DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Because the DevOps movement has redefined engineering responsibilities, SREs now have to become stewards of observability strategy.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

The Latest Software Design and Architecture Topics

article thumbnail
How to Set Up Redis Properties Programmatically
Discussing an example of Redis configuration based on KeyspaceSettings for Spring application. Pros in comparison to other options for configuring Redis.
February 27, 2025
by Alexander Rumyantsev
· 2,840 Views · 1 Like
article thumbnail
STRIDE: A Guide to Threat Modeling and Secure Implementation
Cloud monitoring is a gold mine for attackers. This guide breaks down STRIDE threat modeling for cloud data ingestion, processing, and storage.
February 27, 2025
by Aditya Gupta
· 3,921 Views · 6 Likes
article thumbnail
Micronaut vs Spring Boot: A Detailed Comparison
Micronaut is efficient, lightweight, and fast, making it a strong alternative, but Spring Boot remains dominant due to its robust, mature ecosystem and community support.
February 27, 2025
by Sulakshana Singh
· 12,523 Views · 5 Likes
article thumbnail
The Outbox Pattern: Reliable Messaging in Distributed Systems
The Outbox Pattern is a design pattern used in distributed systems to ensure reliable messaging across different services.
February 27, 2025
by Narendra Lakshmana gowda
· 4,277 Views · 5 Likes
article thumbnail
Efficient Multimodal Data Processing: A Technical Deep Dive
Efficient multimodal data processing using GPU-accelerated pipelines, neural networks, and hybrid storage for scalable, low-latency AI-driven applications.
February 27, 2025
by Praneeth Reddy Vatti
· 4,716 Views · 4 Likes
article thumbnail
Cloud-Driven Analytics Solution Strategy in Healthcare
Detailed insights into compute resource management, cluster optimization, storage efficiency, and cost governance in cloud-based environments.
February 27, 2025
by Abrar Ahmed Syed
· 3,920 Views · 5 Likes
article thumbnail
Networking in DevOps: Your Beginner Guide
In this article, we'll cover some of the basics of DevOps networking: why it is so crucial and how you can use it to smooth out your processes.
February 27, 2025
by Rocky Sah
· 4,792 Views · 4 Likes
article thumbnail
Identity and Access Management Solution to Safeguard LLMs
One of the essential security measures to address LLM security involves securing access to the LLMs so that only authorized individuals can access data.
February 26, 2025
by Anant Wairagade
· 4,164 Views · 6 Likes
article thumbnail
How to Scale Elasticsearch to Solve Your Scalability Issues
Scaling Elasticsearch requires balancing sharding, query performance, and memory tuning for optimal efficiency in high-traffic, real-time applications.
February 26, 2025
by Vivek Kumar
· 5,777 Views · 3 Likes
article thumbnail
AI-Powered Professor Rating Assistant With RAG and Pinecone
Build a Rate-Professor AI assistant with OpenAI, Pinecone, and Next.js, with real-time chat and context-aware responses. Deploy easily on Vercel or Netlify.
February 26, 2025
by Vaibhavi Tiwari
· 4,372 Views · 3 Likes
article thumbnail
A Platform-Agnostic Approach in Cloud Security
Learn a platform-agnostic approach to cloud security, focusing on encryption, zero-trust models, and tools to enhance security across multi-cloud environments.
February 26, 2025
by Natapong Sornprom
· 3,405 Views · 2 Likes
article thumbnail
10 Best Practices for Managing Kubernetes at Scale
We will discuss some of the best practices for managing distributed workloads on Kubernetes clusters to simplify deploying and managing containers.
February 26, 2025
by Srinivas Chippagiri DZone Core CORE
· 5,563 Views · 5 Likes
article thumbnail
PostgreSQL 12 End of Life: What to Know and How to Prepare
It covers Amazon RDS Extended Support, upgrade options, and the benefits of migrating to PostgreSQL 16, emphasizing the importance of timely upgrades.
February 26, 2025
by Vivek Singh
· 4,203 Views · 1 Like
article thumbnail
A Step-by-Step Guide to Write a System Design Document
A structured approach to system design includes defining the problem, scope, tenets, risks, assumptions, and architecture choices.
February 26, 2025
by Nikunj Agarwal
· 8,632 Views · 4 Likes
article thumbnail
AI-Powered Ransomware Attacks
This article examines AI's impact on cybersecurity and its role in boosting security measures and ransomware threats with multi-layered defense strategies.
February 26, 2025
by Anirudh Khanna
· 4,026 Views · 2 Likes
article thumbnail
Non-Human Identity Security in the Age of AI
The rise of AI in enterprises has expanded the attack surface. Learn how you can secure non-human identities and prevent unauthorized access.
February 25, 2025
by Dwayne McDaniel
· 3,258 Views · 3 Likes
article thumbnail
How Generative AI Is Revolutionizing Cloud Operations
Generative AI is transforming how tech companies approach cloud reliability and operations. In this article, we explore the most compelling applications.
February 25, 2025
by Aditya Visweswaran
· 2,525 Views
article thumbnail
Spark Job Optimization
Spark jobs can be optimized to maximize resource utilization in a cluster, improving performance and reducing costs for large-scale data processing.
February 25, 2025
by Chandra Shekar r Chekuri
· 2,691 Views · 1 Like
article thumbnail
Protecting Critical Infrastructure From Ransomware
The article emphasizes enhancing critical infrastructure resilience against ransomware through comprehensive cybersecurity measures and collaborative strategies.
February 25, 2025
by Anirudh Khanna
· 3,299 Views · 2 Likes
article thumbnail
The Hidden Cost of Dirty Data in AI Development
Dirty data weakens AI, increases costs, introduces bias, and causes compliance risks. Strong data governance ensures reliable AI outcomes.
February 25, 2025
by Ilya Dudkin DZone Core CORE
· 3,051 Views · 2 Likes
  • Previous
  • ...
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: