- DZone
- Sitemap Home
- Articles
- 2024
- July
DZone Sitemap: July 2024 Articles
- 5 Innovative Cybersecurity Measures App Developers Should Incorporate in the Digital Transformation Race
- 7 Essential Tips for a Production ClickHouse Cluster
- 8 Ways AI Can Maximize the Value of Logs
- A Comprehensive Guide To Building and Managing a White-Label Platform
- A Comprehensive Guide to MLflow for Machine Learning Lifecycle Management
- A Guide to Security Controls for Risk-Based API Protection
- A Practical Guide To Implementing Adaptive Software Development
- Addressing the Challenges of Scaling GenAI
- Advanced Deployment Strategies
- AI Agentic 101: Understanding Artificial Intelligence Agents
- AI vs. Human: Who Detects Bugs Better?
- AI: Do You Trust It?
- AIGenOps: Generative AI and Platform Engineering
- Alluxio Enterprise AI 3.2: Enhancing GPU Utilization and Data Access for AI Workloads
- An Introduction to GraphQL: Simplifying Data Fetching With Real-World Examples
- An Introduction To Open Table Formats
- Ansible and the Pre-Container Arts
- Apache Iceberg Table Management
- API Implementation on AWS Serverless Architecture
- API Versioning in Microservices Architecture
- Application-Level Tracing: The Good, the Bad, and the Alternative
- Applying the Pareto Principle To Learn a New Programming Language
- Argo Rollout and Deployment Strategies
- Automatic 1111: Adding Custom APIs
- Automating Databases for Modern DevOps Practices: A Guide to Common Patterns and Anti-Patterns for Database Automation Techniques
- AWS CDK: Infrastructure as Abstract Data Types, Part 2
- AWS CDK: Infrastructure as Abstract Data Types, Part 3
- Boomi's API Control Plane: Simplifying API Management for Developers
- Building a Modern Data Architecture: From Legacy Systems to Cloud Integration
- Building an Effective Zero Trust Security Strategy for End-To-End Cyber Risk Management
- Building Your Own IoT Project: A Step-By-Step Guide
- Cache Wisely: How You Can Prevent Distributed System Failures
- ChaosMeta for AI: Taking AI Stability to the Next Level With Chaos Engineering
- Choosing the Best CSS Frameworks for Enterprise Web Applications
- Comparative Analysis of pgVector and OpenSearch for Vector Databases
- Comparing Axios, Fetch, and Angular HttpClient for Data Fetching in JavaScript
- Consistency vs Availability: The Eternal Struggle in Distributed Databases
- Contexts in Go: A Comprehensive Guide
- Cross-Platform Integration: Enabling Seamless Workflow Between AI, Microservices, and Azure Cloud
- Datafaker Gen: Leveraging BigQuery Sink on Google Cloud Platform
- DB2 vs. Oracle for IBM Maximo: A Comparative Analysis
- DDN and Tintri: Powering the Future of AI and Enterprise Storage
- Don’t Get Hacked! Essential Cybersecurity Tips You Need To Know
- Dynamic Pricing Implementation: Price Rules and QCP in Salesforce CPQ
- Emerging Trends in Data Warehousing: What’s Next?
- Enhance IaC Security With Mend Scans
- Enhancing Cloud Security: Integrating DevSecOps Practices Into Monitoring
- Enhancing Query Performance With AI and Vector Search in Azure Cosmos DB for PostgreSQL
- Enhancing Security With ZTNA in Hybrid and Multi-Cloud Deployments
- Enhancing Stream Data Processing With Snow Pipe, Cortex AI, and Snow Park
- Ensuring Data Integrity Through Anomaly Detection: Essential Tools for Data Engineers
- Essential Monitoring Tools, Troubleshooting Techniques, and Best Practices for Atlassian Tools Administrators
- Event Sourcing Explained: Building Robust Systems With Immutable Event Logs
- Explainable AI: Seven Tools and Techniques for Model Interpretability
- Exploring Cross-Chain Compatibility in dApp Development
- Exploring the Evolution of Transformers: From Basic To Advanced Architectures
- Factors to Consider: Data Warehouse Modernization
- Flask Web Application for Smart Honeypot Deployment Using Reinforcement Learning
- From Observability To Architectural Observability: Shifting Left for Resiliency
- Front-End Application Performance Monitoring (APM)
- Getting Started With Microsoft Tool Playwright for Automated Testing
- Guarding Privacy: Cutting-Edge Technologies for Data Protection
- High Availability and Disaster Recovery (HADR) in SQL Server on AWS
- How a Project Manager Can Increase Software Quality With Agile Practices
- How Behavioral Biometrics Enhances Fraud Prevention
- How BERT Enhances the Features of NLP
- How DevSecOps Can Combat Zero-Day Threats
- How Kubernetes Changed the Networking Model and What Developers Should Know about eBPF and Cilium
- How Open Source Project Tetragon Is Evolving Security via eBPF
- How To Build an AI Knowledge Base With RAG
- How To Convert Common Documents to PNG Image Arrays in Java
- How To Remove Excel Worksheets Using APIs in Java
- How To Secure Your Angular Apps: End-To-End Encryption of API Calls
- How To Think Simple In Java
- How To Use Metric Scorecards in Evaluating Production Readiness (And Why You Should)
- Impact of Generative AI in the Cellular and IoT Telecommunication
- Implementing and Deploying a Real-Time AI-Powered Chatbot With Serverless Architecture
- Implementing Micro Frontends in Angular: Step-By-Step Guide
- Implementing Multi-Level Caching in Java With NCache
- Improving the Capabilities of LLM-Based Analytics Copilots With Semantic Search and Fine-Tuning
