DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
View Events Video Library
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Integrating PostgreSQL Databases with ANF: Join this workshop to learn how to create a PostgreSQL server using Instaclustr’s managed service

Mobile Database Essentials: Assess data needs, storage requirements, and more when leveraging databases for cloud and edge applications.

Monitoring and Observability for LLMs: Datadog and Google Cloud discuss how to achieve optimal AI model performance.

Automated Testing: The latest on architecture, TDD, and the benefits of AI and low-code tools.

The Latest Security Topics

article thumbnail
Understanding Cloud-Native Application Protection Platforms: A Comprehensive Overview
A comprehensive overview of Cloud-Native Application Protection Platforms (CNAPPs), emphasizing their importance in securing cloud-native applications.
July 6, 2023
by Vaibhav Manchanda
· 2,831 Views · 2 Likes
article thumbnail
Embracing DevSecOps: Staying Ahead of the Curve for Enhanced Software Security
How can organizations proactively identify and mitigate vulnerabilities, ensuring stronger protection against cyber threats and maintaining the trust of their customers?
July 6, 2023
by Harshad Ithape
· 2,203 Views · 2 Likes
article thumbnail
How To Secure RESTful Web Services
Learn how to ensure the safety of your RESTful API with these efficient methods in this insightful article.
July 6, 2023
by Aditya Bhuyan
· 2,666 Views · 2 Likes
article thumbnail
A Complete API Development Guide: Common Terms, Tools, and Best Practices
This post has covered all the essential things about APIs. It is a must-read for developers or designers interested in working with APIs.
July 5, 2023
by Albert Smith
· 4,113 Views · 2 Likes
article thumbnail
What Are Software Whitelisting and Blacklisting?
Let's dive in to this introduction to software whitelisting and blacklisting along with their benefits.
July 4, 2023
by Aditya Bhuyan
· 1,826 Views · 2 Likes
article thumbnail
Data Governance: Data Architecture (Part 2)
This article discusses data governance and data architecture, and the top three data architecture types that are most frequently used.
July 4, 2023
by Sukanya Konatam
· 2,773 Views · 2 Likes
article thumbnail
Top 6 Benefits of AWS Certification
The comprehensive AWS certification courses help aspirants enhance their skills and knowledge in the field of Amazon Web Services (AWS).
July 4, 2023
by Shormistha Chatterjee CORE
· 4,681 Views · 2 Likes
article thumbnail
Risk Assessment Using Blockchain
To understand how blockchain can help in this area, it is important to understand the technicalities behind this technology.
July 3, 2023
by Akanksha Pathak
· 4,422 Views · 2 Likes
article thumbnail
Amazon Instance Connect Endpoint
This blog post will explore Amazon EC2 Instance Connect Endpoint's features, benefits, and how to leverage it for secure remote access to your EC2 instances.
July 3, 2023
by Rahul Nagpure
· 3,836 Views · 1 Like
article thumbnail
Exploring Amazon Security Lake: Strengthening Data Security in the Cloud
In this blog, we will explore Amazon Security Lake in depth. Discover its impressive features and how it can enhance security in AWS environments.
July 3, 2023
by Rahul Nagpure
· 2,759 Views · 1 Like
article thumbnail
POV on Best Fit Solution for Managing Secure Properties in MuleSoft
This article is a point of view on numerous ways to manage the secure properties in MuleSoft. It talks about the pros and cons of each option.
July 3, 2023
by Ajay Singh
· 2,468 Views · 2 Likes
article thumbnail
Exploring API Headers
Understand API headers' importance, purpose, examples, and best practices. Explore custom headers and advanced techniques for optimized API usage.
July 3, 2023
by Ralph Burgess
· 4,464 Views · 2 Likes
article thumbnail
Less Frequently Used HTTP Methods
Understand less frequently used HTTP methods and their significance in advanced API development to enhance API functionality and efficiency.
July 3, 2023
by Jeffrey Faber
· 4,036 Views · 4 Likes
article thumbnail
Virtualization Security Best Practices: Protecting Your Data and Applications
Virtualization security is a concern for any organization. Read more about virtualization security issues and best practices to enhance your data protection.
July 3, 2023
by Alex Tray
· 2,957 Views · 2 Likes
article thumbnail
Exploring the Need for Object-Oriented Programming
Object-oriented programming (OOP) has become a fundamental paradigm in software development, revolutionizing the way we design, implement, and maintain complex systems.
June 30, 2023
by Shivang herdwaria
· 3,022 Views · 1 Like
article thumbnail
Standardization of Access Management Using IDP Federation
The first part of the IDP federation series introduces the concept of centralizing user authentication through a trusted third-party IDP.
June 29, 2023
by Partha Mondal
· 3,340 Views · 2 Likes
article thumbnail
How To Improve GraphQL API Security
Open-source GraphQL has become increasingly popular for API modernization — but securing GraphQL deployments requires foresight and smart execution.
June 29, 2023
by Cristi Vlad
· 3,928 Views · 3 Likes
article thumbnail
The Evolution and Coexistence of Web 2.0 and Web 3.0
Explore Web 3.0's user empowerment and the coexistence of Web 2.0 and Web 3.0, revolutionizing the digital and financial landscape.
June 29, 2023
by Adam Lieberman
· 2,968 Views · 1 Like
article thumbnail
TDD and the Impact on Security
How can TDD help create secure software, and in which areas can it be implemented directly? Which TDD approaches have what effect, and how to deal with security issues?
June 29, 2023
by Sven Ruppert CORE
· 4,402 Views · 5 Likes
article thumbnail
Angular Best Practices For Developing Efficient and Reliable Web Applications
Following Angular best practices is essential for developing efficient and reliable web applications that deliver exceptional user experiences.
June 27, 2023
by Hardik Thakker
· 7,157 Views · 5 Likes
  • Previous
  • ...
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: