DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Because the DevOps movement has redefined engineering responsibilities, SREs now have to become stewards of observability strategy.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

The Latest Software Design and Architecture Topics

article thumbnail
Spring Boot REST Template URI Encoding
Use Spring's Rest Template to consume encoded endpoints compared to hard coded endpoints. Hard coded endpoints are prone to ResourceAccessExceptions.
Updated July 22, 2020
by Siva Prasad Rao Janapati
· 50,615 Views · 4 Likes
article thumbnail
Using MuleSoft as OAuth Provider - Mule4 | OAuth2
In this tutorial, we are demonstrating a step by step guide on how to implement OAuth in MuleSoft API provided by MuleSoft itself as an OAuth Implementation Provider.
July 22, 2020
by Imran Aziz DZone Core CORE
· 8,412 Views · 1 Like
article thumbnail
Security Best Practices for REST APIs
In the modern era, REST APIs become an integral part of the applications. Check out some of the best practices for securing APIs.
July 21, 2020
by Anji K
· 13,564 Views · 2 Likes
article thumbnail
Stay Safe on GitHub: Security Practices to Follow
Here are eight security practices that GitHub users can follow to stay safe and protect their code! Read on!
Updated July 21, 2020
by Dickson Mwendia
· 10,103 Views · 3 Likes
article thumbnail
Monolithic Decomposition and Implementing Microservices Architecture
The decomposition of an application into microservices plays a key role in microservices architecture implementation, deployment, and CI/CD.
July 21, 2020
by Chandani Patel Bhagat
· 16,269 Views · 31 Likes
article thumbnail
Deploy Your C++ Lambda with Docker
In this article we will explore how you can use your C++ runtime with Lambda Functions.
July 21, 2020
by Sudip Sengupta DZone Core CORE
· 6,765 Views · 2 Likes
article thumbnail
Jakarta Security and REST on Cloud: Part 4 Combining JWT With OAuth2
OAuth2 is undoubtedly one of the most famous security protocols today. This post will talk a little about how to integrate OAuth2 with JWTs.
July 21, 2020
by Otavio Santana DZone Core CORE
· 7,078 Views · 4 Likes
article thumbnail
Advanced Process Integration Tips - Quarkus Applications
The common way to integrate with your process engine is through the use of the Kie Server REST API. In this article we'll explore how...
July 21, 2020
by Karina Varela
· 7,456 Views · 3 Likes
article thumbnail
API Streaming Response with Oracle and Java
Using Java to get the data in a streamed manner from an Oracle database. This helps in early first record processing when the dataset is huge.
July 21, 2020
by Setu Patani
· 7,784 Views · 3 Likes
article thumbnail
Apache Kafka and Blockchain: Friends, Enemies, or Frenemies?
Use cases and architectures for Event Streaming, Apache Kafka, Distributed Ledger (DLT) and Blockchain. Comparison: Kafka-native vs Hyperledger vs Ethereum.
July 20, 2020
by Kai Wähner DZone Core CORE
· 8,228 Views · 4 Likes
article thumbnail
A Guide to Agile Testing for Better Software Quality
Agile tests ensure products meet technical and functional needs. In this post, let's explore the A-Z of Agile Testing and how it helps deliver quality software.
July 20, 2020
by Anuradha Kapoor
· 8,689 Views · 4 Likes
article thumbnail
Hybrid Integration — Ground-to-Cloud Patterns We're Seeing in the Wild
Two patterns for hybrid integration platform ground-to-cloud scenarios for enterprise IT and SI partners.
July 20, 2020
by Brian Busch
· 7,845 Views · 4 Likes
article thumbnail
Attribute Based Access Control for Mulesoft APIs
Let’s explore how ABAC could be implemented effectively for Mulesoft API gateway through a custom policy.
Updated July 20, 2020
by Charlie Liang DZone Core CORE
· 9,195 Views · 1 Like
article thumbnail
Code Play #1: WebSockets With Vert.x and Angular
In the first article in the Code Play Series, we take a look at using websockets to create a real time, multiuser canvas.
July 20, 2020
by Dale Waterworth
· 6,460 Views · 1 Like
article thumbnail
Dynamically Evaluate Dataweave Scripts
This article demonstrates how to use Dynamic Evaluate Component in Mule 4 to execute dataweave scripts dynamically.
Updated July 20, 2020
by Vikalp Bhalia DZone Core CORE
· 13,004 Views · 3 Likes
article thumbnail
How to Manage Environment Variables
We talk with DevOps Engineer Antione Rougeot about the challenges of managing environment variables and he shares best practices from his experience.
Updated July 20, 2020
by Domile Janenaite
· 10,996 Views · 4 Likes
article thumbnail
Top 10 API Security Threats Every API Team Should Know
Learn what are the most important API security threats engineering leaders should be aware of and steps you can take to prevent them.
July 20, 2020
by Derric Gilling DZone Core CORE
· 32,835 Views · 15 Likes
article thumbnail
Managed Scheduled Executor Service vs EJB Timer
Debating between Managed Scheduled Executor Service and EJB Timer to implement scheduled tasks in your application? Check out this post for some tips.
July 17, 2020
by Ralph Soika
· 8,997 Views · 1 Like
article thumbnail
Ultimate Guide for Using Redux With React Native
In this article we are going to learn how to use Redux with React Hooks by building a real React Native app.
July 17, 2020
by krissanawatt kaewsanmunag
· 13,539 Views · 3 Likes
article thumbnail
Java High Availability With WildFly on Kubernetes
if you need session replication, Wildfly instances need to be clustered. To solve this, you can use the Kubernetes discovery protocol for JGroups: KUBE_PING.
July 17, 2020
by Mauricio Magnani
· 10,408 Views · 4 Likes
  • Previous
  • ...
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: