How to use Redis Streams

Email not displaying correctly? View it in your browser.

InfoWorld Daily

Nov 14, 2018
Featured Image

Machine learning lessons: 5 companies share their mistakes

Machine learning can also go terribly wrong, making you regret that enthusiastic rush to adopt Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to use Redis Streams
C# roadmap: What to expect in Microsoft.Net’s C# 8.0
What .Net Standard 2.1 means to you
12 ways Azure beats AWS
Fix your data before you move it to the cloud

White Paper: Bitsight

How Automating Third-Party Risk Management Helps Banks and Financial Institutions Address New Regulatory Requirements

Banks & financial firms have long been aware of the need to manage risk in third-party partners & most have a formal program for managing that risk. Yet an existing thirdparty risk management (3PRM) program may not address today's increased levels of outsourcing & new regulatory requirements for cybersecurity. Together, these factors are prompting financial institutions to take a fresh look at the strengths & focus of their 3PRM strategy. Read More

Thumbnail Image

How to use Redis Streams

Redis Streams is a new Redis data structure for managing data channels between producers and consumers. Here’s how to get started Read More

Thumbnail Image

C# roadmap: What to expect in Microsoft.Net’s C# 8.0

Index types, nullable reference types, default interfaces, and async streams should improve code quality and make software more flexible over the long term Read More

Thumbnail Image

What .Net Standard 2.1 means to you

A new release of the .Net Standard library is around the corner, with significant benefits to developers—and a major shift in .Net's evolution Read More

Thumbnail Image

12 ways Azure beats AWS

From Visual Studio integration to Ethereum blockchain support, you have at least a dozen reasons to choose Azure over AWS Read More

Thumbnail Image

Fix your data before you move it to the cloud

In cloud migrations, I’m often taken back how the data that was bad on-premises is worse in the cloud Read More

White Paper: Hitachi ID Systems, Inc.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More

Get the Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content: in-depth articles available only to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Daily as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.