DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

How does AI transform chaos engineering from an experiment into a critical capability? Learn how to effectively operationalize the chaos.

Data quality isn't just a technical issue: It impacts an organization's compliance, operational efficiency, and customer satisfaction.

Are you a front-end or full-stack developer frustrated by front-end distractions? Learn to move forward with tooling and clear boundaries.

Developer Experience: Demand to support engineering teams has risen, and there is a shift from traditional DevOps to workflow improvements.

  1. DZone
  2. Sitemap Home
  3. Articles
  4. 2023
  5. February

DZone Sitemap: February 2023 Articles

  • 10 Essential Programming Concepts Every Developer Should Master
  • 17 Open Source Projects at AWS Written in Rust
  • 3 Ways That You Can Operate Record Beyond DTO [Video]
  • 5 Essential Tools in Your CloudOps Strategy
  • 7 Benefits of Cloud Automation for Streamlined IT Operations
  • 8 Awesome Source Code Management Tools to Keep In Check
  • A Beginner's Guide to Infrastructure as Code: How IaC Works, Its Benefits, and Common Challenges
  • A Beginner's Guide to Test Automation in Software Development
  • A Clash of SSMS Add-Ins: Comparison of dbForge SQL Complete and SSMS Tools Pack
  • A Deep Dive Into AIOps and MLOps
  • A Handy Guide to Agile Testing: Life Cycle Stages, Best Practices, and Tools
  • Along Came a Bug
  • An Overview of Creating Databases With Python
  • An Overview of Programming Languages
  • Apache Kafka [Video Tutorials]
  • Application Development: Types, Stages, and Trends
  • Application Mapping: 5 Key Benefits for Software Projects
  • Architect Data Analytics Engine for Your Business Using AWS and Serverless
  • Architectural Miscalculation and Hibernate Problem "Type UUID but Expression Is of Type Bytea"
  • Are Industrial IoT Attacks Posing a Severe Threat to Businesses?
  • Art Of Knowledge Crunching In Domain Driven Design
  • Auto Remediation of GuardDuty Findings for a Compromised ECS Cluster in AWSVPC Network Mode
  • Automate and Manage AWS Outposts Capacity Across Multi-Account AWS Setup [Video]
  • Automated Performance Testing With ArgoCD and Iter8
  • AWS Overlay IP in SAP Landscapes
  • Azure Observability
  • Backup Vs. Disaster Recovery: What Are the Key Differences?
  • Behaviors To Avoid When Practicing Pair Programming
  • Best Practices for Creating Highly Reliable Applications in Mule 4
  • Best Ways to Learn Python From Scratch
  • Blenderbot: A Pre-Eminent AIML Model for Chatbot Development
  • Bringing Software Engineering Rigor to Data [Video]
  • Build an AI Chatroom With ChatGPT and ZK by Asking It How!
  • Building Micro-Frontends With Vue and Reusable Components
  • Building Micronaut Microservices Using MicrostarterCLI
  • Building Your Own Apache Kafka Connectors
  • ChatGPT for Newbies in Data Science
  • Commonly Occurring Errors in Microsoft Graph Integrations and How To Troubleshoot Them (Part 4)
  • Comparing OpenAI’s CodeX and ChatGPT
  • Competition of the Modern Workloads: Serverless vs Kubernetes on AWS [Video]
  • Connection Pooling With BoneCP, DBCP, and C3PO [Video Tutorials]
  • Correlations Made Easy
  • Cosmos DB as Key Object Store
  • COVID Risk Modeling Using Tableau Visualization
  • Creating a Polar Chart to Measure Electromagnetic Field Strength
  • Creating Your Swiss Army Knife on Java Test Stack
  • Custom Metadata Types With Validation Rules [Video]
  • Dagster: A New Data Orchestrator To Bring Data Closer to Business Value
  • Data Engineering Practices to Avoid
  • Data Governance Is Ineffective Without Automation
  • Data Privacy From a Data Governance Standpoint
  • Decode User Requirements to Design Well-Architected Applications
  • Deduplication and Data Stewardship Process in MDM
  • Detect and Resolve Biases in Artificial Intelligence [Video]
  • Dev vs. Ops: Conflicted? So Are We. [Comic]
  • Development Platform for Data Protection
  • Distributed Tracing: A Full Guide
  • Don’t Let Kubernetes Developers Suffer From Solved Problems
  • Dynatrace Perform: Day Two
  • Enabling DB Migrations Using Kubernetes Init
  • Enhancing Security with Two-Factor Authentication: An Introduction to TOTP and HOTP
  • Exploring the Architecture of Amazon SQS
  • Extracting Regulatory Citations from Textual Content: A Comparison of Regular Expression, Spacy, and a Combination of Both Approaches
  • Five Arguments for Why Microsoft Azure Is the Best Option for Running Industrial IoT Solutions
  • Generative AI for DevOps: A Practical View
  • GitOps: Flux vs Argo CD
  • Google vs. ChatGPT: Will This Tech War Rejig the World Wide Web?
  • High Throughput vs. Low Latency in Data Writing: A Way to Have Both
  • How Backdoor Attacks Facilitate Data Poisoning in Machine Learning
  • How SecDevOps Adoption Can Help Save Costs in Software Development
  • How To Best Use Java Records as DTOs in Spring Boot 3
  • How To Build an Effective CI/CD Pipeline: Practical Steps for Creating Pipelines That Accelerate Deployments
  • How to Effectively Manage a Remote Software Development Team
  • How To Extract a ZIP File and Remove Password Protection in Java
  • How to Format a Number as Currency in JavaScript
  • How To Migrate From PostgreSQL to YugabyteDB With YugabyteDB Voyager
  • How to Obtain EV Code Signing Certificate for Azure?
  • How To Reduce the Impact of a Cloud Outage
  • How To Scan a URL for Malicious Content and Threats in Java
  • How to Secure Your Website in 10 Easy Steps
  • How To Set up a Multi-Account Dashboard
  • I Don’t TDD: Pragmatic Testing With Java
  • Identity Federation and SSO: The Fundamentals
  • Implementation of Python Generator Functions: A Complete Guide
  • Importance of MVP in Software Development and How Enterprises Approach It
  • Improving Performance of Serverless Java Applications on AWS
  • Improving Query Speed to Make the Most Out of Your Data
  • In-Depth Guide to Using useMemo() Hook in React
  • Increase Your Code Quality in Java by Exploring the Power of Javadoc
  • Integrating AWS Secrets Manager With Spring Boot
  • Integrating Blackbox Exporter in Datadog, Prometheus, and Grafana for Custom Metrics
  • Integrating DevOps with IT Service Management (ITSM): Best Practices for Effective DevOps-ITSM Integration
  • Introduction to Azure Data Lake Storage Gen2
  • Introduction to the FHIR Standard and CMS Rules
  • Java Module Benefits With Example
  • Java REST API Frameworks
  • Kubernetes Cluster Setup on Ubuntu, Explained
  • Legacy Code Refactoring: Tips, Steps, and Best Practices
  • Let’s Use AI To Fix Bugs and Write Documentation
  • Leverage Lambdas for Cleaner Code
  • Lifting and Shifting a Web Application to AWS Serverless
  • Machine Learning and Artificial Intelligence Advancements in MDM
  • Machine Learning Is Even Disrupting the Process of Reverse Phone Lookups
  • Mastering the API Marketplace Supply Chain
  • Maximizing Efficiency With the Test Automation Pyramid: Leveraging API Tests for Optimal Results
  • Maximizing Laravel's Potential: A Guide to Driver-Based Services
  • Measuring Page Speed With Lighthouse
  • Microsoft Azure Event Hubs
  • Microsoft Azure Key Vault Service
  • Migrating From MySQL to YugabyteDB Using YugabyteDB Voyager
  • Migrating From PHP 7.0 to PHP 8.1: All You Need To Know!
  • Mind Map Reuse in Software Groups
  • Misconceptions About No-Code Mobile App Testing
  • Mobile App Development Trends and Best Practices
  • Modernize Your Data Model From SQL to NoSQL
  • Monitor and Predict Health Data Using AWS AI Services
  • Mule 4 Custom Policy Example
  • Multiplying Software Quality Using Three Documentation Types
  • Navigating the Benefits and Risks of Request Hedging for Network Services
  • Node.js for Backend Web Development in 2023
  • Node.js REST API Frameworks
  • Observability-Driven Development vs Test-Driven Development
  • Pair Testing in Software Development
  • Powering Manufacturing With MLOps
  • Predicting the Future of Data Science
  • Principle of DevOps: Establish a Successful Development Team
  • Protect Your Domain With DNSSEC on AWS Route53 and GoDaddy Registrar
  • Quick Pattern-Matching Queries in PostgreSQL and YugabyteDB
  • React, Angular, and Vue.js: What’s the Technical Difference?
  • Refactoring T-SQL Codes With SQL Complete
  • Resolving the Memory Saturation Error
  • Rest API vs GraphQL
  • Running an Airflow DAG/Schedule on a Time Zone
  • SAST and SCA Complemented with Dynamic Observability for CVE Prioritization
  • Securing the Clouds: An Evaluation of Cloud Security Solutions
  • Securing VMs, Hosts, Kubernetes, and Cloud Services
  • Security Architecture Review on a SASE Solution
  • Security in Game Development
  • Select ChatGPT From SQL? You Bet!
  • Setting Up an SSL in a Spring Boot Application
  • Shallow and Deep Copies in JavaScript: What’s the Difference?
  • Shift-Left: A Developer's Pipe(line) Dream?
  • Source Code Management for GitOps and CI/CD
  • SRE vs AWS DevOps: A Personal Experience Comparison
  • Strategy for Combating New Threat Actors and Emerging Cyberattacks and Risks
  • Streamlining Your Workflow With the Jenkins HTTP Request Plugin: A Guide to Replacing CURL in Scripts
  • TDD: From Katas to Production Code
  • Techniques You Should Know as a Kafka Streams Developer
  • The Beauty of Java Optional and Either
  • The Easiest and Quickest Way to Generate an OpenAPI Spec for an Existing Website
  • The Fundamental Components of Securing a Job as a Software Developer
  • The Latest Trends in Web Development, Such as Serverless Architecture or Jamstack
  • The Ongoing Battle: Is Time on the Side of Hackers or Defenders?
  • The Pros and Cons of API-Led Connectivity
  • The Two-Pointers Technique
  • The Ultimate Guide: What To Look Out for in Web Hosting
  • Time For Me To Fly… To Render
  • To Test or Not to Test: Finding the Right Balance in Unity Game Development
  • Too Many Tools? Streamline Your Stack With AIOps
  • Top 10 Best Practices for Scaling Your Application: Expert Tips for Optimizing Performance and Ensuring Reliability
  • Top 10 Resources for Learning Solidity
  • Ultimate Guide to FaceIO
  • Unleash Developer Productivity With Infrastructure From Code [Video]
  • Unlocking the Power of ChatGPT
  • Upgrade Guide To Spring Boot 3.0 for Spring Data JPA and Querydsl
  • Usage Metering and Usage-Based Billing for the Cloud
  • Using Regular Expressions in Python: A Brief Guide
  • Vector Databases Are Reinventing How Unstructured Data Is Analyzed
  • Web Push Provisioning: Advancements for Digital Wallet Developers
  • What Is API-First?
  • What Is IoT Gateway? Is It Important
  • What's DevOps, SRE, Shift Left, and Shift Right?
  • When Scrum Feels Like Dressing for Dinner
  • When Technology Broke and How We Fixed It (The Evolution of APIs)
  • When To Use Decision Trees vs. Random Forests in Machine Learning
  • Which Tool Is Better for Code Completion — Azure Data Studio or dbForge SQL Complete?
  • Which Type of MFA Is Most Secure?
  • Why Data Competency Is Critical for Cyber Intelligence
  • Your Go-to Guide to Develop Cryptocurrency Blockchain in Node.Js

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • [email protected]

Let's be friends: