DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

The Latest Software Design and Architecture Topics

article thumbnail
Apache Flink 101: A Guide for Developers
Learn more about Apache Flink, a powerful stream processing tool, for building streaming data pipelines, real-time analytics, and event-driven applications.
August 8, 2024
by David Anderson
· 8,745 Views · 2 Likes
article thumbnail
How to Create a CRUD Application in Less Than 15 Minutes
This step-by-step guide explores how to create a front end for your database with Java only, without any JavaScript knowledge needed.
August 8, 2024
by Amir Shelli
· 17,611 Views · 8 Likes
article thumbnail
Running PyTorch on GPUs
This summary of steps to run the PyTorch framework or any AI workload on GPUs highlights the importance of the hardware, driver, software, and frameworks.
August 8, 2024
by Jagadish Krishnamoorthy
· 7,217 Views · 2 Likes
article thumbnail
How to Scale RAG and Build More Accurate LLMs
Retrieval augmented generation (RAG) needs the right data architecture to scale efficiently. Learn how data streaming helps data and application teams innovate.
August 8, 2024
by Andrew Sellers
· 3,271 Views · 2 Likes
article thumbnail
Leveraging Snowflake’s AI/ML Capabilities for Anomaly Detection
Explore the AI/ML capabilities of Snowflake, focusing on leveraging the SNOWFLAKE.ML.ANOMALY_DETECTION function to detect anomalies in superstore sales.
August 8, 2024
by Kapil Kumar Sharma
· 4,690 Views · 1 Like
article thumbnail
10 Kubernetes Cost Optimization Techniques
In this article, learn 10 ways to drive down Kubernetes costs, whether you are adopting a new architecture or optimizing an existing environment.
August 7, 2024
by Andromeda Booth
· 9,197 Views · 5 Likes
article thumbnail
Docker vs. Podman: Exploring Container Technologies for Modern Web Development
Explore a comparison between Docker and Podman for enhanced efficiency and security in software development.
August 7, 2024
by Nitesh Upadhyaya DZone Core CORE
· 10,013 Views · 5 Likes
article thumbnail
How to Check and Update Newer Versions for Dependencies in Maven Projects
This tutorial demonstrates how to use different Maven commands for checking and updating the dependency and plugin versions in Maven projects.
August 7, 2024
by Faisal Khatri DZone Core CORE
· 10,480 Views · 4 Likes
article thumbnail
How You Can Avoid a CrowdStrike Fiasco
Deconstruct the architectural shortcomings that could have prevented the worldwide Crowdstrike IT meltdown from being so disastrous.
August 7, 2024
by David G. Simmons DZone Core CORE
· 5,556 Views · 4 Likes
article thumbnail
Introduction to Salesforce Batch Apex [Video]
Explore core concepts and practical applications of Batch Apex in Salesforce, including the structure, how to write unit tests, scheduling, and more.
August 7, 2024
by Dino Scarcella
· 3,994 Views · 1 Like
article thumbnail
How to Create and Run A Job In Jenkins Using Jenkins Freestyle Project
Learn how to create a job in Jenkins, build jobs, and pipeline projects. Explore the Jenkins Freestyle Project, and combine any SCM with any build system.
August 7, 2024
by Piyusha Podutwar
· 6,284 Views · 1 Like
article thumbnail
extended Berkeley Packet Filter (eBPF) for Cloud Computing
Explore eBPF, a technology that executes codes in the Linux kernel and is necessary for K8s network observability/monitoring, auditing, and traffic routing.
August 7, 2024
by Gaurav Shekhar
· 7,974 Views · 3 Likes
article thumbnail
JMeter Plugin HTTP Simple Table Server (STS) In-Depth
Take an in-depth look to discover some of the possibilities of using the HTTP Simple Table Server a JMeter Plugin in this short manual.
August 6, 2024
by Vincent DABURON
· 4,776 Views · 3 Likes
article thumbnail
Why You Should Use Buildpacks Over Docker
Learn why you should consider using Buildpacks to improve your container workflow, from automated dependency management to enhanced security and optimization.
August 6, 2024
by Sylvain Kalache
· 13,945 Views · 6 Likes
article thumbnail
Not All MFA Is Equal: Lessons From MFA Bypass Attacks
Simply having MFA isn't enough if it can be bypassed. Here are some tips to move to phishing-resistant MFA without adding undue user friction.
August 6, 2024
by Meir Wahnon
· 6,510 Views · 3 Likes
article thumbnail
Harnessing DevOps Potential: Why Backup Is a Missing Piece
DevOps has to handle a number of responsibilities but shouldn't forget about appropriate security measures to take to secure their source code.
August 6, 2024
by Daria Kulikova
· 7,430 Views · 4 Likes
article thumbnail
Go Serverless: Unleash Next-Gen Computing
Learn how serverless architecture, with its event-driven architecture, auto-scaling ability, and security walls, frees devs from infrastructure management woes.
August 5, 2024
by Aditya Kumar
· 6,062 Views · 3 Likes
article thumbnail
Scaling Prometheus With Thanos
Learn how to scale Prometheus using Thanos for long-term storage, global view metrics, and improved performance in large-scale Kubernetes environments.
August 5, 2024
by Ritesh Sonawane
· 3,671 Views · 5 Likes
article thumbnail
Reimagining AI: Ensuring Trust, Security, and Ethical Use
How can we trust AI in our daily lives? Explore the balance between innovation and safety in the age of intelligent systems.
August 5, 2024
by Saigurudatta Pamulaparthyvenkata
· 3,978 Views · 2 Likes
article thumbnail
How to Setup OAuth JWT in the Salesforce Connector
Learn the steps required to connect a Mule application to Salesforce using the Salesforce connector with the OAuth JWT flow.
August 5, 2024
by GONZALO MARCOS
· 4,561 Views · 1 Like
  • Previous
  • ...
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: