2024-10-24

  • AWS Client VPN Caveat: Knowing this can save you hours of troubleshooting >_
  • Adapting model risk management for financial institutions in the generative AI era >_
  • Amazon identified internet domains abused by APT29 >_
  • Automate Red Hat OpenShift on Alibaba Cloud >_
  • Autoscaling Azure DevOps Pipelines Agents with KEDA >_
  • Billions and billions (of logs): scaling AI Gateway with the Cloudflare Developer Platform >_
  • Browser testing in Grafana Cloud k6: how to optimize frontend web performance >_
  • Build durable applications on Cloudflare Workers: you write the Workflows, we take care of the rest >_
  • Building Resilient Public Networking on AWS: Part 4 >_
  • CISA Warns Active Exploitation of Microsoft SharePoint Vulnerability >_
  • Chrome on Android to support third-party autofill services natively >_
  • Create a generative AI-based application builder assistant using Amazon Bedrock Agents >_
  • Critical Cisco ASA Flaw Allows SSH Remote Command Injection >_
  • Cross-examining cybercrime at GITEX GLOBAL 2024, world’s largest tech event >_
  • DarkComet RAT – A Remote Access Tool Lets Attackers Remotely Control Windows >_
  • Datadog named a Leader in first ever 2024 Gartner® Magic Quadrant™ for Digital Experience Monitoring >_
  • Durable Objects aren't just durable, they're fast: a 10x speedup for Cloudflare Queues >_
  • Embargo Ransomware Actors Abuses Safe Mode To Disable Security Solutions >_
  • Empower innovation and transformation through AI and data-driven insights on Azure >_
  • Enhance your Amazon Redshift cloud data warehouse with easier, simpler, and faster machine learning using Amazon SageMaker Canvas >_
  • Exploring digital sovereignty: learning opportunities at re:Invent 2024 >_
  • From RAG to fabric: Lessons learned from building real-world RAGs at GenAIIC – Part 1 >_
  • GitLab Patches Critical HTML Injection Flaw Leading To XSS Attacks >_
  • GitLab vs GitHub: Ultimate Guide to Choosing the Best DevOps >_
  • Google Cloud Apigee named a Leader in the 2024 Gartner® Magic Quadrant™ for API Management >_
  • How To: Know What Happens to Hadoop with Small Files ? >_
  • How can you store persistent data for a Kubernetes application running on EKS? >_
  • How to Automate Documentation Conversion with Pandoc in CI/CD Pipelines >_
  • How to Build Your Own Private Hacking Lab with VirtualBox >_
  • How to Build a CRUD Application using React and Convex >_
  • How to Build a Simple Secure Chat System Using Netcat >_
  • How to Create a Facebook Business Page: A Quick Guide for Entrepreneurs >_
  • How to Enable/Disable Directory Listing on Nginx (in Ubuntu) >_
  • How to Grip Bronze Age Swords >_
  • How to Implement Fine-Grained Authorization in Java and SpringBoot >_
  • How to Incorporate AWS Lambda into a Distributed System >_
  • How to Secure JavaScript Applications: Common Vulnerabilities and Best Practices >_
  • How to Set Your Video as Animated Wallpaper in Ubuntu 24.04 >_
  • How to Use @Qualifier Annotation with Strategy Pattern in Spring Boot >_
  • How to Use Skeleton Screens to Improve Perceived Website Performance >_
  • How to alter default session type using D-Bus interface >_
  • How to know if the network is configured through /etc/network/interfaces, NetworkManager, Systemd or Netplan? >_
  • How to pipe input to an interactive shell in Bash >_
  • Install of Packages with NPM-Store Using AWS CodeArtifact >_
  • Intellij Idea – How to Build Project Automatically >_
  • Introduction to Apache Commons Validator >_
  • Investigating FortiManager Zero-Day Exploitation (CVE-2024-47575) >_
  • Logstash vs. Kafka >_
  • Mainsail Introduces Quantum-Hardened Security at KubeCon Salt Lake City 2024 >_
  • Managed SIEM Pricing – 2025 : A Guide to Cost and Value >_
  • Maximizing design impact with Confluence >_
  • Migrate or upgrade your like-to-like databases using AWS DMS homogeneous migration >_
  • OpenSSL 3.4 Series Release Notes >_
  • Prague PostgreSQL Developer Day 2025 / Call for Papers & Sponsors >_
  • Preparing Valgrind Memcheck for x86-64-v3 >_
  • Product Review: BlueSleuth-Lite BLE Tag Detector >_
  • Prometheus Alertmanager: What You Need to Know >_
  • Promoting Apps to Production: How To Ensure That a Change Only Deploys to Lower Environments? >_
  • Recover a Git Branch After Its Deletion >_
  • Redis Users Want a Change >_
  • Rust in Enterprise Kernels >_
  • Rust-Written Rustls Now Reportedly Outperforming OpenSSL & BoringSSL >_
  • Scrub EXIF Image Data in Your DevOps Pipeline >_
  • Spark on GKE: A Guide to using GKEStartPodOperator for Spark workloads >_
  • Super charge your LLMs with RAG at scale using AWS Glue for Apache Spark >_
  • Tailscale and 1Password Device Trust, now generally available >_
  • TechXchange: Making Real-Time Analytics and Decisioning a Reality with SingleStore, watsonx.data and IBM StreamSets >_
  • Toasty, an Async ORM for Rust >_
  • Top 10 Java Performance Optimization Tips >_
  • Tor Browser 14.0 Launches with Enhanced Security >_
  • Trace your applications end to end with Datadog and OpenTelemetry >_
  • Transitioning from Amazon Rekognition people pathing: Exploring other alternatives >_
  • Tutorial : Multi-Agent interactions with Autogen and Gemini — Part 8: Group Chat >_
  • U.S. Govt Announces Rewards Up To $10 Million For Info On Iranian Hackers >_
  • Using Entra profile information in Azure DevOps >_
  • Visualize vector embeddings stored in Amazon Aurora PostgreSQL and explore semantic similarities >_
  • What’s new in PostgreSQL 17, now available in Cloud SQL >_
  • k8s-pvc-tagger: The Swiss Army Knife of AWS EBS Tagging >_