The new world of Java
The new world of Java is all about cloud adoption, which itself is the new world of enterprise IT, says Saurabh Agrawal, practice lead: Open Source Technologies, Java and Cloud Solutions.
Esker named in Gartner Magic Quadrant for second consecutive year
The company was recognised in the 2021 Gartner Magic Quadrant for Procure-to-Pay Suites.
Social media showdown ahead as users demand autonomy
Decentralised social media platforms gain popularity, as assertive users across the globe resist online censorship and gain more control over their data.
SA crypto exchanges buoyant after Bitcoin hits record high
The world’s most popular digital currency yesterday hit a new high, shrugging off the Chinese crypto crackdown and welcoming the Bitcoin ETF tailwinds.
Huawei DIGIX Lab to empower developers on the African continent
In the spirit of collaborative innovation, the DIGIX Lab will allow developers to experience Huawei's open capabilities and devices firsthand.
Accelerating your digital strategy with MySQL
During an upcoming webinar: “Accelerating Your Digital Strategy with MySQL – iOCO and Oracle”, industry leaders will share how to power the business of tomorrow, today.
Hedge funds bullish about Bitcoin resurgence
The Bitcoin network continues to witness an eye-popping level of activity on its blockchain, despite high Q2 volatility, says the Blockchain Centre.
Breaking it down to build it up
While there are many issues and aspects related to open source security, in the end, it all comes down to three basic goals.
Decentralised finance crimes define crypto hacks in 2021
By July, decentralised finance-related hacks totalled $361 million, already making up three-quarters of the total hack volume this year, says CipherTrace.
LSD launches LSDtrip, fully managed and engineered cloud-native accelerator
The cloud-native accelerator leverages a foundation of containerisation, Kubernetes and open source toolsets with the aim of helping businesses adopt cloud-native technologies.
How to develop an open source security strategy
It’s fundamental to balance the need for developers to quickly generate code and for security teams to lock down protections and avoid breaches.