2025-03-17
- 10 tips for better Backstage Software Templates >_
- 6 Best Free and Open Source PHP Microframeworks >_
- A powerful free and open source WAF – UUSEC WAF >_
- AI in Network Observability: The Dawn of Network Intelligence >_
- AWS KMS CloudWatch metrics help you better track and understand how your KMS keys are being used >_
- AWS Weekly Roundup: AWS Pi Day, Amazon Bedrock multi-agent collaboration, Amazon SageMaker Unified Studio, Amazon S3 Tables, and more >_
- Accelerate AI/ML workloads using Cloud Storage hierarchical namespace >_
- Advancing account security as part of Cloudflare’s commitment to CISA’s Secure by Design pledge >_
- Angular Modules vs Components >_
- Announcing Connect End of Support: Timeline and Next Steps >_
- Announcing OSV-Scanner V2: Vulnerability scanner and remediation tool for open source >_
- Are Your AWS CloudTrail Costs Out of Control? Here’s Why >_
- BitM Up! Session Stealing in Seconds Using the Browser-in-the-Middle Technique >_
- Chaos in Cloudflare’s Lisbon office: securing the Internet with wave motion >_
- Cloud Composer 3: The next generation of data pipeline orchestration >_
- Co-op mode: New partners driving the future of gaming with AI >_
- Conventional cryptography is under threat. Upgrade to post-quantum cryptography with Cloudflare Zero Trust >_
- Cutting digital curbs: How Azure AI Foundry is building a more accessible world >_
- Debian 12.10 Rolls Out with Security and Stability Improvements >_
- Debian 12.10 “Bookworm” Released with 66 Bug Fixes and 43 Security Updates >_
- Debian: DSA-5879-1: opensaml Security Advisory Updates >_
- Distributed Tracing: An Advanced Guide for DevOps & SREs >_
- Email Security now available for free for political parties and campaigns through Cloudflare for Campaigns >_
- Enhanced security and simplified controls with automated botnet protection, cipher suite selection, and URL Scanner updates >_
- Enhancing multiplayer games with gen AI and cloud gaming: a technical deep dive >_
- Failed to create sink input: sink is suspended on Arch Linux >_
- Gemini in Workspace apps and the Gemini app are first to achieve FedRAMP High authorization >_
- GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories >_
- GitLab achieves PCI DSS Attestation of Compliance >_
- Grouping database tables in AWS DMS tasks for Oracle source engine >_
- Hackers Exploiting TP-Link Vulnerability to Gain Root Access >_
- How Cloudflare is using automation to tackle phishing head on >_
- How the IntelliJ Infrastructure Team Cuts Build Execution Time by 30% With TeamCity >_
- How to Customize Messages from Sentry to Slack >_
- How to Restore Deleted Files Under /etc Directory in Ubuntu >_
- How to build the ultimate March Madness dashboard in Grafana >_
- Intelligent healthcare assistants: Empowering stakeholders with personalized support and data-driven insights >_
- Less War, More Room: Breaking Down Operational Silos >_
- Offline PKI using 3 YubiKeys and an ARM single board computer >_
- Password reuse is rampant: nearly half of observed user logins are compromised >_
- Percona Server for MySQL 8.4.2 vs 8.0.40: Comparison of Variables and Keywords >_
- Software Supply Chain Security - OWASP Cheat Sheet Series >_
- Switching From Windows to Linux: A Step-by-Step Migration Guide >_
- Syslog Servers Explained: How They Help with Logging >_
- The latest in Kubernetes Monitoring: new features to track persistent storage, simplify alerting, and more >_
- Use pgactive for rolling major version upgrades in Amazon RDS for PostgreSQL >_
- Zato Blog: How to correctly integrate APIs in Python >_
- systemctl: The Complete Guide to Managing Linux Services >_