Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
Quick Guide to Microservices With Quarkus on Openshift
A quick tutorial to help you use Quarkus.
August 29, 2019
by
Piotr Mińkowski
·
15,318 Views
·
8 Likes
Proof of Work vs. Proof of Stake: An In-Depth Discussion
Get a handle on consensus mechanisms for cryptocurrencies.
August 27, 2019
by
Akash Takyar
·
13,078 Views
·
6 Likes
Ant-to-Maven Conversions: The Painless Method
You no longer need to sweat it over Ant-to-Maven conversions. We've got you covered.
August 23, 2019
by
Dinusha Nirmal
·
33,658 Views
·
2 Likes
Create Your JWTs From Scratch
Everything you need to create JWTs from scratch.
August 22, 2019
by
Lindsay Brunner
·
22,231 Views
·
4 Likes
How Secure Is the BLE Communication Standard?
Learn how to make BLE more secure.
Updated August 15, 2019
by
Daryna Kacherovska
·
36,486 Views
·
3 Likes
Concerns With the Current State of DevOps
Complexity, security, consistent understanding, and business perspective are among the cited concerns that arise as DevOps grows.
Updated August 15, 2019
by
Tom Smith
CORE
·
15,008 Views
·
3 Likes
Runtime-Patching in Mule 4
Explore runtime-patching in Mule 4.
August 13, 2019
by
Manish Kumar
·
16,287 Views
·
3 Likes
Custom JWT Generator in WSO2 API Manager
Create a custom JWT generator with WSO2 API Manager (2.6.0)
August 13, 2019
by
Anupam Gogoi
·
9,376 Views
·
3 Likes
Verifying Service Mesh TLS in Kubernetes, Using Ksniff and Wireshark
An overview of Service Mesh TIs in Kubernetes, based on the author's personal findings.
Updated August 12, 2019
by
Daniel Bryant
·
5,286 Views
·
3 Likes
Trust and Openness Are Key to Innovation
The message seems increasingly clear: If you want innovation, then openness is a prerequisite.
Updated August 9, 2019
by
Adi Gaskell
·
11,345 Views
·
2 Likes
Creating Self-Signed Certificate
Read on to view a step-by-step tutorial on how to create a Self Signed Certificate. This includes instructions on how to create a pk12 certificate and how to convert it.
Updated August 7, 2019
by
Satheesh Kumar
·
51,873 Views
·
11 Likes
SSO — WSO2 API Manager and Keycloak
Implement SSO and see how to debug the WSO2 API Manager.
August 6, 2019
by
Anupam Gogoi
·
19,058 Views
·
7 Likes
Four Most Used REST API Authentication Methods
Get the four most used REST API authentication methods.
Updated August 6, 2019
by
Guy Levin
·
130,823 Views
·
15 Likes
Five Best Practices for GoLang CI/CD
Create CI/CD workflows with Artifactory and GoLang.
August 6, 2019
by
Ankush Chadha
·
14,944 Views
·
3 Likes
Decision Diffie-Hellman DDH and CDH
Easily handle DDH and CDH issues.
August 2, 2019
by
John Cook
·
5,070 Views
·
2 Likes
Secrets Manager in Anypoint Platform
Learn more about Secrets Manager in Anypoint Platform.
July 31, 2019
by
Nitin Gupta
CORE
·
16,464 Views
·
6 Likes
Add Login to Your Spring Boot App in 10 Mins
Learn more about building form-based authentication into your Spring Boot 2.1 app.
July 30, 2019
by
Andrew Hughes
·
166,112 Views
·
16 Likes
DuckDuckGo Has a Privacy Problem
Potential privacy issues in DuckDuckGo.
July 29, 2019
by
Christian Stewart
·
186,790 Views
·
2 Likes
Open ID Connect Authentication With OAuth2.0 Authorization
How Open ID Connect and OAuth2.0 allow for full-authentication.
July 26, 2019
by
Hanil Kathuria
·
32,064 Views
·
11 Likes
Cloud vs. On-Premise Software Deployment – What’s Right for You?
As the two main methods of software deployment, it's important to compare both cloud and on-premise deployment to see what's best.
July 25, 2019
by
David Hallinan
·
24,505 Views
·
3 Likes
Previous
...
108
109
110
111
112
113
114
115
116
117
...
Next