2025-01-15

  • 7 Best DigitalOcean Alternatives for Developers in 2025 >_
  • A Beginner’s Guide to Artificial Intelligence for Linux Users >_
  • A Simple Guide to AWS Monitoring Tools >_
  • AI-Powered Operations: A Guide to Boosting Productivity, Security, and Sustainability >_
  • AWS IAM Role Use Cases >_
  • Akamai?s Tailored Approach to Net Zero >_
  • An interactive tour of Go 1.24 >_
  • Build an Open Source Kubernetes GitOps Platform, Part 1 >_
  • Cisco AI Defense: Comprehensive Security for Enterprise AI Adoption >_
  • Critical Rsync Vulnerability Requires Immediate Patching on Linux and Unix systems >_
  • From Ideas to Impact: The Story of ShipIt >_
  • Get started with Google Cloud's built-in tokenization for sensitive data protection >_
  • Git security vulnerabilities announced >_
  • Google Cloud integrations for secure Cloud Run deployments at GitLab >_
  • Grafana Play updates: recent growth, new privacy policies, and more >_
  • HCLTech’s AWS powered AutoWise Companion: A seamless experience for informed automotive buyer decisions with data-driven design >_
  • How to Create a Lightweight P2P Mesh VPN with Tinc >_
  • How to Pay AWS Bills in Naira: A Quick Guide >_
  • How to Set Up and Manage Cron Jobs in Node.js: Step-by-Step Guide >_
  • How to control the SSH multiplexing with the control commands >_
  • How to infer the form method for custom objects in Rails >_
  • How to install and secure phpMyAdmin on Ubuntu 24.04 >_
  • Improve database host and query performance with Database Monitoring Recommendations >_
  • JSON serialization using Serde Rust crates in Amazon RDS for PostgreSQL >_
  • Linux Attack Vector Controls Updated To More Easily Controlling CPU Security Mitigations >_
  • Live Streaming with Akamai’s Distributed Compute Regions >_
  • Mitigating risk: AWS backbone network traffic prediction using GraphStorm >_
  • Python Insider: Python 3.14.0 alpha 4 is out >_
  • Quick Fixes for Upstream Connect Errors >_
  • SUSECON 2025: Where Open Source Innovation Meets Business Impact >_
  • Simplify AI Development with the Model Context Protocol and Docker >_
  • Slate’s ICYMI hosts on their online obsessions and wildest 2025 predictions  >_
  • Understanding GitOps: key principles and components for Kubernetes environments >_
  • Understanding the Aggregation Operator in MongoDB®: Key Concepts and Use Cases >_
  • Vertex AI RAG Engine: A developers tool >_
  • What the Digital Operational Resilience Act means for banks >_
  • Your Single-Page Applications Are Vulnerable: Here's How to Fix Them >_
  • gRPC vs HTTP vs REST: Which is Right for Your Application? >_

2025-01-14

  • 10,000 customers, a new Operations SVP, and the bigger picture >_
  • AWS achieves HDS certification for 24 AWS Regions >_
  • Advancing AI Security and Contributing to CISA’s JCDC AI Efforts  >_
  • AutoGen v0.4: Reimagining the foundation of agentic AI for scale, extensibility, and robustness >_
  • Azure Storage—A look back and a look forward >_
  • Backscatter: Automated Configuration Extraction >_
  • Demonstrating reduction of vulnerability classes: a key step in CISA’s “Secure by Design” pledge >_
  • From Chaos to Clarity: Navigating Threats With Cisco XDR >_
  • Getting started with GitLab: How to manage users >_
  • Grafana SLO: Easily predict the likelihood that you'll hit your target >_
  • How to Timeout HTTP Requests in Linux >_
  • How to determine date of the first commit in git repository >_
  • How to implement IAM policy checks with Visual Studio Code and IAM Access Analyzer >_
  • How we merged Jira Work Management into Jira, using Jira >_
  • How webMethods iPaaS built a multi-tenant SaaS platform on Amazon EKS >_
  • Implement RAG while meeting data residency requirements using AWS hybrid and edge services >_
  • Migrate spatial columns from Oracle to Amazon Aurora PostgreSQL or Amazon RDS for PostgreSQL using AWS DMS >_
  • Now open — AWS Mexico (Central) Region >_
  • Object Storage Use Cases in Focus: New Endpoints for Higher Capacity and Speed >_
  • Red Hat Achieves Functional Safety Certification for In-Vehicle Operating System >_
  • Securely access Amazon EKS with GitHub Actions and OpenID Connect >_
  • Trading in the Cloud: Lessons from Deutsche Börse Group’s cloud-native trading engine >_
  • Unlock multimodal search at scale: Combine text & image power with Vertex AI >_
  • Unlocking complex problem-solving with multi-agent collaboration on Amazon Bedrock >_
  • Updating your AWS Elastic Disaster Recovery settings at scale with the DRS Settings Tool >_
  • What Hurts in PostgreSQL Part One: Temporary Tables >_
  • What is Adaptive Telemetry, and how can it reduce MTTR, noise, and cost? >_
  • What’s in a Name? From MemSQL to SingleStore >_
  • ZFS Raidz Expansion Finally, Here in version 2.3.0 >_

2025-01-13

  • 6 Must-Try Linux Distros with Stunning KDE Plasma Experience >_
  • AWS Weekly Roundup: New Asia Pacific Region, DynamoDB updates, Amazon Q developer, and more (January 13, 2025) >_
  • AWS re:Invent 2024: Security, identity, and compliance recap >_
  • Amazon Bedrock Agents 2025 Revolutionizing AI Workflows >_
  • Automating SAP workloads on Azure: A success story >_
  • Boosting team innovation, productivity, and knowledge sharing with Amazon Q Business – Web experience >_
  • Containerizing workloads on image mode for RHEL >_
  • Database vs. Data Warehouse vs. Data Lake: Choosing the Right Solution >_
  • Debian 12.9 “Bookworm” Arrives with 72 Bug Fixes and 38 Security Updates >_
  • Deploy a NodeJS Express app with GitLab's Cloud Run integration >_
  • Docker vs Docker Swarm: Key Differences Explained >_
  • FOSDEM PGDay 2025 - Schedule Posted and Registration Still Open! >_
  • Git 2.48 Is Out with Faster SHA-1s, Meson Takes the Stage >_
  • How BQA streamlines education quality reporting using Amazon Bedrock >_
  • How I automated Certificate expiration alerts with AWS >_
  • How inference at the edge unlocks new AI use cases for retailers >_
  • How to Convert Markdown (.MD) Files to PDF on Linux >_
  • How to Move Files and Folders with Spaces on Linux >_
  • How to collect Google Cloud Run metrics >_
  • How to monitor, optimize, and secure Amazon Cognito machine-to-machine authorization >_
  • Introducing Oracle Linux Enhanced Diagnostics >_
  • Introduction to TransmittableThreadLocal (TTL) >_
  • Key metrics for monitoring Google Cloud Run >_
  • Kubernetes and the Alternatives: Understanding Container Orchestration Tools for Modern DevOps >_
  • Managing Secrets in an AWS Serverless Application >_
  • Meet Gordon: An AI Agent for Docker >_
  • Monitor Cloud Run with Datadog >_
  • Optimizing High Cardinality Data in ClickHouse >_
  • PostgreSQL vs. the Cloud for GenAI? 4 Things to Consider >_
  • SRE Weekly Issue #459 >_
  • Securing Retail Edge Computing: Addressing Data Risks and Building Trust >_
  • Stick to boot from 6.11 linux-image >_
  • TVS Supply Chain Solutions built a file transfer platform using AWS Transfer Family for AS2 for B2B collaboration >_
  • Weekly Cybersecurity Newsletter: Cyber Attack News, Vulnerabilities & Data Breaches >_
  • scripts - A tool to run various useful OLED diagnostic scripts >_

2025-01-12

  • 11 Best Free and Open Source Graphical Download Managers >_
  • 11 Best Free and Open Source Web Hosting Control Panels >_
  • AWS Announces Physical Data Transfer Terminal for High-Speed Uploads >_
  • EP145: Infrastructure as Code Landscape >_
  • How to Use the DIG Command >_
  • IBM watsonx.ai Vulnerability Let Attackers Embed Arbitrary JavaScript Code in Web UI >_
  • IP Addresses in 2024 >_
  • Introduction to Linux Operating System >_
  • Provision EKS Cluster with Terraform, Terragrunt & GitHub Actions >_
  • Real Python: HTML and CSS for Python Developers >_
  • Real Python: Python's urllib.request for HTTP Requests >_
  • Unlocking Big Data: The Power and Evolution of HDFS >_

2025-01-11

  • Proton worldwide outage caused by Kubernetes migration, software change >_
  • What's involved in getting a "modern" terminal setup? >_

2025-01-10

  • 10 Best Free and Open Source Command-Line HTTP Clients >_
  • 3D printing and observability: How Prusa Research monitors its huge printer farm with Grafana >_
  • 41% of Employers Worldwide Say They'll Reduce Staff by 2030 Due to AI >_
  • A Deep Dive into JVM Start Up >_
  • AWS Advanced: The Quota Monitor Review >_
  • Announcing Supporters of Chromium-based Browsers >_
  • Banshee 2.0 Malware Steals Apple's Encryption to Hide on Macs >_
  • Google Cloud — Gemini 2.0 with Search as a Tool feature >_
  • How Our SRE Team Mastered Challenges with Cutting-Edge Tech >_
  • How to Make Debian Automatically Update Security Updates >_
  • How to build dynamic web experiences with Conversational Agents >_
  • How to secure the public access to API hosted on AWS EC2 instance >_
  • How to secure your GitHub Actions workflows with CodeQL >_
  • ILA Evo: Meta’s journey to reimagine fiber optic in-line amplifier sites >_
  • Infrastructure as Code: Introduction to IaC >_
  • Investigate memory leaks and OOMs with Datadog's guided workflow >_
  • Java Weekly, Issue 576 >_
  • Linux Foundation launches Supporters for Chromium-based browsers >_
  • Monitoring Java Apps with Prometheus & Grafana >_
  • Prevent Encryption Key Loss When Using Percona Server for MongoDB with HashiCorp’s Vault >_
  • Proton Mail Down – Services Recovered after a Massive Outage >_
  • Say what you mean: how to become a more assertive communicatior >_
  • Securing GenAI Development with Snyk >_
  • Splunk vs. Datadog: A Side-by-Side Comparison >_
  • The best projects are powered by knowledge >_
  • Top 7 Cloud Providers: The Best AWS Alternatives >_
  • Understanding Message Queues >_
  • Understanding and Maintaining Compliance in Container Environments >_
  • Unlock advanced query functionality with distribution metrics >_
  • Why Data Observability is Important for Your Business >_
  • ntopng – Web-Based Network Traffic and Security Monitoring Tool >_

2025-01-09

  • 10 Application Security Vulnerabilities and Defensive Strategies >_
  • Announcing Rust 1.84.0 >_
  • Avoid global outages by partitioning cloud applications to reduce blast radius >_
  • Bat 0.25 Command-Line Tool Introduces Powerful Line-Squeezing >_
  • Build AI-powered malware analysis using Amazon Bedrock with Deep Instinct >_
  • Build an Amazon Bedrock based digital lending solution on AWS >_
  • Configure Email Notifications With Amazon SES, Lambda and DynamoDB >_
  • Convert A Gaming Rig To An AI Development Station >_
  • Cost Optimization: Monitoring Costs During and After Migration >_
  • Datadog acquires Quickwit >_
  • Dumping packets from anywhere in the networking stack >_
  • Email your conversations from Amazon Q >_
  • Extending Falco for Gitlab >_
  • Get ready for a unique, immersive security experience at Next ‘25 >_
  • Getting the Most Out of Windows Event Logs >_
  • GitLab CISO on proactive monitoring and metrics for DevSecOps success - Help Net Security >_
  • GitLab supports banks in navigating regulatory challenges >_
  • How retailers are accelerating AI into production with NVIDIA and Google Cloud >_
  • How to Set Up Jenkins on Rocky Linux in VirtualBox | Step-by-Step Guide >_
  • How to Setup Kloxo Web Hosting Control Panel in Linux >_
  • How to Talk to Any Database Using AI – Build Your Own SQL Query Data Extractor >_
  • How to Upgrade OpenJDK 11 to OpenJDK 17 on Rocky Linux 9.5 >_
  • How to Upgrade OpenJDK 17 to OpenJDK 21 on Rocky Linux 9.5: Step-by-Step Guide >_
  • How to Use the Apache Web Server to Install and Configure a Website >_
  • How to automatically terminate shell scripts after 1 minute of no output >_
  • How to forcibly stop a virtual machine in Proxmox >_
  • Implement remediation strategies with Event-Driven Ansible >_
  • Incident Update: Docker Desktop for Mac  >_
  • Introducing Vertex AI RAG Engine: Scale your Vertex AI RAG pipeline with confidence >_
  • Ivanti Connect Secure VPN Targeted in New Zero-Day Exploitation >_
  • Observability Platform Migration: What You Need to Know >_
  • ObservabilityCON on the Road: New cities announced for 2025 >_
  • Optimizing Java in Kubernetes: Resource Management & Scaling >_
  • Presentation: High Performance Time- series Database Design with QuestDB >_
  • Research that builds detections >_
  • Securing a city-sized event: How Amazon integrates physical and logical security at re:Invent >_
  • SingleStore Matches Vector Search Performance of Pinecone and Zilliz — Plus Gives Benefits of a Modern SQL Database >_
  • Supercharge your pipeline with 16x step sizes >_
  • Surprisingly useful Rails console tips >_
  • Using AI coding assistants to develop a spinning wheel web application >_
  • Vacasa’s migration to Amazon Aurora for a more efficient Property Management System >_
  • VicOne Collaborates with Microsoft to Provide Software Developers with Differentiated Automotive Threat Intelligence and Innovative and Seamless DevSecOps Workflow - Business Wire >_
  • VicOne Collaborates with Microsoft to Provide Software Developers with Differentiated Automotive Threat Intelligence and Innovative and Seamless DevSecOps Workflow - Cadillac News >_
  • VicOne Collaborates with Microsoft to Provide Software Developers with Differentiated Automotive Threat Intelligence and Innovative and Seamless DevSecOps Workflow - The Bakersfield Californian >_
  • What Unified Observability Means for Your System >_
  • Why Every Python Dev Needs Virtual Environments Now >_
  • Your Data’s Not Safe Until It’s TDE-Safe — Here’s How >_
  • npm Packages: Cheatsheet, Troubleshooting & More >_
  • powa-archivist 5.0.1 is out! >_
« newer articles | page 67 | older articles »