2026-01-26
- A security checklist for your React and Next.js apps >_
- A static site generator written in POSIX shell >_
- AI quickstart: Self-service agent for IT process automation >_
- AMD Sends In A Variety Of Graphics Driver Fixes Ahead Of Linux 7.0 Cycle >_
- AWS Weekly Roundup: Amazon EC2 G7e instances with NVIDIA Blackwell GPUs (January 26, 2026) >_
- Aspire 13.1 Brings MCP Integration, CLI Enhancements, and Azure Deployment Updates >_
- Back to Our Open Source Roots: Winding Down Percona ProBuilds >_
- Build a serverless AI Gateway architecture with AWS AppSync Events >_
- CNCF Survey Surfaces Widespread Adoption of Kubernetes Clusters >_
- CVE-2026-23864: React and Next.js Denial of Service via Memory Exhaustion >_
- Cable cuts, storms, and DNS: a look at Internet disruptions in Q4 2025 >_
- Clawdbot - open source personal AI assistant >_
- Clawdbot with Docker Model Runner, a Private Personal AI Assistant >_
- ClickHouse achieves AWS AI Competency >_
- Declarative RPM: Cleaning Up Your Spec Files >_
- Docker Sandboxes: Run Claude Code and Other Coding Agents Unsupervised (but Safely) >_
- Driving DevSecOps Standards: Microsoft’s Role in Shaping NIST SP 1800-44 Volume B >_
- Effect of Idempotence on the Performance of a Kafka Producer >_
- Google Releases Gemma 3 270M Variant Optimized for Function Calling on Mobile and Edge Devices >_
- Guide to multi-homed inventory management with Red Hat Ansible Automation Platform >_
- How Tailscale Peer Relays saved my holiday: a 12.5X performance boost from India >_
- How to automatically generate a commit message using Claude >_
- How to build a Copilot agent >_
- Human creativity meets agentic intelligence: Your guide to Perform 2026 >_
- IAM Identity Center now supports IPv6 >_
- Introduction to Nushell: The Shell That Treats Everything as Data >_
- JWT Authorization Grant and Identity Chaining in Keycloak 26.5 >_
- Keycloak 26.5.2 released >_
- Laravel Debugbar v4.0.0 is released >_
- Linux 6.19-rc7 Released With Kernel Continuity Plan, A Few Important Fixes >_
- MongoDB vs ScyllaDB: Architecture Comparison >_
- New Relic AI Impact Report 2026: How AIOps is Solving the "Firefighting" Crisis for Engineers >_
- Nomad on OpenShift: The case for the control plane >_
- Pipeline Performance Profiling: Making CI/CD Performance, Cost, and Bottlenecks Visible >_
- Porting 100k lines from TypeScript to Rust using Claude Code in a month >_
- Presentation: Theme Systems at Scale: How To Build Highly Customizable Software >_
- Privacy and Data Governance — Keys to Innovation and Trust in the AI Era >_
- Radiance: Generate Deterministic Mesh Gradient Avatars in PHP >_
- Rancher vs Headlamp: Choosing the Right Kubernetes Dashboard for Your Workflow >_
- Run Claude Code Locally with Docker Model Runner >_
- Scaling Small LLMs with NVIDIA MPS >_
- Seamless k6.io Performance Testing in Scala Projects Using Scala.js >_
- Secure, Reliable Terraform At Scale With Sonatype Nexus Repository >_
- Securing AI Skills >_
- Security Data API: How to retrieve CVE data with curl and jq >_
- Spring News Roundup: First Milestone Releases of Boot, Security, Integration, Modulith, AMQP >_
- Stop Context Switching: Dashboards Connected to Your Kubernetes Architecture >_
- The 2026 Linux security threat landscape and strategic defense pillars >_
- The AI Evolution of Graph Search at Netflix >_
- The Paradox of Abstraction: Why Good Abstractions Make Systems Harder to Debug >_
- Turn Application Insights Exceptions into Pull Requests: End-to-End Automation with Kilo Code >_
- Understanding the recommender system's two-tower model >_
- WAL-G 3.0.8 released >_
- What happens inside the Kubernetes API server? >_