Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
Latest Articles - DZone
Reading Spark DAGs
See how to effectively read Directed Acyclic Graphs (DAGs) in Spark to better understand the steps a program takes to complete a computation.
May 4, 2020
by
Daniel Ciocirlan
·
23,193 Views
·
15 Likes
Domain Events Versus Change Data Capture
CDC and event-based communication are two very different things which look similar to some extent, hence the confusion.
Updated May 4, 2020
by
Kislay Verma
·
14,982 Views
·
11 Likes
Reading Spark Query Plans
This article is for the Spark programmer who has at least some fundamentals, but has not dived into how Spark works yet.
Updated May 4, 2020
by
Daniel Ciocirlan
·
22,458 Views
·
5 Likes
Build Your First Python Chatbot Project
In this article, see a tutorial on how to build a Python chatbot project.
Updated May 4, 2020
by
Shivashish Thkaur
CORE
·
152,277 Views
·
31 Likes
Introduction of Spring Webflux and How to Apply Cloud on It
In this article, see an introduction of Spring Webflux and see how to apply Cloud on it.
May 1, 2020
by
Otavio Santana
CORE
·
20,544 Views
·
3 Likes
Deploying a Web Application Via Docker
In this article, see how to deploy a web application via Docker.
May 1, 2020
by
Jawad Hasan Shani
CORE
·
15,857 Views
·
4 Likes
Java Spring Boot Rest API to Upload/Download File on Server
This article demonstrates how to use a Spring Boot application and MySQL to maintain a database of uploaded files and their metadata.
May 1, 2020
by
Yogesh Parate
·
169,807 Views
·
16 Likes
How to Define Method to Take and Return String Data in Java
Is char[ ], String, StringBuffer, or StringBuilder the best way to take and return String data in Java? Take a look at this comparison.
May 1, 2020
by
Vikas Vaibhav
·
141,269 Views
·
2 Likes
10 Best Practices for Data Migration
This high-level overview will help you get started on a data migration plan, with tips for disaster recovery and project management.
May 1, 2020
by
Mario Inter
·
18,681 Views
·
3 Likes
How to NGINX Reverse Proxy with Docker Compose
Take a look at how to use NGINX reverse proxy with Docker Compose to expose multiple services without changing ports.
April 30, 2020
by
Sudip Sengupta
CORE
·
152,142 Views
·
11 Likes
Microservices and Service Mesh at A Glance
Check out the breakdown of microservices and service mesh architecture, as well as explanation of why enterprises uses them and their characteristics.
April 30, 2020
by
Sudheeran Mohanan
·
8,820 Views
·
8 Likes
Integrating Azure Monitor Metrics to Prometheus Time-Series Database With Azure Exporter
In this article, see how to integrate Azure monitor metrics to Prometheus time-series database with Azure exporter.
April 30, 2020
by
Naveen Yalla
·
14,312 Views
·
2 Likes
How to Use MirrorMaker With Apache Kafka Clusters
In this article, see how to use MirrorMaker with Apache Kafka clusters.
April 30, 2020
by
Chandra Shekhar Pandey
·
34,183 Views
·
4 Likes
Deploy Web Server on Google Compute Engine (GCE) with Terraform
With the help of Terraform, this tutorial demonstrates how to deploy a web server on Google Compute Engine, step-by-step.
April 30, 2020
by
Pradeep Bhadani
·
8,454 Views
·
2 Likes
Guide for Supporting Multiple Versions of Java (8, 11, 14) in Your Maven Project
In this article, see a guide for supporting multiple versions of Java in your Maven project.
April 30, 2020
by
Saša Starčević
·
74,364 Views
·
15 Likes
Secure Communication with Token-based RSocket
Take a look at how you can establish secure communication with token-based RSocket, and establish a clear understanding of JWT.
April 30, 2020
by
Lu Han
·
10,634 Views
·
4 Likes
Implementing Aqua Security to Secure Kubernetes
In this article, we discuss the benefits of and how you can go about implementing Aqua Security to better secure Kubernetes.
April 30, 2020
by
Agustin Romano
·
1,358,152 Views
·
3 Likes
Privacy vs Convenience: Is There a Middle Ground?
In this article, we discuss the tradeoff between privacy and convenience when it comes to cybersecurity.
April 30, 2020
by
Edvardas Mikalauskas
·
8,397 Views
·
3 Likes
How to Implement JDBC Authentication and Authorization in Mule 4 Using Spring Security
This tutorial walks step-by-step through how to use JDBC authorization in Mule 4 with Spring Security to provide role based security.
April 30, 2020
by
Harsha Pateelu
·
13,836 Views
·
1 Like
EC Private and Public Key Pair
Get familiar with elliptic curve private and public key pairs.
Updated April 30, 2020
by
Mark Rules
·
16,175 Views
·
2 Likes
Previous
...
778
779
780
781
782
783
784
785
786
787
...
Next