Today, discover the new profiles on DZone, decompose legacy systems into microservices, and learn about chopping the monolith in a smarter way. [DZone]( December 05, 2023 DZone Daily Digest Today, discover the new profiles on DZone, decompose legacy systems into microservices, and learn about chopping the monolith in a smarter way. Daily Picks [New Profiles Now on DZone!] [New Profiles Now on DZone!]( [Jason Cockerham > Career Development]( [Decompose Legacy System Into Microservices: Part 2] [Decompose Legacy System Into Microservices: Part 2]( [Somasundaram Kumarasamy > Microservices]( [Configuring Spark-Submit] [Configuring Spark-Submit]( [Dheeraj Gupta > Big Data]( [Chopping the Monolith in a Smarter Way] [Chopping the Monolith in a Smarter Way]( [Nicolas Fränkel > Databases]( [Empowering Secure Access: Unleashing the Potential of Microsoft Entra ID Application Proxy] [Empowering Secure Access: Unleashing the Potential of Microsoft Entra ID Application Proxy]( [Shivaprasad Sankesha Narayana > Security]( New Downloads from DZone [Cloud-Native Application Security] NEW TREND REPORT! [Observability and Application Performance]( In DZone's 2023 Observability and Application Performance Trend Report, we delve into emerging trends, covering everything from site reliability and app performance monitoring to observability maturity and AIOps, in our original research. Readers will also find insights from members of the DZone Community, who cover a selection of hand-picked topics, including the benefits and challenges of managing modern application performance, distributed cloud architecture considerations and design patterns for resiliency, observability vs. monitoring and how to practice both effectively, SRE team scalability, and more. [Free Download >]( [Real-Time Data Architecture Patterns] [REFCARD] [Real-Time Data Architecture Patterns]( Improving an organization's overall data capabilities enables teams to operate more efficiently, and emerging technologies have even brought real-time data closer to business users, which plays a critical role in effective decision-making. [Free Download >]( [Core PostgreSQL] [REFCARD] [Getting Started With CI/CD Pipeline Security]( The increasingly distributed nature of CI/CD frameworks has made organizations more vulnerable to attacks, which can range from threats to supply chains and servers to exploitations of the application code itself. In this Refcard, you'll learn about the primary focus areas of CI/CD pipeline security, review common pipeline threats and security challenges, as well as walk through nine steps to get started with securing your pipelines. [Free Download >]( [Identity and Access Management]( [REFCARD] [Identity and Access Management]( Core Practices to Secure Digital Identities: Given the rise in identity-focused breaches and the continuously growing number of identities, identity and access management (IAM) has emerged as a cornerstone for safeguarding enterprise systems. By orchestrating secure authorization and authentication, IAM serves as the digital gatekeeper, granting controlled access to diverse resources â from on-premises databases to cloud-based applications. In this Refcard, we delve deep into IAM's crucial role in modern cybersecurity. We outline the primary functions and principles that underpin IAM, highlight its significance, address common challenges faced by engineering teams, and focus on the core practices. [Free Download >]( [Cloud-Native Application Security] [REFCARD] [Cloud-Native Application Security]( Patterns and Anti-Patterns: Enterprises are rapidly adopting cloud-native architectures and design patterns to help deliver business values faster, improve user experience, maintain a faster pace of innovation, and ensure high availability and scalability of their products. Cloud-native applications leverage modern practices like microservices architecture, containerization, DevOps, infrastructure-as-code, and automated CI/CD processes. This Refcard will walk through the critical challenges of cloud-native application security, demonstrate how to build security into the CI/CD pipeline, and introduce the core patterns and anti-patterns of cloud-native application security. [Free Download >]( [Facebook]( [Twitter]( [LinkedIn]( [YouTube]( [Unsubscribe]( | [FAQ]( | [Terms of Use]( | [Privacy Policy]( © 2023 TechnologyAdvice, LLC. All rights reserved. DZone is a TechnologyAdvice media brand. This is a marketing email from TechnologyAdvice, 3343 Perimeter Hill Dr., Suite 100, Nashville, TN 37211, USA. Please do not reply to this message. To contact us, please click [here](.