PODCAST:
With the integration world moving from rigid, static EAI to dynamic, loosely coupled SOA and the evolution from Web 1.0 to Web 2.0, these two technological fronts are poised to come together.
Posted: 03 Nov 2006 | Premiered: Nov 1, 2006, 09:00 EST (14:00 GMT)
VIDEO:
Watch this brief video today to learn of a commerce pattern platform that allows organizations to quickly deploy commerce infrastructures and adjust capacity easily to accommodate peak usage. Learn how creating a highly stable environment will ensure optimal resource usage and minimize downtime to provide the best possible customer experience.
WEBCAST:
What keeps your customers happy when it comes to software? Tune into this video to learn more about what you can do to improve your software testing and quality assurance. It outlines the pros and cons of satisfied customers and what the means for your business. View this resource now to learn more about improving your software.
WEBCAST:
ActiveMQ is the most popular messaging platform in use today. This webinar will explain some reoccurring messaging patterns that are used for application integration - and then see how they have been applied in large enterprise deployments with ActiveMQ.
Posted: 10 Feb 2011 | Premiered: Mar 1, 2011, 11:00 EST (16:00 GMT)
SOFTWARE DOWNLOAD:
Having trouble with storage latency issues? SolarWinds® Storage Response Time Monitor free tool tracks those sluggish VMs, shows the top host to datastore total response times and a count of additional high latency offenders.
SOFTWARE DOWNLOAD:
SolarWinds® SAN Monitor for EMC® is a free desktop tool that gives you the visibility into your physical storage to make sure it's in good health and lets you quickly and easily monitor EMC CLARiiON® arrays with at-a-glance insight into storage.
WEBCAST:
Access this slidecast to hear Jay Muehoefer, Director of Software Defined Solutions at IBM, discuss the potential IT and business value of a software defined infrastructure.
WEBCAST:
Security is a critical element in JBoss Enterprise Middleware solutions. With built in security capabilities for password masking, access control, audit, and ongoing security patch management processes, Red Hat provides users with a tool set to ensure their applications remain secure throughout the entire development and deployment life cycle.