DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Because the DevOps movement has redefined engineering responsibilities, SREs now have to become stewards of observability strategy.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

The Latest Software Design and Architecture Topics

article thumbnail
Reimagining AI: Ensuring Trust, Security, and Ethical Use
How can we trust AI in our daily lives? Explore the balance between innovation and safety in the age of intelligent systems.
August 5, 2024
by Saigurudatta Pamulaparthyvenkata
· 3,990 Views · 2 Likes
article thumbnail
How to Setup OAuth JWT in the Salesforce Connector
Learn the steps required to connect a Mule application to Salesforce using the Salesforce connector with the OAuth JWT flow.
August 5, 2024
by GONZALO MARCOS
· 4,661 Views · 1 Like
article thumbnail
Free Tier API With Apache APISIX
A free tier is a must for any API service provider worth its salt. In this post learn how to configure such a free tier with Apache APISIX.
August 5, 2024
by Nicolas Fränkel DZone Core CORE
· 2,101 Views · 1 Like
article thumbnail
Harnessing the Power of AWS Aurora for Scalable and Reliable Databases
Delve into the benefits of AWS Aurora and explore a real-life example of how it is used in an online social media platform.
August 5, 2024
by Vijay Panwar DZone Core CORE
· 2,974 Views · 3 Likes
article thumbnail
Overview of Classical Time Series Analysis: Techniques, Applications, and Models
Explore what makes time series analysis unique and the specialized techniques and models needed to understand and predict future patterns or trends.
August 5, 2024
by Salman Khan DZone Core CORE
· 53,500 Views · 30 Likes
article thumbnail
Automation Resilience: The Hidden Lesson of the CrowdStrike Debacle
Read here to discover the as-yet uncovered culprit in this massive hunt for the responsible parties for the recent CrowdStrike debacle: automation.
August 5, 2024
by Jason Bloomberg
· 1,954 Views · 4 Likes
article thumbnail
Optimizing Software Quality: Unit Testing and Automation
Explore unit testing, which checks individual functions to catch regressions early, and automation testing, speeding up overall testing.
August 4, 2024
by Hitesh Nalamwar
· 30,035 Views · 2 Likes
article thumbnail
Industrial IoT: Exploring Microcontrollers for Robust Applications
Let's explore the features, applications, and top choices for microcontrollers in industrial IoT, achieving reliability, efficiency, and security in harsh environments.
August 2, 2024
by Carsten Rhod Gregersen
· 5,108 Views · 1 Like
article thumbnail
The C̶a̶k̶e̶ User Location Is a Lie!!!
This post discusses the nuances surrounding location-based programming: various ways to access user location, how they can fail, and what to do about it.
August 2, 2024
by Austin Gil DZone Core CORE
· 5,881 Views · 2 Likes
article thumbnail
The One-Pixel Threat: How Minuscule Changes Can Fool Deep Learning Systems
Learn about how a single pixel can compromise deep learning models from medical diagnostics to autonomous vehicles, and the challenges to securing our AI future.
August 1, 2024
by Frederic Jacquet DZone Core CORE
· 4,428 Views · 3 Likes
article thumbnail
3 Reasons Why VPs of Engineering Are Choosing Low-Code
Low-code helps VPs of engineers to let their core engineering team focus more on high-impact projects, save costs, and speed up application development.
August 1, 2024
by Aaikansh Agrawal
· 3,337 Views · 1 Like
article thumbnail
Navigating BNPL Integration: Key Steps and Best Practices for Developers
Integrating BNPL boosts conversion rates and satisfaction. This guide covers key steps and best practices for seamless, secure implementation.
August 1, 2024
by Lohith Kumar Paripati
· 5,451 Views · 2 Likes
article thumbnail
How to Fix the OWASP Top 10 Vulnerability in Angular 18.1.1v
Discuss the configurations and see examples of how to mitigate security vulnerabilities in an Angular web application 18.1.1v in detail.
August 1, 2024
by Kalyan Gottipati
· 6,541 Views · 1 Like
article thumbnail
Leveraging Time Series Databases for Cutting-Edge Analytics: Specialized Software for Providing Timely Insights at Scale
Time series databases offer tools that simplify working with temporal data, enabling businesses to improve operational efficiency, predict failures, and enhance security.
August 1, 2024
by Ted Gooch
· 4,925 Views · 1 Like
article thumbnail
Merge Multiple PDFs in MuleSoft
In this article, you will learn how to merge multiple PDFs and send back the merged PDF as a response using MuleSoft and Java.
July 31, 2024
by Anupam Nath
· 6,919 Views · 4 Likes
article thumbnail
Ensuring Data Integrity Through Anomaly Detection: Essential Tools for Data Engineers
This article sets out to explore some of the essential tools required by organizations in the domain of data engineering to efficiently improve data quality.
July 31, 2024
by Keerthivasan santhanakrishnan
· 6,050 Views · 2 Likes
article thumbnail
Interference in A/B Tests
While interference is a major problem affecting A/B tests, we can redesign the experiment software platform and create new statistical libraries to mitigate its effects.
July 31, 2024
by Saurabh Kumar
· 4,436 Views · 1 Like
article thumbnail
Plot Your REST Endpoints Using grafana-infinity-datasource
Plotting straight from the database is convenient, but is not always the case. Sometimes you might need something more complex that your API can support.
July 31, 2024
by Emmanouil Gkatziouras DZone Core CORE
· 4,550 Views · 2 Likes
article thumbnail
Two-Tower Model for Fraud Detection: A Comprehensive Guide
Boost fraud detection with the two-tower model, a powerful architecture capturing complex relationships between transaction and user data.
July 31, 2024
by Gaurav Puri
· 3,864 Views · 3 Likes
article thumbnail
Vulnerability Management in DevOps Environments
Vulnerability management in DevOps integrates security into the development workflow to identify and fix vulnerabilities throughout the software lifecycle.
July 31, 2024
by Favour Efeoghene
· 9,768 Views · 3 Likes
  • Previous
  • ...
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: