DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

SBOMs are essential to circumventing software supply chain attacks, and they provide visibility into various software components.

The Latest Data Topics

article thumbnail
Cache Wisely: How You Can Prevent Distributed System Failures
The article describes different approaches to protect systems from hidden scaling bottlenecks that can creep into the system when caching is implemented.
July 9, 2024
by Tejas Ghadge
· 11,539 Views · 6 Likes
article thumbnail
This Is How SSL Certificates Work: HTTPS Explained in 15 Minutes
The world of online security may seem complex. In this post, gain an understanding of the basics of how SSL certificates work and why HTTPS is essential.
July 9, 2024
by Dinesh Arora
· 2,491 Views · 1 Like
article thumbnail
Enhancing Security With ZTNA in Hybrid and Multi-Cloud Deployments
This article takes a look at the modern networking concept of ZTNA and how security is its core focus with cloud and on-premise infrastructure.
July 9, 2024
by Sanjay Poddar
· 3,644 Views · 11 Likes
article thumbnail
AWS: Metric Filter vs. Subscription Filter
In this blog on AWS, let’s do a comparison study between two filter tools available with Amazon CloudWatch Logs — Metric Filter and Subscription Filter.
July 8, 2024
by PRAVEEN SUNDAR
· 3,235 Views · 1 Like
article thumbnail
Next-Gen Lie Detector: Stack Selection
Follow the steps of the creation of a lie detector's backend stack and learn the importance of remaining open to unconventional solutions for common tasks.
July 5, 2024
by Grigorii Novikov
· 58,571 Views · 55 Likes
article thumbnail
Applying the Pareto Principle To Learn a New Programming Language
This article describes how you can apply the Pareto principle, also known as the 80/20 rule, to start learning a new programming language quickly.
July 5, 2024
by Krishna Vinnakota
· 9,462 Views · 14 Likes
article thumbnail
Strengthening Web Application Security With Predictive Threat Analysis in Node.js
Enhance your Node.js web application security by implementing predictive threat analysis using tools like Express.js, TensorFlow.js, JWT, and MongoDB.
July 5, 2024
by Sameer Danave
· 6,615 Views · 2 Likes
article thumbnail
Addressing the Challenges of Scaling GenAI
Generative AI (GenAI) has transformative potential but faces adoption challenges like high computational demands, data needs, and biases. Learn solutions here.
July 4, 2024
by Jagadish Nimmagadda
· 2,724 Views · 1 Like
article thumbnail
Comparing Axios, Fetch, and Angular HttpClient for Data Fetching in JavaScript
In this article, we will explore how to use these tools for data fetching, including examples of standard application code and error handling.
July 4, 2024
by Nitesh Upadhyaya DZone Core CORE
· 5,475 Views · 5 Likes
article thumbnail
Build Your Business App With BPMN 2.0
This tutorial demonstrates how to build a business application with the Business Process Modelling Notation (BPMN 2.0), a model-driven approach.
July 3, 2024
by Ralph Soika
· 4,564 Views · 2 Likes
article thumbnail
Data Integration Technology Maturity Curve 2024-2030
When it comes to data integration, some people may wonder what there is to discuss— isn't it just ETL? Learn more in this post.
July 3, 2024
by William Guo
· 6,738 Views · 4 Likes
article thumbnail
Mastering Distributed Caching on AWS: Strategies, Services, and Best Practices
Distributed caching on AWS enhances app performance and scalability. AWS provides ElastiCache (Redis, Memcached) and DAX for implementation.
July 3, 2024
by Raghava Dittakavi DZone Core CORE
· 4,541 Views · 2 Likes
article thumbnail
DDN and Tintri: Powering the Future of AI and Enterprise Storage
Discover how DDN and Tintri's latest innovations in AI storage and virtualization are empowering developers and engineers to tackle complex data challenges.
July 2, 2024
by Tom Smith DZone Core CORE
· 2,031 Views · 1 Like
article thumbnail
Performance and Scalability Analysis of Redis and Memcached
This article benchmarks Redis and Memcached, popular in-memory data stores, to help decision-makers choose the best solution for their needs.
July 2, 2024
by RAHUL CHANDEL
· 8,816 Views · 6 Likes
article thumbnail
Apache Hudi: A Deep Dive With Python Code Examples
Explore Apache Hudi, an open-source data management framework providing efficient data ingestion and real-time analytics on large-scale datasets stored in data lakes.
July 2, 2024
by Harsh Daiya DZone Core CORE
· 4,268 Views · 2 Likes
article thumbnail
Operational Excellence Best Practices
The article explores efforts to stabilize a critical service by enhancing observability and implementing service protection.
July 2, 2024
by Poonam Pradhan
· 3,183 Views · 2 Likes
article thumbnail
GBase 8a Implementation Guide: Resource Assessment
The storage space requirements for a GBase cluster are calculated based on the data volume, the choice of compression algorithm, and the number of cluster replicas.
July 1, 2024
by Cong Li
· 4,773 Views · 1 Like
article thumbnail
Handling “Element Is Not Clickable at Point” Exception in Selenium
Struggling with "element is not clickable at point" in Selenium? Learn why this exception occurs and fix it with effective solutions for smooth test automation.
July 1, 2024
by Faisal Khatri DZone Core CORE
· 3,687 Views · 2 Likes
article thumbnail
Implementing Real-Time Credit Card Fraud Detection With Apache Flink on AWS
Real-time fraud detection systems are essential for identifying and preventing fraudulent transactions as they occur. Apache Flink is useful in this scenario.
July 1, 2024
by Harsh Daiya DZone Core CORE
· 7,443 Views · 4 Likes
article thumbnail
Leveraging Microsoft Graph API for Unified Data Access and Insights
This article explores the capabilities of Microsoft Graph API and how it can be utilized to unify data access and gain insights.
June 28, 2024
by Naga Santhosh Reddy Vootukuri DZone Core CORE
· 11,173 Views · 2 Likes
  • Previous
  • ...
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • [email protected]

Let's be friends: