Resource Library

Access the latest white papers, research, webcasts, case studies and more covering a wide range of topics like Java, enterprise integration and open source Java.

Filter the library by ...

Coding with JRebel: Java Forever Changed

With JRebel, developers get to see their code changes immediately, fine-tune their code with incremental changes, debug, explore and deploy their code with ease, and ultimately spend more time coding.

E-Learning Provider Reduces Liferay Development Time with JRebel

In this case study, learn how MSLC was able to view code changes instantly, eliminate redeployment wait time, and subsequently streamline application development and change management.

Rocket-Powered Java Development

Check out this 8-step guide to see how you can increase your productivity by skipping slow application redeploys and by implementing application profiling, as you code!

What Developers Want: The End of Application Redeploys

Eliminate application restarts in Java with JRebel! JRebel is a JVM plugin that eliminates application redeploys from the Java development cycle, a process that takes over 10 minutes of coding time away from developers each working hour.

Containers: Merging Bluemix and Docker for enterprise-grade containers

IBM Containers on Bluemix includes the power and flexibility of Docker open source containers with the security and workflow that organizations need for production environments.

eBook | Presented by IBM Corporation

IBM Bluemix Architecture Series: Web Application Hosting on IBM Containers

As you follow along with four lab-style scenarios, this IBM Redpaper™ publication demonstrates how to create and deploy a web-based collaboration application on IBM Bluemix.

eBook | Presented by IBM Corporation

Microservices from Theory to Practice

Microservices is an architectural style in which large, complex software applications are composed of one or more smaller services. This IBM Redbooks® publication gives a broad understanding of this increasingly popular architectural style.

White Paper | Presented by Bay Dynamics

Gartner Market Guide for User and Entity Behavior Analytics

Enterprises use User and Entity Behavior Analytics (UEBA) to detect malicious and abusive user behavior by connecting the dots across data collected from users and entities to uncover security risks that criminals may exploit.

Infographic: Cybersecurity Dossier

The new reality of the post malware age - 'data for sale' and cyber criminals who collaborate. Cyber attackers are not just sharing and leveraging successful data breach methods, but also exfiltrated data feeds.

White Paper | Presented by LogEntries

10 Best Practices for Log Management

Log management has become a staple in modern IT operations, supporting a number of use cases including debugging, production monitoring, performance monitoring, support and troubleshooting.

Load More