Software  >   Systems Software  >   Programming Languages  >   Object-Oriented Programming Languages  >   Java  >  

Java Virtual Machine (Software)

RSS Feed   
Java Virtual Machine (Software) Reports
 
Distributed Caching: Why It Matters For Predictable Scalability on the Web, and Where It’s Proving Its Value
sponsored by Oracle Corporation
WHITE PAPER: This paper explains why it’s imperative for any Web-based organization to learn about the distributed caching technology and Oracle Coherence Data Grid technology to combat the increasing demand on the database.
Posted: 20 Dec 2010 | Published: 20 Dec 2010

Oracle Corporation

Faster PHP Through Java
sponsored by Caucho Technology
WHITE PAPER: Using benchmarks and code samples throughout to anchor the discussion, this paper explores how Quercus - Caucho's Java implementation of PHP - can perform faster than the standard Apache-based PHP both in synthetic benchmarks and real-world applications. The results are quite impressive.
Posted: 18 Mar 2009 | Published: 18 Mar 2009

Caucho Technology

Micro Focus Visual COBOL
sponsored by Micro Focus
VIDEO: Watch this videocast to learn how it is bringing the productivity of modern, industry-leading integrated development environments (IDEs) to COBOL, including the ability to deploy key business-critical COBOL applications to Windows 7, .NET, JVM and the cloud.
Posted: 23 Aug 2012 | Premiered: 22 Aug 2012

Micro Focus

The Performance Paradox of the JVM: Why More Hardware Means More
sponsored by Azul Systems, Inc
EGUIDE: Read this TheServerSide.com Expert Tip to better understand the JVM performance problem, how the JVM manages memory and how best to approach JVM Performance.
Posted: 21 Mar 2011 | Published: 21 Mar 2011

Azul Systems, Inc

Effective Enterprise Java Virtualization with Oracle WebLogic Suite
sponsored by Oracle Corporation
WHITE PAPER: This technical white paper explores in detail the technology behind a new virtualized deployment paradigm for Java EE applications, describing not only the technology behind these advances, but also the benefits and usage.
Posted: 20 Dec 2010 | Published: 20 Dec 2010

Oracle Corporation

Computer Weekly – 13 August 2019: How tech experts could earn millions as whistleblowers
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, a tech expert is set to earn millions after successfully blowing the whistle on vulnerabilities in Cisco's video surveillance software. Our latest buyer's guide examines the issues around big data architecture. And we look at how the end of Windows 7 could spark a new era for desktop productivity. Read the issue now.
Posted: 12 Aug 2019 | Published: 13 Aug 2019

ComputerWeekly.com

Computer Weekly – 27 November 2018: Software patching at scale – how to make it work
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at one of the oldest pain points for IT departments – software patching – and ask how to make it less complex across the enterprise. We examine the rise of Kubernetes, the open source container system. And we look at storage strategy to support a multicloud environment. Read the issue now.
Posted: 26 Nov 2018 | Published: 26 Nov 2018

ComputerWeekly.com

Careless talk: undermining your software vendor negotiations
sponsored by Livingstone Tech
RESOURCE: Negotiating with vendors can be an intimidating process. As confidently as someone may start the conversation, it can end up feeling like the vendor leaves with the upper hand, and the organization ends up without the outcome they wanted. Open up this blog post to learn how to take back control of the conversation.
Posted: 11 Feb 2021 | Published: 11 Feb 2021

Livingstone Tech

Veracode Secure Development Survey
sponsored by Veracode, Inc.
WHITE PAPER: Download this resource to see how your peers are responding to the biggest challenges to the current state of secure software development and its changing methodologies.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.

Components: Increasing Speed and Risk
sponsored by Veracode, Inc.
WHITE PAPER: Most developers write their own code, but also integrate third-party components into their application to save time and effort. This paper explains some strategies that will help to secure applications from vulnerable open source components.
Posted: 02 Feb 2018 | Published: 02 Feb 2018

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences