Web Development

Sort By:

Why SRE Documents Matter

How documentation enables SRE teams to manage new and existing services

by Shylaja Nukala, Vivek Rau | October 4, 2018


Research for Practice: Web Security and Mobile Web Computing

Expert-curated Guides to the Best of CS Research

by Jean Yang, Vijay Janapa Reddi, Yuhao Zhu | October 4, 2016


React: Facebook's Functional Turn on Writing JavaScript

A discussion with Pete Hunt, Paul O'Shannessy, Dave Smith and Terry Coatta

by Pete Hunt, Paul O'Shannessy, Dave Smith, Terry Coatta | September 5, 2016


Componentizing the Web

We may be on the cusp of a new revolution in web development.

by Taylor Savage | November 9, 2015


Beyond Page Objects: Testing Web Applications with State Objects

Use states to drive your tests

by Arie van Deursen | June 16, 2015


Dismantling the Barriers to Entry

We have to choose to build a web that is accessible to everyone.

by Rich Harris | June 8, 2015


JavaScript and the Netflix User Interface

Conditional dependency resolution

by Alex Liu | October 14, 2014


Making the Web Faster with HTTP 2.0

HTTP continues to evolve

by Ilya Grigorik | December 3, 2013


20 Obstacles to Scalability

Watch out for these pitfalls that can prevent Web application scaling.

by Sean Hull | August 5, 2013


Rules for Mobile Performance Optimization

An overview of techniques to speed page loading

by Tammy Everts | August 1, 2013


Best Practices on the Move: Building Web Apps for Mobile Devices

Which practices should be modified or avoided altogether by developers for the mobile Web?

by Alex Nicolaou | July 25, 2013


The Evolution of Web Development for Mobile Devices

Building Web sites that perform well on mobile devices remains a challenge.

by Nicholas C. Zakas | February 17, 2013


The Story of the Teapot in DHTML

It's easy to do amazing things, such as rendering the classic teapot in HTML and CSS.

by Brian Beckman, Erik Meijer | February 11, 2013


Making the Mobile Web Faster

Mobile performance issues? Fix the back end, not just the client.

by Kate Matsudaira | January 31, 2013


Multitier Programming in Hop

A first step toward programming 21st-century applications

by Manuel Serrano, Gérard Berry | July 9, 2012


Idempotence Is Not a Medical Condition

An essential property for reliable systems

by Pat Helland | April 14, 2012


Your Mouse is a Database

Web and mobile applications are increasingly composed of asynchronous and realtime streaming services and push notifications.

by Erik Meijer | March 27, 2012


Reveling in Constraints

The Google Web Toolkit is an end-run around Web development obstacles.

by Bruce Johnson | July 21, 2009


Debugging AJAX in Production

Lacking proper browser support, what steps can we take to debug production AJAX code?

by Eric Schrock | March 11, 2009


Case Study: Making the Move to AJAX

What a software-as-a-service provider learned from using an AJAX framework for RIA development

by Jeff Norwalk | March 11, 2009


The Obama Campaign:
A Programmer's Perspective

The Obama campaign has been praised for its innovative use of technology. What was the key to its success?

by Benjamin Boer | February 23, 2009


XML Fever

Don't let delusions about XML develop into a virulent strain of XML fever.

by Erik Wilde, Robert J. Glushko | December 4, 2008


Things I Learned in School

How many of us have not had the experience of sitting in a classroom wondering idly: "Is this really going to matter out in the real world?" It's curious, and in no small amount humbling, to realize how many of those nuggets of knowledge really do matter. One cropped up recently for me: the Finite State Machine (FSM). As we continue to develop the new UI for our product, we'll definitely be using FSMs wherever possible.

by Terry Coatta | July 14, 2008

CACM This article appears in print in Communications of the ACM, Volume 5 Issue 7


From Here to There, the SOA Way

SOA is no more a silver bullet than the approaches which preceded it. Back in ancient times, say, around the mid '80s when I was a grad student, distributed systems research was in its heyday. Systems like Trellis/Owl and Eden/Emerald were exploring issues in object-oriented language design, persistence, and distributed computing. One of the big themes to come out of that time period was 'location transparency', the idea that the way that you access an object should be independent of where it is located. That is, it shouldn't matter whether an object is in the same process, on the same machine in a different process, or on another machine altogether.

by Terry Coatta | July 14, 2008

CACM This article appears in print in Communications of the ACM, Volume 5 Issue 6


Voyage in the Agile Memeplex

Agile processes are not a technology, not a science, not a product. They constitute a space somewhat hard to define. Agile methods, or more precisely 'agile software development methods or processes', are a family of approaches and practices for developing software systems. Any attempt to define them runs into egos and marketing posturing.

by Philippe Kruchten | August 16, 2007


Usablity Testing for the Web

Today’s Internet user has more choices than ever before, with many competing sites offering similar services. This proliferation of options provides ample opportunity for users to explore different sites and find out which one best suits their needs for any particular service. Users are further served by the latest generation of Web technologies and services, commonly dubbed Web 2.0, which enables a better, more personalized user experience and encourages user-generated content.

by Vikram V. Ingleshwar | August 16, 2007


Phishing Forbidden

Phishing is a significant risk facing Internet users today.1,2 Through e-mails or instant messages, users are led to counterfeit Web sites designed to trick them into divulging usernames, passwords, account numbers, and personal information. It is up to the user to ensure the authenticity of the Web site.

by Naveen Agarwal, Scott Renfro, Arturo Bejar | August 16, 2007


Building Secure Web Applications

In these days of phishing and near-daily announcements of identity theft via large-scale data losses, it seems almost ridiculous to talk about securing the Web. At this point most people seem ready to throw up their hands at the idea or to lock down one small component that they can control in order to keep the perceived chaos at bay. 

by George V. Neville-Neil | August 16, 2007


Kode Vicious Gets Dirty

Dear Kode Vicious, I am a new Webmaster of a (rather new) Web site in my company's intranet. Recently I noticed that although I have implemented some user authentication (a start *.asp page linked to an SQL server, having usernames and passwords), some of the users found out that it is also possible to enter a rather longer URL to a specific page within that Web site (instead of entering the homepage), and they go directly to that page without being authenticated (and without their login being recorded in the SQL database).

by George Neville-Neil | July 6, 2005