Today, explore DDD and microservices, learn about building a dynamic chat application, and discover five steps to tame unplanned work. [DZone]( December 02, 2023 DZone Daily Digest Today, explore DDD and microservices, learn about building a dynamic chat application, and discover five steps to tame unplanned work. Daily Picks [DDD and Microservices] [DDD and Microservices]( [Somasundaram Kumarasamy > Microservices]( [The Scrum Trap] [The Scrum Trap]( [Stefan Wolpers > Agile]( [Building a Dynamic Chat Application: Setting Up ChatGPT in FastAPI and Displaying Conversations in ReactJS] [Building a Dynamic Chat Application: Setting Up ChatGPT in FastAPI and Displaying Conversations in ReactJS]( [Atul Naithani > AI/ML]( [5 Steps To Tame Unplanned Work] [5 Steps To Tame Unplanned Work]( [Allan Kelly > Methodologies]( [Unblock Your Software Engineers With Unblocked] [Unblock Your Software Engineers With Unblocked]( [Tyler Hawkins > AI/ML]( New Downloads from DZone [Cloud-Native Application Security] NEW TREND REPORT! [Observability and Application Performance]( In DZone's 2023 Observability and Application Performance Trend Report, we delve into emerging trends, covering everything from site reliability and app performance monitoring to observability maturity and AIOps, in our original research. Readers will also find insights from members of the DZone Community, who cover a selection of hand-picked topics, including the benefits and challenges of managing modern application performance, distributed cloud architecture considerations and design patterns for resiliency, observability vs. monitoring and how to practice both effectively, SRE team scalability, and more. [Free Download >]( [Real-Time Data Architecture Patterns] [REFCARD] [Real-Time Data Architecture Patterns]( Improving an organization's overall data capabilities enables teams to operate more efficiently, and emerging technologies have even brought real-time data closer to business users, which plays a critical role in effective decision-making. [Free Download >]( [Core PostgreSQL] [REFCARD] [Getting Started With CI/CD Pipeline Security]( The increasingly distributed nature of CI/CD frameworks has made organizations more vulnerable to attacks, which can range from threats to supply chains and servers to exploitations of the application code itself. In this Refcard, you'll learn about the primary focus areas of CI/CD pipeline security, review common pipeline threats and security challenges, as well as walk through nine steps to get started with securing your pipelines. [Free Download >]( [Identity and Access Management]( [REFCARD] [Identity and Access Management]( Core Practices to Secure Digital Identities: Given the rise in identity-focused breaches and the continuously growing number of identities, identity and access management (IAM) has emerged as a cornerstone for safeguarding enterprise systems. By orchestrating secure authorization and authentication, IAM serves as the digital gatekeeper, granting controlled access to diverse resources â from on-premises databases to cloud-based applications. In this Refcard, we delve deep into IAM's crucial role in modern cybersecurity. We outline the primary functions and principles that underpin IAM, highlight its significance, address common challenges faced by engineering teams, and focus on the core practices. [Free Download >]( [Cloud-Native Application Security] [REFCARD] [Cloud-Native Application Security]( Patterns and Anti-Patterns: Enterprises are rapidly adopting cloud-native architectures and design patterns to help deliver business values faster, improve user experience, maintain a faster pace of innovation, and ensure high availability and scalability of their products. Cloud-native applications leverage modern practices like microservices architecture, containerization, DevOps, infrastructure-as-code, and automated CI/CD processes. This Refcard will walk through the critical challenges of cloud-native application security, demonstrate how to build security into the CI/CD pipeline, and introduce the core patterns and anti-patterns of cloud-native application security. [Free Download >]( [Facebook]( [Twitter]( [LinkedIn]( [YouTube]( [Unsubscribe]( | [FAQ]( | [Terms of Use]( | [Privacy Policy]( © 2023 TechnologyAdvice, LLC. All rights reserved. DZone is a TechnologyAdvice media brand. This is a marketing email from TechnologyAdvice, 3343 Perimeter Hill Dr., Suite 100, Nashville, TN 37211, USA. Please do not reply to this message. To contact us, please click [here](.