DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Low-Code Development: Leverage low and no code to streamline your workflow so that you can focus on higher priorities.

DZone Security Research: Tell us your top security strategies in 2024, influence our research, and enter for a chance to win $!

Launch your software development career: Dive head first into the SDLC and learn how to build high-quality software and teams.

Open Source Migration Practices and Patterns: Explore key traits of migrating open-source software and its impact on software development.

The Latest Data Topics

article thumbnail
FastAPI Got Me an OpenAPI Spec Really... Fast
When API First isn’t an option, FastAPI can save teams time by allowing existing RESTful microservices to be fully documented and consumed using OpenAPI v3 automatically.
April 22, 2024
by John Vester DZone Core CORE
· 29,058 Views · 3 Likes
article thumbnail
Anomaly Detection Using QoS Metrics and Business Intelligence
This article discusses anomaly detection using Quality of Service metrics for content streaming platforms using AWS components.
April 20, 2024
by Keerthivasan santhanakrishnan
· 3,048 Views · 2 Likes
article thumbnail
Cell-Based Architecture: Comprehensive Guide
Dive into cell-based architecture and explore foundational principles, real-world uses, benefits, challenges, and strategies for effective implementation.
April 19, 2024
by Shantanu Kumar DZone Core CORE
· 11,193 Views · 7 Likes
article thumbnail
Introduction to Modern AI 2024 Edition, Part 2
In this post, walk through a real-life business problem and make use of ChatGPT with Advanced Data Analysis to help with the solution.
April 19, 2024
by Joel Nylund DZone Core CORE
· 1,253 Views · 2 Likes
article thumbnail
How to Really Build a GraphQL Server With Java
This tutorial aims to demonstrate the process of building a GraphQL server utilizing the venerable graphql-java library in Java.
April 18, 2024
by David Ventimiglia
· 2,211 Views · 5 Likes
article thumbnail
Java vs. Scala: Comparative Analysis for Backend Development in Fintech
Analyze how Java and Scala perform in the world of fintech backend development, focusing on the concrete benefits and limitations each language presents.
April 18, 2024
by Grigoriy Alexeev
· 3,118 Views · 4 Likes
article thumbnail
Wireshark and tcpdump: A Debugging Power Couple
Explore the power of Wireshark and tcpdump for network analysis in our comprehensive guide, unveiling tips for effective troubleshooting.
April 17, 2024
by Shai Almog DZone Core CORE
· 2,682 Views · 3 Likes
article thumbnail
3 Ways Blockchain Reinforces Data Integrity in the Cloud
Companies must maintain data reliability to ensure informational accuracy and security, especially in cloud-first approaches. How can blockchain keep things secure?
April 17, 2024
by Emily Newton
· 2,344 Views · 1 Like
article thumbnail
Preventing Advanced Persistent Threats in Kubernetes
Find the balance between convenience, operational efficiency, and the rising threats of Advanced Persistent Threats (APTs) in the world of ephemeral containers.
April 16, 2024
by Nigel Douglas
· 1,018 Views · 2 Likes
article thumbnail
IP Geolocation Myths and Facts
Debunking IP geolocation myths helps developers create secure apps and users make informed privacy choices.
April 15, 2024
by camimi Morales
· 1,210 Views · 1 Like
article thumbnail
Vector Databases: Unlocking New Dimensions in Video Streaming
Explore how vector embeddings and machine learning transform search capabilities in streaming platforms and enhance user discovery and personalization.
April 15, 2024
by Sai Mahesh vuppalapati
· 3,114 Views · 6 Likes
article thumbnail
Real-Time Data Transfer from Apache Flink to Kafka to Druid for Analysis/Decision-Making
In this article, follow an outline of the steps to transfer processed data from Flink 1.18.1 to a Kafka 2.13-3.7.0 topic.
April 15, 2024
by Gautam Goswami DZone Core CORE
· 2,031 Views · 2 Likes
article thumbnail
Implementing the Idempotency-Key Specification on Apache APISIX
Learn how to implement Idempotency-Key header with Apache APISIX and Redis for reliable APIs without duplicates.
April 13, 2024
by Nicolas Fränkel DZone Core CORE
· 2,302 Views · 1 Like
article thumbnail
Using Spring AI With AI/LLMs to Query Relational Databases
Explore how the AIDocumentLibraryChat project has been extended to support questions for searching relational databases.
April 12, 2024
by Sven Loesekann
· 2,370 Views · 4 Likes
article thumbnail
Firewall Basic Bypassing Techniques With Nmap and Hping3
Learn more about basic firewall bypassing techniques with Nmap and hping3.
Updated April 12, 2024
by Uladzislau Murashka
· 91,090 Views · 8 Likes
article thumbnail
Prompt Engineering vs Fine-Tuning vs RAG
Explore the pros and cons of prompt engineering, fine-tuning, and RAG to help you understand when and how to use these techniques effectively.
April 11, 2024
by Usama Jamil
· 1,558 Views · 3 Likes
article thumbnail
Multi-Touch Attribution Models
In this comprehensive guide, explore some of the traditional and advanced multi-touch attribution models and the algorithms behind them.
April 10, 2024
by Venkatraman Umbalacheri Ramasamy
· 2,658 Views · 2 Likes
article thumbnail
Caching In Distributed Systems: A Complete Guide
Explore a comprehensive guide about caching in distributed systems including its benefits, caching strategies, cache invalidation methods, and more.
April 10, 2024
by Roopa Kushtagi
· 1,953 Views · 6 Likes
article thumbnail
Singleton: 6 Ways To Write and Use in Java Programming
Here, learn how and when to write singletons and gain an appreciation of the nuances and caveats in creating singleton objects.
April 9, 2024
by Narendran Solai Sridharan
· 3,339 Views · 6 Likes
article thumbnail
DSL Validations: The Whole Enchilada
As a conclusion to the series where we have learned to create the building blocks for DSL-based validations, let's put it all together for a complete solution.
April 9, 2024
by Scott Sosna DZone Core CORE
· 1,995 Views · 1 Like
  • Previous
  • ...
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: