• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

java ee

Results 26 - 37 of 37Sort Results By: Published Date | Title | Company Name
By: Lumension     Published Date: Oct 20, 2014
"Just over a decade ago, the outcry over Microsoft’s security problems reached such a deafening level that it finally got the attention of Bill Gates, who wrote the famous Trustworthy Computing memo. Today, many would say that Microsoft leads the industry in security and vulnerability handling. Now, it’s Java that’s causing the uproar. But has Oracle learned anything from Microsoft in handling these seemingly ceaseless problems? In this webinar, Randy Franklin Smith from Ultimate Windows Security will start by reviewing the wide-ranging Java security changes Oracle is promising to make. They sound so much like the improvements Microsoft made back with Trustworthy Computing that I’m amazed it hasn’t been done before! We’ll move on to discuss what you can do now to address Java security in your environment. One of the banes of security with Java is the presence of multiple versions of Java, often on the same computer. Sometimes you really need multiple versions of Java to support appli
Tags : 
java, insecurity, vulverabilities, computing, security
    
Lumension
By: BlackBerry     Published Date: Apr 13, 2010
In this webcast, author Brian Zubert tells about, Java Specification Request (JSR) that means, proposed addition to the Java platform, proposed and reviewed by expert group, public review before JSR finalized, Must be approved by Java Community Process (JCP) Executive Committee.
Tags : 
blackberry, java, jsr, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wireless application software, wireless communications, wireless hardware, wireless infrastructure, wireless messaging, wireless phones
    
BlackBerry
By: IBM     Published Date: Jan 21, 2016
Cloud, Mobile and Social are today's communication and engagement models for customers, employees and partners. And to support these models, your infrastructure needs to be simple, flexible, stable, scalable and highly secure.
Tags : 
ibm, multi-speed it, websphere, application server, it transformation, it management, enterprise applications
    
IBM
By: IBM     Published Date: Mar 31, 2016
"Cloud, Mobile and Social are today's communication and engagement models for customers, employees and partners. And to support these models, your infrastructure needs to be simple, flexible, stable, scalable and highly secure. While the changing market dynamics provide growth opportunities for businesses, capitalizing on them requires organizations to build new capabilities that: Enable continuous delivery of new features Shorten product innovation time to market Bring the business value chain closer to customers, partners and employees
Tags : 
ibm, websphere application server, java ee 7, it transformation, cloud, middleware, infrastructure, cloud computing
    
IBM
By: IBM     Published Date: Oct 07, 2016
The new capabilities of WebSphere Application Server Liberty profile, based on Java EE 7 standards, are designed for enhanced developer productivity, dynamic scale, resilient production deployments and ease of integration into modern DevOps workflows. These new production ready capabilities of Liberty profile enable development and delivery of engaging and responsive applications by providing the application infrastructure that meets expectations for speed, agility and user friendliness.
Tags : 
ibm, middleware, cloud, platform services, websphere application server, java ee 7, websphere application server liberty, networking, knowledge management, enterprise applications
    
IBM
By: IBM     Published Date: Dec 15, 2016
Watch to learn: - How to tackle the challenge of multi-speed IT with WebSphere Application Server's unique approach to delivering application infrastructure based on Java EE 7 - How to provide continuous availability for running modern apps that require on-demand dynamic scalability and high operational resiliency - How the lighweight and modular architecture of WebSphere Liberty provides an ideal foundation to develop and deploy microservices - How to deliver flexibility to develop, deploy and consume application infrastructure - on-premises or on the cloud, including emerging virtualization technologies such as Docker - How to manage and monitor thousands of applications and servers with a single management interface for ease of problem determination
Tags : 
ibm, middleware, it transformation, websphere application server, enterprise applications
    
IBM
By: Mentor Graphics     Published Date: May 21, 2009
No question the UI in electronic devices today is playing a larger role in the success of a device. Get the UI wrong and your product will have little chance of surviving. And it isn’t enough to deliver a UI that is merely functional: it has to look good too. Studies have shown that a good cosmetic design can encourage users to explore the full range of features and often, can engender the perception that a product is easier to use, which can make consumers more tolerant of product deficiencies. Learn more today!
Tags : 
mentor, user interface, electronic devices, consumer, cosmetic, graphics, nucleus, time-to-market, phone, media, tv set-top box, java, embedded software, pim apps, embedded component, callback, opengl, scripting, engineering, engineer
    
Mentor Graphics
By: IBM     Published Date: Mar 04, 2014
Download this Whitepaper by Jerry Cuomo, Vice President and Chief Technology Officer, IBM WebSphere, to understand more about how you can leverage JavaScript pervasiveness to simplify radically the life cycle of applications that are interactive, web facing and transactional.
Tags : 
ibm, mobility, mobile applications, mobile app, mobile app development, javascript, apis, app servers, software development, it management, enterprise applications, mobile computing
    
IBM
By: IBM     Published Date: Oct 17, 2016
IBM commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by migrating from open source Java EE application servers to WebSphere Application Server (WAS) Liberty. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of a WAS Liberty migration on their organizations.
Tags : 
ibm, middleware, cloud, hybrid cloud, application infrastructure, ibm was liberty, application servers, networking, enterprise applications, data management
    
IBM
By: JBoss     Published Date: Sep 23, 2008
This document is intended to provide insight into the considerations and processes required to move an enterprise application from a JavaEE-based application server, such as BEA WebLogic, Oracle Application Server, or IBM WebSphere, to the JBoss Enterprise Application Platform.
Tags : 
jboss, middleware, redhat, linux, red hat, server, server migration, migration, network management
    
JBoss
By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Previous    1 2     Next   
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter