DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Last call! Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

The Latest IoT Topics

article thumbnail
How To Design Reliable IIoT Architecture
Refining your IIoT design is a key part of building strong cybersecurity resilience in the network architecture. Here's how to add security to every layer.
May 18, 2023
by Emily Newton
· 3,805 Views · 2 Likes
article thumbnail
Network Virtualization
In this article, we will delve deeper into the concept of network virtualization, its benefits, and the various technologies and protocols used in its implementation.
May 17, 2023
by Aditya Bhuyan
· 2,829 Views · 2 Likes
article thumbnail
How Virtualization Helps Security
Virtualization allows you to create servers, storage devices, and networks all in virtual space — here's why that's beneficial for cybersecurity.
May 16, 2023
by Zac Amos
· 3,061 Views · 1 Like
article thumbnail
Global Supply Chain With Kafka and IoT
Transforming global supply chain with data streaming and IoT for end-to-end visibility and decision-making in real-time at BMW, Bosch, and Walmart.
May 12, 2023
by Kai Wähner DZone Core CORE
· 6,389 Views · 2 Likes
article thumbnail
A Deep Dive Into the Differences Between Kafka and Pulsar
Compare Apache Kafka and Pulsar, highlighting unique features and core distinctions. It aims to provide insight into mechanisms and inform decision-making.
May 11, 2023
by Teng Fu
· 8,749 Views · 8 Likes
article thumbnail
Harnessing the Power of MQTT for the Future of IoT
As the use of MQTT in IoT is growing tremendously, we can anticipate seven developing trends in MQTT technology.
May 11, 2023
by Umar Nabi
· 5,454 Views · 2 Likes
article thumbnail
Dynamic Data Processing Using Serverless Java With Quarkus on AWS Lambda by Enabling SnapStart (Part 2)
Learn outer loop practices in production using AWS Lambda and DynamoDB in part 2 on making serverless Java for dynamic data processing with a NoSQL database.
May 11, 2023
by Daniel Oh DZone Core CORE
· 9,292 Views · 8 Likes
article thumbnail
Python Dictionary: A Powerful Tool for Data Engineering
This article discusses the Python dictionary use cases in data engineering as a powerful tool and data structure to perform tasks efficiently and accurately.
May 9, 2023
by Amlan Patnaik
· 4,437 Views · 2 Likes
article thumbnail
Zipping up the Lambda Architecture for Faster Performance
Instead of pooling real-time and offline data after they are fully ready for queries, we use an OLAP engine to share part of the pre-query computation burden.
May 3, 2023
by Henry Han
· 2,700 Views · 1 Like
article thumbnail
Optimizing ETL Workflows: Trends, Challenges, and Best Practices for DataOps Success
Master the future of data: Unleash the power of effective ETL workflow with DataOps insights, best practices, and game-changing strategies.
May 2, 2023
by Chisom Ndukwu
· 3,599 Views · 1 Like
article thumbnail
Leveraging IoT for Water Resource Management
Water resource management is the need of the hour, and conventional methods are not going to be enough. Hence IoT and analytics have to be incorporated into the system.
May 1, 2023
by Kamal R
· 2,968 Views · 1 Like
article thumbnail
Use Golang for Data Processing With Amazon SNS and AWS Lambda
In this blog, you saw an example of how to use Lambda to process messages sent to SNS and store them in DynamoDB, thanks to the SNS and Lamdba integration.
May 1, 2023
by Abhishek Gupta DZone Core CORE
· 16,217 Views · 3 Likes
article thumbnail
Orange Pi Cluster With Docker Swarm and MariaDB
In this article, I’ll show you how to build a (surprisingly cheap) 4-node cluster packed with 16 cores and 4GB RAM to deploy a MariaDB replicated topology.
May 1, 2023
by Alejandro Duarte DZone Core CORE
· 24,560 Views · 7 Likes
article thumbnail
User Data Governance and Processing Using Serverless Streaming
This article delves into the concept of User Data Governance and its implementation using serverless streaming in the digital age.
April 27, 2023
by Maharshi Jha
· 6,213 Views · 4 Likes
article thumbnail
Serverless Extraction and Processing of CSV Content From a Zip File With Zero Coding
This article demonstrates the implementation of a serverless function in AWS using Kumologica for unzipping and extracting CSV file content.
April 26, 2023
by Satheesh Valluru
· 4,776 Views · 1 Like
article thumbnail
Benefits of Manual Penetration Testing
While automated pen testing has perks, manual pen testing is still beneficial. Manual pen testers can rely on hard-earned experience, prevent false positives, and more.
April 26, 2023
by Zac Amos
· 2,867 Views · 1 Like
article thumbnail
Delta, Hudi, and Iceberg: The Data Lakehouse Trifecta
Get a detailed overview of Delta Lake, Apache Hudi, and Apache Iceberg as we discuss their data storage, processing capabilities, and deployment options.
April 26, 2023
by Andrey Gusarov
· 10,317 Views · 4 Likes
article thumbnail
Azure Data Box
Azure Data Box is a product offered by Microsoft Azure that helps organizations transfer large amounts of data securely and efficiently to and from Azure.
April 25, 2023
by Shripad Barve
· 3,453 Views · 2 Likes
article thumbnail
How To Use Cypress Intercept for Handling Network Requests
Deep diving into using Cypress intercept for handling network requests, let’s first understand the nuances of network testing while performing Cypress testing.
April 25, 2023
by Kailash Pathak DZone Core CORE
· 3,342 Views · 2 Likes
article thumbnail
10 Best Practices for Using Kubernetes Network Policies
In this article, we will explore ten best practices for using Kubernetes Network Policies to enhance the security and reliability of your applications.
April 24, 2023
by Emmanuel Moila
· 7,762 Views · 3 Likes
  • Previous
  • ...
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: