java

Results 76 - 100 of 109Sort Results By: Published Date | Title | Company Name
Published By: Coverity, Inc.     Published Date: Nov 01, 2010
This report is the result of the largest public-private sector research project focused on open source software integrity, originally initiated between Coverity and the U.S. Department of Homeland Security in 2006. The results from the 2010 edition of the Coverity Scan Open Source Integrity Report detail the findings of analyzing more than 61 million lines of open source code from 291 popular and widely-used open source projects such as Android, Linux, Apache, Samba and PHP, among others.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
Coverity, Inc.
Published By: Coverity, Inc.     Published Date: Aug 16, 2010
voke Names Coverity as a Transformational Company in the Testing Market Coverity has been rated as a Transformational company in the voke, inc. Market Mover Array Report for Testing Platforms. Coverity's rating is recognition of the impact that Coverity's software integrity strategy is making in shaping the future of the testing market.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
Coverity, Inc.
Published By: Rapid7     Published Date: May 22, 2012
Rapid7's CSO and Chief Architect of Metasploit leads this webcast which covers the most critical java-based security flaws and demonstrates the use of Metasploit in exploiting them. The target list includes web browsers, mobile platforms, embedded devices, application servers, and RPC services.
Tags : 
java, network security, security breach, security flaws, network intrusion, identity management, internet security, intrusion detection, intrusion prevention
    
Rapid7
Published By: craftersoftware     Published Date: Sep 19, 2013
Attention Java Developers: Learn how to build content rich enterprise websites with the most modern Java development tools and Web CMS
Tags : 
java, middleware, open source, web development, content management system, corporate portals, intranets
    
craftersoftware
Published By: Lumension     Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : 
lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content, security model, dll protection, it environments, security suite, endpoint protection, e-security, targeted phishing, organized attacks, vulnerability management, security, wireless security, best practices
    
Lumension
Published By: Lumension     Published Date: Oct 20, 2014
"Just over a decade ago, the outcry over Microsofts security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling. Now, its Java thats causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? In this webinar, Randy Franklin Smith from Ultimate Windows Security will start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that Im amazed it hasnt been done before! Well move on to discuss what you can do now to address Java security in your environment. One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support appli
Tags : 
java, insecurity, vulverabilities, computing, security
    
Lumension
Published By: Lumension     Published Date: Aug 25, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : 
java, software, security, platform, vulnerability
    
Lumension
Published By: IBM     Published Date: Jun 13, 2016
Companies are always looking for ways to determine just how effective and capable candidates can be in the workplace before they start. On paper, candidates have indicated that they can code in Python and Java or can resolve any customer service problem, but how do their skill sets compare with internal success standards, let alone everyday coding or service expectations? Thats where pre-hire assessments can be so valuable. They provide extensive insights into candidates skill sets, strengths, struggles, ideal working environments, and more. Top companies understand just how worthwhile such a resource is for making informed hiring decisions. In fact, Best-in-Class organizations are 45% more likely than All Others to use pre-hire assessments as part of the hiring process. Greater insights about candidates can be a game changer for the future success of any company. While there isnt a one-size-fits-all pre-hire assessment approach to fit in with every companys talent acquisition pr
Tags : 
ibm, aberdeen, pre-hire assessments, talent acquisition, recruiting software/services
    
IBM
Published By: BlackBerry     Published Date: Apr 13, 2010
The Blackberry Java Development Environment (BlackBerry JDE) is a fully integrated development environment and simulation tool for building Java Micro Edition (Java MET) applications for Java-based Blackberry smartphones.
Tags : 
blackberry, java, jde, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless messaging, wireless phones
    
BlackBerry
Published By: BlackBerry     Published Date: Apr 13, 2010
In this webcast, author Brian Zubert tells about, Java Specification Request (JSR) that means, proposed addition to the Java platform, proposed and reviewed by expert group, public review before JSR finalized, Must be approved by Java Community Process (JCP) Executive Committee.
Tags : 
blackberry, java, jsr, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless messaging, wireless phones
    
BlackBerry
Published By: IBM     Published Date: Jan 21, 2016
Cloud, Mobile and Social are today's communication and engagement models for customers, employees and partners. And to support these models, your infrastructure needs to be simple, flexible, stable, scalable and highly secure.
Tags : 
ibm, multi-speed it, websphere, application server, it transformation, it management, enterprise applications
    
IBM
Published By: IBM     Published Date: Mar 31, 2016
"Cloud, Mobile and Social are today's communication and engagement models for customers, employees and partners. And to support these models, your infrastructure needs to be simple, flexible, stable, scalable and highly secure. While the changing market dynamics provide growth opportunities for businesses, capitalizing on them requires organizations to build new capabilities that: Enable continuous delivery of new features Shorten product innovation time to market Bring the business value chain closer to customers, partners and employees
Tags : 
ibm, websphere application server, java ee 7, it transformation, cloud, middleware, infrastructure
    
IBM
Published By: IBM     Published Date: Oct 07, 2016
The new capabilities of WebSphere Application Server Liberty profile, based on Java EE 7 standards, are designed for enhanced developer productivity, dynamic scale, resilient production deployments and ease of integration into modern DevOps workflows. These new production ready capabilities of Liberty profile enable development and delivery of engaging and responsive applications by providing the application infrastructure that meets expectations for speed, agility and user friendliness.
Tags : 
ibm, middleware, cloud, platform services, websphere application server, java ee 7, websphere application server liberty, networking, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Dec 15, 2016
Watch to learn: - How to tackle the challenge of multi-speed IT with WebSphere Application Server's unique approach to delivering application infrastructure based on Java EE 7 - How to provide continuous availability for running modern apps that require on-demand dynamic scalability and high operational resiliency - How the lighweight and modular architecture of WebSphere Liberty provides an ideal foundation to develop and deploy microservices - How to deliver flexibility to develop, deploy and consume application infrastructure - on-premises or on the cloud, including emerging virtualization technologies such as Docker - How to manage and monitor thousands of applications and servers with a single management interface for ease of problem determination
Tags : 
ibm, middleware, it transformation, websphere application server, enterprise applications
    
IBM
Published By: Gomez IT     Published Date: Apr 01, 2011
Explore key strategies for monitoring complex Java and .NET applications to ensure IT operations maintains performance and availability end users demand.
Tags : 
java application performance, net application performance, apm, compuware, application performance management
    
Gomez IT
Published By: Mentor Graphics     Published Date: May 21, 2009
No question the UI in electronic devices today is playing a larger role in the success of a device. Get the UI wrong and your product will have little chance of surviving. And it isn’t enough to deliver a UI that is merely functional: it has to look good too. Studies have shown that a good cosmetic design can encourage users to explore the full range of features and often, can engender the perception that a product is easier to use, which can make consumers more tolerant of product deficiencies. Learn more today!
Tags : 
mentor, user interface, electronic devices, consumer, cosmetic, graphics, nucleus, time-to-market, phone, media, tv set-top box, java, embedded software, pim apps, embedded component, callback, opengl, scripting, engineering, engineer
    
Mentor Graphics
Published By: SAS     Published Date: Jan 04, 2019
How can you open your analytics program to all types of programming languages and all levels of users? And how can you ensure consistency across your models and your resulting actions no matter where they initiate in the company? With todays analytics technologies, the conversation about open analytics and commerical analytics is no longer an either/or discussion. You can now combine the benefits of SAS and open source analytics technology systems within your organization. As we think about the entire analytics life cycle, its important to consider data preparation, deployment, performance, scalability and governance, in addition to algorithms. Within that cycle, theres a role for open source and commercial analytics. For example, machine learning algorithms can be developed in SAS or Python, then deployed in real-time data streams within SAS Event Stream Processing, while also integrating with open systems through Java and C APIs, RESTful web services, Apache Kafka, HDFS and more.
Tags : 
    
SAS
Published By: IBM     Published Date: Mar 04, 2014
Download this Whitepaper by Jerry Cuomo, Vice President and Chief Technology Officer, IBM WebSphere, to understand more about how you can leverage JavaScript pervasiveness to simplify radically the life cycle of applications that are interactive, web facing and transactional.
Tags : 
ibm, mobility, mobile applications, mobile app, mobile app development, javascript, apis, app servers, software development, it management, enterprise applications, mobile computing
    
IBM
Published By: IBM     Published Date: Oct 17, 2016
IBM commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study and examine the potential return on investment (ROI) enterprises may realize by migrating from open source Java EE application servers to WebSphere Application Server (WAS) Liberty. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of a WAS Liberty migration on their organizations.
Tags : 
ibm, middleware, cloud, hybrid cloud, application infrastructure, ibm was liberty, application servers, networking, enterprise applications, data management
    
IBM
Published By: JBoss     Published Date: Sep 23, 2008
This document is intended to provide insight into the considerations and processes required to move an enterprise application from a JavaEE-based application server, such as BEA WebLogic, Oracle Application Server, or IBM WebSphere, to the JBoss Enterprise Application Platform.
Tags : 
jboss, middleware, redhat, linux, red hat, server, server migration, migration, network management
    
JBoss
Published By: VisiStat     Published Date: Mar 22, 2007
Old Log File analytics data was good – today's hosted on-demand Web analytics reporting is much better. What once was only understandable by IT personnel now has a place on the desktops of sales, marketing and business professionals. Read about the differences, and improvements, in analytics.
Tags : 
web analytics, hosted analytics, hosted solution, snippet, page snippets, snippet technology, code snippets, code tag, web logs, log files, server logs, server log files, log-file analysis, web metrics, on demand reporting, real time data, real-time reporting, data collection, statistics analysis, business metrics
    
VisiStat
Published By: Confio     Published Date: Aug 21, 2009
Time is the only meaningful measure of IT database performance - how long do you keep your customers waiting? That is where Confio Software comes in. We built our technology and our company on application database performance management software that focuses on time.
Tags : 
oracle, java, performance management, customer satisfaction, application performance management, database management, database infrastructure, database, confio software, confio
    
Confio
Published By: Servoy     Published Date: Dec 11, 2006
This white paper on Software as a Service (SaaS) highlights the application development shifts that software vendors must go through to accommodate SaaS.
Tags : 
saas, java, application development, software-as-a-service, product development, software development, application development, servoy, enterprise applications, platforms, application integration, ebusiness, enterprise software, .net, database development, web development, web services, web service security, service oriented architecture, content delivery
    
Servoy
Published By: TeraCloud     Published Date: Dec 11, 2007
TSF delivers the first Java-enabled enterprise Storage Resource Management (SRM) solution that simplifies the administration and management of distributed and mainframe storage resources across the entire enterprise, from a single point of control. TSF helps you plan more effectively, lower administration costs, and puts you in control of your storage environment.
Tags : 
storage, srm, storage resource management, storage management, tsf, tsa, teracloud, teracloud storage, infrastructure, san, sans, storage area, storage area networks
    
TeraCloud
Published By: ZSL Inc.     Published Date: Sep 25, 2008
The hotspot in the current IT world is optimized Web Services. Now the enterprises have started their vision towards next generation Web Services. This white paper gives information for the business managers and engineers in developing and deploying Web Services using Rational Application Developer (RAD) and WebSphere Application Server (WAS), respectively. This paper explains the process to:* create a Web Service and Web Server client* build security to that web service* deploy the web service in WebSphere application server
Tags : 
zsl, soap, java, wsdl, uddi, web service security, risk exposure, security, software development
    
ZSL Inc.
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.