Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Applying KnowIT Principles When Deploying Waratek AppSecurity for Java (waratek.com)
1 point by javinpaul on Jan 2, 2016 | past
Secure Containers for the Cloud (waratek.com)
7 points by markitexture on Nov 26, 2014 | past
The Increasing Importance of Container Security (waratek.com)
8 points by andreasnippets on Nov 13, 2014 | past | 1 comment
Legacy Java Data Risk (waratek.com)
6 points by mikojava on Oct 29, 2014 | past | 1 comment
Are You Playing Cyber Security Dominoes? (waratek.com)
8 points by shelajev on Sept 17, 2014 | past | 1 comment
Neglecting Application Security Can Be Costly (waratek.com)
6 points by shelajev on Sept 3, 2014 | past
How Waratek confronts bringing applications to a multitenant environment (waratek.com)
4 points by theotown on April 24, 2014 | past
The challenges faced in Virtualizing Java (waratek.com)
3 points by javahypervisor on March 19, 2014 | past
Java Virtualization using a Java Virtual Machine Monitor (waratek.com)
2 points by neomatrix369 on March 18, 2014 | past
Using a Java Hypervisor (waratek.com)
1 point by henk53 on March 16, 2014 | past
Using a Java Hypervisor to reduce your memory footprint (waratek.com)
6 points by jonas_boner on March 11, 2014 | past
Cut your Amazon bill in half with clever virtualization tricks (waratek.com)
7 points by mikojava on Feb 6, 2014 | past
Capacity planning memory for real-world JVM applications (waratek.com)
5 points by waratek on Jan 7, 2014 | past
VMWare is to OS as CloudVM is to JVM (waratek.com)
2 points by spullara on March 8, 2013 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: