Software  >   Systems Software  >   Programming Languages  >  

Algorithmic Language

RSS Feed   
Algorithmic Language Reports
 
Diffie-Hellman Key Exchange - A Non-Mathematician's Explanation
sponsored by Global Knowledge
WHITE PAPER: The Diffie-Hellman algorithm is one of the most common protocols used today. An understanding of its underlying protocols & processes helps a great deal when trouble-shooting a system. This white paper takes a simple approach to explaining ...
Posted: 10 Oct 2006 | Published: 01 Oct 2006

Global Knowledge

How Strategists Can Use the Cloud to Delight Customers
sponsored by Magenic
WHITE PAPER: Flip through a collection of cloud innovation stories from real companies like Domino's Pizza and Deloitte to find out how they leveraged cloud applications to transform their business model – and usher in new eras of growth.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

Magenic

Computer Weekly – 21 May 2019: Managing software updates in Windows 10
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how technology is fighting poverty by increasing financial inclusion. We examine how best to manage the challenges of Microsoft's new plan for ongoing Windows 10 updates. And we find out how data innovation at Lloyd's of London is supporting a wider digital modernisation. Read the issue now.
Posted: 19 May 2019 | Published: 21 May 2019

ComputerWeekly.com

A Computer Weekly buyer's guide to next-generation programming tools
sponsored by ComputerWeekly.com
EGUIDE: All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

ComputerWeekly.com

How A Good Sales Strategy Can Convert Prospects Into Customers
sponsored by Oracle Corporation UK Ltd
EGUIDE: Sales now rely on metrics and data analytics to identify top prospects. Rethinking your sales and marketing is critical to developing a workable cloud strategy. In this guide, compare how 2 companies use different sales technologies to gain a competitive edge. Plus, learn how to transform your sales and marketing strategy for improved results.
Posted: 16 Nov 2016 | Published: 11 Nov 2016

Oracle Corporation UK Ltd

How to Overcome the Complexities of Mobile App Development
sponsored by Applause
EGUIDE: In this expert e-guide, explore how organizations are adapting to the growing complexity of mobile app development with mobile backend as a service (MBaaS) platforms and a hybrid approach to cultivating mobile developer skills.
Posted: 15 Dec 2017 | Published: 12 Dec 2017

Applause

Mobile Development and App Refactoring: Modernizing Legacy Apps
sponsored by PowWow
EGUIDE: In this expert e-guide, we explore how to transform traditional web apps into modern mobile apps using an app refactoring platform. Discover how refactoring is emerging as a competitive method for accelerating mobile development and updating legacy apps. Plus, learn about how the app refactoring market is changing.
Posted: 07 Mar 2017 | Published: 23 Feb 2017

PowWow

Microservices and SOA: Overcome Modern Integration Challenges
sponsored by SearchMicroservices
EBOOK: Microservices and other new technologies make modern integration increasingly complex. Learn how to overcome integration problems when merging new and old infrastructures by leveraging APIs, software containers, continuous engineering, and more.
Posted: 15 Feb 2017 | Published: 09 Feb 2017

SearchMicroservices

Evaluate Hybrid Cloud Management Tools for Your Enterprise Needs
sponsored by Splunk
EGUIDE: Use this e-guide as your hybrid cloud management tool evaluation kit. Inside, you will find 3 primary decisions to make with every tool you see, as well as a list of criteria for those tools that catch your eye.
Posted: 18 May 2017 | Published: 15 May 2017

Splunk

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info