ComputerWeekly.com Research Library

Powered by Bitpipe.com

Programming Research

  • A Computer Weekly buyer's guide to training programmes and tools

    Sponsored by: TechTarget ComputerWeekly.com

    It's important for an organisation to pick training tools that suit its needs. In this 16-page buyer's guide, Computer Weekly looks at how to cultivate the right learning culture, the best security training options and why post-pandemic reskilling needs to focus on main frames.

  • A Computer Weekly buyer's guide to next-generation programming tools

    Sponsored by: TechTarget ComputerWeekly.com

    All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.

  • Raspberry PI with Java: programming the internet of things

    Sponsored by: TechTarget ComputerWeekly.com

    In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

  • A Computer Weekly buyer's guide to secure coding

    Sponsored by: TechTarget ComputerWeekly.com

    Security has become a key consideration in coding. In this 15-page buyer's guide, Computer Weekly looks at how organisations can protect their software supply chains, what to do in the case of a code error and why securing application development is so vital.

  • Business Information: Customer Data Quality Reaches New Highs

    Sponsored by: TechTarget Data Management

    It's not enough to just collect customer data. You also need to ensure that your customer data is correct, up-to-date, and readily available. In this issue of Business Information e-zine, experts weigh in on strategies to optimize customer data quality and leverage analytics to identify unsatisfied customers.

  • Course: Improper Validation of Array Index (CWE-129)

    Sponsored by: Klocwork

    This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.

  • Course: Insecure Temporary Files (CWE-377)

    Sponsored by: Klocwork

    This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.

  • Mobile Application Development Center

    Sponsored by: Microsoft

    Visit this exclusive resource center to find valuable tools for your Windows 8 mobile development initiative, including an "App Builder Virtual Summit" that provides expert seminars on everything from game development to app monetization through advertisements to making the move from iOS and Android.

  • Resources for iOS developers (Windows Store apps)

    Sponsored by: Microsoft

    If you can develop for iOS but would like to get started with Windows 8, visit this resource center to get tips on how to build Windows Store apps using a variety of programming languages, and get the tools you need to successfully migrate from iOS to Windows 8 apps.

  • Pacbase™ Transformation Factory Extending the life of your Critical Business Applications

    Sponsored by: Hewlett-Packard Enterprise

    Support for the CASE tool Pacbase will end in 2015, meaning your Pacbase-dependent business functions are at risk. In this resource, uncover new challenges that emerge as Pacbase support ends, and weigh your survival options in the post-Pacbase world.

  • Survival guide to PACBASE ™ end-of-life

    Sponsored by: Hewlett-Packard Enterprise

    With the news of Pacbase's 2015 retirement, many organizations must find an alternative application strategy. This resource outlines your options in the post-Pacbase world, and offers advice and recommendations for realizing continued application success.

  • Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert

    Sponsored by: Symantec Corporation

    This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now.

  • 11 Best Practices for Peer Code Review

    Sponsored by: SmartBear Software

    Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more.

  • Become a Java developer

    Sponsored by: IBM

    Access this resource to learn helpful tips on how to develop and program Java so you can bring its advanced capabilities to your organization. Review best practices on how to tackle various components of the platform and uncover the skills you need to become an expert Java developer.

  • Computer Weekly - 13 March 2012: The economics of private cloud

    Sponsored by: TechTarget ComputerWeekly.com

    This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT.

  • Gaming Health Meter with CSS3

    Sponsored by: Intel

    This article describes how game developers can use the power of CSS3 to design common game indicators, such as health, magic, ammo, money, etc.

  • How to Lead Your BI Project with a Brand New Approach

    Sponsored by: Pentaho Corporation

    This article discusses reasons why many BI projects fail and explore solutions for why they fail.

  • Top Five Reasons to Choose Toad® Over SQL Developer

    Sponsored by: Dell Software

    Can you actually save more money using Toad® rather than SQL Developer - a free product? The answer is “yes!” In this surprising Quest technical brief, learn how Toad’s revolutionary new features save you time and money while dramatically increasing your productivity. Read the technical brief today.

  • Solving Scripting Problems with Technology

    Sponsored by: Network Automation, Inc

    Companies currently writing scripts should also understand the implications of practicing this approach. This webcast follows the evolution of scripting and presents both its benefits and risks. Learn about an alternative to this traditional process that can allow you to reduce costs and free up time.

  • Mastering the Multicore Challenge: An Elegant and Efficient Approach to Exploiting the Power of Parallelism

    Sponsored by: Texas Multicore Technologies, Inc.

    Read this white paper for an examination of a new software development language and technology called SequenceL, as well as a description of how it works, why there is a need for it and how well it performs in parallel environments.

  • New Paradigms for High Performance Analytical Computing

    Sponsored by: Vertica Systems

    Read this paper to learn how combining a high performance batch programming and execution model with a high performance analytical database provides significant business benefits for a number of different types of applications.

  • What the $#@! is Parallelism, Anyhow?

    Sponsored by: Intel

    It's amazing how many books on parallel computing use the term parellelism without clearly defining it. In this technical article, Charles Leiserson, Professor of Computer Science and Engineering at MIT, provides a brief introduction to this theory.

  • Is Parallel Programming Hard?

    Sponsored by: Intel

    This article aims at answering the question, "Is parallel programming hard?" You'll take a look at the distinctions between parallel and sequential programming as well as the three main problems programmers face when it comes to parallel programming.

  • Designing Artificial Intelligence for Games - Part 3

    Sponsored by: Intel

    In this 3rd part of the Designing Artificial Intelligence for Games series, you'll learn how to give your agents higher orders of intelligence. The agents can already deal with the immediate situation they find themselves in; now you are working toward artificial intelligence (AI) that deals with broader goals and the bigger picture.

  • Parallel Programming Talk - Dr. David Patterson on the future of Parallel Programming

    Sponsored by: Intel Software Network

    Join master of the parallel universe Clay Breshears and Aaron Tersteeg as they discuss parallel programming with a special guest. This episode features Dr. David Paterson, Director of the Universal Parallel Computing Research Center at UC Berkeley sponsored by Intel and Microsoft.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.