- DZone
- Sitemap Home
- Articles
- 2024
- October
DZone Sitemap: October 2024 Articles
- 12 Expert Tips for Secure Cloud Deployments
- 4 Essential Strategies for Enhancing Your Application Security Posture
- A Comprehensive Guide to Database Sharding: Building Scalable Systems
- Accelerating Connection Handshakes in Trusted Network Environments
- Advanced CI/CD Pipeline Optimization Techniques Using GitHub Actions
- AI Strategies for Enhanced Language Model Performance
- AI-Driven Intent-Based Networking: The Future of Network Management Using AI
- AI/ML Innovation in the Kubernetes Ecosystem
- An Interview About Navigating the Cloud-Native Ecosystem
- Artificial Intelligence and Machine Learning in Cloud-Native Environments
- Automate Azure Databricks Unity Catalog Permissions at the Catalog Level
- Automate Private Azure Databricks Unity Catalog Creation
- Automate Web Portal Deployment in Minutes Using GitHub Actions
- Automating PMO Meetings With n8n Automation
- AWS Redshift Data Sharing: Unlocking the Power of Collaborative Analytics
- Azure Deployment Using FileZilla
- Balance Trade-Offs in Microservices Architecture
- Being the Glue: Managing a Zero-to-One Software Project Across Multiple Teams
- Boosting Efficiency: Implementing Natural Language Processing With AWS RDS Using CloudFormation
- Building an Interactive Chatbot With Streamlit, LangChain, and Bedrock
- Calling a Client Via Spring @schedule Cron Job
- Challenges and Ethical Considerations of AI in Team Management
- CI/CD Pipelines in the Cloud: How Cloud Hosting Is Accelerating Software Delivery
- Close Site Search Indexing via Kubernetes HAProxy Ingress
- Cloud Cost Optimization: New Strategies for the AI Era
- Compliance Automated Standard Solution (COMPASS), Part 7: Compliance-to-Policy for IT Operation Policies Using Auditree
- Curating Efficient Distributed Application Runtime (Dapr) Workflows
- Custom Domains for HTTP/2 on Heroku
- Data Architectures With Emphasis on Emerging Trends
- Data at Rest Encryption: Protecting Stored Data
- Decoding DORA: EU's Unified Approach to ICT Risk Governance
- Decoding LLM Parameters, Part 2: Top-P (Nucleus Sampling)
- Domain-Driven Design: Manage Data With Jakarta Data and JNoSQL
- Dust: Open-Source Actors for Java
- Dynamic File Upload Component in Salesforce LWC
- Ending Microservices Chaos: How Architecture Governance Keeps Your Microservices on Track
- Enhance User Experience With a Formatted Credit Card Input Field
- Enhanced API Security: Fine-Grained Access Control Using OPA and Kong Gateway
- Enhancing Agile Software Development Through Effective Visual Content
- Enhancing Observability in iOS Applications: Key Insights
- Enhancing Performance With Data Modeling: Techniques and Best Practices for Optimization in Snowflake
- Entity Creation With Asynchronous Pipelines in Distributed Systems
- Exploring Foundations of Large Language Models (LLMs): Tokenization and Embeddings
- Filtering Java Collections via Annotation-Driven Introspection
- Functional Programming Principles Powering Python’s itertools Module
- Get Ready for Android 15: Must-Have Testing Strategies for Effective Updates
- Guarding Kubernetes From the Threat Landscape: Effective Practices for Container Security
- High-Speed Real-Time Streaming Data Processing
- How JavaScript DataTable Libraries Address Challenging Requirements in Web Data Management
- How to Convert HTML to DOCX in Java
- How to Create a Pokémon Breeding Gaming Calculator Using HTML, CSS, and JavaScript
- How to Create a Search Engine and Algorithm With ClickHouse and Snowflake
- How to Design Event Streams, Part 1
- How to Enhance the Performance of .NET Core Applications for Large Responses
- How to Get Plain Text From Common Documents in Java
- How to Identify Bottlenecks and Increase Copy Activity Throughput in Azure Data Factory
- How to Improve the Developer vs. AI Relationship
- How to Repair Corrupt MySQL Database Tables Step-by-Step
- How to Secure Your Raspberry Pi and Enable Safe, Resilient Updates
- How to Set up OAuth JWT Flow and mTLS in the Salesforce Connector for a MuleSoft App
- How to Simplify Complex Conditions With Python's Match Statement
- How to Use Self Join and WITH Clause in Oracle
- Hybrid Search: A New Frontier in Enterprise Search
- Hyperscale Data Centers Ignite Construction Surge
- Implement Hibernate Second-Level Cache With NCache
- Implementing LSM Trees in Golang: A Comprehensive Guide
- Implementing Polling With RxJS
- In-House Model Serving Infrastructure for GPU Flexibility
- Increase Model Flexibility and ROI for GenAI App Delivery With Kubernetes
- Inside the World of Data Centers
- Java 23: What Developers Need to Know
- Java Is Greener on Arm
- Jenkins in the Age of Kubernetes: Strengths, Weaknesses, and Its Future in CI/CD
- Key Considerations for Effective AI/ML Deployments in Kubernetes
- Kubernetes Observability: Lessons Learned From Running Kubernetes in Production
- Languages for Domain Experts, Not Just for Programmers
- Leveraging Artificial Intelligence for Software Testing to Test Healthcare Applications
- Leveraging Event-Driven Data Mesh Architecture With AWS for Modern Data Challenges
- Leveraging Seekable OCI: AWS Fargate for Containerized Microservices
- Lifecycle Microservices With GenAI Tools
- Low Code AI Agent Using Kumologica and Anthropic AI for Customer Feedback Sentiment Analysis
- MariaDB Vector Edition: Designed for AI
- Mastering AI Agents: How Agentic Design Patterns Make Agents Smarter
- Mastering Date/Time APIs: Challenges With Java's Calendar and JDK Date/Time APIs
- Microservice Proliferation: Too Many Microservices
- Minimizing Latency in Kafka Streaming Applications That Use External API or Database Calls
- Misconfiguration Madness: Thwarting Common Vulnerabilities in the Financial Sector
- Modify JSON Data in Postgres and Hibernate 6
- Multimodal RAG Is Not Scary, Ghosts Are Scary
- Mutable vs. Immutable: Infrastructure Models in the Cloud Era
- Navigating API Challenges in Kubernetes
- Network Guardians: Crafting a Spring Boot-Driven Anomaly Detection System
- Observability for Browsers
- Operationalize a Scalable AI With LLMOps Principles and Best Practices
- Optimizing IoT Performance in Industrial Environments
- Oracle CloudWorld 2024: Key Takeaways for Developers, Engineers and Architects
- Platform Engineering: A Strategic Response to the Growing Complexity of Modern Software Architectures
- Reactive Kafka With Spring Boot
- Redefining Java Object Equality
- Refining Automated Testing: Balancing Speed and Reliability in Modern Test Suites
- Right-Sizing GPU and CPU Resources for Training and Inferencing Using Kubernetes
- Secret Management and Rotation
- Secure Golden Images: A Blueprint for Vulnerability Management
- Securing Cloud-Native Applications: A CISO’s Perspective on Broken Access Control
- Security at the Onset: Stabilizing CSPM and DevSecOps
- Serverless NLP: Implementing Sentiment Analysis Using Serverless Technologies
- Should You Use AI Code Review Tools?
- Snowflake Cortex Analyst: Unleashing the Power of Conversational AI for Text-to-SQL
- So, You Want a Career in DevOps? Here's Where to Begin
- Solving a Common Dev Grievance: Architecture Documentation
- Supercharge Your Search With GenAI: From Simple Queries to Smarter Results
- Symbolic and Connectionist Approaches: A Journey Between Logic, Cognition, and the Future Challenges of AI
- Tech Trends 2024: Highlights on the Current Tech Industry From a Developer
- The Battle of Data: Statistics vs Machine Learning
- The Disruptive Potential of On-Device Large Language Models
- The Power of Market Disruption: How to Detect Fraud With Graph Data
- Three Habits of Highly Effective Observability Teams
- Top 6 Cybersecurity Threat Detection Use Cases: How AI/ML Can Help Detect Advanced and Emerging Threats
- Transforming Customer Feedback With Automation of Summaries and Labels Using TAG and RAG
- Transforming Manufacturing: AI-Driven Quality Control and Predictive Maintenance Using Cloud and IoT
- Understanding Server Error (5XX) in Azure Services: A Deep Dive Into Azure Logic Apps
- Understanding the Dependency Injection Lifecycle: Singleton, Scoped, and Transient With Detailed Examples
- Understanding the Differences Between Repository and Data Access Object (DAO)
- Unifying SecOps and Observability for Enhanced Cloud Security in Azure
- Unleashing the Power of Gemini With LlamaIndex
- Using AUTHID Parameter in Oracle PL/SQL
- Using AWS WAF Efficiently to Secure Your CDN, Load Balancers, and API Servers
- Using Lombok Library With JDK 23
- Vector Search: The Hottest Topic in Information Retrieval
- What Is a Performance Engineer and How to Become One: Part 1
- Will GenAI Force Coders to Switch Careers?
- Workarounds for Oracle Restrictions on the Size of Expression Lists
- Writing Great Code: The Five Principles of Clean Code
- “Let’s Cook!”: A Beginner's Guide to Making Tasty Web Projects