Software  >   Systems Software  >  

Data Description Languages

RSS Feed    Add to Google    Add to My Yahoo!
Data Description LanguagesReports
 
Expert migration tips: Moving from Unix to Linux
sponsored by DLT Solutions.
EGUIDE: In this expert e-guide from SearchEnterpriseLinux.com, discover what makes migrating from Unix to Linux attractive, including increased platform flexibility. And learn why it is essential to have a testing environment for gauging stability and performance of your applications.
Posted: 08 Mar 2011 | Published: 08 Mar 2011

DLT Solutions.

Computer Weekly - 13 March 2012: The economics of private cloud
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT.
Posted: 12 Mar 2012 | Published: 13 Mar 2012

ComputerWeekly.com

Designing Artificial Intelligence for Games (Part 1)
sponsored by Intel Software Network
WHITE PAPER: This article begins a four part series that explores the following important AI concepts and how to optimize them to run on today’s cutting edge multi-core processors.
Posted: 14 Aug 2009 | Published: 20 Jun 2009

Intel Software Network

A Cloud Computing E-Book: Re-make or Re-model?
sponsored by Salesforce.com
EBOOK: The upsurge in cloud computing presents development teams with challenges that may require them to rethink established ways of building applications. Read this SearchSOA.com E-Book to get an overview of issues and strategies surrounding application development in the cloud.
Posted: 05 Aug 2011 | Published: 05 Aug 2011

Salesforce.com

HTML5: A Good Fit For Mobile Development?
sponsored by Telerik
EGUIDE: In this e-guide, learn how to structure a mobile team and harness HTML5 for mobile application development success. Read on as experts outline four key technology and cultural shifts occurring as mobile app development moves into the enterprise, and learn why HTML5 is the perfect mobile development framework prescription.
Posted: 25 Oct 2013 | Published: 25 Oct 2013

Telerik

Mobile Application Development Center
sponsored by Microsoft
RESOURCE CENTER: Visit this exclusive resource center to find valuable tools for your Windows 8 mobile development initiative, including an "App Builder Virtual Summit" that provides expert seminars on everything from game development to app monetization through advertisements to making the move from iOS and Android.
Posted: 25 Apr 2013 | Published: 24 Apr 2013

Microsoft

Seven Best Practices for Managing Software Intellectual Property in an Open Source World
sponsored by Black Duck Software
WHITE PAPER: Over the past decade, a powerful new approach to development - open source software - has risen to prominence, dramatically increasing the opportunity to re-use existing software. This report describes a set of seven best practices whose objective is to encourage development based on component re-use and software assembly.
Posted: 07 Oct 2009 | Published: 07 Oct 2009

Black Duck Software

What the $#@! is Parallelism, Anyhow?
sponsored by Intel
TECHNICAL ARTICLE: It's amazing how many books on parallel computing use the term parellelism without clearly defining it. In this technical article, Charles Leiserson, Professor of Computer Science and Engineering at MIT, provides a brief introduction to this theory.
Posted: 10 Nov 2009 | Published: 28 Oct 2009

Intel

Is Parallel Programming Hard?
sponsored by Intel
TECHNICAL ARTICLE: This article aims at answering the question, "Is parallel programming hard?" You'll take a look at the distinctions between parallel and sequential programming as well as the three main problems programmers face when it comes to parallel programming.
Posted: 10 Nov 2009 | Published: 28 Oct 2009

Intel

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement