2025-01-01

  • A Guide to Nomad Cloud Platform >_
  • Automated Accessibility Testing Using Selenium >_
  • Basic System Setup After Installing Rocky Linux 9 on VirtualBox: A Step-by-Step Guide >_
  • Benchmarking RSA Key Generation >_
  • Best of 2024: CAST AI Helps Cost-Optimize LLMs Running on Kubernetes >_
  • Cloudflare 2024 Year in Review: Strong Growth for GitHub Copilot and Go Surpasses Node.js >_
  • Crisis Engineering: A Structured Approach to Navigating Emergencies >_
  • Darktable 5.0.0 Released >_
  • Deep dive into AWS Serverless Architecture >_
  • Deploying a Simple Static Website on AWS with CDK and TypeScript >_
  • How to Install Rocky Linux 9.5 on VirtualBox | Step-by-Step Tutorial >_
  • How to Install Visual Studio Code on Rocky Linux 9 or 8 >_
  • KDE: Application snaps 24.12.0 release and more >_
  • Memory-Based Attacks: How Fileless Malware Operates Without Leaving A Trace >_
  • Microsoft Introduces Serverless GPUs on Azure Container Apps in Public Preview >_
  • New Update – 35 Google Chrome Extensions Hacked to Inject Malicious Code >_
  • Platform Engineering 101 >_
  • Presentation: Leveraging Internal Developer Portals to Achieve Strategic Initiatives >_
  • Prometheus 3.0 Brings New UI, OpenTelemetry Support and More >_
  • Real Python: Building HTTP APIs With Django REST Framework >_
  • SUSE Modernizing Without Limits –Cloud Native Leadership in 2024 >_
  • Signalling chaos: Inside the Elizabeth line's two-day breakdown >_
  • Static search trees: 40x faster than binary search >_
  • git.sesse.net goes IPv6-only >_

2024-12-31

  • Availability vs. Reliability in Software Design: Understanding the Key Differences >_
  • Cisco Data Breach – Authenticity of 4.45GB Data Leak Verified >_
  • Cisco Event Response: Reports of Security Incident >_
  • Cloudflare Launches New Tool h3i for HTTP/3 Testing & Debugging >_
  • From DevOps to DevSecOps: The Evolution of Secure Software Development - Analytics Insight >_
  • GitHub’s top blogs of 2024 >_
  • Harley-Davidson Data Breach – Threat Actor Allegedly Leaked Customer Details >_
  • How To Automate Mounting /dev In Chroot Environments In Linux >_
  • Introduction to SootUp >_
  • Kafka Observability: Key to Managing Distributed Systems >_
  • Keeping secrets secret with git-crypt >_
  • LineageOS 22 Released >_
  • Move to GNU/Linux and Save the Planet, CCC Talk Explains >_
  • Orbit. Mozilla's AI Assistant for Firefox >_
  • Over 3.3M POP3/IMAP Services Running Unencrypted Without TLS Enabled >_
  • Pinterest's Use of Honeycomb for Enhanced CI Observability and Build Stability >_
  • The Log Monitoring Guide for Sweet Insights >_
  • The forecast is clear: clouds on e-paper, powered by the cloud >_
  • Thomas Cook Hit by Cyber Attack, IT Systems Impacted >_
  • Transform lease agreement workflows with Amazon Bedrock >_
  • US Treasury Department Hacked – Attackers Gained Access to Workstations >_
  • Veritas Vulnerability Let Attackers Execute Arbitrary SQL Commands >_
  • eBPF for Enhanced Observability in Modern Systems >_

2024-12-30

  • A Look Back at the AI Innovations Transforming the Public Sector >_
  • Add observability to cart: How online retailer ASOS reduces MTTR with Grafana Cloud >_
  • Amarok 3.2 Released, Supports Qt5 and Experimental Qt6 Builds >_
  • CISA Added Palo Alto Networks PAN-OS Vulnerability to Its Known Vulnerability Database >_
  • Critical 7-Zip Zero-Day Exploit Leaked Online Let Hackers Hijack Windows PCs Remotely >_
  • Curl with Partial Files >_
  • D-Link Web Management Interface Vulnerability Let Attackers Gain Device Access >_
  • DevSecOps or Agile for Software Development - Which Should you Choose? - NASSCOM Community >_
  • Dynamic data masking in Amazon RDS for PostgreSQL, Amazon Aurora PostgreSQL, and Babelfish for Aurora PostgreSQL >_
  • Ford Motors ‘X’ Account Hacked – Pro-Palestine Posts Appear Briefly >_
  • Guide to AWS Certifications: Choosing the Right Path for Your Role >_
  • Hackers Hijacked 16 Chrome Extensions to Inject Malicious Code >_
  • How To Build Lightweight Docker Images With Mmdebstrap In Linux >_
  • How to Integrate OpenTelemetry with Django >_
  • Kubernetes 1.32 Released with Dynamic Resource Allocation and Graceful Shutdown of Windows Nodes >_
  • Microsoft Warns of Windows 11 24H2 Bug Blocks Security Updates >_
  • Monitoring your Amazon Aurora PostgreSQL-Compatible and Amazon RDS PostgreSQL from integer sequence overflow >_
  • Open sourcing h3i: a command line tool and library for low-level HTTP/3 testing and debugging >_
  • Optimizing Systems with the Observability Maturity Model >_
  • Oracle WebLogic Server Vulnerability Lets Attackers Compromise the Server Remotely >_
  • Setting up AWS IoT Core using Terraform >_
  • SquareX Researchers Uncover OAuth Vulnerability in Chrome Extensions Days Before Major Breach >_
  • Top 10 Cyber-Attacks of 2024 >_

