2025-01-29
- 5 Common Incident Severity Levels You Should Know >_
- A continued focus on the benefits of Go 1.24 >_
- Adversarial Misuse of Generative AI >_
- An Introduction to Django Views >_
- Article: The End of the Bronze Age: Rethinking the Medallion Architecture >_
- Automating EC2 Instance Resizing with AWS Systems Manager (SSM) Document >_
- Automating cybersecurity threat detections with GitLab CI/CD >_
- Business challenges and pain points: Tailscale patterns from the field >_
- ByteDance to Network a Million Containers with netkit >_
- CISA Brings KEV Data to GitHub >_
- Cloud security research and guide roundup: DevSecOps, threat detection, and AI >_
- Cloud security research and guide roundup: Infrastructure and access >_
- Creating an ACFS Filesystem on Exascale Volumes >_
- Data Cleaning in Python: Techniques and Best Practices >_
- Decoding Data Center Efficiency Metrics: A Guide to Energy and Sustainability >_
- General availability of the Jenkins to Bitbucket Pipelines migration tool >_
- Generative AI operating models in enterprise organizations with Amazon Bedrock >_
- Grafana 11.5 release: easily share Grafana dashboards and panels, secure frontend code for plugins, and more >_
- Hackers exploit critical unpatched flaw in Zyxel CPE devices >_
- How Aqua Security exports query data from Amazon Aurora to deliver value to their customers at scale >_
- How executives can accelerate time to value through Atlassian’s System of Work >_
- How golden paths improve developer productivity >_
- How to Benchmark Your Storage in Kubernetes easily? >_
- How to Choose the Right SQL Database >_
- How to Create a Basic CI/CD Pipeline with Webhooks on Linux >_
- How to Hot Reload Kubernetes with Skaffold >_
- How to Install DeepSeek Locally with Ollama LLM in Ubuntu 24.04 >_
- How we estimate the risk from prompt injection attacks on AI systems >_
- How we kept the Google Play & Android app ecosystems safe in 2024 >_
- Improve AI security in GitLab with composite identities >_
- Improve security auditing with GitLab Operational Container Scanning >_
- Introducing custom rules in Workload Manager: Evaluate workloads against customized best practices >_
- January newsletter: Project Bob’s global voyage + simplified networking for Apple fleets >_
- Kubernetes Cloud Repatriation Saves Millions for Data Platform Provider >_
- Meridian is now available to everyone >_
- New Debian Developers and Maintainers (November and December 2024) >_
- Outbrain: Taking control of extension security with Chrome Enterprise >_
- Quiz: Which time management strategy is right for you? >_
- RUM: Key Metrics and How to Measure Them >_
- Real-world enterprise use cases: Tailscale patterns from the field >_
- SRE Roles & Responsibilities >_
- The New Frontier of Security: Creating Safe and Secure AI Models >_
- Top 5 Dynatrace Alternatives: Compare Features, Pricing & More >_
- Understanding PromQL Facets: Unlocking Advanced Metrics Analysis >_
- View related logs and traces from a Dashboard panel >_
- What Are Syslog Levels and Why Should You Care? >_