DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Curious about the future of data-driven systems? Join our Data Engineering roundtable and learn how to build scalable data platforms.

Data Engineering: The industry has come a long way from organizing unstructured data to adopting today's modern data pipelines. See how.

Threat Detection: Learn core practices for managing security risks and vulnerabilities in your organization — don't regret those threats!

Managing API integrations: Assess your use case and needs — plus learn patterns for the design, build, and maintenance of your integrations.

The Latest Software Design and Architecture Topics

article thumbnail
How to Scale RAG and Build More Accurate LLMs
Retrieval augmented generation (RAG) needs the right data architecture to scale efficiently. Learn how data streaming helps data and application teams innovate.
August 8, 2024
by Andrew Sellers
· 2,908 Views · 2 Likes
article thumbnail
Leveraging Snowflake’s AI/ML Capabilities for Anomaly Detection
Explore the AI/ML capabilities of Snowflake, focusing on leveraging the SNOWFLAKE.ML.ANOMALY_DETECTION function to detect anomalies in superstore sales.
August 8, 2024
by Kapil Kumar Sharma
· 3,902 Views · 1 Like
article thumbnail
10 Kubernetes Cost Optimization Techniques
In this article, learn 10 ways to drive down Kubernetes costs, whether you are adopting a new architecture or optimizing an existing environment.
August 7, 2024
by Andromeda Booth
· 8,473 Views · 5 Likes
article thumbnail
Docker vs. Podman: Exploring Container Technologies for Modern Web Development
Explore a comparison between Docker and Podman for enhanced efficiency and security in software development.
August 7, 2024
by Nitesh Upadhyaya DZone Core CORE
· 9,277 Views · 5 Likes
article thumbnail
How to Check and Update Newer Versions for Dependencies in Maven Projects
This tutorial demonstrates how to use different Maven commands for checking and updating the dependency and plugin versions in Maven projects.
August 7, 2024
by Faisal Khatri
· 6,118 Views · 3 Likes
article thumbnail
How You Can Avoid a CrowdStrike Fiasco
Deconstruct the architectural shortcomings that could have prevented the worldwide Crowdstrike IT meltdown from being so disastrous.
August 7, 2024
by David G. Simmons DZone Core CORE
· 4,819 Views · 2 Likes
article thumbnail
Introduction to Salesforce Batch Apex [Video]
Explore core concepts and practical applications of Batch Apex in Salesforce, including the structure, how to write unit tests, scheduling, and more.
August 7, 2024
by Dino Scarcella
· 3,460 Views · 1 Like
article thumbnail
How to Create and Run A Job In Jenkins Using Jenkins Freestyle Project
Learn how to create a job in Jenkins, build jobs, and pipeline projects. Explore the Jenkins Freestyle Project, and combine any SCM with any build system.
August 7, 2024
by Piyusha Podutwar
· 6,000 Views · 1 Like
article thumbnail
extended Berkeley Packet Filter (eBPF) for Cloud Computing
Explore eBPF, a technology that executes codes in the Linux kernel and is necessary for K8s network observability/monitoring, auditing, and traffic routing.
August 7, 2024
by Gaurav Shekhar
· 7,272 Views · 3 Likes
article thumbnail
JMeter Plugin HTTP Simple Table Server (STS) In-Depth
Take an in-depth look to discover some of the possibilities of using the HTTP Simple Table Server a JMeter Plugin in this short manual.
August 6, 2024
by Vincent DABURON
· 3,723 Views · 3 Likes
article thumbnail
Why You Should Use Buildpacks Over Docker
Learn why you should consider using Buildpacks to improve your container workflow, from automated dependency management to enhanced security and optimization.
August 6, 2024
by Sylvain Kalache
· 11,866 Views · 5 Likes
article thumbnail
Not All MFA Is Equal: Lessons From MFA Bypass Attacks
Simply having MFA isn't enough if it can be bypassed. Here are some tips to move to phishing-resistant MFA without adding undue user friction.
August 6, 2024
by Meir Wahnon
· 4,450 Views · 2 Likes
article thumbnail
Harnessing DevOps Potential: Why Backup Is a Missing Piece
DevOps has to handle a number of responsibilities but shouldn't forget about appropriate security measures to take to secure their source code.
August 6, 2024
by Daria Kulikova
· 6,503 Views · 4 Likes
article thumbnail
Go Serverless: Unleash Next-Gen Computing
Learn how serverless architecture, with its event-driven architecture, auto-scaling ability, and security walls, frees devs from infrastructure management woes.
August 5, 2024
by Aditya Kumar
· 5,617 Views · 3 Likes
article thumbnail
Scaling Prometheus With Thanos
Learn how to scale Prometheus using Thanos for long-term storage, global view metrics, and improved performance in large-scale Kubernetes environments.
August 5, 2024
by Ritesh Sonawane
· 3,171 Views · 5 Likes
article thumbnail
Reimagining AI: Ensuring Trust, Security, and Ethical Use
How can we trust AI in our daily lives? Explore the balance between innovation and safety in the age of intelligent systems.
August 5, 2024
by Saigurudatta Pamulaparthyvenkata
· 3,469 Views · 2 Likes
article thumbnail
How to Setup OAuth JWT in the Salesforce Connector
Learn the steps required to connect a Mule application to Salesforce using the Salesforce connector with the OAuth JWT flow.
August 5, 2024
by GONZALO MARCOS
· 2,346 Views · 1 Like
article thumbnail
Free Tier API With Apache APISIX
A free tier is a must for any API service provider worth its salt. In this post learn how to configure such a free tier with Apache APISIX.
August 5, 2024
by Nicolas Fränkel DZone Core CORE
· 1,748 Views · 1 Like
article thumbnail
Harnessing the Power of AWS Aurora for Scalable and Reliable Databases
Delve into the benefits of AWS Aurora and explore a real-life example of how it is used in an online social media platform.
August 5, 2024
by Vijay Panwar DZone Core CORE
· 2,388 Views · 3 Likes
article thumbnail
Overview of Classical Time Series Analysis: Techniques, Applications, and Models
Explore what makes time series analysis unique and the specialized techniques and models needed to understand and predict future patterns or trends.
August 5, 2024
by Salman Khan
· 52,154 Views · 30 Likes
  • Previous
  • ...
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: