DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

The Latest Software Design and Architecture Topics

article thumbnail
Content Security Policy (CSP) Explained
We explore the concepts behind Content Security Policy, such as hashes and nonces, and how to implement CSP in your application or site.
February 26, 2018
by Sven Morgenroth
· 25,357 Views · 4 Likes
article thumbnail
Serverless Payments with Stripe and AWS Lambda
Get started on executing a program that will allow you to take card payments using the cloud and client-side tokenization.
February 26, 2018
by Yos Riady
· 16,799 Views · 5 Likes
article thumbnail
When Postgres Blocks: 7 Tips for Dealing With Locks
These are some of the important dos and don'ts that we've seen as helpful when working with users to migrate from their single node Postgres database to Citus.
February 25, 2018
by Marco Slot
· 24,851 Views · 2 Likes
article thumbnail
How Synchronization Works in Java (Part 1)
This introductory primer to Java synchronization will discuss how synchronization solves problems and introduces locks.
February 25, 2018
by Abdul Mohsin
· 38,581 Views · 31 Likes
article thumbnail
How to Build a 3D Printer in Python
This awesome project will teach you how to create your own 3D printer using Python and a Rasperry Pi, in addition to a few other tools.
February 25, 2018
by Nikolay Khabarov
· 20,712 Views · 10 Likes
article thumbnail
DevSecOps Is a Key to Cost Reduction
DevSecOps is not only a way to integrate security earlier into the SDLC; it's also a way to cut costs. This article debunks the common complaints about adding DevSecOps.
February 24, 2018
by Dan Goldberg
· 8,168 Views · 2 Likes
article thumbnail
Microservices Authentication and Authorization Using API Gateway
In this article, we'll learn how to add authorization and authentication security protocols to microservices by using an API Gateway.
Updated February 23, 2018
by Akash Bhingole
· 82,091 Views · 22 Likes
article thumbnail
Lifecycle of a Request-Response Process for a Spring REST API
The steps involved in the lifecycle of a request process and how the request is mapped to the appropriate controller method and then returned to the client.
February 23, 2018
by Rajesh P
· 110,812 Views · 16 Likes
article thumbnail
Building Microservices With Akka HTTP: A CDC Approach
When developing microservices, think from the user's perspective first by using Consumer Driven Contracts (CDC) for testing.
February 23, 2018
by Marini Fabio
· 13,490 Views · 3 Likes
article thumbnail
Using AWS S3 for Database Backup Storage
Database backups allow restoring upon database failures and recovering from data corruption. AWS S3 is an affordable, highly durable and reliable storage option.
February 23, 2018
by Ashan Fernando
· 17,051 Views · 3 Likes
article thumbnail
Introducing the Maven git commit id Plugin
Tired of wondering which version of your software is running in an environment? Say hello to the Maven git commit id plugin.
February 23, 2018
by Gunter Rotsaert DZone Core CORE
· 138,636 Views · 19 Likes
article thumbnail
Versioning a REST API With Spring Boot and Swagger
In this article, you'll learn how to maintain multiple versions of your REST API by using the Spring Boot framework along with Swagger.
February 23, 2018
by Piotr Mińkowski
· 120,386 Views · 10 Likes
article thumbnail
Kubernetes Monitoring: Best Practices, Methods, and Existing Solutions
Kubernetes handles containers in several computers, removing the complexity of handling distributed processing. But what's the best way to perform Kubernetes monitoring?
Updated February 23, 2018
by Daniel Berman
· 18,517 Views · 4 Likes
article thumbnail
Towards Resource-Oriented REST Development
A number of different possibilities to address REST development issues, move Java REST development to a higher level, and gain more simplicity.
February 23, 2018
by Remo Meier
· 9,774 Views · 7 Likes
article thumbnail
Reproducible Builds in Java
What stands in the way of reproducible builds in Java? What are their benefits? And how can you create them? Time to turn to Gradle.
February 23, 2018
by Maria Camenzuli
· 19,284 Views · 18 Likes
article thumbnail
Distributed Sagas for Microservices
Learn about using the distributed saga pattern and AWS Step Functions to ensure correctness and consistency in your microservices.
Updated February 22, 2018
by Yos Riady
· 86,016 Views · 31 Likes
article thumbnail
Stateless Authentication With JSON Web Tokens
Learn how to protect your microservice, API, or web app using JSON Web Tokens to create a stateless authentication protocol.
February 22, 2018
by Yos Riady
· 48,310 Views · 15 Likes
article thumbnail
Top 5 Alternatives to Selenium
Get one software tester's take on the best free or freemium testing frameworks and their unique benefits in this list of the top 5.
February 21, 2018
by Karthik Amirapu
· 45,838 Views · 13 Likes
article thumbnail
Spring DI Patterns: The Good, The Bad, and The Ugly
Let's explore the three ways Spring lets you declare dependencies using annotations: field injection, setter injection, and constructor injection.
February 21, 2018
by Roger Guldbrandsen
· 99,560 Views · 38 Likes
article thumbnail
Implementing a Bounded Context
Get a handle on bounded context, one of the more difficult concepts of microservices architecture, which originated in Domain Driven Design.
February 21, 2018
by David Pitt
· 44,971 Views · 18 Likes
  • Previous
  • ...
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • 555
  • 556
  • 557
  • 558
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: