Twitter | Search | |
Search Refresh
Auth0 Oct 16
This article offers concrete tools and approaches for keeping your customers safe and help you build a solid technical foundation on which to scale 👥🔒 Read on → 🛡
Reply Retweet Like
Oracle Magazine 1h
Use this Oracle's Security Assessment Tool to find out what security policies and controls are in place
Reply Retweet Like
HarperDB Oct 13
Happy Saturday, we hope you are enjoying the weekend without any worries about your company's !
Reply Retweet Like
Spotlight Cloud Oct 13
With a growing and constantly evolving technology, you might feel like you're juggling a million to-dos at once. Here's what to do:
Reply Retweet Like
IR@NCTU Oct 13
Design of a Chinese Business Card Understanding System -font character recognition
Reply Retweet Like
Tech Junkie Oct 15
Core: Entity Framework Call Store Procedure
Reply Retweet Like
Tech Junkie Oct 15
Introducing Volume Snapshot Alpha for Kubernetes
Reply Retweet Like
Quest 7h
Learn how you can integrate change management in a pipeline. Ensure peak performance through the entire development lifecycle.
Reply Retweet Like
Diffbot Oct 16
Latest PostgreSQL Trends: Most Time-Consuming Management Tasks & Important Metrics to Track
Reply Retweet Like
Len Cooley 16h
RT kimkomando "Most known data breaches happen when a manages to infiltrate an online or a website with user records. But what if legitimately acquired information is being peddled and shopped around illegally online? … "
Reply Retweet Like
Tech Junkie Oct 14
Scenario 2: VPC with Public and Private Subnets (NAT) - Amazon Virtual Private Cloud
Reply Retweet Like
TMJ-INM IT-DB Jobs 3h
We have 1 open today in .
Reply Retweet Like
Henry H. Ngan, MBA, CPA Oct 10
In your world of work and play, what is the most important programming language and why?
Reply Retweet Like
VCLA at TU Wien 11h
Have you missed EDBT/ICDT 2018 under the baton of Reinhard Pichler ? Photo collection ;)
Reply Retweet Like
Bluepen Software 4h
Reply Retweet Like
Pete Zantey 6h
Reply Retweet Like
CryptoMarks 10h
Malware datasets. A lot of malware sample with analysis results. Useful for IOCs and research. Contact: maldatabase@outlook.com
Reply Retweet Like
Kaminario 11h
Check out these 4 steps on how to unleash the full potential of your
Reply Retweet Like
Stefan Pauliuk 17h
Happy to announce in development: Different IE data, i.e., process inventories, IO tables, stocks, flows, material composition, lifetime, etc., can now be formatted and exchanged via a common database:
Reply Retweet Like
SQL Daily 18h
Multi-Version Concurrency Control (MVCC) is a fantastic feature that ensures: Readers don’t block writers Writers don’t block readers Without it an update could block your select! explains how this works in PostgreSQL
Reply Retweet Like