2025-03-18

  • 10 Essential Things to Do After Installing Linux Mint 22 Cinnamon Edition >_
  • 2024 H2 IRAP report is now available on AWS Artifact for Australian customers >_
  • 23,000 GitHub Repositories Targeted In Supply Chain Attack >_
  • AWS completes the annual UAE Information Assurance Regulation compliance assessment >_
  • Accelerating AI in healthcare using NVIDIA BioNeMo Framework and Blueprints on GKE >_
  • Amazon Bedrock Guardrails announces IAM Policy-based enforcement to deliver safe AI interactions >_
  • Announcing Rust 1.85.1 >_
  • Build your gen AI–based text-to-SQL application using RAG, powered by Amazon Bedrock (Claude 3 Sonnet and Amazon Titan for embedding) >_
  • Cloud CISO Perspectives: 5 tips for secure AI success >_
  • Cloud Growth Unleashed: SUSE Cloud Elevate Program expanded to include MSPs >_
  • Cloudflare enables native monitoring and forensics with Log Explorer and custom dashboards >_
  • Debian: DSA-5881-1: rails Security Advisory Updates >_
  • Extending Cloudflare Radar’s security insights with new DDoS, leaked credentials, and bots datasets >_
  • Five tips and tricks to improve your AI workloads >_
  • GPU Droplets Achieve SOC 2 Compliance >_
  • Google + Wiz: Strengthening Multicloud Security >_
  • Google Cloud at GTC: A4 VMs now generally available, A4X VMs in preview >_
  • Grafana Cloud updates: Fleet Management is now GA, a unified app for IRM, and more >_
  • Greenmask 0.2.6 - 0.2.8 Releases >_
  • How to Automate Alert Provisioning with the SigNoz Terraform Provider >_
  • How to use RHEL system roles in image mode >_
  • Introducing KBLaM: Bringing plug-and-play external knowledge to LLMs >_
  • IvorySQL 4.4 Released - Based on PostgreSQL 17.4 with Enhanced Platform Support >_
  • Key metrics for measuring your organization's security posture >_
  • Kubernetes Data Management at Scale: SUSE Rancher Prime + Portworx >_
  • Leveraging Docker with TensorFlow Models & TensorFlow.js for a Snake AI Game >_
  • Log File Analysis: A Guide for DevOps Engineers >_
  • Monitor your organization's security posture with Datadog >_
  • NeMo Retriever Llama 3.2 text embedding and reranking NVIDIA NIM microservices now available in Amazon SageMaker JumpStart >_
  • New DTrace Training Video Focused on Multithreading Analysis >_
  • One platform to manage your company’s predictive security posture with Cloudflare >_
  • OpenTelemetry Backends: A Practical Implementation Guide >_
  • Redefining Security Management in a Hyperconnected World >_
  • Revolutionizing clinical trials with the power of voice and AI >_
  • Running NVIDIA NeMo 2.0 Framework on Amazon SageMaker HyperPod >_
  • SUSE Demonstrates Deployment of NVIDIA DOCA in HBN Mode for Telco & 5G Edge >_
  • Self-service security alert handling with GitLab's UAM >_
  • Swiss PGDay 2025: Open for registration >_
  • Tailscale just-in-time network access, now generally available >_
  • The Percona Perspective: A Vision for the Future of Open Source Databases in the Age of AI >_
  • Unleash AI innovation with Amazon SageMaker HyperPod >_
  • Unleashing Enterprise-Grade Reliability: SUSE Linux Enterprise Server (SLES) Technology Preview on NVIDIA Jetson >_
  • Unleashing improved context for threat actor activity with our Cloudforce One threat events platform >_
  • Upcoming Updates for Azure Pipelines Agents Images >_
  • Upgraded Turnstile Analytics enable deeper insights, faster investigations, and improved security >_
  • Website Logging: Everything You Need to Get Started >_
  • What is KubeVirt? How does it migrate VMware workloads to Kubernetes? >_
  • Zero Trust Infrastructure with SUSE Linux & Confidential Computing >_
  • pgFormatter v5.6 has been released >_

2025-03-17

  • 10 tips for better Backstage Software Templates >_
  • 6 Best Free and Open Source PHP Microframeworks >_
  • A powerful free and open source WAF – UUSEC WAF >_
  • AI in Network Observability: The Dawn of Network Intelligence >_
  • AWS KMS CloudWatch metrics help you better track and understand how your KMS keys are being used >_
  • AWS Weekly Roundup: AWS Pi Day, Amazon Bedrock multi-agent collaboration, Amazon SageMaker Unified Studio, Amazon S3 Tables, and more >_
  • Accelerate AI/ML workloads using Cloud Storage hierarchical namespace >_
  • Advancing account security as part of Cloudflare’s commitment to CISA’s Secure by Design pledge >_
  • Angular Modules vs Components >_
  • Announcing Connect End of Support: Timeline and Next Steps >_
  • Announcing OSV-Scanner V2: Vulnerability scanner and remediation tool for open source >_
  • Are Your AWS CloudTrail Costs Out of Control? Here’s Why >_
  • BitM Up! Session Stealing in Seconds Using the Browser-in-the-Middle Technique >_
  • Chaos in Cloudflare’s Lisbon office: securing the Internet with wave motion >_
  • Cloud Composer 3: The next generation of data pipeline orchestration >_
  • Co-op mode: New partners driving the future of gaming with AI >_
  • Conventional cryptography is under threat. Upgrade to post-quantum cryptography with Cloudflare Zero Trust >_
  • Cutting digital curbs: How Azure AI Foundry is building a more accessible world >_
  • Debian 12.10 Rolls Out with Security and Stability Improvements >_
  • Debian 12.10 “Bookworm” Released with 66 Bug Fixes and 43 Security Updates >_
  • Debian: DSA-5879-1: opensaml Security Advisory Updates >_
  • Distributed Tracing: An Advanced Guide for DevOps & SREs >_
  • Email Security now available for free for political parties and campaigns through Cloudflare for Campaigns >_
  • Enhanced security and simplified controls with automated botnet protection, cipher suite selection, and URL Scanner updates >_
  • Enhancing multiplayer games with gen AI and cloud gaming: a technical deep dive >_
  • Failed to create sink input: sink is suspended on Arch Linux >_
  • Gemini in Workspace apps and the Gemini app are first to achieve FedRAMP High authorization >_
  • GitHub Action Compromise Puts CI/CD Secrets at Risk in Over 23,000 Repositories >_
  • GitLab achieves PCI DSS Attestation of Compliance >_
  • Grouping database tables in AWS DMS tasks for Oracle source engine >_
  • Hackers Exploiting TP-Link Vulnerability to Gain Root Access >_
  • How Cloudflare is using automation to tackle phishing head on >_
  • How the IntelliJ Infrastructure Team Cuts Build Execution Time by 30% With TeamCity >_
  • How to Customize Messages from Sentry to Slack >_
  • How to Restore Deleted Files Under /etc Directory in Ubuntu >_
  • How to build the ultimate March Madness dashboard in Grafana >_
  • Intelligent healthcare assistants: Empowering stakeholders with personalized support and data-driven insights >_
  • Less War, More Room: Breaking Down Operational Silos >_
  • Offline PKI using 3 YubiKeys and an ARM single board computer >_
  • Password reuse is rampant: nearly half of observed user logins are compromised >_
  • Percona Server for MySQL 8.4.2 vs 8.0.40: Comparison of Variables and Keywords >_
  • Software Supply Chain Security - OWASP Cheat Sheet Series >_
  • Switching From Windows to Linux: A Step-by-Step Migration Guide >_
  • Syslog Servers Explained: How They Help with Logging >_
  • The latest in Kubernetes Monitoring: new features to track persistent storage, simplify alerting, and more >_
  • Use pgactive for rolling major version upgrades in Amazon RDS for PostgreSQL >_
  • Zato Blog: How to correctly integrate APIs in Python >_
  • systemctl: The Complete Guide to Managing Linux Services >_

2025-03-16

  • 8 Best Free and Open Source Linux Anti-Spam Tools >_
  • AWS with Python: A Powerful Duo for Cloud Automation >_
  • Critical Vulnerabilities In Delphi Code Leads To Memory Corruption >_
  • Decoding JSON sum types in Go without panicking >_
  • Fedora 41: vim 2025-7b21a14892 Security Advisory Updates >_
  • How To Replace Text In Multiple Files Using A Bash Script In Linux >_
  • How to list upgradeable packages on FreeBSD using pkg >_
  • Introducing Atlassian’s new navigation >_
  • Python for DevOps: Automating Tasks Efficiently >_
  • Welcome to Security Week 2025 >_
  • nproc Command in Linux: A Complete Guide for System Optimization >_

2025-03-15

  • Android 16 may get a built-in Linux terminal >_
  • Debian: DSA-5878-1: php8.2 Security Advisory Updates >_
  • Highlights from Git 2.49 >_
  • How To Manage Bash Functions Using declare Command In Linux >_
  • How to Install and Use Nessus Vulnerability Scanner on Ubuntu 24.04 >_
  • How to Use the watch Command in Linux for Real-Time Monitoring >_
  • How to properly protect .bash_history against truncation? >_
  • KDE Frameworks 6.12 Is Out, Here’s What’s New >_
  • Kubernetes Namespaces: A Complete Guide >_
  • Manage Access to Oracle Cloud with Google Cloud IAM >_
  • Python Insider: Python 3.14.0 alpha 6 is out >_
  • Securing Your Container Pipeline: Using AWS Inspector with GitHub Actions >_
  • What is an Online Virtual Machine? (And How To Get One) >_

2025-03-14

  • 8 Tiny Utilities to Make Your Linux Experience Even Better >_
  • 86,000+ Healthcare Staff Records Exposed from Misconfigured AWS S3 Bucket >_
  • AWS Pi Day 2025: Data foundation for analytics and AI >_
  • Amazon DocumentDB Quick Start: Zero Setup with AWS CloudShell >_
  • Autonomous Linux 9: Self-Patching Systems Delivering Higher Security and Availability >_
  • Best practices for managing Datadog organizations at scale >_
  • Building multi-arch containers with GitHub Actions in AWS >_
  • CISA Releases Thirteen Industrial Control Systems Focusing Vulnerabilities & Exploits >_
  • CPU Load: Everything You Need To Know to Manage it >_
  • Collaborate and build faster with Amazon SageMaker Unified Studio, now generally available >_
  • Critical ruby-saml Vulnerabilities Let Attackers Bypass Authentication >_
  • DevProxy 0.25 Improves Configuration Management, Joins .NET Foundation >_
  • GitLab patches critical authentication bypass vulnerabilities >_
  • High-performance computing, with much less code >_
  • How to implement JSON-LD Schema for your blog >_
  • Microsoft Warns of Cyber Attack Mimic Booking .com To Deliver Password Stealing Malware >_
  • Microsoft apologizes for removing VSCode extensions used by millions >_
  • Migrating from AWS to a European Cloud – How We Cut Costs by 62% >_
  • New SuperBlack ransomware exploits Fortinet auth bypass flaws >_
  • Node v23.10.0 (Current) >_
  • Protecting your APIs from OWASP’s top 10 security threats >_
  • Rust Takes Root in Ubuntu 25.10 >_
  • Skyscanner’s journey to effective observability >_
  • Top 10 Best Cyber Attack Simulation Tools – 2025 >_
  • Ubuntu 7344-2: Linux kernel Security Advisory Updates >_
  • Ubuntu Docker Container: Fixing “bash: ping: command not found” Error >_
  • What is Application Performance Monitoring (APM)? >_
  • What is QR Code Phishing? (Quishing) – Attack & Prevention Guide in 2025 >_
  • What is monitoring sprawl and what to do about it? >_
  • What's new in Git 2.49.0? >_

2025-03-13

  • 10 months to innovation: Definity's leap to data agility with BigQuery and Vertex AI >_
  • 7 Best Free and Open Source Linux Discord Clients >_
  • A Practical Guide to the OpenTelemetry Java Agent >_
  • Accelerating Large-Scale Test Migration with LLMs >_
  • Amazon S3 Tables integration with Amazon SageMaker Lakehouse is now generally available >_
  • Automatic Health Check in MySQL Group Replication >_
  • Automating Agile workflows with the gitlab-triage gem >_
  • Benchmarking customized models on Amazon Bedrock using LLMPerf and LiteLLM >_
  • Build resilient Oracle Database workloads on Amazon EC2 >_
  • Containerizing ML Models with Docker and Kubernetes >_
  • Creating asynchronous AI agents with Amazon Bedrock >_
  • CrossOver 25 Brings Even More Windows Software to Linux & Mac >_
  • Detecting CVE-2025-22224 with Falco >_
  • DigitalOcean Managed MongoDB now supports MongoDB 8.0 >_
  • ETL vs ELT for Telemetry Data: Technical Approaches and Practical Tradeoffs >_
  • Essential Prometheus Queries: Simple to Advanced >_
  • Google SecOps Anonymization Pipeline on Google Cloud >_
  • How GoDaddy built a category generation system at scale with batch inference for Amazon Bedrock >_
  • How RHEL provides secure and stable Python streams >_
  • How SIGNAL IDUNA supercharges customer service with gen AI >_
  • How To Choose the Right Linux Server Distro in 2025 >_
  • How to Automatically Restart a Failed Service in Linux >_
  • How to Set Up Logging in Node.js (Without Overthinking It) >_
  • How to apologize for a professional mistake – remotely or in person >_
  • How to run Qwen 2.5 on AWS AI chips using Hugging Face libraries >_
  • How we responded to a 2+ hour partial outage in Grafana Cloud >_
  • Manage authorization within a containerized workload using Amazon Verified Permissions >_
  • MariaDB reboots DBaaS plans with open source at the core >_
  • Markdown for large text fields (private preview) >_
  • Microsoft Enhances Azure Elastic SAN with Auto Scale, Snapshot Support, and CRC Protection >_
  • Multiple database support on Amazon RDS for Db2 DB instance >_
  • Negative Exposure: Edimax Network Cameras Used to Spread Mirai >_
  • Optimize hosting DeepSeek-R1 distilled models with Hugging Face TGI on Amazon SageMaker AI >_
  • Part 1: Introduction to observing machine learning workloads on Amazon EKS >_
  • Quarkus 3.19 Prepares for LTS Release 3.20 >_
  • Revolutionizing customer service: MaestroQA’s integration with Amazon Bedrock for actionable insight >_
  • SUSE Launches New AI Capabilities at SUSECON >_
  • SUSE Multi-Linux Support: A Unified Strategy for Diverse IT Environments >_
  • Secure cloud innovation starts at re:Inforce 2025 >_
  • Shift-Left Testing with Testcontainers: Catching Bugs Early with Local Integration Tests >_
  • Sidekiq 8.0 >_
  • Streamlined Security: Introducing Network Security Integration >_
  • The Complete Guide to Monitoring Container CPU Usage >_
  • The ultimate guide to learning at Google Cloud Next 2025 >_
  • Top 17 DevOps AI Tools [2025] >_
  • Unlocking bonus worlds with Gemini for the Google I/O puzzle >_
  • Using Barman Cloud Utilities for Backups and WAL Archiving in PostgreSQL >_
  • What is the impact of the Digital Operational Resilience Act (DORA) on my IT? >_
  • Why is network troubleshooting in Kubernetes so hard? >_

2025-03-12

  • 2025 is cloud security’s breakthrough year >_
  • 429 Too Many Requests Error: What is it and how to fix it >_
  • A more robust raw OpenBSD syscall demo >_
  • Announcing Gemma 3 on Vertex AI >_
  • Announcing HAProxy Enterprise 3.1 >_
  • Announcing SUSE Rancher for SAP® applications. The Tailored Platform Solution for SAP Containerized Deployments >_
  • Announcing the Responses API and Computer-Using Agent in Azure AI Foundry >_
  • Apple Releases Patch for WebKit Zero-Day Vulnerability Exploited in Targeted Attacks >_
  • Cleanups and weak pointers in Go 1.24 >_
  • Dynatrace vs Prometheus - A Detailed Comparison for 2025 >_
  • Envoy Proxy in Service Mesh >_
  • Experiment with Gemini 2.0 Flash native image generation >_
  • Exploring creative possibilities: A visual guide to Amazon Nova Canvas >_
  • First official release of LLVM Flang >_
  • Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers >_
  • HAProxy-Patroni Setup Using Health Check Endpoints and Debugging >_
  • HTTP/3 is everywhere but nowhere >_
  • How Do Dropwizard Metrics Help Monitor Application Performance? >_
  • How to Build a RAG System With Anthropic Claude on AWS >_
  • How to Configure Sentry to Send Alerts to MS Teams >_
  • How to build, deploy, and manage image mode for RHEL >_
  • How to deploy serverless AI with Gemma 3 on Cloud Run >_
  • Incident response analyst report 2024 >_
  • Integrating SUSE Security with Microsoft Sentinel for Unified Threat Protection >_
  • Introducing DevX Validated Designs by SUSE –Simplifying Cloud-Native Software Development at Scale >_
  • Introducing Gemma 3: The Developer Guide >_
  • Learn to Autoscale Kubernetes Node Pools and Pods with Oracle Cloud Native Environment >_
  • Leveraging BigQuery JSON for Optimized MongoDB Dataflow Pipelines >_
  • MangoHud – Monitor FPS, CPU & GPU Load in Linux Games >_
  • Migrate Microsoft AD on GCP >_
  • New Python Driver for SQL Server and Azure SQL! >_
  • Optimizing Cloud SQL Memory Performance: An SRE’s Guide >_
  • Performance Impact of High Cardinality in Time-Series DBs >_
  • Presenting SUSE Application Collection on AWS at SUSECON 2025 >_
  • Privileges app: sudo for macOS >_
  • Project Shield makes it easier to sign up, set up, automate DDoS protection >_
  • Prometheus Port Configuration: A Detailed Guide >_
  • Rails Version 8.0.2 has been released! >_
  • SUSE Private Registry: A safe Harbor for your containers. >_
  • SUSE Rancher Prime the Cloud Native Platform of Choice – SUSECON 2025 Cloud Native >_
  • Securing Kubernetes with Kyverno: A Practical Guide to Deployment with Helm and ArgoCD in EKS >_
  • Syslog Monitoring: A Guide to Log Management and Analysis >_
  • Telemetry pipeline management at any scale: Fleet Management in Grafana Cloud is generally available >_
  • The Golden Grot Awards need you: Vote for your favorite dashboard today! >_
  • The Quantum Sky Is Falling! Understanding the Quantum Threat to Network Security >_
  • The developer evolution: How AI is shaping developer efficiency and strategic value >_
  • Traversal-resistant file APIs >_
  • Try Istio ambient mode on Red Hat OpenShift >_
  • Ubuntu 7332-2: Linux kernel Security Advisory Updates >_
  • Vulnerability risk prioritization made simple with GitLab >_
  • Welcome Gemma 3: Google's all new multimodal, multilingual, long context open LLM >_
  • What is Log Data? The SRE's Essential Guide >_
« newer articles | page 58 | older articles »