DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones AWS Cloud
by AWS Developer Relations
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Partner Zones
AWS Cloud
by AWS Developer Relations
Building Scalable Real-Time Apps with AstraDB and Vaadin
Register Now

The Latest Software Design and Architecture Topics

article thumbnail
How To Manage K8s Operator Lifecycle
Multiple tools are available, but they all have pros and cons. Let's explore them.
November 29, 2022
by Sylvain Kalache
· 6,897 Views · 1 Like
article thumbnail
How to Manage a Red Hat MicroShift Cluster with Shipa
Run Kubernetes clusters in environments with tight resource constraints (e.g. edge / IoT devices) without spending a lot of time on deployments and governance.
July 2, 2022
by Renjith Ravindranathan
· 5,701 Views · 3 Likes
article thumbnail
How to Load Balance RESTful Web Services Using CXF and Apache Camel
This article shows you two approaches to load balance JAXRS web services without an Apache or a hardware load balancer.
June 17, 2016
by Milan Sonkar
· 10,051 Views · 8 Likes
article thumbnail
How to Leverage Speech-to-Text With Node.js
Speech recognition has a variety of important uses in consumer and commercial technology alike. Take advantage of a free speech-to-text API with Node.js code examples.
July 29, 2022
by Brian O'Neill CORE
· 7,789 Views · 2 Likes
article thumbnail
How to Lead a Blockchain Engineering Team
In this article, a blockchain developer discusses his experience in developing blockchain-based applications and collaborating with his team.
December 23, 2019
by Kuba Kucharski
· 8,103 Views · 2 Likes
article thumbnail
Security Token Basics: Part 1 How to Launch an STO
Get started on the road to launching STOs.
November 11, 2019
by Akash Takyar
· 12,793 Views · 3 Likes
article thumbnail
How to Integrate Arduino and Google Cloud Platform
Learn more about integrating Arduino and GCP in this beginner tutorial!
December 2, 2019
by Francesco Azzola CORE
· 34,894 Views · 5 Likes
article thumbnail
How to Install Red Hat Process Automation Manager 7.5 in Minutes
This tutorial demonstrates how you can install the Process Automation Manager in a matter of minutes in just a few easy steps.
Updated January 17, 2020
by Eric D. Schabell CORE
· 5,982 Views · 4 Likes
article thumbnail
How to Install Red Hat Decision Manager 7.5 in Minutes
Here's a Red Hat update that installs the latest process automation tooling for your development projects in just minutes on your very own machine.
February 27, 2020
by Eric D. Schabell CORE
· 9,104 Views · 5 Likes
article thumbnail
How to Improve MySQL AWS Performance 2X Over Amazon RDS at The Same Cost
ScaleGrid’s MySQL on AWS High-Performance deployment can provide 2x-3x the throughput at half the latency of Amazon RDS for MySQL with their added advantage of having two read replicas as compared to one in RDS.
October 31, 2019
by Kristi Anderson
· 26,800 Views · 3 Likes
article thumbnail
How to Go Zero Trust, Part 5: Migrating Resources Behind an Access Fabric
This is part 5 in a series dedicated to helping companies learn what it takes to achieve a Zero Trust security architecture of their own, much like Google’s BeyondCorp.
August 18, 2017
by Ivan Dwyer
· 2,391 Views · 2 Likes
article thumbnail
How to Go Zero Trust, Part 4: Implementing Access Controls
We explore Zero Trust architecture by examining the desired characteristics and behaviors of the access controls, and how they fit together to form a cohesive system.
August 3, 2017
by Ivan Dwyer
· 2,787 Views · 1 Like
article thumbnail
How to Go Zero Trust, Part 2: Collecting Relevant Data
Learn how to collect the data you need to get your Zero Trust architecture up and running, and how to make sense of this data once collected.
July 7, 2017
by Ivan Dwyer
· 3,322 Views · 2 Likes
article thumbnail
How to Get Started With the Smart Parking
Smart parking is an innovative and much-needed solution that can be easily fulfilled with IoT. Keep reading to know how you can get started.
December 28, 2022
by Kamal R
· 4,256 Views · 1 Like
article thumbnail
How To Get Page Source in Selenium Using Python
In this article, we explore how to make Selenium WebDriver get page source and demonstrate how Selenium gets XML page source as well while using Python.
February 3, 2023
by Nishant Choudhary
· 6,875 Views · 4 Likes
article thumbnail
How to Find a Vulnerability in a Website
Explore how to find a vulnerability in a website and how adopting security practices can prevent application issues.
May 25, 2022
by Sudip Sengupta CORE
· 6,114 Views · 2 Likes
article thumbnail
How to Enhance Security Measures on Your Web Browsers
Increase browser security in a few, simple steps.
Updated September 20, 2019
by Jash Unadkat
· 7,262 Views · 4 Likes
article thumbnail
How to Enable Sign-in With iOS Biometric Authentication
Up your security game with biometric authentication.
October 29, 2019
by ID Guard Offline
· 13,785 Views · 3 Likes
article thumbnail
How to Dockerize a Python Flask Application
In this article, we'll walk you through how to dockerize a Flask application with Python step-by-step.
April 22, 2020
by Kishor Kumar Ravi
· 9,567 Views · 3 Likes
article thumbnail
How to Do Deep Learning for Java
Let's see how to do deep learning for Java with Valohai.
Updated September 23, 2019
by Mani Sarkar
· 20,543 Views · 13 Likes
  • Previous
  • ...
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com

Let's be friends: