Advanced Java

Advanced Java Reports
How They Do It in Switzerland…Outsource the Code, Insource the Quality: McCabe IQ Analyzes and Visualizes Software Quality in Critical International Financial Systems
sponsored by McCabe Software, Inc.
CASE STUDY: Given the competitive marketplace, evaluating source code analysis tools can be overwhelming. This case study highlights one recommended offering, the quality indicators it provided, and the results one organization achieved after implementing it.
Posted: 19 Apr 2012 | Published: 19 Apr 2012

McCabe Software, Inc.

How To - Alert a BlackBerry smartphone user from a Background application
sponsored by BlackBerry
TECHNICAL ARTICLE: Read this article to learn how to alert a BlackBerry smartphone user from a Background application.
Posted: 11 Jun 2010 | Published: 25 Mar 2009

BlackBerry

How to use Email, SMS, MMS, and PIN Messaging
sponsored by BlackBerry
VIDEO: This video, presented by Tariq Tahir, covers how to integrate BlackBerry Java applications with various BlackBerry messaging systems. Topics include email application, PIN messaing, SMS messaging, MMS messaging, and more.
Posted: 11 Jun 2010 | Premiered: 11 Jun 2010

BlackBerry

CRX 2.2 from Adobe—the development platform for today’s complex, content environment
sponsored by Adobe
WHITE PAPER: Read this comprehensive white paper on Adobe CRX to learn how this enterprise content management (ECM) platform provides developers with a stable, open, well-documented and extensible content and query model.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Adobe

Performance Optimization: Extending the IT Infrastructure
sponsored by Embarcadero Technologies, Inc.
WHITE PAPER: Performance optimization is a key ingredient in the struggle to stretch an invested IT dollar to its absolute limit. Read this whitepaper to learn about the 3-step 'prevent, find, fix' approach to handling performance optimization problems at any stage of the development lifecycle.
Posted: 29 May 2009 | Published: 29 May 2009

Embarcadero Technologies, Inc.

OMEGAMON Extended Insight- Analysis: Where is your application spending time?
sponsored by IBM
WHITE PAPER: The limited amount of infomation provided by traditional DB2 for z/OS monitoring makes it difficult and time-consuming to isolate problems within the multiple layers of today's Java, CLI (SAP), and .NET applications. Read this paper to discover a monitoring alternative that provides the detailed information needed for modern applications.
Posted: 14 Feb 2012 | Published: 31 Dec 2011

IBM

Java App Development Heads to the Cloud
sponsored by SearchBusinessAnalytics
EBOOK: In this expert handbook, see how smart Java application development teams are leveraging the cloud. Learn how to enable full-scale cloud-based development, how cloud security is evolving, and what to expect in the near future from Java in the cloud.
Posted: 20 Mar 2013 | Published: 20 Mar 2013

SearchBusinessAnalytics

Tuning Hadoop on Dell PowerEdge Servers
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This comprehensive resource describes how to tune BIOS, OS, file system, and Hadoop settings to increase performance in Hadoop workloads.
Posted: 23 Jan 2014 | Published: 31 Dec 2013

Dell, Inc. and Intel®

A foundation for database simplification, consolidation and cost reduction
sponsored by IBM
WHITE PAPER: This white paper challenges the x86 processor trend, demonstrating that modern mainframe technology represents a scale-up option to the current racks filled with blades. It looks at the way organizations can benefit in terms of improved agility, increased reliability and cost savings by consolidating Oracle databases onto IBM’s zEnterprise.
Posted: 14 Feb 2012 | Published: 14 Feb 2012

IBM

Safe & Secure: An Overview of Security Features In JBoss Application Platforms
sponsored by Red Hat
WEBCAST: Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.
Posted: 08 Jul 2010 | Premiered: Jul 8, 2010

Red Hat