2025-01-29

  • 5 Common Incident Severity Levels You Should Know >_
  • A continued focus on the benefits of Go 1.24 >_
  • Adversarial Misuse of Generative AI >_
  • An Introduction to Django Views >_
  • Article: The End of the Bronze Age: Rethinking the Medallion Architecture >_
  • Automating EC2 Instance Resizing with AWS Systems Manager (SSM) Document >_
  • Automating cybersecurity threat detections with GitLab CI/CD >_
  • Business challenges and pain points: Tailscale patterns from the field >_
  • ByteDance to Network a Million Containers with netkit >_
  • CISA Brings KEV Data to GitHub >_
  • Cloud security research and guide roundup: DevSecOps, threat detection, and AI >_
  • Cloud security research and guide roundup: Infrastructure and access >_
  • Creating an ACFS Filesystem on Exascale Volumes >_
  • Data Cleaning in Python: Techniques and Best Practices >_
  • Decoding Data Center Efficiency Metrics: A Guide to Energy and Sustainability >_
  • General availability of the Jenkins to Bitbucket Pipelines migration tool >_
  • Generative AI operating models in enterprise organizations with Amazon Bedrock >_
  • Grafana 11.5 release: easily share Grafana dashboards and panels, secure frontend code for plugins, and more >_
  • Hackers exploit critical unpatched flaw in Zyxel CPE devices >_
  • How Aqua Security exports query data from Amazon Aurora to deliver value to their customers at scale >_
  • How executives can accelerate time to value through Atlassian’s System of Work >_
  • How golden paths improve developer productivity >_
  • How to Benchmark Your Storage in Kubernetes easily? >_
  • How to Choose the Right SQL Database >_
  • How to Create a Basic CI/CD Pipeline with Webhooks on Linux >_
  • How to Hot Reload Kubernetes with Skaffold >_
  • How to Install DeepSeek Locally with Ollama LLM in Ubuntu 24.04 >_
  • How we estimate the risk from prompt injection attacks on AI systems >_
  • How we kept the Google Play & Android app ecosystems safe in 2024 >_
  • Improve AI security in GitLab with composite identities >_
  • Improve security auditing with GitLab Operational Container Scanning >_
  • Introducing custom rules in Workload Manager: Evaluate workloads against customized best practices >_
  • January newsletter: Project Bob’s global voyage + simplified networking for Apple fleets >_
  • Kubernetes Cloud Repatriation Saves Millions for Data Platform Provider >_
  • Meridian is now available to everyone >_
  • New Debian Developers and Maintainers (November and December 2024) >_
  • Outbrain: Taking control of extension security with Chrome Enterprise >_
  • Quiz: Which time management strategy is right for you? >_
  • RUM: Key Metrics and How to Measure Them >_
  • Real-world enterprise use cases: Tailscale patterns from the field >_
  • SRE Roles & Responsibilities >_
  • The New Frontier of Security: Creating Safe and Secure AI Models >_
  • Top 5 Dynatrace Alternatives: Compare Features, Pricing & More >_
  • Understanding PromQL Facets: Unlocking Advanced Metrics Analysis >_
  • View related logs and traces from a Dashboard panel >_
  • What Are Syslog Levels and Why Should You Care? >_

2025-01-28

  • 16 Best Free and Open Source Graphical Git Clients >_
  • 7 Best and Scalable SolarWinds Alternatives to Consider in 2025 >_
  • A Preview of Future Forge Pricing >_
  • A diversity of downtime: the Q4 2024 Internet disruption summary >_
  • AWS Firewall Manager retrofitting: Harmonizing central security with application team flexibility >_
  • Active Exploitation: New Aquabot Variant Phones Home >_
  • Apple Patches Actively Exploited Zero-Day Affecting iPhones, Macs, and More >_
  • Apple Patches Actively Exploited Zero-Day Vulnerability >_
  • Best Practices for Building IIoT Energy Monitoring Applications >_
  • Black Hat Europe 2024 NOC/SOC: Security Cloud >_
  • CDNs: Great for speeding up the internet, bad for location privacy >_
  • Changes to provisioning Azure DevOps projects using the Azure DevOps Demo Generator >_
  • Cloudflare meets new Global Cross-Border Privacy standards >_
  • Considerations for making a tree view component accessible >_
  • Create a bastion with AWS CDK >_
  • Crisis Simulations: A Top 2025 Concern for CISOs >_
  • DeepSeek Hit by Large-Scale Cyber Attack, Temporarily Limits Registrations >_
  • Deploy a server using Go with GitLab + Google Cloud >_
  • Develop a RAG-based application using Amazon Aurora with Amazon Kendra >_
  • DeveloperWeek US 2025 >_
  • Ensuring Compliance with Emerging Regulations: Modernize Your SAP Landscape with Confidence >_
  • Error Logs: What They Are, Why They Matter, and How to Use Them >_
  • From code to production: A guide to continuous deployment with GitLab >_
  • Getting started with GitLab: How to import your projects to GitLab >_
  • Go 1.24's go tool is one of the best additions to the ecosystem in years >_
  • How Nielsen uses serverless concepts on Amazon EKS for big data processing with Spark workloads >_
  • How to Clear APT Cache and Free Up Disk Space >_
  • How to Install Pi-hole Server on Linux >_
  • How to Install and Use DeepSeek Locally in Ubuntu 24.04 - Complete Guide >_
  • How to Set Up SQL Server on Red Hat Enterprise Linux >_
  • How to Use XOR Gate in Bash Script >_
  • How to migrate to Grafana IRM: find the right path for your organization >_
  • How to name, version, and reference container images >_
  • How to run OpenAI via Azure using AIProxy in Swift >_
  • How-To: Handle an SRE On-Call Shift Like a Pro >_
  • Install DeepSeek on Linux in 3 Minutes >_
  • IoT Monitoring: Why It Matters and How to Do It Right? >_
  • Microsoft Teams phishing attack alerts coming to everyone next month >_
  • Monitor the health of Amazon Aurora PostgreSQL instances in large-scale deployments >_
  • Optimizing AI responsiveness: A practical guide to Amazon Bedrock latency-optimized inference >_
  • Producer java library for Data Lineage is now open source >_
  • Real Python: How to Split a Python List or Iterable Into Chunks >_
  • Running a Debian Sid on Ubuntu >_
  • SUSECON 2025: Sessions and Certifications to Advance Your Open Source Journey >_
  • ScatterBrain: Unmasking the Shadow of PoisonPlug's Obfuscator >_
  • Solus 4.7 Released with Linux 6.12 LTS, GNOME 47, KDE Plasma 6.2, and Xfce 4.20 >_
  • Start the New Year strong with Card mirroring and Jira lists >_
  • TCP Monitoring Made Simple: Keep Your Network in Check >_
  • Testing and evaluating GuardDuty detections >_
  • The Power of Structured Logging: Why It Matters in Modern Development >_
  • Track LLM model evaluation using Amazon SageMaker managed MLflow and FMEval >_
  • Unlocking Serverless with AWS Lambda and Node.js >_
  • Upcoming support lifecycle milestones for older on-premises products >_
  • Updated whitepaper available: Aligning to the NIST Cybersecurity Framework in the AWS Cloud >_
  • Zato Blog: Network packet brokers and automation in Python >_
  • awk - how to print all fields larger then $5? >_

2025-01-27

  • 2024 C5 Type 2 attestation report available with 179 services in scope >_
  • A deep dive into Amazon EKS Hybrid Nodes >_
  • A new flexible, simplified, and more secure way to configure GKE cluster connectivity >_
  • AWS Weekly roundup: EventBridge, SNS FIFO, Amazon Corretto, Amazon Connect, Amazon Bedrock, and more >_
  • AWS open source newsletter #206 >_
  • An Easy Guide to OpenTelemetry Environment Variables >_
  • Announcing the Latest dotConnect for PostgreSQL Release: Now Supporting PostgreSQL 17, .NET 9, and EF Core 9 >_
  • Announcing upcoming changes to the AWS Security Token Service global endpoint >_
  • Cloud migrations made easy: a guide to migrating from AWS to Google Cloud >_
  • Cloudflare thwarts over 47 million cyberthreats against Jewish and Holocaust educational websites >_
  • Continuing the Sustainability Conversation >_
  • Create a SageMaker inference endpoint with custom model & extended container >_
  • Datadog Pricing: All your Questions Answered >_
  • How SUSE Helps Telcos De-Risk Their Multi-Vendor Strategy >_
  • How to manage Python dependencies in Ansible execution environments >_
  • IYKYK: The secret language of memes >_
  • Image and video prompt engineering for Amazon Nova Canvas and Amazon Nova Reel >_
  • Important changes coming to Bitbucket Cloud’s free plan >_
  • Industrial IoT visualization: How Grafana powers industrial automation and IIoT >_
  • Introducing the GraphRAG Toolkit >_
  • Lessons Learned From Using Azure Versioning and Soft-Delete >_
  • Meet SUSE at SAPinsider Las Vegas – March 18-20, 2025 >_
  • Navigating the 2024 holiday season: Insights into Azure’s DDoS defense >_
  • New PostgreSQL Contributors >_
  • Oracle Application Express for Amazon RDS for Oracle demystified >_
  • Out-of-the-box Elixir telemetry with Phoenix >_
  • Over 700 million events/second: How we make sense of too much data >_
  • Privacy-preserving Confidential Computing now on even more machines and services >_
  • Secure, compliant, and AI-powered: Get to know 3 new GitLab features >_
  • See the code that powered the Pebble smartwatches >_
  • Solus 4.7 Endurance Released >_
  • Top 5 Database Monitoring Software: Optimize Performance and Prevent Downtime >_
  • Vulnerability management in the microservice era: From zero to hero >_
  • Your Go-To Git Commands CheatSheet >_
  • git fetch vs pull: Key Differences Explained >_

2025-01-26

  • 10 Best Vulnerability Assessment and Penetration Testing (VAPT) Tools in 2025 >_
  • How to Install NodeBB with MongoDB and Nginx Proxy on AlmaLinux 9 >_
  • How to Safely Automate the Removal of Old Linux Kernels on Fedora >_
  • PayPal to pay $2 million settlement over 2022 data breach >_
  • Real Python: How to Download Files From URLs With Python >_
  • Real Python: How to Flush the Output of the Python Print Function >_

2025-01-25

  • 18 Best Free and Open Source Linux Time Tracking Software >_
  • A Beginner’s Guide to Apache Avro >_
  • A Sysadmin's Guide to Securing the Linux Kernel >_
  • Augmented API Management with Platform Engineering >_
  • C++26: Pack Indexing >_
  • Collections in Java >_
  • Download Files Easily with Laravel's HTTP sink Method >_
  • Enhanced Runtime Monitoring for ECS with Amazon GuardDuty >_
  • GNOME 46.8 Release Speeds Up Thumbnail Loading in the Nautilus File Manager >_
  • GNOME 47.3 Improves Frame Rate for Monitors Attached to Secondary GPUs >_
  • How to Build Intelligent Agentic RAG with CrewAI and Qdrant >_
  • How to Containerize a Node.js Application Using Docker – A Beginner's Guide >_
  • How to Develop with CodeIgniter on Ubuntu – Step-by-Step Environment Setup >_
  • How to Install and Configure OpenVPN Server in RHEL 9 >_
  • How to install SQLAlchemy SQL Toolkit and Object Relational Mapper using PIP >_
  • Ignition is a Modern Startup Applications Utility for Linux >_
  • JUnit vs. Mocha: A Comparison of Java and JavaScript Testing Libraries >_
  • Kubestatus: Open source tool to easily add status page to your K8s cluster >_
  • MySQL 9.2 Released, Adds JavaScript Transactional API >_
  • OCI Stack Monitoring Retrospect – 2024 was a big release year! >_
  • Preview your site's Firewall status and Web Analytics from the Project Overview >_
  • Rain: A key-value store for Strava’s scale >_
  • Secure Access to the Object Storage using Private Endpoints >_
  • Securely host your static website in Amazon S3 using Cloudflare's CloudConnector >_
  • pg_squeeze 1.8 released >_
  • pgwatch3 is out! >_

2025-01-24

  • 5 IT Myths That Are Costing You Time and Money by Constant Fischer >_
  • 7 Leading Network Monitoring Tools for Enterprises >_
  • Amazon OpenSearch Service: The Only Tutorial You Need >_
  • Announcing smaller machine types for A3 High VMs >_
  • Bringing Jetpack Compose to Instagram for Android >_
  • Databases and SLOs: How to apply service level objectives to your databases with synthetic monitoring >_
  • Exploit Me, Baby, One More Time: Command Injection in Kubernetes Log Query >_
  • How Iterate.ai uses Amazon MemoryDB to accelerate and cost-optimize their workforce management conversational AI agent >_
  • How to create a culture of continuous learning in the workplace >_
  • How we’re making GKE more transparent with supply-chain attestation and SLSA >_
  • Introducing agent evaluation in Vertex AI Gen AI evaluation service >_
  • Mastering the wc Command in Linux: A Complete Guide for Word, Line, and Character Count >_
  • Monitor unit economics with Datadog Cloud Cost Management >_
  • New Year, New OS. Supporting your business with ChromeOS Flex >_
  • Open Source Ad Servers: A Guide for Digital Innovators >_
  • Open Source Is at a Crossroads: Preserving Collaboration and Choice >_
  • OpenTelemetry Collector with Docker: A Detailed Guide >_
  • OpenTelemetry vs Jaeger: Which Should You Pick? >_
  • OpenTelemetry vs. Prometheus >_
  • Quickly diagnose issues by viewing previous Pipeline runs >_
  • SUSE Achieves AWS ISV Security Software Competency >_
  • Secure a generative AI assistant with OWASP Top 10 mitigation >_
  • Security best practices to consider while fine-tuning models in Amazon Bedrock >_
  • Tchibo brews up 10x faster customer insights with AlloyDB for PostgreSQL >_
  • Your push was rejected because it contains files larger than 10 MiB >_

2025-01-23

  • Android enhances theft protection with Identity Check and expanded features >_
  • Apdex Score 101: Definition, Calculation, and Limitations >_
  • Boost Productivity and Security with the New Chrome Web Store for Enterprises >_
  • CCN releases guide for Spain’s ENS landing zones using Landing Zone Accelerator on AWS >_
  • Enhance your customer’s omnichannel experience with Amazon Bedrock and Amazon Lex >_
  • FIPS mode for Red Hat Go Toolset >_
  • Finding the Best Cloud Database: Top Solutions for Your Business Needs >_
  • Hosted runners for GitLab Dedicated: Now in limited availability >_
  • How L’Oréal Tech Accelerator built its end-to-end MLOps platform >_
  • How Meta discovers data flows via lineage at scale >_
  • How-to: GitLab Single Sign-on with SAML, SCIM, and Azure’s Entra ID >_
  • India DevOps Show 2025 >_
  • Is your platform ready for 2025? New research on platform engineering reveals the secret to success >_
  • Jean's epic journey to optimize Ruby's JSON parsing >_
  • Kubernetes Monitoring Helm chart 2.0: a simpler, more predictable experience >_
  • Luma AI’s Ray2 video model is now available in Amazon Bedrock >_
  • Migrate Oracle-based applications to Google Cloud and simplify operations >_
  • OpenTelemetry Profiling: A Look into Performance Insights >_
  • Oracle Linux 10 Developer Preview—Now Available for Download >_
  • Quickwit vs. Elasticsearch: Which Tool To Choose? [2025 Guide] >_
  • Red Hat Connectivity Link now generally available >_
  • SIEM Architecture: Key Components, Integrations, and More >_
  • Safer automated deployments with new Cloud Deploy features >_
  • Strategies for eliminating Ansible hardcoded credentials >_
  • Streamline custom environment provisioning for Amazon SageMaker Studio: An automated CI/CD pipeline approach >_
  • Top Architecture Blog Posts of 2024 >_
  • Unify visibility into changes to your services and dependencies with Datadog Change Tracking >_
  • Unlocking the Power of AI Personalization: 10 Key Approaches >_
  • Using custom Org Policies to enforce the CIS benchmark for GKE >_
  • Why UX designers should develop technical expertise >_
« newer articles | page 65 | older articles »