2025-01-08

  • 10 expert tips for starting a new job to ensure success >_
  • AWS VPC endpoint services for NLB powered by Private Link. >_
  • An overview of virtual routing and forwarding (VRF) in Linux >_
  • Announcing the new AWS Asia Pacific (Thailand) Region >_
  • Attaching a Percona Monitoring and Management Graph Image Along with an Alerting Notification >_
  • Bluestar Linux 6.12.8 comes with the KDE Plasma 6.2.5 bugfix and several package updates >_
  • Boost processing performance by combining AI models >_
  • Container Security: What It Is, Architecture, and Best Practices >_
  • Customize the scope of IAM Access Analyzer unused access analysis >_
  • Data Security: Challenges, Solutions, and the Path Forward >_
  • Distributed data preprocessing with GKE and Ray: Scaling for the enterprise >_
  • Google AI Developers Community Spotlight Contest >_
  • GrafanaCON 2025: Apply to speak at our biggest community event! >_
  • How Honeybadger migrated from Sidekiq to Karafka >_
  • How to Install Linux Kernel 6.12 LTS on Ubuntu 24.04 LTS and Ubuntu 24.10 >_
  • How to Run Integration Tests with GitHub Service Containers >_
  • How to Run a Command That Requires sudo via SSH >_
  • How to Set Up Apache or Nginx Web Server on Rocky Linux in VirtualBox >_
  • Installing Tailscale on macOS >_
  • Kick off the new year with live learning: using Confluence and Jira together >_
  • Kickstart your investigations and reduce alert noise with Doctor Droid’s offering in the Datadog Marketplace >_
  • Laid Off in My Career, and Twice in One Year >_
  • Living in the future, by the numbers >_
  • Log Tracing vs Logging: Understanding the Difference >_
  • My Debian Activities in December 2024 >_
  • New AWS Skill Builder course available: Securing Generative AI on AWS >_
  • Open source all the way down: Upgrading our developer documentation >_
  • OpenSearch Serverless: How It Works & Key Comparisons >_
  • Python Concurrency: Threads, Processes, and Asyncio Explained >_
  • The latest Go dev survey results >_
  • Unlock High-Velocity Teams: The Total Economic ImpactTM of Jira Service Management >_
  • Unlocking Efficiency with Docker for AI and Cloud-Native Development >_
  • Using TPM for Automatic Disk Decryption in Debian 12 >_
  • pgspot 0.9.0 released >_

2025-01-07

  • 3 DevSecOps Trends ISVs Should Watch in 2025 - DevPro Journal >_
  • A Guide to Spring Boot Logging: Best Practices & Techniques >_
  • A Tale of Database Performance at Scale >_
  • Align and monitor your Amazon Bedrock powered insurance assistance chatbot to responsible AI principles with AWS Audit Manager >_
  • Announcing configurable point-in-time recovery periods for Amazon DynamoDB >_
  • Backstage authentication and catalog providers: A practical guide >_
  • Build a CI/CD Pipeline Using AWS Glue, AWS CDK and GitHub >_
  • Build the future of home with Google Home APIs >_
  • Building a better smart home >_
  • Debugging Valkey Cluster resiliency on Azure Kubernetes Service with Locust >_
  • Enhance viewer engagement with gen AI-powered scene detection for ads >_
  • Essential Guide to Log Rotation in Linux >_
  • Evaluate large language models for your machine translation tasks on AWS >_
  • Explore the business case for responsible AI in new IDC whitepaper >_
  • Google Cloud expands its support for founders through partnerships with 300 accelerators worldwide >_
  • How To Access Cloud SQL with Cloud Auth Proxy and a Private IP Address to Enhance Security >_
  • How Your Business Can Benefit From Combining a DAM and CDN >_
  • How to Set Up a Kubernetes Cluster on Docker Desktop >_
  • How to Tell What Port PostgreSQL Is Running On >_
  • How to Write a Bash Script with Help and Usage Examples >_
  • IoT's Regulatory Reckoning Is Overdue >_
  • London Stock Exchange Group uses Amazon Q Business to enhance post-trade client services >_
  • MySQL with Diagrams Part Two: How KILL Works >_
  • Open Source in 2025: Strap In Disruption Straight Ahead >_
  • Open Source in 2025: What Will Matter Most This Year? - The New Stack >_
  • OpenTelemetry and Grafana Labs: what’s new and what’s next in 2025 >_
  • OpenVPN Connect Vulnerability Let Attackers Access Users’ Private Keys >_
  • Parameta accelerates client email resolution with Amazon Bedrock Flows >_
  • PostgreSQL Anonymizer 2.0: Better, Faster, Safer >_
  • Real Python: Iterators and Iterables in Python: Run Efficient Iterations >_
  • Reduce supply chain risk with smarter vulnerability prioritization >_
  • Slackware-Based Absolute Linux Has Been Discontinued >_
  • Streamline the path to CMMC Level 2 compliance with GitLab >_
  • Supervised Fine Tuning for Gemini: A best practices guide >_
  • The Best Tech Stacks for AI-Powered Applications in 2025 >_
  • The Power of Sidecar Containers in Kubernetes Explained >_
  • The Ripple Effect: How a Single Push Notification Brought Down Our Kubernetes Cluster >_
  • What Makes Azure WAF Essential for Web Apps? >_
  • What is High Cardinality Data and Why Does It Matter? >_
  • What is a Kafka Consumer Group? >_
  • Zero-Click Snowflake Auth: Automating the RSA Setup Maze >_
  • pg_partman 5.2.4 released >_
  • saptune 3.1.4 – Just updated SAP Notes >_

2025-01-06

  • 10 types of performance review templates for teams >_
  • 5 Reasons Why Enterprise Leaders Must Prioritize Owning Their AI Platforms in 2025 >_
  • A Simple Guide to Understanding MongoDB Logs >_
  • ART4SQLi – New SQLi Detection Method To Improve Pentesting Efficiency >_
  • AWS Repeats Same Critical RCE Vulnerability 3 Times in 4 Years >_
  • Akamai to shut down its CDN operations in China >_
  • Application Logs: Key Components, Types, & Best Practices >_
  • Checking RabbitMQ Queues in the Management Console >_
  • Designing Future-Proof Container Management Systems for Enterprises >_
  • Efficiently build and tune custom log anomaly detection models with Amazon SageMaker >_
  • GitLab's 2024 bug bounty year in review >_
  • How to Install Docker on Rocky Linux VM: Beginner’s Guide with Nginx Demo >_
  • How to Set Up and Manage Cron Jobs in Windows >_
  • How to enhance Amazon Macie data discovery capabilities using Amazon Textract >_
  • IPv6-only Network based on Jool >_
  • Import your virtual appliances into OpenShift Virtualization >_
  • Introducing Google Cloud Abuse Event Logging to enable automated incident remediation >_
  • MLOps Best Practices - MLOps Gym: Crawl >_
  • Making an Impact: Beach Cleanup and Reforestation Event >_
  • Master VirtualBox Snapshots on Rocky Linux: Backup, Restore, and Best Practices >_
  • Metrics, logs, and literature: Inside The National Library of the Netherlands’ observability stack >_
  • Microsoft to Invest $80 Billion to Build Out AI-Enabled Datacenters >_
  • Monitoring Windows Servers With the OpenTelemetry Collector >_
  • MySQL 8.4.3 and 9.1.0: Major Performance Gains Revealed >_
  • New AWS WAF Feature: Top Insights Visualizations >_
  • Optimize your container workloads for sustainability >_
  • PoC Exploit Released For OpenSSH Arbitrary Code Execution Vulnerability >_
  • PoC Exploit Released for Windows Registry Privilege Elevation Vulnerability >_
  • PyPy: Musings on Tracing in PyPy >_
  • Reducing PAT usage across Azure DevOps >_
  • SQLPage v0.32: build web apps in SQL, now with more style ! >_
  • Scaling Simplified: How Distributed Systems Handle Millions >_
  • Space Systems Command (SSC) awards $211 million Space C2 DevSecOps contract - news.satnews.com >_
  • Taking the Ecosystem Forward: An Update on the Future of Connect >_
  • The PyTorch developer's guide to JAX fundamentals >_
  • Toward faster incident resolution at Palo Alto Networks with Personalized Service Health >_
  • Ultimate guide to CI/CD: Fundamentals to advanced implementation >_

2025-01-05

  • AI: Changing the Face of Retail >_
  • Hacker gains access to the RP2350 OTP secret by glitching the RISC-V cores >_
  • How To Use SCP (Secure Copy) With SSH Key Authentication >_
  • How to Install VirtualBox 7.1 on Linux Mint 22 >_
  • How to Set Up SSH for Secure Remote Access on Rocky Linux >_
  • Important: Switching CDN providers >_
  • Load Balancing between two ISPs with TP-Link ER605 >_
  • Researchers Uncover Nuclei Vulnerability Enabling Signature Bypass and Code Execution >_
  • Securing Linux Environments in AWS: Best Practices and Common Pitfalls >_

2025-01-04

  • AWS Anywhere - a route to EKS Hybrid Nodes >_
  • AWS Introduces S3 Tables Bucket: Is S3 Becoming a Data Lakehouse? >_
  • Best Free and Open Source Alternatives to Cisco Packet Tracer >_
  • Best of 2024: Kubernetes Security Best Practices for 2024 >_
  • Best of 2024: Red Hat OpenShift Update Simplifies Network Edge Deployments >_
  • Harnessing 3200 Gbps Network: A Journey with RDMA, EFA, and Libfabric >_
  • How To Set, Change, and Recover Your MySQL Root Password >_
  • How to Build a Real-time Network Traffic Dashboard with Python and Streamlit >_
  • How to Install VirtualBox Guest Additions on Rocky Linux 9 | Step-by-Step Guide >_
  • How to Install Zabbix on Debian 12 Server >_
  • Introduction to h2o >_
  • Let's Encrypt to end OCSP support in 2025 >_
  • Monitor EBS Volume Health >_
  • Nikki-Universal Cyber Attack – Hackers Claim 761.8 GB of Data Stolen >_
  • PyPy: Towards PyPy3.11 - an update >_
  • Simplified Data Masking in AWS Lambda with Powertool >_

2025-01-03

  • ASUS Routers Vulnerabilities Allows Arbitrary Code Execution >_
  • Debugging a Binary Data Oplog Replay Issue in MongoDB >_
  • GitLab’s Field CTO Predicts: When DevSecOps Meets AI - StartupNews.fyi >_
  • Google Summer of Code 2024 Reports: Test root device and root file system selection >_
  • How to send OTLP or Prometheus metrics and logs to Grafana Cloud with Grafana Alloy >_
  • Malicious npm Packages Attacking Developers To Steal Sensitive Data Including Private Keys >_
  • Mastering Peak Software Development Efficiency with Docker >_
  • Modernize Manufacturing Infrastructure with Cloud Native Containerization >_
  • Monolithic vs. Microservices: The Great Architecture Debate >_
  • Multi-Path TCP: revolutionizing connectivity, one path at a time >_
  • New HIPAA Security Rule Released to Strengthen Electronic Protected Healthcare Data >_
  • Prometheus Metrics Types: Understanding Gauges and Counters >_
  • SysBumps – New Kernel Break Attack Bypassing macOS Systems Security >_
  • The Complete Guide to the MongoDB® Aggregate $count Stage >_
  • Types of Errors in Python and How to Fix Them >_
  • US Army Soldier Arrested For Selling Stolen Confidential Phone Records >_
  • Understanding Logrus: The Ultimate Go Logger for Efficient Logging >_

2025-01-02

  • 5 of the Best System Monitoring Tools in Linux >_
  • Angular Expressions Vulnerability Let Attackers Gain Full System Access >_
  • Behind the scenes with Stream Live, Cloudflare’s live streaming service >_
  • Cloud Efficiency at Netflix >_
  • Cloud Tracing in Distributed Systems: Gaining Visibility >_
  • Design, Build and Deploy AI-Powered Personalization Engines >_
  • EC2 Grouper Hackers Abusing AWS Tools to Attack With Compromised Credentials >_
  • Getting Started with AWS WAF: A Step-by-Step Guide >_
  • How CERN uses Grafana and Mimir to monitor the world's largest computer grid >_
  • How to Replace Patroni and Etcd IP/Host Information in PostgreSQL >_
  • ITOps in 2024: AI, Open Source, and the Challenges of Overstretched Teams >_
  • KDE Plasma 6.2.5 Released, Next Stop – Plasma 6.3 >_
  • Managing Large Values in Redis Without Consuming Excessive Memory >_
  • Nitrogen Ransomware Attacks Organizations, Encrypts Files With .NBA Extension >_
  • PeaZip 10.2 Open-Source Archive Manager Released with Qt 6 Package for Linux >_
  • Querying and writing to MySQL and MariaDB from Amazon Aurora and Amazon RDS for PostgreSQL using the mysql_fdw extension, Part 2: Handling foreign objects >_
  • SANS CWE Top 25: AI Governance & Open Source Security >_
  • The Most Popular Linux & Open-Source News Of 2024 >_
  • Three Russian Nationals Charged for Espionage & Sabotage Activities >_
  • Top 10 Most Common Cyber Attacks of 2024 >_
  • Top Sophisticated Cyber Security Threats of 2024 >_
  • Why Secure Development Environments Are Essential for Modern Software Teams >_
  • Windows 11 BitLocker Encryption Bypassed To Extract Volume Encryption Keys >_
  • Winston Logging in Node.js: The Essential Guide for Developers >_
  • Zasper: A Modern and Efficient Alternative to JupyterLab, Built in Go >_
  • pg_chameleon 2.0.20 >_
  • tail Command in Linux: Practical Examples and Use Cases >_
« newer articles | page 68 | older articles »