DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Because the DevOps movement has redefined engineering responsibilities, SREs now have to become stewards of observability strategy.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

The Latest Software Design and Architecture Topics

article thumbnail
EC2 Instances With SSH, WinSCP, and PuTTY [Videos]
See a series of video tutorials that go over how to create an EC2 instance on AWS as well as how to connect EC2 instances with SSH, WinSCP, and PuTTY.
December 20, 2022
by Ram N
· 7,351 Views · 4 Likes
article thumbnail
How To Use HashiCorp Tools To Create a Secured Edge Infrastructure
This article is the missing step-by-step tutorial needed to glue all the pieces of Consul, Nomad, and Vault together.
December 19, 2022
by Daniele Santoro
· 7,103 Views · 2 Likes
article thumbnail
Secure Smart Contract Tools: An End-to-End Developer’s Guide
Writing secure smart contracts is hard. In this article, I'll walk through 22 security tools from across web3 to help make your next smart contract even more secure.
December 19, 2022
by Michael Bogan DZone Core CORE
· 3,356 Views · 1 Like
article thumbnail
A Brief Introduction to SBOM and How to Use It With CI
Learn more about SBOM (Software Bills of Materials), why you should use it, what the standards are, and how to automate it with Continuous Integration.
December 19, 2022
by Tiexin Guo
· 6,257 Views · 1 Like
article thumbnail
Architecture and Code Design, Pt. 2: Polyglot Persistence Insights To Use Today and in the Upcoming Years
We take into consideration the need to leverage a great number of storage options currently for persisting and managing data in Java applications.
Updated December 19, 2022
by Otavio Santana DZone Core CORE
· 7,713 Views · 6 Likes
article thumbnail
Event-Driven Fractals
Functional programming can help making beautiful programs. It can feel familiar to everyday programming concepts, and there's no need to use unknown jargon.
December 19, 2022
by Hossein Naderi
· 4,304 Views · 1 Like
article thumbnail
Build Test Scripts for Your IoT Platform
Use JMeter to build test scripts for complex test scenarios in your IoT environment.
December 19, 2022
by Chongyuan Yin
· 3,872 Views · 1 Like
article thumbnail
How to Build an Android Image Feed Application
By the end of this tutorial, you will have built your own social app capable of algorithmically ranking image posts in an aggregated feed from your community.
December 19, 2022
by Trust Ratch
· 5,565 Views · 3 Likes
article thumbnail
Surviving the Incident
Effective incident response (IR) playbooks are the best antidote to unpredictable attacks. Learn how to build a tailored guide for handling security incidents.
December 19, 2022
by Roderick Chambers
· 5,781 Views · 1 Like
article thumbnail
Building a Secure Mobile App in the Cloud
This guide on secure mobile applications shows top security vulnerabilities, OWASP's best practices for building/testing iOS and Android applications, and more.
December 19, 2022
by Boris Zaikin DZone Core CORE
· 7,206 Views · 3 Likes
article thumbnail
Build Your First App with JavaScript, Node.js, and DataStax Astra DB
Designed to help developers understand technologies like Node.js, GraphQL, React, Netlify, and JavaScript to kickstart their app development portfolio.
December 18, 2022
by Cedrick Lunven
· 6,759 Views · 1 Like
article thumbnail
Improve Microservices Security by Applying Zero-Trust Principles
Discover how the zero-trust principles can be applied in a microservices environment and what security controls should be implemented on the back end.
December 18, 2022
by Apostolos Giannakidis DZone Core CORE
· 9,657 Views · 8 Likes
article thumbnail
Gumbo Podcast: Your First Steps in Cloud-Native Observability
Follow along with a discussion regarding cloud-native observability in this overview of a recent Data Protection Gumbo podcast.
December 17, 2022
by Eric D. Schabell DZone Core CORE
· 3,174 Views · 3 Likes
article thumbnail
Get Started On Celo With Infura RPC Endpoints
Learn about the Celo layer-one blockchain network and how to start building on it using Infura RPC endpoints.
December 17, 2022
by Paul McAviney DZone Core CORE
· 5,862 Views · 2 Likes
article thumbnail
Software Supply Chain Security Checklist
Software security is a critical part of any product. Follow this checklist to discover five keys to keeping software secure from creation to delivery.
December 17, 2022
by Justin Albano DZone Core CORE
· 4,405 Views · 1 Like
article thumbnail
AWS Application Composer
AWS Application Composer service allows one to quickly design and deploy a serverless application by dragging and dropping to a canvas.
December 16, 2022
by Amar Deep Singh DZone Core CORE
· 5,377 Views · 3 Likes
article thumbnail
ELI5: How Does a TPM Work?
A TPM is a special chip that keeps all your secrets safe on your phone or computer. But what is going on in there?
December 16, 2022
by Nick Hodges DZone Core CORE
· 3,016 Views · 1 Like
article thumbnail
Kubernetes Remote Development in Java Using Kubernetes Maven Plugin
Learn how to effectively develop and debug java applications in Kubernetes cluster using Eclipse JKube's remote development functionality.
December 16, 2022
by Rohan Kumar
· 5,419 Views · 5 Likes
article thumbnail
Complex Navigation in SwiftUI
Explaining the problems experienced when creating complex Navigation in SwiftUI.
December 16, 2022
by Bruno Basas
· 4,563 Views · 2 Likes
article thumbnail
WordPress Core — Unauthenticated Blind SSRF
In this blog post, Sonar's R and D team describes a surprisingly simple vulnerability in WordPress’s implementation of pingbacks.
Updated December 16, 2022
by Thomas Chauchefoin
· 7,586 Views · 2 Likes
  • Previous
  • ...
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: