IT Management  >   Systems Design and Development  >   Application Development  >  

Application Programming

RSS Feed    Add to Google    Add to My Yahoo!
Application Programming Reports
 
The State of the Developer Nation: From Cloud to Mobile, IoT to VR
sponsored by OutSystems
RESEARCH CONTENT: How well do you really know modern developers? Explore the results of this Developer Economics survey that polled 21,000 developers to get into their mindset and find out how they feel about cloud, mobile, IoT, virtual reality, machine learning, and more.
Posted: 08 May 2017 | Published: 31 Mar 2017

OutSystems

The future of software development: Energized Work
sponsored by ComputerWeekly.com
IT BRIEFING: Gus Power, CTO  at Energized Work, gives his views on the future of software development, in this presentation for Computer Weekly's 500 Club.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Top Five Reasons to Choose Toad® Over SQL Developer
sponsored by Dell Software
WHITE PAPER: Can you actually save more money using Toad® rather than SQL Developer - a free product? The answer is “yes!” In this surprising Quest technical brief, learn how Toad’s revolutionary new features save you time and money while dramatically increasing your productivity. Read the technical brief today.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Dell Software

Designing Artificial Intelligence for Games - Part 3
sponsored by Intel
TECHNICAL ARTICLE: In this 3rd part of the Designing Artificial Intelligence for Games series, you'll learn how to give your agents higher orders of intelligence. The agents can already deal with the immediate situation they find themselves in; now you are working toward artificial intelligence (AI) that deals with broader goals and the bigger picture.
Posted: 10 Nov 2009 | Published: 21 Jul 2009

Intel

Enrich the Decisioning of Your COBOL Applications
sponsored by IBM
WHITE PAPER: With IBM WebSphere ILOG JRules and IBM WebSphere ILOG Rules for COBOL, you can externalize and manage the business rules in your organization’s COBOL applications without disruption or a major development project. Furthermore, you can use the externalized rules as decision services within an SOA strategy.
Posted: 02 Dec 2008 | Published: 15 Mar 2008

IBM

How to Lead Your BI Project with a Brand New Approach
sponsored by Pentaho Corporation
WHITE PAPER: This article discusses reasons why many BI projects fail and explore solutions for why they fail.
Posted: 15 Sep 2011 | Published: 12 Sep 2011

Pentaho Corporation

Gaming Health Meter with CSS3
sponsored by Intel
TECHNICAL ARTICLE: This article describes how game developers can use the power of CSS3 to design common game indicators, such as health, magic, ammo, money, etc.
Posted: 16 Dec 2011 | Published: 16 Dec 2011

Intel

Avoiding the SANS Top 25 Most Dangerous Programming Errors
sponsored by Veracode, Inc.
WEBCAST: The SANS/CWE list of the Top 25 Most Dangerous Programming Errors is already becoming the "standard" for developing secure applications in many large enterprises. In this webcast, review the prevalence of attacks that use vulnerabilities listed in the Top 25 and learn how to safeguard your code to avoid the most dangerous programming errors.
Posted: 01 Feb 2010 | Premiered: Feb 1, 2010

Veracode, Inc.

Simplify the User Experience: Enable Business Users to Automate the Integration of Microsoft Office Business Applications with the SAP Business Suite
sponsored by Winshuttle, LLC
WHITE PAPER: This white paper describes how Winshuttle data management applications enable finance, accounts payable/receivable, purchasing, human resources and production planning teams to easily automate the incorporation of Excel data into an SAP solution.
Posted: 04 Dec 2008 | Published: 04 Dec 2008

Winshuttle, LLC

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement