Articles Written by Brad Jones

The Continuation of a Fragmented Mobile Market

The mobile world continues to evolve. In fact, the definition of what is mobile continues to change as well. The addition of netbooks and iPads as well as the expected future evolution of ebooks is making mobile mean a lot more than just phones. If you do focus on just phones, it is interesting to see that evolution is occurring as well -- especially for developers.

Ask the Microsoft Experts: Development Tools and Technology

This is your chance to join experts from Microsoft to discuss the new tools and technologies that have recently been released from Microsoft. This is your opportunity to interact directly with product people from the Visual Studio team and other parts of Microsoft!

A Few Early Microsoft Tech Ed Announcements

"The Cloud is absolutely a major transformation in the industry"                                                  - Bob Muglia at Microsoft Tech Ed 2010

If You Missed Our Developing Multithreaded Applications Discussion...

In April we invited a couple of guys from Intel over for a slow chat in our forum. The chosen topic was Developing Multithreaded Applications, and the Intel experts were Dr. Clay Breshears and Aaron Tersteeg. They did a great job of responding to a number of questions related to multithreaded development.

Top 20 Top 10s That Top Our List of Top Technology Topics

What are the top 10 MySQL tools? Do you know the top 10 commandments every Web developer should know? Who are the top 10 billionaires? More importantly, what were the top 10 articles focusing on the top 10?

Top White Papers and Webcasts

  • This paper introduces IBM Java on the IBM PowerLinux 7R2 server and describes IBM's implementation of the Java platform, which includes IBM's Java Virtual Machine and development toolkit.

  • Targeted attacks and advanced threats are customized to infiltrate your unique IT infrastructure, evade conventional defenses, and remain hidden while stealing your corporate data. To detect these criminal intrusions, analysts and security experts agree that organizations should deploy advanced threat protection as part of an expanded security monitoring strategy. For this comparative analysis of breach detection systems, product analysis reports and comparative analysis reports are used to create the security …

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds