Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
How Secure Is the BLE Communication Standard?
Learn how to make BLE more secure.
Updated August 15, 2019
by
Daryna Kacherovska
·
36,420 Views
·
3 Likes
Concerns With the Current State of DevOps
Complexity, security, consistent understanding, and business perspective are among the cited concerns that arise as DevOps grows.
Updated August 15, 2019
by
Tom Smith
CORE
·
14,955 Views
·
3 Likes
Runtime-Patching in Mule 4
Explore runtime-patching in Mule 4.
August 13, 2019
by
Manish Kumar
·
16,226 Views
·
3 Likes
Custom JWT Generator in WSO2 API Manager
Create a custom JWT generator with WSO2 API Manager (2.6.0)
August 13, 2019
by
Anupam Gogoi
·
9,323 Views
·
3 Likes
Verifying Service Mesh TLS in Kubernetes, Using Ksniff and Wireshark
An overview of Service Mesh TIs in Kubernetes, based on the author's personal findings.
Updated August 12, 2019
by
Daniel Bryant
·
5,229 Views
·
3 Likes
Trust and Openness Are Key to Innovation
The message seems increasingly clear: If you want innovation, then openness is a prerequisite.
Updated August 9, 2019
by
Adi Gaskell
·
11,309 Views
·
2 Likes
Creating Self-Signed Certificate
Read on to view a step-by-step tutorial on how to create a Self Signed Certificate. This includes instructions on how to create a pk12 certificate and how to convert it.
Updated August 7, 2019
by
Satheesh Kumar
·
51,793 Views
·
11 Likes
SSO — WSO2 API Manager and Keycloak
Implement SSO and see how to debug the WSO2 API Manager.
August 6, 2019
by
Anupam Gogoi
·
18,960 Views
·
7 Likes
Four Most Used REST API Authentication Methods
Get the four most used REST API authentication methods.
Updated August 6, 2019
by
Guy Levin
·
130,653 Views
·
15 Likes
Five Best Practices for GoLang CI/CD
Create CI/CD workflows with Artifactory and GoLang.
August 6, 2019
by
Ankush Chadha
·
14,854 Views
·
3 Likes
Decision Diffie-Hellman DDH and CDH
Easily handle DDH and CDH issues.
August 2, 2019
by
John Cook
·
4,992 Views
·
2 Likes
Secrets Manager in Anypoint Platform
Learn more about Secrets Manager in Anypoint Platform.
July 31, 2019
by
Nitin Gupta
CORE
·
16,330 Views
·
6 Likes
Add Login to Your Spring Boot App in 10 Mins
Learn more about building form-based authentication into your Spring Boot 2.1 app.
July 30, 2019
by
Andrew Hughes
·
165,863 Views
·
16 Likes
DuckDuckGo Has a Privacy Problem
Potential privacy issues in DuckDuckGo.
July 29, 2019
by
Christian Stewart
·
186,591 Views
·
2 Likes
Open ID Connect Authentication With OAuth2.0 Authorization
How Open ID Connect and OAuth2.0 allow for full-authentication.
July 26, 2019
by
Hanil Kathuria
·
32,000 Views
·
11 Likes
Cloud vs. On-Premise Software Deployment – What’s Right for You?
As the two main methods of software deployment, it's important to compare both cloud and on-premise deployment to see what's best.
July 25, 2019
by
David Hallinan
·
24,432 Views
·
3 Likes
Package Signing in PIP
Do we need to automate package signing in PIP for PyPi?
July 24, 2019
by
Prahlad Yeri
·
8,897 Views
·
1 Like
Serverless Multi-Tier Architecture on AWS
AWS's serverless tools enable developers to create a connected multi-tier architecture for easily maintainable and scaleable applications.
July 24, 2019
by
Aarti Parikh
·
13,503 Views
·
7 Likes
Using Jakarta Security on Tomcat and the Payara Platform
Learn how to get started with Jakarta Security on Tomcat and Payara.
July 23, 2019
by
Arjan Tijms
·
5,780 Views
·
4 Likes
API Use Cases
What are some real-world problems APIs are solving?
Updated July 23, 2019
by
Tom Smith
CORE
·
17,166 Views
·
4 Likes
Previous
...
106
107
108
109
110
111
112
113
114
115
...
Next