DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

The Latest Software Design and Architecture Topics

article thumbnail
The Essential Guide To Effective Software Testing
Don't be fooled by myths; testing is vital for success! Invest in software testing services and watch your software shine.
January 12, 2024
by Minkle Kalra
· 3,956 Views · 4 Likes
article thumbnail
Chaos Engineering and Machine Learning: Ensuring Resilience in AI-Driven Systems
Explore how chaos engineering enhances AI resilience in systems, ensuring robust and reliable machine learning applications.
January 12, 2024
by shashank bharadwaj
· 3,804 Views · 2 Likes
article thumbnail
A Comprehensive Guide to Multipass: Simplifying Virtual Machine Management
In this comprehensive tutorial, we will walk you through the process of setting up a Docker Swarm cluster and deploying Docker containers within it.
January 12, 2024
by Aditya Bhuyan
· 4,041 Views · 4 Likes
article thumbnail
Build a Streamlit App With LangChain and Amazon Bedrock
In this article, learn how to use ElastiCache Serverless Redis for chat history, deploy to EKS, and manage permissions with EKS Pod Identity.
January 12, 2024
by Abhishek Gupta DZone Core CORE
· 4,682 Views · 1 Like
article thumbnail
AI Helps With the Implementation of Simulated Cyber Defense Techniques
Learn more about AI's role in implementing simulated cyber defense techniques that are transforming the cybersecurity landscape.
January 11, 2024
by Ryan Kh
· 3,044 Views · 1 Like
article thumbnail
The Future Is Headless: Building Modern E-Commerce Experiences With Magento 2 and GraphQL
Discover how Magento 2 and GraphQL are shaping the future of eCommerce with headless architecture enabling modern, agile, and personalized shopping experiences.
January 11, 2024
by Sanjay Singhania
· 3,817 Views · 1 Like
article thumbnail
Jakarta EE Security: Using Identity Stores
Jakarta EE Security (formerly JSR 375) introduces the notion of identity stores. Here, learn how they are implemented by Jakarta EE platforms like Payara.
January 11, 2024
by Nicolas Duminil DZone Core CORE
· 5,954 Views · 1 Like
article thumbnail
Fast, Secure, and Highly Available Real-Time Data Warehousing Based on Apache Doris
A whole-journey guide for financial users looking for fast data processing performance, data security, and high service availability.
January 11, 2024
by Shirley H.
· 2,788 Views · 1 Like
article thumbnail
Why We Need Cybersecurity Whistleblowers
Whistleblowers are controversial, but they're essential for cybersecurity by helping protect customers, raising security standards, and promoting security awareness.
January 11, 2024
by Zac Amos
· 2,492 Views · 2 Likes
article thumbnail
Event-Driven Process Orchestration: A Practitioner’s Viewpoint
Event Driven Orchestration options being evaluated by enterprises and their pros and cons. When to choose what and which approach makes sense when?
January 11, 2024
by Ved Prakash
· 4,164 Views · 1 Like
article thumbnail
Open Source Instant Messaging (IM) Project OpenIM Source Code Deployment Guide
Deploying OpenIM involves multiple components and supports various methods, including source code, Docker, and Kubernetes.
January 11, 2024
by Skiffer Wen
· 5,010 Views · 1 Like
article thumbnail
Improving Efficiency: LinkedIn’s Transition From JSON to Protocol Buffers
LinkedIn reportedly improved its latency by 60% by migrating to Protocol Buffers. Let's understand what protocol buffers are and how they help LinkedIn.
January 11, 2024
by Roopa Kushtagi
· 3,708 Views · 3 Likes
article thumbnail
Effortlessly Transform CSV Into a REST API Within Minutes
TiDB Serverless is a fully managed, autoscaling Database-as-a-Service (DBaaS) solution built on TiDB, an advanced open-source, distributed SQL database.
January 11, 2024
by Arun Vijayraghavan
· 2,732 Views · 1 Like
article thumbnail
Restoring the MS SQL Server Database in Easy Steps
Explore methods to restore the Microsoft SQL Server Database in easy steps. Get the best solutions for restoring the MS SQL Server Database.
January 11, 2024
by Mithilesh Tata DZone Core CORE
· 3,987 Views · 2 Likes
article thumbnail
Understanding Neuromorphic Chips: Revolutionizing Machine Learning
This condensed article provides an overview of neuromorphic chips, their applications in machine learning, and current approaches to their design.
January 11, 2024
by Aditya Bhuyan
· 2,492 Views · 2 Likes
article thumbnail
Encrypting Data Using Asymmetric Encryption: A Comprehensive Guide
This article provided detailed steps, actors involved, advantages, disadvantages, use cases, and examples of products utilizing asymmetric encryption.
January 11, 2024
by Aditya Bhuyan
· 2,698 Views · 2 Likes
article thumbnail
7 Tips for Effective Cybersecurity Training for Developers
Cybersecurity training is crucial for modern developers, so organizations should prioritize learning to keep up with a constantly evolving digital business environment.
January 10, 2024
by Zac Amos
· 3,787 Views · 1 Like
article thumbnail
The Exploration of Static vs Dynamic Code Analysis
In this article, dive into the exploration of Static Code Analysis vs Dynamic Code Analysis in detail.
January 10, 2024
by Ruchita Varma
· 4,370 Views · 1 Like
article thumbnail
Comparison of Various AI Code Generation Tools
Explore the potential of GenAI in coding, analyzing its impact on developer productivity, code quality, and overall software development workflows.
January 10, 2024
by Abhay Mishra
· 6,891 Views · 1 Like
article thumbnail
7 Considerations for Multi-Cluster Kubernetes
This article compares Hybrid Cloud and Multi-Cloud highlighting challenges like complexity, interoperability, security, and resiliency strategies.
January 10, 2024
by Ray Edwards
· 4,457 Views · 1 Like
  • Previous
  • ...
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: