Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Data Engineering Topics
Neo4J and Virtual Nodes/Relationships
Let's take a look at Neo4j and virtual nodes and relationships.
October 1, 2019
by
Scott Sosna
CORE
·
13,911 Views
·
4 Likes
Inspect Network Traffic in Capybara Using the Poltergeist Driver
In this post, we learn how to inspect network traffic of any page and validate its response values using these handy tools.
Updated October 1, 2019
by
Gowthamraj Palani
·
14,065 Views
·
4 Likes
Java Getter and Setter: Basics, Common Mistakes, and Best Practices
Here's a look at programming with getters and setters in Java.
October 1, 2019
by
Nam Ha Minh
·
367,243 Views
·
26 Likes
Secure Spring REST API Using OAuth2 + MySQL
REST easy knowing your APIs are secure after this tutorial.
September 30, 2019
by
Mayur Shahapure
·
54,994 Views
·
6 Likes
Investigating a Memory Leak in Entity Framework Core
Memory dumps don't lie — if you have a memory leak, look at the evidence before you.
September 27, 2019
by
Richard Brown
·
31,880 Views
·
4 Likes
Quick Walk-Through to Develop Micro-Services Using .Net Core 2.X
Time for an upgrade!
September 27, 2019
by
Sachin Kulkarni
·
16,095 Views
·
3 Likes
Machine Learning in Software Development — Use Cases
There is a diversity of use cases in a wide variety of industries.
September 27, 2019
by
Tom Smith
CORE
·
12,062 Views
·
1 Like
The Flavors of APIs
Check out the different flavors of APIs.
September 26, 2019
by
Ryan Searle
·
18,421 Views
·
6 Likes
Learn How to Use Okta's Authentication API with Java Servlets
Get secure with Okta's authentication API and Java Servlets.
September 26, 2019
by
Lindsay Brunner
·
15,921 Views
·
1 Like
Machine Learning in Software Development — Techniques and Tools
The ability to version-control ML models, automate testing, and provide better feedback.
September 26, 2019
by
Tom Smith
CORE
·
9,178 Views
·
2 Likes
Where Is My Cache? Architectural Patterns for Caching Microservices
Can you find it?
September 26, 2019
by
Rafał Leszko
·
58,858 Views
·
48 Likes
Build a Simple CRUD App Using Spring Boot, MySQL, and JPA/Hibernate
In this tutorial, you’ll create a CRUD app with MySQL, Spring Boot, and JPA/Hibernate. You’ll use Okta for authentication and implementing single-sign-on (SSO).
September 25, 2019
by
Lindsay Brunner
·
88,269 Views
·
9 Likes
Spark Tutorial: Validating Data in a Spark DataFrame Part Two
Validate data with Spark's DataFrame in a few, simple steps.
September 25, 2019
by
Bipin Patwardhan
·
16,876 Views
·
2 Likes
Java in Azure Functions
Check out this example of developing and executing a Java-based application running in Azure Functions.
September 25, 2019
by
Kiran Kumar
·
39,705 Views
·
2 Likes
What Is API-Led — An Architectural Approach
Let's look at this excerpt to find out what API-led means and explore the architectural decisions, implementation patterns, and more.
September 25, 2019
by
Luis Weir
·
27,297 Views
·
9 Likes
Provisioning an Apache HTTP Server with AWS CloudFormation
A couple of quick code snippets to get you provisioning and on your way.
September 25, 2019
by
Preetdeep Kumar
CORE
·
10,615 Views
·
3 Likes
Docker Compose CI/CD in Azure DevOps
A tutorial for deploying Docker images and using Docker Compose in Azure CI/CD pip
September 25, 2019
by
Vasyl Kutsyk
·
33,106 Views
·
3 Likes
Build an Android Chatbot With Dialogflow
Look at the steps to integrate a Dialogflow bot in an Android app.
Updated September 24, 2019
by
Devashish Mamgain
·
38,750 Views
·
7 Likes
50+ Useful Kubernetes Tools
Check out this seemingly-exhaustive list of Kubernetes tools and utilities to take control of every part of your Kubernetes cluster.
Updated September 24, 2019
by
Stefan Thorpe
CORE
·
106,170 Views
·
35 Likes
Login With Facebook and Google Using Angular 8
Make user authentication more secure in a few, simple steps.
September 24, 2019
by
Sanwar Ranwa
CORE
·
89,082 Views
·
10 Likes
Previous
...
483
484
485
486
487
488
489
490
491
492
...
Next