Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
Assumptions, Risks, and Dependencies in User Stories
Don't gamble with your project. Learn where these three often hidden elements may be in your user stories and how they can derail your project.
March 6, 2019
by
Tom Fulton
·
33,275 Views
·
2 Likes
How We Built an Asynchronous, Temporal RESTful API Based on Vert.x, Keycloak and Kotlin/Coroutines for Sirix.io (Open Source)
Check out how you can build an asychronous RESTful API using Sirix, Vert.x, and Keycloakis.
Updated March 5, 2019
by
Johannes Lichtenberger
·
6,239 Views
·
4 Likes
Top 10 Banking APIs: Make Your App Transactions More Secure in 2019
Learn more about the top 10 banking APIs and how to secure your app transactions.
March 5, 2019
by
Natalia Kukushkina
·
16,714 Views
·
4 Likes
5 Courses to Learn RESTful Web Services With Java and Spring in 2019
In this article, we share some of the best courses to learn REST API development in the Java world using Spring.
March 1, 2019
by
Javin Paul
·
30,836 Views
·
18 Likes
Why and When to Use Java for Developing Your Application
Java is here to stay.
February 28, 2019
by
Amit Gupta
·
11,550 Views
·
3 Likes
Inversion of (Coupling) Control in Java
Learn more about the inversion of control and dependency injections in Java.
February 28, 2019
by
Daniel Sagenschneider
·
31,468 Views
·
42 Likes
Complete Guide to RFID: Benefits, Applications, and Challenges
Here's everything you need to know about RFID.
February 28, 2019
by
Shahid Mansuri
·
26,159 Views
·
3 Likes
MEAN Stack and Startups: Are they Made for Each Other?
Of all the web stacks, the MEAN stack is considered one of the best frameworks to use. Read on to learn more about this web stack.
February 27, 2019
by
Lalit Singla
·
9,500 Views
·
2 Likes
REST API Security Vulnerabilities
With its increasing popularity, REST APIs pose major security challenges.
February 27, 2019
by
Hari Subramanian
·
39,748 Views
·
15 Likes
4 Chatbot Security Measures You Absolutely Need to Consider
Are your chatbots secure?
February 25, 2019
by
Paul Pinard
·
17,486 Views
·
4 Likes
Breaking Static Dependency: How to Make Code Testable
Learn how you can make code with static dependencies testable.
February 19, 2019
by
Gunnar Peipman
·
22,126 Views
·
3 Likes
Monitoring Microsoft Azure With Logz.io
Take a look at how you can monitor your Azure instance and create dashboards with other integrations.
February 19, 2019
by
Daniel Berman
·
8,951 Views
·
1 Like
The Mystery Behind Testing ''The Integration of Payment Gateways''
Ever wondered how to test payment gateway integrations effectively?
February 15, 2019
by
Sadhvi Singh
·
20,509 Views
·
4 Likes
Getting Started With Serenity BDD and Cucumber 4
Whether your preferred design pattern is Page Objects, Lean Page Objects, or another one, here's how to write automated tests with Serenity BDD.
February 15, 2019
by
John Ferguson Smart
·
44,271 Views
·
5 Likes
Dependency Injection in .NET Core Console Applications
We take a look at how to implement dependency injection in smaller .NET Core apps, while also addressing the challenges of doing this in larger, real-world applications.
February 15, 2019
by
Gunnar Peipman
·
81,526 Views
·
5 Likes
Spring Boot and OAuth2: Getting the Authorization Code
Need help implementing Spring Boot and OAuth2?
February 14, 2019
by
Vijay Maniyar
·
112,025 Views
·
24 Likes
A Simple Checklist for Apache Ignite Beginners
If you're just starting with this great open source framework, don't worry, we're here to help. Check out this great resource to help get you going.
February 13, 2019
by
Shamim Bhuiyan
·
24,036 Views
·
5 Likes
Vulnerability Threat Control Paradigm and CIA Triads – Computer Security
Learn more about the Vulnerability Threat Control Paradigm.
February 13, 2019
by
Arslan ud Din Shafiq
·
13,427 Views
·
2 Likes
IoT-Enabled Embedded Web Server Reference Example
Embedded HTTP and WebSocket servers have been designed specifically for tiny microcontrollers with limited resources.
Updated February 12, 2019
by
Wilfred Nilsen
·
30,985 Views
·
5 Likes
Using TLS With Rust: Authentication
Learn how to implement the authentication portion of your network protocol in Rust.
February 12, 2019
by
Oren Eini
·
7,705 Views
·
3 Likes
Previous
...
114
115
116
117
118
119
120
121
122
123
...
Next