Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Blog Directory  >  Technology Blogs  >  Tech Bytes - Daily Digest technology Blog  > 

Tech Bytes - Daily Digest Blog
A daily digest of useful and interesting articles on information technology, Security, governance and leadership.
2017-08-19 11:16
Oracle doesn't want Java EE any moreOracle plans to explore its desire to offload Java EE with the open source community, licensees, and candidate foundations. Although Oracle has not named… Read More
2017-08-18 16:53
An inside look at the Oracle container management strategyOne of the things about containers is making sure that you only put into a container, particularly in production, the bits that you… Read More
2017-08-17 16:50
Machine Learning: More Than Just AlgorithmsIf machine learning is relegated to playing a supporting role, this means that it won’t be algorithms that companies must master. Rather, alg… Read More
2017-08-16 17:08
The merging of enterprise and consumer identities means it’s time for a universal identityAn Identity Broker is a system that can support Bring-Your-Own-Identity (BYOI) schemes by taki… Read More
2017-08-15 13:15
Let’s Corrupt a Database Together, Part 3: Detecting CorruptionIn theory, you keep them all the way back to your last clean CHECKDB. In practice, you’ll need to keep them longer… Read More
2017-08-14 16:45
How IT Can Prepare For VR, AR & MR In The EnterpriseWith great opportunities come great responsibility, as Uncle Ben might have said if he’d worked in IT. “Like anything else… Read More
2017-08-13 12:00
How to Seamlessly Include Geospatial Data Operations for Data IntegrationWith the increased availability of data through sensors, interconnected mobile devices, social media, and private or… Read More
2017-08-12 16:55
The Difference Between Good and Bad Shadow ITShadow IT can have negative business impact because it breaks with all the processes and rigors that the IT department is so diligently trying to… Read More
2017-08-11 17:13
When it comes to cybersecurity, companies need force fields, not wallsCybersecurity is no longer a matter of protecting against mere nuisance. Over the past 15 years, the digital threats to… Read More
2017-08-10 16:23
Securing Asia’s data centers against physical threats“Security is not thought about much while the infrastructure is built. Security only happens after they have completed the in… Read More

Share the post

Tech Bytes - Daily Digest


Subscribe to Tech Bytes - Daily Digest

Get updates delivered right to your inbox!

Thank you for your subscription