2026-03-18
- A tale about fixing eBPF spinlock issues in the Linux kernel >_
- API Reliability Report 2026: Uptime Patterns Across 215+ Services >_
- AWS Security Hardening: The Checklist Your Cloud Needs >_
- Accelerate incident response with Datadog and ServiceNow >_
- Agent Skills in Claude Code: A DevOps Engineer’s Field Guide >_
- Agentic AI: Why Enterprise AI Is Not Delivering on Its Promise >_
- Announcing the Colab MCP Server: Connect Any AI Agent to Google Colab >_
- Building a RAG Pipeline with Gemini 2.5 >_
- CloudBees vs TeamCity: Enterprise CI/CD Beyond Jenkins >_
- CrackArmor Exposed: Critical Flaws in AppArmor Put Millions of Linux Systems at Risk >_
- Customizing an Azure VM for Cross Cloud Development >_
- Developer’s Guide to AI Agent Protocols >_
- From Simulation to Production: How to Build Robots With AI >_
- How Advanced Cluster Management simplifies rule management >_
- How to Manage Permissions When AI Tools Access Private Repositories >_
- How we centralize and remediate risks with Datadog Case Management >_
- Introducing Custom Regions for precision data control >_
- Introducing multi-cluster GKE Inference Gateway: Scale AI workloads around the world >_
- Introducing the Machine Payments Protocol >_
- Java 26 Delivers Language Innovation, Library Improvements, Performance and Security >_
- LLM Compressor v0.10: Faster compression with distributed GPTQ >_
- Migrate from Amazon Nova 1 to Amazon Nova 2 on Amazon Bedrock >_
- Monitor your application and network load balancer logs >_
- Prepare to enable Linux pressure stall information on Red Hat OpenShift >_
- Ranking Engineer Agent (REA): The Autonomous AI Agent Accelerating Meta’s Ads Ranking Innovation >_
- SSH Key Handling using the macOS keychain and 1Password >_
- SUSE Rancher for AWS and Amazon Q: Governed SRE Assistance for EKS Operations >_
- Scaling Btrfs to petabytes in production: a 74% cost reduction story >_
- The Need for Cloud Security in a Modern Business Environment >_
- Ubuntu CVE-2026-3888 Bug Lets Attackers Gain Root via systemd Cleanup Timing Exploit >_
- Using Cloud Armor with an External CDN: Identifying the Real Client IP >_
- War in Iran Damages Multiple AWS Data Centers, Challenging Multi-AZ Assumptions >_