java

Results 101 - 109 of 109Sort Results By: Published Date | Title | Company Name
Published By: Trilibis Mobile     Published Date: Oct 02, 2012
Univision achieves cross-platform content parity and a stellar mobile user experience by utilizing over 100 integration points to deliver its content across 90+ unique mobile sites, making it the most comprehensive Hispanic mobile portal.
Tags : 
mobile web, mobile strategy, tribilis, tribilis mobile, hybrid apps, mobile first, smartpath, html5, mobile design, mobile development, mobile websites, msite, adaptive design, responsive design, proxy site, tablets, best practices, javascript, mobile apps, apps
    
Trilibis Mobile
Published By: Coverity, Inc.     Published Date: Aug 16, 2010
voke Names Coverity as a Transformational Company in the Testing Market Coverity has been rated as a Transformational company in the voke, inc. Market Mover Array Report for Testing Platforms. Coverity's rating is recognition of the impact that Coverity's software integrity strategy is making in shaping the future of the testing market.
Tags : 
coverity, static analysis, dynamic analysis, software analysis, software defects, software bugs, product safety, software safety, software integrity, mission, critical software, software bug detection, software efficiency, software security, c/c++ defects, detecting c code bugs, detecting software defects, detecting c software bugs, java defects, developer productivity
    
Coverity, Inc.
Published By: AppNeta     Published Date: Oct 28, 2013
Lets face it, users are impatient. They demand a blazingly fast experience and accept no substitutes. While the effects of poor performance are obvious, it makes one wonder about the relationship between client latency and the perception of speed. After all, the user can trigger many state change events (page load, submit a form, interact with a visualization, etc.) and all these events have an associated latency to the client. However, are certain types of latency more noticeable to the user then others?
Tags : 
appneta, web applications, applications, applications latency, web applications latency, latency, client latency, time to first byte, ttfb, lag time, html, dom tree, css, stylesheet, content delivery network, cdn, javascript, network application, application performance management, application integration
    
AppNeta
Published By: Red Hat     Published Date: Jan 20, 2011
In this session, attendees will explore the new features of Red Hat Enterprise Linux 6 performance. John Shakshober (Shak) will share the scalability optimizations for larger SMP systems, > 1TB of memory, new transparent hugepage support, multi-q network performance of 10Gbit and Infiniband, and KVM enhancements that went into Red Hat Enterprise Linux 6. Shak will also share benchmark data from industry standard workloads using common applications such as database servers, Java engines, and various financial applications on the latest Intel and AMD x86_64 hardware.
Tags : 
red hat, enterprise, linux 6 performance, memory, storage, database servers, clustering, storage area networks, storage management, storage virtualization, linux, database development, data warehousing
    
Red Hat
Published By: VMWare - vFabric     Published Date: May 10, 2012
View this webcast to learn about real-world examples of companies that have adopted VMware vFabric tc Server and how to plan for future cloud deployments.
Tags : 
vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine, vmware, vm ware, storage virtualization, application integration, configuration management, productivity, content management, virtualization, cloud computing, infrastructure
    
VMWare - vFabric
Published By: Oracle     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle
Published By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle CX
Start   Previous    1 2 3 4 5     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.