TECHniques Blog TECHniques Blog

Making Alfabet Your Own - part 6

Configuring workflows Issue 3, 2018 Download PDF Introduction – Why workflows? Business and IT...

webMethods Single Sign-On with a Third-Party Identity Provider

Example with OKTA® Increasingly companies rely on third-party providers for identity management and authentication. The benefits include better...

Logging as a service

Say goodbye to log combing and shell scripts The amount of data generated daily by each runtime in today’s IT landscapes is enormous, and it...

How to monitor your EntireX Mainframe Broker using Command Central

webMethods EntireX Imagine you are running EntireX Broker on a mainframe platform like z/OS®, Z/VSE® or BS2000. How can you check whether it...

Making Alfabet Your Own - part 8

Configuring reports, part 2 In this “Making Alfabet Your Own” series of articles, we look at how to configure the Alfabet product for best fit...

Software AG Cloud

Start small, grow at your own pace On November 27th we launched the unified Software AG Cloud platform, which marked an important milestone in...

Analysis of business-critical core applications

Adabas & Natural 2050  Striking a balance between cutting costs and optimally supporting the business model is a major challenge for...

How to upgrade your webMethods products

Choose the proper upgrade technique Software AG releases its product suite every six months – in April and in October. The April release is an...

IoT portfolio lifecycle management

How to achieve end-to-end visibility across operational & information technology environments How do you accommodate changes to your...

The webMethods survey results are in

See what our customers have to say In December, we completed our seventh annual webMethods survey, collecting very useful information from...

About the Author About the Author

Author details not found

Latest Issue Latest Issue

Follow us Follow us