Dzone

The Next Big Thing: How Generative AI Is Reshaping DevOps in the Cloud

As businesses grow and cloud systems get more complex, traditional DevOps methods struggle to keep up with fast changes. That’s where Generative AI comes in. This new technology is changing how applications are made and used. It is also evolving DevOps practices by automating repetitive tasks, impro ...

How to Test PATCH Requests for API Testing With Playwright Java

Automated API testing offers multiple benefits, including speeding up the testing lifecycle and providing faster feedback. It helps in enhancing the efficiency of the APIs and allows teams to deliver the new features speedily to the market. There are multiple tools and frameworks available in the ma ...

Idea to Running: One Minute

Getting things right requires iteration. And we all know that requires running screens — they engage users far more than documents or wireframes. Framework complexity leads to this unpleasant situation: months of effort to get running screens, only then to uncover a misunderstanding. Ouch. Low co ...

Exploring the New Boolean Data Type in Oracle 23c AI

This exciting release of Boolean Data Type Lab for Oracle Database 23c AI introduces native support for the boolean data type, a game-changer for database developers. With this enhancement, you can natively represent true, false, and null values, simplifying data modeling and making SQL and PL/SQL d ...

Using Java Class Extension Library for Data-Oriented Programming - Part 2

This is the second article that presents an object-oriented programming (OOP) approach to effectively separate data from domain-specific logic in data-oriented programming, utilizing the dynamic class extensions using the Java Class Extension Library. You can read the first article there. Problem Le ...

Java Application Containerization and Deployment

Application containerization provides a way to combine all required app resources into a single, standardized, easily manageable package. And for Java applications, containerization helps solve the majority of challenges related to portability and consistency. This Refcard walks readers step by step ...

Redefining Ethical Web Scraping in the Wake of the Generative AI Boom

Public web data is being used for various purposes, from impactful research to creating and improving products. One of the most common ways to acquire such data is through web scraping. Because it involves gathering large amounts of data published by businesses or individuals online, it raises quest ...

How to Write for DZone Publications: Trend Reports and Refcards

The DZone team is thrilled that you're interested in writing for DZone Publications! We are always seeking new authors to build up our author database. However, DZone Publications operate a bit differently from DZone site articles. Keep reading to learn more about writing for DZone Publications. How ...

Automating Atlassian Data Center Application Upgrades

Atlassian applications like Jira, Jira Service Management (JSM), Confluence, and Bitbucket are indispensable business tools worldwide. However, maintaining their security, stability, and performance requires regular updates to patch vulnerabilities, enhance features, and improve overall efficiency. ...

Zero Trust for AI: Building Security from the Ground Up

As artificial intelligence (AI) continues to revolutionize industries, its role in critical applications continues to grow exponentially. With all this innovation comes a growing concern — how do we keep AI systems secure? Unlike traditional applications, AI deals with highly sensitive data, intrica ...

Foundational Building Blocks for AI Applications

Startups are revolutionizing their growth trajectory by harnessing AI technologies. From intelligent chatbots handling customer inquiries to sophisticated recommendation systems personalizing user experiences, AI tools are enabling small teams to achieve outsized impact. Modern startups can now auto ...

Managing Orphaned Users in SQL Server: A Comprehensive Guide

Managing orphaned users in SQL Server is critical to database security and administration. Orphaned users occur when a database user exists without a corresponding login in the master database. This mismatch can disrupt access and lead to potential security vulnerabilities. In this article, we'll ex ...

Key Considerations for On-Premise to Cloud Data Warehouse Migration

Migrating your on-premise data warehouse to the cloud — an efficient and scalable storage solution — requires thorough planning. You'll need to evaluate cost impact, scalability benefits, performance gains, governance structures, and compliance requirements, not to mention security and privacy impli ...

5 Signs You’ve Built a Secretly Bad Architecture (And How to Fix It)

In the hustle to deliver value, development teams can unknowingly create software architectures that hinder their long-term progress. Initially, everything seems fine — features are shipping, continuous integration (CI) jobs are passing, and the product actually works. Yet, beneath the apparent prog ...

Delta Live Tables in Databricks: A Guide to Smarter, Faster Data Pipelines

Data pipelines are the main arteries of any organization that functions in the data economy. However, building and maintaining them can be a complex, time-consuming process and can be quite frustrating for data engineers. Maintaining data quality, maintaining data processes, and processing data in r ...

Can Pure Scrum Actually Work?

Can you rely on pure Scrum to transform your organization and deliver value? Not always. While Scrum excels in simplicity and flexibility, applying it “out of the box” often falls short in corporate contexts due to limitations in product discovery, scaling, and portfolio management. This article exp ...

A Comprehensive Guide to Prompt Engineering

Prompt engineering is the art and science of crafting inputs to guide AI models in generating desired outputs. This involves designing and refining prompts — questions, instructions, or statements — to effectively communicate with AI language models. The quality and structure of these prompts direct ...

Differences Between Software Design and Software Architecture

When discussing software design and software architecture, the first question that often arises is: What do these terms mean? Despite their importance in software development, they usually need to be understood, with definitions that vary widely depending on the source. This ...

Charge Vertical Scaling With the Latest Java GCs

In the dynamic landscape of Java ecosystem enhancements, one could miss an important progress that has been made in Java Garbage Collection (GC) in recent years. Meanwhile, the latest generations of GC bring far-reaching consequences for running Java applications. This article intends to highlight t ...

Observability 2.0: The Best Thing Since Sliced Bread

Traditional monitoring is not enough. We need developer-centric solutions that only Observability 2.0 can give us. Read on to see why. Beyond Traditional Monitoring In today's software development landscape, creating cutting-edge applications requires an acute focus on the developers who craft these ...

Deploying LLMs Securely With OWASP Top 10

Generative Artificial Intelligence (GenAI) adoption is picking up pace. According to McKinsey, the rate of implementation has doubled compared to just ten months prior, with 65 percent of respondents saying their companies regularly use GenAI. The promise of disruptive impact to existing businesses ...

How to Optimize Edge Devices for AI Processing

Edge computing allows data to be processed on devices rather than transferred to the cloud. Besides offering security-related benefits, this option can overcome the latency associated with moving information. As artificial intelligence (AI) has become more prominent in various industries, more peopl ...

Implementing OneLake With Medallion Architecture in Microsoft Fabric

OneLake in Microsoft Fabric aims to provide an enterprise with a consolidated analytical approach by developing its data and tools into one logical base. OneLake, which is automatically available across all Microsoft Fabric tenants, enables users to manage large volumes of data without the need to b ...

Using the Log Node in IBM App Connect Enterprise

In the world of IBM App Connect Enterprise (ACE), effective logging is crucial for monitoring and troubleshooting. With the introduction of the Log node, it's now easier than ever to log ExceptionList inserts directly into the activity log, which can be viewed from the WebUI. The Log node can be esp ...