DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

The Latest Software Design and Architecture Topics

article thumbnail
How to Automatically Detect Multiple Cybersecurity Threats from an Input Text String in Java
Explore the prevalence of cyberattacks that exploit user-facing text input fields in web applications and learn about an API solution to help prevent them.
August 14, 2023
by Brian O'Neill DZone Core CORE
· 5,219 Views · 2 Likes
article thumbnail
A Comprehensive Guide to Securing ESXi Hosts: Safeguarding Virtual Infrastructure
This article will explore the various techniques and best practices for securing ESXi hosts and mitigating potential vulnerabilities.
August 14, 2023
by Aditya Bhuyan
· 2,889 Views · 2 Likes
article thumbnail
RSA Conference 2023: DevSecOps and the Future of Security
The RSA Conference in San Francisco drew 40,000 participants over four extremely busy days. Read just a few of the highlights from this legendary security event.
August 14, 2023
by Dwayne McDaniel
· 2,331 Views · 1 Like
article thumbnail
IIoT Explained: Examples, Technologies, Benefits, and Challenges
IIoT is a key component of Industry 4.0, the fourth industrial revolution, characterized by the fusion of digital, physical, and biological technologies.
August 12, 2023
by Li Guowei
· 4,229 Views · 2 Likes
article thumbnail
Decoupling Storage and Compute: Have We Gone Too Far?
The latest innovations in the data engineering industry revolve around how different data platforms are coupling or decoupling storage and compute. Is it too much?
August 12, 2023
by Shane Murray
· 4,668 Views · 5 Likes
article thumbnail
How to Implement Deception Technology
Deception technology is a cybersecurity tactic that sets traps for intruders with fabricated versions of valuable assets. Here are the best practices for implementation.
August 12, 2023
by Zac Amos
· 4,027 Views · 1 Like
article thumbnail
10 Benefits of Cloud Computing for SMBs
Discover 10 compelling benefits and learn about challenges and critical factors in selecting the right cloud provider for a successful transition.
August 12, 2023
by Hiren Dhaduk
· 5,024 Views · 2 Likes
article thumbnail
Building Cyber Resilience in an Age of Growing Threats
What we can learn from Ukraine's cyber defenders about building a more resilient future — the ability to prepare for, respond to, recover, and learn from disruption.
August 12, 2023
by Tom Smith DZone Core CORE
· 4,226 Views · 1 Like
article thumbnail
How DNS Checking Helps Developers
Discover how DNS checking benefits developers. Improve website speed, minimize downtime, and enhance security. Tools, techniques, and future advancements explored.
August 11, 2023
by H B
· 3,957 Views · 2 Likes
article thumbnail
How To Use Docker Volume To Build Angular Application With Jenkins Pipeline
In this article, explore how to use Docker Volume to build an Angular application using a Jenkins pipeline, with examples.
August 11, 2023
by Unmesh Vinchurkar
· 7,742 Views · 2 Likes
article thumbnail
Deploying Python and Java Applications to Kubernetes With Korifi
Tutorial covering the installation and configuration of Cloud Foundry Korifi to push a Java and Python application to Kubernetes with a single command.
August 11, 2023
by Sylvain Kalache
· 8,228 Views · 6 Likes
article thumbnail
Smart BDD vs. Cucumber Using Java and JUnit5
Smart BDD vs. Cucumber using Java and JUnit5. Smart BDD promotes best practices with less code, complexity, higher-quality tests, and increased productivity.
August 11, 2023
by James Bayliss
· 11,084 Views · 6 Likes
article thumbnail
Six Considerations When Building High-Performance Java Microservices With EDA
In this article, we will outline the six key considerations and tactics for building high-performance Java microservices using event-driven architecture.
August 11, 2023
by Rob Austin DZone Core CORE
· 6,331 Views · 5 Likes
article thumbnail
Can Redis Be Used as a Relational Database?
Explore how easy it is to work with Redis in Java + Spring, and find five differences from a relational database.
August 11, 2023
by Artem Artemev
· 12,912 Views · 14 Likes
article thumbnail
Getting Started With Postgres: Three Free and Easy Ways
In this article, explore three practical, user-friendly, and absolutely free ways to kickstart your PostgreSQL journey.
August 11, 2023
by Denis Magda DZone Core CORE
· 7,659 Views · 7 Likes
article thumbnail
What Are Microservices and the Event Aggregator Pattern?
Learn about the Event Aggregator pattern for organizing event communication in a microservices architecture with an example.
Updated August 11, 2023
by Boris Zaikin DZone Core CORE
· 17,005 Views · 4 Likes
article thumbnail
The EVM Compatibility Chronicles Part II
The second part of this series explains the significance of EVM compatibility for L1 chains like Humanode. We will include chunks from MOZGIII, the Tech Lead at Humanode.
August 10, 2023
by Shahmeer Khan
· 2,429 Views · 1 Like
article thumbnail
One-Click Deploying EMQX MQTT Broker on GCP Using Terraform
This blog will provide a step-by-step guide on how to set up a GCP project, create a service account, and write a Terraform configuration file to deploy EMQX MQTT Broker.
August 10, 2023
by Weihong Zhang
· 3,881 Views · 1 Like
article thumbnail
How To Send Discord Embeds Without Bots and Rules Template
Wouldn't you like your Discord server to stand out from the crowd? Read the tutorial all the way through to learn how to create the most beautiful Discord server.
August 10, 2023
by Ankur Ranpariya
· 2,993 Views · 1 Like
article thumbnail
Growth and Demand for Low Code Development
Explore more about low code development-driven tech growth, enabling rapid, cost-effective solutions for competitive advantage in the digital era.
August 10, 2023
by Ruby Santos
· 3,311 Views · 1 Like
  • Previous
  • ...
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: