Feeds

Boy band sings praises of Windows 7

'I've seen you in my dreams, I love you so much...'

Top three mobile application threats

The world is awaiting with tremulous expectation the forthcoming Professional Developers [sic] Conference, aka PDC2008, which Microsoft has dubbed an event "so hot, the t-shirts caught on fire!"

Crikey. PDC2008 attendees will apparently walk away with a 160-gig hard drive loaded with Windows 7, and what better way to celebrate this sensational act of computing charity than with a promotional video? Ladies and gentlemen, we give you 4 Softies and a Pizza Guy...

Well, my original intention was to write a balanced preview of PDC 2008, but I made the mistake of watching the video twice. So, if you'll excuse me, I'm off for a valium washed down with a very stiff brandy followed by a lie down in the Vulture Central darkened chill-out room. ®

Seven Steps to Software Security

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.