EBOOK:
It's important for an organisation to pick training tools that suit its needs. In this 16-page buyer's guide, Computer Weekly looks at how to cultivate the right learning culture, the best security training options and why post-pandemic reskilling needs to focus on main frames.
RESOURCE CENTER:
If you can develop for iOS but would like to get started with Windows 8, visit this resource center to get tips on how to build Windows Store apps using a variety of programming languages, and get the tools you need to successfully migrate from iOS to Windows 8 apps.
WEBCAST:
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
WHITE PAPER:
Access this resource to learn helpful tips on how to develop and program Java so you can bring its advanced capabilities to your organization. Review best practices on how to tackle various components of the platform and uncover the skills you need to become an expert Java developer.
WHITE PAPER:
Read this white paper for an examination of a new software development language and technology called SequenceL, as well as a description of how it works, why there is a need for it and how well it performs in parallel environments.
TECHNICAL ARTICLE:
It's amazing how many books on parallel computing use the term parellelism without clearly defining it. In this technical article, Charles Leiserson, Professor of Computer Science and Engineering at MIT, provides a brief introduction to this theory.
TECHNICAL ARTICLE:
This article describes how game developers can use the power of CSS3 to design common game indicators, such as health, magic, ammo, money, etc.
WEBCAST:
This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
TECHNICAL ARTICLE:
This article aims at answering the question, "Is parallel programming hard?" You'll take a look at the distinctions between parallel and sequential programming as well as the three main problems programmers face when it comes to parallel programming.
WHITE PAPER:
Read this paper to learn how combining a high performance batch programming and execution model with a high performance analytical database provides significant business benefits for a number of different types of applications.