2025-06-16

  • A Closer Look at UEK8 Packaging: Understanding the Changes >_
  • AWS Weekly Roundup: AWS re:Inforce 2025, AWS WAF, AWS Control Tower, and more (June 16, 2025) >_
  • Adaptive alerting: faster, better insights with the new metrics forecasting UI in Grafana Cloud >_
  • Are Open Source Kubernetes Monitoring Tools Better? >_
  • Beyond prioritization: Accelerating vulnerability remediation at the source with AI and runtime context >_
  • Enhancements to Akamai API Security, Q2 2025 >_
  • Extend your Amazon Q Business with PagerDuty Advance data accessor >_
  • How AWS improves active defense to empower customers >_
  • How Apollo Tyres is unlocking machine insights using agentic AI-powered Manufacturing Reasoner >_
  • How Kafka improves agentic AI >_
  • How To Find the Best Container Management Software for Your Business >_
  • How and Why to Use an Observability Platform >_
  • How to use service mesh to improve AI model security >_
  • Implement row-level security in Amazon Aurora MySQL and Amazon RDS for MySQL >_
  • Innovate business logic by implementing return of control in Amazon Bedrock Agents >_
  • Integrating Repmgr with Barman: Managing Backups During Switchovers >_
  • Introducing intelligent vulnerability remediation, powered by Sysdig Sage™ >_
  • Mastering AWS Cloud Security: A Comprehensive Guide for Modern Cloud Architects >_
  • Native SQL Server replication options on Amazon RDS Custom for SQL Server >_
  • Prometheus data source update: Redefining our big tent philosophy >_
  • Python in Visual Studio Code – June 2025 Release >_
  • SLES 15 SP7 What’s new >_
  • Summary of Heroku June 10 Outage >_
  • What’s new in Git 2.50.0? >_
  • XDR still means so much more than some may realize >_

2025-06-14

  • Crack the Code: How Network Observability Unlocks Revenue Growth for Service Providers >_
  • How To Install Git on Rocky Linux 10 >_
  • How to Build a Medical Chatbot with Flutter and Gemini: A Beginner’s Guide >_
  • How to Install Docker on AlmaLinux 10 >_
  • How to Use Apt-Offline to Install Debian or Ubuntu Packages >_
  • How to benchmark and scale your Google Cloud Managed Service for Kafka deployment >_
  • NIST Released 19 Zero Trust Architecture Implementations Guide – What’s New >_
  • Rocky Linux 10 Released, This Is What’s New >_
  • Transform enterprise workloads with AWS Transform and Agentic AI >_
  • Welcome to the Terraform Tutorial Series, Infra Coders! >_
  • Writing Your First Terraform Configuration: A Step-by-Step Guide >_

2025-06-13

  • AI security strategies from Amazon and the CIA: Insights from AWS Summit Washington, DC >_
  • API Security Under Federal Scrutiny: A Wake-Up Call for CIOs >_
  • AWS CIRT announces the launch of the Threat Technique Catalog for AWS >_
  • Auto-Remove Container Using docker-compose.yml >_
  • Cloudflare service outage June 12, 2025 >_
  • Cloudflare: Outage not caused by security incident, data is safe >_
  • Deploy Qwen models with Amazon Bedrock Custom Model Import >_
  • Everything You Need to Know About Event Logs >_
  • Grafana security update: Medium severity security release for CVE-2025-3415 >_
  • How Netsertive built a scalable AI assistant to extract meaningful insights from real-time data using Amazon Bedrock and Amazon Nova >_
  • How to create post-quantum signatures using AWS KMS and ML-DSA >_
  • How to run AI models in cloud development environments >_
  • Introduction to vLLM: A High-Performance LLM Serving Engine >_
  • Kali Linux 2025.2 Released With Smartwatch Wi-Fi Injection, Android Radio, and Hacking Tools >_
  • Make videos accessible with automated audio descriptions using Amazon Nova >_
  • Mitigating prompt injection attacks with a layered defense strategy >_
  • Percona Earns Kubernetes Certified Services Provider Status for All Three Major Open Source Databases >_
  • PostgreSQL JDBC 42.7.7 Security update for CVE-2025-49146 >_
  • Runtime is the real defense, not just posture >_
  • Training Llama 3.3 Swallow: A Japanese sovereign LLM on Amazon SageMaker HyperPod >_
  • “Fast and Furious”: SingleStore Earns Top Rated Status From TrustRadius in Five Categories >_

2025-06-12

  • A Guide to Amazon EKS Container Security >_
  • Accelerating Articul8’s domain-specific model development with Amazon SageMaker HyperPod >_
  • Amazon EKS Pod Identity streamlines cross account access >_
  • Build a multi-Region AWS PrivateLink backed service with seamless failover >_
  • Celebrating 11 years of Project Galileo’s global impact >_
  • Datadog + OpenAI: Codex CLI integration for AI‑assisted DevOps >_
  • Debugging and parsing Ruby >_
  • Fluent Bit Helm Chart: Simplify Log Collection in Kubernetes >_
  • How Stellantis streamlines floating license management with serverless orchestration on AWS >_
  • How Trilio secures OpenShift virtual machines and containers >_
  • How VideoAmp uses Amazon Bedrock to power their media analytics interface >_
  • How to implement observability with Node.js and Llama Stack >_
  • Introducing AMD Instinct™ MI300X GPU Droplets >_
  • Introducing Open Source DAW Plugin for Eclipsa Audio >_
  • Introducing the AWS Security Champion Knowledge Path and digital badge >_
  • Linux Conversations | Episode 9: SUSE Security – The Gold Standard of Enterprise Linux Security and Compliance with Dietrich Banschbach and Knut Trepte >_
  • Model Once, Represent Everywhere: UDA (Unified Data Architecture) at Netflix >_
  • Oracle Linux 9 Achieves Security Certifications under Common Criteria and FIPS 140-3 >_
  • Oracle Linux 9 DISA STIG is Now Available >_
  • Secure Your Enterprise with Robust DNS: A Guide to NIST SP 800-81r3 >_
  • The complete stream processing journey on FlinkSQL >_
  • Understanding resource distribution and performance analysis using AWS DMS enhanced monitoring >_
  • Userspace vs Kernelspace: Understanding the Divide >_

2025-06-11

  • AWS completes Police-Assured Secure Facilities (PASF) audit in Europe (London) AWS Region >_
  • Adobe enhances developer productivity using Amazon Bedrock Knowledge Bases >_
  • Amazon Nova Lite enables Bito to offer a free tier option for its AI-powered code reviews >_
  • An Easy Guide to Getting Started with Elastic APM >_
  • Beyond Implementation: Building a Zero Trust Strategy That Works >_
  • Build, test, and scale detections as code with Datadog Cloud SIEM >_
  • Choosing the Right GPU Droplet for your AI/ML Workload >_
  • Data points per minute in Grafana Cloud: What you need to know about DPM >_
  • Enhance Your Edge Native Apps with Low Latency Using Multiple EdgeWorkers >_
  • Go 1.25 Release Candidate 1 released >_
  • How Gardenia Technologies helps customers create ESG disclosure reports 75% faster using agentic generative AI on Amazon Bedrock >_
  • How to Build, Run, and Package AI Models Locally with Docker Model Runner >_
  • How to encrypt RHEL images for Azure confidential VMs >_
  • How to manage RHEL virtual machines with Podman Desktop >_
  • NVIDIA Nemotron Super 49B and Nano 8B reasoning models now available in Amazon Bedrock Marketplace and Amazon SageMaker JumpStart >_
  • Publishing AI models to Docker Hub >_
  • We shipped FinalizationRegistry in Workers: why you should never use it >_
  • powa-archivist 5.0.3 is out! >_

2025-06-10

  • 1.5 TB of James Webb Space Telescope data just hit the internet >_
  • 84,000+ Roundcube Webmail Installation Vulnerable to Remote Code Execution Attacks >_
  • AI-native GitLab Premium: Transform higher education software development >_
  • AWS Launches EKS Dashboard to Tackle Multi-Cloud Kubernetes Complexity >_
  • Accelerate Kubernetes issue resolution with AI-powered guided remediation >_
  • Accelerate Oracle Cloud Infrastructure monitoring with Datadog OCI QuickStart >_
  • Amazon DynamoDB zero-ETL integration with Amazon SageMaker Lakehouse – Part 1 >_
  • Amazon DynamoDB zero-ETL integration with Amazon SageMaker Lakehouse – Part 2 >_
  • Automate Cloud SIEM investigations with Bits AI Security Analyst >_
  • Automate customer support with Amazon Bedrock, LangGraph, and Mistral models >_
  • Automatically identify issues and generate fixes with the Bits AI Dev Agent >_
  • Azure Bootcamp Switzerland 2025 >_
  • Build responsible AI applications with Amazon Bedrock Guardrails >_
  • Building identity-first security: A guide to the Identity and Access Management track at AWS re:Inforce 2025 >_
  • Building on open source IaC scanning tools with Datadog >_
  • CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog >_
  • Cisco Hyrbid Mesh Firewall: Better Enforcement Points, Smarter Segmentation, and Multi-Vendor Policy >_
  • Configuring Windows Failover Cluster for KVM/QEMU >_
  • Connect to Amazon RDS for Db2 using AWS CloudShell >_
  • Connect your AI agents to Datadog tools and context using the Datadog MCP Server >_
  • Container: Apple's Linux-Container Runtime >_
  • Create and monitor LLM experiments with Datadog >_
  • Cross-account migration of Amazon RDS for SQL Server with column-level encryption >_
  • DASH 2025 Observe & Analyze: Guide to Datadog's newest announcements >_
  • DASH 2025 Secure & Govern: Guide to Datadog's newest announcements >_
  • DASH 2025: Guide to Datadog's newest announcements >_
  • Debug live production issues with the Datadog Cursor extension >_
  • Detect Amazon Bedrock misconfigurations with Datadog Cloud Security >_
  • Detect and investigate query regressions with Datadog Database Monitoring >_
  • Detect anomalies beyond spikes and new values with Content Anomaly Detection in Cloud SIEM >_
  • Detect issues and optimize spend with Databricks serverless job monitoring >_
  • Django Weblog: Django bugfix releases issued: 5.2.3, 5.1.11, and 4.2.23 >_
  • Docker Desktop 4.42: Native IPv6, Built-In MCP, and Better Model Packaging >_
  • Effective cost optimization strategies for Amazon Bedrock >_
  • Enhancing Kubernetes Event Management with Custom Aggregation >_
  • Ensure trust across the entire data life cycle with Datadog Data Observability >_
  • Explore your data with Sheets, DDSQL Editor, and Notebooks for advanced analysis in Datadog >_
  • Faster Python: Concurrency in async/await and threading >_
  • Find what's driving errors and latency with Tag Analysis >_
  • FreeBSD 14.3-RELEASE Available >_
  • Google Pay inside sandboxed iframe for PCI DSS v4 compliance >_
  • Hardening Linux Servers – A Comprehensive Cybersecurity Checklist >_
  • How E.ON saves £10 million annually with AI diagnostics for smart meters powered by Amazon Textract >_
  • How GitHub engineers tackle platform problems >_
  • How to Monitor Kafka Producer Metrics >_
  • How to use Splunk as an event source for Event-Driven Ansible >_
  • Implementing Grafana Play privacy policies with Grafana k6: A behind-the-scenes look >_
  • Improve performance and reliability with Proactive App Recommendations >_
  • Introducing Bits AI SRE, your AI on-call teammate >_
  • Join Last9 at the AWS Summit NYC! >_
  • June Patches for Azure DevOps Server >_
  • Make data-driven design decisions with Product Analytics >_
  • Making Agentic AI Work in the Real World >_
  • MariaDB 11.8 LTS Lands with Vector Search and Extended Timestamp Support >_
  • Massive Heroku outage impacts web platforms worldwide >_
  • Monitor Your System Health From Python’s Command Line >_
  • Monitor and optimize your Flex Logs compute usage >_
  • Monitor your OpenAI agents with Datadog LLM Observability >_
  • Monitor, troubleshoot, and improve agentic systems with Datadog >_
  • Optimize and troubleshoot AI infrastructure with Datadog GPU Monitoring >_
  • Oracle Enterprise Command Center Framework, Release 12.2 V13 >_
  • Percona Named to DBTA’s 2025 List of 100 Companies That Matter Most in Data >_
  • Private connections for every GitHub Actions runner >_
  • Proactively enforce infrastructure best practices with Datadog Resource Policies >_
  • Protect the life cycle of your application code and libraries with Datadog Code Security >_
  • Python Continuous Integration and Deployment Using GitHub Actions >_
  • Reduce cloud storage costs and improve operational efficiency with Datadog Storage Monitoring >_
  • Rewriting SymCrypt in Rust to modernize Microsoft’s cryptographic library  >_
  • Rightsize workloads and reduce costs with Datadog Kubernetes Autoscaling >_
  • Search your historical logs more efficiently with Datadog Archive Search >_
  • Security and SRE: How we implemented our combined approach >_
  • Send Azure logs to Datadog faster and more easily with automated log forwarding >_
  • Setting Up Terraform: Installation and Configuration >_
  • Ship software quickly and confidently with Datadog IDP >_
  • Show Progress of cp, mv, Tar, Rsync, or Scp Commands in Linux >_
  • Speech-to-text with Whisper and Red Hat AI Inference Server >_
  • Speed up code reviews: Let AI handle the feedback implementation >_
  • Store and analyze high-volume logs efficiently with Flex Logs >_
  • Track engineering metrics with customizable, executive-ready reports in Datadog’s IDP >_
  • Unify remediation and communication with Datadog Incident Response >_
  • Using make to compile C programs (for non-C-programmers) >_
  • Visualize cloud security relationships with Datadog Security Graph >_
« newer articles | page 44 | older articles »