DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

The Latest Software Design and Architecture Topics

article thumbnail
A Better Web3 Experience: Account Abstraction From Flow (Part 2)
Walletless dApps from Flow use account abstraction to improve the web3 user experience. In part two, we walk through how to build the front end for this dApp.
September 20, 2023
by Alvin Lee DZone Core CORE
· 3,862 Views · 2 Likes
article thumbnail
HLS in Depth
HLS is a widely adopted, simple, robust streaming protocol. Learn how it works from a client's perspective, its segments, features, and disadvantages.
September 20, 2023
by Fenil Jain
· 3,205 Views · 19 Likes
article thumbnail
How TIBCO Is Evolving Its Platform To Embrace Developers and Simplify Cloud Integration
Reinvesting in foundational technology, returning to the roots of the company, and ensuring existing customers are well-supported and heard.
September 20, 2023
by Tom Smith DZone Core CORE
· 2,828 Views · 2 Likes
article thumbnail
How To Secure Your CI/CD Pipelines With Honeytokens
Discover how honeytokens, digital decoys designed to detect unauthorized access, can strengthen the security of your CI/CD pipelines.
September 20, 2023
by Keshav Malik
· 2,054 Views · 1 Like
article thumbnail
SAP Business One vs. NetSuite: Comparison and Contrast of ERP Platforms
Let's understand the key points of comparison between SAP Business One and Oracle NetSuite, along with their introduction.
September 20, 2023
by Adarsh Parikh
· 2,045 Views · 2 Likes
article thumbnail
What Is Kubernetes RBAC and Why Do You Need It?
Understanding Kubernetes RBAC and its implementation is crucial to practice multitenancy in organizations.
September 20, 2023
by Debasree Panda
· 3,926 Views · 8 Likes
article thumbnail
Exploring the Evolution and Impact of Computer Networks
This article will explore their history, the key networking technologies and protocols, and their impact on various aspects of our lives.
September 20, 2023
by Aditya Bhuyan
· 4,790 Views · 4 Likes
article thumbnail
Freedom to Code on Low-Code Platforms
Developers harness their potential on low-code platforms when allowed to modify code amid varying degrees of code access, visibility, and extensibility.
September 19, 2023
by Deepak Anupalli
· 3,323 Views · 1 Like
article thumbnail
Why Is SaaS Compliance Important?
SaaS compliance is crucial due to increasing digitalization. It involves financial, data security, and personal data privacy aspects.
September 19, 2023
by Or Hillel
· 2,653 Views · 1 Like
article thumbnail
The Emergence of Cloud-Native Integration Patterns in Modern Enterprises
This blog explores the essential role of cloud-native integration patterns in modern enterprises, from Kubernetes to security concerns.
September 19, 2023
by Andrea Arnold
· 4,268 Views · 2 Likes
article thumbnail
MuleSoft: Tactical and Strategical Role of an Application Template
Read through a real-life use case of how an application template helped a team strategize the work in the solution delivery.
September 19, 2023
by Alex Bogomol
· 2,962 Views · 2 Likes
article thumbnail
How To Learn Secure Software Development Lifecycle (SDLC)
In this guide, we will break down the essential elements of SDLC and provide you with a roadmap to learn it effectively.
September 19, 2023
by Masudul Herry
· 3,568 Views · 1 Like
article thumbnail
The Systemic Process of Debugging
Explore the academic theory of the debugging process, focusing on issue tracking, team communication, and the balance between unit-to-integration tests.
September 19, 2023
by Shai Almog DZone Core CORE
· 2,613 Views · 5 Likes
article thumbnail
Four Ways for Developers To Limit Liability as Software Liability Laws Seem Poised for Change
After years of software security liability remaining an open question, changes to the law could be on the way. Here's how to prepare for them in case they come.
September 19, 2023
by Philip Piletic DZone Core CORE
· 4,029 Views · 3 Likes
article thumbnail
The Promise and Peril of Generative AI for Cybersecurity
Explore the pros and cons of generative AI on security. Hint, given the need for automation and scale in security, the pros outweigh the cons.
September 19, 2023
by Tom Smith DZone Core CORE
· 2,205 Views · 1 Like
article thumbnail
Three Ways AI Is Reshaping DevSecOps
Developers can evaluate their organization's security posture with these three AI-driven DevSecOps trends.
September 19, 2023
by Hadi Chami
· 2,828 Views · 1 Like
article thumbnail
DevSecOps: Integrating Security Into Your DevOps Workflow
This extensive guide will delve deep into the principles, benefits, challenges, real-world use cases, and best practices of DevSecOps.
September 19, 2023
by Sanjana Thakur
· 3,652 Views · 3 Likes
article thumbnail
Auditing Spring Boot Using JPA, Hibernate, and Spring Data JPA
This article provides a comprehensive guide to implementing auditing in Spring Boot applications using JPA, Hibernate, and Spring Data JPA.
September 19, 2023
by Andrei Rogalenko
· 29,169 Views · 3 Likes
article thumbnail
Unleashing the Power of On-Premise MFA_ Elevate Active Directory Security
This centralized directory service manages authentication and authorization, making it critical for safeguarding sensitive data and maintaining system integrity.
September 18, 2023
by Asim khatri
· 1,994 Views · 1 Like
article thumbnail
Hardcoded Secret at the Heart of the Dell Compellent VMware Vulnerability
Dell disclosed a Compellent vulnerability affecting VMware users. Let's take a closer look to learn to safeguard your data and prevent coding mishaps safely.
September 18, 2023
by Dwayne McDaniel
· 1,855 Views · 1 Like
  • Previous
  • ...
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: