Application Programming Reports

Raspberry PI with Java: programming the internet of things
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
Posted: 08 Feb 2021 | Published: 27 Sep 2016

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to training programmes and tools
sponsored by TechTarget ComputerWeekly.com
EBOOK: It's important for an organisation to pick training tools that suit its needs. In this 16-page buyer's guide, Computer Weekly looks at how to cultivate the right learning culture, the best security training options and why post-pandemic reskilling needs to focus on main frames.
Posted: 17 Mar 2022 | Published: 17 Mar 2022

TechTarget ComputerWeekly.com

What the $#@! is Parallelism, Anyhow?
sponsored by Intel
TECHNICAL ARTICLE: It's amazing how many books on parallel computing use the term parellelism without clearly defining it. In this technical article, Charles Leiserson, Professor of Computer Science and Engineering at MIT, provides a brief introduction to this theory.
Posted: 10 Nov 2009 | Published: 28 Oct 2009

Intel

Pacbase™ Transformation Factory Extending the life of your Critical Business Applications
sponsored by Hewlett-Packard Enterprise
PRESENTATION: Support for the CASE tool Pacbase will end in 2015, meaning your Pacbase-dependent business functions are at risk. In this resource, uncover new challenges that emerge as Pacbase support ends, and weigh your survival options in the post-Pacbase world.
Posted: 18 Apr 2013 | Published: 31 Dec 2012

Hewlett-Packard Enterprise

Computer Weekly - 13 March 2012: The economics of private cloud
sponsored by TechTarget ComputerWeekly.com
EZINE: This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT.
Posted: 12 Mar 2012 | Published: 13 Mar 2012

TechTarget ComputerWeekly.com

Resources for iOS developers (Windows Store apps)
sponsored by Microsoft
RESOURCE CENTER: If you can develop for iOS but would like to get started with Windows 8, visit this resource center to get tips on how to build Windows Store apps using a variety of programming languages, and get the tools you need to successfully migrate from iOS to Windows 8 apps.
Posted: 24 Apr 2013 | Published: 05 Mar 2013

Microsoft

Designing Artificial Intelligence for Games (part 2)
sponsored by Intel Software Network
WHITE PAPER: This article gets dangerously close to real artificial intelligence (AI). All intelligent agents need to have a basic ability to perceive their environment and some means of navigating and moving within the world around them-be it real or otherwise. Read on to learn more about AI.
Posted: 17 Aug 2009 | Published: 11 Jun 2009

Intel Software Network

Mastering the Multicore Challenge: An Elegant and Efficient Approach to Exploiting the Power of Parallelism
sponsored by Texas Multicore Technologies, Inc.
WHITE PAPER: Read this white paper for an examination of a new software development language and technology called SequenceL, as well as a description of how it works, why there is a need for it and how well it performs in parallel environments.
Posted: 08 Sep 2010 | Published: 26 Aug 2010

Texas Multicore Technologies, Inc.

Enrich the Decisioning of Your COBOL Applications
sponsored by IBM
WHITE PAPER: With IBM WebSphere ILOG JRules and IBM WebSphere ILOG Rules for COBOL, you can externalize and manage the business rules in your organization’s COBOL applications without disruption or a major development project. Furthermore, you can use the externalized rules as decision services within an SOA strategy.
Posted: 02 Dec 2008 | Published: 15 Mar 2008

IBM

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork