2025-05-13

  • A DDoS Attack Just Breached Your Defenses ? Now What? >_
  • AI lifecycle risk management: ISO/IEC 42001:2023 for AI governance >_
  • Amazon CloudWatch Database Insights applied in real scenarios >_
  • Announcing new fine-tuning models and techniques in Azure AI Foundry >_
  • Announcing the Datadog User Group Program >_
  • Build and train a recommender system in 10 minutes using Keras and JAX >_
  • Build scalable containerized RAG based generative AI applications in AWS using Amazon EKS with Amazon Bedrock >_
  • GitHub Issues search now supports nested queries and boolean operators: Here’s how we (re)built it >_
  • How Hexagon built an AI assistant using AWS generative AI services >_
  • How Insights events enhance system life cycle management >_
  • How to Automate Compliance and Fraud Detection in Finance with MLOps >_
  • How to easily connect Prometheus to Grafana Cloud >_
  • How to integrate vLLM inference into your macOS and iOS apps >_
  • How to monitor Airflow metrics, logs, and lineage >_
  • Introducing Linode Interfaces: Better Network Management (Open Beta) >_
  • Introducing this year’s new Datadog Ambassadors >_
  • Key metrics for monitoring Airflow >_
  • Kubernetes v1.33: Image Pull Policy the way you always thought it worked! >_
  • Mapping AWS security services to MITRE frameworks for threat detection and mitigation >_
  • Monitor Airflow with Datadog >_
  • Optimizing Search: How SingleStore Delivers Hybrid SQL and Specialized Search in One System >_
  • Our step-by-step guide to evaluating runtime security tools >_
  • Protect against advanced DNS threats with Amazon Route 53 Resolver DNS Firewall >_
  • Securing Amazon Bedrock Agents: A guide to safeguarding against indirect prompt injections >_
  • Visualize Databricks in Grafana: write custom SQL queries, build interactive dashboards, and more >_
  • Your Essential HIPAA Compliance Checklist for 2025: Is Your Organization Ready? >_