loader image

14216 Riyadh, Saudi Arabia

Office Hours: 8:00 AM – 6:00 PM

  • June 20 2024
  • Smart Transformation

secure access service edge (SASE)

What is secure access service edge (SASE)? Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native security technologies and delivers them as a single cloud service. SASE lets organizations unify their network and security tools in a single management console. This provides a simple security and […]

Read More
  • June 20 2024
  • Smart Transformation

Installed Base of Cellular POS Terminals to Reach 189M in 2027

Cellular connectivity has become a trendy option for POS terminals and was incorporated in 52 percent of the devices shipped in 2023. Wireless technology has an important role in facilitating the global adoption of electronic payments, as it enables the rollout of POS terminals to many new market segments and parts of the world where […]

Read More
  • June 20 2024
  • Smart Transformation

Oracle APEX adds generative AI assistant

Oracle has updated its managed low-code application development platform, Application Express, or APEX, with a programming assistent driven by generative AI. The APEX AI Assistant debuts in Oracle APEX 24.1. Oracle APEX can be used via any of Oracle’s database services across the company’s on-premises and cloud infrastructure. The APEX AI Assistant can generate SQL […]

Read More
  • June 19 2024
  • Smart Transformation

Enhancing Kindergarten Safety with IoT

Imagine a world where kindergarten trips are not only educational but also incredibly safe, with teachers free to focus more on play and learning than on constant headcounts. This vision is becoming a reality in Norway thanks to innovative IoT GPS technology that promises to transform the safety of the kindergarten experience for children, parents, […]

Read More
  • June 19 2024
  • Smart Transformation

Polymorphism and inheritance in Java

Polymorphism—or an object’s ability to execute specialized actions based on its type—is what makes Java code flexible. Many design patterns created by the Gang Of Four rely on some form of polymorphism, including the Command pattern. In this article, you will learn the basics of Java polymorphism and how to use it in your programs. […]

Read More
  • June 18 2024
  • Smart Transformation

Apple’s Xcode 16 adds AI-powered code completion

Apple has released a beta version of Xcode 16, an update to the integrated development environment (IDE) for Apple platforms that features AI-powered predictive code completion. Accommodations for the Swift language and the planned Swift 6 language release also are highlighted. The Xcode 16 beta was made available June 10 on the Apple Developer website. […]

Read More
  • June 17 2024
  • Smart Transformation

How the Publishing Industry Is Slowly Implementing IoT

The publishing industry, historically rooted in traditional methods, is undergoing a significant transformation with the advent of the Internet of Things (IoT). This technological advancement promises to reshape how content is created, distributed, and consumed. IoT devices connect the physical and digital worlds, offering numerous benefits to publishers, authors, and readers alike. In the context […]

Read More
  • June 17 2024
  • Smart Transformation

What's wrong with Java's sun.misc.Unsafe?

Java’s sun.misc.Unsafe class has been in use since 2002. It provides essential low-level methods that framework developers use to deliver otherwise unobtainable features and performance. Unfortunately, Unsafe also has long-standing problems related to JVM maintainability. And, as the name implies, it isn’t exactly safe to use. A newer JEP proposes to remove sun.misc.Unsafe’s memory access methods in a […]

Read More
  • June 16 2024
  • Smart Transformation

Databricks expands Mosaic AI support for generative AI apps

Databricks is getting ready to offer more support to enterprises building generative AI applications, with the addition of new Mosaic AI capabilities, it said Wednesday. The new features, previewed at the data lakehouse provider’s ongoing Data + AI Summit, seek to simplify the training and management of generative AI applications. They join a suite of others […]

Read More
  • June 15 2024
  • Smart Transformation

Vulnerability Management for IoT Developers: 5 Key Capabilities

In 2023, IoT devices connected to home networks were attacked an average of eight times per day. If you manage massive IoT deployments, it’s up to you to make sure these attacks don’t succeed. Vulnerability management is a huge part of this security effort. No connected device is 100 percent impenetrable, so understanding where your […]

Read More