EGUIDE:
All kinds of organisations are waking up to the benefits of next-generation programming tools. In this 14-page buyer's guide, Computer Weekly looks at how low-code tools are helping a range of users, the ways they can boost efficiency and the many considerations that come with them.
TECHNICAL ARTICLE:
In this 3rd part of the Designing Artificial Intelligence for Games series, you'll learn how to give your agents higher orders of intelligence. The agents can already deal with the immediate situation they find themselves in; now you are working toward artificial intelligence (AI) that deals with broader goals and the bigger picture.
WHITE PAPER:
Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more.
WHITE PAPER:
Access this resource to learn helpful tips on how to develop and program Java so you can bring its advanced capabilities to your organization. Review best practices on how to tackle various components of the platform and uncover the skills you need to become an expert Java developer.
WHITE PAPER:
Switched Digital Video (SDV) offers tremendous promise for network operators seeking to more efficiently use bandwidth and deliver highly targeted content to subscribers.
WHITE PAPER:
Read this paper to learn how combining a high performance batch programming and execution model with a high performance analytical database provides significant business benefits for a number of different types of applications.
PODCAST:
Wolfgang Von Rüden talks about how CERN uses standards to successfully distribute massive computing jobs to global data centers. Also learn how Wolfgang and his team manage the fast pace of change in computing technology during decade long projects. Wolfgang will also introduce our listeners to his openlab project.
WEBCAST:
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
TECHNICAL ARTICLE:
It's amazing how many books on parallel computing use the term parellelism without clearly defining it. In this technical article, Charles Leiserson, Professor of Computer Science and Engineering at MIT, provides a brief introduction to this theory.
EZINE:
This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT.