2025-01-29

  • 5 Common Incident Severity Levels You Should Know >_
  • A continued focus on the benefits of Go 1.24 >_
  • Adversarial Misuse of Generative AI >_
  • An Introduction to Django Views >_
  • Article: The End of the Bronze Age: Rethinking the Medallion Architecture >_
  • Automating EC2 Instance Resizing with AWS Systems Manager (SSM) Document >_
  • Automating cybersecurity threat detections with GitLab CI/CD >_
  • Business challenges and pain points: Tailscale patterns from the field >_
  • ByteDance to Network a Million Containers with netkit >_
  • CISA Brings KEV Data to GitHub >_
  • Cloud security research and guide roundup: DevSecOps, threat detection, and AI >_
  • Cloud security research and guide roundup: Infrastructure and access >_
  • Creating an ACFS Filesystem on Exascale Volumes >_
  • Data Cleaning in Python: Techniques and Best Practices >_
  • Decoding Data Center Efficiency Metrics: A Guide to Energy and Sustainability >_
  • General availability of the Jenkins to Bitbucket Pipelines migration tool >_
  • Generative AI operating models in enterprise organizations with Amazon Bedrock >_
  • Grafana 11.5 release: easily share Grafana dashboards and panels, secure frontend code for plugins, and more >_
  • Hackers exploit critical unpatched flaw in Zyxel CPE devices >_
  • How Aqua Security exports query data from Amazon Aurora to deliver value to their customers at scale >_
  • How executives can accelerate time to value through Atlassian’s System of Work >_
  • How golden paths improve developer productivity >_
  • How to Benchmark Your Storage in Kubernetes easily? >_
  • How to Choose the Right SQL Database >_
  • How to Create a Basic CI/CD Pipeline with Webhooks on Linux >_
  • How to Hot Reload Kubernetes with Skaffold >_
  • How to Install DeepSeek Locally with Ollama LLM in Ubuntu 24.04 >_
  • How we estimate the risk from prompt injection attacks on AI systems >_
  • How we kept the Google Play & Android app ecosystems safe in 2024 >_
  • Improve AI security in GitLab with composite identities >_
  • Improve security auditing with GitLab Operational Container Scanning >_
  • Introducing custom rules in Workload Manager: Evaluate workloads against customized best practices >_
  • January newsletter: Project Bob’s global voyage + simplified networking for Apple fleets >_
  • Kubernetes Cloud Repatriation Saves Millions for Data Platform Provider >_
  • Meridian is now available to everyone >_
  • New Debian Developers and Maintainers (November and December 2024) >_
  • Outbrain: Taking control of extension security with Chrome Enterprise >_
  • Quiz: Which time management strategy is right for you? >_
  • RUM: Key Metrics and How to Measure Them >_
  • Real-world enterprise use cases: Tailscale patterns from the field >_
  • SRE Roles & Responsibilities >_
  • The New Frontier of Security: Creating Safe and Secure AI Models >_
  • Top 5 Dynatrace Alternatives: Compare Features, Pricing & More >_
  • Understanding PromQL Facets: Unlocking Advanced Metrics Analysis >_
  • View related logs and traces from a Dashboard panel >_
  • What Are Syslog Levels and Why Should You Care? >_