2025-02-05

  • 5 AI trends shaping the future of the public sector in 2025 >_
  • AI Monitoring and LLMOps with PagerDuty by Mitra Goswami >_
  • AWS CloudWatch Custom Metrics: Types & Setup Guide [With Examples] >_
  • AWS renews MTCS Level 3 certification under the SS584:2020 standard >_
  • Advances to low-bit quantization enable LLMs on edge devices >_
  • Alpine Linux Appeals for Hosting Support >_
  • Boost your GCP data protection strategy with Veeam >_
  • Build a multi-interface AI assistant using Amazon Q and Slack with Amazon CloudFront clickable references from an Amazon S3 bucket >_
  • Cloudflare’s commitment to advancing Public Sector security worldwide by pursuing FedRAMP High, IRAP, and ENS >_
  • Creating Your First Looker Instance on GCP: A Step-by-Step Guide (with OAuth) >_
  • Designing sustainable AI: A deep dive into TPU efficiency and lifecycle emissions >_
  • Docker Bake is Now Generally Available in Docker Desktop 4.38! >_
  • Docker Desktop 4.38: New AI Agent, Multi-Node Kubernetes, and Bake in GA >_
  • Efficiently Migrating Excel Files to Google Sheets in Enterprise Cloud Migrations >_
  • Empowering federal agencies with a more secure and efficient developer experience >_
  • Enhancing LLM Capabilities with NeMo Guardrails on Amazon SageMaker JumpStart >_
  • GNU Make Standard Library >_
  • Gemini 2.0: Flash, Flash-Lite and Pro >_
  • Getting Started with OpenTelemetry Java SDK >_
  • Google SecOps Managed Forwarder on Google Kubernetes Engine >_
  • How AWS Network Firewall session state replication maximizes high availability for your application traffic >_
  • How to Disable Docker Swarm Mode? >_
  • How to Switch a User per Task in Ansible >_
  • How to build a strong brand logo with Imagen 3 and Gemini >_
  • How to visualize CSV data with Grafana >_
  • IDC Study Reveals SUSE Rancher Prime Delivers $3.4M in Annual Benefits >_
  • Introducing the Beta Launch of Docker’s AI Agent, Transforming Development Experiences >_
  • Microsegmentation on GCP with Cloud NGFW: A Customer’s Journey >_
  • MySpace? Your security >_
  • OfferUp improved local results by 54% and relevance recall by 27% with multimodal search on Amazon Bedrock and Amazon OpenSearch Service >_
  • Revolutionizing Retail with Edge Computing: Insights from NRF 2025 >_
  • Revolutionizing software testing: Introducing LLM-powered bug catchers >_
  • Sentry vs Datadog: Which is the Right Tool for Your DevOps Needs >_
  • Simplify your SIEM migration to Microsoft Sentinel with Datadog Observability Pipelines >_
  • Solve database bottlenecks faster with the latest query insights for Cloud SQL Enterprise Plus >_
  • Some terminal frustrations >_
  • Terraform on AWS: An introductory guide >_
  • Top 10 Ubuntu 24.04 Post Installation Steps You Should Follow >_
  • Trellix lowers cost, increases speed, and adds delivery flexibility with cost-effective and performant Amazon Nova Micro and Amazon Nova Lite models >_
  • Tutorial: Security scanning in air-gapped environments >_
  • Use generative AI on AWS for efficient clinical document analysis >_
  • Using Terraform Workspace for AWS multi account archtetctures >_
  • Why I switched from VMware to OpenShift Virtualization >_
  • Why SLA Monitoring Matters & Best Practices for Success >_
  • crates.io: development update >_
  • sync/v2 and the 'v2'-ification of Go's standard library >_

2025-02-04

  • 10 Kubernetes Monitoring Tools You Can't-Miss in 2025 >_
  • Announcing ARM builds in cloud for Bitbucket Pipelines >_
  • Building AI platforms together, for everyone - State of Open Con 2025 >_
  • Create a 360-degree master data management patient view solution using Amazon Neptune and generative AI >_
  • Cybersecurity for Businesses of All Sizes: A Blueprint for Protection >_
  • Data logs: The latest evolution in Meta’s access tools >_
  • Dynatrace vs Grafana - A Detailed Comparison for 2025 >_
  • Full web support for conditional access policies across Azure DevOps and partner web properties >_
  • Get Ready for Partner Summit 2025 >_
  • Getting started with Swift’s Alliance Connect Virtual on Google Cloud >_
  • Helping our partners co-market faster with AI >_
  • How Loom supports better employee onboarding and customer training >_
  • How to Master Zap Logger for Clean, Fast Logs >_
  • How to analyze changes to enum types using abidiff >_
  • How to harmonize Agile sprints with product roadmaps >_
  • How we improved GKE volume attachments for stateful applications by up to 80% >_
  • Linux Mint 22 VirtualBox Setup: Essential Steps After Installation >_
  • MongoDB 8.0 Performance; Does It Live Up to the Hype? >_
  • No hallucinations here: track the latest AI trends with expanded insights on Cloudflare Radar >_
  • Orchestrate seamless business systems integrations using Amazon Bedrock Agents >_
  • Quickly get rich, actionable context for alerts with Datadog's new Monitor Status page >_
  • SLOs: a guide to setting and benefiting from service level objectives >_
  • SSHD Logs 101: Configuration, Security, and Troubleshooting Scenarios >_
  • SUSE and Portworx by Pure Storage >_
  • The Database Cheatsheet: Database Operations >_
  • Top 11 API Monitoring Tools You Need to Know >_
  • Website Performance Benchmarks: What You Should Aim For [with Examples] >_
  • What Embedded Systems Are Used in Cars? >_

2025-02-03

  • 18 Best Free and Open Source Linux Astronomy Apps >_
  • 2024: A year of innovation and growth for Amazon DynamoDB >_
  • AWS Weekly Roundup: DeepSeek-R1, S3 Metadata, Elastic Beanstalk updates, and more (February 3, 2024) >_
  • Accelerate video Q&A workflows using Amazon Bedrock Knowledge Bases, Amazon Transcribe, and thoughtful UX design >_
  • Announcing partner-delivered professional services on Google Cloud Marketplace >_
  • CVE-2023-6080: A Case Study on Third-Party Installer Abuse >_
  • Cache Hit Ratio: The Key Metric for Happier Users and Lower Expenses >_
  • Converting a Null Array to an Empty List in Java >_
  • Gather organization-wide Amazon RDS orphan snapshot insights using AWS Step Functions and Amazon QuickSight >_
  • GrafanaCON 2025: Register today for our biggest community event of the year! >_
  • Harnessing Artificial Intelligence for a Superior Web Application Firewall >_
  • How Precision Time Protocol handles leap seconds >_
  • How VXLAN encapsulation affects Arm (aarch64) servers >_
  • How insurance companies discover, classify, and act on sensitive data risks with Datadog >_
  • How to Install Linux Mint 22 in VirtualBox | Step-by-Step Guide for System Administrators & Developers >_
  • How to Run DeepSeek in a Web UI Using Ollama and Open WebUI >_
  • How to Spot and Fix Memory Leaks in Java? >_
  • Implement effective data authorization mechanisms to secure your data used in generative AI applications – part 2 >_
  • Introducing step failure strategies in Bitbucket Pipelines >_
  • Logfiles: What They Reveal and How to Use Them >_
  • Logging in Go with Slog: A Detailed Guide >_
  • OpenTelemetry Processors: Workflows, Configuration Tips, and Best Practices >_
  • Preserving content provenance by integrating Content Credentials into Cloudflare Images >_
  • Reviewing Every New Feature in HAProxy 3.1 >_
  • SCSI DTrace - OLED >_
  • Step into the future of manufacturing at Embedded World 2025 >_
  • The Basics of Log Parsing (Without the Jargon) >_
  • Update to Azure DevOps Allowed IP addresses >_
  • Why Open Source Collaboration Is More Important Than Ever >_

2025-02-02

  • Analyzing the codebase of Caffeine: a high performance caching library >_
  • Cloudflare Open Sources Documentation and Adopts Astro for Better Scalability >_
  • Compiling Java into Native Binaries with Graal and Mill >_
  • Implementing etcd Backup and Restore >_
  • Linux System Logs Explained: How to Read and Analyze Logs Like a Pro >_
  • Unlimited Bandwidth vs Unmetered Bandwidth: Comparisons, Benefits and Dangers >_

2025-02-01

  • AI Cyber Threat Intelligence Roundup: January 2025 >_
  • Announcing the availability of the o3-mini reasoning model in Microsoft Azure OpenAI Service >_

2025-01-31

  • 4 Views in Jira Product Discovery Every Engineering Leader Needs >_
  • Accelerate digital pathology slide annotation workflows on AWS using H-optimus-0 >_
  • Argo Rollouts 1.8 Released >_
  • Blackwell is here — new A4 VMs powered by NVIDIA B200 now in preview >_
  • Building a Serverless AI Chatbot: Integrating OpenAI with Telegram on AWS >_
  • Cloud vs. On-Prem: Which Is Better for Your Kubernetes Cluster? >_
  • Data resilience and data portability >_
  • DeepSeek-R1 model now available in Amazon Bedrock Marketplace and Amazon SageMaker JumpStart >_
  • DeepSeek-R1 models now available on AWS >_
  • Docker Basics: How to Use Dockerfiles >_
  • Doppler Announces Integration with Datadog to Streamline Security and Monitoring >_
  • Enhancing Rovo Chat with Hybrid LLM Approach >_
  • Evaluating Security Risk in DeepSeek and Other Frontier Reasoning Models >_
  • GNU C Library 2.41 Released With New C23 Features, Intel / AMD / Arm CPU Optimizations >_
  • Google blocked 2.36 million risky Android apps from Play Store in 2024 >_
  • Harnessing AI to Simplify Cloud Configuration Drift Detection >_
  • Harnessing AWS Cloud for Seamless DeepSeek R1 Operations >_
  • Harnessing Amazon Bedrock generative AI for resilient supply chain >_
  • How To Integrate a Container Management Platform Into Your Existing Hybrid IT Infrastructure >_
  • How Travelers Insurance classified emails with Amazon Bedrock and prompt engineering >_
  • How to Edit your Hosts File in Linux >_
  • How to Install and Run DeepSeek-R1 on Ubuntu 24.04 | Complete Step-by-Step Guide >_
  • How to become a more connected leader  >_
  • How we built a navigation that works for everyone >_
  • Improving model performance with PyTorch/XLA 2.6 >_
  • Infrastructure as Code: From Imperative to Declarative and Back Again >_
  • JMX Metrics: Types, What to Monitor, and When to Check >_
  • JMX Monitoring: Your Go-To Guide for Java Application Management >_
  • Kick-off more workflows in 2025 with the latest Atlassian Automation enhancements >_
  • MySQL Monitoring: Open-Source vs. Commercial Tools >_
  • Organizational best practices for implementing EKS Anywhere at scale >_
  • PyPI’s New Archival Feature Closes a Major Security Gap >_
  • Rails Logger: How to Customize, Configure, and Optimize Your Logs >_
  • Rust vs Node — Kafka producer performance with AWS Lambda >_
  • The Hidden Costs of Vendor Lock-In: Why Open Source Values Matter >_
  • What is a Process ID? How to Use PIDs for Process Management >_

2025-01-30

  • 16 Top Python Hacks for Data Scientists to Improve Productivity >_
  • AI and security: Safeguarding users and strengthening national security >_
  • Amazon Redshift enhances security by changing default behavior in 2025 >_
  • Announcing the general availability of Spanner Graph >_
  • Check if a File Exists in a Jenkins Pipeline >_
  • Cloud CISO Perspectives: How cloud security can adapt to today’s ransomware threats >_
  • DeepSeek R1 is now available on Azure AI Foundry and GitHub >_
  • Deploy DeepSeek-R1 Distilled Llama models in Amazon Bedrock >_
  • DigitalOcean VPC Peering: A Technical Deep Dive >_
  • Getting rid of Ruby's global VM lock >_
  • How Aetion is using generative AI and Amazon Bedrock to unlock hidden insights about patient populations >_
  • How GitLab uses prompt guardrails to help protect customers >_
  • How to Log All Requests and Responses and Exceptions in a Single Place >_
  • How to build the right thing (and prevent building the wrong ones) >_
  • How to implement C23 #embed in GCC 15 >_
  • How to integrate performance testing and continuous profiling for deeper application insights >_
  • How to monitor Unused Amazon EBS Volumes >_
  • Java Language Evolution in 2025 - Inside Java Newscast #84 >_
  • Kubernetes Pods vs Nodes: What Sets Them Apart >_
  • Laravel admin package Voyager vulnerable to one-click RCE flaw >_
  • Last Week in Kubernetes Development - Week Ending January 26 2025 >_
  • Log4j vs. Winston: Logging Libraries in Java and JavaScript >_
  • Microsoft 365 Down – Widespread Outage Affects Users and Admins >_
  • New Aquabotv3 botnet malware targets Mitel command injection flaw >_
  • NordVPN says its new protocol can circumvent VPN blockers >_
  • OpenMetrics vs OpenTelemetry: A Detailed Comparison >_
  • Our Q2 FY25 letter to shareholders >_
  • Pingdom Alternatives: The Best 7 Options for Website Monitoring >_
  • Pod Exec in K8s: Advanced Exec Scenarios and Best Practices >_
  • Simplify the developer experience on Kubernetes with KRO >_
  • SingleStore as a Vector Database for AI Applications: A Developer's Guide >_
  • Streamline grant proposal reviews using Amazon Bedrock >_
  • Ten principles of Hostinger: Why you shouldn’t be afraid to hire better than yourself >_
  • The Co-Create Program: How customers are collaborating to build GitLab >_
  • This Month in Datadog - January 2025 >_
  • Top 5 Lightweight Linux Distros Without GUI >_
  • Top Threat Tactics and How to Address Them >_
  • Troubleshooting DNS Issues in Docker Containers When Installing pip Packages >_
  • Understanding the Linux /proc Filesystem: A Beginners Guide >_
  • [TEST-SHAUNNA]- January newsletter >_
  • replace GnuPG with age and signify >_
« newer articles | page 64 | older articles »