java

Results 76 - 100 of 109Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Oct 20, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make bette
Tags : 
    
Oracle
Published By: Oracle CX     Published Date: Oct 19, 2017
Modern technology initiatives are driving IT infrastructure in a new direction. Big data, social business, mobile applications, the cloud, and real-time analytics all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Customers increasingly drive the speed of business, and organizations need to engage with customers on their terms. The need to manage sensitive information with high levels of security as well as capture, analyze, and act upon massive volumes of data every hour of every day has become critical. These challenges will dramatically change the way that IT systems are designed, funded, and run compared to the past few decades. Databases and Java have become the de facto language in which modern, cloud-ready applications are written. The massive explosion in the volume, variety, and velocity of data increases the need for secure and effective analytics so that organizations can make better
Tags : 
    
Oracle CX
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: Lumension     Published Date: Jan 22, 2013
In this age of APTs you can’t leave a single PC unpatched and vulnerable. In this on-demand webcast, Randy Franklin Smith from Ultimate Windows Security will deal with this whole topic.
Tags : 
software updates, security, patch, network security, patch management, remediation solutions, access control, anti spam, anti spyware, anti virus, application security, business continuity, compliance, firewalls, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, network security appliance
    
Lumension
Published By: BlackBerry     Published Date: Apr 13, 2010
In this webcast, author Brian Zubert tells about, Java Specification Request (JSR) that means, proposed addition to the Java platform, proposed and reviewed by expert group, public review before JSR finalized, Must be approved by Java Community Process (JCP) Executive Committee.
Tags : 
blackberry, java, jsr, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless messaging, wireless phones
    
BlackBerry
Published By: Lumension     Published Date: Feb 07, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : 
lumension, java vulnerabilities, unpatched vulnerabilities, blacklist order, third-party software, endpoint devices, data-security solutions, web content, security model, dll protection, it environments, security suite, endpoint protection, e-security, targeted phishing, organized attacks, vulnerability management, security, wireless security, best practices
    
Lumension
Published By: Lumension     Published Date: Aug 25, 2014
Java vulnerabilities have dominated the security headlines. Some observers now say organizations should simply turn off the ubiquitous software platform. But what if there were a better way?
Tags : 
java, software, security, platform, vulnerability
    
Lumension
Published By: TeraCloud     Published Date: Dec 11, 2007
TSF delivers the first Java-enabled enterprise Storage Resource Management (SRM) solution that simplifies the administration and management of distributed and mainframe storage resources across the entire enterprise, from a single point of control. TSF helps you plan more effectively, lower administration costs, and puts you in control of your storage environment.
Tags : 
storage, srm, storage resource management, storage management, tsf, tsa, teracloud, teracloud storage, infrastructure, san, sans, storage area, storage area networks
    
TeraCloud
Published By: IBM     Published Date: Oct 17, 2016
IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by migrating from open source Java EE application servers to WebSphere Application Server (WAS) Liberty. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of a WAS Liberty migration on their organizations.
Tags : 
ibm, middleware, cloud, hybrid cloud, application infrastructure, ibm was liberty, application servers, networking, enterprise applications, data management
    
IBM
Published By: AppNeta     Published Date: Oct 28, 2013
Performance for end users is the metric by which most businesses judge their web applications’ performance: is the responsiveness of the application an asset or a liability to the business? Studies show that users are growing more and more demanding, while average page-loads are getting bigger and bigger. Combine that with frequent releases and cross-business updates, and pretty soon the optimization job is never quite done.
Tags : 
appneta, application performance, rum, real user monitoring, synthetic monitoring, optimization, application performance management, apm, application operations, synthetic transaction monitoring, javascript, css, ajax, infastructure monitoring, transaction tracing, customer satisfaction, application integration, productivity
    
AppNeta
Published By: Oracle PaaS/IaaS/Hardware     Published Date: Jul 25, 2017
The whitepaper is intended for security practitioners as well as developers and administrators of applications who can benefit from secure communications. The paper presents carious strategies for securing applications using Oracle Solaris 11 security and hardware-assisted cryptographic acceleration features of Oracle's SPARC processors. The paper unveils the core mechanisms, configuration, and deployment strategies, as well as the role of relevance of using Oracle Solaris Cryptographic Framework and Java Cryptography Extension-based techniques for delivering a high-performance, end-to-end security solution. With Oracle's new Software in Silicon capabilities coupled with an innovation cache and memory hierarchy, Oracle's SPARC M7 processor delivers dramatically higher processing speed and revolutionary protection against malware and software errors.
Tags : 
    
Oracle PaaS/IaaS/Hardware
Published By: SkillSoft IT     Published Date: Feb 02, 2011
In this report, we will take a look at the IT-related activities from the ITPro and AnalystPerspectives collections, as well as the most popular IT and business search terms.
Tags : 
it topics, itil, cloud computing, 2010 topics, java, programing, oracle, excel, c++, mobile, smartphone android, bluetooth, mobile computing, mobile data systems, mobile workers, pda, wireless communications, microsoft exchange, windows, green computing
    
SkillSoft IT
Published By: HiConversion, Inc.     Published Date: Apr 13, 2011
The goal of this white paper is to address the incorrect perception that all CRO implementations are time consuming and require expensive IT assistance.
Tags : 
conversion rate optimization, ssi, server-side integration, cro, hiconversion, virtual enabler, eai, client-side integration, javascript, no-script, single-script, virtual enabling, mapping
    
HiConversion, Inc.
Published By: NodeSource     Published Date: Nov 20, 2017
Node.js is now the most dominant and in-demand language for application development, particularly on the enterprise scale. This report will trace the evolution and adoption of Node.js in the enterprise, as well as the directions in which the ecosystem will grow.
Tags : 
nodesource, application development, javascript, web applications, open source, soa, application security, web service security, application performance management, java, soap, web development
    
NodeSource
Published By: HP - Enterprise     Published Date: Nov 19, 2008
Matt Rose, Senior Software Security Consultant at Fortify Software, shares his findings from a year analyzing millions of lines of code. He unveils his top ten most common vulnerabilities and provides detailed examples of each. These technical examples come from his experience working with fortune 500 companies, government agencies, and major ISVs.
Tags : 
security, application security, java, vulnerabilities, developer, source code, analysis, fortify software, fortify, security best practices, common vulnerabilities, code, security management
    
HP - Enterprise
Published By: IBM     Published Date: May 25, 2016
IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by migrating from open source Java EE application servers to WebSphere Application Server (WAS) Liberty. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of a WAS Liberty migration on their organizations.
Tags : 
ibm, application infrastructure, application servers, ibm was liberty, enterprise applications, middleware
    
IBM
Published By: JBoss Developer     Published Date: Oct 21, 2016
TMG Health, the largest business process outsourcing (BPO) provider in the Medicare and Medicaid market, relied on a slow, batch-oriented legacy application environment that prevented it from providing continuous data visibility and access to its clients. With help from Red Hat Consulting, TMG deployed a new application platform using Red Hat JBoss Enterprise Application Platform and other Red Hat solutions. As a result, TMG reduced development time and costs and delivered real-time data access and visibility to its clients.
Tags : 
consulting, efficiency, data, api, java, best practices, enterprise resource planning
    
JBoss Developer
Published By: AppDynamics     Published Date: Dec 10, 2014
Learn the top 10 most common java performance problems and how your organization can avoid them in order to get the most out of your application performance.
Tags : 
java performance, reliance on technology, it team, employee productivity, prevent issues, application performance management
    
AppDynamics
Published By: AppDynamics     Published Date: Sep 21, 2017
Perhaps more than any programming language, Java continues to have a profound impact on how people navigate today’s world. Java’s functionality is responsible for setting a great deal of what users expect in terms of performance from their internet-accessible devices. The history of Java is more than two decades long and the language continues to grow and adapt in response to evolving consumer and business expectations. Throughout all of these changes, however, the performance of Java applications remains a paramount concern for developers.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Nov 02, 2017
With an estimated 9 million developers worldwide, the Java community is a very robust one. One of the most important uses of Java today is building applications for mobile devices using the Android operating system. In addition, Java remains incredibly popular for enterprise applications and client-server web applications, and is also a very common language of instruction in software development courses.
Tags : 
    
AppDynamics
Published By: AppDynamics     Published Date: Sep 20, 2017
Perhaps more than any programming language, Java continues to have a profound impact on how people navigate today’s world. Java’s functionality is responsible for setting a great deal of what users expect in terms of performance from their internet accessible devices. The history of Java is more than two decades long and the language continues to grow and adapt in response to evolving consumer and business expectations. Throughout all of these changes, however, the performance of Java applications remains a paramount concern for developers.
Tags : 
secure, performance, portable, architecture, software, hardware, java
    
AppDynamics
Published By: Oracle     Published Date: Apr 03, 2012
Download this white paper, Top Reasons to Implement an SOA Governance Strategy: A List for IT Executives, for a guide to governance that will set you on the right path.
Tags : 
soa, service oriented architecture, networking, middleware, weblogic, oracle, information technology, web services, application server, server, sla, maturity model, 10g, jvm, java, data management
    
Oracle
Published By: Oracle     Published Date: Apr 05, 2018
Les fonctions marketing et informatique font plus que jamais la paire. Aujourd'hui, l'agilité des entreprises se mesure à l'aune de la flexibilité opérationnelle de leurs outils marketing. Pour découvrir les possibilités ouvertes par les nouvelles technologies dans le domaine du marketing, lisez notre « Guide des technologies marketing ». Au sommaire : Les technologies du paysage marketing actuel Les nouveautés de l'automatisation marketing Le rôle de vos contenus et des réseaux sociaux dans votre stratégie globale Oracle is a global technology company who provide a range of services, including the Oracle, the ‘industry’s broadest and most integrated public cloud’ which lowers costs and reduces IT complexity. They also offer IT security service, database, Java services, Enterprise Management, consulting and support services and more. Oracle have more than 420,000 customers worldwide and are widely revered throughout the computing industry. All information that you supply is pro
Tags : 
    
Oracle
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.