2025-03-25

  • 5 Considerations for a Data Loss Prevention Rollout >_
  • 8 Ways to Empower Engineering Teams to Balance Productivity, Security, and Innovation >_
  • A stable platform for community projects >_
  • Amazon Bedrock launches Session Management APIs for generative AI applications (Preview) >_
  • Anyscale powers AI compute for any workload using Google Compute Engine >_
  • Bash Function to Sort Docker Ps Output >_
  • Build and deploy Remote Model Context Protocol (MCP) servers to Cloudflare >_
  • Chronological Kontrol: Google Cloud K8s Cluster History Inspector  >_
  • Cloudflare incident on March 21, 2025 >_
  • Cosmonic Adds Control Plane for Managing Wasm Infrastructure >_
  • Detailed geographic information for all AWS Regions and Availability Zones is now available >_
  • Distributed Cloud Solutions and AI: Key Findings from Forrester’s 2024 Study  >_
  • Effortless application modernization: migrate to Amazon EKS with existing NLB setup >_
  • End-to-End Monitoring: Your Guide to System Visibility >_
  • Enhance deployment guardrails with inference component rolling updates for Amazon SageMaker AI inference >_
  • Enhance enterprise productivity for your LLM solution by becoming an Amazon Q Business data accessor >_
  • Evaluate and improve performance of Amazon Bedrock Knowledge Bases >_
  • Formula E’s AI equation: New Driver Agent boosts next generation of racers >_
  • Getting Started with Trivy: A Must-Have Tool for DevSecOps >_
  • How to scale smarter with Ansible and amazon.aws 9.0.0 >_
  • How to strengthen compliance across the software development life cycle by shifting left >_
  • Integrate natural language processing and generative AI with relational databases >_
  • Introducing TxGemma: Open models to improve therapeutics development >_
  • Java News Roundup: JDK 24, GraalVM for JDK 24, Payara Platform, Kafka 4.0, Spring CVEs, JavaOne 2025 >_
  • Linux Kernel 6.14 Officially Released, This Is What’s New >_
  • Mastering Complex Workloads with Kubernetes JobSet and GKE metrics >_
  • Microsoft unveils Microsoft Security Copilot agents and new protections for AI >_
  • Observability Pipeline: An Easy-to-Follow Guide for Engineers >_
  • Open-sourcing OpenPubkey SSH (OPKSSH): integrating single sign-on with SSH >_
  • Protecting against Next.js middleware vulnerability CVE-2025-29927 with HAProxy >_
  • Simplifying JVM App Development with Heroku's Buildpack Magic >_
  • Streamline your security workflows with Google SecOps and Datadog Observability Pipelines >_
  • The AI Revolution in EU Digital Government: From Belief to Bold Implementation >_
  • The New Look and Feel of Apache Kafka 4.0 >_
  • The state of observability in 2025: a deep dive on our third annual Observability Survey >_
  • Transition a pivot query that includes dynamic columns from SQL Server to PostgreSQL >_
  • Tutorial: Secure BigQuery data publishing with GitLab >_
  • Ubuntu 7370-1: SmartDNS Security Advisory Updates >_
  • Using Terraform for container security as code with Sysdig >_
  • Zero Code Instrumentation: The Missing Link in Observability >_
  • powa-collector 1.3.1 is out! >_

2025-03-24

  • 10 Best Linux Firewalls in 2025 >_
  • A week in security (March 17 – March 23) >_
  • API Catalog: Track Your Endpoint Performance >_
  • AWS Weekly Roundup: Omdia recognition, Amazon Bedrock RAG evaluation, International Women’s Day events, and more (March 24, 2025) >_
  • An In-Depth Metricbeat Guide for DevOps Teams >_
  • Announcing E-Maj 4.6.0. >_
  • Buid container images with buildah/podman in GitLab CI >_
  • Build gen AI agents using Google Cloud databases >_
  • Cisco Co-Authors Update to the NIST Adversarial Machine Learning Taxonomy >_
  • Cloudflare Unveils AI Labyrinth a New Approach to Exhaust AI Crawlers and Other Bots >_
  • Detecting and Mitigating an Authorization Bypass Vulnerability in Next.js >_
  • Effective Incident Management and On-Call Practices for SREs >_
  • Explore our DEI Community Hub at KubeCon + CloudNativeCon Europe 2025 >_
  • Google Cloud Announces Kubernetes History Inspector to Visualise Cluster Logs >_
  • GrafanaCON 2025: Agenda highlights and how to start planning your conference experience today >_
  • How to Build a Multi-Stage Dockerfile for .NET Core >_
  • How to secure HTTP headers in your synthetic tests >_
  • IBM Instana Observability Platform, Teknik İnceleme — Part 3: Services & Endpoints >_
  • Kafka Cleaner Thread: A Deep Dive >_
  • New URLPattern API brings improved pattern matching to Node.js and Cloudflare Workers >_
  • Nuro drives autonomous innovation with AlloyDB for PostgreSQL >_
  • Observability: Every Engineer’s Job, Not Just Ops’ Problem >_
  • Optimizing Email Delivery: A Guide to Properly Setting Up DNS Records >_
  • Percona XtraBackup 8.4 Pro: Reduce Server Locking by up to 4300X >_
  • Prepare now: Docker Hub rate limits will impact GitLab CI/CD >_
  • PyBites: Case Study: Developing and Testing Python Packages with uv >_
  • Reimagining Log Management Tools and Software: The Impact of AI and GenAI >_
  • SUSEcares: Our Charity of the Year for FY24 >_
  • Security Week 2025: in review >_
  • SingleStore vs. ClickHouse: Why SingleStore Stands Out >_
  • Speed up checkpoint loading time at scale using Orbax on JAX >_
  • Use AWS service reference information to automate policy management workflows >_
  • What Is CDN? The Complete Guide for DevOps Engineers >_

2025-03-23

  • EU OS Is a New Community-Led Linux Alternative for Europe’s Public Sector >_
  • GitHub Supply Chain Breach: Coinbase Attack Exposes 218 Repositories, Leaks CI/CD Secrets >_
  • Hacker Claims Sale of 6 Million Records Stolen from Oracle Cloud Servers >_
  • How Do You Play Around with Terraform CLI Versions? >_
  • Introducing JobSet >_
  • Linux 6.15 Plans To Drop Support For A Useless CRC-32 Checksum In The Kernel Image >_

2025-03-22

  • Contribute at the Fedora 42 CoreOS Test Week >_
  • Essential Strategies for Upgrading Microservices Without Downtime >_
  • Git 2.49: Faster Packing, Smarter Cloning, and More >_
  • Google Cloud Introduces HDD Tier for Spanner Database, Cutting Cold Storage Costs by 80% >_
  • Learn API Fundamentals and Architecture – A Beginner-Friendly Guide >_
  • ReactOS 0.4.15 Released with Major Enhancements >_
  • SUSE: 2025:0983-1 important: the Linux Kernel Security Advisory Updates >_
  • VMware Vulnerabilities Exploited Actively to Bypass Security Controls & Deploy Ransomware >_

2025-03-21

  • Another Round Of Rust Compiler Improvements Merged For GCC 15.1 >_
  • Applying DevOps Principles and Practices as a Quality Assurance Engineer >_
  • Asahi Linux Progress Report - Linux 6.14 >_
  • Automate IT operations with Amazon Bedrock Agents >_
  • Automating HCP Terraform Workspaces: A New Approach to Team Onboarding >_
  • Build GraphRAG applications using Spanner Graph and LangChain >_
  • Build a generative AI enabled virtual IT troubleshooting assistant using Amazon Q Business >_
  • Building AI agents with Gen AI Toolbox for Databases and Dgraph >_
  • Cloudflare is now IRAP assessed at the PROTECTED level, furthering our commitment to the global public sector >_
  • Cloudflare to Close All HTTP Ports for APIs, Enforces HTTPS Connection >_
  • Detecting sensitive data and misconfigurations in AWS and GCP with Cloudflare One >_
  • EBS Cloud Manager Release 25.1.0 Now Available >_
  • Enhance data protection in Microsoft Outlook with Cloudflare One’s new DLP Assist >_
  • Google Cloud Launches A4 VMs with NVIDIA Blackwell GPUs for AI Workloads >_
  • Grafana Labs at KubeCon: Prometheus, OpenTelemetry, AI, and more >_
  • How Python Magic Methods Work: A Practical Guide >_
  • Improving Data Loss Prevention accuracy with AI-powered context analysis >_
  • Introducing Java, JS and Python support in Test Plans >_
  • Introducing protection summary, a new Google Cloud Backup and DR feature >_
  • JetStream for GCE Disaster Recovery Orchestration: Protect and manage your critical workloads >_
  • Kotlin 2.1.20 Released >_
  • Mastering Kubernetes node management with the kubectl cordon command >_
  • Mastering secure AI on Google Cloud, a practical guide for enterprises >_
  • Optimize with OCI APM data and save on operational costs >_
  • Prepping for post-quantum: a beginner’s guide to lattice cryptography >_
  • Process formulas and charts with Anthropic’s Claude on Amazon Bedrock >_
  • RDP without the risk: Cloudflare's browser-based solution for secure third-party access >_
  • Scala vs. Python for Big Data in 2025 >_
  • Secure Your AWS Pipeline: Step-by-Step Guide to VPC Integration-part 2 >_
  • Strengthening Google Developer Experts community with Google Cloud Champion Innovators >_
  • The AI lens: How Arpeely uses multimodality and BigQuery to revolutionize AdTech >_
  • Ubuntu 7363-1: PAM-PKCS#11 Security Advisory Updates >_
  • Visualize AWS CloudTrail Logs Locally for Advanced Threat Detection >_
  • What Is Root Cause Analysis (RCA) and Why Do You Need It? >_
  • What is telemetry and why is it important? >_
  • Why AI Demands a New Security Playbook >_

2025-03-20

  • 21 Best Free and Open Source DNS Servers >_
  • 5G Edge Computing: A Guide to Faster, Smarter Networks >_
  • 7 new features in the Network Observability CLI 1.8 >_
  • A demonstration of the Network Observability CLI >_
  • AWS AppSync Events Adds Direct WebSocket Message Publishing >_
  • Advanced Error Budgets in SRE >_
  • Akamai Named a Leader in the Latest Forrester Report for WAF Solutions >_
  • An open source app for easily building performance tests: Grafana k6 Studio is generally available >_
  • Announcing BigQuery repositories: Git-based collaboration in BigQuery Studio >_
  • Asure’s approach to enhancing their call center experience using generative AI and Amazon Q in Quicksight >_
  • Automating My Web App Deployment with AWS CI/CD >_
  • Build Stronger Edge Security Without Slowing Down Innovation >_
  • Build richer gen AI experiences using model endpoint management >_
  • Cisco Introduces the State of AI Security Report for 2025: Key Developments, Trends, and Predictions in AI Security >_
  • Cloudflare named a leader in Web Application Firewall Solutions in 2025 Forrester report >_
  • Come build the future of Incident Response >_
  • Create generative AI agents that interact with your companies’ systems in a few clicks using Amazon Bedrock in Amazon SageMaker Unified Studio >_
  • DPU-enabled networking with OpenShift and NVIDIA DPF >_
  • Debian LTS: DLA-4086-1: python-django Security Advisory Updates >_
  • Detecting and Mitigating Apache Tomcat CVE-2025-24813 >_
  • Five Critical Shifts for Cloud Native at a Crossroads  >_
  • Google Cloud Next 25 Partner Summit: Session guide for partners >_
  • HTTP 304 Not Modified Error: What is it and how to fix it >_
  • HTTPS-only for Cloudflare APIs: shutting the door on cleartext traffic >_
  • Harvesting hardware: Our approach to carbon-aware fleet deployment >_
  • How mesh VPN solutions fix Kubernetes networking >_
  • How to Automate Restarts for Failed Services in Linux >_
  • How to create value objects in Ruby - the idiomatic way >_
  • How to redact secrets from logs with Grafana Alloy and Loki >_
  • Improved support for private applications and reusable access policies with Cloudflare Access >_
  • Improving Hugo stability and addressing oncall challenges through automation >_
  • Introducing Cloudy, Cloudflare’s AI agent for simplifying complex configurations >_
  • IssueOps: Automate CI/CD (and more!) with GitHub Issues and Actions >_
  • Kali Linux 2025.1a New Tool & Upates to Desktop Environments >_
  • Making Application Security simple with a new unified dashboard experience >_
  • Master architecture decision records (ADRs): Best practices for effective decision-making >_
  • Mastering AWS Lambda: Optimize Cost and Performance >_
  • Mastering the df Command in Linux: Monitor Disk Space >_
  • Multicloud: replicating from HeatWave MySQL on AWS to OCI >_
  • No Lag, All Frag: Level Up Your Gaming with Xonotic, K3s, and Edge Computing >_
  • Percona Monitoring and Management 2: Clarifying the End-of-Life and Transition to PMM 3 >_
  • Pilot light with reserved capacity: How to optimize DR cost using On-Demand Capacity Reservations >_
  • PostgreSQL 18: Add “–missing-stats-only” to vacuumdb >_
  • PyBites: Optimizing Python: Understanding Generator Mechanics, Expressions, and Efficiency >_
  • Ruby debugging tips for 2025 >_
  • Simplify allowlist management and lock down origin access with Cloudflare Aegis >_
  • Statement on CVE-2024-22033 – Compromise of Open Build Service via source services >_
  • Streamline AWS resource troubleshooting with Amazon Bedrock Agents and AWS Support Automation Workflows >_
  • Top 5 Challenges of SaaS Organizations and How to Overcome Them >_
  • Ubuntu 25.10 plans to swap GNU coreutils for Rust >_
  • Unleashing the multimodal power of Amazon Bedrock Data Automation to transform unstructured data into actionable insights >_
  • Vector similarity search for Cloud SQL for MySQL is now GA >_
  • Vertex AI Search and Generative AI (with Gemini) achieve FedRAMP High >_
  • Why Continuous Compliance Monitoring Is Essential For IT Managed Service Providers >_
  • Why Multi-Cloud Strategies Might Be Overrated for Startups >_
  • pgtt v4.1 released >_

2025-03-19

  • 8 best practices for securing your development pipeline >_
  • A framework for adopting Gemini Code Assist and measuring its impact >_
  • AWS and Docker Hub Limits: Smart Strategies for April 2025 Changes >_
  • Accelerating agentic workflows with Azure AI Foundry, NVIDIA NIM, and NVIDIA AgentIQ >_
  • AlloyDB for PostgreSQL: Two years of innovation and industry leadership >_
  • Amazon Q Business now available in Europe (Ireland) AWS Region >_
  • An early look at cryptographic watermarks for AI-generated content >_
  • An inside look into Google's AI innovations: AI Luminaries at Cloud Next >_
  • Announcing Fedora Linux 42 Beta >_
  • Announcing HAProxy ALOHA 17.0 >_
  • Apache Kafka 4 Release Announcement >_
  • Article: Beyond Trends: A Practical Guide to Choosing the Right Message Broker >_
  • Automating DevSecOps with Sysdig and PagerDuty >_
  • Building an Efficient ETL on Google Cloud Platform with Python and Golang >_
  • Claimify: Extracting high-quality claims from language model outputs >_
  • Cloudflare for AI: supporting AI adoption at scale with a security-first approach >_
  • Confluent for VS Code Simplifies Real-Time Data Streaming Projects for Developers >_
  • Countering GPU shortages with multi-cloud setups >_
  • Cryptominers? Anatomy: Analyzing Cryptominers >_
  • Datadog vs Zabbix - Which Monitoring Tool is Right for You? >_
  • Debian LTS: DLA-4085-1: tzdata new timezone database >_
  • Elevate your workload resilience in console with data protection for Compute Engine >_
  • Embedding-Based Retrieval for Airbnb Search >_
  • Fedora Linux 42 Enters Public Beta Testing with Linux Kernel 6.14 and GNOME 48 >_
  • FinOps in Action: Slash Google Cloud Costs After Lift & Shift with Automated VM Scheduling >_
  • Find the IDE features you need with GitHub Copilot and Search >_
  • Finding the Right Tools for Digital Transformation by Eric Forseter >_
  • Forget TypeScript, how about porting Doom to Go? >_
  • From innovation to impact: How AWS and NVIDIA enable real-world generative AI success >_
  • Gen AI Toolbox for Databases announces LlamaIndex integration >_
  • Going deep on UUIDs and ULIDs >_
  • GrafanaCON 2025: Start exploring this year’s agenda >_
  • How state, local, and education organizations can manage logs flexibly and efficiently using Datadog Observability Pipelines >_
  • How to Install Actual Budgeting Software on Debian 12 Server >_
  • How to Set Up Prometheus and Grafana on Ubuntu: A Step-by-Step Guide >_
  • How to be a good mentor for your whole team (even that one guy) >_
  • How to monitor security threats in developer workflows >_
  • How to troubleshoot and fix setup issues in Python data science >_
  • How we optimized vLLM for DeepSeek-R1 >_
  • How we train AI to uncover malicious JavaScript intent and make web surfing safer >_
  • Improve cost visibility of an Amazon RDS multi-tenant instance with Performance Insights and Amazon Athena >_
  • Improved Bot Management flexibility and visibility with new high-precision heuristics >_
  • Integrate generative AI capabilities into Microsoft Office using Amazon Bedrock >_
  • IssueOps: Automate CI/CD (and more!) with GitHub Issues and Actions >_
  • Java 24 Delivers Quantum Resistance, AI Enhancements, Easier Learning >_
  • Local Branding Strategies for Small Businesses to Make a Big Impact >_
  • Mastering Docker Containers: Advanced Tips for Sysadmins in 2025 >_
  • Metasurface: Unlocking the future of wireless sensing and communication >_
  • Microsoft Windows File Explorer Vulnerability Let Attackers Perform Network Spoofing – PoC Released >_
  • Microsoft and NVIDIA accelerate AI development and performance   >_
  • MongoDB Atlas On-Premise: Challenges and Flexible Alternatives >_
  • Open Source and DeFi: The Backbone of Trustless Financial Innovations >_
  • PHP RCE Vulnerability Actively Exploited in Wild to Attack Windows-based Systems >_
  • Python Morsels: Refactoring long boolean expressions >_
  • Run GenAI inference across environments with Amazon EKS Hybrid Nodes >_
  • Scheduled scaling of Amazon Aurora Serverless with Amazon EventBridge Scheduler >_
  • Take control of public AI application security with Cloudflare's Firewall for AI >_
  • The Hidden Costs and Ethical Pitfalls of Content Scraping >_
  • Tips for using templating in governance policies: Part 3 >_
  • Tool choice with Amazon Nova models >_
  • Trapping misbehaving bots in an AI Labyrinth >_
  • Uber Boosted Performance with Go's Profile-Guided Optimization >_
  • Using RDMA over Converged Ethernet networking for AI on Google Cloud >_
  • What is Composable Architecture? >_
  • Your Observability Questions, Answered >_
« newer articles | page 57 | older articles »