ESSENTIAL GUIDE:
In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
WEBCAST:
This course begins with an overview of improper validation of array indices. It describes the security impact of the weakness and provides a technical description of the issue, along with code examples to show the vulnerability. Finally, the course describes the remediation strategies available to mitigate the weakness described by CWE-129.
WHITE PAPER:
Read this white paper for an examination of a new software development language and technology called SequenceL, as well as a description of how it works, why there is a need for it and how well it performs in parallel environments.
EGUIDE:
It's not enough to just collect customer data. You also need to ensure that your customer data is correct, up-to-date, and readily available. In this issue of Business Information e-zine, experts weigh in on strategies to optimize customer data quality and leverage analytics to identify unsatisfied customers.
WEBCAST:
Adapting to change is hard for today's professional architectures, but with the dynamics of the industry, change is a must. This webcast will show how to gain successful agility and maximize business IT value with the Smart SOA approach. Watch now!
Posted: 13 Oct 2008 | Premiered: Nov 5, 2008, 10:30 EST (15:30 GMT)
WHITE PAPER:
Can you actually save more money using Toad® rather than SQL Developer - a free product? The answer is “yes!” In this surprising Quest technical brief, learn how Toad’s revolutionary new features save you time and money while dramatically increasing your productivity. Read the technical brief today.
TECHNICAL ARTICLE:
This article aims at answering the question, "Is parallel programming hard?" You'll take a look at the distinctions between parallel and sequential programming as well as the three main problems programmers face when it comes to parallel programming.
WEBCAST:
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
PRESENTATION:
Support for the CASE tool Pacbase will end in 2015, meaning your Pacbase-dependent business functions are at risk. In this resource, uncover new challenges that emerge as Pacbase support ends, and weigh your survival options in the post-Pacbase world.
NEWSLETTER:
Welcome to the developerWorks weekly newsletter, your connection to the latest and greatest developer resources on our site! You can customize your weekly newsletter to include only those topics that interest you.