Are you doing DevOps for enterprise right? Are foreign keys unscalable? These questions and more answered in today's Daily Digest! [DZone]( July 10, 2022 DZone Daily Picks Are you doing DevOps for enterprise right? Are foreign keys unscalable? These questions and more are answered in today's Daily Digest! [New Refcard]( [[NEW] Monitoring and the ELK Stack]( Explore the basic components of the ELK Stack, how it maps to a log analysis workflow, step-by-step instructions for installation, and more. [Read the Refcard >]( Daily Picks [DevOps for Enterprise â Are You Doing It Right?]( [Heena Soni > DevOps Zone]( [Are Foreign Keys Unscalable?]( [Lukas Vileikis > Database Zone]( [NativeScript vs. Flutter: A Comparison for Tech Businesses and Entrepreneurs]( [Sanjay Kidecha > Web Dev Zone]( [Everything You Need to Know About Building MVP With React and Firebase]( [Amit Gupta > Web Dev Zone]( [Architecture as Code With C4 and Plantuml]( [Bertrand Florat > Microservices Zone]( New Downloads from DZone [TREND REPORT] [Low Code and No Code]( DZoneâs 2022 Trend Report on Low Code and No Code: Automation for the Modern Organization provides expert perspectives on how to best leverage no-code and low-code practices for automation and speed to release. We present a historical perspective on no and low code, offer advice on how to migrate legacy applications to low code, dive into the challenges of securing no- and low-code environments, share insights into no- and low-code testing, discuss how low code is playing a major role in the democratization of software development, and more. [Free Download >]( [REFCARD] [Continuous Delivery Pipeline Security Essentials]( As the threat landscape continuously evolves, it is crucial for organizations to adopt a shift left for security mindset â ensuring that security is prioritized and its importance equated to that of automation and collaboration among distributed teams. In this Refcard, youâll review the challenges associated with integrating security practices into a continuous delivery pipeline, including the blockers development teams in particular often face. Also covered are the key areas to consider when administering and maintaining security of CD pipelines. [Free Download >]( [REFCARD] [Getting Started With Serverless Application Architecture]( The serverless model can free technical teams from the more monotonous development work, allowing them to focus on innovation. And using a serverless database to build cloud-native apps amplifies such benefits due to its ability to scale without being hindered by fragmented data across independently deployed services. This Refcard dives straight into building a serverless Java web application. You'll find a list of tools needed to follow the tutorial as well as comprehensive step-by-step instructions, code snippets, and a companion repository for the sample serverless application. [Free Download >]( [REFCARD] [Continuous Delivery Patterns and Anti-Patterns]( The goal for a successful continuous delivery process is to minimize the time it takes for development teams to go from idea to usable software by practicing agile techniques and automating the entire software delivery system: build, deploy, test, release. This Refcard explains detailed patterns and anti-patterns for core areas of CD, including the delivery and deployment phases, rollbacks, pipeline observability and monitoring, documentation, as well as communication across teams and within the organization. [Free Download >]( [ON-DEMAND WEBINAR] [5 Real-World Mobile App Security Scenarios]( Mobile is an increasingly important part of the customer experience that organizations deliver and differentiate on. And yet many assume that mobile applications are not worth protecting because they don't present material risk. This is not true, but that perception is perpetuated by a belief that the mobile platform provides a secure environment, or that the responsibility for security is on the person using a mobile device. In this webinar, we'll uncover commonly held assumptions about mobile security, explore several real-world mobile security scenarios, and more. [Free Download >]( [facebook]( [twitter]( [linkedin]( [youtube]( [Help](mailto:support@dzone.com) | [Manage Email Preferences]( `ep7xn9vpt`}}) | [View Online]( DZone, 600 Park Offices Dr, Suite 300, Research Triangle Park, NC 27709 © DZone 2022