DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Please enter at least three characters to search
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

The software you build is only as secure as the code that powers it. Learn how malicious code creeps into your software supply chain.

Apache Cassandra combines the benefits of major NoSQL databases to support data management needs not covered by traditional RDBMS vendors.

Generative AI has transformed nearly every industry. How can you leverage GenAI to improve your productivity and efficiency?

Modernize your data layer. Learn how to design cloud-native database architectures to meet the evolving demands of AI and GenAI workloads.

The Latest Software Design and Architecture Topics

article thumbnail
Mastering AWS API Gateway: A Comprehensive Guide To Setting up Routes, Integrations, and Deployments
In this article, we will walk through the process of setting up AWS API Gateway with a Network Load Balancer (NLB), Target Group, Security Group, and VPC.
March 14, 2024
by Vijay Panwar DZone Core CORE
· 5,338 Views · 1 Like
article thumbnail
Elevate Your Security Posture: Grafana for Real-Time Security Analytics and Alerts
This article provides a detailed walkthrough on setting up Grafana for real-time security monitoring, crafting insightful dashboards, and configuring effective alerts.
March 14, 2024
by Rajesh Gheware DZone Core CORE
· 6,581 Views · 1 Like
article thumbnail
BPMN 2.0 and Jakarta EE: A Powerful Alliance
Jakarta EE, combined with BPMN 2.0, forms a powerful alliance for developing robust, scalable, and interoperable BPM solutions.
March 14, 2024
by Ralph Soika
· 4,792 Views · 3 Likes
article thumbnail
Cohesity Simplifies Data Management and Security for Developers
Simplified data management and security for developers with a converged, AI-powered platform streamlines workflows and unlocks insights.
March 14, 2024
by Tom Smith DZone Core CORE
· 5,177 Views · 1 Like
article thumbnail
Foundations of Data in the Cloud
Exploring cloud data management, and its layered structure from secure storage to processing and application, presentation, all underpinned by robust security measures.
March 14, 2024
by Suhas Jangoan
· 4,641 Views · 4 Likes
article thumbnail
How To Use BenchmarkDotNet: 6 Simple Performance-Boosting Tips To Get Started
Learn how to use BenchmarkDotNet to effectively create and run benchmarks on your C# code. Dig into where you have opportunities to optimize your C# code!
March 13, 2024
by Nick Cosentino
· 4,746 Views · 1 Like
article thumbnail
Empowering DevOps: The Crucial Role of Platform Engineering
Learn about platform engineering, a cornerstone of DevOps that provides the foundation to build efficient, scalable, and reliable software delivery pipelines.
March 13, 2024
by Josephine Eskaline Joyce DZone Core CORE
· 3,964 Views · 4 Likes
article thumbnail
Machine Learning: A Revolutionizing Force in Cybersecurity
Explore the power of ML in cybersecurity to uncover hidden patterns, identify potential threats proactively, and bolster our defenses against evolving cyber threats.
March 13, 2024
by Phani Kumar Varma Kokkerlapati
· 6,058 Views · 2 Likes
article thumbnail
Azure Cognitive Search Unveiled: Building Intelligent Search Solutions With AI
This article offers a practical guide on setting up Azure Cognitive Search, and integrating AI functionalities, and includes code samples.
March 13, 2024
by venkataramaiah gude
· 2,636 Views · 2 Likes
article thumbnail
The Role of Artificial Intelligence in Modern Software Architecture Design
Explore the integration, optimization, challenges, and future of Artificial Intelligence in modern software architecture design.
March 13, 2024
by Boris Bodin
· 3,405 Views · 3 Likes
article thumbnail
How To Align Data Integration and Data Quality
Understand the major stakeholders of data quality and the three simple ground rules to ensure good data.
March 12, 2024
by Sudipta Datta
· 2,629 Views · 1 Like
article thumbnail
CRUDing NoSQL Data With Quarkus, Part Two: Elasticsearch
Part 2 of this series focuses on Elasticsearch, a distributed NoSQL database and search engine built on Apache Lucene.
March 12, 2024
by Nicolas Duminil DZone Core CORE
· 8,529 Views · 1 Like
article thumbnail
Securing Your Kubernetes Cluster: Terraform Secrets Management
This blog delves beyond the basics, exploring advanced techniques and considerations for leveraging Terraform to manage your Kubernetes Secrets.
March 12, 2024
by Angita Shah
· 4,354 Views · 2 Likes
article thumbnail
7 Essential Practices for Secure API Development
Master API security with our top 7 practices for safe and reliable API development. Ensure robust software with our expert guide.
March 12, 2024
by Boris Bodin
· 2,619 Views · 1 Like
article thumbnail
Encryption of Data at Rest Across Cloud Platforms
Secure your static data using encryption at rest. Leverage built-in tools in AWS, GCP, and Azure for automatic encryption.
March 12, 2024
by Suhas Jangoan
· 3,021 Views · 3 Likes
article thumbnail
Navigating the Shift: Mastering Pod Security in Kubernetes
Master the shift to Pod Security Admission (PSA) in Kubernetes 1.25 with our guide, unlocking advanced security for your deployments.
March 12, 2024
by Rajesh Gheware DZone Core CORE
· 4,711 Views · 1 Like
article thumbnail
Why We Built Smart Scaler
Smart Scaler uses AI to automate cloud service scaling based on application behaviors, optimizing performance and reducing costs.
March 12, 2024
by Prasad Dorbala
· 5,715 Views · 2 Likes
article thumbnail
How Secure Cloud Development Replaces Virtual Desktop Infrastructures
Learn how secure cloud development environments provide a replacement for secure laptops and virtual desktop infrastructures for secure application development.
March 12, 2024
by Laurent Balmelli, PhD
· 4,888 Views · 2 Likes
article thumbnail
Implementing RAG: How To Write a Graph Retrieval Query in LangChain
We will look at how LangChain implements RAG so you can apply the same principles to any application with LangChain and an LLM.
March 12, 2024
by Jennifer Reif DZone Core CORE
· 2,795 Views · 1 Like
article thumbnail
OWASP Top 10 Explained: SQL Injection
This post discusses SQL Injection (SQLi), its types, examples of breaches, and prevention methods to protect against this cybersecurity threat.
March 12, 2024
by Pier-Jean MALANDRINO DZone Core CORE
· 11,066 Views · 7 Likes
  • Previous
  • ...
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • ...
  • Next

ABOUT US

  • About DZone
  • Support and feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: