2025-06-17

  • AIOps and Linux Careers: Future-Proofing Your IT Skillset >_
  • AWS Auth Caching Strategies >_
  • AWS Backup adds new Multi-party approval for logically air-gapped vaults >_
  • AWS Certificate Manager introduces exportable public SSL/TLS certificates to use anywhere >_
  • AWS re:Inforce roundup 2025: top announcements >_
  • Amazon CloudFront simplifies web application delivery and security with new user-friendly interface >_
  • Amazon GuardDuty expands Extended Threat Detection coverage to Amazon EKS clusters >_
  • An innovative financial services leader finds the right AI solution: Robinhood and Amazon Nova >_
  • Axolotl meets LLM Compressor: Fast, sparse, open >_
  • Azure CDN for Static Assets, APIs, and Front Door >_
  • Azure DevOps MCP Server, Public Preview >_
  • Beyond compute: Shifting vulnerability detection left with Amazon Inspector code security capabilities >_
  • Build conversational interfaces for structured data using Amazon Bedrock Knowledge Bases >_
  • Building resilient applications: design patterns for handling database outages >_
  • Configure and customize Kubernetes Monitoring easier with Alloy Operator >_
  • Create Pull Request With GitHub Actions >_
  • Distribute Your Argo CD Applications to Different Kubernetes Clusters Using Application Sets >_
  • Exploring Python's list Data Type With Examples >_
  • Falco is now available as an Amazon EKS add-on >_
  • GKE workload scheduling: Strategies for when resources get tight >_
  • Gemini 2.5: Updates to our family of thinking models >_
  • How AWS is simplifying security at scale: Four keys to faster innovation from AWS re:Inforce 2025 >_
  • How Anomalo solves unstructured data quality issues to deliver trusted assets for AI with AWS >_
  • How to Add a Custom Node in n8n for GCP integration: A Practical Guide >_
  • How to run vLLM on CPUs with OpenShift for GPU-free inference >_
  • Improve your security posture using Amazon threat intelligence on AWS Network Firewall >_
  • Introducing the new console experience for AWS WAF >_
  • Managing usernames and passwords in-house is so 2020 >_
  • Network Latency: Types, Causes, and Fixes >_
  • New AWS Shield feature discovers network security issues before they can be exploited (Preview) >_
  • New methods boost reasoning in small and large language models >_
  • Percona Software for MongoDB Release Plan Updates >_
  • SUSE Linux Enterprise 15 SP7 – Your Safe Harbor for Decade-Long IT Investments, Available Today! >_
  • Scale AI transformation with Azure Essentials: AI Center of Excellence guidance >_
  • Secure your Express application APIs in minutes with Amazon Verified Permissions >_
  • Transforming Maritime Operations with Cloud-Native Edge Computing >_
  • Unify your security with the new AWS Security Hub for risk prioritization and response at scale (Preview) >_
  • Verify internal access to critical AWS resources with new IAM Access Analyzer capabilities >_
  • Webinar: Build Resilient Architectures with LINBIT SDS and Oracle Virtualization >_
  • What’s new for developers in Red Hat OpenShift 4.19 >_