IT Management  >   Systems Design and Development  >   Architectures  >  

Application Architectures

RSS Feed    Add to Google    Add to My Yahoo!
Application Architectures Multimedia (View All Report Types)
 
CDW Software Solutions Solve Problems
sponsored by CDW Corporation
VIDEO: Access this video to learn how you can build a solid strategy for software purchases now and into the future by partnering with CDW. You'll get insight into how you validate your software selections and ensure that your current and future investments deliver optimal benefits.
Posted: 22 Oct 2014 | Premiered: 20 Oct 2014

CDW Corporation

Unique Licensing Negotiation
sponsored by CDW Corporation
VIDEO: In this video, you'll learn how you can deliver everything you need to simplify software management and ensure licensing compliance. View now to learn how CDW can help you ensure compliance and navigate license agreements – even when dealing with multiple vendors – to ensure a more efficient and cost-effective approach.
Posted: 22 Oct 2014 | Premiered: 17 Oct 2014

CDW Corporation

Evaluate: IBM Rational Software Architect V8
sponsored by IBM
SOFTWARE DOWNLOAD: Download the latest version of IBM Rational Software Architect V8 to experience the latest in design and modeling technologies, comprehensive support for emerging technologies around SOA and Java Enterprise Edition 5, and best of breed tools that integrate with IBM's product lifecycle management solutions.
Posted: 09 Jun 2011 | Premiered: 09 Jun 2011

IBM

Improving JVM scalability and performance
sponsored by Azul Systems, Inc
VIDEOCAST: John Davies, Technical Director, IONA and Gil Tene, CTO & co-founder of Azul Systems, discusses how Azul Compute Appliances solves scalability and performance problems in organizations due to their business critical Java applications.
Posted: 02 Aug 2007 | Premiered: Aug 2, 2007, 09:00 EDT (13:00 GMT)

Azul Systems, Inc

The State of the i
sponsored by Connectria Hosting
WEBCAST: Access this webcast to learn about the past, present and future of IBM i. Discover, through the use of real-life examples, how organizations have benefited from this system.
Posted: 22 May 2012 | Premiered: May 22, 2012

Connectria Hosting

Gain Control and Use All of Your Data Securely with Data Virtualization
sponsored by Red Hat
WEBCAST: Companies rely heavily on data gathering and analysis for business intelligence and predictive planning. View this webcast now to discover an in-depth discussion on data virtualization, and the advantages companies can expect.
Posted: 07 Oct 2014 | Premiered: Oct 7, 2014

Red Hat

Making Vital Business Connections Faster and More Effectively
sponsored by IBM
WEBCAST: Did you think you could onboard a new business partner 50% faster, or reduce the time and cost to change your IT systems by 50%? You can. By leveraging an incremental approach to SOA, you can begin to make faster, better, and richer connections across your business network in less than 9 months. Watch this webcast to learn how.
Posted: 27 Oct 2011 | Premiered: Oct 27, 2011

IBM

Improve Your Automated Decisions with Business Rules & Events
sponsored by IBM
VIDEO: Watch this 5-minute video to understand how business rules and business events processing can be used to create intelligent decision automation solutions across a variety of industries and applications. Featured industry scenarios: Healthcare, Retail and Financial Services.
Posted: 10 Oct 2011 | Premiered: 07 Oct 2011

IBM

MQ Light: Simple, Robust, Powerful Messaging for App Developers
sponsored by IBM
SOFTWARE DOWNLOAD: MQ Light can provide messaging that enables web request handlers to offload work to worker processes using a queue, so they can return to handle the next request immediately. MQ Light is currently available as a beta; click here to download the MQ Light server for your required platform today.
Posted: 08 Jul 2014 | Premiered: 08 Jul 2014

IBM

Safe & Secure: An Overview of Security Features In JBoss Application Platforms
sponsored by Red Hat
WEBCAST: Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.
Posted: 08 Jul 2010 | Premiered: Jul 8, 2010

Red Hat
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement