DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workkloads.

Secure your stack and shape the future! Help dev teams across the globe navigate their software supply chain security challenges.

Releasing software shouldn't be stressful or risky. Learn how to leverage progressive delivery techniques to ensure safer deployments.

Avoid machine learning mistakes and boost model performance! Discover key ML patterns, anti-patterns, data strategies, and more.

The Latest Software Design and Architecture Topics

article thumbnail
Using Microsoft SQL Server With Scala Slick
With the newer version of Slick, more drivers are available within the Slick core package as an open-source release that can also be seen from the changelog.
April 30, 2018
by Sidharth Khattri
· 9,989 Views · 1 Like
article thumbnail
Foxx CLI - Managing Microservices
In this tutorial, you'll learn how to get started with the Foxx framework for managing microservices with the Foxx CLI.
April 26, 2018
by Mark Vollmary
· 4,681 Views · 3 Likes
article thumbnail
Hunting Treasure with Kubernetes ConfigMaps and Secrets
Check out this tutorial that shows you how to build and deploy a simple treasure hunting game using Kubernetes, Docker, and Helm.
April 26, 2018
by Ryan Dawson
· 11,282 Views · 5 Likes
article thumbnail
State in Functions: Cache, Lazy + Memoization, and Counter
Dive into functional program as we consider using state in functions. See what use cases might allow for this compromise in functional ideology.
April 26, 2018
by Nawa Manusitthipol
· 19,603 Views · 17 Likes
article thumbnail
Testing GraphQL Server in Node.js
When we started using GraphQL in our NodeJS project, we struggled with writing tests. So, we made one ourselves. Here, we share our way of testing GraphQL queries.
April 25, 2018
by Nesha Zoric
· 12,622 Views · 3 Likes
article thumbnail
Spring Security 5 OAuth 2.0 Login and Sign Up in Stateless REST Web Services
Providing users a easy and secure way to log in can do wonders for the security of your web service. Read on to see how to implement SSO.
April 25, 2018
by Sanjay Patel DZone Core CORE
· 46,580 Views · 10 Likes
article thumbnail
Build Secure User Authentication in ASP.NET Core With OIDC and OAuth
Authentication is a core component of any high-quality web applications. In this post, we learn how to implement authentication in an ASP.NET Core app.
April 25, 2018
by Lee Brandt
· 29,438 Views · 2 Likes
article thumbnail
Hibernate Show SQL
In this post, I'll share a tip on how to configure Hibernate and Spring Data JPA to log executed SQL statements and used bind parameters.
April 24, 2018
by John Thompson
· 39,879 Views · 4 Likes
article thumbnail
Five Features of Information Security Every Cloud Platform Should Provide
A discussion of the five kinds of security and enterprise security management for cloud platforms that should be included in all cloud offerings.
April 24, 2018
by Doug Paris White
· 7,449 Views · 2 Likes
article thumbnail
JWTs With Spring Boot and Java 9
Interested in using JWTs for your Java 9/Spring Boot projects? Learn how to set up your dependencies and the use cases for you to consider.
April 24, 2018
by Sergio Martin
· 33,975 Views · 24 Likes
article thumbnail
Testing Microservices With JMeter
As microservices gain popularity, it's important to learn about testing. Learn all about testing microservices using JMeter in this thorough tutorial.
April 24, 2018
by Artyom Avetisyan
· 16,107 Views · 5 Likes
article thumbnail
Database Handling in Cucumber and Creating Intuitive Reports
Learn how to work with any databases in Cucumber using Ruby Language and to create HTML, JSON, and XML reports.
April 24, 2018
by Remi Jullian
· 34,314 Views · 5 Likes
article thumbnail
Deploying Spring Cloud Microservices on Hashicorp's Nomad
There's a life outside Kubernetes and Docker Swarm. Here's a tutorial on Nomad from Hashicorp as a simple microservices deployment solution.
April 24, 2018
by Piotr Mińkowski
· 9,282 Views · 7 Likes
article thumbnail
Secure Tomcat Hosting: Restrict Access to Your Web Application
Locking down your web app is unavoidable. We take a look at how to restrict access to your Tomcat-based web app in this post.
April 23, 2018
by Tetiana Fydorenchyk
· 17,796 Views · 12 Likes
article thumbnail
How to Test REST APIs With Windows Authentication With JMeter
If you're trying to test an API that has some authentication in place, it may get a little tricky. Read on to learn how to use JMeter to get around this.
April 23, 2018
by Artyom Avetisyan
· 32,987 Views · 2 Likes
article thumbnail
Stop Using JWTs as Session Tokens
Today I’m here to talk with you about the downsides of using JWTs. Specifically, why it’s a bad idea to use JWTs as session tokens for most people.
April 23, 2018
by Randall Degges
· 58,567 Views · 35 Likes
article thumbnail
JDK 11 and Proxies in a World Past sun.misc.Unsafe
Java 11 is making changes to the Unsafe class. See what's being deprecated and how that's going to affect proxies for future projects.
April 22, 2018
by Rafael Winterhalter
· 35,248 Views · 21 Likes
article thumbnail
Best SecOps Tools: 50 Must-Have Tools for Your SecOps Arsenal, Part 1
Looking for some great new tools to help you better understand where your software is vulnerable and to hunt out viruses? Read on for some great options.
April 21, 2018
by Christian Lappin
· 5,920 Views · 3 Likes
article thumbnail
A Filebeat Tutorial: Getting Started
This article seeks to give those getting started with Filebeat the tools and knowledge to install, configure, and run it to ship data into the other components in the stack.
April 20, 2018
by Daniel Berman
· 39,332 Views · 1 Like
article thumbnail
Adopting Secure SDLC Practice for Agile
The ability to shift security left in the SDLC and bake security into software from the beginning is more important than ever.
April 20, 2018
by Somesh Mohanty
· 5,594 Views · 1 Like
  • Previous
  • ...
  • 534
  • 535
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • 543
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: