EGUIDE:
All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.
EBOOK:
It's important for an organisation to pick training tools that suit its needs. In this 16-page buyer's guide, Computer Weekly looks at how to cultivate the right learning culture, the best security training options and why post-pandemic reskilling needs to focus on main frames.
WHITE PAPER:
Read this paper to learn how combining a high performance batch programming and execution model with a high performance analytical database provides significant business benefits for a number of different types of applications.
WHITE PAPER:
Can you actually save more money using Toad® rather than SQL Developer - a free product? The answer is “yes!” In this surprising Quest technical brief, learn how Toad’s revolutionary new features save you time and money while dramatically increasing your productivity. Read the technical brief today.
TECHNICAL ARTICLE:
In this 3rd part of the Designing Artificial Intelligence for Games series, you'll learn how to give your agents higher orders of intelligence. The agents can already deal with the immediate situation they find themselves in; now you are working toward artificial intelligence (AI) that deals with broader goals and the bigger picture.
PRESENTATION:
Support for the CASE tool Pacbase will end in 2015, meaning your Pacbase-dependent business functions are at risk. In this resource, uncover new challenges that emerge as Pacbase support ends, and weigh your survival options in the post-Pacbase world.
WHITE PAPER:
Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more.
WEBCAST:
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
PODCAST:
Join master of the parallel universe Clay Breshears and Aaron Tersteeg as they discuss parallel programming with a special guest. This episode features Dr. David Paterson, Director of the Universal Parallel Computing Research Center at UC Berkeley sponsored by Intel and Microsoft.
WHITE PAPER:
Switched Digital Video (SDV) offers tremendous promise for network operators seeking to more efficiently use bandwidth and deliver highly targeted content to subscribers.