- In-Sprint Software Automation: Revolutionizing Agile Development
- Interactive PDF Q&A: A Retrieval-Augmented Generation Approach
- Introduction to Polymorphism With Database Engines in NoSQL Using Jakarta NoSQL
- Javac and Java Katas, Part 2: Module Path
- JUnit 5 Custom TestListeners
- Just Use PostgreSQL, a Quick-Start Guide: Exploring Essential and Extended Capabilities of the Most Beloved Database
- Key Strategies on How to Advance Your Digital Tech Career
- Linting Excellence: How Black, isort, and Ruff Elevate Python Code Quality
- LLMs Progression and Path Forward
- Master AWS IAM Role Configuration With Terraform
- Mastering Distributed Caching on AWS: Strategies, Services, and Best Practices
- Mastering DynamoDB: A Developer's Guide
- Mastering Full-Stack Development: A Comprehensive Beginner’s Guide to the MERN Stack
- Merge Multiple PDFs in MuleSoft
- Microservice Logs Testing in the Cloud: Important but Often Ignored
- Mitigate the Security Challenges of Telecom 5G IoT Microservice Pods Architecture Using Istio
- Monitoring and Troubleshooting Serverless Applications
- Next-Gen Lie Detector: Stack Selection
- OpenTelemetry: Unifying Application and Infrastructure Observability
- Operational Excellence Best Practices
- Optimizing MySQL Performance: Best Practices for Database Efficiency
- Optimizing Search Precision With Self-Querying Retrieval (SQR) and Langchain
- Oracle Advanced Queue: A Guide
- Oracle SQL: Understanding Execution Plan and Performance Tuning
- Outlier Identification in Continuous Data Streams With Z-Score and Modified Z-Score in a Moving Window
- Outsmarting Cyber Threats: How Large Language Models Can Revolutionize Email Security
- Performance and Scalability Analysis of Redis and Memcached
- Phased Approach to Data Warehouse Modernization
- Pilot VPC and Advanced NAT: Securely Connect Overlapping Networks to AWS VPC
- Pivoting Database Systems Practices to AI: Create Efficient Development and Maintenance Practices With Generative AI
- PlatformCon 2024 Session Recap: Platform Engineering and AI
- Poetry Explained: Perils of the Unpinned Dependencies
- Poisoning AI Brain: The Hidden Dangers of Third-Party Data and Agents in AI Systems
- Practitioner’s Guide to Deep Learning
- Precision Python: Leveraging mypy and Pylint for Type Safety
- Pure Storage Empowers Developers and Data Scientists With Agile, High-Performance Storage for AI and Modern Applications
- Pure Storage Empowers Developers, Engineers, and Architects With AI-Driven Storage Innovation
- Pure Storage Tackles AI and HPC Data Challenges With Flexible Storage Solutions
- Real-Time Anomaly Detection Using Large Language Models
- Real-Time Streaming Architectures: A Technical Deep Dive Into Kafka, Flink, and Pinot
- regreSSHion: Should We Panic About the New OpenSSH Vulnerability?
- Salesforce Bulk API 2.0: Streamlining Large-Scale Data Operations
- SBOMs in Action: Securing Your Golden AMIs From Build to Runtime
- Security Challenges in AI-Powered Applications
- Self-Compassion in Tech Teams: Building Strength and Teamwork
- Setting Up a Local Development Environment With IntelliJ, DevContainers, and Amazon Linux 2023
- Setting up Device Cloud: A Beginner’s Guide
- Shadow IT: The Unavoidable Reality and How To Embrace It Safely
- Spring Microservice Tip: Abstracting the Database Hostname With Environment Variable
- Step-by-Step Guide to Creating a Calculator App With HTML and JS (With Factor Calculator Example)
- Step-By-Step Guide To Setting up and Training GANs for Image Generation
- Step-By-Step Guide: Configuring IPsec Over SD-WAN on FortiGate and Unveiling Its Benefits
- Strengthening Web Application Security With Predictive Threat Analysis in Node.js
- Task-Specific Large Language Models Using Distillation
- Terraform Tips for Efficient Infrastructure Management
- Test Automation in QA
- The AI Revolution: Empowering Developers and Transforming the Tech Industry
- The Art of Manual Regression Testing
- The Foundation of AI and Analytics Success: Why Architecture Matters
- The Future of AI Art: Exploring the Capabilities of Stable Diffusion Web UI (Automatic 1111)
- The Future of AI: Exploring Generative Systems and Large Language Models
- The Hidden Costs of Lombok in Enterprise Java Solutions
- The Invisible Artistry of Backend Development
- The Rise of Kubernetes: Reshaping the Future of Application Development
- Theme-Based Front-End Architecture Leveraging Tailwind CSS for White-Label Systems
- Topic Tagging Using Large Language Models
- Trigger Salesforce Assignment Rules and Send Notifications From MuleSoft
- Two-Tower Model for Fraud Detection: A Comprehensive Guide
- Understanding and Mitigating IP Spoofing Attacks
- Understanding Big O Notation in Python
- Understanding Properties of Zero Trust Networks
- Using Agile To Recover Failing Projects
- Variance: The Heartbeat of Agile Metrics
- Viking Enterprise Solutions: Empowering Modern Data Infrastructure
- Virtual Threads: A Game-Changer for Concurrency
- Vulnerability Management in DevOps Environments
- Why Creating Wrapper Classes for Component Libraries Is a Great Idea in Web Development
- Why Do We Need to Keep Our Builds Green?
- Why You Need to Shift Left With Mobile Testing