Software  >   Systems Software  >   Programming Languages  >   Object-Oriented Programming Languages  >  

Java Programming

RSS Feed    Add to Google    Add to My Yahoo!
Java Programming White Papers (View All Report Types)
 
21 Ways to Use Spreadsheets in Your Java Applications
sponsored by Actuate
WHITE PAPER: Discover 21 ways how companies are using the e.Spreadsheet Engine to distribute Excel reports and perform calculations while leveraging their J2EE server environments.
Posted: 19 Jun 2006 | Published: 01 Feb 2006

Actuate

Improving Java Application Performance: Maximizing Scalability and Availability
sponsored by Terracotta, Inc.
WHITE PAPER: Terracotta's Network-Attached Memory (NAM) is an arbitrarily large, network-attached Java heap that lets threads in multiple JVMs on multiple machines interact with each other as if they were all in the same JVM.
Posted: 03 Jan 2008 | Published: 01 Jan 2007

TOPICS:  Architectures | Java
Terracotta, Inc.

Performance Optimization: Extending the IT Infrastructure
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER: Performance optimization is a key ingredient in the struggle to stretch an invested IT dollar to its absolute limit. Read this whitepaper to learn about the 3-step 'prevent, find, fix' approach to handling performance optimization problems at any stage of the development lifecycle.
Posted: 29 May 2009 | Published: 29 May 2009

Embarcadero Technologies, Inc.

Migrate Oracle Forms to the Web: Making the Business Case
sponsored by CipherSoft, Inc., A subsidiary of Unify Corp.
WHITE PAPER: There are many reasons organizations are currently migrating their Oracle Forms applications to the Web. This white paper will discuss those issues and review the challenges that can occur during a conversion project. As well, it will discuss the options for migrating Oracle Forms, including moving to Forms 10g and migrating to Java.
Posted: 20 Jul 2009 | Published: 20 Jul 2009

CipherSoft, Inc., A subsidiary of Unify Corp.

Whose Fault is it Anyway? Using Compuware Abend-AID to Diagnose DB2 and WebSphere MQ Problems
sponsored by Compuware Corporation
WHITE PAPER: This paper discusses how you can leverage existing Abend-AID capabilities to simplify problem resolution even in these increasingly complex systems. Read this paper to learn more about diagnosing DB2 and WebSphere MQ problems with Compuware Abend-AID.
Posted: 04 Sep 2009 | Published: 03 Sep 2009

Compuware Corporation

Controlling Software Complexity: The Business Case for Static Source Code Analysis
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys

AJAX for Graphics-Intensive Web Applications
sponsored by ILOG, an IBM Company
WHITE PAPER: Learn how AJAX works and how it is leveraged to create advanced web displays with graphical user interfaces by increasing interactivity and reducing roundtrips to the server.
Posted: 15 Aug 2007 | Published: 01 Jun 2006

ILOG, an IBM Company

Azul Pauseless Garbage Collection: Improving Application Scalability and Predictability
sponsored by Azul Systems, Inc
WHITE PAPER: This paper examines garbage collection issues such as concurrent marking and concurrent relocation, as well as, benefits of acheiving pauseless garbage collection compared to traditional collection approaches.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

Azul Systems, Inc

Adaptive Memory Management for Virtualized Java Environments
sponsored by BEA Systems, Inc.
WHITE PAPER: This white paper discusses how to optimize Java application performance in a virtualized environment. Discover how to effectively operate a Java Virtual Machine in conjunction with emerging hypervisor technology.
Posted: 29 Jan 2008 | Published: 01 Jan 2007

BEA Systems, Inc.

HP Security Cyber Risk Report
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This HP Security Cyber Risk Report provides industry-wide data on vulnerabilities in software, mobile, and web applications; examines how specific technologies like iOS, Android, and JAVA contribute to the attack surface; and more.
Posted: 19 Nov 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement