Basic Assembly Language Reports

Is Parallel Programming Hard?
sponsored by Intel
TECHNICAL ARTICLE: This article aims at answering the question, "Is parallel programming hard?" You'll take a look at the distinctions between parallel and sequential programming as well as the three main problems programmers face when it comes to parallel programming.
Posted: 10 Nov 2009 | Published: 28 Oct 2009

Intel

A Cloud Computing E-Book: Re-make or Re-model?
sponsored by Salesforce.com
EBOOK: The upsurge in cloud computing presents development teams with challenges that may require them to rethink established ways of building applications. Read this SearchSOA.com E-Book to get an overview of issues and strategies surrounding application development in the cloud.
Posted: 05 Aug 2011 | Published: 05 Aug 2011

Salesforce.com

Top Five Reasons to Choose Toad® Over SQL Developer
sponsored by Dell Software
WHITE PAPER: Can you actually save more money using Toad® rather than SQL Developer - a free product? The answer is “yes!” In this surprising Quest technical brief, learn how Toad’s revolutionary new features save you time and money while dramatically increasing your productivity. Read the technical brief today.
Posted: 08 Feb 2011 | Published: 08 Feb 2011

Dell Software

Guide to Design-Centric Application Development
sponsored by CraveInfoTech
EGUIDE: Designing customer-experience grade apps is a must in the age of empowered users. But you need the right tools to do it successfully. This comprehensive guide is your roadmap to developing user-friendly apps with SAP Fiori. Learn how to develop apps from a design-centric standpoint that focuses on the end user's needs.
Posted: 05 Oct 2016 | Published: 04 Oct 2016

CraveInfoTech

Resources for Android developers (Windows Store apps)
sponsored by Microsoft
RESOURCE CENTER: If you're an Android developer looking to get started creating apps for Windows 8, look no further than this resource center made just for you. You'll get tools on how to build Windows Store apps using a variety of programming languages, including blog posts, coding road maps, and much more.
Posted: 23 Apr 2013 | Published: 05 Mar 2013

Microsoft

Pacbase™ Transformation Factory Extending the life of your Critical Business Applications
sponsored by Hewlett-Packard Enterprise
PRESENTATION: Support for the CASE tool Pacbase will end in 2015, meaning your Pacbase-dependent business functions are at risk. In this resource, uncover new challenges that emerge as Pacbase support ends, and weigh your survival options in the post-Pacbase world.
Posted: 18 Apr 2013 | Published: 31 Dec 2012

Hewlett-Packard Enterprise

What the $#@! is Parallelism, Anyhow?
sponsored by Intel
TECHNICAL ARTICLE: It's amazing how many books on parallel computing use the term parellelism without clearly defining it. In this technical article, Charles Leiserson, Professor of Computer Science and Engineering at MIT, provides a brief introduction to this theory.
Posted: 10 Nov 2009 | Published: 28 Oct 2009

Intel

Designing Artificial Intelligence for Games (Part 1)
sponsored by Intel Software Network
WHITE PAPER: This article begins a four part series that explores the following important AI concepts and how to optimize them to run on today’s cutting edge multi-core processors.
Posted: 14 Aug 2009 | Published: 20 Jun 2009

Intel Software Network

Computer Weekly - 13 March 2012: The economics of private cloud
sponsored by TechTarget ComputerWeekly.com
EZINE: This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT.
Posted: 12 Mar 2012 | Published: 13 Mar 2012

TechTarget ComputerWeekly.com

Course: Insecure Temporary Files (CWE-377)
sponsored by Klocwork
WEBCAST: This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
Posted: 13 Nov 2013 | Premiered: Nov 13, 2013

Klocwork