IT Management  >   Systems Design and Development  >   Application Development  >  

Applications Programming

RSS Feed   
Applications Programming Reports
 
Parallel Programming Talk - Dr. David Patterson on the future of Parallel Programming
sponsored by Intel Software Network
PODCAST: Join master of the parallel universe Clay Breshears and Aaron Tersteeg as they discuss parallel programming with a special guest. This episode features Dr. David Paterson, Director of the Universal Parallel Computing Research Center at UC Berkeley sponsored by Intel and Microsoft.
Posted: 28 Aug 2009 | Premiered: Jun 10, 2009

Intel Software Network

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Survival guide to PACBASE ™ end-of-life
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: With the news of Pacbase's 2015 retirement, many organizations must find an alternative application strategy. This resource outlines your options in the post-Pacbase world, and offers advice and recommendations for realizing continued application success.
Posted: 18 Apr 2013 | Published: 31 Oct 2012

Hewlett-Packard Enterprise

Gaming Health Meter with CSS3
sponsored by Intel
TECHNICAL ARTICLE: This article describes how game developers can use the power of CSS3 to design common game indicators, such as health, magic, ammo, money, etc.
Posted: 16 Dec 2011 | Published: 16 Dec 2011

Intel

Pacbase™ Transformation Factory Extending the life of your Critical Business Applications
sponsored by Hewlett-Packard Enterprise
PRESENTATION: Support for the CASE tool Pacbase will end in 2015, meaning your Pacbase-dependent business functions are at risk. In this resource, uncover new challenges that emerge as Pacbase support ends, and weigh your survival options in the post-Pacbase world.
Posted: 18 Apr 2013 | Published: 31 Dec 2012

Hewlett-Packard Enterprise

How to Lead Your BI Project with a Brand New Approach
sponsored by Pentaho Corporation
WHITE PAPER: This article discusses reasons why many BI projects fail and explore solutions for why they fail.
Posted: 15 Sep 2011 | Published: 12 Sep 2011

Pentaho Corporation

Mobile Application Development Center
sponsored by Microsoft
RESOURCE CENTER: Visit this exclusive resource center to find valuable tools for your Windows 8 mobile development initiative, including an "App Builder Virtual Summit" that provides expert seminars on everything from game development to app monetization through advertisements to making the move from iOS and Android.
Posted: 25 Apr 2013 | Published: 24 Apr 2013

Microsoft

Mastering the Multicore Challenge: An Elegant and Efficient Approach to Exploiting the Power of Parallelism
sponsored by Texas Multicore Technologies, Inc.
WHITE PAPER: Read this white paper for an examination of a new software development language and technology called SequenceL, as well as a description of how it works, why there is a need for it and how well it performs in parallel environments.
Posted: 08 Sep 2010 | Published: 26 Aug 2010

Texas Multicore Technologies, Inc.

Enrich the Decisioning of Your COBOL Applications
sponsored by IBM
WHITE PAPER: With IBM WebSphere ILOG JRules and IBM WebSphere ILOG Rules for COBOL, you can externalize and manage the business rules in your organization’s COBOL applications without disruption or a major development project. Furthermore, you can use the externalized rules as decision services within an SOA strategy.
Posted: 02 Dec 2008 | Published: 15 Mar 2008

IBM

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences