EZINE:
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT.
EGUIDE:
In this e-guide, learn how to structure a mobile team and harness HTML5 for mobile application development success. Read on as experts outline four key technology and cultural shifts occurring as mobile app development moves into the enterprise, and learn why HTML5 is the perfect mobile development framework prescription.
EBOOK:
The upsurge in cloud computing presents development teams with challenges that may require them to rethink established ways of building applications. Read this SearchSOA.com E-Book to get an overview of issues and strategies surrounding application development in the cloud.
TECHNICAL ARTICLE:
It's amazing how many books on parallel computing use the term parellelism without clearly defining it. In this technical article, Charles Leiserson, Professor of Computer Science and Engineering at MIT, provides a brief introduction to this theory.
WHITE PAPER:
With the news of Pacbase's 2015 retirement, many organizations must find an alternative application strategy. This resource outlines your options in the post-Pacbase world, and offers advice and recommendations for realizing continued application success.
RESOURCE CENTER:
Visit this exclusive resource center to find valuable tools for your Windows 8 mobile development initiative, including an "App Builder Virtual Summit" that provides expert seminars on everything from game development to app monetization through advertisements to making the move from iOS and Android.
EGUIDE:
Designing customer-experience grade apps is a must in the age of empowered users. But you need the right tools to do it successfully. This comprehensive guide is your roadmap to developing user-friendly apps with SAP Fiori. Learn how to develop apps from a design-centric standpoint that focuses on the end user's needs.
WEBCAST:
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
WHITE PAPER:
Read this white paper for an examination of a new software development language and technology called SequenceL, as well as a description of how it works, why there is a need for it and how well it performs in parallel environments.