Editors' Picks
-
Managing Oracle connections from third-party apps
Oracle expert Brian Peasland answers one reader's question about common pitfalls when connecting Oracle to outside programs.23 Jul 2013
-
How to avoid security problems with Java outside the browser
Another Java zero-day vulnerability has a security pro asking threats expert Nick Lewis how Java can safely be used with enterprise applications.22 Jul 2013
-
Dell Boomi and other integration providers jump on API management
After several API management firms were acquired elsewhere, Dell Boomi announces their own API management features, built internally.10 May 2013
-
Windows Azure competes with AWS, pushes more frequent, granular updates
Microsoft released a steady stream of Azure updates, keeping pace with AWS. Could this mean Azure IaaS is finally ready for the enterprise ring?30 Apr 2013
-
Modularity in Java codebase makes legacy applications more manageable
Enterprise architecture expert Vineet Sinha explains how to implement modularity in Java legacy applications for a cleaner, more manageable codebase.09 Apr 2013
-
Secunia: More focus needed on third-party application security
Secunia highlights the growing need for better third-party application security, plus Microsoft's security improvements, and the growing cost of zero-days.14 Mar 2013
-
Global transaction IDs, full-text searches highlight MySQL 5.6 release
Performance boost is an important part of the MySQL 5.6 release, although integration may be an issue early on.12 Mar 2013
-
Scaling SOA: New approaches to elastic services in the cloud
Elastic services let organizations scale up their service-oriented architecture to meet peak demand and back down to save costs in the long troughs.11 Mar 2013
-
Build a cloud computing enterprise architecture strategy
Learn to steer clear of challenges when preparing your enterprise architecture for cloud computing.11 Mar 2013
-
2013 Java trends: The cloud floats into Java application development
Cloud computing architectures are having wide-reaching effects on Java application development. Here are five hot trends in cloud computing for 2013.25 Feb 2013
-
Big data trends: Big things in store for 2013
Big data trends in 2013 will include rises in cloud storage, organization of unstructured data and the importance of real-time analytics.21 Feb 2013
-
Mobile app dev meets agile best practices
The demand for mobile apps and how quickly those apps need to change is persuading some companies to embrace agile best practices.19 Feb 2013
-
Java mobile application trends for 2013
Java mobile applications are becoming more popular as mobile devices proliferate, both for consumers and for businesses.18 Feb 2013
-
What's brewing for Java in 2013: A look at Java technology news
Java technology news is constantly shifting. This article takes a look at the important Java trends right now, at the start of 2013.18 Feb 2013
-
Spring sucks? Refuting the case against Spring
Because some old school J2EE types think Spring sucks, Ken Rimple takes some time to refute common complaints about Spring.11 Jan 2013
-
Spring vs. Java EE: Making the case for Spring
Ken Rimple's case for Spring includes comparisons to Java EE, but he also expounds on improvements Spring and other languages have brought to the JVM.11 Jan 2013
-
New Java features bring the JDBC API closer to Spring
Innovations from the Spring framework have spurred advances in the JDBC API which are now helping the Spring framework evolve.11 Jan 2013
-
Java EE vs. Spring: The two are not quite equivalent
Java EE has certainly improved since the days of J2EE, but a look at Spring and Java EE today shows Java still has some catching up to do.11 Jan 2013
-
A Spring summary: The Spring framework is still relevant
Ken Rimple, Spring guru and co-author of 'Spring Roo in Action,' introduces the Spring framework and presents three reasons why Spring is still relevant.11 Jan 2013
-
How to secure Java amid growing Java security vulnerabilities
Constant Java security vulnerabilities plague Oracle and enterprises alike. Expert Nick Lewis offers tips on how to use Java and the JRE securely.05 Dec 2012
Security Management Strategies for the CIO