DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

The Latest Software Design and Architecture Topics

article thumbnail
Handle Sensitive Data Securely With Skyflow
Learn some benefits of outsourcing your data privacy needs so that you can focus on your company’s core products while still remaining secure and compliant.
Updated April 29, 2022
by Tyler Hawkins DZone Core CORE
· 6,351 Views · 6 Likes
article thumbnail
C# Applications Vulnerability Cheatsheet
The first step to fixing vulnerabilities in your application is to know what to look for. Here are 27 common vulnerabilities that affect C# applications.
April 28, 2022
by Vickie Li
· 19,120 Views · 4 Likes
article thumbnail
The Battle Of New Industry Standards: Is WebRTC Making Zoom Redundant?
With the growing video conferencing market, the clash between WebRTC and Zoom has also intensified. Read more to know who wins the battle!
Updated April 28, 2022
by Jason Wills
· 3,524 Views · 5 Likes
article thumbnail
Spinning Your Workflows With Cadence
Open-source Cadence was developed by Uber and based on the AWS SWF (Simple Workflow Service). It's designed to be highly fault-tolerant and scalable.
April 28, 2022
by Paul Brebner
· 5,698 Views · 4 Likes
article thumbnail
Building Flows in IBM App Connect Using Connectors
Three examples which show how to build flows that integrate with apps.
April 28, 2022
by shahmini a
· 3,629 Views · 3 Likes
article thumbnail
API Test Automation With RestAssured Library and Cucumber BDD Framework
REST (Representational State Transfer) is an architecture that consumes HTTP calls for inter-system communication where a client can access the server resource with a unique URI, and the response of the resource is returned.
April 28, 2022
by Ramit Dhamija
· 6,366 Views · 3 Likes
article thumbnail
Ultra-Fast Microservices in Java: When Microstream Meets Open Liberty
In this article, learn a new database that can make your microservices scale up quickly in the Java world!
April 28, 2022
by Otavio Santana DZone Core CORE
· 9,654 Views · 10 Likes
article thumbnail
How To Integrate Third-Party Login Systems in Your Web App Using OAuth 2.0
In this article, learn the fundamentals of OAuth 2.0 Authorization Code Flow and also how to implement them into an example Node.js/HTML5 web app.
April 27, 2022
by Suyash Joshi
· 8,121 Views · 7 Likes
article thumbnail
Angular + React: Vulnerability Cheatsheet
Learn about the most common vulnerabilities to look out for in Angular and React applications such as template injection, XSSI, authentication bypass, and more.
April 27, 2022
by Vickie Li
· 13,144 Views · 3 Likes
article thumbnail
Data Analysis Using Google Cloud Data Studio
In this tutorial, take an in-depth look at Google Cloud Data Studio, a tool for transforming data into useful reports and data dashboards.
April 27, 2022
by Sameer Shukla DZone Core CORE
· 7,092 Views · 2 Likes
article thumbnail
Software AI Accelerators: AI Performance Boost for Free
What is a “software AI accelerator” and how does it compare to a hardware AI accelerator?
April 26, 2022
by Chryste Sullivan
· 5,184 Views · 2 Likes
article thumbnail
oneAPI – The Cross-Architecture, Multi-Vendor Path to Accelerated Computing
oneAPI is a cross-industry, open, standards-based unified programming model that delivers a common developer experience across processor and accelerator architectures.
April 26, 2022
by Chryste Sullivan
· 2,305 Views · 3 Likes
article thumbnail
Running Spring Boot Application With Embedded Camunda Engine
In this article, see how to set up a Spring Boot application with embedded Camunda engine and Camunda BPM Initializr.
Updated April 26, 2022
by Alok Singh DZone Core CORE
· 49,356 Views · 10 Likes
article thumbnail
How To Rename Files in Linux and macOS Terminal
Let's look at how to rename files on Linux and MacOS.
April 26, 2022
by Johnny Simpson DZone Core CORE
· 3,932 Views · 3 Likes
article thumbnail
Artificial Intelligence in Architecture
This article explores how artificial intelligence is being used in architecture through examples like Rayon, Delve, Finch3D, and NVIDIA’s Omniverse.
April 26, 2022
by Kevin Vu
· 9,433 Views · 3 Likes
article thumbnail
Handle HL7 MLLP Messages With Mule 4
Here, learn more about the HL7 EDI connector by MuleSoft that can be used to perform integrations with existing platforms in healthcare.
April 26, 2022
by Sadik Ali DZone Core CORE
· 5,970 Views · 4 Likes
article thumbnail
Hacking and Securing Python Applications
The first step to fixing vulnerabilities is to know what to look for. Here are 27 of the most common ones that affect Python apps and how you can find and prevent them.
April 25, 2022
by Vickie Li
· 7,301 Views · 3 Likes
article thumbnail
GraphQL: A Deep Dive Into Benefits, Use Cases, and Strategies
In this deep dive into GraphQL, learn more about this tool that brings a paradigm shift in the way clients and servers interact.
April 25, 2022
by Saurabh Dashora DZone Core CORE
· 10,906 Views · 5 Likes
article thumbnail
Choosing Between REST and GraphQL
In this article, dive deep into the strengths and weaknesses of both REST and GraphQL so you can decide which API architecture is best for your next project.
April 25, 2022
by Anthony Gore DZone Core CORE
· 6,380 Views · 7 Likes
article thumbnail
6 Tips For Securing IoT Devices
With more devices entering our homes and workplaces, implementing and updating security measures should be a top priority for the coming years in IoT.
April 25, 2022
by Carsten Rhod Gregersen
· 10,366 Views · 4 Likes
  • Previous
  • ...
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: