Java Programming Reports

Mobile Application Development Is About to Get Even Easier
sponsored by Red Hat
EGUIDE: In this e-guide, uncover the key differences that enable efficient mobile app production. Additionally, explore the upcoming role Java IDE will have for the future of the development tool space.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

Red Hat

Case Study: Cut Substantial Time from your Weekly Development Processes
sponsored by ZeroTurnaround
CASE STUDY: When building, deploying and restarting applications, every minute counts. This case study explores how Heliocentris, a global energy supply and efficiency company eliminated development time by hours. Access now and find out how you can free up time in your development schedule.
Posted: 20 Jun 2014 | Published: 16 Jun 2014

ZeroTurnaround

E-book: Planning upgrades in global SAP environments: Best practices, common pitfalls and real-world advice
sponsored by Atos Origin
EBOOK: In this e-book, find out what you need to know before embarking on a global SAP upgrade project. Learn best practices and tips for global SAP upgrades. Read a real-world case study about an SAP upgrade for a major multinational - and discover insider advice about the most common pitfalls of global upgrades - and how to avoid them.
Posted: 10 Dec 2009 | Published: 10 Dec 2009

Atos Origin

Java Insecurity: How to Deal with the Constant Vulnerabilities
sponsored by Lumension
WEBCAST: Access this on-demand webcast to hear from Randy Franklin Smith, from Ultimate Windows Security, as he discusses the wide-ranging Java security changes Oracle is promising to make. Also discover what you can do now to address Java security in your environment.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

A foundation for database simplification, consolidation and cost reduction
sponsored by IBM
WHITE PAPER: This white paper challenges the x86 processor trend, demonstrating that modern mainframe technology represents a scale-up option to the current racks filled with blades. It looks at the way organizations can benefit in terms of improved agility, increased reliability and cost savings by consolidating Oracle databases onto IBM’s zEnterprise.
Posted: 14 Feb 2012 | Published: 14 Feb 2012

IBM

Realize the Full Potential of Virtualized Java Applications: Oracle WebLogic Suite Virtualization Option and Oracle Assembly Builder
sponsored by Oracle Corporation
WHITE PAPER: This white paper describes a new application management solution that makes running Java applications in a virtualized environment much easier and more practical, accelerating application grid and private cloud deployments without sacrificing performance
Posted: 12 Mar 2012 | Published: 01 Apr 2010

Oracle Corporation

How to use Email, SMS, MMS, and PIN Messaging
sponsored by BlackBerry
VIDEO: This video, presented by Tariq Tahir, covers how to integrate BlackBerry Java applications with various BlackBerry messaging systems. Topics include email application, PIN messaing, SMS messaging, MMS messaging, and more.
Posted: 11 Jun 2010 | Premiered: 11 Jun 2010

BlackBerry

Presentation Transcript: Application Development-- Improving Productivity Among Evolving Application Platforms
sponsored by ASG Software Solutions
PRESENTATION TRANSCRIPT: Join special guest Jeffrey S. Hammond, Principal Analyst at Forrester Research, Inc., and Ian Rowlands from ASG, as they discuss some of the options shops have at their disposal for improving consistency and cross platform governance of your application development efforts.
Posted: 13 Jul 2010 | Published: 13 Jul 2010

ASG Software Solutions

Tuning Hadoop on Dell PowerEdge Servers
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This comprehensive resource describes how to tune BIOS, OS, file system, and Hadoop settings to increase performance in Hadoop workloads.
Posted: 23 Jan 2014 | Published: 31 Dec 2013

Dell, Inc. and Intel®

Analyzing Four Widely Exploited Java Vulnerabilities
sponsored by FireEye
WHITE PAPER: This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

FireEye