2025-02-25

  • 10 Best Event Monitoring Tools – 2025 >_
  • 100+ Malicious IPs Actively Exploiting Vulnerabilities in Cisco Devices >_
  • 8 Best Grafana Alternatives: Open-Source & Commercial >_
  • AWS CodePipeline + EKS Action: The Easiest Way to Deploy Containers Yet! >_
  • AWS Introduces Centralized Root Access Management for Organizations >_
  • Abusing VBS Enclaves to Create Evasive Malware >_
  • Accelerate IaC troubleshooting with Amazon Bedrock Agents >_
  • Advanced Java Performance Tuning for Low-Latency Systems >_
  • Armbian 25.2 Released with Support for New Boards, Linux 6.12 LTS, and More >_
  • Be your most productive self with the new Trello >_
  • Core Git Developers Configure Git >_
  • Data sources, visualizations, and apps: A guide to extending and customizing Grafana >_
  • Derive generative AI powered insights from Alation Cloud Services using Amazon Q Business Custom Connector >_
  • Detecting and debugging zombie memcg issues >_
  • DigiCert: Threat of legal action to stifle Bugzilla discourse >_
  • Elasticsearch Reindex API: A Guide to Data Management >_
  • Enhancing AlloyDB vector search with inline filtering and enterprise observability >_
  • Get the Most Out of AWS EKS with SUSE Rancher Prime – Cost Savings, Security, and Full-Stack Automation >_
  • Go 1.24 Brings Generic Type Aliases, Weak Pointers, Improved Finalizers, and More >_
  • Google binning SMS MFA at last and replacing it with QR codes >_
  • How IDIADA optimized its intelligent chatbot with Amazon Bedrock >_
  • How Meta is translating its Java codebase to Kotlin >_
  • How image mode for RHEL improves security >_
  • How to Install ntopng on Debian 12 >_
  • How to Speed Up Website Loading by Removing Extra Bits and Bytes >_
  • How to determine if specific package is installed >_
  • Laravel 12 is Now Released >_
  • Linux Grub Read Command Buffer Overflow Vulnerability Enabling Potential Secure Boot Bypass >_
  • Magma: A foundation model for multimodal AI agents across digital and physical worlds >_
  • Making Cloudflare the best platform for building AI Agents >_
  • Optimize EDR logs and route them to SentinelOne with Observability Pipelines >_
  • Perform minor/major version upgrades for Amazon Aurora MySQL Global Database with minimum downtime >_
  • Pino Logger: The Fastest and Efficient Node.js Logging Library >_
  • Presentation: A Zero Trust Future for Applications: Practical Implementation and Pitfalls >_
  • PyPy: Low Overhead Allocation Sampling with VMProf in PyPy's GC >_
  • Raising the Bar: More Power, More Value in PagerDuty’s Packaging by PagerDuty >_
  • Securing tomorrow's software: the need for memory safety standards >_
  • Single and Double Underscore Naming Conventions in Python >_
  • Start building with Gemini 2.0 Flash and Flash-Lite >_
  • The Apache Software Foundation Announces Apache Ignite® 3.0 >_
  • The ultimate guide to token management at GitLab >_
  • There Isn't Much Point to HTTP/2 Past the Load Balancer >_
  • Top AWS CloudWatch Anti-Patterns that could derail your Observability strategy >_
  • Understanding VPC CNI (Container Network Interface) >_
  • Updating SUSE/ SLES the right way >_
  • Where Distributed Systems Meet Hadoop and Big Data >_
  • Why I Still Love and Use RSS Feeds in 2025 >_

2025-02-24

  • 10 Best Email Security Gateways In 2025 >_
  • 15 Best Free and Open Source Web Project Management Software >_
  • 50 World’s Best Penetration Testing Companies – 2025 >_
  • Announcing Argo CD v3: Small But Mighty >_
  • Announcing Claude 3.7 Sonnet, Anthropic’s first hybrid reasoning model, is available on Vertex AI >_
  • Anthropic’s Claude 3.7 Sonnet hybrid reasoning model is now available in Amazon Bedrock >_
  • Building Real-Time Autocomplete With Typo Tolerance >_
  • Connect your on-premises Kubernetes cluster to AWS APIs using IAM Roles Anywhere >_
  • Deploying Prometheus with Docker Compose: A Step-by-Step Guide >_
  • Four ways to grant cross-account access in AWS >_
  • FreeBSD 13.5 Beta 3 Drops KDE Packages From DVD ISOs >_
  • GitHub Actions Adds Linux ARM64 Hosted Runners in Public Preview >_
  • GitLab Duo Workflow: Enterprise visibility and control for agentic AI >_
  • Grafana Loki 101: How to ingest logs with Alloy or the OpenTelemetry Collector >_
  • Hardening your Google Kubernetes Engine deployment — Part 2 >_
  • Headless remote sessions in GNOME, Part 1 >_
  • How partners are unlocking scalable audio transcription with Gemini >_
  • How to Build Observability into Chaos Engineering >_
  • How to Fix the “Error establishing a Redis connection” error? >_
  • How to Implement OpenTelemetry in Next.js >_
  • How to secure Azure credentials for OpenShift LightSpeed >_
  • Instrument Google Cloud Run applications with the new Datadog Agent sidecar >_
  • Introducing the new Google Cloud Trace Explorer >_
  • Mistral-Small-24B-Instruct-2501 is now available on SageMaker Jumpstart and Amazon Bedrock Marketplace >_
  • OpenTelemetry Metrics Aggregation: A Detailed Guide >_
  • Phishing Campaigns Targeting Higher Education Institutions >_
  • SUSE and PT Innovation Cloud Services (ICS) Join Forces to Accelerate Cloud Native Transformation in Indonesia >_
  • Superfile: A Modern, Lightweight File Manager for Linux Terminal >_
  • Support Canada’s CCCS PBHVA overlay compliance with the Landing Zone Accelerator on AWS >_
  • The 9 Best Sentry Alternatives for Error Monitoring in 2025 >_
  • Top 10 Best Ransomware Protection Tools – 2025 >_
  • Ubuntu 25.04 Features and Release Date: Here's What You Need to Know >_
  • Ubuntu 7285-1: nginx Security Advisory Updates >_
  • Understanding HDFS from the Perspective of Supply and Demand >_
  • Understanding trx-consistency-only on MyDumper Before Removal >_
  • WellRight modernizes to an event-driven architecture to manage bursty and unpredictable traffic >_
  • What's New in Emacs 30.1? >_

2025-02-23

  • 4 Ways to Make a File in the Linux Terminal >_
  • Best Free and Open Source Alternatives to Google Files >_
  • Bybit Confirms Record-Breaking $1.46 Billion Crypto Heist in Sophisticated Cold Wallet Attack >_
  • How to Add Partitions to an Existing Topic in Kafka >_
  • How to Defend Amazon S3 Buckets From Ransomware Exploiting SSE-C Encryption >_
  • How to tell if FreeBSD needs a Reboot using kernel version check >_
  • Linux Finally Introducing A Standardized Way Of Informing User-Space Over Hung GPUs >_
  • Ubuntu 24.04.2 Released with HWE Kernel 6.11 >_
  • Whoami Command in Linux: Check Your Logged-in User Easily >_
  • Zns: CLI tool for querying DNS records with readable, colored output >_

2025-02-22

  • FreeBSD 13.5-BETA3 Available >_
  • How Mindbody improved query latency and optimized costs using Amazon Aurora PostgreSQL Optimized Reads >_
  • Revisiting Docker Hub Policies: Prioritizing Developer Experience >_
  • System76 Releases COSMIC Alpha 6 Desktop Environment >_
  • Ubuntu 24.04.2 LTS Released with Many Bug Fixes and Security Updates >_

2025-02-21

  • 8 steps to ensuring a smooth Spanner go-live >_
  • A deep dive into Database Monitoring index recommendations >_
  • AWS and DXC collaborate to deliver customizable, near real-time voice-to-voice translation capabilities for Amazon Connect >_
  • Apache Monitoring: Setup Guide, Tools, and Best Practices >_
  • Big Data — Understanding Hadoop: Architecture, Features, Challenges, & Applications. >_
  • Bulk Tank Safety Tips You Need to Know >_
  • Cisco Confirms Salt Typhoon Exploited CVE-2018-0171 to Target U.S. Telecom Networks >_
  • From log analysis to rule creation: How AWS Network Firewall automates domain-based security for outbound traffic >_
  • How Rocket Companies modernized their data science solution on AWS >_
  • How to Enter Single User Mode in AlmaLinux 8/9 >_
  • How to Implement Scalable Usage-Based Billing for AI Workloads >_
  • How to Use OpenSearch with Python for Search and Analytics >_
  • How to debug code with GitHub Copilot >_
  • How to make sure you review your monkey patch when updating Ruby gems >_
  • How to use locators to design more resilient synthetic tests >_
  • Increase control and reduce noise in your AWS logs using Datadog Observability Pipelines >_
  • Insights on AI-powered Cost Reduction Strategies >_
  • Introducing Cloud DNS public IP health checks, for more resilient multicloud deployments >_
  • LLM continuous self-instruct fine-tuning framework powered by a compound AI system on Amazon SageMaker >_
  • Linux Memory Management: Understanding Page Tables, Swapping, and Memory Allocation >_
  • Maximize your file server data’s potential by using Amazon Q Business on Amazon FSx for Windows >_
  • OpenTelemetry Visualization Setup: A Developer's Guide >_
  • Optimizing image generation pipelines on Google Cloud: A practical guide >_
  • Orchestrate an intelligent document processing workflow using tools in Amazon Bedrock >_
  • Postfix 3.10 MTA Arrives with OpenSSL 3.5 Support >_
  • RTO’d? Take these distributed practices back to the office with you >_
  • Reducing hallucinations in LLM agents with a verified semantic cache using Amazon Bedrock Knowledge Bases >_

2025-02-20

  • 15 Best Free and Open Source Terminal Session Recording >_
  • 90,000 WordPress Sites Vulnerable to Local File Inclusion Attacks >_
  • AWS Key Hunter – A Free Automated Tool to Detect Exposed AWS keys >_
  • AWS Launches Trust Center: A Centralized Resource for Security and Compliance Information >_
  • Accelerate Your Business Success with Akamai Enhanced Partner Portal >_
  • An In-Depth Guide to Java Performance Monitoring for SREs >_
  • An SRE’s guide to optimizing ML systems with MLOps pipelines >_
  • Announcing Rust 1.85.0 and Rust 2024 >_
  • Announcing quantum-safe digital signatures in Cloud KMS >_
  • Citrix NetScaler Vulnerability Allows Unauthorized Command Execution >_
  • Critical Microsoft Bing Vulnerability Let Attackers Execute Code Remotely >_
  • Django Weblog: Django 5.2 beta 1 released >_
  • Evolving GitHub Issues: Enhancing Project Management for Developers >_
  • Exploring the structural changes driving protein function with BioEmu-1 >_
  • Fedora Linux Kernel Vulnerability Let Attackers Gain Access to Sensitive Data >_
  • Firefox 135.0.1 Released with Fix for High-Severity Memory Safety Vulnerabilities >_
  • Generate synthetic counterparty (CR) risk data with generative AI using Amazon Bedrock LLMs and RAG >_
  • GitHub Actions vs Jenkins: CI/CD Comparison >_
  • Grafana Drilldown apps: the improved queryless experience formerly known as the Explore apps >_
  • How RamaLama runs AI models in isolation by default >_
  • How a Software Architect Uses Artificial Intelligence in His Daily Work >_
  • How to Find System Information on Ubuntu (for Beginners) >_
  • How to Manage Python Projects With pyproject.toml >_
  • How to Supercharge Your BigQuery Workloads with Google Cloud’s Gemini >_
  • How to Use QEMU to Boot Another Operating System >_
  • How to Use the Docker exec Command >_
  • How to Work with OpenAPI in Go >_
  • How we reduced MR review time with Value Stream Management >_
  • Integrating OpenTelemetry with Grafana for Better Observability >_
  • KDE Plasma 6.3.1 Desktop Environment Released >_
  • Kali Installation on VMware Workstation and Home Lab Setup with Connecting to WIFI >_
  • KubeVPN: Revolutionizing Kubernetes Local Development >_
  • Last Week in Kubernetes Development - Week Ending February 16 2025 >_
  • Linux Conversations | Episode 2: The Future of SUSE Multi-Linux with Johannes Hahn >_
  • Linux Security: Best Practices for Safe Operations >_
  • Mac meets SUSE Edge: Deploying Linux, K3s & Rancher with EIB >_
  • Masking sensitive data in real-time with AWS serverless services >_
  • Mastering Kubernetes in the Cloud: A Guide to Cloud Controller Manager >_
  • Multi-tenant vector search with Amazon Aurora PostgreSQL and Amazon Bedrock Knowledge Bases >_
  • Notebook-style Ruby coding with Jupyter Notebooks >_
  • OpenTelemetry UI: The Ultimate Guide for Developers >_
  • Palo Alto Networks tags new firewall bug as exploited in attacks >_
  • Pedab and SUSE Join Forces to Speed-up Time to Market with Edge Computing and latest Technology >_
  • PostgreSQL 17.4, 16.8, 15.12, 14.17, and 13.20 Released! >_
  • Rhino Linux 2025.2 Brings Stability and Performance Enhancements >_
  • Rust Integration in Linux Kernel Faces Challenges but Shows Progress >_
  • SUMA (SUSE Manager) is back and it has a new name: SUSE Multi Linux >_
  • SUSE Linux Enterprise 15 Service Pack 7 Public Beta is now available >_
  • Self-managed multi-tenant vector search with Amazon Aurora PostgreSQL >_
  • Sophos Firewall v21 MR1 is now available >_
  • The 7 Best Infrastructure Monitoring Tools for Developers in 2025 >_
  • The next generation of Grafana Mimir: Inside Mimir's redesigned architecture for increased reliability >_
  • Ubuntu LTS Users Could Get More Intel GPU Updates >_
  • Unlock Inference-as-a-Service with Cloud Run and Vertex AI >_
  • Why developers should use MicroShift >_
  • XFS: Examples of logged metadata >_
  • Yahoo Data Leak – Hackers Allegedly Advertised 602,000 Email Accounts >_
  • You Can Now Install Linux Kernel 6.13 on Ubuntu, Here’s How >_
  • Your Endpoint Is Secure Against AI Supply Chain Attacks >_
  • Zero-Trust Architecture in Java: Best Practices >_
  • mTLS: Client and Server Authentication with Load Balancer and Certificates services in OCI >_

2025-02-19

  • 13 Best Free and Open Source Linux Video Converters >_
  • AI in action: the next chapter for Jira Service Management >_
  • Apache ZooKeeper & Quorum Journal Node: Ensuring High Availability in Hadoop 2.x >_
  • ArcaOS 5.1.1 released >_
  • Best practices for Amazon SageMaker HyperPod task governance >_
  • Build verifiable explainability into financial services workflows with Automated Reasoning checks for Amazon Bedrock Guardrails >_
  • Building an Open, Multi-Engine Data Lakehouse with S3 and Python >_
  • Cache public container images in your Azure Container Registry with Terraform >_
  • Chrome Buffer Overflow Vulnerabilities Allow Arbitrary Code Execution & Gain System Access >_
  • Deepseek: Why it Matters and What the Press Got Wrong >_
  • Discover Google Cloud careers and credentials in our new Career Dreamer >_
  • Eli Bendersky: Benchmarking utility for Python >_
  • GitHub Copilot for Azure DevOps users >_
  • Global API Management with API Gateway and Route 53 >_
  • Grafana Cloud updates: Exemptions in Adaptive Logs, GPU monitoring in AI Observability, and more >_
  • How Cyber Threat Intelligence Helps with Alert Triage >_
  • How Skool.com Connects with Open Source Ideas >_
  • How To Make Sense of iOS User Activity With OpenTelemetry >_
  • How to Recognize AI Attacks and Strategies for Securing Your AI Applications >_
  • How to Set Up a Kubernetes Network Policy and Secure Your Cluster >_
  • How to Use OpenTelemetry for Kubernetes Autoscaling Metrics >_
  • How to better support your team – without becoming their therapist >_
  • How to deploy confidential containers on bare metal >_
  • How to reduce costs with Managed Service for Apache Kafka: CUDs, compression and more >_
  • How to use OCI images as the source of truth for continuous delivery >_
  • Introducing A4X VMs powered by NVIDIA GB200 — now in preview >_
  • Introducing Azure AI Foundry Labs: A hub for the latest AI research and experiments at Microsoft >_
  • Introducing Muse: Our first generative AI model designed for gameplay ideation >_
  • Introducing PaliGemma 2 mix: A vision-language model for multiple tasks >_
  • Introducing Vulnerability Management Enhancements for Sysdig Secure: Focus on Action >_
  • Manage users and privileges in Amazon RDS Custom for Oracle with Multitenant option >_
  • Multimodal model quantization support through LLM Compressor >_
  • New LLM Vulnerability Let Attackers Exploit The ChatGPT Like AI Models >_
  • New OpenSSH flaws expose SSH servers to MiTM and DoS attacks >_
  • Observe your Kubernetes clusters in minutes … Getting Started with SUSE Cloud Observability on AWS >_
  • One year after switching from Java to Go >_
  • OpenAI Announces New SWE-Lancer Benchmark >_
  • OpenTelemetry Java: A Detailed Guide with Examples and Troubleshooting >_
  • OpenTelemetry vs. ELK: Key Differences and When to Use Each >_
  • Parsing JSON in 500 lines of Rust >_
  • Pgpool-II 4.6 beta1 is now released >_
  • Redis Metrics: Monitoring, Performance, and Best Practices >_
  • Rethinking 5G: The cloud imperative >_
  • SQLPage v0.33: Build Custom UIs, and now APIs — All in SQL! >_
  • Securing Microservices with OAuth2 and OpenID Connect >_
  • Signals of Trouble: Multiple Russia-Aligned Threat Actors Actively Targeting Signal Messenger >_
  • Structuring the GitLab Package Registry for enterprise scale >_
  • Testing concurrent code with testing/synctest >_
  • The Apache Software Foundation Announces Apache Sling™ 13 >_
  • The Database Cheatsheet: SingleStore-Specific Features >_
  • Top 13 Kafka Monitoring Tools You Should Know >_
  • Top cloud misconfigurations: A CSPM perspective >_
  • Why Observability Needs To Go Headless >_
  • oomwatch - A Userspace Out of Memory Killer - OLED >_
« newer articles | page 61 | older articles »