2025-05-13
- A DDoS Attack Just Breached Your Defenses ? Now What? >_
- AI lifecycle risk management: ISO/IEC 42001:2023 for AI governance >_
- Amazon CloudWatch Database Insights applied in real scenarios >_
- Announcing new fine-tuning models and techniques in Azure AI Foundry >_
- Announcing the Datadog User Group Program >_
- Build and train a recommender system in 10 minutes using Keras and JAX >_
- Build scalable containerized RAG based generative AI applications in AWS using Amazon EKS with Amazon Bedrock >_
- GitHub Issues search now supports nested queries and boolean operators: Here’s how we (re)built it >_
- How Hexagon built an AI assistant using AWS generative AI services >_
- How Insights events enhance system life cycle management >_
- How to Automate Compliance and Fraud Detection in Finance with MLOps >_
- How to easily connect Prometheus to Grafana Cloud >_
- How to integrate vLLM inference into your macOS and iOS apps >_
- How to monitor Airflow metrics, logs, and lineage >_
- Introducing Linode Interfaces: Better Network Management (Open Beta) >_
- Introducing this year’s new Datadog Ambassadors >_
- Key metrics for monitoring Airflow >_
- Kubernetes v1.33: Image Pull Policy the way you always thought it worked! >_
- Mapping AWS security services to MITRE frameworks for threat detection and mitigation >_
- Monitor Airflow with Datadog >_
- Optimizing Search: How SingleStore Delivers Hybrid SQL and Specialized Search in One System >_
- Our step-by-step guide to evaluating runtime security tools >_
- Protect against advanced DNS threats with Amazon Route 53 Resolver DNS Firewall >_
- Securing Amazon Bedrock Agents: A guide to safeguarding against indirect prompt injections >_
- Visualize Databricks in Grafana: write custom SQL queries, build interactive dashboards, and more >_
- Your Essential HIPAA Compliance Checklist for 2025: Is Your Organization Ready? >_