DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Refcards
Trend Reports

Events

View Events Video Library

Zones

Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Enterprise AI Trend Report: Gain insights on ethical AI, MLOps, generative AI, large language models, and much more.

2024 Cloud survey: Share your insights on microservices, containers, K8s, CI/CD, and DevOps (+ enter a $750 raffle!) for our Trend Reports.

PostgreSQL: Learn about the open-source RDBMS' advanced capabilities, core components, common commands and functions, and general DBA tasks.

AI Automation Essentials. Check out the latest Refcard on all things AI automation, including model training, data security, and more.

Latest Articles - DZone

article thumbnail
An Explanation of Jenkins Architecture
This blog delves into the intricate architecture of Jenkins, breaking down its core components and how they orchestrate the automation magic.
March 22, 2024
by Ruchita Varma
· 6,050 Views · 1 Like
article thumbnail
Integration of AI Tools With SAP ABAP Programming
This article delves into the groundbreaking integration of AI with SAP ABAP programming, exploring how this fusion is revolutionizing SAP development processes.
March 22, 2024
by Jayapal Vummadi
· 5,824 Views · 7 Likes
article thumbnail
Build Your Own Programming Language
Expanding on "Build Your Own Programming Language" by Clinton Jeffery, this article embarks on a journey to demystify the intricacies of programming language development.
March 22, 2024
by Imran Ahmad
· 4,926 Views · 1 Like
article thumbnail
Maximizing Developer Efficiency and Productivity in 2024: A Personal Toolkit
In the fast-paced world of software development, staying ahead isn't just about working hard—it's about working smart with the latest tools at hand.
March 22, 2024
by Navdeep Malik
· 5,020 Views · 1 Like
article thumbnail
Understanding Escape Analysis in Go
Go uses escape analysis to decide whether values are stored in the stack or heap. Escape to heap happens when a value needs a longer lifespan or exceeds stack size.
March 22, 2024
by Pranoy Kundu
· 4,814 Views · 2 Likes
article thumbnail
Modern Digital Authentication Protocols
The article will explore the basic theory behind the use of digital authentication protocols and simple examples of situations in which they are used.
March 22, 2024
by Divya Marupaka
· 4,963 Views · 3 Likes
article thumbnail
Getting Started With NCache Java Edition (Using Docker)
Learn how to get started with NCache Java Edition using Docker with step-by-step processes involving the creation of a clustered cache server.
March 22, 2024
by Gowtham K
· 9,022 Views · 2 Likes
article thumbnail
Why You Should Move From Monolith to Microservices
Moving from monolith to microservices streamlines deployment reduces downtime, and offers flexibility but demands careful planning and skilled execution for success.
March 22, 2024
by Den Smyrnov
· 5,812 Views · 1 Like
article thumbnail
Securing Cloud Storage Access: Approach to Limiting Document Access Attempts
Explore how to secure cloud documents and images by limiting access attempts using GUIDs, tokens, and tracking, enhancing security for image rendering.
March 21, 2024
by Amol Gote DZone Core CORE
· 4,023 Views · 4 Likes
article thumbnail
Role-Based Multi-Factor Authentication
Multi-factor authentication is being adopted by more and more organizations these days because putting it in place greatly increases security.
March 21, 2024
by Sriram Panyam
· 2,609 Views · 5 Likes
article thumbnail
The Role of Data Brokers in Software Development: Navigating Ethics and Privacy Concerns
Discover how data brokers impact software development, ethics, and privacy. Gain insights into user behavior and preferences.
March 21, 2024
by Oliver Stone
· 2,824 Views · 1 Like
article thumbnail
Exploring the Comprehensive World of Burp Suite
Burp Suite is one of the tools available for security testing; a flexible and strong platform that helps security experts evaluate web applications' security posture.
March 21, 2024
by Vaishnavi Nayak
· 2,863 Views · 2 Likes
article thumbnail
Some Thoughts on Bad Programming Practices
I have seen, over time, that developers seem invested in learning new things for the sake of new things, rather than getting better at existing approaches.
March 21, 2024
by Greg Hall
· 3,564 Views · 6 Likes
article thumbnail
Is Claude 3 Outperforming GPT-4?
Does Claude 3 beat GPT-4? Check out this blog on which AI model has the capability to determine performance for every user in daily life.
March 21, 2024
by Nishant Bijani
· 2,935 Views · 1 Like
article thumbnail
Remote Work Security Tips for Developers
Best practices for remote work security for developers include creating office setup standards, requiring cybersecurity training, providing immediate support, and more.
March 21, 2024
by Zac Amos
· 3,050 Views · 1 Like
article thumbnail
Weka Makes Life Simpler for Developers, Engineers, and Architects
AI-native data platform provides developers, engineers, and architects with unmatched performance, streamlined data pipelines, and sustainable efficiency.
March 21, 2024
by Tom Smith DZone Core CORE
· 2,647 Views · 1 Like
article thumbnail
Three Mechanisms To Protect Your Git Repositories
You can automate your way to more consistent and reliable security in your Git repositories using built-in mechanisms you might not have known were there.
March 21, 2024
by Greg Bulmash
· 3,160 Views · 1 Like
article thumbnail
Time Data Series: Working With PHP Zmanim
Calculations you can't get with built-in PHP tools because there are so many ways to calculate the same religiously significant moment.
March 21, 2024
by Leon Adato
· 3,447 Views · 1 Like
article thumbnail
Deploying to Heroku With GitLab CI/CD
In this article, learn how you can deploy your Heroku app automatically any time code is merged into your main branch by using GitLab CI/CD.
March 21, 2024
by Tyler Hawkins DZone Core CORE
· 3,058 Views · 2 Likes
article thumbnail
Those Were The Days?! A Humorous Reflection on the Evolution of Software Engineering
Writing software is ever more complicated, but have you ever wondered what it was like before all the tools and technology we have today? You may regret asking!
March 21, 2024
by Scott Sosna DZone Core CORE
· 3,888 Views · 3 Likes
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • ...
  • Next

ABOUT US

  • About DZone
  • Send feedback
  • Community research
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Core Program
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: