Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Data Topics
Observability vs. Monitoring
While used interchangeably, these terms have slightly different meanings.
March 19, 2019
by
Steve Waterworth
·
25,156 Views
·
6 Likes
Authentication and Authorization in Microservices
We look into three basic patterns for adding authentication and authorization into microservices and what they imply for our microservice architecture at large.
March 19, 2019
by
Bhavya Aggarwal
·
114,029 Views
·
24 Likes
Super Dynamic APEX Forms Using APEX_ITEM and Dynamic Actions
Look at super dynamic APEX forms using APEX_ITEM and dynamic actions.
March 18, 2019
by
Ahmed Nada
·
78,677 Views
·
9 Likes
Invoking REST APIs From Java Microservices
In this quick post, we take a look at how services can invoke other services via REST APIs over HTTP.
March 15, 2019
by
Niklas Heidloff
CORE
·
38,495 Views
·
7 Likes
Achieving SQL Server HA/DR With a Mix of Always On AGs and SANless SQL Server Failover Cluster Instances
You can build a SANless SQL Server FCI with SIOS DataKeeper and still leverage Always On AG for things like readable secondaries.
March 15, 2019
by
David Bermingham
·
13,730 Views
·
2 Likes
The Open-Closed Principle at an Architectural Level
The Open-Closed Principle, with microservices? Madness! Well, maybe not. Let's dive into it and check it out.
March 15, 2019
by
David Llobregat
·
35,399 Views
·
52 Likes
Integrating Bi-Temporal Data in Spring Boot Applications
The following example demonstrates how to use BarbelHisto to enable bi-temporal data in a Spring Boot application.
March 14, 2019
by
Niklas Schlimm
·
11,488 Views
·
1 Like
Low-Latency Java: Part 1 — Introduction
What is latency, and why should I worry about it as a developer?
Updated March 14, 2019
by
Rahul Vaidya
·
52,752 Views
·
64 Likes
Lambda Architecture: How to Build a Big Data Pipeline, Part 1
We take a look at the basic steps needed to create a big data application for streaming and analyzing data from edge devices.
March 13, 2019
by
Alexsandro Souza
·
20,269 Views
·
4 Likes
Migrating MySQL Data to ElasticSearch Using Logstash
We take a look at how to use some of the most popular tools in the world of data to effectively perform the migration of big data sets.
March 13, 2019
by
Shriram Untawale
·
60,386 Views
·
7 Likes
Managing High Availability in PostgreSQL: Part 2 — Replication Manager
Are you deploying PostgreSQL in the cloud and want to understand your options for achieving high availability?
March 13, 2019
by
Madan Kumar
·
9,703 Views
·
2 Likes
Data Flow Tutorial: Dealing With BigQuery Schema Changes
Learn how to tackle the challenge of changing requirements in your data flow system using the popular PaaS system, BigQuery.
March 13, 2019
by
Brachi Packter
·
7,697 Views
·
2 Likes
Kafka to HDFS/S3 Batch Ingestion Through Spark
Learn the basics of batch and data integration using Apache Spark and Spark jobs. We just know it'll spark your interest.
Updated March 12, 2019
by
Swapnil Chougule
·
24,452 Views
·
3 Likes
Programming Styles Compared: Spring Framework vis-a-vis Eclipse MicroProfile Part 1
A developer takes a comparative look into the Spring and MicroProfile frameworks for microservices development.
March 12, 2019
by
Konur Unyelioglu
·
20,831 Views
·
17 Likes
Concatenate Strings in Groovy
Learn more about how to concatenate different types of string representations in Groovy.
March 12, 2019
by
Rajesh Bhojwani
·
290,036 Views
·
5 Likes
How to Choose the Right IoT Connectivity Protocol for Your Connected Device
Choosing the right IoT connectivity protocol for your business is an important decision.
March 12, 2019
by
Jeffrey Lee
·
15,976 Views
·
11 Likes
Why True End-To-End Encryption is Important for Distributed Apps
A greater interconnectivity between devices and a prevalence of distributed apps makes end-to-end encryption crucial.
March 11, 2019
by
Sandra Chrust
·
8,119 Views
·
2 Likes
Comparing Serverless Architecture Providers: AWS, Azure, Google, IBM, and Other FaaS Vendors
This comparison between the largest serverless vendors (and some open source alternatives) has all the right metrics.
March 8, 2019
by
Ihor Lobastov
·
49,784 Views
·
13 Likes
An Attack on RSA With Exponent 3
Learn more about an attack possible on RSA encryption using a very specific exponent — click here for the details!
March 8, 2019
by
John Cook
·
9,112 Views
·
2 Likes
Introduction to Spring Data Redis
Want to make Redis easier to use in your Spring app?
March 7, 2019
by
Piotr Mińkowski
·
69,391 Views
·
13 Likes
Previous
...
267
268
269
270
271
272
273
274
275
276
...
Next