DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

How does AI transform chaos engineering from an experiment into a critical capability? Learn how to effectively operationalize the chaos.

Data quality isn't just a technical issue: It impacts an organization's compliance, operational efficiency, and customer satisfaction.

Are you a front-end or full-stack developer frustrated by front-end distractions? Learn to move forward with tooling and clear boundaries.

Developer Experience: Demand to support engineering teams has risen, and there is a shift from traditional DevOps to workflow improvements.

The Latest Security Topics

article thumbnail
Security Controls in the Android Operating System (OS)
In this post, we will learn the different security controls provided by the Android operating system (OS) to protect the applications running on the device.
February 10, 2025
by Sheshananda Reddy Kandula
· 2,219 Views · 2 Likes
article thumbnail
A View on Understanding Non-Human Identities Governance
Rethinking the governance, lifecycles, and interdependencies of your machine identities is essential for eliminating secrets sprawl and reducing your attack surface.
February 7, 2025
by Dwayne McDaniel
· 4,160 Views · 6 Likes
article thumbnail
Community Over Code Keynotes Stress Open Source's Vital Role
This year's Community Over Code keynotes highlighted a maturing open-source ecosystem tackling new challenges around security, regulation, and scalability.
February 6, 2025
by Brian Proffitt
· 3,186 Views · 5 Likes
article thumbnail
AI Regulation in the U.S.: Navigating Post-EO 14110
The Trump administration revoked EO 14110, shifting the U.S. toward a market-driven AI strategy to spur innovation and investment.
February 5, 2025
by Frederic Jacquet DZone Core CORE
· 3,927 Views · 4 Likes
article thumbnail
Keycloak and Docker Integration: A Step-by-Step Tutorial
Do you want to configure a Keycloak-Docker integration for your Angular app? Read on to find out how to set everything up.
February 4, 2025
by Michał Zięba
· 8,019 Views · 2 Likes
article thumbnail
Data Governance Essentials: Policies and Procedures (Part 6)
Learn how data quality, policies, and procedures strengthen data governance by ensuring accuracy, compliance, and security for better decision-making.
February 4, 2025
by Sukanya Konatam
· 4,206 Views · 2 Likes
article thumbnail
Processing Cloud Data With DuckDB And AWS S3
DuckDB's ability to read data directly from cloud storage, such as AWS S3, makes it particularly powerful for modern data architectures.
February 4, 2025
by Anil Kumar Moka
· 10,800 Views
article thumbnail
SOC 2 Made Simple: Your Guide to Certification
This guide breaks down the SOC 2 Type 2 certification process into practical steps, from preparation to the audit, with some tips and tools to make the journey smoother.
February 4, 2025
by Roman Misyurin
· 3,385 Views · 3 Likes
article thumbnail
MuleSoft OAuth 2.0 Provider: Password Grant Type
Learn to configure MuleSoft as an OAuth 2.0 provider with the Password Grant type, securing APIs and managing user authentication with best practices.
February 3, 2025
by Nikhil Chawla
· 5,692 Views
article thumbnail
Understanding the Two Schools of Unit Testing
This article provides an overview of Classical school and London school of unit testing in an attempt to understand whether any one of them is better.
January 30, 2025
by Alexander Rumyantsev
· 6,886 Views · 5 Likes
article thumbnail
Secrets Management With Datadog Secret Backend Utility
Learn how to securely manage sensitive data in Datadog using an open-source secret backend utility for seamless integration and enhanced security.
January 30, 2025
by Logan Rohloff
· 3,196 Views · 1 Like
article thumbnail
Why You Don’t Need That New JavaScript Library
Sticking to vanilla JavaScript and proven libraries over flashy new tools leads to more maintainable, secure, and efficient software development.
January 29, 2025
by Denis Ermakov
· 5,127 Views
article thumbnail
Implementing and Testing Cryptographic Primitives With Go
This guide will walk you through the process of implementing and testing various cryptographic primitives using Go’s standard library and best practices.
January 28, 2025
by Sajith Narayanan
· 12,908 Views · 1 Like
article thumbnail
Why Use AWS Lambda Layers? Advantages and Considerations
If you are not using layers for your AWS Lambda function, it's time to reconsider it. This article will give you a glimpse into the implementation of Lambda layers.
January 28, 2025
by Lior Shalom DZone Core CORE
· 4,784 Views · 1 Like
article thumbnail
The Evolution of User Authentication With Generative AI
Modern authentication must evolve beyond CAPTCHAs as advancements in generative AI make traditional verification methods obsolete.
January 27, 2025
by Abhai Pratap Singh
· 4,454 Views · 3 Likes
article thumbnail
Balancing Security and UX With Iterative Experimentation
Experimentation is essential for modern applications as it will allow you to adapt early and improve your product periodically for long-term success.
January 24, 2025
by Swapnil Patil
· 4,148 Views · 2 Likes
article thumbnail
Secure Your Frontend: Practical Tips for Developers
Practical tips to fortify your frontend against common security vulnerabilities, from input sanitization to secure API calls.
January 23, 2025
by Gokul Ramakrishnan
· 2,996 Views · 1 Like
article thumbnail
Multi-Tenant Data Isolation and Row Level Security
Learn how Row Level Security (RLS) enforces data isolation in multi-tenant SaaS systems with a shared database model to improve security and reduce errors.
January 23, 2025
by Rajind Ruparathna
· 6,927 Views
article thumbnail
Streamline npm Packages: Optimize and Boost Performance
Bloated node_modules folders and slow build times stem from unmanaged npm dependencies, leading to inefficiencies and potential risks.
January 22, 2025
by Aishwarya Murali
· 3,791 Views
article thumbnail
Implementing Zero-Trust Security in Kubernetes
Adopting these strategies will enable organizations to enhance their Kubernetes security posture and better defend against evolving cyber threats.
January 22, 2025
by Sai Sandeep Ogety DZone Core CORE
· 6,318 Views · 5 Likes
  • Previous
  • ...
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • [email protected]

Let's be friends: