Software  >   Systems Software  >   Programming Languages  >   Object-Oriented Programming Languages  >  

Java Programming

RSS Feed    Add to Google    Add to My Yahoo!
Java Programming Reports
 
OMEGAMON Extended Insight- Analysis: Where is your application spending time?
sponsored by IBM
WHITE PAPER: The limited amount of infomation provided by traditional DB2 for z/OS monitoring makes it difficult and time-consuming to isolate problems within the multiple layers of today's Java, CLI (SAP), and .NET applications. Read this paper to discover a monitoring alternative that provides the detailed information needed for modern applications.
Posted: 14 Feb 2012 | Published: 31 Dec 2011

IBM

Sun GlassFish ESB, The Lightweight Enterprise Service Bus
sponsored by Sun Microsystems, Inc.
WEBCAST: Sun GlassFish ESB has been designed to catalyze a lightweight business integration deployment project. It offers a "fit-to-purpose" mix of features, functionality, extensibility, and support at the best cost possible, with minimal overheads for development
Posted: 15 Apr 2009 | Premiered: Apr 15, 2009

Sun Microsystems, Inc.

Safe & Secure: An Overview of Security Features In JBoss Application Platforms
sponsored by Red Hat
WEBCAST: Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.
Posted: 08 Jul 2010 | Premiered: Jul 8, 2010

Red Hat

Convert IBM Cloud image parameters into Java using JAXB: JAXB and Plain Old Java Objects morph XML cloud image parameters in usable Java code
sponsored by IBM
WHITE PAPER: Get under the hood:  This technical note describes how to transform XML response into a Java™-usable response by creating Plain Old Java Objects (POJOs) and calling JAXB's unmarshal method. Simplify how to send requests to create new instances based on images that request parameters from Java classes.
Posted: 14 Jul 2011 | Published: 14 Jul 2011

IBM

Adaptive Memory Management for Virtualized Java Environments
sponsored by BEA Systems, Inc.
WHITE PAPER: This white paper discusses how to optimize Java application performance in a virtualized environment. Discover how to effectively operate a Java Virtual Machine in conjunction with emerging hypervisor technology.
Posted: 29 Jan 2008 | Published: 01 Jan 2007

BEA Systems, Inc.

Mobilizing Applications Lotus Domino Databases
sponsored by BlackBerry
WHITE PAPER: The ability to access and update Lotus Domino applications can be a simple and effective way to improve efficiency. Read this paper and learn how easy it can be to create BlackBerry applications that integrate with your Lotus Domino applications.
Posted: 18 Aug 2008 | Published: 18 Aug 2008

BlackBerry

How To - Alert a BlackBerry smartphone user from a Background application
sponsored by BlackBerry
TECHNICAL ARTICLE: Read this article to learn how to alert a BlackBerry smartphone user from a Background application.
Posted: 11 Jun 2010 | Published: 25 Mar 2009

BlackBerry

Understanding the Ins & Outs of Java Vulnerabilities and What to do About it
sponsored by Lumension
WEBCAST: Many companies are calling for the death of Java, citing too many security vulnerabilities and risks to keep the platform sustainable. View this on-demand webcast to find out how to eliminate as much exploitable surface area as possible on your critical endpoints.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

jQuery on Rails (The Real Ones)
sponsored by The Ajax Experience
PODCAST: The talk examines how to develop and enterprise solution for leveraging a diverse server-side framework portfolio and deliver a consistent experience to end users.
Posted: 15 Jan 2009 | Premiered: Jan 7, 2009


Controlling Software Complexity: The Business Case for Static Source Code Analysis
sponsored by Coverity by Synopsys
WHITE PAPER: This white paper discusses how static source code analysis can be used to find critical defects and security vulnerabilities in C/C++ and Java source code.
Posted: 05 Mar 2008 | Published: 03 Mar 2008

Coverity by Synopsys
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement