Software  >   Systems Software  >   Software Development Tools  >   Application Programming Interfaces  >  

Java Messaging Service

RSS Feed   
Java Messaging Service Reports
 
JMS with EAServer in 15 Minutes
sponsored by Sybase, an SAP company
WHITE PAPER: The goal of this paper is to get you up and running with JMS and EAServer in approximately 15 minutes.
Posted: 03 Jun 2002 | Published: 31 Oct 2001

Sybase, an SAP company

JMS Performance Comparison
sponsored by Fiorano Software, Inc.
PRODUCT LITERATURE: This paper presents a performance analysis of publish/subscribe messaging. The analysis provides a head-to-head comparison of competitive products designed to illustrate relative performance characteristics for several messaging scenarios.
Posted: 13 Jun 2007 | Published: 01 Jan 2007

Fiorano Software, Inc.

WebSphere MQ 7.0 Features and Enhancements
sponsored by IBM
WHITE PAPER: Read this white paper to learn why messaging middleware is essential in service oriented architecture (SOA) and get an understanding of how it works and what it requires.
Posted: 12 Oct 2012 | Published: 12 Oct 2012

IBM

Infographic: advances in and adoption of DevOps
sponsored by ComputerWeekly.com
EGUIDE: For DevOps teams, containers and new software delivery norms are tenets of a productive development and deployment strategy. Accordingly, advances and adoption of each illustrate the degree to which DevOps adds value to an organisation. This infographic shows the current level of DevOps maturity.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

ComputerWeekly.com

Traceable Enables Security To Keep Up With Engineering And The Continuous Pace Of Change And Protect Modern Applications From Modern Threats.
sponsored by Traceable
DATA SHEET: Learn how Traceable applies the power of machine learning and application observability to understand the DNA of an application, how it's changing, and where there are anomalies in order to detect and block threats.
Posted: 19 Feb 2021 | Published: 19 Feb 2021

Traceable

Software & Cloud Lifecycle Management Transformation
sponsored by Livingstone Group
EBOOK: What does a software and cloud lifecycle management transition look like? Dive inside this quick blueprint to step through a software and cloud lifecycle management workshop of your own, revealing the lifecycle challenges your own organization might be grappling with — sometimes without even knowing — and pointing towards the answers of best fit.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Livingstone Group

The Technology Behind Radware Bot Manager for APIs
sponsored by Radware
WHITE PAPER: APIs are seeing massive adoption, and organizations are discovering ways to secure them from potential intrusion and exploitation. One of the most prominent API threats is ‘bad bots,’ and they’ve seen a 30% increase in the past year. To learn how you can protect from automated attacks targeting APIs, get stuck into this white paper by Radware.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

Radware

Getting the best out of robotic process automation
sponsored by ComputerWeekly.com
EGUIDE: IT leaders are used to doing more with less, but the pandemic has forced many organisations to reassess whether the way processes have always been run, is optimal. With people having to work from home, many organisations have needed to automate previous manual tasks, in order to remain operational.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

ComputerWeekly.com

CW Benelux November 2020-January 2021: Dutch Alzheimer's app helps dementia patients
sponsored by ComputerWeekly.com
EZINE: An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.
Posted: 23 Oct 2020 | Published: 12 Nov 2020

ComputerWeekly.com

The Consequences of Poor Authentication and Authorization Practices in APIs
sponsored by Traceable
RESOURCE: In this article, uncover examples of real-world API vulnerabilities (Shopify and Facebook) to understand how attackers could breach your defenses. And uncover what to look for when designing and building your authentication (authN) and authorization (authZ) system.
Posted: 11 May 2021 | Published: 11 May 2021

Traceable
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences