Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Culture and Methodologies Topics
How to Debug a Remote Java Application
The importance of being able to debug a Java application that is deployed remotely, in another country or city, cannot be understated.
August 19, 2019
by
.
·
491,505 Views
·
21 Likes
Five Questions CTOs Ask Me About QA
Five burning QA questions get answered!
August 19, 2019
by
Stacy Kirk
·
15,115 Views
·
4 Likes
Microservice Architecture NFR Considerations
Things to consider in microservice architecture.
August 15, 2019
by
Omkar Joshi
·
15,097 Views
·
9 Likes
Concerns With the Current State of DevOps
Complexity, security, consistent understanding, and business perspective are among the cited concerns that arise as DevOps grows.
Updated August 15, 2019
by
Tom Smith
CORE
·
14,962 Views
·
3 Likes
The Magic of Small User Stories
How smaller stories can actually be more effective than bigger ones.
August 14, 2019
by
Dwight Kingdon
·
9,193 Views
·
6 Likes
If You're Not Making Progress at Work, You're Done
We're still in the midst of an employee engagement crisis. Wise leaders will take the following message to heart.
Updated August 13, 2019
by
Sarah Sinning
·
16,571 Views
·
4 Likes
In-Sprint Test Automation at Agile and DevOps Speed Using Testsigma
Learn how to implement in-sprint testing to avoid losing time for UI automation.
Updated August 13, 2019
by
Renju Jose
·
31,094 Views
·
5 Likes
Frequently Asked MuleSoft Interview Questions 2019
Take a look at some frequently asked MuleSoft interview questions.
August 12, 2019
by
Vibhuthi Viswanathan
·
51,660 Views
·
5 Likes
What Is the Right Size for a User Story?
What constitutes right is dependent on you, your team, and how you play the game.
August 2, 2019
by
Allan Kelly
CORE
·
75,118 Views
·
6 Likes
Batch Processing Large Data Sets With Spring Boot and Spring Batch
Let's process some data.
August 2, 2019
by
Swathi Prasad
·
75,021 Views
·
6 Likes
20+ Linked List Interview Questions for Java Programmers
Need help preparing for your next interview?
August 2, 2019
by
Javin Paul
·
54,842 Views
·
12 Likes
Setting Title and Caption With ExifTool
Set photo titles and captions with ExifTool.
August 1, 2019
by
Rob Allen
·
6,140 Views
·
1 Like
Role of Enterprise Architecture in DevOps Adoption
The structure of an enterprise's architecture changes drastically in terms of culture, process, and toolchain.
July 30, 2019
by
Dr Gopala Krishna Behara
CORE
·
16,367 Views
·
5 Likes
How to Secure Your Git Project Using an Easy Branching Strategy
Learn more about how to safely secure your Git project using a branching strategy.
July 30, 2019
by
Divya Bhushan
·
15,791 Views
·
7 Likes
Measure Lead Time for the Business
Consider using DevOps metrics that focus on deploying code that fulfills business needs and measures the full code lifecycle than just deployment.
Updated July 29, 2019
by
Eric Minick
·
14,647 Views
·
5 Likes
How to Manage Outdated Feature Flags
Consider creating a dedicated day to evaluate, label, and remove expired feature flags to maintain your CI environment.
Updated July 24, 2019
by
Jeffrey Sing
·
11,042 Views
·
3 Likes
What Is Scaled Agile Framework: 9 Principles
An outline of the principles of Scaled Agile Framework (SAFe).
July 23, 2019
by
Siva Shanmugam
·
23,158 Views
·
1 Like
10 Best Mind Mapping Software for IT Non-IT Businesses
This article analyses and recommends different types of mind mapping software.
July 22, 2019
by
Fred Wilson
·
16,433 Views
·
5 Likes
Business Intelligence in Microservices: Improving Performance
An in-depth review of the different ways to improve your microservices.
July 22, 2019
by
Artem Barmin
·
24,943 Views
·
11 Likes
Most Effective Security Techniques (Part 1)
Creating a security culture supported by training, good hygiene, and processes are mentioned most frequently as effective security techniques.
Updated July 18, 2019
by
Tom Smith
CORE
·
13,504 Views
·
3 Likes
Previous
...
83
84
85
86
87
88
89
90
91
92
...
Next