability

Watch out for these pitfalls that can prevent Web application scaling.

by Sean Hull | August 5, 2013

CACM This article appears in print in Communications of the ACM, Volume 56 Issue 9

0 comments

Rules for Mobile Performance Optimization

An overview of techniques to speed page loading

by Tammy Everts | August 1, 2013

CACM This article appears in print in Communications of the ACM, Volume 56 Issue 8

0 comments

Best Practices on the Move: Building Web Apps for Mobile Devices

Which practices should be modified or avoided altogether by developers for the mobile Web?

by Alex Nicolaou | July 25, 2013

0 comments

The Evolution of Web Development for Mobile Devices

Building Web sites that perform well on mobile devices remains a challenge.

by Nicholas C. Zakas | February 17, 2013

CACM This article appears in print in Communications of the ACM, Volume 56 Issue 4

0 comments

The Story of the Teapot in DHTML

It's easy to do amazing things, such as rendering the classic teapot in HTML and CSS.

by Brian Beckman, Erik Meijer | February 11, 2013

CACM This article appears in print in Communications of the ACM, Volume 56 Issue 3

2 comments

Making the Mobile Web Faster

Mobile performance issues? Fix the back end, not just the client.

by Kate Matsudaira | January 31, 2013

CACM This article appears in print in Communications of the ACM, Volume 56 Issue 3

1 comments

Multitier Programming in Hop

A first step toward programming 21st-century applications

by Manuel Serrano, Gérard Berry | July 9, 2012

CACM This article appears in print in Communications of the ACM, Volume 55 Issue 8

0 comments

Idempotence Is Not a Medical Condition

An essential property for reliable systems

by Pat Helland | April 14, 2012

CACM This article appears in print in Communications of the ACM, Volume 55 Issue 5

0 comments

Your Mouse is a Database

Web and mobile applications are increasingly composed of asynchronous and realtime streaming services and push notifications.

by Erik Meijer | March 27, 2012

CACM This article appears in print in Communications of the ACM, Volume 55 Issue 5

1 comments

Reveling in Constraints

The Google Web Toolkit is an end-run around Web development obstacles.

by Bruce Johnson | July 21, 2009

CACM This article appears in print in Communications of the ACM, Volume 52 Issue 9

6 comments

Debugging AJAX in Production

Lacking proper browser support, what steps can we take to debug production AJAX code?

by Eric Schrock | March 11, 2009

CACM This article appears in print in Communications of the ACM, Volume 52 Issue 5

1 comments

Case Study: Making the Move to AJAX

What a software-as-a-service provider learned from using an AJAX framework for RIA development

by Jeff Norwalk | March 11, 2009

0 comments

The Obama Campaign:
A Programmer's Perspective

The Obama campaign has been praised for its innovative use of technology. What was the key to its success?

by Benjamin Boer | February 23, 2009

1 comments

XML Fever

Don't let delusions about XML develop into a virulent strain of XML fever.

by Erik Wilde, Robert J. Glushko | December 4, 2008

CACM This article appears in print in Communications of the ACM, Volume 51 Issue 7

0 comments

Things I Learned in School

How many of us have not had the experience of sitting in a classroom wondering idly: "Is this really going to matter out in the real world?" It's curious, and in no small amount humbling, to realize how many of those nuggets of knowledge really do matter. One cropped up recently for me: the Finite State Machine (FSM). As we continue to develop the new UI for our product, we'll definitely be using FSMs wherever possible.

by Terry Coatta | July 14, 2008

0 comments

From Here to There, the SOA Way

SOA is no more a silver bullet than the approaches which preceded it. Back in ancient times, say, around the mid '80s when I was a grad student, distributed systems research was in its heyday. Systems like Trellis/Owl and Eden/Emerald were exploring issues in object-oriented language design, persistence, and distributed computing. One of the big themes to come out of that time period was 'location transparency', the idea that the way that you access an object should be independent of where it is located. That is, it shouldn't matter whether an object is in the same process, on the same machine in a different process, or on another machine altogether.

by Terry Coatta | July 14, 2008

0 comments

Voyage in the Agile Memeplex

Agile processes are not a technology, not a science, not a product. They constitute a space somewhat hard to define. Agile methods, or more precisely 'agile software development methods or processes', are a family of approaches and practices for developing software systems. Any attempt to define them runs into egos and marketing posturing.

by Philippe Kruchten | August 16, 2007

0 comments

Usablity Testing for the Web

Today’s Internet user has more choices than ever before, with many competing sites offering similar services. This proliferation of options provides ample opportunity for users to explore different sites and find out which one best suits their needs for any particular service. Users are further served by the latest generation of Web technologies and services, commonly dubbed Web 2.0, which enables a better, more personalized user experience and encourages user-generated content.

by Vikram V. Ingleshwar | August 16, 2007

1 comments

Phishing Forbidden

Phishing is a significant risk facing Internet users today.1,2 Through e-mails or instant messages, users are led to counterfeit Web sites designed to trick them into divulging usernames, passwords, account numbers, and personal information. It is up to the user to ensure the authenticity of the Web site.

by Naveen Agarwal, Scott Renfro, Arturo Bejar | August 16, 2007

1 comments

Building Secure Web Applications

In these days of phishing and near-daily announcements of identity theft via large-scale data losses, it seems almost ridiculous to talk about securing the Web. At this point most people seem ready to throw up their hands at the idea or to lock down one small component that they can control in order to keep the perceived chaos at bay. 

by George V. Neville-Neil | August 16, 2007

0 comments

Kode Vicious Gets Dirty

Dear Kode Vicious, I am a new Webmaster of a (rather new) Web site in my company's intranet. Recently I noticed that although I have implemented some user authentication (a start *.asp page linked to an SQL server, having usernames and passwords), some of the users found out that it is also possible to enter a rather longer URL to a specific page within that Web site (instead of entering the homepage), and they go directly to that page without being authenticated (and without their login being recorded in the SQL database).

by George Neville-Neil | July 6, 2005

0 comments