2025-06-23

  • 4 essential network automation use cases for everyone >_
  • 6 benefits of Models-as-a-Service for enterprises >_
  • AWS Weekly Roundup: re:Inforce re:Cap, Valkey GLIDE 2.0, Avro and Protobuf or MCP Servers on Lambda, and more (June 23, 2025) >_
  • Advanced DevOps for AI: Continuous Delivery of Models Using Jenkins and Docker  >_
  • Amazon Bedrock baseline architecture in an AWS landing zone >_
  • Build an agentic multimodal AI assistant with Amazon Nova and Amazon Bedrock Data Automation >_
  • CISPE Data Protection Code of Conduct Public Register now certifies 122 AWS services as adherent >_
  • Google Cloud donates A2A to Linux Foundation >_
  • Improve Your Security with Attack Insights in Web Security Analytics >_
  • Introducing SingleStore Cloud Functions: Serverless Data APIs in Aura Container Service >_
  • Learning from other domains to advance AI evaluation and testing >_
  • Microsoft Azure Enhances Observability with OpenTelemetry Support for Logic Apps and Functions >_
  • Migrate a self-managed MySQL database to Amazon Aurora MySQL using AWS DMS homogeneous data migrations >_
  • Multilingual innovation in LLMs: How open models help unlock global communication >_
  • No-code data preparation for time series forecasting using Amazon SageMaker Canvas >_
  • PGDay UK 2025: Registration now open! >_
  • Provisioning AWS Infrastructure Using Jenkins Pipelines and CloudFormation >_
  • Real User Monitoring (RUM) vs. Synthetic Monitoring: Understanding Best Practices >_
  • Setting Up Scalable Monitoring With Prometheus, Grafana and Mimir on Kubernetes >_
  • Sysdig Threat Bulletin: Iranian Cyber Threats >_
  • The end of the prioritization-only era: Vulnerability management needs action >_
  • Things to consider when choosing between Oracle TDE and AWS KMS for encryption of data at rest for Amazon RDS for Oracle >_
  • This month at Tailscale: Grants, App Connectors, and updates across the stack >_
  • Use Graph Machine Learning to detect fraud with Amazon Neptune Analytics and GraphStorm >_

2025-06-22

  • How To Fix Plasma 6.4 X11 Login Issue On Arch Linux >_
  • How to Upgrade to AlmaLinux 10 from AlmaLinux 9 >_
  • Reflections on AWS Summit Mumbai 2025 >_
  • Simplify Kubernetes Security With Kyverno and OPA Gatekeeper >_

2025-06-21

  • Docker Service vs. Docker Container: Understanding the Differences >_
  • How to Choose a Web Application Firewall for Web Security >_
  • How to Start a Career in Technical Writing by Contributing to Open Source >_
  • IDC Business Value Study: A 306% ROI within 3 years using Ubuntu Linux on Azure >_
  • Is AI In The Telco Cloud The Future Of Telecommunications? >_
  • Microsoft Releases WSL 2.6 As The First Open-Source Release >_
  • OpenZFS 2.3.3 Released With Linux 6.15 Support >_
  • Run a Shell Script on Every Request in Nginx >_
  • What Is Edge AI?: The Complete Guide >_

2025-06-20

  • Future-Proof Your Network With Cisco’s Simpler, Smarter, Safer SD-WAN >_
  • Going with the flow: How one Golden Grot Awards winner monitors wastewater with Grafana >_
  • GuideLLM: Evaluate LLM deployments for real-world inference >_
  • How the Factry Historian data source for Grafana enables data-driven insights for factory teams >_
  • How to Create a Simple IP Blocker Script Using iptables and Fail2Ban >_
  • IBM QRadar SIEM Vulnerabilities Allows Attackers to Execute Arbitrary Commands >_
  • Implement a rollback strategy for Amazon Aurora PostgreSQL upgrades using Amazon RDS Blue/Green deployments >_
  • Innovation Sandbox on AWS: Provisioning and Managing Temporary Environments >_
  • Ktor 3.2.0 Is Now Available >_
  • MySQL Orchestrator Failover Behavior During Replication Lag >_
  • Prometheus Logging Explained for Developers >_
  • The Future of Edge and Industrial IoT: A Comprehensive Guide Introduction >_
  • This Week in Open Source - Inaugural Post >_
  • Understanding LiteralString in Python 3.11: A Deep Dive >_
  • Unleashing multimodal magic with RamaLama >_
  • du vs df in XFS >_

2025-06-19

  • Accelerate foundation model training and inference with Amazon SageMaker HyperPod and Amazon SageMaker Studio >_
  • Automate dynamic application security testing with RapiDAST >_
  • Build a scalable AI video generator using Amazon SageMaker AI and CogVideoX >_
  • Building trust in AI: The AWS approach to the EU AI Act >_
  • Defending the Internet: how Cloudflare blocked a monumental 7.3 Tbps DDoS attack >_
  • Deno 2.3 Now Supports Local NPM Packages >_
  • Docker Stop vs Kill: When to Use Each Command >_
  • Everything you need to know about NIST’s new guidance in “SP 1800-35: Implementing a Zero Trust Architecture” >_
  • Experiences of Integrating OPENVPN-DCO (Data Channel Offloading) with OpenVPN >_
  • Gatling vs JMeter: Choosing the Right Performance Testing Tool >_
  • GitLab 18.1 released >_
  • How Loops Work in PHP: A Complete Guide for Beginners >_
  • How an AWS customer in the learning services industry migrated and modernized SAP ASE to Amazon Aurora PostgreSQL >_
  • How to prioritize security risks using AWS Security Hub exposure findings >_
  • Integrate Red Hat AI Inference Server & LangChain in agentic workflows >_
  • Looking Ahead: A Confident New Chapter for Percona >_
  • Streamline multi-cloud operations with Ansible and ServiceNow >_
  • Terraform AWS provider 6.0 now generally available >_
  • The latest Ruby version usage stats >_
  • Update on the AWS DeepRacer Student Portal >_
  • Why and how to optimize your Lambda >_
  • Zed Editor Introduces Built-In Debugger >_

2025-06-18

  • 20 Daily Linux Commands System Administrators Use in Production >_
  • AWS re:Inforce 2025 keynote highlights >_
  • Accelerate threat modeling with generative AI >_
  • Access Logs: Format Specification and Practical Usage >_
  • Assessing AI for OpenShift operations: Advanced configurations >_
  • Automating AWS Infrastructure Provisioning with GitSync and CloudFormation >_
  • Behind the scenes: How we designed Docker Model Runner and what’s next >_
  • Bootstrap 5.3.7 >_
  • Breaking bonds, breaking ground: Advancing the accuracy of computational chemistry with deep learning >_
  • Building a Quantum-Safe Internet: The IETF's Plan for TLS >_
  • Building a custom text-to-SQL agent using Amazon Bedrock and Converse API >_
  • Cloudflare Log Explorer is now GA, providing native observability and forensics >_
  • Connect any React application to an MCP server in three lines of code >_
  • Dealing with race conditions >_
  • Discover More About DTrace and Multithreaded Applications >_
  • Docker State of App Dev: Security >_
  • Empower AI agents with user context using Amazon Cognito >_
  • Gemini Code Assist in Apigee API Management now generally available >_
  • How to Build a Conversational AI Chatbot with Stream Chat and React >_
  • Introducing OpenTelemetry collector self-monitoring dashboards >_
  • Introducing Role-Based Access Control for SingleStore Aura: Secure, Compliant and Enterprise-Ready >_
  • Linux 6.16 Adds Support For Intel PMC SSRAM Telemetry For Lunar Lake + Panther Lake >_
  • Log Management and Query Optimization in Kibana >_
  • Maximize your ROI for Azure OpenAI >_
  • Meeting summarization and action item extraction with Amazon Nova >_
  • Microsoft Planetary Computer Pro: Unlocking AI-powered geospatial insights for enterprises across industries >_
  • New Spaces features make it easier to stay secure, compliant, and in control >_
  • OpenShift Data Foundation and HashiCorp Vault securing data >_
  • OpenShift Lightspeed: Assessing AI for OpenShift operations >_
  • Python Insider: Python 3.14.0 beta 3 is here! >_
  • Securing Kubernetes Traffic with Calico Ingress Gateway >_
  • UEK8 - A Few Notable Changes in the Core Kernel >_
  • Visualize Google Cloud BigQuery data in Grafana: the latest updates, key features, and more >_
  • Visualizing your Tailscale network traffic with TSFlow >_
  • Why Docker Chose OCI Artifacts for AI Model Packaging >_

2025-06-17

  • AIOps and Linux Careers: Future-Proofing Your IT Skillset >_
  • AWS Auth Caching Strategies >_
  • AWS Backup adds new Multi-party approval for logically air-gapped vaults >_
  • AWS Certificate Manager introduces exportable public SSL/TLS certificates to use anywhere >_
  • AWS re:Inforce roundup 2025: top announcements >_
  • Amazon CloudFront simplifies web application delivery and security with new user-friendly interface >_
  • Amazon GuardDuty expands Extended Threat Detection coverage to Amazon EKS clusters >_
  • An innovative financial services leader finds the right AI solution: Robinhood and Amazon Nova >_
  • Axolotl meets LLM Compressor: Fast, sparse, open >_
  • Azure CDN for Static Assets, APIs, and Front Door >_
  • Azure DevOps MCP Server, Public Preview >_
  • Beyond compute: Shifting vulnerability detection left with Amazon Inspector code security capabilities >_
  • Build conversational interfaces for structured data using Amazon Bedrock Knowledge Bases >_
  • Building resilient applications: design patterns for handling database outages >_
  • Configure and customize Kubernetes Monitoring easier with Alloy Operator >_
  • Create Pull Request With GitHub Actions >_
  • Distribute Your Argo CD Applications to Different Kubernetes Clusters Using Application Sets >_
  • Exploring Python's list Data Type With Examples >_
  • Falco is now available as an Amazon EKS add-on >_
  • GKE workload scheduling: Strategies for when resources get tight >_
  • Gemini 2.5: Updates to our family of thinking models >_
  • How AWS is simplifying security at scale: Four keys to faster innovation from AWS re:Inforce 2025 >_
  • How Anomalo solves unstructured data quality issues to deliver trusted assets for AI with AWS >_
  • How to Add a Custom Node in n8n for GCP integration: A Practical Guide >_
  • How to run vLLM on CPUs with OpenShift for GPU-free inference >_
  • Improve your security posture using Amazon threat intelligence on AWS Network Firewall >_
  • Introducing the new console experience for AWS WAF >_
  • Managing usernames and passwords in-house is so 2020 >_
  • Network Latency: Types, Causes, and Fixes >_
  • New AWS Shield feature discovers network security issues before they can be exploited (Preview) >_
  • New methods boost reasoning in small and large language models >_
  • Percona Software for MongoDB Release Plan Updates >_
  • SUSE Linux Enterprise 15 SP7 – Your Safe Harbor for Decade-Long IT Investments, Available Today! >_
  • Scale AI transformation with Azure Essentials: AI Center of Excellence guidance >_
  • Secure your Express application APIs in minutes with Amazon Verified Permissions >_
  • Transforming Maritime Operations with Cloud-Native Edge Computing >_
  • Unify your security with the new AWS Security Hub for risk prioritization and response at scale (Preview) >_
  • Verify internal access to critical AWS resources with new IAM Access Analyzer capabilities >_
  • Webinar: Build Resilient Architectures with LINBIT SDS and Oracle Virtualization >_
  • What’s new for developers in Red Hat OpenShift 4.19 >_
« newer articles | page 43 | older articles »