DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Low-Code Development: Leverage low and no code to streamline your workflow so that you can focus on higher priorities.

DZone Security Research: Tell us your top security strategies in 2024, influence our research, and enter for a chance to win $!

Launch your software development career: Dive head first into the SDLC and learn how to build high-quality software and teams.

Open Source Migration Practices and Patterns: Explore key traits of migrating open-source software and its impact on software development.

The Latest Software Design and Architecture Topics

article thumbnail
Step-By-Step Guide: Configuring IPsec Over SD-WAN on FortiGate and Unveiling Its Benefits
This article outlines the steps for implementing IPSec over SD-WAN and its advantages, and use cases in today's modern network with a focus on security.
July 5, 2024
by Sanjay Poddar
· 1,735 Views · 1 Like
article thumbnail
How To Remove Excel Worksheets Using APIs in Java
Learn how to simplify the process of retrieving worksheet details from an Excel XLSX file, and removing specific worksheets based on that information.
July 5, 2024
by Brian O'Neill DZone Core CORE
· 2,001 Views · 1 Like
article thumbnail
Maintain Chat History in Generative AI Apps With Valkey
This article presents a walkthrough on how to use a chat history component with Valkey, an open-source alternative to Redis.
July 4, 2024
by Abhishek Gupta DZone Core CORE
· 2,112 Views · 1 Like
article thumbnail
Building an Effective Zero Trust Security Strategy for End-To-End Cyber Risk Management
As cloud adoption grows, zero-trust security becomes essential, making a shift from "trust but verify" to "never trust, always verify."
July 4, 2024
by Susmitha Tammineedi
· 2,386 Views · 1 Like
article thumbnail
Phased Approach to Data Warehouse Modernization
This article will help you plan the migration of your data warehouse loads into a new database or a cloud-based data warehouse.
July 4, 2024
by Madhuri Veluri
· 2,597 Views · 2 Likes
article thumbnail
Addressing the Challenges of Scaling GenAI
Generative AI (GenAI) has transformative potential but faces adoption challenges like high computational demands, data needs, and biases. Learn solutions here.
July 4, 2024
by Jagadish Nimmagadda
· 1,679 Views · 1 Like
article thumbnail
Setting up Device Cloud: A Beginner’s Guide
This guide explains how to set up a device cloud, covering platform selection, device connection, network configuration, and data security.
July 4, 2024
by Yogesh Solanki
· 1,776 Views · 1 Like
article thumbnail
Flask Web Application for Smart Honeypot Deployment Using Reinforcement Learning
Learn to integrate Flask web applications with Reinforcement Learning and human feedback loop for a honeypot deployment use case.
July 3, 2024
by Virender Dhiman
· 2,102 Views · 1 Like
article thumbnail
Build Your Business App With BPMN 2.0
This tutorial demonstrates how to build a business application with the Business Process Modelling Notation (BPMN 2.0), a model-driven approach.
July 3, 2024
by Ralph Soika
· 2,619 Views · 2 Likes
article thumbnail
Data Integration Technology Maturity Curve 2024-2030
When it comes to data integration, some people may wonder what there is to discuss— isn't it just ETL? Learn more in this post.
July 3, 2024
by William Guo
· 3,016 Views · 2 Likes
article thumbnail
The Art of Manual Regression Testing
Manual regression testing — a thorough framework that ensures the stability and reliability of your software while navigating through the wave of changes.
July 3, 2024
by Matthew Luke
· 2,331 Views · 1 Like
article thumbnail
Understanding Properties of Zero Trust Networks
A practical guide to exploring in detail the "Security Automation" property of Zero Trust Networks, by looking at scenarios, technology stack, and examples.
July 3, 2024
by Abhishek Goswami
· 1,906 Views · 1 Like
article thumbnail
Mastering Distributed Caching on AWS: Strategies, Services, and Best Practices
Distributed caching on AWS enhances app performance and scalability. AWS provides ElastiCache (Redis, Memcached) and DAX for implementation.
July 3, 2024
by Raghava Dittakavi DZone Core CORE
· 2,488 Views · 2 Likes
article thumbnail
A Comprehensive Guide To Building and Managing a White-Label Platform
Today we will be building a white-label system that can accommodate any number of subsidiaries. It requires careful planning and a flexible architecture.
July 3, 2024
by Nitesh Upadhyaya
· 1,888 Views · 2 Likes
article thumbnail
Trigger Salesforce Assignment Rules and Send Notifications From MuleSoft
This blog describes the process of triggering Salesforce lead or case assignment rules and sending email notifications to owners when creating records from MuleSoft.
July 2, 2024
by Ujala Kumar Yadav
· 1,394 Views · 2 Likes
article thumbnail
How to Configure Custom Metrics in AWS Elastic Beanstalk Using Memory Metrics Example
By default, CloudWatch does not provide any memory metrics, but by a simple configuration, it's possible to add them to the monitoring dashboard.
July 2, 2024
by Alexander Sharov
· 2,296 Views · 1 Like
article thumbnail
Performance and Scalability Analysis of Redis and Memcached
This article benchmarks Redis and Memcached, popular in-memory data stores, to help decision-makers choose the best solution for their needs.
July 2, 2024
by RAHUL CHANDEL
· 3,136 Views · 2 Likes
article thumbnail
Outsmarting Cyber Threats: How Large Language Models Can Revolutionize Email Security
Learn more about how AI-powered detection uses LLMs to analyze email content, detects threats, and generates synthetic data for better training.
July 2, 2024
by Gaurav Puri
· 3,729 Views · 2 Likes
article thumbnail
Operational Excellence Best Practices
The article explores efforts to stabilize a critical service by enhancing observability and implementing service protection.
July 2, 2024
by Poonam Pradhan
· 1,538 Views · 2 Likes
article thumbnail
GBase 8a Implementation Guide: Resource Assessment
The storage space requirements for a GBase cluster are calculated based on the data volume, the choice of compression algorithm, and the number of cluster replicas.
July 1, 2024
by Cong Li
· 2,203 Views · 1 Like
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: