SOA Infrastructure News
October 12, 2015
Redwood Supply Chain has adopted a number of best practices regarding EDI standards in order to simultaneously modernize supply chain and data architectures.
September 14, 2015
Learn how OpenLegacy API Platform provides automation and modernization for all aspects of application integration projects.
July 07, 2015
Learn why Clusterpoint's new 3.0 NoSQL database technology is our editors' choice for innovation for July 2015.
March 25, 2014
In this podcast, independent technology consultant Joe McKendrick discusses how to deal with a legacy app in the ever-changing IT landscape.
SOA Infrastructure Get Started
Bring yourself up to speed with our introductory content
A colocation (colo) is a data center facility in which a business can rent space for servers and other computing hardware. Typically, a colo provides the building, cooling, power, bandwidth and physical security while the customer provides servers ... Continue Reading
Code refactoring tools are plentiful, so how do you choose the one that's right for you? Brad Irby explains what to look for when choosing a tool. Continue Reading
Code refactoring has been heralded as an effective way to modernize applications, especially for mobile. Take this quiz to find out what you really know. Continue Reading
Evaluate SOA Infrastructure Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Is it worth an organization's time to support the use of Android in the enterprise? The answer is yes, and contributor Matthew David explains why. Continue Reading
Organizations are increasingly moving towards the use of SaaS and cloud services to meet their needs. But what outsourcing considerations should they be taking before leveraging these services? Continue Reading
Increasing demands for cloud- and mobile-ready applications are making legacy modernization efforts more critical than ever. This quiz will test your knowledge on modernization techniques and the ways to avoid common project pitfalls. Continue Reading
Product ReviewsPowered by IT Central Station
Powered by IT Central Station
What can I say about PDI. So far it has been a complete disappointment. Pervasive has certainly made a huge step forward in embracing a web-based...Continue Reading
Integrates heterogeneous environments, developments in a short time. Exception handling flows aren't explained very wellPowered by IT Central Station
Valuable Features: Flexibility and high performance. I can perform integrations with any environment and scenery as well as growth in apps...Continue Reading
Ability to monitor all types of middleware (ESB, MQ, Web Services, URL). User Interface is somewhat plain.Powered by IT Central Station
Our organization has been using Infrared360 for almost 2 years now. I have been very happy with this product so I decided to post my experiences...Continue Reading
Manage SOA Infrastructure
Learn to apply best practices and optimize your operations.
SOA governance tools can help keep projects on track, and vendors have been releasing a plethora of options. Find out how they stack up in this article. Continue Reading
Architecture security has been proposed as both a "top-down" and "bottom-up" approach. In this tip, Tom Nolle examines the implications of each security model approach. Continue Reading
Working with hybrid clouds requires proper planning. Tom Nolle explains what cloud planners need to know about hybrid cloud integration and workflows. Continue Reading
Problem Solve SOA Infrastructure Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Here are several options for incorporating mobile apps as part of a legacy system modernization effort. Approaches include vendor apps and writing APIs. Continue Reading
How do refactoring problems come about, and is there a way to predict them? Contributor Brad Irby has the answers. Continue Reading
Find out why and how enterprises should include security architects into the DevOps process to help avoid software vulnerabilities. Continue Reading