Application Programming Reports

A Computer Weekly buyer's guide to next-generation programming tools
sponsored by TechTarget ComputerWeekly.com
EGUIDE: All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.
Posted: 08 Feb 2021 | Published: 27 Nov 2019

TechTarget ComputerWeekly.com

Raspberry PI with Java: programming the internet of things
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
Posted: 08 Feb 2021 | Published: 27 Sep 2016

TechTarget ComputerWeekly.com

Computer Weekly - 13 March 2012: The economics of private cloud
sponsored by TechTarget ComputerWeekly.com
EZINE: This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT.
Posted: 12 Mar 2012 | Published: 13 Mar 2012

TechTarget ComputerWeekly.com

eBook: Must-Know Applications Trends for Oracle Developers
sponsored by CipherSoft, Inc., A subsidiary of Unify Corp.
EBOOK: Since Forms technology is widely in use in many Oracle environments, it's critical that developers and IT professionals understand Oracle's short and long term plans that could affect their strategies. Read more about the key trends that may affect how your organization uses Oracle Forms, a component of Oracle Fusion Middleware.
Posted: 05 Aug 2009 | Published: 05 Aug 2009

CipherSoft, Inc., A subsidiary of Unify Corp.

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Using Bandwidth More Efficiently with Switched Digital Video
sponsored by Motorola Solutions
WHITE PAPER: Switched Digital Video (SDV) offers tremendous promise for network operators seeking to more efficiently use bandwidth and deliver highly targeted content to subscribers.
Posted: 05 Jan 2009 | Published: 31 Dec 2008

Motorola Solutions

How to Lead Your BI Project with a Brand New Approach
sponsored by Pentaho Corporation
WHITE PAPER: This article discusses reasons why many BI projects fail and explore solutions for why they fail.
Posted: 15 Sep 2011 | Published: 12 Sep 2011

Pentaho Corporation

Survival guide to PACBASE ™ end-of-life
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: With the news of Pacbase's 2015 retirement, many organizations must find an alternative application strategy. This resource outlines your options in the post-Pacbase world, and offers advice and recommendations for realizing continued application success.
Posted: 18 Apr 2013 | Published: 31 Oct 2012

Hewlett-Packard Enterprise

Resources for iOS developers (Windows Store apps)
sponsored by Microsoft
RESOURCE CENTER: If you can develop for iOS but would like to get started with Windows 8, visit this resource center to get tips on how to build Windows Store apps using a variety of programming languages, and get the tools you need to successfully migrate from iOS to Windows 8 apps.
Posted: 24 Apr 2013 | Published: 05 Mar 2013

Microsoft

Solving Scripting Problems with Technology
sponsored by Network Automation, Inc
WEBCAST: Companies currently writing scripts should also understand the implications of practicing this approach. This webcast follows the evolution of scripting and presents both its benefits and risks. Learn about an alternative to this traditional process that can allow you to reduce costs and free up time.
Posted: 23 Nov 2010 | Premiered: Nov 23, 2010

Network Automation, Inc