VIDEO:
Watch this videocast to learn how it is bringing the productivity of modern, industry-leading integrated development environments (IDEs) to COBOL, including the ability to deploy key business-critical COBOL applications to Windows 7, .NET, JVM and the cloud.
EGUIDE:
Read this TheServerSide.com Expert Tip to better understand the JVM performance problem, how the JVM manages memory and how best to approach JVM Performance.
WHITE PAPER:
This technical white paper explores in detail the technology behind a new virtualized deployment paradigm for Java EE applications, describing not only the technology behind these advances, but also the benefits and usage.
WHITE PAPER:
Using benchmarks and code samples throughout to anchor the discussion, this paper explores how Quercus - Caucho's Java implementation of PHP - can perform faster than the standard Apache-based PHP both in synthetic benchmarks and real-world applications. The results are quite impressive.
WHITE PAPER:
This paper explains why it’s imperative for any Web-based organization to learn about the distributed caching technology and Oracle Coherence Data Grid technology to combat the increasing demand on the database.
EZINE:
In this handbook, focused on enterprise resource planning in the Asia-Pacific region, Computer Weekly looks at what's behind this renewed priority and why firms want cheaper software maintenance and the benefits of best-of-breed cloud apps.
EZINE:
An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.
INFOGRAPHIC:
Before implementing Enterprise Content Management, it's important for organizations to develop an ECM roadmap or strategy to identify the top priorities and get clarity on the necessary procedures and technologies it entails. This infographic outlines the steps to successfully implement an ECM system.
EZINE:
In this week's Computer Weekly, we visit a Tokyo project where artificial intelligence is helping to improve road safety by detecting potential subsidence. As bug bounty programmes become popular, we look at what's involved and the pitfalls to beware. And we discuss digital development in healthcare with NHS England. Read the issue now.
RESEARCH CONTENT:
We analysed 426 log files provided by the Philippines' Commission on Elections to objectively recreate what transpired during the 2016 elections. These log files were used to gauge the integrity of the Philippine AES using an AES Trust Model developed by this research.