DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workkloads.

Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

The Latest IoT Topics

article thumbnail
On Some Aspects of Big Data Processing in Apache Spark, Part 3: How To Deal With Malformed Data?
In this post I present some solutions on how to deal with malformed date/time data, and on how to set a default value for malformed data.
August 23, 2022
by Alexander Eleseev DZone Core CORE
· 5,172 Views · 2 Likes
article thumbnail
How to Plant the Right Cybersecurity Seeds to Create Opportunities in IoT
This article explains how the latest security best practices offer opportunities in the IoT landscape within the limits of trust and reliability.
August 23, 2022
by Deepak Gupta
· 6,446 Views · 1 Like
article thumbnail
Bootstrap K3S Data: For Beginners
Let’s take a look at how to create an initially well created cluster for managing bootstrap data with a description of K3S and High availability (HA) clusters.
Updated August 21, 2022
by Hrittik Roy
· 8,032 Views · 2 Likes
article thumbnail
Offline-First Apps: Why Should Apps Be Made to Work in an Offline State?
Mobile users often experience network or connectivity issues. The article discusses how it can be minimized through offline-first apps.
August 21, 2022
by Manish Barthwal
· 5,137 Views · 1 Like
article thumbnail
A Review of Popular IoT Communication Protocols
Every IoT communication protocol has a set of parameters that make it a success in one Internet of Things deployment and a total failure in another.
August 19, 2022
by Roman Lapa
· 6,342 Views · 4 Likes
article thumbnail
Where Does Cybersecurity Go From Here?
It's going to get worse before it gets better, but cybersecurity professionals can lead the way to improvement.
August 17, 2022
by Tom Smith DZone Core CORE
· 8,324 Views · 1 Like
article thumbnail
On Some Aspects of Big Data Processing in Apache Spark, Part 2: Useful Design Patterns
In this post, learn to construct Spark applications in a maintainable and upgradable way, where at the same time "task not serializable" exceptions are avoided.
August 16, 2022
by Alexander Eleseev DZone Core CORE
· 8,904 Views · 5 Likes
article thumbnail
IoT + Cloud Growth = Greatest Cybersecurity Risk
Cybersecurity platforms help achieve full visibility, security and control across every user on every device.
August 15, 2022
by Tom Smith DZone Core CORE
· 6,468 Views · 1 Like
article thumbnail
Neural-Symbolic Regression: Distilling Science from Data
Learn about neural-symbolic regression, how data scientists can make use of these algorithms, and what the future holds for them within deep learning.
August 14, 2022
by Kevin Vu
· 6,060 Views · 1 Like
article thumbnail
7 Best MQTT Client Tools Worth Trying
Find a suitable client tool for MQTT testing. Listed by desktop, browser, and command line categories, these tools are available for free (most, open source).
August 12, 2022
by Li Guowei
· 9,500 Views · 1 Like
article thumbnail
5 Data Models for IoT
This blog presents five data modeling approaches to solve IoT data problems with Apache Cassandra.
August 11, 2022
by Artem Chebotko
· 6,989 Views · 1 Like
article thumbnail
Five Steps To Building a Tier 1 Service That Is Resilient to Outages
If Tier 1 services fail, it can mean disaster for a business. To ensure resiliency from outages, follow a proven five-step process.
August 11, 2022
by Pradeep Chinnam
· 6,159 Views · 4 Likes
article thumbnail
On Some Aspects of Big Data Processing in Apache Spark, Part 1: Serialization
In this post, review the basics of how Apache Spark runs its jobs and discover how to avoid serialization errors.
August 11, 2022
by Alexander Eleseev DZone Core CORE
· 6,408 Views · 2 Likes
article thumbnail
A BGP Guide for the Non-Network Engineer
This article focuses on the basics of BGP (Border Gateway Protocol) for the non-network engineer.
August 11, 2022
by Mehdi Daoudi
· 6,816 Views · 1 Like
article thumbnail
Apache Kafka in Crypto and Finserv for Cybersecurity and Fraud Detection
Data streaming with Apache Kafka in crypto markets + financial services for cybersecurity / fraud detection via real-time threat intelligence
August 9, 2022
by Kai Wähner DZone Core CORE
· 4,502 Views · 3 Likes
article thumbnail
Advancing Cybersecurity Using Machine Learning
Cyber threats are becoming novel by the day. The development of machine learning will be an immeasurable advantage to cybersecurity professionals.
August 8, 2022
by Francis Ejiofor
· 5,408 Views · 1 Like
article thumbnail
Monitoring at the Edge of the Third Act of the Internet
The edge is a new frontier. It throws up many new challenges that the enterprise must consider in relation to their monitoring strategy.
August 7, 2022
by Mehdi Daoudi
· 4,019 Views · 2 Likes
article thumbnail
Building an IoT Application Using an HTTP API
Play around with the M5Stack, an API for the New York City MTA, and Gravitee Designer.
July 26, 2022
by Alvin Lee DZone Core CORE
· 5,253 Views · 3 Likes
article thumbnail
Compatibility Testing: Checklists and Crucial Things You Need to Know About It
Learn about crucial things about compatibility testing that you should know. Here are key points to remember about compatibility testing.
July 26, 2022
by Niranjan Limbachiya DZone Core CORE
· 7,900 Views · 1 Like
article thumbnail
Comparison: JMS Message Queue vs. Apache Kafka
This article explores the differences, trade-offs, and architectures of JMS message brokers and Kafka deployments.
July 24, 2022
by Kai Wähner DZone Core CORE
· 4,605 Views · 6 Likes
  • Previous
  • ...
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: