IBM joins forces with Microsoft to support the other’s cloud platforms with their respective enterprise apps. Whether the software gains can cover IBM’s hardware losses remains to be seen.
DIY is good for remodeling a house, but it might not be right for your enterprise. Answering five questions can prevent your cloud from a DIY disaster.
VMware will offer a SaaS version of its vRealize management suite as the company looks to bolster its hybrid cloud services.
Different mobile platforms have different security characteristics. What's the best way for mobile developers to deal with this?
What is the single most important application security best practice for mobile developers? Security expert Kevin Beaver provides an answer.
Achieving a whole-team Agile approach is hard. Here's how one coach took unusual measures to get her team members talking, asking each other for help and tackling each issue as a team problem.
NetBeans founder Jaroslav Tulach opens up about the future of APIs at JavaOne 2014.
Many companies are exploring ways to maximize the benefits of mobile and IoT applications to enhance productivity.
To help API designers suffer less in a quest for perfection, NetBeans initial architect Jaroslav Tulach shares ideas for API design in this video.
It's amazing how what was once a pet project that provided simple installers to fellow developers turned into a profitable business on the leading edge of cloud hosting and managed virtual servers. Here we take a look at the Bitnami story.
At JavaOne 2014, Barry Burd discussed how and why he's predicting a fast adoption of Java EE 8.
Learn how startup company Codename One is promising native Java across mobile platforms.
When designing APIs, developers must make good decisions about security design components that show who's using what API, when and for what purpose. This tip offers insights into the critical components for securing APIs.
The latest Skytap EaaS release offers instant self-service environments.
Security intelligence is more than the latest buzzword. It's an essential function a successful business needs to protect its internal systems from data theft or loss of network resources.