VIDEOCAST:
John Davies, Technical Director, IONA and Gil Tene, CTO & co-founder of Azul Systems, discusses how Azul Compute Appliances solves scalability and performance problems in organizations due to their business critical Java applications.
Posted: 02 Aug 2007 | Premiered: Aug 2, 2007, 09:00 EDT (13:00 GMT)
SOFTWARE DOWNLOAD:
Download the latest version of IBM Rational Software Architect V8 to experience the latest in design and modeling technologies, comprehensive support for emerging technologies around SOA and Java Enterprise Edition 5, and best of breed tools that integrate with IBM's product lifecycle management solutions.
WEBCAST:
Access this webcast to learn about the past, present and future of IBM i. Discover, through the use of real-life examples, how organizations have benefited from this system.
WEBCAST:
Check out this webcast to learn how the Agile Scaling Model can be applied to tailor the Scrum lifecycle, roles, and practices to address scaling factors, including regulatory compliance, technical complexity, and organizational complexity.
SOFTWARE DEMO:
SOA is a business-driven IT approach that supports integrating a business as linked, repeatable business tasks, or services, but pursuing SOA on an ad-hoc scattered basis can dramatically reduce its benefits.
VIDEO:
In today's marketplace, businesses need to enhance collaboration between business and IT - otherwise, misalignment can cause bottlenecks, inefficiency, poor use of resources. Watch this video to learn about a platform-as-a-service (PaaS) offering that improves IT-business collaboration for developing process-centric applications and services.
WEBCAST:
Adapting to change is hard for today's professional architectures, but with the dynamics of the industry, change is a must. This webcast will show how to gain successful agility and maximize business IT value with the Smart SOA approach. Watch now!
Posted: 13 Oct 2008 | Premiered: Nov 5, 2008, 10:30 EST (15:30 GMT)
WEBCAST:
Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.