Software Programming Reports

A Computer Weekly buyer's guide to next-generation programming tools
sponsored by TechTarget ComputerWeekly.com
EGUIDE: All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.
Posted: 08 Feb 2021 | Published: 27 Nov 2019

TechTarget ComputerWeekly.com

Is Parallel Programming Hard?
sponsored by Intel
TECHNICAL ARTICLE: This article aims at answering the question, "Is parallel programming hard?" You'll take a look at the distinctions between parallel and sequential programming as well as the three main problems programmers face when it comes to parallel programming.
Posted: 10 Nov 2009 | Published: 28 Oct 2009

Intel

Business Information: Customer Data Quality Reaches New Highs
sponsored by TechTarget Data Management
EGUIDE: It's not enough to just collect customer data. You also need to ensure that your customer data is correct, up-to-date, and readily available. In this issue of Business Information e-zine, experts weigh in on strategies to optimize customer data quality and leverage analytics to identify unsatisfied customers.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

TechTarget Data Management

Scribe Insight Architecture Overview: A TECHNICAL OVERVIEW OF THE SCRIBE INTEGRATION TOOL
sponsored by Scribe Software Corporation
WHITE PAPER: Scribe Insight has been specifically designed to support the effective deployment of a number of market leading business applications including Microsoft Dynamics CRM, Salesforce, SalesLogix, and Microsoft Dynamics GP.
Posted: 07 Mar 2008 | Published: 01 Sep 2007

Scribe Software Corporation

Pacbase™ Transformation Factory Extending the life of your Critical Business Applications
sponsored by Hewlett-Packard Enterprise
PRESENTATION: Support for the CASE tool Pacbase will end in 2015, meaning your Pacbase-dependent business functions are at risk. In this resource, uncover new challenges that emerge as Pacbase support ends, and weigh your survival options in the post-Pacbase world.
Posted: 18 Apr 2013 | Published: 31 Dec 2012

Hewlett-Packard Enterprise

Mobile Application Development Center
sponsored by Microsoft
RESOURCE CENTER: Visit this exclusive resource center to find valuable tools for your Windows 8 mobile development initiative, including an "App Builder Virtual Summit" that provides expert seminars on everything from game development to app monetization through advertisements to making the move from iOS and Android.
Posted: 25 Apr 2013 | Published: 24 Apr 2013

Microsoft

Mastering the Multicore Challenge: An Elegant and Efficient Approach to Exploiting the Power of Parallelism
sponsored by Texas Multicore Technologies, Inc.
WHITE PAPER: Read this white paper for an examination of a new software development language and technology called SequenceL, as well as a description of how it works, why there is a need for it and how well it performs in parallel environments.
Posted: 08 Sep 2010 | Published: 26 Aug 2010

Texas Multicore Technologies, Inc.

How to Lead Your BI Project with a Brand New Approach
sponsored by Pentaho Corporation
WHITE PAPER: This article discusses reasons why many BI projects fail and explore solutions for why they fail.
Posted: 15 Sep 2011 | Published: 12 Sep 2011

Pentaho Corporation

Designing Artificial Intelligence for Games - Part 3
sponsored by Intel
TECHNICAL ARTICLE: In this 3rd part of the Designing Artificial Intelligence for Games series, you'll learn how to give your agents higher orders of intelligence. The agents can already deal with the immediate situation they find themselves in; now you are working toward artificial intelligence (AI) that deals with broader goals and the bigger picture.
Posted: 10 Nov 2009 | Published: 21 Jul 2009

Intel

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork