- Amazon API Gateway Observability Best Practices with Datadog >_
- How to Configure SSL Certificates in Nginx for Secure HTTPS Connections >_
- Linux 6.17 Getting More Rusty With Many Rust Language Additions >_
- New Undectable Plague Malware Attacking Linux Servers to Gain Persistent SSH Access >_
- Writing a basic service for GNU Guix >_
- Deploy Hono backends with zero configuration >_
- How to Fix if Docker Container Has No Internet >_
- How to Secure a Linux Server >_
- How to create AWS Serverless Valkey via OpenTofu >_
- Introducing Private Network Interface: Secure Private Networking on AWS for 50% Less >_
- MySQL AWS keyring component extends functionality of AWS keyring plugin >_
- NetworkManager 1.54 Adds Per-Device IPv4 Forwarding >_
- Replacing tmux in my dev workflow >_
- Run Docker Commands With Ansible >_
- SUSE: Linux Kernel Important Patch for 17 Security Issues 2025:02588-1 >_
- Troubleshoot Docker Daemon Connection Issues in Jenkins >_
- “Network Has Active Endpoints” Error While Removing Network in Docker >_
- 3 Key Areas to Focus on When You're Evaluating AI Security >_
- 5 steps to consistently patch RHEL and Windows systems >_
- A Streamlined Multi-Linux Strategy for Financial Services >_
- Automatic certificate provisioning with cert-manager and DNS challenge >_
- Building AIOps with Amazon Q Developer CLI and MCP Server >_
- Containerize legacy Spring Boot application using Amazon Q Developer CLI and MCP server >_
- Gartner Market Guide: Microsegmentation for Zero Trust and Resilience >_
- Getting Started with Ansible on SUSE Linux Enterprise Server 16 >_
- Introducing Amazon Application Recovery Controller Region switch: A multi-Region application recovery service >_
- Introducing Amazon Bedrock AgentCore Browser Tool >_
- Introducing Google Cloud Setup: Your guided pathway to a secure cloud foundation >_
- Introducing the Amazon Bedrock AgentCore Code Interpreter >_
- Introducing the Amazon DynamoDB data modeling MCP tool >_
- Introduction to CPU Hotplug >_
- Jaeger Monitoring: Essential Metrics and Alerting for Production Tracing Systems >_
- Maximizing Business Value Through Strategic Cloud Optimization >_
- Observing and evaluating AI agentic workflows with Strands Agents SDK and Arize AX >_
- The Google Developer Program is evolving >_
- Vulnerability disclosure on SSL for SaaS v1 (Managed CNAME) >_
- 20 Best Kubernetes Monitoring Tools in 2025 >_
- AI agents unifying structured and unstructured data: Transforming support analytics and beyond with Amazon Q Plugins >_
- AWS open source newsletter #212 >_
- Amazon DocumentDB Serverless is now available >_
- Amazon SQS Fair Queues: a New Approach to Multi-Tenant Resiliency >_
- Amazon Strands Agents SDK: A technical deep dive into agent architectures and observability >_
- Build a Better VM: Creating a Golden Image Pipeline on GCP >_
- Build dynamic web research agents with the Strands Agents SDK and Tavily >_
- CloudNativePG 1.26.1, 1.25.3 and 1.27.0-rc1 Released! >_
- GenAI vs. Agentic AI: What Developers Need to Know >_
- How to Scale Your AWS Architecture: From EC2 to Multi-Region Deployment >_
- How to Upload Large Objects to S3 with AWS CLI Multipart Upload >_
- How to Use MongoDB with Go >_
- How to install OpenShift with confidential nodes on GCP >_
- How to use the Clevis PKCS #11 pin >_
- IBM Hyper Protect with OpenShift sandboxed containers >_
- Implementing Defense-in-Depth Security for AWS CodeBuild Pipelines >_
- Implementing code reloading for Rack apps >_
- Insights from UN Open Source Week 2025 >_
- Introducing AWS Batch Support for Amazon SageMaker Training jobs >_
- Introducing Extended Support for Amazon ElastiCache version 4 and version 5 for Redis OSS >_
- MCP Horror Stories: The Security Issues Threatening AI Infrastructure >_
- Migrating by direct transfer is generally available >_
- Pinterest Automates Hadoop Cluster Scaling and Migration with Internal Orchestration System >_
- Protecto’s GPTGuard Uses SingleStore Vectors to Overcome RAG Limitations and Deliver Secure, Accurate Document Retrieval >_
- Scalability for the Large-Scale: File Copy-Based Initial Sync for Percona Server for MongoDB >_
- Secure file sharing solutions in AWS: A security and cost analysis guide: Part 2 >_
- Securing AI together: GitLab’s partnership with security researchers >_
- Security Advisory: CVE Affecting Percona Monitoring and Management (PMM) >_
- Single-instance Oracle Database on OpenShift Virtualization >_
- SingleStore Recognized in the Gartner® Hype Cycle™ for Data Management, 2025 for Operational Intelligence Category >_
- SingleStore Wins Stevie® Award for Innovation in Cloud Services >_
- Snowflake Too Slow? Unlock Real-Time Performance at Scale >_
- Stop Waiting for the Future: Real-Time Data in One Platform Is Already Here >_
- Stream Kafka Topic to the Iceberg Tables with Zero-ETL >_
- Structured outputs with Amazon Nova: A guide for builders >_
- Testing network resilience of AWS Fargate workloads on Amazon ECS using AWS Fault Injection Service >_
- A Practical Guide to PostgreSQL Replication with Both Asynchronous and Synchronous Standbys >_
- Automate the creation of handout notes using Amazon Bedrock Data Automation >_
- Automating configuration of an existing Ansible instance >_
- Boost Jenkins pipelines with Red Hat Advanced Developer Suite >_
- Bring high-performance observability to secure Kubernetes environments with Datadog's new CSI driver >_
- Cisco delivers enhanced email protection to the Middle East >_
- Datadog Disaster Recovery mitigates cloud provider outages >_
- Gemini Embedding: Powering RAG and context engineering >_
- How to migrate your Amazon EC2 Oracle Transparent Data Encryption database encryption keystore to AWS CloudHSM >_
- How to reduce costs with OpenShift on Graviton AWS >_
- How we use Datadog to further our FedRAMP compliance >_
- Improve PostgreSQL performance: Diagnose and mitigate lock manager contention >_
- Introducing LangExtract: A Gemini powered information extraction library >_
- Mistral-Small-3.2-24B-Instruct-2506 is now available on Amazon Bedrock Marketplace and Amazon SageMaker JumpStart >_
- Publishers: How to Block AI Bots and Reclaim Control of Your Content >_
- Races and memory leaks >_
- Streamline GitHub workflows with generative AI using Amazon Bedrock and MCP >_
- The wonderfully lazy way to SSH into your computers >_
- What’s new in File Systems with UEK8: Btrfs, XFS, and NFS updates >_
- 10 Best Anti-Phishing Tools in 2025 >_
- 10 Best Virtual Machine (VM) Monitoring Tools in 2025 >_
- A Practical Developer’s Guide on How to Troubleshoot HTTP 5XX errors >_
- Accelerate modernization and cloud migration >_
- Announcing Istio 1.26.3 >_
- Assess and migrate your database using AWS DMS Schema Conversion CLI >_
- Auto-Instrument Your Applications Using OTel Injector >_
- Blue-Green Deployment of a Next.js App on EC2 Using AWS CodeDeploy >_
- Break Free: Stop Vendor Lock‑In From Writing Your IT Roadmap >_
- Data Intelligence Is the Missing Piece in Your AI Strategy >_
- DevOps 2.0 Confex & Awards 2025! >_
- Enable rootless VMs with user-mode networking using Passt >_
- Exposing Kubernetes Pods to Internet with AWS Load Balancer Controller on EKS Using LoadBalancer Service and Ingress >_
- From raw data to model serving with OpenShift AI >_
- GNU C Library 2.42 Released With SFrame Support, Newer Intel CPU Detection >_
- Generate suspicious transaction report drafts for financial compliance using generative AI >_
- GitHub Outage Disrupts Core Services Globally for Users >_
- How to Control systemd With Ansible >_
- How to build a cloud-based contact centre & analytics solution running mostly on AWS >_
- Implement zero-touch provisioning for OpenShift with GitOps >_
- Ksplice and Tracing Hooks in the Kernel >_
- Meet Last9 at KubeCon IN 2025 >_
- Pipeline Tuning with Engine Variables >_
- Retiring Docker Content Trust >_
- SUSE Linux Micro on NVIDIA Jetson: The Foundation for Edge AI >_
- Scaling generative AI in the cloud: Enterprise use cases for driving secure innovation >_
- Securing the 5G Edge: Why Telcos Need Kubernetes-Native Protection >_
- Surviving the Ransomware Gauntlet: A Test of Resilience >_
- The Challenge of Persistent Data on Kubernetes >_
- Understanding Message Delivery with Multiple Partitions >_
- Why Your Loki Metrics Are Disappearing (And How to Fix It) >_
- AWS Weekly Roundup: SQS fair queues, CloudWatch generative AI observability, and more (July 28, 2025) >_
- Accelerating on-device ML on Meta’s family of apps with ExecuTorch >_
- Achieving High Availability with distributed database on Kubernetes at Airbnb >_
- Amazon Nova Act SDK (preview): Path to production for browser automation agents >_
- Beyond the Chatbot: Event-Driven Agents in Action >_
- Build a drug discovery research assistant using Strands Agents and Amazon Bedrock >_
- Build modern serverless solutions following best practices using Amazon Q Developer CLI and MCP >_
- Chart Topping Contributions to the Core of the Kernel, Continued >_
- Confidential virtual machines vs VMs: Latency analysis >_
- Enable Kerberos Authentication with Amazon RDS for Db2 >_
- Get free monitoring when you share Honeybadger >_
- Grafana 12.1 release: automated health checks for your Grafana instance, streamlined views in Grafana Alerting, visualization updates, and more >_
- How Prometheus 3.0 Fixes Resource Attributes for OTel Metrics >_
- How to Perform Rolling Index Builds with Percona Operator for MongoDB >_
- How to automatically disable users in AWS Managed Microsoft AD based on GuardDuty findings >_
- Identify common security risks in MCP servers >_
- Integrate Red Hat build of Trustee with the External Secrets Operator >_
- Kubernetes v1.34 Sneak Peek >_
- OTel Weaver: Consistent Observability with Semantic Conventions >_
- Optimizing enterprise AI assistants: How Crypto.com uses LLM reasoning and feedback for enhanced efficiency >_
- Streamline service-to-service communication during deployments with Amazon ECS Service Connect >_
- Variables and Outputs: Enhancing Terraform Flexibility >_
- XFS - Atomic File Content Commit in Linux 6.13 >_