Applications Programming Reports

Raspberry PI with Java: programming the internet of things
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
Posted: 08 Feb 2021 | Published: 27 Sep 2016

TechTarget ComputerWeekly.com

Mobile Application Development Center
sponsored by Microsoft
RESOURCE CENTER: Visit this exclusive resource center to find valuable tools for your Windows 8 mobile development initiative, including an "App Builder Virtual Summit" that provides expert seminars on everything from game development to app monetization through advertisements to making the move from iOS and Android.
Posted: 25 Apr 2013 | Published: 24 Apr 2013

Microsoft

Course: Improper Validation of Array Index (CWE-129)
sponsored by Klocwork
WEBCAST: This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork

Scribe Insight Architecture Overview: A TECHNICAL OVERVIEW OF THE SCRIBE INTEGRATION TOOL
sponsored by Scribe Software Corporation
WHITE PAPER: Scribe Insight has been specifically designed to support the effective deployment of a number of market leading business applications including Microsoft Dynamics CRM, Salesforce, SalesLogix, and Microsoft Dynamics GP.
Posted: 07 Mar 2008 | Published: 01 Sep 2007

Scribe Software Corporation

Become a Java developer
sponsored by IBM
WHITE PAPER: Access this resource to learn helpful tips on how to develop and program Java so you can bring its advanced capabilities to your organization. Review best practices on how to tackle various components of the platform and uncover the skills you need to become an expert Java developer.
Posted: 02 May 2012 | Published: 03 Jan 2012

IBM

New Paradigms for High Performance Analytical Computing
sponsored by Vertica Systems
WHITE PAPER: Read this paper to learn how combining a high performance batch programming and execution model with a high performance analytical database provides significant business benefits for a number of different types of applications.
Posted: 16 Jul 2010 | Published: 16 Jul 2010

Vertica Systems

Designing Artificial Intelligence for Games - Part 3
sponsored by Intel
TECHNICAL ARTICLE: In this 3rd part of the Designing Artificial Intelligence for Games series, you'll learn how to give your agents higher orders of intelligence. The agents can already deal with the immediate situation they find themselves in; now you are working toward artificial intelligence (AI) that deals with broader goals and the bigger picture.
Posted: 10 Nov 2009 | Published: 21 Jul 2009

Intel

Enrich the Decisioning of Your COBOL Applications
sponsored by IBM
WHITE PAPER: With IBM WebSphere ILOG JRules and IBM WebSphere ILOG Rules for COBOL, you can externalize and manage the business rules in your organization’s COBOL applications without disruption or a major development project. Furthermore, you can use the externalized rules as decision services within an SOA strategy.
Posted: 02 Dec 2008 | Published: 15 Mar 2008

IBM

Solving Scripting Problems with Technology
sponsored by Network Automation, Inc
WEBCAST: Companies currently writing scripts should also understand the implications of practicing this approach. This webcast follows the evolution of scripting and presents both its benefits and risks. Learn about an alternative to this traditional process that can allow you to reduce costs and free up time.
Posted: 23 Nov 2010 | Premiered: Nov 23, 2010

Network Automation, Inc

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork