2025-12-09

  • .NET 10 Networking Improvements >_
  • 10 Years of Let's Encrypt >_
  • AWS Launches Database Savings Plans, Offering Up to 35% Cost Reduction and Engine Flexibility >_
  • Advancing low‑bit quantization for LLMs: AutoRound x LLM Compressor >_
  • Announcing Azure DevOps Server General Availability >_
  • Announcing the new Jenkins Bug Bounty Program >_
  • Architecting for Failure: Lessons from the 2025 AWS and Cloudflare Outages >_
  • Authentication and authorization in a microservice architecture: Part 5 - implementing complex authorization using Oso Cloud >_
  • CVE-2025-53841: Guardicore Local Privilege Escalation Vulnerability >_
  • Canonical Extends Kubernetes Long-Term Support to 15 Years >_
  • ClamAV (Anti-Virus) as a REST application on AWS ECS >_
  • Create AI-powered chat assistants for your enterprise with Amazon Quick Suite >_
  • Dave Page: Building a RAG Server with PostgreSQL - Part 2: Chunking and Embeddings >_
  • Deploy Guacamole Native Installation from Command Line (Ubuntu) >_
  • Djot PHP: A Modern Markup Parser >_
  • Docker Joins the Agentic AI Foundation >_
  • Don't Trust, Verify: Building End-to-End Confidential Applications on Google Cloud >_
  • Event-Driven Architecture: Kafka vs. RabbitMQ vs. Pulsar – A 2025 Decision Framework >_
  • FinOps for AI >_
  • From Raw Clinical Data to AI: Building a Modern Healthcare Data Platform on AWS >_
  • From adoption to impact: Putting the DORA AI Capabilities Model to work >_
  • Hans-Juergen Schoenig: PostgreSQL High-Availability Architectures >_
  • How to Build Production-Grade Generative AI Applications >_
  • How to Explain Linux to Your Family Over the Holidays: A Survival Guide >_
  • How to Keep Remote SSH Processes Alive Even When Disconnected >_
  • How to Track Down the Real Cause of Sudden Latency Spikes >_
  • How to Turn a MySQL Unique Key Into a Primary Key >_
  • How to create on-demand local port forwarding with systemd and ssh >_
  • How to detect multi-stage attacks with runtime behavioral analytics >_
  • Implementing Feature Flags in AWS CDK: A Contributor's Guide >_
  • Integrate OpenShift Gateway API with OpenShift Service Mesh >_
  • Introducing CodeMender: an AI agent for code security >_
  • Introducing Databricks GenAI Partner Accelerators for Data Engineering & Migration >_
  • Introducing Gemma 3 270M: The compact model for hyper-efficient AI >_
  • Is Your CI/CD Tool Helping or Hindering Performance? >_
  • KDE Plasma 6.5.4 Desktop Environment Released with Numerous Bug Fixes >_
  • Keep service ownership up to date with Datadog Teams' GitHub integration >_
  • Kubernetes Made Simple: A Guide for JVM Developers >_
  • Latency Profiling in Python: From Code Bottlenecks to Observability >_
  • Learn Cloud Security Fundamentals in AWS – A Guide for Beginners >_
  • Now Available: Remote MCP for DigitalOcean Services >_
  • Nutanix Expands Capabilities for Distributed Sovereign Clouds >_
  • Nutanix NC2 is now officially supported on Google Cloud >_
  • Postgres + ClickHouse: The OSS Stack To Handle Agentic AI Scale >_
  • Real-world reasoning: How Amazon Nova Lite 2.0 handles complex customer support scenarios >_
  • Secrets Management in 2026: Vault, AWS Secrets Manager, and Beyond – A Developer’s Guide >_
  • Semantic anomaly detection in log files with Cordon >_
  • Shifting left at enterprise scale: how we manage Cloudflare with Infrastructure as Code >_
  • The Hidden Cost of Convenience: Rethinking Old ORM Patterns for Scale >_
  • Using Functional Programming in Python >_
  • Vike Releases Photon with Next-Gen JavaScript Deployment Infrastructure and Cloudflare Integration >_
  • Your AI agents, evolved: Modernize Llama Stack agents by migrating to the Responses API >_