2025-06-17
- AIOps and Linux Careers: Future-Proofing Your IT Skillset >_
- AWS Auth Caching Strategies >_
- AWS Backup adds new Multi-party approval for logically air-gapped vaults >_
- AWS Certificate Manager introduces exportable public SSL/TLS certificates to use anywhere >_
- AWS re:Inforce roundup 2025: top announcements >_
- Amazon CloudFront simplifies web application delivery and security with new user-friendly interface >_
- Amazon GuardDuty expands Extended Threat Detection coverage to Amazon EKS clusters >_
- An innovative financial services leader finds the right AI solution: Robinhood and Amazon Nova >_
- Axolotl meets LLM Compressor: Fast, sparse, open >_
- Azure CDN for Static Assets, APIs, and Front Door >_
- Azure DevOps MCP Server, Public Preview >_
- Beyond compute: Shifting vulnerability detection left with Amazon Inspector code security capabilities >_
- Build conversational interfaces for structured data using Amazon Bedrock Knowledge Bases >_
- Building resilient applications: design patterns for handling database outages >_
- Configure and customize Kubernetes Monitoring easier with Alloy Operator >_
- Create Pull Request With GitHub Actions >_
- Distribute Your Argo CD Applications to Different Kubernetes Clusters Using Application Sets >_
- Exploring Python's list Data Type With Examples >_
- Falco is now available as an Amazon EKS add-on >_
- GKE workload scheduling: Strategies for when resources get tight >_
- Gemini 2.5: Updates to our family of thinking models >_
- How AWS is simplifying security at scale: Four keys to faster innovation from AWS re:Inforce 2025 >_
- How Anomalo solves unstructured data quality issues to deliver trusted assets for AI with AWS >_
- How to Add a Custom Node in n8n for GCP integration: A Practical Guide >_
- How to run vLLM on CPUs with OpenShift for GPU-free inference >_
- Improve your security posture using Amazon threat intelligence on AWS Network Firewall >_
- Introducing the new console experience for AWS WAF >_
- Managing usernames and passwords in-house is so 2020 >_
- Network Latency: Types, Causes, and Fixes >_
- New AWS Shield feature discovers network security issues before they can be exploited (Preview) >_
- New methods boost reasoning in small and large language models >_
- Percona Software for MongoDB Release Plan Updates >_
- SUSE Linux Enterprise 15 SP7 – Your Safe Harbor for Decade-Long IT Investments, Available Today! >_
- Scale AI transformation with Azure Essentials: AI Center of Excellence guidance >_
- Secure your Express application APIs in minutes with Amazon Verified Permissions >_
- Transforming Maritime Operations with Cloud-Native Edge Computing >_
- Unify your security with the new AWS Security Hub for risk prioritization and response at scale (Preview) >_
- Verify internal access to critical AWS resources with new IAM Access Analyzer capabilities >_
- Webinar: Build Resilient Architectures with LINBIT SDS and Oracle Virtualization >_
- What’s new for developers in Red Hat OpenShift 4.19 >_