Published By:
NEC
Published Date: Sep 29, 2009
Written by: IDC Abner Germanow, Jonathan Edwards, Lee Doyle IDC believes the convergence of communications and mainstream IT architectures will drive significant innovation in business processes over the next decade.
Tags :
it architecture , idc , automation , automated order processing , soa , service oriented architecture , soap , http , xml , wsdl , uddi , esbs , jee , .net , crm , san , business process automation , business process management , configuration management , edi
Learn why your peers are replacing JEE containers with lightweight application servers - and what you can gain from the move.
Tags :
vfabric , vmware virtualization , server virtualization , desktop virtualization , public cloud , private cloud , virtual machine , vmware , vm ware , networking , data management , virtualization , cloud computing , infrastructure , design and facilities
Published By:
VMware
Published Date: Aug 23, 2011
Learn why your peers are replacing JEE containers with lightweight application servers - and what you can gain from the move.
Tags :
application server , data management , application monitoring and management , web server load balancing , enterprise messaging , vmware virtualization , server virtualization , desktop virtualization , public cloud , private cloud , virtual machine , vmware , vm ware cloud app performance , cloud performance , cloud computing , application performance management , solid-state drives , business continuity , business process automation , business process management
Published By:
VMware
Published Date: Aug 23, 2011
This white paper discusses an important trend in IT deployment architectures: the evolution from JEE Application Servers to lighter weight Java.
Tags :
application server , data management , application monitoring and management , web server load balancing , enterprise messaging , vmware virtualization , server virtualization , desktop virtualization , public cloud , private cloud , virtual machine , vmware , vm ware cloud app performance , cloud performance , cloud computing , application performance management , solid-state drives , business continuity , business process management , enterprise resource planning
2013 was a challenging year for major companies fighting high-profile security breaches. Apple, Twitter, Facebook, Microsoft, Tumblr, Burger King, Jeep, Evernote and The New York Times are just a few of the big-name organizations that had to combat security problems.
Tags :
securing applications , compliance , security , applications , security , firewall , compliance issues , loopeholes , ddos , denial of service , application security , business technology