- DZone
- Sitemap Home
- Articles
- 2024
- August
DZone Sitemap: August 2024 Articles
- 3 Reasons Why VPs of Engineering Are Choosing Low-Code
- A Deep Dive Into Recommendation Algorithms With Netflix Case Study and NVIDIA Deep Learning Technology
- Achieving DevOps Harmony With Unified Log Monitoring for CI/CD
- Advanced Techniques in Automated Threat Detection
- Agile Practices That Developers Can Use to Create Better Projects
- API Security: The Cornerstone of AI and LLM Protection
- Architectural Patterns for Enterprise Generative AI Apps: DSFT, RAG, RAFT, and GraphRAG
- Aren’t We Transformed Yet? Why Digital Transformation Needs More Work
- Automatic 1111: Sketch-to-Image Workflow
- Avoiding Prompt-Lock: Why Simply Swapping LLMs Can Lead to Failure
- Batch vs. Real-Time Processing: Understanding the Differences
- Better Search Results Through Intelligent Chunking and Metadata Integration
- Beyond the Obvious: Uncovering the Hidden Challenges in Cybersecurity
- Black Hat 2024, Day 2: Charting the Future of Cybersecurity
- Buh-Bye, Webpack and Node.js; Hello, Rails and Import Maps
- Building a Semantic Web Search App Using Resource Description Framework and Flask for Cyber Resilience
- Building a Twilio Softphone With JavaScript, HTML, and Flask
- Building an IoT-based Waste Management System: A Software Architect's Guide
- Building an LLM-Powered Product to Learn the AI Stack: Part 1
- Building Product to Learn AI, Part 2: Shake and Bake
- Building Secure AI LLM APIs: A DevOps Approach to Preventing Data Breaches
- Chat With Your Code: Conversational AI That Understands Your Codebase
- Cloud Build Unleashed: Expert Techniques for CI/CD Optimization
- Content Detection Technologies in Data Loss Prevention (DLP) Products
- Creating Effective Exceptions in Java Code [Video]
- Custom Elements Manifest: The Key to Seamless Web Component Discovery and Documentation
- Cybersecurity Career Paths: Bridging the Gap Between Red and Blue Team Roles
- Data Fusion: Enhancing Interoperability, Privacy, and Security
- Data Pipeline Techniques in Action
- Data Pipeline vs. ETL Pipeline
- Data Security Solution for US Federal Customers
- Day in the Life of a Developer With Google's Gemini Code Assist: Part 2
- Day in the Life of a Developer With Google’s Gemini Code Assist: Part 1
- Demystifying the Magic: A Look Inside the Algorithms of Speech Recognition
- Develop With OCI Real-Time Speech Transcription and Oracle Database NL2SQL/Select AI To Speak With Your Data
- Docker vs. Podman: Exploring Container Technologies for Modern Web Development
- DORA Metrics: Tracking and Observability With Jenkins, Prometheus, and Observe
- Efficient and Fault-Tolerant Solutions for Distributed Mutual Exclusion
- Effortless Concurrency: Leveraging the Actor Model in Financial Transaction Systems
- Enhance Terraform Final Plan Output in GitHub Actions
- Enhance Your Communication Strategy: Deliver Multimedia Messages With AWS Pinpoint
- Enhancing Accuracy in AI-Driven Mobile Applications: Tackling Hallucinations in Large Language Models
- Enhancing Agile Product Development With AI and LLMs
- Enhancing Java Application Logging: A Comprehensive Guide
- Enhancing Software Quality with Checkstyle and PMD: A Practical Guide
- Essential Guidelines for Building Optimized ETL Data Pipelines in the Cloud With Azure Data Factory
- Evolution of Governance Framework With AI
- Exploring JSON Schema for Form Validation in Web Components
- extended Berkeley Packet Filter (eBPF) for Cloud Computing
- Finding Your Voice: Navigating Tech as a Solo Female Engineer on Your Team
- Four Essential Tips for Building a Robust REST API in Java
- Full-Stack Security Guide: Best Practices and Challenges of Securing Modern Applications
- Go Serverless: Unleash Next-Gen Computing
- Go: Unit and Integration Tests
- Handling Schema Versioning and Updates in Event Streaming Platforms Without Schema Registries
- Harnessing the Power of AWS Aurora for Scalable and Reliable Databases
- How to Become a Software Engineer Without a CS Degree: Essential Strategies for Success
- How to Change PDF Paper Sizes With an API in Java
- How to Document Your AWS Cloud Infrastructure Using Multicloud-Diagrams Framework
- How to Fix the OWASP Top 10 Vulnerability in Angular 18.1.1v
- How to Make a Picture-in-Picture Feature in iOS App Using AVFoundation
- How You Can Avoid a CrowdStrike Fiasco
- Integrate Spring With Open AI
- Intricacies of Zero-to-One Software Projects
- Introduction to Salesforce Batch Apex [Video]
- JavaScript Frameworks: The Past, the Present, and the Future
- JMeter Plugin HTTP Simple Table Server (STS) In-Depth
- Knowledge Graphs and RAG: A Guide to AI Knowledge Retrieval
- Large Language Models: Changing the Game in Software Development With Code Generation, Debugging, and CI/CD Integration
- Leveraging Open-Source Contributions to Boost Your Freelancing Profile
- Leveraging Snowflake’s AI/ML Capabilities for Anomaly Detection
- Leveraging Time Series Databases for Cutting-Edge Analytics: Specialized Software for Providing Timely Insights at Scale
- Mastering PUE for Unmatched Data Center Performance
- Mastering React Efficiency: Refactoring Constructors for Peak Performance
- Maximizing Enterprise Data: Unleashing the Productive Power of AI With the Right Approach
- My Journey to Master SQL Data Analysis
- Navigating BNPL Integration: Key Steps and Best Practices for Developers
- Neural Networks: From Perceptrons to Deep Learning
- Not All MFA Is Equal: Lessons From MFA Bypass Attacks
- OpenShift Data Foundation on IBM Cloud Using Terraform, Part 1: Deployment
- Optimizing Software Quality: Unit Testing and Automation
- Oracle: Migrate PDB to Another Database
- Overcoming the Retry Dilemma in Distributed Systems
- Overview of Classical Time Series Analysis: Techniques, Applications, and Models
- Parent Document Retrieval (PDR): Useful Technique in RAG
- Protect Your Alerts: The Importance of Independent Incident Alert Management
- React Server Components (RSC): The Future of React
- Reimagining AI: Ensuring Trust, Security, and Ethical Use
- Revolutionizing Billing Processes With AI: Enhancing Efficiency and Accuracy
- Running PyTorch on GPUs
- Safeguarding Democracy in the Digital Age: Insights from Day 1 at Black Hat 2024 and Las Vegas Officials
- Securing Federal Systems
- Securing the Future: Defending LLM-Based Applications in the Age of AI
- Semi-Supervised Learning: How to Overcome the Lack of Labels
- Setting Up CORS and Integration on AWS API Gateway Using CloudFormation
- Snowflake Administration: A Comprehensive Step-by-Step Guide
- Snowflake and dbt Integration to Enable Advanced Analytics
- Software Testing Errors to Look Out For (With Examples)
- SQL Interview Preparation Series: Mastering Questions and Answers Quickly
- Streaming Data Joins: A Deep Dive Into Real-Time Data Enrichment
- The Case for Working on Non-Glamorous Migration Projects
- The Enterprise Guide to Cloud Security Posture Management
- The Need for Application Security Testing
- The One-Pixel Threat: How Minuscule Changes Can Fool Deep Learning Systems
- The Relationship Between Performance and Security
- The Role of Data Governance in Data Strategy: Part 3
- Top 10 C# Keywords and Features
- Unboxing the Black Box
- Understanding PolyBase and External Stages: Making Informed Decisions for Data Querying
- Unlock AI Power: Generate JSON With GPT-4 and Node.js for Ultimate App Integration
- Unlocking the Potential of Synthetic Data for AI Development
- Upgrading Spark Pipelines Code: A Comprehensive Guide
- Using SQS With JMS for Legacy Applications
- Utilizing Multiple Vectors and Advanced Search Data Model Design for City Data
- Virtual Clusters: The Key to Taming Cloud Costs in the Kubernetes Era
- What Does It Take to Manage an On-Premise vs Cloud Data Security Product?
- What Is "Progressive Disclosure" and How Does It Impact Developer Portals?
- What Is SQL Injection and How Can It Be Avoided?
- Why AI-Assisted Code Generation Is Transforming Software Development
- Why You Should Migrate Microservices From Java to Kotlin: Experience and Insights
- Why You Should Use Buildpacks Over Docker