DEV Community

# trending

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Secure APIs in Microservices

How to Secure APIs in Microservices

Comments
2 min read
What is a Network Operations Center (NOC)

What is a Network Operations Center (NOC)

Comments
2 min read
How to Use Generative AI for Video Production?

How to Use Generative AI for Video Production?

1
Comments 1
2 min read
Securing Software Supply Chains with SLSA

Securing Software Supply Chains with SLSA

Comments
3 min read
Using Apache Flink for Real-time Stream Processing in Data Engineering

Using Apache Flink for Real-time Stream Processing in Data Engineering

2
Comments
3 min read
Generative AI vs. Traditional AI: Key Differences and Use Cases

Generative AI vs. Traditional AI: Key Differences and Use Cases

1
Comments
2 min read
Understanding OAI and OAC in AWS CloudFront: Concepts, Configuration, and Best Practices

Understanding OAI and OAC in AWS CloudFront: Concepts, Configuration, and Best Practices

Comments
2 min read
Implementing GitOps with ArgoCD

Implementing GitOps with ArgoCD

Comments
3 min read
Introduction to cloud data engineering with AWS

Introduction to cloud data engineering with AWS

Comments
5 min read
Restoring a Backup Stored in S3 to an EC2 Instance Using XtraBackup

Restoring a Backup Stored in S3 to an EC2 Instance Using XtraBackup

Comments
2 min read
Understanding COW and MOR in Apache Hudi: Choosing the Right Storage Strategy

Understanding COW and MOR in Apache Hudi: Choosing the Right Storage Strategy

Comments
2 min read
ETL vs. ELT: Which Data Integration Approach is Right for You?

ETL vs. ELT: Which Data Integration Approach is Right for You?

2
Comments 1
3 min read
IaC Security Analysis: Checkov vs. tfsec vs. Terrascan – A Comparative Evaluation

IaC Security Analysis: Checkov vs. tfsec vs. Terrascan – A Comparative Evaluation

2
Comments
3 min read
How Security as Code Transforms Your DevSecOps Strategy

How Security as Code Transforms Your DevSecOps Strategy

2
Comments
3 min read
Why Vulnerability Assessments are Critical for Enterprise Security?

Why Vulnerability Assessments are Critical for Enterprise Security?

1
Comments
3 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.