CASE STUDY:
Given the competitive marketplace, evaluating source code analysis tools can be overwhelming. This case study highlights one recommended offering, the quality indicators it provided, and the results one organization achieved after implementing it.
VIDEO:
This video, presented by Tariq Tahir, covers how to integrate BlackBerry Java applications with various BlackBerry messaging systems. Topics include email application, PIN messaing, SMS messaging, MMS messaging, and more.
WHITE PAPER:
Read this comprehensive white paper on Adobe CRX to learn how this enterprise content management (ECM) platform provides developers with a stable, open, well-documented and extensible content and query model.
WHITE PAPER:
Performance optimization is a key ingredient in the struggle to stretch an invested IT dollar to its absolute limit. Read this whitepaper to learn about the 3-step 'prevent, find, fix' approach to handling performance optimization problems at any stage of the development lifecycle.
WHITE PAPER:
The limited amount of infomation provided by traditional DB2 for z/OS monitoring makes it difficult and time-consuming to isolate problems within the multiple layers of today's Java, CLI (SAP), and .NET applications. Read this paper to discover a monitoring alternative that provides the detailed information needed for modern applications.
EBOOK:
In this expert handbook, see how smart Java application development teams are leveraging the cloud. Learn how to enable full-scale cloud-based development, how cloud security is evolving, and what to expect in the near future from Java in the cloud.
WHITE PAPER:
This white paper challenges the x86 processor trend, demonstrating that modern mainframe technology represents a scale-up option to the current racks filled with blades. It looks at the way organizations can benefit in terms of improved agility, increased reliability and cost savings by consolidating Oracle databases onto IBM’s zEnterprise.
WEBCAST:
Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.