- Accelerated PyTorch inference with torch.compile on AWS Graviton processors >_
- Accenture creates a custom memory-persistent conversational user experience using Amazon Q Business >_
- Access control for vector stores using metadata filtering with Knowledge Bases for Amazon Bedrock >_
- Adversarial unsanitized input may cause MongoDB Rust Driver to issue unintended commands. (CVE-2024-6382) >_
- Applying Fundamentals of Prompt Engineering with Prompt Builder >_
- Autoscaling in SingleStore Helios® >_
- Better Kubernetes at the Edge with Argo CD and Codefresh >_
- Build an extendable multichannel messaging platform >_
- Cilium Gateway API: Bridging Networks Beyond Envoy Proxies >_
- Cilium: Installing Cilium in GKE with no Kube-Proxy >_
- Create an end-to-end serverless digital assistant for semantic search with Amazon Bedrock >_
- Deploying your Microservices Architecture App in App Platform using Managed Kafka >_
- Detecting Kernel Memory Leaks using adaptivemm >_
- Develop C++ unit testing with Catch2, JUnit, and GitLab CI >_
- Examining the Polyfill Attack from Akamai's Point of View >_
- Folio: A Simple, Solid, Open-Source Markdown Note App >_
- Google Opens $250K Bug Bounty Contest for VM Hypervisor >_
- GraphRAG: New tool for complex data discovery now on GitHub >_
- HashiCorp State of Cloud Strategy Survey 2024: Forrester’s key recommendations >_
- How Cyber Security Teams Should React to a Potential Data Breach >_
- How To Install and Manage Software From Source Using GNU Stow In Linux >_
- How to Configure Flask Application Visible on the Network >_
- How to Create a User with Socket Authentication in MySQL/MariaDB >_
- How to Host a Website with Apache & SSL on Debian 12 >_
- Improving Your Zig Language Server Experience >_
- Introduction To Big Data >_
- Introduction to Chmod Recursive >_
- Kickstart Your Kubernetes Security >_
- Krumware Shines at SUSECON 2024: Awarded Rising Star in Emerging Technology Solutions >_
- LSOF: How to List Open Files in Unix Systems >_
- Microsoft's WSL2 Transitions to Linux 6.6 LTS Kernel >_
- Migrate specific MySQL databases using Database Migration Service >_
- MongoDB C Driver bson_strfreev may be susceptible to integer overflow (CVE-2024-6381) >_
- MongoDB vs. Relational Databases: A Comprehensive Guide >_
- Moving to Native Sidecars >_
- Multi-primary multi-cluster setup in OpenShift Service Mesh >_
- My Service Mesh journey with Terraform on AWS Cloud - Part 1 >_
- MySQL 9.0 Community Edition: A Quick Peek >_
- New OpenSSH Vulnerability Could Lead to RCE as Root on Linux Systems >_
- Parsing CSV files in Ruby >_
- Personal ASNs From India >_
- Python's Built-in Functions: A Complete Exploration >_
- Recapping Microsoft Build 2024 >_
- Regresshion vulnerability: Recommended actions and steps we've taken >_
- Scaling Explained Through Kubernetes HPA, VPA, KEDA & Cluster Autoscaler >_
- See What’s Inside a WAL File Using pg_waldump and pg_walinspect >_
- Talk Python to Me: #468: Python Trends Episode 2024 >_
- The Dataset Convening: A community workshop on open AI datasets >_
- Transitioning Your Generative AI Apps From Rockset to SingleStore: A Guide for Engineers >_
- Understanding Amazon Aurora MySQL storage space utilization >_
- Unlocking Efficiency and Performance: Navigating the Spark 3 and EMR 6 Upgrade Journey at Slack >_
- Want Your Third Parties To Take Security Seriously? >_
- What is Kubetools Recommender System and What problem does it solve? >_
- Zato Blog: Understanding API rate-limiting techniques >_
- Zero Trust Is Revolutionizing API Security in Financial Services >_