2025-07-27

  • Building an AWS GuardDuty Alert Triage Agent >_
  • Enhance your Code Security with Amazon Inspector >_
  • GNU Binutils 2.45 Released With Continued Work Around SFrame Stack Tracing >_

2025-07-26

  • 20 Best SNMP Monitoring Tools in 2025 >_
  • A Pretty Okay Solar Ham Station, Part 2: Panels >_
  • Boost Kafka Performance: Enabling Gzip in node-rdkafka Docker Containers >_
  • Deploying Scalable APIs With Terraform and GitHub Actions >_
  • DevSecOps with Github Actions and ArgoCD >_
  • From Async/Await to Virtual Threads >_
  • How To Deploy Fluent Bit in a Kubernetes-Native Way >_
  • How to build secure and scalable remote MCP servers >_
  • Integrate GitHub with Jenkins (DevOps) >_
  • Learn How to Upgrade Kubernetes and Use an Application Catalog with Oracle Cloud Native Environment >_
  • Linux Kernel Proposal Documents Rules For Using AI Coding Assistants >_
  • Securely Connect GitHub Actions to AWS Using IAM Roles and OIDC >_
  • Setting up AWS Client VPN with CloudFormation and AWS CLI >_

2025-07-25

  • Beyond Perimeter Defense: Implementing Zero Trust in Federal Agencies >_
  • Build an intelligent eDiscovery solution using Amazon Bedrock Agents >_
  • Create AWS Diagrams with Python and Q in the CLI >_
  • Debugging superpowers with the new js-libp2p developer tools >_
  • Digital Sovereignty for SAP Applications: Why SUSE is Your Trusted Partner >_
  • Enable Custom Logos branding in the OpenShift web console >_
  • Enhanced OKE Monitoring with Observability and Management >_
  • FreeBSD 15 Installer to Include Built-in KDE Plasma Desktop Option >_
  • From Chaos to Control: A Cost Maturity Journey with Databricks >_
  • From Manual Testing to AI-Generated Automation: Our Azure DevOps MCP + Playwright Success Story >_
  • Google Container Security: Real-World Threats and Proven Defenses >_
  • Graphene OS: a security-enhanced Android build >_
  • How HashiCorp made cross-Region switchover seamless with Amazon Application Recovery Controller >_
  • How PerformLine uses prompt engineering on Amazon Bedrock to detect compliance violations  >_
  • How To Achieve Enterprise Container Security >_
  • How Zapier runs isolated tasks on AWS Lambda and upgrades functions at scale >_
  • How sum_over_time Works in Prometheus >_
  • MTTD: An In-Depth Overview About What It Is and How to Improve It >_
  • Monitoring Process/Thread exit using BPF >_
  • Navigating the 2027 SAP PI/PO Migration: Find Your Ideal Partner >_
  • New AWS whitepaper: AWS User Guide to Financial Services Regulations and Guidelines in Australia >_
  • Production-Grade Pain: Lessons From Scaling Kubernetes on EKS >_
  • The White House AI Action Plan: a new chapter in U.S. AI policy >_
  • This month at Tailscale: Tailnet Lock, Control plane IP changes, and headless Windows runners >_
  • Tracking planes with Grafana in real time: How to visualize the aircraft overhead with your own dashboard >_
  • Ubuntu 24.04: Linux Kernel Critical Security Update USN-7665-2 >_
  • Unifying detection and response: Sysdig + Cortex XSOAR for security at cloud speed >_
  • Why continuous profiling is the fourth pillar of observability >_

2025-07-24

  • AWS Security Incident Response: The customer’s journey to accelerating the incident response lifecycle >_
  • Benchmarking Amazon Nova: A comprehensive analysis through MT-Bench and Arena-Hard-Auto >_
  • Boost cold-start recommendations with vLLM on AWS Trainium >_
  • Cisco Secure Firewall: First to earn SE Labs AAA in Advanced Performance >_
  • Deploying a Django App to Sevalla >_
  • Dynatrace Reaches the Summit: GRAIL-Powered Next‑Gen Observability, OpenTelemetry, and the Autonomous Age >_
  • How PagedAttention resolves memory waste of LLM systems >_
  • How to transform compliance observation management with GitLab >_
  • Implement fast, space-efficient lookups using Bloom filters in Amazon ElastiCache >_
  • Introducing Opal: describe, create, and share your AI mini-apps >_
  • Introduction to Data Importers in Percona Everest >_
  • Linux Conversations | Episode 11: Unlocking Linux Quality: A Deep Dive into openQA with Oliver Kurz and Jose Lausuch >_
  • New build cluster speeds up daily autobuilds >_
  • ObservabilityCON 2025: Registration and agenda are officially live! >_
  • People of AI podcast Season 5 is here: Meet the builders shaping the future >_
  • Post-quantum TLS in Python >_
  • Project Flash update: Advancing Azure Virtual Machine availability monitoring >_
  • Rails first released 21 years ago today >_
  • SUSE Storage Joins SUSE Application Collection Ushering a New Era of Enterprise Software >_
  • Secure service-to-service authentication in Developer Hub >_
  • Securely connect private data sources to Grafana Cloud with Tailscale >_
  • Securely query data sources on your Tailscale network using Private Data Source Connect in Grafana Cloud >_
  • Serverless Statusphere: a walk through building serverless ATProto applications on Cloudflare’s Developer Platform >_
  • Software supply chain security guide: Why organizations struggle >_
  • Submit remote RayJobs to a Ray cluster with the CodeFlare SDK >_
  • The Real AI Risk? Your Database. >_
  • The agentic experience: Is MCP the right tool for your AI future? >_
  • Use Telegraf Without the Prometheus Complexity >_
  • What is Java Performance Monitoring? [A Guide to DevOps Engineers] >_
  • Why Real-Time Segmentation Is Your Secret to eCommerce Personalization >_
  • Xinxing Xu bridges AI research and real-world impact at Microsoft Research Asia – Singapore >_
  • Year One of Valkey: Open-Source Innovations and ElastiCache version 8.1 for Valkey >_
  • Zed Editor's Newest Feature: Being Able To Disable All AI Features >_

2025-07-23

  • Accelerating JSON Array Queries with Multi-Value Hash Indexes in SingleStore >_
  • Building Jetflow: a framework for flexible, performant data pipelines at Cloudflare >_
  • Celebrating 10 years of GKE: Incredible customer journeys, amazing AI futures >_
  • Customize Amazon Nova in Amazon SageMaker AI using Direct Preference Optimization >_
  • Customize Your Defense: Unlock Cisco XDR With Key Integrations >_
  • Deploy ChatQnA on OpenShift with AMD Instinct >_
  • Docker MCP Catalog: Finding the Right AI Tools for Your Project >_
  • Email Threat Defense earns AAA rating in SE Labs latest evaluation >_
  • Enhance generative AI solutions using Amazon Q index with Model Context Protocol – Part 1 >_
  • Grafana Cloud updates: deeper insights in Kubernetes Monitoring, Adaptive Metrics updates, and more >_
  • Guide to FoundationDB >_
  • How Datadog Cloud Network Monitoring helps you move to a deny-by-default network egress policy at scale >_
  • Inside GitLab's Healthy Backlog Initiative >_
  • Major European healthcare network discloses security breach >_
  • Multi-tenant RAG implementation with Amazon Bedrock and Amazon OpenSearch Service for SaaS using JWT >_
  • New Scanner Released to Detect SharePoint Servers Vulnerable to 0-Day Attack >_
  • New whitepaper available: AICPA SOC 2 Compliance Guide on AWS >_
  • Optimize RHEL for edge and IoT deployments >_
  • Policy Zones: How Meta enforces purpose limitation at scale in batch processing systems >_
  • Swiss Tables are a big plus >_
  • Technical approach for classifying human-AI interactions at scale >_
  • The Quirks of Index Maintenance in Open Source Databases >_
  • Unleashing new AI capabilities for popular frameworks in Firebase Studio >_
  • Why Your Business Needs APM: 10 Key Benefits You Shouldn’t Ignore >_
  • XFS - Atomic File Content Exchange in UEK8 >_

2025-07-22

  • Beyond IAM access keys: Modern authentication approaches for AWS >_
  • Beyond accelerators: Lessons from building foundation models on AWS with Japan’s GENIAC program >_
  • Cloudflare protects against critical SharePoint vulnerability, CVE-2025-53770 >_
  • Compose Editing Evolved: Schema-Driven and Context-Aware >_
  • Coyote in the Wild: First-Ever Malware That Abuses UI Automation >_
  • Diagnosing MySQL Crashes on RHEL with GDB: How to Identify the Database, Table, and Query Involved >_
  • Four Powerful, New Features to Help You Build and Deploy More Efficient Apps On DigitalOcean Kubernetes >_
  • Gemini 2.5 Flash-Lite is now stable and generally available >_
  • HAProxy Enterprise WAF protects against Microsoft SharePoint CVE-2025-53770 / CVE-2025-53771 >_
  • How Meta keeps its AI hardware reliable >_
  • Introducing ERNIE 4.5-21B-A3B-Base >_
  • Introducing SRA Verify – an AWS Security Reference Architecture assessment tool >_
  • OpenShift APIs for Data Protection: VM pre-backup hooks >_
  • PGDay Napoli 2025, Schedule and Registration >_
  • ReAct vs. naive prompt chaining on Llama Stack >_
  • SIGKILL vs SIGTERM: A Developer’s Guide to Process Termination >_
  • Scaling beyond IPv4: integrating IPv6 Amazon EKS clusters into existing Istio Service Mesh >_
  • Ship Confluent Cloud Observability in Minutes >_
  • Shutdown season: the Q2 2025 Internet disruption summary >_
  • Stop Leaked Credentials in Their Tracks with Veles, Our New Open-Source Secret Scanner >_
  • Streamline deep learning environments with Amazon Q Developer and MCP >_
  • Understand the SharePoint RCE: Exploitations, Detections, and Mitigations >_
  • What is Python Application Performance Monitoring? - [A Complete Guide] >_
  • Why Digital Sovereignty Starts with Your Application Stack >_
  • “Zero Trust Is Dead”: Tailscale’s survey on secure networks >_

2025-07-21

  • AWS Weekly Roundup: Kiro, AWS Lambda remote debugging, Amazon ECS blue/green deployments, Amazon Bedrock AgentCore, and more (July 21, 2025) >_
  • Assess and convert Teradata database objects to Amazon Redshift using the AWS Schema Conversion Tool CLI >_
  • Azure Developer CLI: From Dev to Prod with One Click >_
  • Bridging the visibility gap in software supply chain security >_
  • Build an AI-powered automated summarization system with Amazon Bedrock and Amazon Transcribe using Terraform >_
  • Bunsen: A smart test system that knows your upstream >_
  • Centralized Amazon ECS task logging with Amazon OpenSearch >_
  • Conversational image segmentation with Gemini 2.5 >_
  • Deep dive into cluster networking for Amazon EKS Hybrid Nodes >_
  • Docker Unveils the Future of Agentic Apps at WeAreDevelopers >_
  • Dockerfile Mounts and Fixing Error Unknown Flag: ‘mount’ >_
  • Elixir background jobs: choosing the right tool for the job >_
  • How Search Engines, LLMs, and Third-Party Scrapers Affect Bot Management >_
  • How to Configure Let’s Encrypt SSL with Apache Solr >_
  • How to Set Up Real User Monitoring >_
  • Introducing OSS Rebuild: Open Source, Rebuilt to Last >_
  • Kyruus builds a generative AI provider matching solution on AWS >_
  • Modules in Terraform: Creating Reusable Infrastructure Code >_
  • Monitor Nginx with OpenTelemetry Tracing >_
  • OpenShift Virtualization unlocks cloud-native power for VMs >_
  • OpenTelemetry at Grafana Labs: the latest on how we're investing in the emerging industry standard >_
  • SingleStore Featured in 2025 Gartner® Voice of the Customer for Cloud Database Management Systems >_
  • The Hidden Cost of Not Using APM in Production >_
  • The Rise of the AI Database: Powering Real-Time AI Applications >_
  • Use generative AI in Amazon Bedrock for enhanced recommendation generation in equipment maintenance >_
  • Using replicaSetHorizons in MongoDB >_
  • Why Customer Experience Is the New Battleground in Zero Trust >_
  • Why Observability Tools Tend to Fail at Scale >_
  • XFS - Directory Parent Pointers in UEK8 >_
« newer articles | page 38 | older articles »