DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

The Latest Coding Topics

article thumbnail
Are Your Password Management Practices up to Par?
Passwords are a fact of modern business but often aren't managed well. Here are some tips for creating a business culture conscious of password security.
January 17, 2023
by Zac Amos
· 3,035 Views · 1 Like
article thumbnail
Visual Network Mapping Your K8s Clusters To Assess Performance
Visual network mapping is crucial for effective network management. Caretta and Grafana provide real-time network visualization and monitoring.
January 17, 2023
by Anton Lawrence DZone Core CORE
· 7,359 Views · 3 Likes
article thumbnail
Simulating and Troubleshooting StackOverflowError in Kotlin
In this series of simulating and troubleshooting performance problems in Kotlin, let’s discuss how to simulate StackOverflow errors.
January 17, 2023
by Ram Lakshmanan DZone Core CORE
· 2,829 Views · 1 Like
article thumbnail
Implementing Infinite Scroll in jOOQ
Infinite scroll is a classical usage of keyset pagination and is gaining popularity these days.
Updated January 17, 2023
by Anghel Leonard DZone Core CORE
· 8,683 Views · 2 Likes
article thumbnail
Legacy VM Backup vs. Native VM Backup
Today’s modern VMware backup solutions offer powerful backup and replication features for the enterprise data center environment.
January 17, 2023
by Alex Tray
· 2,173 Views · 1 Like
article thumbnail
5 Data Mesh Best Practices From 4 Data Leaders
Four data leaders from leading organizations give their practical advice on how to implement data mesh.
January 17, 2023
by Shane Murray
· 3,428 Views · 1 Like
article thumbnail
How to Configure AWS Glue Job Using Python-Based AWS CDK
In this article, I will show readers how we can use Python-based CDK constructs to set up a Glue job to load data from Amazon S3 to AWS Glue catalog tables.
January 16, 2023
by Joyanta Banerjee
· 9,431 Views · 1 Like
article thumbnail
What Is Azure Site Recovery Service?
Implementing a BCDR strategy to ensure that your data is secure and that your apps and workloads are available during scheduled and unforeseen outages.
January 16, 2023
by hgkgj jghghjgh
· 3,384 Views · 1 Like
article thumbnail
Unlocking the Power of Polymorphism in JavaScript: A Deep Dive
This article will discuss different ways to implement polymorphism in JavaScript, which includes function overloading, method overriding, and duck typing.
January 16, 2023
by Rahul .
· 5,488 Views · 3 Likes
article thumbnail
Classifying Severity Levels for Your Organization
This blog helps you understand levels of severity and how they can enhance your incident response process.
January 16, 2023
by Vishal Padghan
· 3,163 Views · 1 Like
article thumbnail
Tutorial: Developing a Scala Application and Connecting It to ScyllaDB NoSQL
How to create a sample Scala app and connect it to ScyllaDB NoSQL using the Phantom library for Scala: a Scala-idiomatic wrapper over a standard Java driver.
January 16, 2023
by Guy Shtub
· 2,813 Views · 2 Likes
article thumbnail
Automatic Failover and Failback for Legacy Multi-Port Application on AWS Cloud
Customers want to have active-failover for their monolithic applications running on multiple ports which do not support load balancers.
January 16, 2023
by Rahul Nagpure
· 2,423 Views · 1 Like
article thumbnail
How To Build a Node.js API Proxy Using http-proxy-middleware
Learn how to build a Node.js API proxy to handle incoming requests using the http-proxy-middleware package to route the requests.
January 16, 2023
by Saurabh Dashora DZone Core CORE
· 9,194 Views · 3 Likes
article thumbnail
How To Validate Three Common Document Types in Python
Learn about three API solutions capable of validating PDF, Excel, and MS Word documents for document validation services in file processing applications.
January 16, 2023
by Brian O'Neill DZone Core CORE
· 4,136 Views · 2 Likes
article thumbnail
JavaScript Type Conversion and Coercion
The type conversion of variables in JavaScript takes place both manually and explicitly; we just have to write the function name or method manually. Read more.
January 16, 2023
by Bikash Jain
· 2,810 Views · 1 Like
article thumbnail
Pros and Cons of Using Styled Components in React
Yes, Styled-Components is easy, flexible, and amazing, but just like everything else, it has pros and cons. What are they? Let’s have a look!
January 16, 2023
by Brian Gerstner
· 5,071 Views · 1 Like
article thumbnail
Essential Protocols for Python Developers to Prevent SQL Injection Attacks
Python developers must familiarize themselves with challenges the final application might deal with, including security risks like SQL injection.
January 14, 2023
by Ryan Kh
· 5,246 Views · 1 Like
article thumbnail
What Are BitB Phishing Attacks?
A browser-in-the-browser (BitB) attack involves a replica of a single sign-on (SSO) authentication window popping up. It can be hard to spot, but you can take measures to protect against BitB scams.
January 14, 2023
by Zac Amos
· 6,980 Views · 1 Like
article thumbnail
Creating a Wordle App in Jetpack Compose
In order to learn about Jetpack Compose, the new Android library for creating user interfaces, we are going to create a replica of this well-known app.
January 14, 2023
by Diego Ojeda
· 4,547 Views · 2 Likes
article thumbnail
Comparing Flutter vs. React Native
Flutter and React Native are both excellent choices for cross-platform application development. While they share some similarities, there are also some key differences that you should be aware of before deciding which one to use.
January 14, 2023
by Chris Fanchi
· 5,845 Views · 3 Likes
  • Previous
  • ...
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: