Related Content
Why SOAP Services Are Being Put to REST SOAP is now an aging protocol and its days are numbered. With so many developers familiar with the protocol and so many standards surrounding it, why are we seeing it disappear? The nail in the coffin is the mobile revolution and its driving need for web-based APIs. |
||
Patent Assertion Entities: Trolls or Angels? A patent assertion entity (PAE) is a firm that acquires and licenses patents with no intention of manufacturing or marketing the invention itself. Is the bashing of PAEs justified because they’re "patent trolls" or misguided since they’re "angels" for inventors and investors alike? |
||
The Importance of Diverse, Inclusive Software Conferences By making a software conference inclusive, you avoid perpetuating the stereotypes that only certain people are good at technology. You're also helping to grow the pool of people who see a career in the computer industry as a possibility. Rick Scott looks at why diversity is beneficial for everyone. |
||
Want to Get Ahead in Your Career in 2013? It’s Easy—Change! Is your New Year's resolution to finally land that perfect job? You're not the only one, which means that you need to be doing more to separate yourself from your competition to truly stand out. To give you the edge, we take a look at who's hiring and what they're looking for. |
||
The Biggest Development Trends of 2012 It’s human nature to want to look back on the year we just finished and to look forward with anticipation to the coming year. Joe Townsend rounds up this year's biggest trends and shares his thoughts of what 2013 has in store for software and IT professionals. |
||
Is It Time to Get Rid of the Desktop IDE? Eclipse set the development world abuzz in the fall of 2012 with the release of Orion, its browser-based integrated development environment (IDE). With the big push to move computing to the cloud, is it time to get rid of the desktop IDE? |
||
Georgia Tech Issues Cyber Threat Forecast for 2013 New and increasingly sophisticated means to capture and exploit user data, escalating battles over the control of online information, and continuous threats to the US supply chain from global sources are real possibilities according to the Georgia Tech Emerging Cyber Threats Report for 2013. |
||
Mobile Development's Unique Challenges Solved by Agile Learn how mobile developers are using agile's methodologies to traverse the unique landscape that mobile software presents. Although the Agile Manifesto was written long before smartphones and tablets and other mobile devices were built, agile's methodologies have never been more relevant. |