DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Last call! Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

The Latest Software Design and Architecture Topics

article thumbnail
The Outbox Pattern: Reliable Messaging in Distributed Systems
The Outbox Pattern is a design pattern used in distributed systems to ensure reliable messaging across different services.
February 27, 2025
by Narendra Lakshmana gowda
· 4,132 Views · 5 Likes
article thumbnail
Efficient Multimodal Data Processing: A Technical Deep Dive
Efficient multimodal data processing using GPU-accelerated pipelines, neural networks, and hybrid storage for scalable, low-latency AI-driven applications.
February 27, 2025
by Praneeth Reddy Vatti
· 4,641 Views · 4 Likes
article thumbnail
Cloud-Driven Analytics Solution Strategy in Healthcare
Detailed insights into compute resource management, cluster optimization, storage efficiency, and cost governance in cloud-based environments.
February 27, 2025
by Abrar Ahmed Syed
· 3,828 Views · 5 Likes
article thumbnail
Networking in DevOps: Your Beginner Guide
In this article, we'll cover some of the basics of DevOps networking: why it is so crucial and how you can use it to smooth out your processes.
February 27, 2025
by Rocky Sah
· 4,741 Views · 4 Likes
article thumbnail
Identity and Access Management Solution to Safeguard LLMs
One of the essential security measures to address LLM security involves securing access to the LLMs so that only authorized individuals can access data.
February 26, 2025
by Anant Wairagade
· 4,098 Views · 6 Likes
article thumbnail
How to Scale Elasticsearch to Solve Your Scalability Issues
Scaling Elasticsearch requires balancing sharding, query performance, and memory tuning for optimal efficiency in high-traffic, real-time applications.
February 26, 2025
by Vivek Kumar
· 5,673 Views · 3 Likes
article thumbnail
AI-Powered Professor Rating Assistant With RAG and Pinecone
Build a Rate-Professor AI assistant with OpenAI, Pinecone, and Next.js, with real-time chat and context-aware responses. Deploy easily on Vercel or Netlify.
February 26, 2025
by Vaibhavi Tiwari
· 4,245 Views · 3 Likes
article thumbnail
A Platform-Agnostic Approach in Cloud Security
Learn a platform-agnostic approach to cloud security, focusing on encryption, zero-trust models, and tools to enhance security across multi-cloud environments.
February 26, 2025
by Natapong Sornprom
· 3,381 Views · 2 Likes
article thumbnail
10 Best Practices for Managing Kubernetes at Scale
We will discuss some of the best practices for managing distributed workloads on Kubernetes clusters to simplify deploying and managing containers.
February 26, 2025
by Srinivas Chippagiri DZone Core CORE
· 5,498 Views · 4 Likes
article thumbnail
PostgreSQL 12 End of Life: What to Know and How to Prepare
It covers Amazon RDS Extended Support, upgrade options, and the benefits of migrating to PostgreSQL 16, emphasizing the importance of timely upgrades.
February 26, 2025
by Vivek Singh
· 4,128 Views · 1 Like
article thumbnail
A Step-by-Step Guide to Write a System Design Document
A structured approach to system design includes defining the problem, scope, tenets, risks, assumptions, and architecture choices.
February 26, 2025
by Nikunj Agarwal
· 8,211 Views · 4 Likes
article thumbnail
AI-Powered Ransomware Attacks
This article examines AI's impact on cybersecurity and its role in boosting security measures and ransomware threats with multi-layered defense strategies.
February 26, 2025
by Anirudh Khanna
· 3,888 Views · 2 Likes
article thumbnail
Non-Human Identity Security in the Age of AI
The rise of AI in enterprises has expanded the attack surface. Learn how you can secure non-human identities and prevent unauthorized access.
February 25, 2025
by Dwayne McDaniel
· 3,229 Views · 3 Likes
article thumbnail
How Generative AI Is Revolutionizing Cloud Operations
Generative AI is transforming how tech companies approach cloud reliability and operations. In this article, we explore the most compelling applications.
February 25, 2025
by Aditya Visweswaran
· 2,488 Views
article thumbnail
Spark Job Optimization
Spark jobs can be optimized to maximize resource utilization in a cluster, improving performance and reducing costs for large-scale data processing.
February 25, 2025
by Chandra Shekar r Chekuri
· 2,661 Views · 1 Like
article thumbnail
Protecting Critical Infrastructure From Ransomware
The article emphasizes enhancing critical infrastructure resilience against ransomware through comprehensive cybersecurity measures and collaborative strategies.
February 25, 2025
by Anirudh Khanna
· 3,227 Views · 2 Likes
article thumbnail
The Hidden Cost of Dirty Data in AI Development
Dirty data weakens AI, increases costs, introduces bias, and causes compliance risks. Strong data governance ensures reliable AI outcomes.
February 25, 2025
by Ilya Dudkin DZone Core CORE
· 2,980 Views · 2 Likes
article thumbnail
Integrating AI Agent Workflows in the SOC
As our reliance on AI-enabled hyper-automation increases, we will leverage human expertise to design robust workflows capable of managing repetitive tasks.
February 25, 2025
by Keyur Rajyaguru
· 3,214 Views
article thumbnail
Simplifying Multi-LLM Integration With KubeMQ
Using a message broker as a router to handle requests between your apps and LLMs simplifies integration, improves reliability, and scales easily for AI-driven apps.
February 25, 2025
by John Vester DZone Core CORE
· 17,616 Views · 3 Likes
article thumbnail
A Comprehensive Guide to IAM in Object Storage
In this article, learn about identity access management, service IDs, service credentials, and their role in securing access to object storage on the cloud.
February 25, 2025
by Vidyasagar (Sarath Chandra) Machupalli FBCS DZone Core CORE
· 4,486 Views · 6 Likes
  • Previous
  • ...
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: