DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
  1. DZone
  2. Sitemap Home
  3. Whitepapers

DZone Sitemap: Whitepapers

  • (Re)platforming: Technical Project or Business Transformation Program?
  • 10 essential strategies for a successful automation project
  • 10 Principles for Better Dashboard Design
  • 10 Rules for Creating a Mobile Look and Feel
  • 10 Rules for Creating a Mobile Look and Feel
  • 10 Things to Get Right for Successful DevSecOps
  • 10 Ways Low-Code Process Automation Transforms Businesses
  • 11 Pitfalls of Native Cassandra Backup Tools
  • 15 Reasons to Use an iPaaS for Cloud Service Integration
  • 19 Attacks For Breaking (All) Software Applications
  • 20 Docker security tools compared
  • 2017 DZone Community Survey
  • 2017 State of the Software Supply Chain
  • 2018 Data Warehouse Showdown
  • 2018 Database DevOps Survey
  • 2018 DZone Media Kit
  • 2019 Drupal Hosting and Infrastructure Buyer's Guide
  • 2019 Survey - State of Database Deployments in Application Delivery
  • 2019 WordPress Hosting and Infrastructure Buyer's Guide
  • 2020 Developer Productivity Report
  • 3 Steps to Monitoring in a Connected Enterprise
  • 4 Best Practices to Meet Compliance Requirements in Kubernetes Environments
  • 4 Methods to Prevent Downtime
  • 4 Steps to Prepare for an Outage
  • 4 Steps to Standardized Database Development for DevOps Success
  • 4 Testing Methods to Scale and Automate Your DevOps Pipeline
  • 451 Report Reprint - DigitalOcean continues its rise as an ‘alternative’ cloud for developers and SMBs
  • 451 Research Report: Securing Open Source - Why All The Attention, And Why Now?
  • 451 Research: Getting Value from the Data Lake
  • 451 Research: Overcoming Obstacles to Machine Learning Adoption
  • 5 Considerations for Connecting and Composing Kubernetes-Native Apps
  • 5 Emerging Use Cases for Cloud Integration
  • 5 Instrumentation Strategies For Architecting Containerized Applications
  • 5 Key Requirements for Securing IoT Communication
  • 5 Pillars of Building Enterprise-Grade APIs
  • 5 Product Use Cases and Design Patterns for Data Apps
  • 5 Stages of Incident Management
  • 5 Steps to an Awesome Apache Cassandra™ Data Model
  • 5 Things To Look For In A Weather API
  • 5 Things You Didn't Know You Could Do with DNS
  • 5 Ways to Empower Developers
  • 6 Critical Steps Before You Roll Out a Security Uplift Program for Software Developers
  • 6 DevSecOps Best Practices for Developers
  • 6 Obstacles to Self-Service Analytics – And What To Do About Them
  • 6 Reasons to Start the Cloud Native Transformation
  • 6 Steps to Comprehensive Container Security
  • 7 Best Practices for Building Performant Data-Intensive Apps
  • 7 Reasons Why Crafter Should Be on Your Web CMS Shortlist
  • 7+ Graphics Libraries To Enhance Your Embedded Analytics
  • 8 Deployment Pattern Structures to Transform your CI/CD
  • 8 Essentials for Implementing DevOps
  • 8 Key Considerations for AI in the Enterprise
  • 9 Companies share 30+ best practices for creating smart embedded analytics Part 2: Defining the go-to-market strategy
  • 9 Companies share 30+ best practices for creating smart embedded analytics Part 3: Designing the product
  • 9 Companies share 30+ best practices for creating smart embedded analytics Part 4: Excel at your product launch and beyond
  • 9 Companies share 30+ best practices for creating smart embedded analytics: Part 1: Building the business case
  • 9 Metrics DevOps Teams Should Be Tracking
  • 9 Steps to Owning Your Code
  • A Cloud-Centric Walkthrough of MariaDB SkySQL
  • A comparative guide to rules engines for IoT
  • A Comprehensive Guide to the Realtime Technology Stack
  • A Developer's Guide to Full Stack Experimentation
  • A Developer’s Adoption Guide to the New WordPress Gutenberg Editor
  • A Developer’s Guide To Creating Proactive Apps: How to Increase App Engagement with Location Intelligence
  • A Framework to Halt Cloud-Native Application Threats
  • A Guide to Modern Java Web Development with Crafter CMS
  • A Machine and Deep Learning Primer
  • A Maturity Model for CIAM
  • A Microservices Movement: Tracing the Effects of Microservices on Java Development
  • A Modern Approach to Incident Management
  • A Modern Approach to Incident Management
  • A Platform for Modernizing Java Applications
  • A Platform For Modernizing Java Applications: Designing workloads for the cloud and modern ecosystems
  • A Practical Guide to Data Warehouse Offload and Optimization with Hadoop
  • A Practical Guide to High Availability Solutions for Postgres
  • A Practitioner's Guide to Application Security
  • A World Transformed: Building Smarter, Next Generation Apps with Cognitive Services
  • Accelerate Feature Engineering for Machine Learning Models With Snowflake and AWS
  • Accelerate Product Redesign with Software Usage Analytics [On-demand Webinar]
  • Accelerating analytics on AWS EMR & AWS S3 with Alluxio in a disaggregated data stack
  • Accelerating Error Detection and Solutions For Developers
  • Accelerating Spark & Presto in Kubernetes
  • Accelerating SQL and BI Analytics: Extending Analytical BI with a GPU database
  • Accessibility - 4 Tricks You Can Do Right Now!
  • Achieve A Successful Microservices Architecture
  • Achieve a Successful Microservices Architecture
  • Adding Speed and Horizontal Scale to Oracle
  • Adding Speed and Horizontal Scale to SQL Server
  • Adding Speed, Scalability and In-Memory Computing to SQL
  • Advanced Cloud Development Kit
  • Advanced Linux Commands [Cheat Sheet]
  • Advantages of Connectivity-Aware Over the Air Updates with LTE-M
  • Agile Integration for Today’s Cloud-Enabled Enterprise
  • AI Powered Performance Monitoring: The Compass for Your CI/CD Journey
  • All About Low Code: The Technology Behind Citizen Development’s Explosive Growth
  • Amazon Echo: Alexa Leveraged as a Silent Eavesdropper
  • An Application-Centric Solution for DNS, DHCP, and IP Address Management
  • An Introduction to Machine Learning Interpretability Second Edition
  • An Introduction to Selenium Testing with 4 Tips from the Pros
  • Analyst to Engineer, Q-and-A on Cloud Data Warehousing
  • Apache Kafka Resource Bundle
  • Apache Nifi for Dummies
  • Apex Vulnerabilities and How to Develop Securely on Force.com
  • API Management and Security
  • API Security: Stories from the Trenches, Common Flaws, and Ways to Mitigate
  • APIs: The New Language of Business Collaberation
  • App Hardening: Preventing Hackers from Accessing Your Code
  • Application Performance Management for Azure Databricks
  • Architects Guide to NoSQL
  • Are SAST Tools Glorified Grep?
  • Are Your Integration Operations Stuck in the Middle?
  • Artificial Intelligence: Machine Learning and Predictive Analytics [Guide Preview]
  • Asset Tracking at Scale Using Bluetooth Low Energy
  • Attunity Solutions for Amazon Web Services
  • Automate Compliance Audits without the Staff
  • Automate the Ops in DevOps for Self-Serve Infrastructure Provisioning
  • Automate Your Image & Video Processes With Cloudinary APIs
  • Automated IT System Compliance and Security Enforcement at Scale
  • Automating IT Security and Compliance with CIS and SaltStack
  • Automating Kubernetes with GitOps
  • Automation for Kubernetes Clusters: sudoRy, a Kubernetes Executor
  • Aviva Asia Streamlines System Migration, Reduces Costs With Red Hat
  • Aviva Italy Creates Customer Portal for Efficient Digital Services With Red Hat
  • Avoiding Application Bottlenecks to Deliver Quality Software on Time
  • Avoiding the Poor Release Blame Game: The Secret to Alignment Between Developers and Testers
  • AXA - Claims tracking made easy: Insurance portal built fast with low-code platform
  • Backups for Salesforce
  • Batten Down the Hatches: Using Open Source for Smooth (and Secure) Sailing Through K8s
  • Been There, Rocked That: Applying DevOps to Optimize Oracle Cloud Implementations
  • Benchmarking Graph Analytics Systems
  • Best Practices for Privileged Access Management on Cloud-Native Infrastructure
  • Bet On A Stallion, Not A Mule: 6 Reasons Why Enterprise-grade Integration is NOT Donkey Work
  • Better Decisions, No More Bottlenecks: 5 Metrics for Cross-Lifecycle Software Testing White paper
  • Beyond IT Alerting: Why You Need to Change how you Evaluate Solutions
  • Beyond Jurassic NoSQL: New Designs for a New World
  • BI on Big Data – What Are Your Options?
  • Bloor Research Brief
  • Blueprint Architecture for Modern Commerce: A Overview of the Templates for Deploying the Commercetools API-based Commerce Platform
  • Blueprint for Spinnaker Adoption in the Enterprise
  • Bottlenecks + Latencies [Infographic]
  • Build a DevSecOps Culture with Automated and Integrated Security Tools
  • Build Enterprise Conversational Chatbots - Free
  • Build Low Code Applications Using APEX
  • Build or Buy? Key Considerations in Implementing Software Usage Analytics
  • Build vs Buy: Lessons Learned on Multi-Prem Software Delivery
  • BUILD vs. BUY Implementing the Right Experimentation Solution
  • Build Your Own CDN in Under 1 Hour
  • Building a Real-Time Analytics Stack with Apache Kafka and Apache Druid
  • Building a Robust Experimentation Capability
  • Building and Deploying Digital Experiences That Dazzle
  • Building and Optimizing Multi-channel Digital Experiences
  • Building And Optimizing Multi-Channel Web Experiences
  • Building Big Data [Infographic]
  • Building Enterprise-Grade Database Architecture for Mission-Critical, Real-Time Applications
  • Building Leaner, Faster Microservices With Embedded NoSQL
  • Building Reactive Microservices in Java
  • Building Stateful Workloads in Kubernetes
  • Case Study: Protecting Container Workloads using Amazon EC2, Amazon ECS and ECR, and auxiliary services such as AWS S3 and CloudWatch.
  • Chapter 8 from Eran Kinsbruner’s Digital Quality Handbook Extending Open Source Frameworks for Advanced Functional Testing Written by Wim Selles
  • Chatbots: The Definitive Guide (2020)
  • CI/CD for Cloud Native Applications on Kubernetes
  • Cloud Infrastructure Security Buyer's Guide Your Reference For Selecting A Cloud Security Platform
  • Cloud Misconfigurations Cause Breaches – How to Avoid it
  • Cloud Native Security: What it means, why its hard, and how to achieve it
  • Cloud-Native Container Firewalls
  • Cloud-Native Development: Supporting Modern Innovation and Bridging Installed Solutions to the Future
  • Coders Conquer Security: Your Battle Plan to Defeat the OWASP Top 10
  • Common Developer Errors in CIAM
  • Compare Liaison's ALLOY Platform With Traditional iPaaS
  • Compare proprietary databases vs. open source MariaDB
  • Complementing Static Analysis With Software Composition Analysis for Open Source Management
  • Complete Guide to Enterprise Container Security
  • Complete Guide to Preventing Account Takeover
  • Components: Increasing Speed and Risk
  • Considerations for Your CMS in 2022 and Beyond
  • Consistency, Diligence, Awareness: Onepath's Crash Course in IT Maturity
  • Container Security: 10 Things DevOps Need to Do
  • Container Security: Key Challenges and How to Address Them
  • Containers Cheat Sheet
  • Continuous Delivery Starter Kit
  • Continuous Delivery, Deployment, Integration and Testing: Deciphering DevOps Terminology
  • Continuous Delivery: A Pragmatic Approach to Mitigating Risks
  • Continuous Security Testing for Microservices
  • Contributing to DZone: Overview
  • Crack the Automation Code and Create a Balanced Test Strategy
  • Creating a DevSecOps Playbook
  • Creating a Killer Database Architecture with Kubernetes + MariaDB
  • Creating an Exceptional Developer Experience
  • Creating the Perfect End-to-End IoT Solution with InfluxDB and Particle
  • Data Acquisition For Machine Learning
  • Data Architecture Implications of Managing CD & Containers
  • Data Connectivity Reimagined: Data Connectivity for the 21st Century
  • Data Management for Hybrid and Multi-Cloud: A Four-Step Journey
  • Database Automation In The Finance Industry: Juggling Innovation With Security
  • Database Changes: Roll Back or Fix Forward
  • Database Deployment Bundle
  • Database Metrics that Matter
  • Datos IO Product Analysis
  • Deep Learning Challenges: Lessons from the Field
  • Delivering Quality Digital Experiences with Intelligent Automation
  • Demystifying AWS EC2 Reserved Instances
  • Designing for the Cloud: What Today’s Data Engineer Should Be Considering When Building Their Stack
  • Designing Responsive Dashboards: Best Practices for Building Responsive Analytics Applications
  • Designing Snowflake for Scalable Data Applications
  • Developing IoT Edge Applications With MQTT
  • DevOps 101: CI/CD
  • DevOps 101: Introduction to Containers
  • DevOps for Database Starter Kit
  • DevOps for Oracle E-Business Suite and Oracle Cloud
  • DevOps GDPR Compliance: The ''Spark Notes'' Edition
  • DevOps Pulse 2022 — Challenges to the Growing Advancement of Observability
  • DevOps Starter Kit
  • DevSecOps and Hybrid Cloud: The Perfect Combo for Today’s Data Center
  • DevSecOps Reference Architectures
  • DevSecOps: Putting Database Sec in DevOps
  • Digital Business Process Management: A Transformational Force
  • Digital Innovation Through Agile Integration
  • Discover, Analyze, and Secure Your APIs Anywhere
  • Distributed Monitoring: How to Understand the Chaos Created by Microservices
  • Distributed SQL: MariaDB Xpand vs. CockroachDB
  • DIY Guide to Open Source Vulnerability Management
  • Do You Have QA Traceability?
  • Driving True Observability and Developer Effectiveness with the Power of Platform Teams
  • DZone Contributor FAQs
  • DZone Data Pipeline Trends: Simplify Data Architectures With an Open Lakehouse
  • DZone's 2019 Security Bundle
  • DZone's AppSec Trend Report
  • eBook: Native Parallel Graph: The Next Generation of Graph Database for Real-Time Deep Link Analytics
  • Ecommerce Developer's Guide to Marketing KPIs and Unspoken Requests
  • Effective Business Process Management with JBoss BPM
  • eGuide: Expert Strategies and Successes
  • eGuide: IDC’s Expert Tips for Accelerating Big Data Analytics and Better Business Insights
  • Embedded Software Design: Best Practices for Static Analysis Tools
  • Empowering Developers Through Cloud Services
  • Enable Continuous Delivery of Containerized Applications with Jenkins and Docker
  • Enabling faster innovation with DevOps and Red Hat OpenShift
  • Enhance the Value of SAP Data with Real-time Data Integration for Analytics
  • Enhancing Code Reviews with Static Analysis
  • Ensure Ideal Performance and Access for All Your Customers, Everywhere
  • Enterprise Open Source Databases
  • Essential Guide to AWS Cloud Migrations
  • Essential Guide to Data Lakes: Designing data lakes to optimize analytics
  • Evolving Beyond One-Size-Fits-All Software Security Training
  • Executive Checklist: Cloud-Native Platform
  • Executive Checklist: Cloud-Native Platform
  • Executive Guide To Selecting A Cloud-Native Development Platform
  • Exploring IoT Time Series Data
  • Exploring the Myths and Realities of Low-Code
  • Fast Detection of Memory Leaks Across Multiple JVMs
  • Fast, Fine-Grained Analytics with SQream DB and Tableau
  • Fast-tracking a Better UX with HTAP Systems
  • FaunaDB: An Architectural Overview
  • Feature Generation - The Next Frontier of Data Science
  • Feature Management Maturity Model
  • Finding the ROI in IoT for Hospitality
  • Five Dimensions of Scaling Agile in Large Enterprises
  • Five Dimensions of Scaling Agile in Large Enterprises
  • Five Signs You Have Outgrown Cassandra (and What to Do About It)
  • Five Ways to Train Security Champions in Cross-Functional and DevOps Teams
  • Flexible Data Modeling in MariaDB
  • Flexible Data Modeling with MariaDB Server: JSON Functions
  • Forget Hand-Coding: 5 Development Challenges to Consider
  • Forrester Report: Leveraging Production Kubernetes for Digital Transformation in the Enterprise
  • From Brick and Mortar to Bits and Bytes: Why Cognitive Services Are Transforming eCommerce
  • From Dev to DevSec: How to transform developers into security rockstars
  • From Order to Disorder: Controlling the Chaos of Cluster Sprawl
  • Future-proof enterprise software products: Empower customers to survive and thrive in the digital world with OpenText OEM Solutions
  • Gain a Competitive Edge with Graph Analytics
  • Game Development: Building Immersive Worlds [Guide Preview]
  • Gerrit DevOps Analytics: Uncover the Hidden Value of Your CI/CD Pipeline
  • Get Started with Database Release Automation in 4 Easy Steps
  • Get Started with MariaDB TX 2.0 in Azure
  • Get Your Test Automation Right the First Time
  • Getting Started Guide: Using BigCommerce for WordPress
  • Getting Started With Access Management
  • Getting Started with Mobile Application Testing
  • Global Microservices Trends: A Survey of Development Professionals
  • Graph Databases
  • Graph Databases for Beginners
  • Greater Visibility into Network Monitoring with Open Source
  • Guide to Implementing Network Security for Kubernetes
  • Guide to NIST SP 800-190 Compliance in Container Environments
  • Guide to Open Source Database Selection
  • Guide to Open Source Database Selection: MySQL vs. MariaDB
  • Hadoop and the Analytic Data Pipeline
  • High Availability eBook: How to Achieve Enterprise-Grade High Availability at Scale
  • High Availability With MariaDB TX
  • High Performance WebSockets on Android
  • High-tech Manufacturer Replaces In-house Code With Fully Automated Solution
  • How are organizations shifting left in the SDLC to truly become DevSecOps ready?
  • How Can Developers Take Advantage of Machine Learning?
  • How Conversational AI Increases Your Competitive Edge
  • How Database Release Automation Fits into the Application Toolchain
  • How device OS powers your IoT product
  • How Edge Computing, Serverless, and Machine Learning Will Transform the Enterprise
  • How EMC Built and Scaled TheHub to Serve 12,000 Engineers
  • How long term evolution technology stands to change the IoT Marketplace
  • How Low Code Enables Velocity and Quality in Software Testing
  • How Mobile Game Cheats Unlock App Security Lessons
  • How Playtech Mastered Failure Detection Across Distributed Systems
  • How Secure is Your Cloud Infrastructure?
  • How Spinnaker Enables Continuous Delivery
  • How the Internet of Things is Revolutionizing Supply-Chain Management
  • How to Accelerate Adoption of Your BI Analytics, ETL or Data Preparation Application
  • How to Achieve Continuous Container Security
  • How to Actualize Quality While Practicing Agile
  • How to Build a Data Analytics Platform to Support your End-to-End Data Journey
  • How to Build a Testing Team That Performs in a Changing Corporate Environment
  • How to Build an Enterprise Kubernetes Strategy
  • How to Build an Open Data Lake Analytics Stack
  • How to Build Modern Apps Using Object-Relational Mapping
  • How to Choose a Reliable Modern Incident Management Solution
  • How to choose a rules engine
  • How to Choose a Time Series Database — and Get Started Fast
  • How to Create a Mobile App Testing Strategy With Virtual & Real Devices
  • How to Develop a Security Mindset Within Your Dev Teams
  • How to Evaluate a Distributed SQL Database
  • How to Evaluate and Implement a Multi-CDN Strategy
  • How to Find the DevOps Strategy That Best Fits Your Needs
  • How to Fix the 5 Most Common AWS IaC Misconfigurations
  • How To Get Fast Analytics From Your Data Wherever It Lives
  • How to Get Started w DRA in 4 Easy Steps
  • How To Give Security and Compliance What They Want In One Sprint
  • How to Improve Your DevOps Practices and Culture
  • How to Introduce Telemetry Streaming (gNMI) in Your Network With SNMP With Telegraf
  • How to Keep Your Cloud Infrastructure Secure and Compliant Without Slowing Down Developer Productivity
  • How to Make Your Product Your Best Salesperson
  • How to Manage Multiple Data Platforms With a Single Tool
  • How to Migrate to NoSQL Without Changing Your Whole Schema
  • How to Monitor Serverless with Real-Time, Granular Visibility: Intro to Using AWS Lambda Instrumentation and Analytics
  • How to Monitor the Performance of MySQL in the Cloud
  • How to Operate an Enterprise Scale Apache Kafka Cluster
  • How to Optimize Your Development Lifecycle by Combining Agile and DevOps
  • How to Power Offline-First Apps That Are Always Fast and Never Fail
  • How To Scale Up Your Test Automation Practices and Achieve Better App Quality
  • How to Simplify Development of Modern Applications
  • How to Simplify Video Workflows With Brightspot + AWS
  • How To Take Cross Browser Testing To The Next Level
  • How to Unlock Scalable, Real-Time Analytics with Columnar Storage
  • How to Use Hybrid Data Models
  • How to Use Time Series Data to Forecast at Scale
  • How to Write Java code 17% faster by eliminating app server restarts
  • How You Could Stop Top Software Fails
  • HPE DevOps Resource Bundle
  • IDC Tech Spotlight: Making Open Source Work for You - Achieving Optimum Speed, Security and Value
  • Identity Standards: The Definitive Guide
  • Improve Production Efficiency: Automate Product Image Workflows
  • Improving Delivery Engineering With Continuous Testing
  • Improving Speed, Scalability and the Customer Experience with In-Memory Data Grids
  • In Database Automation We Trust
  • In-Memory Data Management and Acceleration for Apache Spark
  • Increase App Confidence Using CI/CD and Infrastructure as Code
  • Increase Security With Ephemeral Access Control
  • Infographic: Reporting From Multiple Data Sources
  • Inform Your Software Development with Usage Analytics [On-demand Webinar]
  • Infosys Nia Data: Operationalize Your Enterprise Data Lake
  • Infosys Nia™ Advanced Machine Learning
  • Inserting Business Logic Security Checks into DevOps Pipelines
  • Inside the Attack: Understanding How Mobile Applications are Compromised
  • Inside the Network Operation Center (NOC)
  • Integration is a Core Competency of Digital Transformation
  • Integration Station [Infographic]
  • Intelligent Real-Time Decisions with VoltDB and Apache Kafka
  • Introducing Apache Druid
  • Introducing ShiftLeft Educate - Security Training for Developers
  • Introducing the Apache Ignite In-Memory Computing Platform: A GridGain Systems In-Memory Computing White Paper
  • Introduction to Strings Intelligence
  • iPaaS vs. iPaaS+: 5 Problems Traditional iPaaS Can't Solve
  • iPaaS vs. iPaas+: The High Cost of the Wrong Choice
  • Is MQTT Becoming the de Facto Standard of Industry 4.0? The Impact of IoT on Industrial Automation Protocols
  • Is Your Continuous Integration Environment Optimally Configured?
  • Java Microservices in the Cloud with Zing and Kubernetes
  • Java's Impact on the Modern World [Infographic]
  • Java-based CMS Resource Bundle
  • Journey to Your Data-Inspired Future
  • Keeping Mobile Unified Communications Secure
  • Key Data Management Use Cases for a Fast-Paced DevOps World
  • Kick Off Your Digital Transformation with these 10 Best Practices for AWS Design
  • Kubernetes and Beyond: Effective Implementation of Cloud-Native Software in the Enterprise
  • Kubernetes Bootcamp: How to Deliver an End-to-End Kubernetes Solution
  • Kubernetes Bootcamp: Using the SMACK Stack to Deliver and Manage Fast Data Services
  • Kubernetes Cheat Sheet
  • Kubernetes Governance: Take Control of Your Multi-Cluster Operations
  • Kubernetes Identity and Access Management Made Easier With D2iQ
  • Kubernetes in the Enterprise Virtual Roundtable
  • Kubernetes Monitoring: Best Practices
  • Kubernetes Security Bundle
  • Kubernetes Security Patterns by Chenxi Wang
  • Lessons for Large-Scale Machine Learning Deployments on Apache Spark™
  • Liferay Resource Bundle
  • Lifting the Fog: DevOps Performance Management With Key Standard Indicators
  • Lightbend Reactive Bundle
  • LightStep [x]PM Enables Lyft’s Move to Microservices, Helping Drive Significant Revenue and Improving Product Efficiency
  • Live Tech Talk and Demo: Getting Started with DevOps on Snowflake
  • Localization 101: A Beginner’s Guide to Software Localization
  • Localization for EU Companies: Trends & Best Practices Guide
  • Looking beyond SQL and NoSQL, what will data access look like?
  • Low Code Tools and Decoupled Components: The Best of All Worlds
  • Low-Code Mobile Basics with OutSystems
  • Low-Code Platforms: Everything You Need to Know
  • LTE-M: Advantages of Next-Gen Connectivity
  • mabl Case Study: 24G
  • mabl Case Study: Passportal
  • Machine Learning for All: The Democratizing of a Technology
  • Make Analytical Data Available to Everyone by Overcoming the 5 Biggest Challenges
  • Make New Friends and Escape Compliance Hell
  • Make Your Java Applications Run Even Faster
  • Making the Case for Optimizing Multi-CDN Delivery
  • Making The Leap From Continuous Integration To Continuous Delivery
  • Making the Most of Your Investment in Hadoop: Combining Hadoop with a modern approach to derive more insights from your data
  • Making the Shift from Relational to NoSQL - 2015 Edition
  • Manage Database Development in Multi-Platform Environments
  • Managed Kubernetes: Bringing the Benefit of Cloud-Native Architectures to Smaller Development Teams
  • Managing Business Risks of Large Scale Cloud Migrations
  • Managing Kubernetes: From a Small Fleet to a Navy of Clusters
  • Mapping Data Flows Across Apps, Microservices & Apis
  • MariaDB SkySQL: Lift-and-Shift Migration Guide
  • MariaDB TX: Security Overview
  • Massively Scaling Mobile Apps
  • Mastering Outsourced Digital Product Engineering – Beyond 2021
  • Maximize Survivability & Performance With Follow-the-Workload
  • Maximize your Google Cloud Investment with Redis Enterprise
  • Media Rich and Fast: Best Practices for Optimizing Web Page Speed
  • Microsegmentation Done Right in a Cloud-Native World
  • Microservices Architectures: Who Owns The Data?
  • Microservices for Java Developers
  • Microservices Trends in Java
  • Microservices: Breaking Down the Monolith [Guide Preview]
  • Microsoft SQL Server to MariaDB Migration
  • Migrating from RavenDB 2.5 to 4.0 in 36,000 Locations
  • Migrating to Microservice Databases
  • Migrating Your Data Warehouse? How to Automate Offloading and Migration
  • Mitigating Threats Beyond Payment Fraud
  • Mitigating Threats Beyond Payment Fraud
  • ML Demo: Scalable MLops with Snowflake and DataRobot
  • Mobile & Web Test Coverage Index: A Reference Guide for Cross-Platform Testing Strategy
  • Mobile and Web Test Coverage Index: A Reference Guide for Cross-Platform Testing Strategy (Fall 2020)
  • Mobile Testing Starter Kit
  • Modern Incident Management for IT Operations
  • Modern Java EE Design Patterns
  • Modernize Your Data Warehouse
  • Modernizing Legacy Applications For The Digital Age
  • Modernizing Legacy Applications For The Digital Age
  • Modernizing Legacy Applications For The Digital Age
  • Modernizing Your Database Processes With DevSecOps
  • Modernizing Your Database Processes with DevSecOps
  • Monetizing the Data Exhaust: Top 10 industries with data monetization opportunities
  • MongoDB 3.0 (w/ WiredTiger) vs. Couchbase Server 3.0.2
  • Motorola Solutions Drives Winning Security Culture
  • Moving From A Monolithic Commerce Platform to Commercetools
  • Moving from a Relational Model to NoSQL
  • Moving from a Relational Model to NoSQL (May 2021)
  • Moving to an Agile, Flexible Data Model Based on JSON Documents
  • MS SQL Server Simplified: Performance, Security & Availability With Cloud-Agnostic DBaaS
  • Multi-cloud Deployment With CockroachDB
  • Multi-Cluster Management: Reduce Overhead and Redundant Efforts
  • MVB Handbook
  • MVB Program Overview
  • Native Parallel Graphs: The Next Stage in the Graph Database Evolution
  • Never Shard Another Database, Gain Effortless Scale
  • NHS PHP Builds Mobile App and Online Patient Booking System in Less Than 7 Weeks
  • NIST SP 800-190: Container Security Guide for DevOps
  • No Silos at the Edge: The Need for Shared IoT Infrastructure
  • NoSQL Performance When Scaling by RAM
  • NoSQL vs. NewSQL: Evaluating Database Technologies for 2019
  • Not All Machine Learning Systems Are Created Equal
  • Not All Machine Learning Systems Are Created Equal
  • O'Reilly eBook: The Guide to Kubernetes
  • Open Source APM for an Event Management Web Application
  • Open Source Security and Compliance Isn’t Hyperbole. Get the Facts
  • Open Source Security Management in the Age of DevOps
  • OpenText Enterprise World 2017: OpenText Magellan Automates Enterprise Information Management with AI
  • OpenText Magellan: Introducing the Future of AI and Analytics
  • Operating Kubernetes Clusters and Applications Safely
  • Optimize Customer Experience With a Faster, More Reliable Website [On-Demand Webinar]
  • Optimizing for Page Load Speed: Challenges and Strategies to Improve SEO, User Engagement and Conversion Rates
  • Orchestrating and Deploying Containers [DZone Guide Preview]
  • Overcoming 3 Common Data Challenges
  • Overcoming SQL Strain and SQL Pain: How Utilizing a Graph Database Drives Faster Time to Market, Faster Performance and Business Agility
  • Overcoming the Performance Cost of Streaming Transactions
  • Overview of Realtime Streaming Protocols
  • OWASP Top 10 What You Really Need to Know
  • Path to Adopting Microservices in the Enterprise
  • PCI Compliance
  • Performance Matters: Load testing and tuning for your API
  • Playing With Fire: Prometheus Tips to Avoid Getting Burned
  • Powering Real-time Convergence of Big Data and Fast Data with the X Platform™
  • Predictive Analytics and Machine Learning Kit
  • Predictive Analytics and Machine Learning Kit
  • Predictive Analytics for Applications: Real-World Instances and Common Challenges
  • Principles of Container-Based Application Design
  • Private DNS: A Next-Generation DNS for Digital Transformation
  • Product-Centric Delivery paves the way for true ‘Enterprise Agility’
  • Progressive Delivery: Lessons Learned in the Wild
  • Purposeful Chatbots For Your Enterprise
  • Q2, 2019 Forrester Wave: Automation-Focused Machine Learning Solutions
  • Questions You Need To Ask About Error Monitoring
  • RBAC for SSH and Kubernetes Access With Teleport
  • Real Time Visualization of Software Value Streams
  • Real User Measurements: Why the Last Mile Is the Relevant Mile
  • Real-Time Analytics from Your Data Lake: Teaching the Elephant to Dance
  • Reduce AWS Security Investigation Time by 80%
  • Reduce Your Risk of a Breach with Dynamic Analysis
  • Refcard Outline: Essentials
  • Refcard Outline: Getting Started
  • Refcard Outline: Patterns & Anti-Patterns
  • Relational to Riak KV
  • Release Quality Software Faster With End-to-End Test Automation
  • Report: 2018 DevSecOps Community Survey
  • Resilience First: SRE and the Four Golden Signals of Monitoring
  • Revolutionize your API Testing Practice (or bring it in for the first time) by Leveraging Artificial Intelligence
  • Revulytics Helps CNC Software Dramatically Accelerate Mastercam® UI Redesign
  • RStudio – A Data Access Success Story
  • RUM for Latency-Based Load Balancing
  • Running Effective Offline Machine Learning Experiments
  • Running Effective Offline Machine Learning Experiments
  • SaltStack for IT Operations: Universal control for hybrid IT infrastructure
  • Scaling and Extending Prometheus Monitoring
  • Scaling Databases With Multi-Region Deployments
  • Scaling Feature Flag Management for Better Progressive Delivery
  • Scaling for Extreme Growth? The Data Layer is Ground Zero!
  • Scaling Kubernetes With Google Cloud and Splunk
  • Scaling On-Call in a DevOps Organization
  • Scaling Prometheus Metrics in Kubernetes with Telegraf
  • Scaling StreamSets On Azure Kubernetes Service
  • Scanning Container Images for Package Vulnerabilities
  • Securing APIs at DevOps Speed
  • Securing Cellular Enterprise IoT Solutions
  • Securing Mobile Healthcare Apps
  • Securing The Mobile and API Connected Work Space
  • Securing Web Applications and APIs With Confidence
  • Securing your databases is good. Securing your data is better.
  • Security checklist for the Internet of Things
  • Security Tested, Ops Approved: Log Management at Threat Stack
  • Security Threats are Coming [Infographic]
  • See the "Strongest Offering" for iPaaS and Hybrid Integration
  • Selecting Your Ideal DBaaS: 5 Key Steps
  • Serverless Functions on DigitalOcean Using OpenFaaS Framework
  • Seven Key Benefits of the IronWorker System
  • Seven Strategies for Easing the DevOps Transition
  • Sharpen Your Competitive Edge With Value Stream Integration
  • Shift Gears With Shift Left: How to Speed Up Digital App Development Cycles Without Compromising Quality
  • Shift Left: 5 Steps for Advancing Quality into the Dev Cycle
  • Signs You Need a New QA Platform
  • Simplifying Application Security and Compliance with the OWASP Top 10
  • Sisense – A Success Story in Simplifying Big Data Access & Analytics
  • Smart Analytics: The Era of A.I.-powered BI
  • Smart Tag Management for Cloud Governance
  • Snowflake Data Apps Demo: Auto-ingest streaming data from Twitter with Snowpipe
  • Snowflake Data Apps Demo: Auto-ingest streaming data from Twitter with Snowpipe (Mar 2021)
  • Software Testing Starter Kit
  • Spark The Definitive Guide
  • Spec Sheet: Display Campaigns
  • Sqream DB MPP Augmentation: The Missing Link for Uncovering Business-Critical Insights From Massive Data
  • State of Application Development
  • State of The Developer Nation Q1 2017
  • Strategic Data Flexibility
  • Streaming to a New Jakarta EE
  • Strings Management Manifesto
  • Succeeding Through Change: 5 ways to use APIs to help deliver continuity in uncertain times
  • Survival Instincts: Most Trusted Tech for the Web Dev Jungle [Infographic]
  • Take DevOps Monitoring to Next Level With a Time-Series Platform
  • Taking Your Multi-Site Management at Scale to the Next Level
  • Tales From the Field: Help Your Developers Breathe New Life Into Your Customer Facing Teams
  • Teaching an Elephant to Dance. Intentional evolution across teams, processes, and applications
  • Test Design Automation Resource Bundle
  • Testing Microservices
  • testtttttttttttt
  • That's Not How This Works: All Development Should be Secure Development
  • The 101 of Continuous Software Delivery
  • The 12-Factor App [Infographic]
  • The 3 Essential Building Blocks of Continuous Testing: With a 5-Step Plan For Building a Continuous Testing Foundation
  • The 4 Challenges of “Everything” Cloud
  • The 5 Levels of Analytics
  • The 5 Main Benefits of Apache Cassandra
  • The 7 levels of AI purgatory and how to escape them
  • The 7 Things Executives Should Know About China Cloud Deployment
  • The AI productivity challenge
  • The API Owner's Manual
  • The AppSec How To: Application Security in Continuous Integration
  • The Architecture of the Sysdig Container Intelligence Platform
  • The Benefits of Open Source and the Risks of Open Core
  • The Benefits of Using a Managed Service for Your Open Source Data Infrastructure
  • The Business Case for DevOps
  • The Business Value of Red Hat OpenShift
  • The Business Value of Red Hat OpenShift
  • The Buyer's Guide to Web & Mobile Test Automation Tools
  • The Buyers Guide to Modern IBM I High Availability / Disaster Recovery Solutions
  • The Buyer’s Guide to Modern IBM i HA/DR Solutions
  • The case for operational AI: Moving from research to reality for deep learning and AI
  • The Challenges of Threat Modeling Modern Applications
  • The Complete 2020 Localization Guide for Agile Teams
  • The Complete Guide on Open Source Security
  • The Complete Guide to Building a Successful Agile Team
  • The Continuum of Cloud Native Topologies
  • The Data Bimodal
  • The Data Leader's Guide to Enterprise Cloud Security
  • The Definitive Guide to Graph Databases for the RDBMS Developer
  • The Definitive Guide to The Internet of Things for Business, 3rd Edition
  • The Dirty Little Secret of DevOps That's Holding You Back
  • The DZone Guide to Automated Testing
  • The DZone Guide to Open Source: Democratizing Data [Preview Guide]
  • The Emerging Economics of IoT: Insights into Successful Application of the Internet of Things
  • The Emojis of Mobile Development [Infographic]
  • The Essential AI Handbook for leaders
  • The Essential Guide to Data Lakes: Designing Data Lakes to Optimize Analytics
  • The Essential Guide to Feature Selection
  • The Event Mesh: A Primer
  • The Evolution of JavaScript Tooling: A Modern Developer's Guide
  • The Fastest Way to Build Mobile Apps With Cloud Data
  • The Five Principles of Monitoring Microservices
  • The Forrester WaveTM: API Management Solutions, Q4 2018
  • The Forrester WaveTM: Strategic iPaaS And Hybrid Integration Platforms, Q1 2019
  • The future of BI is networked: A networked model for business intelligence and analytics
  • The Future of Fraud Fighting
  • The Great Middleware Transition: Managed Services Address Key Needs
  • The Guide to Modernizing Traditional Security
  • The Journey to High Speed Digital Business Transformation
  • The Key to Cost Saving
  • The Main Pillars Of The DevOps Toolchain
  • The Path To Cloud-Native Applications: 8 Steps To Guide Your Journey
  • The Path To Cloudnative Applications: 8 Steps To Guide Your Journey
  • The Platform Vision of API Giants
  • The Power of Personalization: Driving Digital Banking Success
  • The Realtime API Family
  • The Road to DevTestOps
  • The ROI of Multi-Model Graph Databases
  • The Secret to Unlocking GraphQL at Scale
  • The Secret to Winning IT Security Roulette
  • The Secure DevOps Debate: Revolution or Evolution?
  • The Security of Applications Supporting the New Remote Lifestyle
  • The Shift from Monitoring to Observability
  • The State of Application Development, 2018
  • The State of IT Security in 2019 and How Intelligent Automation Can Help
  • The State of Kubernetes Report: Overprovisioning in Real-Life Containerized Applications
  • The State of Open Source Vulnerabilities Management in 2018
  • The State of Software Delivery Report
  • The Surprising Resurgence of CapEX
  • The Survival Handbook for Deploying to On-Premise, Air-Gapped, or Multi- Cloud Environments
  • The Ultimate Guide to Secrets Management in Containers
  • The Value of OpenText Magellan
  • The Zone Leader Handbook
  • THINKstrategies Report: Maximizing the Value of the Cloud
  • Thinning the Internet for Things [Infographic]
  • Three Best Practices for Securing Cloud Native Applications
  • Three Common Enterprise DNS Challenges and How to Solve Them
  • Top 10 Best Practices for AWS Security
  • Top 5 VPN Challenges and Why You Should Be Concerned
  • Top 6 API Security Needs for Serverless Apps Report
  • Top 6 Security Needs for APIs and Serverless Apps
  • Top Five Reasons to Re-Evaluate Your Privacy Posture
  • Top Five Situations Where Mobile App Security Is Paramount
  • Total Cost of Ownership: Database Software and Support—MariaDB Enterprise vs. Oracle Database Enterprise Edition
  • Transform Your Enterprise Data Operations With Data Observability
  • Trend Report Case Study Guidelines 2021
  • Trend Report Outline: Case Study
  • Two Local Development Environments You Can Use to Test BigCommerce for WordPress
  • UI for BI: Designing High-Impact Dashboards
  • Understanding Event-driven APIs
  • Understanding State-based vs. Migrations-based Database Deployments
  • Undertaking Challenges in Hybrid Cloud Security Environments
  • Unit Test Patterns for .NET
  • Unleash the Hidden Value of Data with Data Lake Management Technology
  • Unleash the power of your Microservices through APIs.
  • Unlocking the Cloud Operating Model with Tencent Cloud
  • Unraveling the Mystery: How to Predict Application Performance Problems
  • Upgrading Cordova to NativeScript
  • User Guide to Machine Learning and Data Transformation in the Cloud
  • Using Postman to Streamline API Development in Fortellis
  • UX Design for Embedded Analytics
  • Value Stream Management: The Key To Balancing Innovation and Operational Excellence
  • Vanson Bourne Trials and Tribulations of Components
  • Visa Customer Case Study
  • Visualizing Time-Series Data With Java
  • Watch Tony Stark Leverage GraphQL to Personalize a PWA
  • Web Application Security that Ops Can Get Behind
  • Welcome to the Cognitive Area: The New Generation of Computing
  • What Do IT and Engineering Leaders Need to Know About Observability
  • What Does Being Cloud-Native Mean for a Database?
  • What is automation and why does the Internet of Things need it?
  • What Is Cadence and Is It Right for You?
  • What is Continuous Software Intelligence?
  • What Is Kubernetes Security? And How to Get It Right the First Time
  • What is the Security Professional’s Role in a DevSecOps World? Find out.
  • What to Consider When Moving IoT Data Into Cloud Platforms
  • What You Don’t Know About Your Legacy QA Tools That Creates Risk
  • When basic load balancing tools from AWS, Azure, and GCP aren't enough
  • When to Choose ExtReact
  • When, Where and Why to Use NoSQL
  • Where to Begin with Distributed Tracing: A Complete Guide
  • White Paper: Detecting Java Application Performance Trends
  • Why Agile and DevOps Transformations Are Failing At Scale
  • Why Data-as-a-Service is the Next Generation Data Platform
  • Why embedded integration is a game changer for SaaS vendors
  • Why IAM is a Must in API Management
  • Why IT Struggles with Digital Transformation (and What to Do About It)
  • Why Microservices Providers Matter Today
  • Why Open Source Works for DevOps Monitoring
  • Why Use A Distributed Architecture for Real-Time Big Data
  • Why You Should NOT be Using an RDBS for Time-Stamped Data
  • Why You Should NOT be Using an RDBS for Time-stamped Data
  • Windows Server 2008/R2 Application Migration Program
  • Winning in the API Economy
  • WOPI: Pros and Cons of Using Standards for Office Integration
  • Workflow Hero: Scaling Process Automation Enterprise-Wide Through Citizen Development
  • You Had me at Hello
  • Your Architecture is Compounding Your Risk of Failure: How a Self-Healing System is the Secret to Resiliency
  • Your Complete Guide to Backup and Recovery for MongoDB
  • Your Continuous Testing Cheat Sheet
  • Zone Leader Program Overview
  • Zone Leader Program: An Overview
  • Zones Lookbook
  • [Infographic] The Flavors of JavaScript
  • [One-Sheeter] 2017 Guide to Artificial Intelligence: Machine Learning and Predictive Analytics
  • [One-Sheeter] 2017 Guide to Orchestrating and Deploying Containers
  • “Zero-Copy” Hybrid Bursting with no App Changes

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: