Software  >   Systems Software  >  

DDL

RSS Feed    Add to Google    Add to My Yahoo!
DDL Reports
 
The State of the Developer Nation: From Cloud to Mobile, IoT to VR
sponsored by OutSystems
RESEARCH CONTENT: How well do you really know modern developers? Explore the results of this Developer Economics survey that polled 21,000 developers to get into their mindset and find out how they feel about cloud, mobile, IoT, virtual reality, machine learning, and more.
Posted: 08 May 2017 | Published: 31 Mar 2017

OutSystems

Learning Computing: Why object orientated programming works.
sponsored by ComputerWeekly.com
JOURNAL ARTICLE: Programming is a journey between the real world and a computer. This article explains why object orientation is currently the best way we have of making the journey.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

ComputerWeekly.com

Raspberry PI with Java: programming the internet of things
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

ComputerWeekly.com

Top Five Reasons to Choose Toad® Over SQL Developer
sponsored by Dell Software
WHITE PAPER: Can you actually save more money using Toad® rather than SQL Developer - a free product? The answer is “yes!” In this surprising Quest technical brief, learn how Toad’s revolutionary new features save you time and money while dramatically increasing your productivity. Read the technical brief today.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Dell Software

Computer Weekly - 13 March 2012: The economics of private cloud
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT.
Posted: 12 Mar 2012 | Published: 13 Mar 2012

ComputerWeekly.com

Become a Java developer
sponsored by IBM
WHITE PAPER: Access this resource to learn helpful tips on how to develop and program Java so you can bring its advanced capabilities to your organization. Review best practices on how to tackle various components of the platform and uncover the skills you need to become an expert Java developer.
Posted: 02 May 2012 | Published: 03 Jan 2012

IBM

IBM Smart SOA Global Virtual Forum: How to Get Smarter Business Outcomes
sponsored by IBM
WEBCAST: Adapting to change is hard for today's professional architectures, but with the dynamics of the industry, change is a must. This webcast will show how to gain successful agility and maximize business IT value with the Smart SOA approach. Watch now!
Posted: 13 Oct 2008 | Premiered: Nov 5, 2008, 10:30 EST (15:30 GMT)

IBM

Accelerate App Development with Open Source PaaS
sponsored by Red Hat
VIDEO: In this video, discover a cloud application platform as a service (PaaS) that enables developers to create scalable applications using whichever programming language and middleware they prefer. Watch now to explore the benefits and capabilities of this PaaS.
Posted: 27 Mar 2014 | Premiered: 11 Jul 2013

Red Hat

Business Information: Customer Data Quality Reaches New Highs
sponsored by SearchDataManagement
EGUIDE: It's not enough to just collect customer data. You also need to ensure that your customer data is correct, up-to-date, and readily available. In this issue of Business Information e-zine, experts weigh in on strategies to optimize customer data quality and leverage analytics to identify unsatisfied customers.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SearchDataManagement

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
DDL White Papers | DDL Multimedia | DDL IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement