2024-03-04

  • AWS Database How the Amazon Timehub team built a data replication framework using AWS DMS: Part 1 >_
  • AWS Database Optimize TempDB performance in Amazon RDS Custom for SQL Server using local instance storage >_
  • AWS Security Blog AWS CloudHSM architectural considerations for crypto user credential rotation >_
  • Akamai Blog 6 Ways Akamai Innovates to Strengthen Their Leadership in Application Security >_
  • Amazon Web Services AWS Weekly Roundup — New models for Amazon Bedrock, CloudFront embedded POPs, and more — March 4, 2024 >_
  • Amazon Web Services Anthropic’s Claude 3 Sonnet foundation model is now available in Amazon Bedrock >_
  • Atatus Part 2: Infrastructure Monitoring Metrics >_
  • Azure Integration Clustering the BizTalk Master Secret Server and MSDTC service on Azure IaaS >_
  • Azure Integration Logic Apps Aviators Newsletter - March 2024 >_
  • CNCF KubeCon + CloudNativeCon co-located event deep dive: DOK (Data on Kubernetes) Day Europe >_
  • CNCF Reflections after a year as a CNCF Ambassador: unexpected journeys and (hopefully) valuable insights >_
  • CNCF Upcoming KubeCon + CloudNativeCon Europe lightning talk: Demystifying Kubernetes observability with generative AI and LLMs >_
  • Cilium Cilium User Story: Scaling and Enhancing Networking in a Managed Kubernetes Service with Cilium >_
  • CloudFlare Changing the industry with CISA’s Secure by Design principles >_
  • CloudFlare Cloudflare announces Firewall for AI >_
  • CloudFlare Cloudflare launches AI Assistant for Security Analytics >_
  • CloudFlare Dispelling the Generative AI fear: how Cloudflare secures inboxes against AI-enhanced phishing >_
  • CloudFlare Introducing behavior-based user risk scoring in Cloudflare One >_
  • CloudFlare Navigating the maze of Magecart: a cautionary tale of a Magecart impacted website >_
  • CloudFlare The rise of Defensive AI: Cloudflare’s framework for defending against next-gen threats >_
  • Containers & Kubernetes Regional vs. zonal GKE clusters: making the right choice for your workloads >_
  • GCP Go slices, deleting items, and memory usage >_
  • GCP Introducing ChatGemini! >_
  • GCP Low latency highly scalable CDC solution to Bigquery >_
  • GCP Set Up and Configure a Google Cloud Environment— Google Challenge Lab Walkthrough >_
  • GCP Technique for Protecting Google Spreadsheet using Google Apps Script >_
  • GitHub Keeping repository maintainer information accurate >_
  • Google AI Google at APS 2024 >_
  • Google 4 things to remember this International Women's Day and Women's History Month >_
  • Google Google, GESDA and XPRIZE launch new competition in Quantum Applications >_
  • Google Pixel feature drop: New productivity tools and advanced health features >_
  • Grafana Labs How to perform multi-step API calls with Grafana >_
  • MemSQL A Technical Overview of SingleStore's Kai Shell >_
  • MySQL Performance Percona Operator for PostgreSQL is Red Hat OpenShift Certified >_
  • Netflix Evolving from Rule-based Classifier: Machine Learning Powered Auto Remediation in Netflix Data… >_
  • New Stack 10 Key Products for Building LLM-Based Apps on AWS >_
  • New Stack Exploring the API of Google’s Gemini Language Model >_
  • New Stack Falco Plugin for Okta Adds Context to Quickly Thwart Threats >_
  • New Stack State of FinOps Survey Points to Room for More Automation >_
  • New Stack The Black Hole That Is the Kubernetes Network >_
  • New Stack Transforming Identity and Access Management with Event Sourcing >_
  • New Stack White House Warns Against Using Memory-Unsafe Languages >_
  • New Stack Writing for Software Engineers: Beyond the Basics >_
  • New Stack Writing for Software Engineers: Read Me First >_
  • Real Python Python's __all__: Packages, Modules, and Wildcard Imports >_
  • Red Hat Test Kubernetes performance and scale with kube-burner >_
  • Stack Overflow In Rust we trust? White House Office urges memory safety >_
  • TecMint 20 Practical Examples of RPM Commands in Linux >_
  • TecMint Hardinfo2 – Check Hardware Information in Linux >_
  • AWS CloudTrail Centralized logging >_
  • AWS CodePipeline Embraces Monorepos, GitFlow and Branches >_
  • Awk: A beginners guide for humans >_
  • Azure Container Services: The Right Tool for Every Containerization Need >_
  • Building a VoIP Network with Routr on DigitalOcean Kubernetes: Part I >_
  • Closer to Serverless for Databases on Kubernetes >_
  • How to Check if Script is Called from Terminal or Sourced from Other Scripts in Bash >_
  • How to Install Immich with Docker: A Comprehensive Guide >_
  • Lee Algorithm Mazesolver >_
  • NAT Instance Tutorial >_
  • Reflection on Tools, AI, and the Role of System Design >_
  • The hater's guide to Kubernetes >_
  • Understanding Cache Invalidation Techniques >_
  • Unveiling the Mysteries of Git and GitHub: A Developer's Guide >_
  • Virtual Machines vs. Containers >_