2025-12-09
- .NET 10 Networking Improvements >_
- 10 Years of Let's Encrypt >_
- AWS Launches Database Savings Plans, Offering Up to 35% Cost Reduction and Engine Flexibility >_
- Advancing low‑bit quantization for LLMs: AutoRound x LLM Compressor >_
- Announcing Azure DevOps Server General Availability >_
- Announcing the new Jenkins Bug Bounty Program >_
- Architecting for Failure: Lessons from the 2025 AWS and Cloudflare Outages >_
- Authentication and authorization in a microservice architecture: Part 5 - implementing complex authorization using Oso Cloud >_
- CVE-2025-53841: Guardicore Local Privilege Escalation Vulnerability >_
- Canonical Extends Kubernetes Long-Term Support to 15 Years >_
- ClamAV (Anti-Virus) as a REST application on AWS ECS >_
- Create AI-powered chat assistants for your enterprise with Amazon Quick Suite >_
- Dave Page: Building a RAG Server with PostgreSQL - Part 2: Chunking and Embeddings >_
- Deploy Guacamole Native Installation from Command Line (Ubuntu) >_
- Djot PHP: A Modern Markup Parser >_
- Docker Joins the Agentic AI Foundation >_
- Don't Trust, Verify: Building End-to-End Confidential Applications on Google Cloud >_
- Event-Driven Architecture: Kafka vs. RabbitMQ vs. Pulsar – A 2025 Decision Framework >_
- FinOps for AI >_
- From Raw Clinical Data to AI: Building a Modern Healthcare Data Platform on AWS >_
- From adoption to impact: Putting the DORA AI Capabilities Model to work >_
- Hans-Juergen Schoenig: PostgreSQL High-Availability Architectures >_
- How to Build Production-Grade Generative AI Applications >_
- How to Explain Linux to Your Family Over the Holidays: A Survival Guide >_
- How to Keep Remote SSH Processes Alive Even When Disconnected >_
- How to Track Down the Real Cause of Sudden Latency Spikes >_
- How to Turn a MySQL Unique Key Into a Primary Key >_
- How to create on-demand local port forwarding with systemd and ssh >_
- How to detect multi-stage attacks with runtime behavioral analytics >_
- Implementing Feature Flags in AWS CDK: A Contributor's Guide >_
- Integrate OpenShift Gateway API with OpenShift Service Mesh >_
- Introducing CodeMender: an AI agent for code security >_
- Introducing Databricks GenAI Partner Accelerators for Data Engineering & Migration >_
- Introducing Gemma 3 270M: The compact model for hyper-efficient AI >_
- Is Your CI/CD Tool Helping or Hindering Performance? >_
- KDE Plasma 6.5.4 Desktop Environment Released with Numerous Bug Fixes >_
- Keep service ownership up to date with Datadog Teams' GitHub integration >_
- Kubernetes Made Simple: A Guide for JVM Developers >_
- Latency Profiling in Python: From Code Bottlenecks to Observability >_
- Learn Cloud Security Fundamentals in AWS – A Guide for Beginners >_
- Now Available: Remote MCP for DigitalOcean Services >_
- Nutanix Expands Capabilities for Distributed Sovereign Clouds >_
- Nutanix NC2 is now officially supported on Google Cloud >_
- Postgres + ClickHouse: The OSS Stack To Handle Agentic AI Scale >_
- Real-world reasoning: How Amazon Nova Lite 2.0 handles complex customer support scenarios >_
- Secrets Management in 2026: Vault, AWS Secrets Manager, and Beyond – A Developer’s Guide >_
- Semantic anomaly detection in log files with Cordon >_
- Shifting left at enterprise scale: how we manage Cloudflare with Infrastructure as Code >_
- The Hidden Cost of Convenience: Rethinking Old ORM Patterns for Scale >_
- Using Functional Programming in Python >_
- Vike Releases Photon with Next-Gen JavaScript Deployment Infrastructure and Cloudflare Integration >_
- Your AI agents, evolved: Modernize Llama Stack agents by migrating to the Responses API >_