ESSENTIAL GUIDE:
In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.
PRESENTATION:
Support for the CASE tool Pacbase will end in 2015, meaning your Pacbase-dependent business functions are at risk. In this resource, uncover new challenges that emerge as Pacbase support ends, and weigh your survival options in the post-Pacbase world.
TECHNICAL ARTICLE:
It's amazing how many books on parallel computing use the term parellelism without clearly defining it. In this technical article, Charles Leiserson, Professor of Computer Science and Engineering at MIT, provides a brief introduction to this theory.
RESOURCE CENTER:
If you can develop for iOS but would like to get started with Windows 8, visit this resource center to get tips on how to build Windows Store apps using a variety of programming languages, and get the tools you need to successfully migrate from iOS to Windows 8 apps.
EGUIDE:
Security has become a key consideration in coding. In this 15-page buyer's guide, Computer Weekly looks at how organisations can protect their software supply chains, what to do in the case of a code error and why securing application development is so vital.
PODCAST:
Wolfgang Von Rüden talks about how CERN uses standards to successfully distribute massive computing jobs to global data centers. Also learn how Wolfgang and his team manage the fast pace of change in computing technology during decade long projects. Wolfgang will also introduce our listeners to his openlab project.
sponsored by CipherSoft, Inc., A subsidiary of Unify Corp.
EBOOK:
Since Forms technology is widely in use in many Oracle environments, it's critical that developers and IT professionals understand Oracle's short and long term plans that could affect their strategies. Read more about the key trends that may affect how your organization uses Oracle Forms, a component of Oracle Fusion Middleware.
WEBCAST:
This course begins with an overview of the use of insecure temporary files vulnerability and its common causes. A technical description of the issue is presented along with code examples to show the vulnerability. Finally, the course describes the remediation strategies used to mitigate the weakness described by CWE-377.
WHITE PAPER:
Read this paper to learn 11 best practice peer code review tips to optimize review sessions, improve code, and make the most of valuable time. Some of the key findings include how many lines of code you should review in an hour, annotating code before you begin reviewing, leveraging a check list system, and more.