Get your company's research in the hands of targeted business professionals.
Java
Java is an object-oriented programming language developed by James Gosling and colleagues at Sun Microsystems in the early 1990s. Unlike conventional languages which are generally designed either to be compiled to native code, or to be interpreted from source code at runtime, Java is intended to be compiled to a bytecode, which is then run (generally using JIT compilation) by a Java virtual machine.
White Paper Published By: NodeSource
Published Date: Nov 20, 2017
Node.js is now the most dominant and in-demand language for application development, particularly on the enterprise scale. This report will trace the evolution and adoption of Node.js in the enterprise, as well as the directions in which the ecosystem will grow.
White Paper Published By: NodeSource
Published Date: Nov 10, 2017
Digital transformation is “the use of technology to radically improve performance or (business) reach. But for digital-native businesses that have never needed to make that shift — e-commerce, social media, web-based services — it involves a sharpening of that focus
combined with an ongoing evolution of process and infrastructure.
White Paper Published By: JBoss Developer
Published Date: Oct 21, 2016
Java applications have been a central technology for enterprises for two decades. This wealth of data, functionality, and knowledge are critical to enterprises. With Java-based applications, modern development can build on a platform that enables cloud-native architectures while simultaneously supporting existing applications. This combination of traditional enterprise-wide monoliths and cloud-based application deployment allows organizations to take advantage of existing knowledge and resources while actively moving toward newer application models.
White Paper Published By: JBoss Developer
Published Date: Oct 21, 2016
Microservices architecture is a new architectural style for creating loosely coupled but autonomous services. Emerging trends in technology—such as DevOps, Platform-as-a-Service (PaaS), containers, and continuous integration and delivery (CI/CD) methods—let organizations create and manage these modular systems on an unprecedented scale that exceeds earlier approaches like service-oriented architecture (SOA). But organizations that refactor monolithic applications into microservices experience widely varying degrees of success. The key to using microservices effectively is a solid understanding of how and why organizations should use microservices to build applications
White Paper Published By: Redhat
Published Date: Sep 11, 2015
This paper describes the characteristics of a modern middleware platform and how companies benefit by migrating from older inflexible monolithic infrastructures to a modular and flexible environment.
White Paper Published By: Kaspersky
Published Date: Feb 05, 2015
This paper gives information about how Automatic Exploit Prevention significantly reduces the risk of infection from widespread malware, or more targeted attacks using exploits – even when a zero-day vulnerability is used.
White Paper Published By: Lumension
Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
White Paper Published By: McAfee
Published Date: Nov 14, 2012
Real-Time Database Monitoring, Auditing, and Intrusion Prevention Databases store an enterprise's most valuable information assets, but in most organizations they are poorly protected. It's common sense to secure databases, but it's not that simple.
Webinar Published By: Gizmox
Published Date: May 24, 2012
In this Webinar, Jeffrey Hammond of Forrester Research discusses those trends, their challenges and why organizations need to rethink their application development strategies.
Webinar Published By: Rapid7
Published Date: May 22, 2012
Rapid7's CSO and Chief Architect of Metasploit leads this webcast which covers the most critical java-based security flaws and demonstrates the use of Metasploit in exploiting them. The target list includes web browsers, mobile platforms, embedded devices, application servers, and RPC services.
White Paper Published By: Oracle
Published Date: Apr 03, 2012
Download this white paper, Top Reasons to Implement an SOA Governance Strategy: A List for IT Executives, for a guide to governance that will set you on the right path.
White Paper Published By: Oracle
Published Date: Apr 03, 2012
Oracle Exalogic Elastic Cloud, the world's first and only integrated middleware machine, dramatically surpasses alternatives and provides enterprises the best possible foundation for running applications.
White Paper Published By: Oracle
Published Date: Apr 03, 2012
Although more than two-thirds of confidential information is regulated through database management systems, no computer security program offers adequate protection for the databases against the main threats affecting them today. Oracle, the leader in databases technologies, offers security solutions for the protection of all layers of the database.
White Paper Published By: CollabNet
Published Date: Dec 20, 2011
In this ever-changing world of software development, it's critical to keep up with technologies, methodologies and trends. Discover five tested and proven software development practices your team should be utilizing to accelerate software delivery.
White Paper Published By: Acquia
Published Date: Sep 13, 2011
Learn how Drupal - the open source social publishing platform - together with Acquia, gives you the tools you need to assemble a rich, interactive experience with your website.
Webinar Published By: Adobe
Published Date: Sep 08, 2011
Join Christophe Coenraets as he demonstrates how to build mobile apps for iOS and Android devices more easily using Adobe Flash Builder, Flex & LiveCycle. Learn how to minimize development time and reuse components across device platforms.
Webinar Published By: Adobe
Published Date: Sep 08, 2011
Get a demo and an in-depth look at the Adobe DEP. Marcel Boucher will show you the new architecture based on OSGI, JCR and Sling which can run directly in a Java virtual machine.
White Paper Published By: Coverity, Inc.
Published Date: Nov 01, 2010
This report is the result of the largest public-private sector research project focused on open source software integrity, originally initiated between Coverity and the U.S. Department of Homeland Security in 2006. The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others.
White Paper Published By: Coverity, Inc.
Published Date: Aug 16, 2010
voke Names Coverity as a Transformational Company in the Testing Market Coverity has been rated as a Transformational company in the voke, inc. Market Mover Array Report for Testing Platforms. Coverity's rating is recognition of the impact that Coverity's software integrity strategy is making in shaping the future of the testing market.