2024-07-02

  • Accelerated PyTorch inference with torch.compile on AWS Graviton processors >_
  • Accenture creates a custom memory-persistent conversational user experience using Amazon Q Business >_
  • Access control for vector stores using metadata filtering with Knowledge Bases for Amazon Bedrock >_
  • Adversarial unsanitized input may cause MongoDB Rust Driver to issue unintended commands. (CVE-2024-6382) >_
  • Applying Fundamentals of Prompt Engineering with Prompt Builder >_
  • Autoscaling in SingleStore Helios® >_
  • Better Kubernetes at the Edge with Argo CD and Codefresh >_
  • Build an extendable multichannel messaging platform >_
  • Cilium Gateway API: Bridging Networks Beyond Envoy Proxies >_
  • Cilium: Installing Cilium in GKE with no Kube-Proxy >_
  • Create an end-to-end serverless digital assistant for semantic search with Amazon Bedrock >_
  • Deploying your Microservices Architecture App in App Platform using Managed Kafka >_
  • Detecting Kernel Memory Leaks using adaptivemm >_
  • Develop C++ unit testing with Catch2, JUnit, and GitLab CI >_
  • Examining the Polyfill Attack from Akamai's Point of View >_
  • Folio: A Simple, Solid, Open-Source Markdown Note App >_
  • Google Opens $250K Bug Bounty Contest for VM Hypervisor >_
  • GraphRAG: New tool for complex data discovery now on GitHub >_
  • HashiCorp State of Cloud Strategy Survey 2024: Forrester’s key recommendations >_
  • How Cyber Security Teams Should React to a Potential Data Breach >_
  • How To Install and Manage Software From Source Using GNU Stow In Linux >_
  • How to Configure Flask Application Visible on the Network >_
  • How to Create a User with Socket Authentication in MySQL/MariaDB >_
  • How to Host a Website with Apache & SSL on Debian 12 >_
  • Improving Your Zig Language Server Experience >_
  • Introduction To Big Data >_
  • Introduction to Chmod Recursive >_
  • Kickstart Your Kubernetes Security >_
  • Krumware Shines at SUSECON 2024: Awarded Rising Star in Emerging Technology Solutions >_
  • LSOF: How to List Open Files in Unix Systems >_
  • Microsoft's WSL2 Transitions to Linux 6.6 LTS Kernel >_
  • Migrate specific MySQL databases using Database Migration Service >_
  • MongoDB C Driver bson_strfreev may be susceptible to integer overflow (CVE-2024-6381) >_
  • MongoDB vs. Relational Databases: A Comprehensive Guide >_
  • Moving to Native Sidecars >_
  • Multi-primary multi-cluster setup in OpenShift Service Mesh >_
  • My Service Mesh journey with Terraform on AWS Cloud - Part 1 >_
  • MySQL 9.0 Community Edition: A Quick Peek >_
  • New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems >_
  • Parsing CSV files in Ruby >_
  • Personal ASNs From India >_
  • Python's Built-in Functions: A Complete Exploration >_
  • Recapping Microsoft Build 2024 >_
  • Regresshion vulnerability: Recommended actions and steps we've taken >_
  • Scaling Explained Through Kubernetes HPA, VPA, KEDA & Cluster Autoscaler >_
  • See What’s Inside a WAL File Using pg_waldump and pg_walinspect >_
  • Talk Python to Me: #468: Python Trends Episode 2024 >_
  • The Dataset Convening: A community workshop on open AI datasets >_
  • Transitioning Your Generative AI Apps From Rockset to SingleStore: A Guide for Engineers >_
  • Understanding Amazon Aurora MySQL storage space utilization >_
  • Unlocking Efficiency and Performance: Navigating the Spark 3 and EMR 6 Upgrade Journey at Slack >_
  • Want Your Third Parties To Take Security Seriously? >_
  • What is Kubetools Recommender System and What problem does it solve? >_
  • Zato Blog: Understanding API rate-limiting techniques >_
  • Zero Trust Is Revolutionizing API Security in Financial Services >_