Today, learn about the advantage of using cache to decouple the frontend code, unlock the power of streaming, and optimize workloads with hardware insights. [DZone]( November 30, 2023 DZone Daily Digest Today, learn about the advantage of using cache to decouple the frontend code, unlock the power of streaming, and optimize workloads with hardware insights. Daily Picks [Amazon EC2 Deep Dive: Optimizing Workloads With Hardware Insights] [Amazon EC2 Deep Dive: Optimizing Workloads With Hardware Insights]( [Prithvish Kovelamudi > Cloud Architecture]( [Unlocking the Power of Streaming: Effortlessly Upload Gigabytes to AWS S3 With Node.js] [Unlocking the Power of Streaming: Effortlessly Upload Gigabytes to AWS S3 With Node.js]( [Vishal Diyora > JavaScript]( [Leveraging ''INSERT INTO ... RETURNING'': Practical Scenarios] [Leveraging "INSERT INTO ... RETURNING": Practical Scenarios]( [Alejandro Duarte > Databases]( [The Advantage of Using Cache to Decouple the Frontend Code] [The Advantage of Using Cache to Decouple the Frontend Code]( [Sergio Carracedo > Performance]( [Micro Frontends Architecture] [Micro Frontends Architecture]( [Somasundaram Kumarasamy > Microservices]( New Downloads from DZone [Cloud-Native Application Security] NEW TREND REPORT! [Observability and Application Performance]( In DZone's 2023 Observability and Application Performance Trend Report, we delve into emerging trends, covering everything from site reliability and app performance monitoring to observability maturity and AIOps, in our original research. Readers will also find insights from members of the DZone Community, who cover a selection of hand-picked topics, including the benefits and challenges of managing modern application performance, distributed cloud architecture considerations and design patterns for resiliency, observability vs. monitoring and how to practice both effectively, SRE team scalability, and more. [Free Download >]( [Real-Time Data Architecture Patterns] [REFCARD] [Real-Time Data Architecture Patterns]( Improving an organization's overall data capabilities enables teams to operate more efficiently, and emerging technologies have even brought real-time data closer to business users, which plays a critical role in effective decision-making. [Free Download >]( [Core PostgreSQL] [REFCARD] [Getting Started With CI/CD Pipeline Security]( The increasingly distributed nature of CI/CD frameworks has made organizations more vulnerable to attacks, which can range from threats to supply chains and servers to exploitations of the application code itself. In this Refcard, you'll learn about the primary focus areas of CI/CD pipeline security, review common pipeline threats and security challenges, as well as walk through nine steps to get started with securing your pipelines. [Free Download >]( [Identity and Access Management]( [REFCARD] [Identity and Access Management]( Core Practices to Secure Digital Identities: Given the rise in identity-focused breaches and the continuously growing number of identities, identity and access management (IAM) has emerged as a cornerstone for safeguarding enterprise systems. By orchestrating secure authorization and authentication, IAM serves as the digital gatekeeper, granting controlled access to diverse resources â from on-premises databases to cloud-based applications. In this Refcard, we delve deep into IAM's crucial role in modern cybersecurity. We outline the primary functions and principles that underpin IAM, highlight its significance, address common challenges faced by engineering teams, and focus on the core practices. [Free Download >]( [Cloud-Native Application Security] [REFCARD] [Cloud-Native Application Security]( Patterns and Anti-Patterns: Enterprises are rapidly adopting cloud-native architectures and design patterns to help deliver business values faster, improve user experience, maintain a faster pace of innovation, and ensure high availability and scalability of their products. Cloud-native applications leverage modern practices like microservices architecture, containerization, DevOps, infrastructure-as-code, and automated CI/CD processes. This Refcard will walk through the critical challenges of cloud-native application security, demonstrate how to build security into the CI/CD pipeline, and introduce the core patterns and anti-patterns of cloud-native application security. [Free Download >]( [Facebook]( [Twitter]( [LinkedIn]( [YouTube]( [Unsubscribe]( | [FAQ]( | [Terms of Use]( | [Privacy Policy]( © 2023 TechnologyAdvice, LLC. All rights reserved. DZone is a TechnologyAdvice media brand. This is a marketing email from TechnologyAdvice, 3343 Perimeter Hill Dr., Suite 100, Nashville, TN 37211, USA. Please do not reply to this message. To contact us, please click [here](.