DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Low-Code Development: Leverage low and no code to streamline your workflow so that you can focus on higher priorities.

DZone Security Research: Tell us your top security strategies in 2024, influence our research, and enter for a chance to win $!

Launch your software development career: Dive head first into the SDLC and learn how to build high-quality software and teams.

Open Source Migration Practices and Patterns: Explore key traits of migrating open-source software and its impact on software development.

The Latest Coding Topics

article thumbnail
Building an AI-Powered Slack Bot With IBM WatsonX
Leverage WatsonX's AI capabilities to create innovative applications that streamline processes and boost productivity, making life easier and more productive for users.
May 28, 2024
by Pradeep Gopalgowda
· 678 Views · 6 Likes
article thumbnail
Using Cron Jobs With Encrypted Home Folders and Malware Protection on Linux
This article explores the implications and solutions for running cron jobs in environments with encrypted home directories and malware scanners.
May 28, 2024
by Constantin Kwiatkowski
· 2,209 Views · 2 Likes
article thumbnail
ARM CPU for Cost-Effective Apache Kafka at the Edge and Cloud
Learn about ARM CPU for cost-effective and energy-efficient data streaming with Apache Kafka at the Edge and in the Cloud, including use cases.
May 27, 2024
by Kai Wähner DZone Core CORE
· 1,218 Views · 1 Like
article thumbnail
Angular vs. React: In-Depth Comparison
Many arguments for and against both these technologies have been presented, yet both still hold a strong position in the market.
May 27, 2024
by Pawel Zurawski
· 1,122 Views · 1 Like
article thumbnail
Top 7 iOS App Development Programming Languages
iOS app development is the process of creating apps for the iOS Operating System. This means that these apps are created for various devices of the Apple ecosystem.
May 27, 2024
by Mark Wood
· 199 Views · 1 Like
article thumbnail
How We Developed the Eclipse OpenJ9 CRIU Support for Fast Java Startup
Checkpointing and restoring the JVM makes cloud apps run with no perceived delay because all the startup work is done before deployment. Try it, or read on to learn more.
May 27, 2024
by Younes Manton
· 1,851 Views · 1 Like
article thumbnail
Leveraging AI and Vector Search in Azure Cosmos DB for MongoDB vCore
This article explains the inbuilt vector search functionality in Cosmos DB for MongoDB vCore and also provides a quick exploration guide using Python code.
May 26, 2024
by Naga Santhosh Reddy Vootukuri DZone Core CORE
· 769 Views · 3 Likes
article thumbnail
Apache Doris for Log and Time Series Data Analysis
NetEase has replaced Elasticsearch and InfluxDB with Apache Doris, achieving 11X query performance and saving 70% of resources.
May 25, 2024
by Frank Z
· 1,119 Views · 1 Like
article thumbnail
How To Protect Node.js Form Uploads With a Deterministic Threat Detection API
Learn more about the prevalence of custom file upload forms in web applications and a deterministic threat detection solution for Node.js form uploads.
May 24, 2024
by Brian O'Neill DZone Core CORE
· 1,763 Views · 2 Likes
article thumbnail
Enhancing Angular Directives: Implementing Permission-Based Conditional Rendering With Else Case
We will walk through the creation of a custom Angular directive that handles permission checks and supports an else case, allowing for cleaner and more maintainable code.
May 24, 2024
by Bhanuprakash Jirra
· 824 Views · 1 Like
article thumbnail
Capturing Acknowledgement in Kafka Streaming With RecordMetadata
In this article, explore RecordMetadata, and its attributes, and discover how it can be leveraged using various use cases.
May 24, 2024
by Raja Chattopadhyay
· 1,219 Views · 2 Likes
article thumbnail
Serving a Vue.js Application With a Go Backend
In this guide, we embark on a journey to serve a fundamental Vue.js application, displaying 'Hello World !!', and employing a Go (Golang) HTTP server.
May 24, 2024
by Bhanuprakash Jirra
· 807 Views · 1 Like
article thumbnail
How To Generate TestNG Reports In Jenkins
Learn how to generate a TestNG report in Jenkins in our latest blog. You will also learn how to share these TestNG reports in Jenkins through email.
May 24, 2024
by Piyusha Podutwar
· 397 Views · 1 Like
article thumbnail
AWS: EC2 User Data vs. EC2 AMI
A comparison study among two EC2 initialization/configuration tools — User Data and AMI, which help in the configuration and management of EC2 instances.
May 24, 2024
by PRAVEEN SUNDAR
· 626 Views · 1 Like
article thumbnail
How to Quickly Create and Easily Configure a Local Redis Cluster
This tutorial talks about how to quickly create and easily configure a local Redis cluster for testing or troubleshooting with minimal modifications and more control.
May 24, 2024
by Rahul Chaturvedi
· 2,185 Views · 3 Likes
article thumbnail
How To Protect a File Server
To secure a Linux file server, apply a Defense in Depth approach. Always remember that security is a continuous process, not a one-time task.
May 24, 2024
by Akanksha Pathak DZone Core CORE
· 1,692 Views · 3 Likes
article thumbnail
Using Schema Annotations to Create and Execute SQL Queries
See how schema annotations and QueryBuilder can be used to simplify the creation and execution of native SQL queries in Java.
May 23, 2024
by Greg Brown
· 942 Views · 1 Like
article thumbnail
Constructing Secure and Strong Data Access Layers With JPA
Determine how to control JPA features and secure coding practices to build secure data access layers that protect sensitive information in your applications.
May 23, 2024
by Humashankar Vellathur Jaganathan
· 3,138 Views · 3 Likes
article thumbnail
I Built an App With Remix in 30 Minutes
Discover how to build and deploy a fast Remix app in under 30 minutes. Learn about Remix's features and quick Heroku deployment in this hands-on guide.
May 23, 2024
by Alvin Lee DZone Core CORE
· 1,834 Views · 2 Likes
article thumbnail
Key Benefits of Integrating Password Managers Into Kubernetes Security
Integrating password managers into Kubernetes centralizes credentials, enhances security, automates rotations, and improves compliance.
May 23, 2024
by Favour Efeoghene
· 1,175 Views · 1 Like
  • Previous
  • ...
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: