2025-02-12

  • AI agents at work: The new frontier in business automation >_
  • Achieve Transformative Network Security With Cisco Hybrid Mesh Firewall >_
  • Achieve ~2x speed-up in LLM inference with Medusa-1 on Amazon SageMaker AI >_
  • Cisco and Wiz Collaborate to Enhance Cloud Security: Tackling AI-Generating Threats in Complex IT Infrastructures >_
  • Cloud invaders: Spotting compromised users before it’s too late >_
  • Cybercrime: A Multifaceted National Security Threat >_
  • ELK vs New Relic: Which Monitoring Tool Should You Choose in 2025? >_
  • EndeavourOS Mercury (2025.02.08) Released >_
  • Fine-tune LLMs with synthetic data for context-based Q&A using Amazon Bedrock >_
  • From concept to reality: Navigating the Journey of RAG from proof of concept to production >_
  • Go 1.24 arrives >_
  • Google Cloud Next ’25 Guide: Pro tips from SUSE >_
  • How GitHub uses CodeQL to secure GitHub >_
  • How RHOCP 4.17 enhances control plane resilience >_
  • How to Filter Docker Logs with Grep >_
  • How to cut costs for metrics and logs: a guide to lowering expenses in Grafana Cloud >_
  • LLM-as-a-judge on Amazon Bedrock Model Evaluation >_
  • Microsoft Research and Physics Wallah team up to enhance AI-based tutoring >_
  • Monitoring Your SUSE Virtualization Environment >_
  • Rails async queries by example >_
  • Supercharge Innovation Velocity by Eliminating Operational Chaos by Laura Chu >_
  • The Database Cheatsheet: Advanced Queries >_
  • The Risks of Shadow AI, and How To Use AI Safely Instead >_
  • The hidden costs of standalone digital whiteboards >_
  • Timestamp writes for write hedging in Amazon DynamoDB >_
  • Ubuntu System Logs: How to Find and Use Them >_
  • Why Multi-Linux Support Helps to Enable Modernization >_
  • Why you should check out our Next ‘25 Security Hub >_