So long, JCP: Eclipse has a new Java spec process in mind

Email not displaying correctly? View it in your browser.

InfoWorld Daily

Oct 18, 2018
Featured Image

RegEx tutorial: Matching sets of characters

Learn how to use regular expressions to work with sets of characters to find what you specifically want—or don’t want Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

So long, JCP: Eclipse has a new Java spec process in mind
MEAN stack tutorial: Get started with the MEAN stack
7 cloud services to ease machine learning
How Azure became the place for open source in the cloud
Steel yourself for the cloud hangover
How to secure your Azure network
How TiDB combines OLTP and OLAP in a distributed database

White Paper: Bitsight

How Automating Third-Party Risk Management Helps Banks and Financial Institutions Address New Regulatory Requirements

Banks & financial firms have long been aware of the need to manage risk in third-party partners & most have a formal program for managing that risk. Yet an existing thirdparty risk management (3PRM) program may not address today's increased levels of outsourcing & new regulatory requirements for cybersecurity. Together, these factors are prompting financial institutions to take a fresh look at the strengths & focus of their 3PRM strategy. Read More

Thumbnail Image

So long, JCP: Eclipse has a new Java spec process in mind

The Eclipse Foundation seeks an open source, lightweight, code-first approach to evolving enterprise Java Read More

Thumbnail Image

MEAN stack tutorial: Get started with the MEAN stack

Learn to use MongoDB, Express, Angular, and Node.js to create fast and flexible web applications entirely in JavaScript Read More

Thumbnail Image

7 cloud services to ease machine learning

Build, train, tune, and deploy machine learning and deep learning models in these end-to-end machine learning clouds Read More

Thumbnail Image

How Azure became the place for open source in the cloud

Microsoft has truly embraced open source, in a radical shift rare for a big company—and developers should be very happy Read More

Thumbnail Image

Steel yourself for the cloud hangover

Naïveté and inadequate planning have made many large enterprises unhappy about the cloud deployments and the ROI they’ve gained. But this too will pass Read More

Thumbnail Image

How to secure your Azure network

Connected virtual machines need the same kind of security and network management tools as your own data center Read More

Thumbnail Image

How TiDB combines OLTP and OLAP in a distributed database

The architecture and use cases of a NewSQL hybrid transactional-analytical, MySQL-compatible, horizontally scalable database Read More

White Paper: Hitachi ID Systems, Inc.

Securing Privileged Access with Hitachi ID Privileged Access Manager (PAM)

Privileged accounts, like their name suggests, are accounts designed to provide broad access to systems and data. They are an integral part of every IT infrastructure and play a key role in a large variety of day-to-day operations. Read More

Get the Deep Technology Insights You Need

Get ongoing access to our exclusive Insider content: in-depth articles available only to Insider members. You get access not only to InfoWorld's Insider content but to selected Insider content from Computerworld, CIO.com, Network World, CSO, and other IDG publications. Sign up at no cost today!

Twitter Facebook LinkedIn Google+

You are currently subscribed to InfoWorld Daily as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 InfoWorld, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.