DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workkloads.

Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

DZone refcards

The world's largest library of technical cheat sheets

401 refcards
8.9M Downloads
565.9K Downloaders
16 Cards per Downloader

Refcard Spotlight

  • Edit
  • Create
  • Clone
  • View Statistics Hide Statistics
  • Machine Learning Patterns and Anti-Patterns

    Refcard #158

    Machine Learning Patterns and Anti-Patterns

    Machine learning can save developers time and resources when implemented with patterns that have been proven successful. However, it is crucial to avoid...

    {{ stats[520272].portal.title }} · {{ stats[520272].clicks }} clicks · · {{ stats[520272].timesInEdition }}x

  • Getting Started With Data Quality

    Refcard #269

    Getting Started With Data Quality

    Poor data quality can cost organizations millions of dollars each year, with additional risks tied to non-compliance under regulations like GDPR. From lost sales...

    {{ stats[2358052].portal.title }} · {{ stats[2358052].clicks }} clicks · · {{ stats[2358052].timesInEdition }}x

  • Apache Cassandra Essentials

    Refcard #153

    Apache Cassandra Essentials

    {{ stats[2905878].portal.title }} · {{ stats[2905878].clicks }} clicks · · {{ stats[2905878].timesInEdition }}x

  • Identity and Access Management

    Refcard #341

    Identity and Access Management

    {{ stats[3063419].portal.title }} · {{ stats[3063419].clicks }} clicks · · {{ stats[3063419].timesInEdition }}x

  • Getting Started With Agentic AI

    Refcard #401

    Getting Started With Agentic AI

    {{ stats[3533995].portal.title }} · {{ stats[3533995].clicks }} clicks · · {{ stats[3533995].timesInEdition }}x

  • Java Application Containerization and Deployment

    Refcard #400

    Java Application Containerization and Deployment

    {{ stats[3524749].portal.title }} · {{ stats[3524749].clicks }} clicks · · {{ stats[3524749].timesInEdition }}x

refcards

  • Latest
  • Popular
Machine Learning Patterns and Anti-Patterns
Machine learning can save developers time and resources when implemented with patterns that have been proven successful. However, it is crucial to avoid anti-patterns that will interfere with the performance of machine learning models. This Refcard covers common machine learning challenges — such as data quality, reproducibility, and data scalability — as well as key patterns and anti-patterns, how to avoid MLOps mistakes, and strategies to detect anti-patterns.
Tuhin Chattopadhyay
Getting Started With Data Quality
How to Build an Effective Strategy for Managing High-Quality Data
Poor data quality can cost organizations millions of dollars each year, with additional risks tied to non-compliance under regulations like GDPR. From lost sales opportunities to potential legal penalties, these data quality pitfalls underscore why proactive data management is critical to protecting your organization's profit and reputation. The aim of this Refcard is threefold: to guide readers in pinpointing the principal risks and effects of inadequate data quality, to highlight the core concepts and principles that underpin an effective data quality strategy, and to offer practical steps for implementing improvements that decisively lower operational risks and costs.
Miguel Garcia
Apache Cassandra Essentials
Distributed non-relational database Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors and is used at some of the most well-known, global organizations. This Refcard covers the fundamentals of Cassandra, including its data model, architecture, replication strategies, network topology, querying and indexing, operations and maintenance, and much more.
Guilherme Nogueira
Identity and Access Management
Core Practices to Secure Digital Identities
Given the rise in identity-focused breaches and the continuously growing number of identities, identity and access management (IAM) has emerged as a cornerstone for safeguarding enterprise systems. By orchestrating secure authorization and authentication, IAM serves as the digital gatekeeper, granting controlled access to diverse resources — from on-premises databases to cloud-based applications. In this Refcard, we delve deep into IAM's crucial role in modern cybersecurity. We outline the primary functions and principles that underpin IAM, highlight its significance, address common challenges faced by engineering teams, and focus on the core practices.
Apostolos Giannakidis
Getting Started With Agentic AI
Harnessing Automation With Intelligent Agents
Advancements in AI and automation have paved the way toward agentic automation. Integrating advanced AI techniques, agentic automation enables autonomous agents to handle complex, unstructured tasks with minimal human intervention. In this Refcard, you will learn about the key components of AI agents, design principles for building intelligent agents, and practical applications of agentic automation — all demonstrated via a real-world use case.
Lahiru Fernando
PostgreSQL Essentials
This Refcard aims to serve as a comprehensive quick-reference guide for PostgreSQL to help both novice and experienced users understand and leverage the crucial capabilities of PostgreSQL more efficiently. Readers will explore PostgreSQL's key features, fundamentals, common commands and functions, and other essential elements.
Kellyn Gorman
Java Application Containerization and Deployment
How to Get Started With Packaging, Shipping, and Delivering Java to Production
Application containerization provides a way to combine all required app resources into a single, standardized, easily manageable package. And for Java applications, containerization helps solve the majority of challenges related to portability and consistency. This Refcard walks readers step by step through Dockerfile creation for Java apps, container image builds, deployment strategies, and more.
Mark Heckler
Software Supply Chain Security
Core Practices to Secure the SDLC and Manage Risk
Securing software supply chains has become a first-class consideration — along with coding and CI/CD pipelines — when developing a software product. Far too many vulnerabilities have been subliminally introduced into software products and resulted in catastrophic breaches for us as diligent developers to treat supply chain security as an afterthought. The core practices and principles outlined in this Refcard provide a foundation for creating secure supply chains that produce deliverables and products that others can trust.
Justin Albano
Platform Engineering Essentials
Empowering Developer Innovation Through Self-Service Platforms
Platform engineering aims to enhance the developer experience through the establishment of secure environments, automated and self-service tools, and streamlined workflows. However, as technology and cyber threats continue to evolve, the integration of automation, security, and AI will be vital to the success of these platforms.

In this Refcard, you will learn more about the value of platform engineering, including best practices, tools, core capabilities, how to align business goals, and more.
Apostolos Giannakidis
Apache Kafka Essentials
Building Scalable and Reliable Stream Processing Applications With Apache Kafka and Flink
Due to growing demands for high-performance analytics, modern businesses consider data capabilities critical to daily operations. Enter Apache Kafka — a streaming engine for collecting, caching, and processing high volumes of data in real time. The distributed event store typically serves as a central data hub that accepts all enterprise data for aggregation, transformation, enrichment, ingestion, and analysis. The data can then be used for continuous processing or fed into other systems and applications in real time. In this Refcard update, we'll explore the fundamentals of Apache Kafka today and delve into how Apache Flink complements Kafka as a powerful stream processing framework.
Sudip Sengupta
API Integration Patterns
Whether you're working with on-premises, cloud, and/or third-party integrations, the questions remain the same: What is the client or user experience you need to offer? And how do you align your integration strategy with it? This Refcard explores fundamental patterns for authentication, polling, querying, and more, helping you assess your integration needs and approach the design, build, and maintenance of your API integrations in the most effective ways for your business case.
Thomas Jardinet
Threat Detection
Core Practices to Manage Risks and Vulnerabilities
Today's cyber threat landscape necessitates a nuanced and proactive strategy for circumventing attacks due to the increasingly complex, sophisticated nature of threats. Security teams must not only have a solid understanding of the landscape but also have effective solutions for predicting and preempting security threats — those both known and unknown to their organization.

In this updated Refcard, you will learn about the evolving threat landscape as well as basic and advanced threat detection techniques, how they are similar and different to threat hunting, and key challenges of emerging technologies, all provided to help strengthen your overall security strategy.
Sudip Sengupta
{{ card.title }}
{{ card.subtitle }}
Hosted by
{{ card.authors[0].name }} profile picture

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: