DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workkloads.

Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

The Latest Software Design and Architecture Topics

article thumbnail
Analyzing Stock Tick Data in SingleStoreDB Using LangChain and OpenAI's Whisper
Talk to SingleStoreDB about stock tick data using LangChain and OpenAI's Whisper.
September 17, 2023
by Akmal Chaudhri DZone Core CORE
· 2,776 Views · 1 Like
article thumbnail
How To Validate Archives and Identify Invalid Documents in Java
Explore the prevalence of cyberattacks carried out using common archive formats and invalid document types and data validation API solutions.
September 16, 2023
by Brian O'Neill DZone Core CORE
· 5,918 Views · 2 Likes
article thumbnail
Deploy a Session Recording Solution Using Ansible and Audit Your Bastion Host
Learn how to record SSH sessions on a Red Hat Enterprise Linux VSI using in-built packages. The RHEL packages are installed using Ansible automation.
September 16, 2023
by Vidyasagar (Sarath Chandra) Machupalli FBCS DZone Core CORE
· 6,297 Views · 6 Likes
article thumbnail
Unraveling Lombok's Code Design Pitfalls: Exploring Encapsulation Issues
Lombok simplifies Java coding but can breach encapsulation. Java 8's Objects.requireNonNull and IDE support are alternatives. Choose wisely.
September 16, 2023
by Otavio Santana DZone Core CORE
· 8,895 Views · 8 Likes
article thumbnail
How To Repair Failed Installations of Exchange Cumulative and Security Updates
In this article, we will list some common issues that you may encounter when installing CU and SU and the possible solutions to fix them.
September 15, 2023
by Shelly Bhardwaj
· 5,486 Views · 1 Like
article thumbnail
UX Is Critical for Zero-Trust
Systems with weak security can be attacked, but websites with UX issues can lose users. Designers should aspire to meet user needs while complying with safety standards.
September 15, 2023
by Zac Amos
· 2,948 Views · 1 Like
article thumbnail
Helm Dry Run: Guide and Best Practices
This article will take a closer look at Helm dry run concepts, including related Helm commands and how to use Helm dry run to troubleshoot templates.
September 15, 2023
by Vishal Padghan
· 6,218 Views · 4 Likes
article thumbnail
REST vs. Message Brokers: Choosing the Right Communication
We’ll delve into the disparities between REST and message brokers in terms of communication, helping you make the right choice for your specific use case.
September 15, 2023
by Shoham Roditi Elimelech
· 11,954 Views · 9 Likes
article thumbnail
Application Integration for IoT Devices: A Detailed Guide To Unifying Your Ecosystem
Know how the IoT connects to application integration in this continuously growing and innovating world, and learn IoT strategies to always be up to date.
September 15, 2023
by Pamela Price
· 4,035 Views · 3 Likes
article thumbnail
Securing Tomorrow: Unleashing the Power of Breach and Attack Simulation (BAS) Technology
As the cybersecurity landscape continues to evolve, the challenges associated with defending against cyber threats have grown exponentially.
September 15, 2023
by Gaurav Agarwaal
· 2,449 Views · 1 Like
article thumbnail
Why You Shouldn’t Test on Rooted Devices
In this article, we discuss what rooted devices are, and we dig deep into why you should not test on rooted mobile devices.
September 15, 2023
by Salman Khan
· 2,500 Views · 1 Like
article thumbnail
Apache Flink
This tutorial will show you step-by-step how to use Astra as a sink for results computed by Apache Flink, an open-source framework.
September 15, 2023
by Patrick McFadin
· 4,676 Views · 1 Like
article thumbnail
Next-Gen Threat Hunting Techniques With SIEM-SOAR Integration
NLP, AI, and ML boost cybersecurity via streamlined data processing, automated incident handling, compliance, and proactive threat detection.
September 15, 2023
by Cheena Shekhawat
· 2,726 Views · 1 Like
article thumbnail
Microservices With Apache Camel and Quarkus (Part 5)
After learning how to run our microservices in Minikube in part three of this series, let's look at how to do the same in OpenShift.
September 15, 2023
by Nicolas Duminil DZone Core CORE
· 8,378 Views · 7 Likes
article thumbnail
Securing Your Applications With Spring Security
Spring Security secures Java apps with authentication, authorization, and protection features, shown in an online banking example.
September 15, 2023
by Arun Pandey DZone Core CORE
· 12,665 Views · 4 Likes
article thumbnail
Safeguarding Your Organization: Insights for IT Pros During National Insider Threat Awareness Month
Technology leaders should re-evaluate access controls, monitoring, reporting policies, and foundational protections to mitigate insider cybersecurity risks.
September 15, 2023
by Tom Smith DZone Core CORE
· 3,301 Views · 3 Likes
article thumbnail
Selecting the Right Automated Tests: A When and What Guide To Implementing Tests in Your Application
In this article, discover the many different types of tests an application can implement and the kinds of issues they can prevent.
September 15, 2023
by Chris Ward DZone Core CORE
· 4,421 Views · 6 Likes
article thumbnail
Snowflake vs. Data Bricks: Compete To Create the Best Cloud Data Platform
Do you want to get into the race for the best cloud data platform? Take a look at the difference between Snowflake and Data Bricks.
September 15, 2023
by Sanam Naseem
· 3,793 Views · 4 Likes
article thumbnail
Messaging Channels in Enterprise Integration Patterns: Enabling Efficient Communication
In this article, we will discuss Messaging Channels in Enterprise Integration Patterns along with the types and their benefits.
September 15, 2023
by Aditya Bhuyan
· 2,306 Views · 2 Likes
article thumbnail
What Is Privacy by Design?
Privacy by Design is sometimes considered too abstract. We, therefore, share tips and tactics for engineers to implement each of the seven principles.
September 15, 2023
by Xander W
· 2,325 Views · 1 Like
  • Previous
  • ...
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: