List of Gurus

The following people have contributed articles to CodeGuru

| A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z |

K Balaji
K. Balaji
K. Shane Triem
KMan KMan
Kais Dukes
Kalai Kandasamy
Kamalahasan Rajaram
Kamen Lilov
Kamjith P.
Kamran Shakil
Kapil Chaturvedi
Karl Moore
Kate Gregory
Kaushal Malhotra
Keith Bussell, Josi Manuel Muilledes
Keith Rule
Keith Vasilakes
Keith Westley
Kelvin McKisic
Ken Bertelson
Ken C. Len
Ken Reed
Ken Sherman
Ken Varn
Kenn Scribner
Kenneth Carter
Kenneth Corbin
Kenneth Fleckenstein Nielsen
Kenneth Kasajian
Kenneth M. Reed
Kerry Barnes
Kevin Bentley
Kevin Bond
Kevin Choong
Kevin Davis
Kevin Delgado
Kevin Lussier
Kevin McFarlane
Khalid Noor
Khalid Shaikh
Khalifa Ahmed Tarhoni
Khavkin
Kheun
Kiko Vives
Kim Pil Ho
Kim, Sang-Yup
Kirk Stowell
Kirk Stowell
Klaus G|tter
Klaus Salchner
Klynt Klimek
Koay Kah Hoe
Koay Kah Hoe
Konstantin Boukreev
Konstantin Bukreev
Konstantin Efimov
Konstantin Go
Konstantin Komissarchik
Konstantin Pilipchuk
Koray Gecici
Kory Becker
Kraig Hiersche
Kris Jearakul
Krishnasamy Venkatesan
Kristian Lippert
Krzysztof Kuczek
Kulathu Sarma
Kumara Das K.R.
Kunix
Kurt Pattyn
Kwon Jin-ho
Kyselgov E.N.
karench
kasajian
kirang
kirants
krkim


Top White Papers and Webcasts

  • On-demand Event Event Date: January 28, 2015 Check out this webcast and join Jeff Sloyer, IBM Developer Evangelist and Master Inventor, for a tutorial for building cloud-based applications. Using IBM's platform as a service, Bluemix, Jeff will show you how to architect and assemble cloud-based applications built for cloud scale. Leveraging the power of microservices, developers can quickly translate monolithic applications to a cloud-based microarchitecture. This hour-long session introduces the concepts and …

  • Live Event Date: February 25, 2015 @ 2:00 p.m. ET / 11:00 a.m. PT Secure Shell (SSH) keys provide unmitigated access for privileged users and applications. However, managing and securing these critical privileged credentials poses a real challenge for organizations, putting sensitive data at risk. In fact, more than 50% of organizations report experiencing an SSH Key related compromise. Check out this upcoming eSeminar and join Adam Bosnian, EVP of Global Business Development at CyberArk, as he discusses the …

Most Popular Programming Stories

More for Developers

RSS Feeds

Thanks for your registration, follow us on our social networks to keep up-to-date