Home > Topics

Articles

Robert C. SeacordAccessing Shared Atomic Objects from within a Signal Handler in C
Robert C. Seacord, author of Secure Coding in C and C++, Second Edition, describes how accessing shared objects in signal handlers can result in race conditions that can leave data in an inconsistent state. Historically, the only conforming way to access a shared object from a signal handler was to read from or write to variables of type volatile sig_atomic_t. With the advent of C11, atomics are now a better choice for accessing shared objects in signal handlers.
Continue reading...
By Robert C. SeacordApr 24, 2014
Five Interaction Design Tips for Your Mobile App
Apps for mobile platforms might seem simple, but they're far from it. Programs that run on smartphones and tablets have their own style and rules, which are far different from the protocols and techniques established on their desktop computer ancestors. Cameron Banga and Josh Weinhold share five tips for perfecting your app designs in ways that will help you meet or exceed your users' expectations.
Continue reading...
By Cameron Banga, Josh WeinholdApr 24, 2014
Introduction to Inventory Management: Principles and Strategies for the Efficient Flow of Inventory across the Supply Chain
Inventory is a fundamental measure of the overall health of supply chain and logistics activities. The authors of The Definitive Guide to Inventory Management discuss what inventory is, the role of inventory in supply chain management, and why inventory is such an important metric in supply chain management.
Continue reading...
By CSCMP, Terry L. Esper, Matthew A. WallerApr 24, 2014
First Sketches of an App
In this chapter you’ll find a general strategic outlay for planning the design of a mobile application. Using the steps and techniques presented, you’ll be prepared for the different phases a design evolves through during its infancy, before a programmer writes the first lines of code.
Continue reading...
By Cameron Banga, Josh WeinholdApr 23, 2014

See More Articles

Blogs

John  TraenkenschuhHeartbleed? You're too late.

Traenk offers a friendly reminder that this is shape of things to come...

Continue reading...
By John TraenkenschuhCommentsApril 11, 2014
Topics: The Web/Virtual Worlds/Social Networking,Home & Office Computing,Software Security,General Security and Privacy,Information Technology,Software Development & Management,Sales & Marketing,Programming,Open Source,Web Services,Networking,Network Security,Web Development,Network Administration & Management,Data,General Business,Architecture and Design,Security,Linux/UNIX/Open Source Operating Systems,HTML/CSS,Cloud Computing,Network Design & Architecture,Business & Management
Emily NaveThe IT List: What You Missed This Week on InformIT [4/4/14]
With today's "connected life" running 24/7, we recognize it's hard to keep up with all your favorite websites and tech resources. The IT List is here to help you cut through the noise. Check back each Friday for a quick digest of articles, resources, promotions, and other goodies worth a first or second look on InformIT.

Continue reading...
By Emily NaveCommentsApril 4, 2014
Topics: Home & Office Computing,Information Technology,Software Development & Management,Programming,Open Source,Web Services,Graphics & Web Design,Networking,Engineering,Web Development,Certification,Data,Mobile Application Development & Programming,Security,Hardware,Operating Systems, Server,Process Improvement,Business & Management
Emily NaveMicrosoft Press Products Now Available on InformIT

We are excited to announce Microsoft Press products are now available in the InformIT store, growing the number of valuable and trusted resources for Microsoft users and IT professionals.

Continue reading...
By Emily NaveCommentsApril 3, 2014
Topics: Home & Office Computing,Information Technology,Software Development & Management,Programming,Open Source,Web Services,Graphics & Web Design,Networking,Engineering,Web Development,Certification,Data,Mobile Application Development & Programming,Security,Hardware,Operating Systems, Server,Process Improvement,Business & Management
John  TraenkenschuhSpot the Hacker (Part I)

Traenk wonders aloud at the changing face of Security--and Hacking.

Continue reading...
By John TraenkenschuhCommentsMarch 25, 2014
Topics: Home & Office Computing,Software Security,General Security and Privacy,Information Technology,Information Management,Networking,Network Security,Management & Strategy,Global Business,Security,Business & Management

See More Blogs

Other Topics

    Business & ManagementBusiness ApplicationsFinance & InvestingGeneral BusinessGlobal BusinessHuman ResourcesInformation ManagementManagement & StrategyPersonal DevelopmentSales & MarketingCertificationCisco CertificationCCDACCDPCCIECCIPCCNACCNPCCNP Security / CCSPCCNP Voice / CCVPCisco Qualified SpecialistCisco Networking AcademyCompTIAA+Network+Security+Microsoft CertificationMCADMCSAMCSDMCSEOther ITOther Non-TechnicalCloud Computing & VirtualizationDataAccessBusinessObjects/Crystal ReportsData Analytics and VisualizationDB2FileMakerInformation ManagementLotusMySQLSAPSQLSQL ServerEngineeringChemical EngineeringCommunications EngineeringGeneral Engineering & HardwareSemiconductor TechnologiesSix Sigma and Process ImprovementGraphics & Web DesignDreamweaver & FlashMicrosoft Expression StudioPhotoshop & AdobeVideo EditingHardwareUpgrading & RepairingHome & Office ComputingAppleeBay/Yahoo/GoogleEntertainment/Gaming/GadgetsHome NetworkingMac OS XMicrosoft ApplicationsMicrosoft Windows DesktopMicrosoft Windows ServerMicrosoft Windows Vista & Home ServerOther ApplicationsThe Web/Virtual Worlds/Social NetworkingInformation TechnologyMobile Application Development & ProgrammingAndroidHTML5 & Web StandardsiOSWindows PhoneNetworkingHome NetworkingNetwork Administration & ManagementNetwork Design & ArchitectureRouting & SwitchingStorageVoice/IP CommunicationsWireless/High Speed/OpticalOpen SourceAjax & JavaScriptLinux/UNIX/Open Source Operating SystemsPerlPHPPythonRuby/Ruby on RailsOperating Systems, ServerLinux/UNIX/Open SourceMAC OS X/OtherMicrosoft ServersMicrosoft System CenterMicrosoft Windows DesktopMicrosoft Windows Vista & Home ServerSolarisProcess ImprovementProgrammingAjaxAlgorithmsAndroidASP .NETC#C/C++GamesGeneral Programming/Other LanguagesGraphic ProgrammingHTML5/CSS/BlendJavaJavaScriptLotus Notes/Domino/XPagesMac and iOS ProgrammingPerlPHPPythonRationalRubyUser Interface (UI)Visual BasicVisual StudioWindows ProgrammingSecurityGeneral Security and PrivacyNetwork SecuritySoftware SecuritySoftware Development & ManagementAgileArchitecture and DesignManagement: Lifecycle, Project, TeamObject TechnologyRationalTestingUMLWeb DevelopmentAjax and JavaScriptASP.NETContent Management SystemsDreamweaver & FlashHTML/CSSMicrosoft Expression StudioPerlPHPPythonRuby/Ruby on RailsWeb ServicesCloud ComputingSOAWebSphereXML