IT Management  >   Systems Design and Development  >   Application Development  >  

Computer Programming

RSS Feed   
Computer Programming Reports
 
Raspberry PI with Java: programming the internet of things
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

ComputerWeekly.com

Hands-on Oracle Application Express security
sponsored by ComputerWeekly.com
BOOK: This book extract demonstrates how Oracle Application Express (APEX) can be vulnerable to SQL injection, using sample code.
Posted: 01 Nov 2013 | Published: 01 Nov 2013

ComputerWeekly.com

The future of software development: Energized Work
sponsored by ComputerWeekly.com
IT BRIEFING: Gus Power, CTO  at Energized Work, gives his views on the future of software development, in this presentation for Computer Weekly's 500 Club.
Posted: 05 Jul 2012 | Published: 05 Jul 2012

ComputerWeekly.com

Web App Design at the Core of Coding Weaknesses, Attacks, Says Expert
sponsored by Symantec Corporation
EGUIDE: This expert e-guide explores how Web application design flaws become weaknesses in the final product, and why developers need to rethink their coding practices in order to fix glitches and prevent vulnerabilities. Read on to learn more now.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

Symantec Corporation

Survival guide to PACBASE ™ end-of-life
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: With the news of Pacbase's 2015 retirement, many organizations must find an alternative application strategy. This resource outlines your options in the post-Pacbase world, and offers advice and recommendations for realizing continued application success.
Posted: 18 Apr 2013 | Published: 31 Oct 2012

Hewlett-Packard Enterprise

How to Lead Your BI Project with a Brand New Approach
sponsored by Pentaho Corporation
WHITE PAPER: This article discusses reasons why many BI projects fail and explore solutions for why they fail.
Posted: 15 Sep 2011 | Published: 12 Sep 2011

Pentaho Corporation

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Become a Java developer
sponsored by IBM
WHITE PAPER: Access this resource to learn helpful tips on how to develop and program Java so you can bring its advanced capabilities to your organization. Review best practices on how to tackle various components of the platform and uncover the skills you need to become an expert Java developer.
Posted: 02 May 2012 | Published: 03 Jan 2012

IBM

Solving Scripting Problems with Technology
sponsored by Network Automation, Inc
WEBCAST: Companies currently writing scripts should also understand the implications of practicing this approach. This webcast follows the evolution of scripting and presents both its benefits and risks. Learn about an alternative to this traditional process that can allow you to reduce costs and free up time.
Posted: 23 Nov 2010 | Premiered: Nov 23, 2010

Network Automation, Inc

Computer Weekly - 13 March 2012: The economics of private cloud
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT.
Posted: 12 Mar 2012 | Published: 13 Mar 2012

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info