Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Software Design and Architecture Topics
Deploying Highly Scalable Cloud Storage With Rook Part 1 (Ceph Storage)
As Kubernetes matures, supplementary tools begin to mature as well. One of the areas we have seen growth in is in cloud-native storage solutions.
Updated July 27, 2020
by
Sudip Sengupta
CORE
·
4,389 Views
·
3 Likes
Everything You Need to Know About Buildah
Use Buildah to package a web application as a container, starting from an existing image, and then run your application with Podman and Docker.
Updated July 27, 2020
by
Sudip Sengupta
CORE
·
13,490 Views
·
4 Likes
Deploying Secure Firecracker MicroVMs on K8s using Weave FireKube
Take a look at how to uses Weave FireKube to run containers with highter security measures at greater speed.
July 27, 2020
by
Sudip Sengupta
CORE
·
5,318 Views
·
2 Likes
How to Develop Your Python Docker Applications Faster
Tutorial and example for developing Python applications faster on Docker using host volumes and runserver
July 27, 2020
by
Ethan J Jackson
·
4,757 Views
·
3 Likes
Deploying Artemis Broker With SSL Enabled and Use AMQP
Learn how to deploy the Red Hat AMQ Broker on openshift 4.x. The external client can connect to produce/consume messages using AMQP.
July 27, 2020
by
Ramu kakarla
·
13,493 Views
·
1 Like
Mapping JSON to and from a C++ Structure
Full tutorial on how to map JSON to and from a C++ structure—including installation, usage, and exceptions.
July 24, 2020
by
bk192077 bk192077
·
42,798 Views
·
6 Likes
Example Architectures for Data-Intensive Applications
Taking architectural examples from the book Designing Data-Intensive Applications, this article looks at how adding Couchbase simplifies architecture.
July 24, 2020
by
Keshav Murthy
CORE
·
9,000 Views
·
7 Likes
Build Reactive REST APIs With Spring WebFlux
See how to Build Reactive REST APIs with Spring WebFlux. This explains the advantages we get with Reactive APIs and the reactive specification.
Updated July 24, 2020
by
Siva Prasad Rao Janapati
·
79,842 Views
·
20 Likes
How to Choose Monitoring Tools for DevOps and SRE
Deciding what and how to monitor is an important decision. We’ll walk you through the basics in this blog post.
July 23, 2020
by
Hannah Culver
·
19,496 Views
·
3 Likes
How We Cut Our Docker Push Time by 90%
What happens when you do a docker push and how we used this to build our pre-push feature and decrease image push times by 90%.
July 23, 2020
by
Ethan J Jackson
·
21,472 Views
·
3 Likes
Regular Expressions: A Quick Intro for Security Professionals
RegEx is a powerful tool for creating string-based search queries based on a combination of constants and operators. Check out this introduction here.
July 23, 2020
by
Vickie Li
·
10,102 Views
·
3 Likes
Understanding Jakarta EE 8 - CDI Part 1
This article covers some of the features of CDI such as type safe annotations configuration, alternatives and more.
Updated July 23, 2020
by
BUHAKE SINDI
CORE
·
16,560 Views
·
13 Likes
A Deep Dive Into the Transformer Architecture – The Development of Transformer Models
In this article, take a look at the development of transformer models.
July 23, 2020
by
Kevin Hooke
·
8,300 Views
·
4 Likes
Setting up Kafka Cluster With Gluster-Block Storage
Red Hat AMQ Streams is a massively-scalable, distributed, and high-performance data streaming platform based on the Apache ZooKeeper and Apache Kafka.
July 22, 2020
by
Ramu kakarla
·
6,812 Views
·
4 Likes
Install and Setup Docker Using Ansible on Ubuntu 18.04 (Part 2)
Take a look at this step by step tutorial that demonstrates how to set up Docker with Ansible and Ubuntu.
July 22, 2020
by
Sudip Sengupta
CORE
·
15,828 Views
·
5 Likes
How to Use Vault and Spring Cloud Config to Secure Secrets
Check out how you can use Spring Boot Config to encrypt secrets and use Vault as a secret management tool.
July 22, 2020
by
Jimena Garbarino
·
7,644 Views
·
1 Like
Spring Boot REST Template URI Encoding
Use Spring's Rest Template to consume encoded endpoints compared to hard coded endpoints. Hard coded endpoints are prone to ResourceAccessExceptions.
Updated July 22, 2020
by
Siva Prasad Rao Janapati
·
50,013 Views
·
4 Likes
Using MuleSoft as OAuth Provider - Mule4 | OAuth2
In this tutorial, we are demonstrating a step by step guide on how to implement OAuth in MuleSoft API provided by MuleSoft itself as an OAuth Implementation Provider.
July 22, 2020
by
Imran Aziz
CORE
·
8,205 Views
·
1 Like
Security Best Practices for REST APIs
In the modern era, REST APIs become an integral part of the applications. Check out some of the best practices for securing APIs.
July 21, 2020
by
Anji K
·
13,469 Views
·
2 Likes
Stay Safe on GitHub: Security Practices to Follow
Here are eight security practices that GitHub users can follow to stay safe and protect their code! Read on!
Updated July 21, 2020
by
Dickson Mwendia
·
10,023 Views
·
3 Likes
Previous
...
393
394
395
396
397
398
399
400
401
402
...
Next