Software  >   Systems Software  >  

Data Definition Languages

RSS Feed    Add to Google    Add to My Yahoo!
Data Definition Languages Reports
 
Raspberry PI with Java: programming the internet of things
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

ComputerWeekly.com

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Guide to Design-Centric Application Development
sponsored by CraveInfoTech
EGUIDE: Designing customer-experience grade apps is a must in the age of empowered users. But you need the right tools to do it successfully. This comprehensive guide is your roadmap to developing user-friendly apps with SAP Fiori. Learn how to develop apps from a design-centric standpoint that focuses on the end user's needs.
Posted: 05 Oct 2016 | Published: 04 Oct 2016

CraveInfoTech

Computer Weekly - 13 March 2012: The economics of private cloud
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT.
Posted: 12 Mar 2012 | Published: 13 Mar 2012

ComputerWeekly.com

Decision Maker's Cheat Sheet for Today's Hot Databases
sponsored by NuoDB Inc
WHITE PAPER: This quick guide compares the capabilities of three of today's top database management systems – MySQL, MongoDB and NuoDB.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

NuoDB Inc

IBM Smart SOA Global Virtual Forum: How to Get Smarter Business Outcomes
sponsored by IBM
WEBCAST: Adapting to change is hard for today's professional architectures, but with the dynamics of the industry, change is a must. This webcast will show how to gain successful agility and maximize business IT value with the Smart SOA approach. Watch now!
Posted: 13 Oct 2008 | Premiered: Nov 5, 2008, 10:30 EST (15:30 GMT)

IBM

Mobile Application Development Center
sponsored by Microsoft
RESOURCE CENTER: Visit this exclusive resource center to find valuable tools for your Windows 8 mobile development initiative, including an "App Builder Virtual Summit" that provides expert seminars on everything from game development to app monetization through advertisements to making the move from iOS and Android.
Posted: 25 Apr 2013 | Published: 24 Apr 2013

Microsoft

A Cloud Computing E-Book: Re-make or Re-model?
sponsored by Salesforce.com
EBOOK: The upsurge in cloud computing presents development teams with challenges that may require them to rethink established ways of building applications. Read this SearchSOA.com E-Book to get an overview of issues and strategies surrounding application development in the cloud.
Posted: 05 Aug 2011 | Published: 05 Aug 2011

Salesforce.com

10 Hot Skills for 2009
sponsored by Global Knowledge
WHITE PAPER: With spending on cost-saving technologies such as virtualization rising, and the maintenance of networking and enterprise Microsoft software keeping IT professionals constantly in demand, here's our top 10 hot skills that will take us from a down economy and beyond.
Posted: 01 May 2009 | Published: 01 May 2009

Global Knowledge

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement