2025-02-12

  • AI agents at work: The new frontier in business automation >_
  • Achieve Transformative Network Security With Cisco Hybrid Mesh Firewall >_
  • Achieve ~2x speed-up in LLM inference with Medusa-1 on Amazon SageMaker AI >_
  • Cisco and Wiz Collaborate to Enhance Cloud Security: Tackling AI-Generating Threats in Complex IT Infrastructures >_
  • Cloud invaders: Spotting compromised users before it’s too late >_
  • Cybercrime: A Multifaceted National Security Threat >_
  • ELK vs New Relic: Which Monitoring Tool Should You Choose in 2025? >_
  • EndeavourOS Mercury (2025.02.08) Released >_
  • Fine-tune LLMs with synthetic data for context-based Q&A using Amazon Bedrock >_
  • From concept to reality: Navigating the Journey of RAG from proof of concept to production >_
  • Go 1.24 arrives >_
  • Google Cloud Next ’25 Guide: Pro tips from SUSE >_
  • How GitHub uses CodeQL to secure GitHub >_
  • How RHOCP 4.17 enhances control plane resilience >_
  • How to Filter Docker Logs with Grep >_
  • How to cut costs for metrics and logs: a guide to lowering expenses in Grafana Cloud >_
  • LLM-as-a-judge on Amazon Bedrock Model Evaluation >_
  • Microsoft Research and Physics Wallah team up to enhance AI-based tutoring >_
  • Monitoring Your SUSE Virtualization Environment >_
  • Rails async queries by example >_
  • Supercharge Innovation Velocity by Eliminating Operational Chaos by Laura Chu >_
  • The Database Cheatsheet: Advanced Queries >_
  • The Risks of Shadow AI, and How To Use AI Safely Instead >_
  • The hidden costs of standalone digital whiteboards >_
  • Timestamp writes for write hedging in Amazon DynamoDB >_
  • Ubuntu System Logs: How to Find and Use Them >_
  • Why Multi-Linux Support Helps to Enable Modernization >_
  • Why you should check out our Next ‘25 Security Hub >_

2025-02-11

  • 3 ways Ansible Lightspeed simplifies automation >_
  • AWS CSPM Explained: How to Secure Your Cloud the Right Way >_
  • Amazon Q Business simplifies integration of enterprise knowledge bases at scale >_
  • Announcing Atlassian Williams Racing  >_
  • Arming the Defenders: A SOTI Report for Those Who Protect the Enterprise >_
  • Balance of power: A full-stack approach to power and thermal fluctuations in ML infrastructure >_
  • Building a virtual meteorologist using Amazon Bedrock Agents >_
  • Create a serverless custom retry mechanism for stateless queue consumers >_
  • Distributed Tracing 101: Definition, Working and Implementation >_
  • Enterprise Adoption of AI: A Conversation with 451 Analyst, Eric Hanselman >_
  • ExACT: Improving AI agents’ decision-making via test-time compute scaling >_
  • Exploring a VPN Appliance: A Researcher?s Journey >_
  • Falcon 3 models now available in Amazon SageMaker JumpStart >_
  • Faster distributed graph neural network training with GraphStorm v0.4 >_
  • February Patches for Azure DevOps Server >_
  • Fusing Security Into the Network Fabric: From Hybrid Mesh Firewalls to Universal ZTNA >_
  • Get ready for Google I/O May 20-21 >_
  • Getting started with GitLab: Mastering project management >_
  • Go 1.24 is released! >_
  • Implementing least privilege access for Amazon Bedrock >_
  • Meta SAM 2.1 is now available in Amazon SageMaker JumpStart >_
  • Monitor Google Cloud: simplify and centralize your cloud provider observability with Grafana Cloud >_
  • Monitoring Kubernetes Resource Usage with kubectl top >_
  • Offline celebrations: how Christmas, NYE, and Lunar New Year festivities shape online behavior >_
  • PGroonga 4.0.0 - Multilingual fast full text search >_
  • PostgreSQL 17 is now Available for DigitalOcean Managed PostgreSQL >_
  • Security Advisory: CVE Affecting Percona Monitoring and Management (PMM) >_
  • The new Query Builder in Logs Explorer: Powerful Log Analysis without LogQL >_
  • Why Open-Source is the Future of Affordable Learning >_
  • XFS: Ondisk layout of checkpoint transactions >_

2025-02-10

  • 3 improvements in GDB 16's core file loading >_
  • 5 ways Google Cloud can help you minimize credential theft risk >_
  • AWS Weekly Roundup: AWS Step Functions, AWS CloudFormation, Amazon Q Developer, and more (February 10, 2024) >_
  • Advanced Google Cloud Load Balancer & Cloud Armor Analytics with Custom Dashboards >_
  • Announcing ASCP integration with Pod Identity: Enhanced security for secrets management in Amazon EKS >_
  • Automate bulk image editing with Crop.photo and Amazon Rekognition >_
  • Build agentic AI solutions with DeepSeek-R1, CrewAI, and Amazon SageMaker AI >_
  • Building a Number Analysis API, Fun Facts and Math Insights with AWS Lambda and FastAPI >_
  • Citus 13.0 Released! >_
  • FerretDB, an Open-Source Alternative to MongoDB, Releases Version 2.0 >_
  • From Datadog to Grafana Cloud: Why companies migrate and how it changes business for the better >_
  • Grafana Beyla 2.0: distributed traces, scalable Kubernetes deployments, and more >_
  • How to Create Symbolic Links in Ubuntu Linux >_
  • How to Publish to GitHub Pages From Another Repository >_
  • Implementing CI/CD with Azure DevOps: Azure Artifacts and Release Pipelines >_
  • Kdenlive 24.12.2 Released with Another Dozen Fixes >_
  • Linux Kernel 6.14 Released – What’s New With rc2! >_
  • Log Levels: Answers to the Most Common Questions >_
  • Networking support for AI workloads >_
  • New Relic vs Kibana: A Guide to Choosing the Right Tool in 2025 >_
  • Prepare Your Mac for Python Development >_
  • Python 3.14 Getting New Interpreter >_
  • QUIC action: patching a broadcast address amplification vulnerability >_
  • Revolutionizing business processes with Amazon Bedrock and Appian’s generative AI skills >_
  • Simplify database authentication management with the Amazon Aurora PostgreSQL pg_ad_mapping extension >_
  • The Database Cheatsheet: Data Manipulation >_
  • The Ultimate Guide to OpenTelemetry Visualization >_
  • Transforming credit decisions using generative AI with Rich Data Co and AWS >_

2025-02-09

  • All the latest feature releases, updates and announcements of AWS re:Invent 2024 >_
  • Cybersecurity Weekly Brief: Latest on Attacks, Vulnerabilities, & Data Breaches >_
  • Deploying a Cloudfront Lambda Image Optimization stack with Terraform Part 1 - Cloudfront >_
  • How to Set Up Two-Factor Authentication on Ubuntu >_
  • Microsoft’s WSL May Soon Embrace Arch Linux >_
  • PGConf.BE 2025: Call for Papers & Sponsors >_
  • SUSE and Dell Technologies certify solution to make 5G and Edge Computing Easier for Telcos >_

2025-02-08

  • 15 Best Free and Open Source Console Email Clients >_
  • A 16TB Mirror of Data.gov on Source.Coop >_
  • Application Monitoring with OpenTelemetry >_
  • Bluefin, a Next-Gen Linux Workstation for Containerized Apps >_
  • How to Install Elasticsearch on Ubuntu/Debian Linux >_
  • HowTo Create a Kubernetes Cluster in 10 Minutes >_
  • LibreOffice 25.2 Released, This is What’s New >_
  • Master the tail Command in Linux: Real-Time Log Monitoring & Troubleshooting >_
  • Serverless CI/CD: Automating Deployments with AWS SAM, CDK and GitHub actions >_
  • Tails 6.12 Rolls Out, Sealing Critical Security Gaps >_
  • Tips for Changing the DB Instance Class of an Amazon Aurora DB Instance with Terraform >_
  • Zellij: A Modern Terminal Multiplexer for Linux >_

2025-02-07

  • A Comprehensive Guide to Heaps in Java >_
  • AI Everything: Themes From the 2025 World Economic Forum >_
  • AWS Aurora DSQL for Django Developers: A Step-by-Step Guide >_
  • Accelerate your Amazon Q implementation: starter kits for SMBs >_
  • Anthropic and DeepSeek Join the GenAI Platform Model Library >_
  • Apache Solr: Features, Architecture, and Use Cases >_
  • BigQuery datasets now available on Google Cloud Marketplace >_
  • Building the future of construction analytics: CONXAI’s AI inference on Amazon EKS >_
  • Cloudflare Incident on February 6, 2025 >_
  • Critical Cisco ISE bug can let attackers run commands as root >_
  • DDoS attacks reportedly behind DayZ and Arma network outages >_
  • Debian 13 to Feature GNOME 48 Desktop Environment >_
  • Dell Update Manager Plugin Vulnerability Let Hackers Access Sensitive Data >_
  • Encrypt PostgreSQL Data at Rest on Kubernetes >_
  • Enhancing telecom security with AWS >_
  • Everything You Need to Know About Microsoft Sentinel Pricing >_
  • Get Your Data “AI-ready” >_
  • Ghidra 11.3 Released – NSA’s Powerful Reverse Engineering Tool >_
  • Governing the ML lifecycle at scale, Part 4: Scaling MLOps with security and governance controls >_
  • How Azure Observability Optimizes Performance and Monitoring >_
  • How Untold Studios empowers artists with an AI assistant built on Amazon Bedrock >_
  • LLMjacking targets DeepSeek >_
  • Linux List Processes – How to Check Running Processes >_
  • Mastering the uniq Command in Linux: Essential Guide for Linux Users >_
  • Migrate to RHACM Policy Generator with OpenShift 4.16 >_
  • Mixing Rust and C in Linux likened to cancer by kernel maintainer >_
  • News you can use: What we announced in AI this month >_
  • Node.js 20: Key Performance Boosts and New Features >_
  • Optimizing Video Editing: Free Online Automatic Driver Updates >_
  • Protect your DeepSeek model deployments with Amazon Bedrock Guardrails >_
  • Python in Visual Studio Code – February 2025 Release >_
  • Resolving a Mutual TLS session resumption vulnerability >_
  • RustDesk – open-source alternative to TeamViewer >_
  • Using OCI Object Storage buckets as a Persistent Volume Claim (PVC) in OCI Kubernetes Engine (OKE) >_

2025-02-06

  • 13 CLI Tools Every Developer Should Master in 2025 >_
  • 2024 FINMA ISAE 3000 Type II attestation report available with 179 services in scope >_
  • 2024 PiTuKri ISAE 3000 Type II attestation report available with 179 services in scope >_
  • 8 Best Free and Open Source Linux Photo Management Software >_
  • AWS CodeBuild for macOS adds support for Fastlane >_
  • Abandoned AWS Cloud Storage: A Major Cyber-Attack Vector >_
  • Announcing public beta of Gen AI Toolbox for Databases >_
  • Bash Script to Zip All FIles in Directory >_
  • Beyond Logs & Metrics: How AI-Powered Observability is Reshaping Incident Response >_
  • Comparing Java vs. Python Libraries: Top 7 Picks for 2025 >_
  • Deployment of GKE AutoCluster >_
  • Effective error handling strategies for Lambda invocation models >_
  • Empowering women with cloud and AI skills: Register for the Google Launchpad for Women series >_
  • Fabrication begins for production OpenTitan silicon >_
  • Fine-tune and host SDXL models cost-effectively with AWS Inferentia2 >_
  • Google Plans Major CapEx Hike Amid Slowing Cloud Growth >_
  • Here’s How Standardization Can Fix the Identity Security Problem >_
  • How Aetion is using generative AI and Amazon Bedrock to translate scientific intent to results >_
  • How Financial Leaders Can Overcome 6 Major Industry Challenges by Laura Chu >_
  • How MIG maximizes GPU efficiency on OpenShift AI >_
  • How to Build an Analytical Dashboard with Next.js >_
  • How to Execute Load Tests Using the k6 Framework >_
  • How to Monitor Error Logs in Real-Time: An In-Depth Guide >_
  • How to Size Your Executors in Spark Cluster >_
  • How to Split a String in Python >_
  • How to detect malicious browser extensions using Elastic >_
  • How to list upgradeable packages with apt and apt-get >_
  • How to scan a full commit history to detect sensitive secrets >_
  • Imagen 3 arrives in the Gemini API >_
  • Last Week in Kubernetes Development - Week Ending February 02 2025 >_
  • List top 10 CPU using processes in Linux >_
  • Managed Network Cloud Firewall: Comprehensive Protection for Network Attack Surface >_
  • Mastering the Exit Command in Linux | Explained with Real-Life Use Cases >_
  • New Data Center Developments: February 2025 >_
  • Observability Insights session – Data analytics with OCI Application Performance Monitoring >_
  • PyPy: PyPy v7.3.18 release >_
  • Python in Visual Studio Code – February 2025 Release >_
  • Quantum Key Distribution and the Path to Post-Quantum Computing >_
  • Reducing Disruptions and Improving On-Call Efficiency: The Power of a Data-Driven Mindset >_
  • Rightsize your Memorystore for Redis Clusters with open-source Autoscaler >_
  • Ruby on Rails on WebAssembly >_
  • Simplifying Product On-Boarding with Generative AI >_
  • Snyk integrates with Google Security Command Center to Enable Comprehensive Security Posture Management from Code to Cloud >_
  • Software Development Outlook for 2025 and Beyond: No Easy Projects >_
  • Survey Surfaces Mass Migration to Cloud-Native Applications >_
  • The Evolution of IT Strategies: Adapting to Modern Demands >_
  • The State of PHP 2024 >_
  • Thinking like a fox: A reading list for the future >_
  • Top 15 PostgreSQL Monitoring Tools in 2025 >_
  • Using capa Rules for Android Malware Detection >_
  • WAL-G 3.0.5 released >_
  • Why observability needs FinOps, and vice versa: the Vantage integration with Grafana Cloud >_
  • pgexporter 0.6 >_
« newer articles | page 63 | older articles »