Thanks for visiting DZone today,
Edit Profile
Manage Email Subscriptions
How to Post to DZone
Article Submission Guidelines
Sign Out
View Profile
Post
Post an Article
Manage My Drafts
Over 2 million developers have joined DZone.
Log In
/
Join
Search
Refcards
Trend Reports
Events
Video Library
Refcards
Trend Reports
Events
View Events
Video Library
The Latest Security Topics
Secure Your JHipster App With Social Login
Social login and JHipster, together, offer a simple and secure option for your customer-facing app.
May 22, 2019
by
Andrew Hughes
·
9,375 Views
·
2 Likes
Fluree: Blockchain, GraphQL, and More: All in One Database
Learn more about Fluree and listen to an interview one of our Zone Leaders had with Co-CEO Brian Platz.
Updated May 21, 2019
by
Chris Ward
CORE
·
14,726 Views
·
3 Likes
Encryption, Part 3: Hybrid Encryption
Looking for the best of both worlds when it comes to symmetric and public/private key encryption?
May 21, 2019
by
Bipin Patwardhan
·
14,928 Views
·
1 Like
Build a Simple Spring Boot App With Spring Data JPA and Postgres
Need help building a simple Spring Boot app with Spring Data JPA and Postgres?
May 17, 2019
by
Andrew Hughes
·
29,735 Views
·
12 Likes
Integrating Spring Boot and React With Spring Security: Basic and JWT Authentication
Look at this in-depth tutorial on how to integrate Spring Boot and React with Spring security.
Updated May 16, 2019
by
Ranga Rao Karanam
·
116,733 Views
·
4 Likes
Build Secure Microservices in Your Spring REST API
Here's how a secure Spring REST API can reduce some of the pain points when building a microservices architecture.
Updated May 16, 2019
by
Lindsay Brunner
·
69,597 Views
·
21 Likes
How to Get Autocomplete for Maven Dependencies in IntelliJ [Video]
Learn how to autocomplete your Maven dependencies properly with IntelliJ.
May 16, 2019
by
Marco Behler
CORE
·
11,322 Views
·
6 Likes
Spring Boot vs. Spring MVC vs. Spring: How Do They Compare?
Spring, Spring Boot, Spring MVC, there are springs everywhere! Let's walk through where and when you should apply each of these tools.
Updated May 13, 2019
by
Ranga Karanam
CORE
·
257,355 Views
·
84 Likes
Blockchain Vs Tangle: Which Is Better?
Let's look at different cryptocurrency platforms and which is the best.
Updated May 10, 2019
by
John Ryan
·
20,476 Views
·
5 Likes
How to Build a TCP Application With Node.js on ECS
Learn how to create a working TCP application which accepts TCP client connections, listens for data on them, and echoes it back to the client.
May 10, 2019
by
Leona Zhang
·
17,548 Views
·
1 Like
Java Annotated Monthly — May 2019
From security to women in tech — this month's Java Annotated Monthly has it all.
Updated May 10, 2019
by
Trisha Gee
·
14,249 Views
·
6 Likes
Real-World Refactoring: Dependency Injecting a Non-ORM Repository for ASP.NET Core
In this post, a developer shows how to refactor some old code to include dependency injection for .NET Core.
May 9, 2019
by
Jonathan Danylko
·
9,386 Views
·
2 Likes
OAuth 2 Access Token Usage Strategies for Multiple Resources (APIs): Part 1
Let's explore OAuth 2 Access Token usage strategies for multiple resources.
May 9, 2019
by
Robert Broeckelmann
·
43,227 Views
·
7 Likes
Best Practices for Efficient Log Management and Monitoring
Check out these best practices for efficient log management and monitoring practices.
May 9, 2019
by
Twain Taylor
·
9,019 Views
·
1 Like
Gradle Goodness: Use Bill of Materials (BOM) as Dependency Constraints
BOM dependency versions are actually dependency constraints in Gradle.
May 8, 2019
by
Hubert Klein Ikkink
·
40,660 Views
·
5 Likes
Pillars of AWS Well-Architected Framework
The five pillars of the AWS Well-Architected Framework are your keys to building the most reliable cloud framework possible.
May 7, 2019
by
Chandani Patel Bhagat
·
21,417 Views
·
22 Likes
How to Verify AS2 Message (SMIME) Signature With OpenSSL
Learn more about how to verify an AS2 message signature with OpenSSL.
Updated May 2, 2019
by
Rajind Ruparathna
·
10,441 Views
·
4 Likes
Build a Secure App With Spring Boot and Vue.js
Learn more about app security with Spring Boot, Vue, and Okta.
May 2, 2019
by
Andrew Hughes
·
48,656 Views
·
7 Likes
How to Protect IoT Applications With Role-Based Access Control (RBAC)
Learn more about role-based access control for IoT applications.
Updated April 29, 2019
by
Mike Mackrory
·
7,020 Views
·
1 Like
Gradle Goodness: Manage Dependency Versions With Dependency Constraints
Improve dependency management in Gradle with constraints.
April 29, 2019
by
Hubert Klein Ikkink
·
13,631 Views
·
3 Likes
Previous
...
111
112
113
114
115
116
117
118
119
120
...
Next