You've requested...

Share this with your colleagues:

Download this next:

How developers and architects can improve Java garbage collection

Garbage collection (GC) is an integral part of app behavior on Java platforms, but it’s often misunderstood.

This white paper reviews and classifies the various GC tools and techniques available in JVMs today. Whether you’re a developer or an architect, find out how to make more informed GC decisions by learning more about:

  • How GC works
  • Selecting and tuning collector mechanisms
  • The impact of app architecture
  • Common GC misconceptions
  • How to maximize app performance
  • And more

These are also closely related to: "Trial download: IBM Rational AppScan"

  • Prepare your Java apps for DevOps and Containers

    In order to stay competitive, companies are turning to DevOps, microservices, and containers to optimize their Java app deployment. In this white paper, learn about Red Hat's fully-certified Java EE 7 application platform and how it was designed to be flexible enough to manage all these emerging priorities.

    Learn about what features and business benefits this platform offers, such as:

    • Full certification for Java Enterprise Edition (EE) 7 and Java SE 8 support
    • Modular architecture for containers and cloud deployment
    • An integrated development environment that maximizes productivity
    • And more

  • Improving Java performance and resolving garbage collection issues

    Because Apache Cassandra – a NoSQL distributed database designed for reliability and high scalability – is written in Java, it’s subject to limitations and performance issues associated with traditional Java Virtual Machines (JVMs).

    Thanks to response time outliers, frequent Java garbage collections, and out of memory errors, deploying Java-based apps and databases like Cassandra can be expensive, time-consuming, and bogged down in re-tuning.

    Learn how to resolve these issues and improve Java performance, even for workloads that require large memory, high transaction rates, low latency, and consistent response times. 

Find more content like what you just read:

  • Analyst's take: Foglight helps telecomms company find savings and boost efficiencies

    After implementing Foglight, a major telecommunications company gained the ability to monitor and control its entire IT applications infrastructure in greater depth avoiding downtime and extra support staff, while boosting efficiencies of business-critical applications and staff productivity.

    Download

  • CW+: Analyst's take: The benefits of IBM Cognos software for independent software vendors

    ISVs that choose to embed IBM Cognos software are able to sell additional features and functionality, as well as increase win rates, average deal sizes, and overall revenue.

    Download

  • Mistakes in Cloud Application Deployment

    This expert E-Guide explores the mistakes many organizations make when deploying apps in the cloud and describes how you can avoid making the same issues. In addition, learn why cloud integration is so complicated for today's testers.

    Download

  • Don't concede defeat to Java limitations – Build better apps at scale

    Discover how to improve Java performance with a platform that reduces disruptions from underlying issues in Java infrastructure, slashes warm up time, boosts the scalability of Java apps, and frees up developers by reducing the time spent tuning and re-tuning apps.

    Download

  • The Many Faces of Software Testing

    Read this expertly compiled e-guide to learn how your security testing mangers can educate about, plan for, and validate the communication that is required across the enterprise to make sure that your software is secure and protected.

    Download

  • The truth about software quality - a global benchmarking study

    This is the first in an annual series of reports highlighting trends in the structural quality of business applications regarding characteristics such as robustness, performance, securit y, and changeability.

    Download

  • E-Book: Technical Guide on Web Application Firewalls

    Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.

    Download

  • How to maintain DevOps software quality and compliance with automation

    This Forrester Research report explores how to catch governance up to the speed of rapid app development practices with automated supply chain management. Learn how to deliver on the accelerated DevOps' time-to-market without sacrificing software quality and compliance.

    Download

  • Why you should be monitoring open source software

    Open source software may be all the rage right now as the DevOps movement advances, but it's important to keep track of it carefully for licensing and security purposes. Continue reading this eGuide for information on how to accurately track your open source software, and the steps you should take to avoid licensing fees.

    Download

  • Focus: Securing for the future

    2016 saw the rapid increase in the use of ransomware and a resurgence of distributed denial of service (DDoS) attacks using hijacked devices making up the internet of things (IoT) against a background of new and newly-reported breaches of personal information involving an ever-increasing number of online user accounts.

    Download

  • How to ensure HIPAA compliance for containerized apps

    With the advent of microservices it is likely that many new healthcare apps are being built with containers. Discover how to achieve compliance with the HIPAA Security Rule for containerized workloads for healthcare apps.

    Download

  • Apps Revolution

    This report from CSC describes the Apps rEvolution: an evolution in technology that is creating revolutionary business and personal change.

    Download

  • E-Guide: Prioritizing Application Security Concerns

    Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.

    Download

  • CW ASEAN January 2017: Singapore hosts world's first robo-taxis

    In this month's CW ASEAN we take a look at a project to introduce self-driving taxis in Singapore. The autonomous vehicle pilot comes as no surprise as the city state is not shy to try out the latest and greatest digital technology to make life for its people and businesses easier and more productive.

    Download

  • Your full FlashSystem V9000 implementation guide delivered

    Download this full e-book to be introduced to, and gain step-by-step guidance on, implementing IBM FlashSystem V9000. Learn how to eliminate storage bottlenecks with this SSD system that provides new tiering options with read-intensive SSDs or nearline SAS HDDs.

    Download

  • Buyer's Guide to Antimalware

    Companies face complicated buying decisions whenit comes to buying host-based antimalware, starting with whether to purchase a protection suite, andwhat to include in that all-in-one package.

    Download

  • Addressing patient data security in the cloud

    Learn how healthcare organizations can secure protected health data in the cloud while meeting compliance and governance requirements.

    Download

  • A buyer's guide to SSL VPN

    In this eBook, learn how next-gen SSL VPNs can meet the needs of BYOD, mobility and cloud applications.

    Download

  • Computer Weekly – 9 August 2016: Will Rio's 4G sink or swim?

    The Rio Olympic games are meant to be the fastest Games ever – not just for the athletes, but also for mobile data speeds. Users will want to upload photos and videos in real time. In this week's Computer Weekly, we investigate how operators are working round Brazil's patchy 4G. We also find out how Glasgow's smart city initiatives are evolving.

    Download

  • Unify collaboration with tools for content mgmt and social media

    Discover how to implement a secure, scalable, and flexible collaboration platform that provides a unified toolset for social networking, content management, chat, meetings, email, and more.

    Download

  • 15 must-haves in an application security scanner

    In this white paper, learn the 15 elements you need to make sure an application scanning vendor has before making a purchasing decision.

    Download

  • The Top 100 Asian Stars in UK Tech

    The Top 100 Asian Stars in UK Tech list regcognises the UK's top Asian digital influencers in 2015.

    Download

  • Optimising your OmniPayments: Consumers, payments and the future

    Developing a wider Omnichannel strategy can help retailers deliver on the overall shopping experience that the consumers of today and tomorrow expect.

    Download

  • Tool Demo: Toad Development Suite for Oracle

    This white paper includes walk-throughs, implementation guidelines and links to videos that will show you how to use Toad Development Suite for Oracle. Learn how to automate your database development processes.

    Download

  • Minority Report: How science fiction is becoming reality

    Customers are urgently looking for the WOW Effect to create awareness and transfer an innovative image. Most digital signage to date has been a video feed or a slide-show, where it is almost like a poster replacement.

    Download

  • 23 reasons to love your data

    Today's technology makes it possible to make immediate data-based decisions, giving companies a leg up on competition. Learn 23 reasons to get excited about new data trends and possibilities.

    Download

  • Time to ditch the manual DB processes and get agile

    While most software developers now consider agile to be mainstream, database developers often have to rely on manual techniques instead. Learn how to adopt agile and DevOps for DB development.

    Download

  • E-Guide: PCI DSS 2011: Key themes to watch

    This expert tip pinpoints key observations and common themes related to what’s currently happening with today’s PCI DSS compliance programs and explains what’s in store for the future as companies transition to the PCI DSS 2.0 guidelines.

    Download

  • IT in Europe: Security in the Cloud

    Although cloud computing offers the ability to be flexible and agile at lower costs, many organisations are still hesitant to adopt because of one concern – security. This SearchSecurity.co.UK E-Zine explores the security challenges of cloud computing and offers expert advice for defending against the latest threats and mitigating risks.

    Download

  • Accenture Technology Vision 2012

    Download this report from Accenture to discover the 6 IT technology trends that will impact CIOs in 2012.

    Download

  • Paper free – are we there yet?

    In this comprehensive report, AIIM Market Intelligence takes an in-depth look at the amount of paper in the office, the impediments to removing it, the take up of digital mailrooms and multi-channel capture, and the increasing exploitation of mobile and cloud.

    Download

  • Retail's digital future

    This report highlights eight emerging technology trends in retail, some of the pioneering startups making them happen, and the data protection and privacy issues they raise.

    Download

  • Privileged identity management meets PCI DSS regs: Free trial

    Don't miss your chance to download a free trial of a privileged identity management tool that will help you meet the latest PCI DSS regulatory requirements. Access now to receive guidance on the best deployment option for your business needs, technical support for the duration of the evaluation process, and more.

    Download

  • Get a 30-Day Free Trial of Array's vAPV Virtual Load Balancer

    Available for leading hypervisors and public clouds, as well for Array's Network Functions Platforms, Array's virtual load balancing solutions support all of the features and functionality of Array's dedicated hardware appliances.

    Download

  • Real-time apps: Ctac gains competitive advantage, cuts costs

    Ctac, an ICT solution provider and SAP Value Added Reseller, wanted to enable its customers to gain the advantages of real-time analytics, without imposing high, up-front investments in new infrastructure. Access this case study to learn how they achieved this goal with a scalable, flexible cloud infrastructure for S/4HANA.

    Download

  • Getting to grips with BYOD

    BYOD is proliferating, but the smart move is to recognise that the device is ultimately far less important than the applications it runs and the data it has access to, write analysts Rob Bamford and Clive Longbottom.

    Download

  • Accelerate app development with a multi-database cloud platform

    It's unlikely that a single database will meet your needs. Learn how to run multiple open source databases with a fully managed cloud data platform, accelerate app development, and increase your scalability.

    Download

  • Expert E-Book: Data Security and the Cloud

    This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.

    Download

  • How to spend your budget and time wisely when moving your organisation to the cloud in the Middle East

    According to Gartner, companies in the Middle East are set to spend almost $2bn on moving systems to the cloud by 2020, so it is important they understand the challenges to avoid wasting money.

    Download

  • Private Cloud E-Zine Vol. 4

    As cloud continues to evolve, IT managers are looking for better integration of cloud platforms with existing tools, greater control and management, improved self-service and greater portability among cloud environments. This e-zine takes a look at trends in cloud computing, using open source software, moving applications to the cloud.

    Download

  • Focus: Mobile enterprise

    Introduction In the last decade or so, mobile devices – mobiles, then smart phones and tablets – have come into companies and organisations to change the ways business applications are put to work.

    Download

  • How to reduce app risk during mergers and acquisitions

    With the prevalence of open source software in app code nowadays, organizations must be vigilant if they wish to mitigate the risk associated with it during a merger or acquisition. Learn how to ensure that your enterprise isn't at risk of financial and legal pitfalls during mergers and acquisitions stemming from non-compliant software code.

    Download

  • Modern test mgmt software: Integrate tools for faster app dev

    Explore the use of new, agile testing tools to address the increasing pace of innovation and blurred lines between QA and development. Discover tips for evaluating and integrating modern test management software and uncover 5 must-have features, including visual proof of testing, customized integrations, uninhibited workflow, and 2 more.

    Download

  • Is the cloud compromising your data security?

    Leaders need to secure the aspects of the cloud they can control – identity and information – to protect their intellectual property. Access this white paper to learn the three keys to maintaining control of data security in the cloud.

    Download

  • A Computer Weekly buyer's guide to operational IT

    In this 14-page buyer's guide, Computer Weekly looks at applying back-office IT to industrial machines, how businesses can further digitise their operations, and how best to tap into data held in mainframes.

    Download

  • Computer Weekly – 21 March 2017: Google power – how the internet giant builds datacentres

    In this week's Computer Weekly, we hear from Google executives about how the firm builds, tests and secures its global datacentre estate. We analyse the implications for broadband of the BT and Openreach split. And we find out how artificial intelligence and the internet of things are coming together to deliver new technologies. Read the issue now.

    Download

  • Software asset management: Part of your IT service future?

    Software asset management (SAM) is becoming an important component of IT service management as it gives your team greater insight into the logistics of what they're delivering. This white paper covers how your team can leverage SAM to your organization's benefit.

    Download

  • Your free multi-factor authentication trial accessed here

    Access this free trial of multi-factor authentication (MFA) to add an additional layer of security, beyond passwords, to your enterprise, across apps, endpoints and infrastructure. Here, learn how to stop in progress attacks that leverage compromised credentials when users elevate privilege, and more.

    Download

  • Salesforce integration for dummies

    In this e-book, learn some best practices for integrating Salesforce.comwith your other essential business systems. Discover how to navigate your systems integration lifecycle, 10 do's and don'ts when evaluating a Salesforce integration system, and more.

    Download

  • 8 ways to measure software asset management success

    What does "good" software asset management look like? Uncover 8 ways to measure the strengths and weaknesses of your software asset management program.

    Download

  • Security: What a software defined perimeter could provide

    Learn how the new zero-trust Software-Defined Perimeter security model overcomes limitations of older perimeter-based Network Access Control (NAC) solutions. Learn how your organization can secure access to on-premises, hybrid and cloud-based resources.

    Download

  • Security report: 6 current threats to your organization

    Uncover 6 threats to your healthcare organization and how they have evolved over the past year, what specific dangers they pose to your healthcare organization, and what you can do to mitigate their harm.

    Download

  • Cloud enabling the banking industry

    This report explores how the banking industry architecture network (Bian) service landscape may be used to define a comprehensive commercial blueprint that could be used to cloud-enable the banking industry.

    Download

  • Accenture Technology Vision 2014

    The Accenture Technology Vision 2014 identifies six technology trends that are enabling enterprises to push the boundaries of innovation.

    Download

  • How to make Java apps scalable and accelerate innovation

    This white paper explores how to implement a better Java – one that meets industry standards, accelerates innovation, and makes better use of finite resources. Learn how to build Java apps that scale and improve performance of existing apps without re-coding.

    Download

  • Malware's evolving to avoid detection, here's how analytics can help

    Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.

    Download