Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Data Engineering Topics
ORMs: Heroes or Villains Inside the Architecture?
In the information age, with new technologies, frameworks, and programming languages, there is an aspect of technology that never changes.
June 6, 2019
by
Otavio Santana
CORE
·
12,274 Views
·
2 Likes
Microservices Architectures: What Is Fault Tolerance?
We explore why fault tolerance is essential in a microservices architecture and how it can be implemented at the code level using frameworks such as Hystrix.
June 6, 2019
by
Ranga Karanam
CORE
·
38,275 Views
·
9 Likes
Graylog With Kubernetes in GKE
Take a look at how you can use Graylog to collect data from multiple sources with independent streams.
Updated June 6, 2019
by
Moaad Aassou
·
18,891 Views
·
4 Likes
Fetching Data With ORMs Is Easy! Is It?
We explore how one ORM system makes querying and fetching large amounts of data much easier.
June 6, 2019
by
Andrey Belyaev
CORE
·
6,386 Views
·
6 Likes
Handling Service Timeouts Using Istio
The best practice for service timeouts is to prevent them, or at least make them as short as possible.
June 6, 2019
by
Samir Behara
CORE
·
8,752 Views
·
3 Likes
Read GPS Data With a Raspberry Pi Zero W and Node.js
Learn more about reading GPS Data with a Raspberry Pi and Node.js.
June 6, 2019
by
Nic Raboy
·
16,321 Views
·
2 Likes
Redis Streams + Apache Spark Structured Streaming
A quick look into how Redis Streams and Apache Spark can be combined to effectively work with structured data streams.
June 6, 2019
by
Roshan Kumar
·
9,953 Views
·
3 Likes
Guidance for Building a Control Plane for Envoy, Part 4: Build for Extensibility
This is part 4 of a series on Envoy. In today's post, we explore building a control plane for Envoy Proxy.
June 6, 2019
by
Christian Posta
·
6,061 Views
·
2 Likes
Reverse Engineering of a Not-So-Secure IoT Device
Learn more about reverse engineering and IoT devices.
Updated June 6, 2019
by
Erich Styger
·
19,016 Views
·
11 Likes
Computer Vision: Overview of a Cutting Edge AI Technology
Explore computer vision more deeply and look at what analysts are saying about it.
Updated June 5, 2019
by
Frederic Jacquet
CORE
·
39,950 Views
·
7 Likes
Microservices Architecture: Introduction to Auto Scaling
In this article, we look at auto scaling and the important parts of implementing auto scaling in a microservices architecture.
June 5, 2019
by
Ranga Karanam
CORE
·
36,083 Views
·
17 Likes
DevOps Business Value and Advantages
The very same advantages that software development experiences with DevOps can be applied to other industries.
June 5, 2019
by
Vladimir Fedak
·
13,956 Views
·
4 Likes
We Turned Off AWS Config
This alternative to AWS Config rules saved this team time, money, and complexity.
June 5, 2019
by
Ryan Hilliard
·
11,946 Views
·
4 Likes
Device Authentication: Notify User of Login From New Device or Location
You can now determine if a user logs in from a new device or location.
June 5, 2019
by
James Warner
·
15,884 Views
·
9 Likes
Export Kubernetes Logs to Azure Log Analytics With Fluent Bit
Let's see how open source Fluent Bit can help with your Azure log processing.
June 5, 2019
by
Sam Cogan
·
7,772 Views
·
3 Likes
Build a Blockchain PoC Application Using Hyperledger Fabric
Remember: Efficiency beats any convoluted design and/or architecture.
Updated June 5, 2019
by
Don Li
·
12,989 Views
·
5 Likes
Using the Telegraf Elasticsearch Input Plugin
Let's get the InfluxDB sandbox up and running as well as an Elasticsearch node that we can populate with some data using Kibana.
Updated June 4, 2019
by
Sonia Gupta
·
12,656 Views
·
2 Likes
Create a Reactive App With MongoDB and Spring Boot
Learn how to create a Reactive app with MongoDB and Spring Boot.
June 4, 2019
by
Andrew Hughes
·
22,592 Views
·
4 Likes
Ensuring the Security of Your APIs
Learn about API types, types of clients, and techniques for protecting their information in this in-depth look at security practices for APIs.
Updated June 4, 2019
by
Vivek Yadav
·
40,263 Views
·
17 Likes
How to Install BookStack on CentOS 7
Let's get BookStack up and running on your CentOS machine to help you create documentation.
June 4, 2019
by
Sajid Qureshi
·
7,672 Views
·
2 Likes
Previous
...
503
504
505
506
507
508
509
510
511
512
...
Next