Applications Programming Reports

A Computer Weekly buyer's guide to training programmes and tools
sponsored by TechTarget ComputerWeekly.com
EBOOK: It's important for an organisation to pick training tools that suit its needs. In this 16-page buyer's guide, Computer Weekly looks at how to cultivate the right learning culture, the best security training options and why post-pandemic reskilling needs to focus on main frames.
Posted: 17 Mar 2022 | Published: 17 Mar 2022

TechTarget ComputerWeekly.com

Resources for iOS developers (Windows Store apps)
sponsored by Microsoft
RESOURCE CENTER: If you can develop for iOS but would like to get started with Windows 8, visit this resource center to get tips on how to build Windows Store apps using a variety of programming languages, and get the tools you need to successfully migrate from iOS to Windows 8 apps.
Posted: 24 Apr 2013 | Published: 05 Mar 2013

Microsoft

Gaming Health Meter with CSS3
sponsored by Intel
TECHNICAL ARTICLE: This article describes how game developers can use the power of CSS3 to design common game indicators, such as health, magic, ammo, money, etc.
Posted: 16 Dec 2011 | Published: 16 Dec 2011

Intel

Top Five Reasons to Choose Toad® Over SQL Developer
sponsored by Dell Software
WHITE PAPER: Can you actually save more money using Toad® rather than SQL Developer - a free product? The answer is “yes!” In this surprising Quest technical brief, learn how Toad’s revolutionary new features save you time and money while dramatically increasing your productivity. Read the technical brief today.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Dell Software

Survival guide to PACBASE ™ end-of-life
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: With the news of Pacbase's 2015 retirement, many organizations must find an alternative application strategy. This resource outlines your options in the post-Pacbase world, and offers advice and recommendations for realizing continued application success.
Posted: 18 Apr 2013 | Published: 31 Oct 2012

Hewlett-Packard Enterprise

Business Information: Customer Data Quality Reaches New Highs
sponsored by TechTarget Data Management
EGUIDE: It's not enough to just collect customer data. You also need to ensure that your customer data is correct, up-to-date, and readily available. In this issue of Business Information e-zine, experts weigh in on strategies to optimize customer data quality and leverage analytics to identify unsatisfied customers.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

TechTarget Data Management

Become a Java developer
sponsored by IBM
WHITE PAPER: Access this resource to learn helpful tips on how to develop and program Java so you can bring its advanced capabilities to your organization. Review best practices on how to tackle various components of the platform and uncover the skills you need to become an expert Java developer.
Posted: 02 May 2012 | Published: 03 Jan 2012

IBM

A Computer Weekly buyer's guide to secure coding
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Security has become a key consideration in coding. In this 15-page buyer's guide, Computer Weekly looks at how organisations can protect their software supply chains, what to do in the case of a code error and why securing application development is so vital.
Posted: 07 Jul 2023 | Published: 07 Jul 2023

TechTarget ComputerWeekly.com

What the $#@! is Parallelism, Anyhow?
sponsored by Intel
TECHNICAL ARTICLE: It's amazing how many books on parallel computing use the term parellelism without clearly defining it. In this technical article, Charles Leiserson, Professor of Computer Science and Engineering at MIT, provides a brief introduction to this theory.
Posted: 10 Nov 2009 | Published: 28 Oct 2009

Intel

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork