2025-01-22

  • A Complete Guide to Threat Hunting: Tools and Techniques >_
  • A manager’s ultimate guide to effective succession planning >_
  • AWS Releases Best Security Practices To Mitigate Ransomware Attacks >_
  • Agoda Integrates macOS Infrastructure with Kubernetes >_
  • An Introduction to Kubernetes Observability >_
  • Announcing Global Acceleration Program for RISE with SAP on Microsoft Azure  >_
  • Announcing HAProxy Enterprise Kubernetes Ingress Controller 3.0 >_
  • Announcing SUSE Multi-Linux Manager 5.0 Pay-as-you-go Images on AWS and Azure >_
  • Announcing the 2025 Google for Startups Accelerator: AI First UK >_
  • Build an Open Source Kubernetes GitOps Platform, Part 2 >_
  • Coldplay evolves the fan experience with Microsoft AI >_
  • Complete Guide - Deploying Production-Ready MongoDB Replica Set on AWS >_
  • Discover and assess your database workloads migration to Google Cloud using Migration Center >_
  • Diving deep into the new Amazon Aurora Global Database writer endpoint >_
  • Enhance the resilience of critical workloads by architecting with multiple AWS Regions >_
  • Everything You Should Know About OpenTelemetry Collector Contrib >_
  • Exploring Python's tuple Data Type With Examples >_
  • From Rockset to SingleStore: My Journey and a Guide for Rockset Developers Seeking a New Home >_
  • Get Hands-on Experience with Free Oracle OS Management Hub Labs >_
  • Getting Started with the OpenTelemetry Helm Chart in K8s >_
  • Go 1.24 Release Candidate 2 >_
  • Grafana Cloud updates: tools to streamline performance testing, a new Adaptive Logs feature, and more >_
  • Guide to fulfilling SOC 2 security requirements with GitLab >_
  • How Cato Networks uses Amazon Bedrock to transform free text search into structured GraphQL queries >_
  • How Docker Streamlines the  Onboarding Process and Sets Up Developers for Success >_
  • How Falco and Wireshark paved the way for Stratoshark >_
  • How to Monitor Your Kubernetes Clusters with Prometheus and Grafana on AWS >_
  • How to Use the Laravel Scheduler for Task Management >_
  • How to completely remove the MySQL Client from Ubuntu Linux >_
  • How to monitor your Rust applications with OpenTelemetry >_
  • Introducing BigQuery metastore, a unified metadata service with Apache Iceberg support >_
  • Introducing multi-turn conversation with an agent node for Amazon Bedrock Flows (preview) >_
  • Maintain security for your Tailscale secrets with GitHub >_
  • Mastering the Linux Column Command: Simplify Text Formatting with Real-World Examples >_
  • Mastering the chmod Command in Linux: A Complete Guide to File and Directory Permissions >_
  • Memstate - OLED >_
  • Microsoft and OpenAI evolve partnership to drive the next phase of AI >_
  • Migrating CloudFormation to TF >_
  • Monitor GCC compile time >_
  • New Release for Argo CD Image Updater — 0.15 >_
  • Oracle VirtualBox 7.1.6 is now available! >_
  • Running Inference In Web Extensions >_
  • Rust 2024 in beta channel >_
  • Simplifying Zero Trust Security for the Modern Workplace >_
  • Stratoshark: Extending Wireshark’s legacy into the cloud >_
  • The first release of OpenVox, the OSS implementation of Puppet >_
  • Top Dynatrace Competitors and Alternatives for Modern Observability in 2025 >_
  • Tutorial: Advanced use case for GitLab Pipeline Execution Policies >_
  • Unlocking Retail Innovation With SUSE Edge >_
  • Using Blue/Green Deployment For (near) Zero-Downtime Primary Key Updates in RDS MySQL >_
  • Video security analysis for privileged access management using generative AI and Amazon Bedrock >_

2025-01-21

  • 126 Linux kernel Vulnerabilities Lets Attackers Exploit 78 Linux Sub-Systems >_
  • 38 Best Free and Open Source Linux Terminal Emulators >_
  • 7-Zip Vulnerability Let Remote Attackers Bypass Protections & Execute Arbitrary Code >_
  • Akamai: Supporting Chinese Enterprises in Global Expansion >_
  • Demystifying the OpenTelemetry Operator: Observing Kubernetes applications without writing code >_
  • Enabling generative AI self-service using Amazon Lex, Amazon Bedrock, and ServiceNow >_
  • How Skello uses AWS DMS to synchronize data from a monolithic application to microservices >_
  • How image mode for RHEL simplifies software appliances >_
  • How to Build a Cloud Strategy That Works for Your Business >_
  • How to Test Your PostgreSQL Connection >_
  • How to Upgrade to Linux Mint 22.1 from Mint 22 >_
  • Implementing Zero Trust to Improve API Security >_
  • Introducing GitLab Advanced Vulnerability Tracking >_
  • Introducing the Connection-Control Component in MySQL 9.2 : A Powerful Tool for Connection Management >_
  • Linux Kernel 6.13 Officially Released, This Is What’s New >_
  • Master the stat Command in Linux | Simplify File Details >_
  • Mastering the du Command in Linux: A Complete Guide for System Administrators >_
  • Multiple Azure DevOps Vulnerabilities Let Inject CRLF Queries & Rebind DNS >_
  • Navigating MongoDB Licensing Challenges: Why Percona is a Game-Changer >_
  • Navigating the Future: The Intersection of AI and DevOps >_
  • Nordic PGDay 2025 - Schedule posted! >_
  • Open Source Alternative to Vercel, Netlify and Heroku >_
  • OpenVPN Easy-RSA Vulnerability Enables Bruteforce of Private CA Key >_
  • Optimizing RabbitMQ Performance: The Metrics That Matter >_
  • Record-breaking 5.6 Tbps DDoS attack and global DDoS trends for 2024 Q4 >_
  • SLF4J vs Log4j: Key Differences and Choosing the Right One >_
  • Safeguard your generative AI workloads from prompt injections >_
  • Secure and publish Python packages: A guide to CI integration >_
  • Securing Cryptocurrency Organizations >_
  • Serilog: Configuration, Error Handling & Best Practices >_
  • Spotlight on SIG Architecture: Enhancements >_
  • Strobelight: A profiling service built on open source technology >_
  • Supercharge your day: Firefox features for peak productivity >_
  • Systems Management with SUSE Linux Enterprise Server 16 >_
  • The fall and rise of TikTok (traffic) >_
  • Topology-aware routing: balancing cost savings and reliability with William Morgan >_
  • Understanding OLAP vs. OLTP: The Key Differences >_
  • Using OSCAL to express Canadian cybersecurity requirements as compliance-as-code >_
  • You Can’t Improve What You Can’t See: API Monitoring Is Crucial >_
  • entropy_avail = 256 is good enough for everyone >_
  • etcd with .NET >_

2025-01-20

  • 121 packages in Debian mapped to hardware for automatic recommendation >_
  • A week in security (January 13 – January 19) >_
  • AWS Security Groups provides network-level firewalls for instances. >_
  • Accelerating AIOps in AKS >_
  • AlmaLinux 10 Beta Supports Older x86 Chipsets >_
  • Better Apple device management with Jamf Pro, integrated with Tailscale >_
  • Comprehensive Guide to Kafka Monitoring: Metrics, Problems, and Solutions >_
  • Configure EKS Cluster Security - Pod Security, Network Policies, Pod Identity >_
  • Deepin 25 Preview: A Sleek Redesign with Major Under-the-Hood Changes >_
  • Does Backwashing Drain Your Pool? >_
  • EKS'pert Automation: Amazon EKS Auto Mode and Karpenter in action >_
  • Effective Error Handling Strategies for AWS Lambda >_
  • Encrypting EBS Volumes of Amazon EC2 Instances Using Python >_
  • GNU Debugger GDB 16.1 Brings Better Intel PT Support, gstack Added >_
  • How to Install and Use Neo4j Graph Database on Debian 12 >_
  • How to delete a file whose name begin with “-” dash >_
  • How to run SQL Server with SELinux enabled on RHEL 9 >_
  • ID Scanners in Tech: Enhancing Security & Compliance >_
  • Linux Kernal 6.13 Released – What’s New! >_
  • Log Levels: Different Types and How to Use Them >_
  • Manager as mentor: Learnings from Sysdig’s documentation team >_
  • Master the Linux touch Command: Step-by-Step Guide with Real-World Examples >_
  • OpenTelemetry for generative AI >_
  • Overhauling PagerDuty’s data model: a better way to route alerts >_
  • Real Python: Create and Modify PDF Files in Python >_
  • Success with SAP: Leverage Your Existing Investments in the Cloud >_
  • Terraform Fork OpenTofu Adds Provider Iteration and Exclusions >_
  • Text Pieces: A Rust-based Open Source App to Help Devs With Text Transformations >_
  • Total Blocking Time (TBT): What It Is, Why It Matters, and How to Fix It >_
  • Turn Your Chrome OS Machine Into a Powerful DevOps Machine With This Guide >_
  • Understanding Apache Hadoop YARN (Yet Another Resource Negotiator) >_
  • What is Single Pane of Glass Monitoring and How It Works >_
  • pgDay Paris 2025 — Schedule published >_

2025-01-19

  • 5 lightweight Linux distributions that will bring your old PC back to life >_
  • How to Install NetBox IRM (Infrastructure Resource Modelling Tool) on Ubuntu 24.04 Server >_
  • Migrating from EKS Cluster Autoscaler to Karpenter >_
  • TikTok ban takes hold: data reveals sharp traffic decline and rapid shift to alternatives >_
  • Unix Spell Ran in 64kB RAM >_

2025-01-18

  • Mastering the echo Command in Linux: Essential Flags and Use Cases >_
  • Mastering the grep Command in Linux: A Complete Guide >_
  • Mastering the uptime Command in Linux: Monitor System Health Effectively >_
  • The Evolution of Observability: From StatsD to OpenTelemetry and Beyond >_
  • Webinar: Discover a cost-effective, high-performance virtualization alternative >_

2025-01-17

  • 10 trending topics in the Grafana community >_
  • A Commitment to Open Source Freedom With SUSE Multi-Linux Support >_
  • CISA Releases Recommendations For Closing Software Understanding Gap >_
  • Cloud CISO Perspectives: Talk cyber in business terms to win allies >_
  • DNS Silently Powers the Internet >_
  • Detecting and mitigating CVE-2024-12084: rsync remote code execution >_
  • GKE delivers breakthrough Horizontal Pod Autoscaler performance >_
  • GitHub Linux ARM64 hosted runners now available for free in public repositories >_
  • How Orca Security optimized their Amazon Neptune database performance >_
  • How to Enable Multi-Session Support in the AWS Console >_
  • How to Install Arch Linux >_
  • IntelliJ IDEA 2024.3.2 Is Out >_
  • Introducing SUSE Edge for Telco 3.2: Telco Cloud platform to elevate 5G experience >_
  • Java Application Monitoring: How It Works, Tools, and Best Practices >_
  • Let’s Encrypt Announces 6-day Validity Certificates >_
  • Linux Rsync File Transfer Tool Vulnerability Let Attackers Execute Arbitrary Code >_
  • Loki S3 Storage: A Guide for Efficient Log Management >_
  • Master the pwd Command in Linux: Practical Use Cases and Examples >_
  • Mastering the Top Command in Linux: Columns Explained, Practical Examples, and Stress Testing >_
  • Monitor server-side latency for Amazon ElastiCache for Valkey >_
  • Monitor server-side latency for Amazon MemoryDB for Valkey >_
  • Node.js Worker Threads Explained (Without the Headache) >_
  • Open Source Drives the Twelve-Factor Modernization Project >_
  • PostgreSQL JDBC 42.7.5 Released >_
  • Red Hat Simplifies Running Monolithic Apps on Kubernetes Clusters >_
  • Research Focus: Week of January 13, 2025 >_
  • SUSE Delivers Seamless and Scalable Edge Operations with SUSE Edge 3.2 >_
  • Stay ahead of service disruptions with Watchdog Cloud & API Outage Detection >_
  • The EU’s DORA regulation has arrived. Google Cloud is ready to help >_
  • Understanding API Keys and Tokens: Secure Management and Best Practices >_
  • Understanding the yes Command in Linux >_
  • What’s the Cost of Counting MySQL Table Rows? >_
  • Why Change? Innovations in SUSE Linux Enterprise Server 16 >_
  • Why Move from AWS S3 to Cloudflare R2? Advantages, Pricing Comparison, and Migration Guide >_

2025-01-16

  • 5 Essential Linux Commands Every Beginner Must Know >_
  • Akamai API Security Release 3.41 >_
  • Akamai Named a Major Player in IDC MarketScape: Worldwide Public Cloud IaaS 2025 Assessment >_
  • All the language changes in Ruby 3.4 >_
  • Automate your Deployments in Azure with Terraform! >_
  • Bitly: Protecting users from malicious links with Web Risk >_
  • Botnet Exploits 13,000 MikroTik Devices By Abusing Misconfigured DNS Records >_
  • Building Resilience and Compliance in Finance: Insights from PagerDuty’s Lee Fredricks by Laura Chu >_
  • C4A, the first Google Axion Processor, now GA with Titanium SSD >_
  • CloudWatch Metrics: Key Features, Working & Cost Management >_
  • Cloudcraft: A Simple Tool for Cloud Architecture Design >_
  • Database Indexing in Django >_
  • DevSecOps + Agentic AI: Now on GitLab Self-Managed Ultimate on AWS >_
  • GitLab 17.8 released >_
  • Grafana Tempo 2.7 release: new TraceQL metrics functions, operational improvements, and more! >_
  • How Kyndryl integrated ServiceNow and Amazon Q Business >_
  • How to Simplify Python Library RPM Packaging with Mock and Podman >_
  • How to Use the nice Command in Linux: A Complete Guide to Adjusting Process Priority >_
  • Innovating in line with the European Union’s AI Act  >_
  • Install RHEL packages in container images using Shipwright >_
  • Isovalent Cilium cheat sheet >_
  • Kubernetes Windows Nodes Vulnerability Allows Arbitrary Command Execution On Host >_
  • Lightweight server monitoring on your tailnet with Beszel >_
  • Mastering Docker and Jenkins: Build Robust CI/CD Pipelines Efficiently >_
  • MatterGen: A new paradigm of materials design with generative AI  >_
  • Measuring productivity impact with Diff Authoring Time >_
  • New Tunneling Protocol Vulnerabilities Lets Attackers Hijack Over 4 Million Internet Hosts & VPN >_
  • New year, new updates to AI Hypercomputer >_
  • OSV-SCALIBR: A library for Software Composition Analysis >_
  • Percona Everest: An Open Source Solution for MongoDB Sharding and Backups >_
  • Preventing unintended encryption of Amazon S3 objects >_
  • Protecting the Software Supply Chain: The Art of Continuous Improvement >_
  • PyBites: Creating a Fitness Tracker App with Python Reflex >_
  • Raising the bar: Why differential privacy is at the core of Anonym’s approach >_
  • Red Hat Woos VMware Shops with OpenShift Virtualization Engine >_
  • Spacelift Scales Legacy Automation: Terraform First, Ansible Next >_
  • The Role of Site Reliability Engineering in Ensuring Business Continuity >_
  • The Ultimate Guide to the Best SQL Database Options in 2025 >_
  • Windows Server Monitoring: Tools, Best Practices & Strategies >_
  • pino-pretty: A Guide to Pretty-Printing Your Logs >_
« newer articles | page 66 | older articles »