2024-12-29

  • 12 Best Free and Open Source Terminal String Styling Tools >_
  • Automated Testing for OpenAPI Endpoints Using CATS >_
  • Calling IAM authenticated API Gateway with different HTTP clients >_
  • EmacsConf 2024 Notes >_
  • Fish 4.0: The Fish of Theseus >_
  • Gitpod Flex, Cloud Development After Kubernetes >_
  • How to Install Google Earth on Ubuntu 24.04, 22.04 or 20.04 >_
  • How to Install Sigil 2.3.1 in Ubuntu 24.04 / Linux Mint 22 >_
  • Listing Kubernetes Resources Linked to a Helm Deployment >_
  • Monitoring Multi-threaded Replication Lag With Performance Schema >_
  • Personal Mail Server on OpenBSD >_
  • Reload SSL Certificates From HashiCorp Vault for Spring Boot >_
  • Top 10 Articles About Linux in 2024 >_
  • Top 10 GNU/Linux Releases of 2024 >_

2024-12-28

  • AWS Security Hub notifications made actionable using Amazon Bedrock >_
  • Automating workflows with Python and PostgreSQL: A Step-by-Step Guide with Example Code >_
  • Best of 2024: Civo Acquires Kubefirst to Advance GitOps in Kubernetes Environments >_
  • Deploying a Django App to AWS ECS with AWS Copilot >_
  • Ghostty 1.0 Released, A New GPU-Accelerated Terminal Emulator >_
  • Introduction to Apache Spark >_
  • JMeter vs. Gatling: Which Tool Is Better for Modern Load Testing? >_
  • Ninth US Telecom Breached by Chinese Hackers – Texts & Calls Records Stolen >_
  • Nmap Commands for Beginners: Simple Scanning Tips >_
  • Reducing MTTR and MTTI for Better Reliability >_
  • Ruby 3.4, and some sad news >_
  • The Dawn of AI Workforce: A 2025 Perspective >_
  • The Fifth Golden Signal: Why Cost Deserves a Seat at the SRE Table >_
  • Understanding AWS Lambda Event Source Mapping >_
  • Unlocking the Potential of Amazon CloudFront with VPC Origins: Overcoming WAF Bypass Challenges >_

2024-12-27

  • 4MLinux 47.0 Released: A Feature-Packed Update Now Stable >_
  • A Tour of WebAuthn >_
  • Application Monitoring Best Practices: A Comprehensive Guide >_
  • ChatGPT Services Including API & Sora Down Globally >_
  • CloudNativePG 1.25.0 and 1.24.2 Released! >_
  • Cyberhaven Chrome Extension Hacked to Inject Malicious Packages >_
  • D-Link Routers Under Attack – Botnet Exploiting Devices to Gain Full Remote Control >_
  • How to Check NVIDIA Driver Version in Linux >_
  • How to Hide Ubuntu Pro Updates in Ubuntu 24.04 LTS >_
  • Implement automatic conflict detection and resolution for Oracle GoldenGate bi-directional replication between Amazon RDS for Oracle databases >_
  • Implementing OpenTelemetry in Ruby: A Guide for Developers >_
  • Kubernetes Is Taking Over: Deploy Smarter With 4 New Techniques >_
  • Open standards, lower costs, and centralized observability: Why FalconX moved to Grafana Cloud >_
  • Palo Alto Networks Firewall Vulnerability “CVE-2024-3393” Exploited in the Wild >_
  • Supercharge Linux Observability with eBPF: A Modern Approach >_
  • The CAP theorem of Clustering: Why Every Algorithm Must Sacrifice Something >_
  • The Impact of Environmental Lawsuits on Emerging Tech and Open Source Innovations >_
  • The Ultimate Guide to Heroku Logs Monitoring >_
  • Thruster – HTTP/2 proxy for Rails apps with built-in Let's Encrypt and caching >_
  • Volkswagen Data Breach: 800,000 Electric Car Owners’ Data Leaked >_
  • What’s new in Cloudflare: MASQUE now powers 1.1.1.1 & WARP apps, DEX now generally available with Remote Captures >_
  • [ANNOUNCE] IvorySQL 4.0 Released - Enhanced Oracle Compatibility with PostgreSQL 17.0 Foundation >_
  • [ANNOUNCE] SynchDB 1.0 Released - PostgreSQL Extension for Real-Time Database Synchronization >_

2024-12-26

  • Announcing Bottlerocket FIPS variants >_
  • Async Rust: How to Master Concurrency with tokio and async/await >_
  • Crypto Hacking in 2024 – $2.2 Billion Stolen, North Korean Hackers Behind 61% of Attacks >_
  • Embracing passwordless authentication with Grab’s Passkey >_
  • How to Handle Go Security Alerts >_
  • How to monitor your local weather with Grafana >_
  • How to prevent service from swapping >_
  • IBM AIX Vulnerability Let Attackers Trigger DoS Condition >_
  • Implementing Distributed Tracing with OpenTelemetry >_
  • Improve Amazon Timestream for InfluxDB security posture by automating rotation for long-lived credentials >_
  • Japan Airlines System Hit by Cyber Attack, Flight Operations Affected >_
  • One-time Password Manager for Laravel >_
  • Optimizing costs of generative AI applications on AWS >_
  • Portspoof: Emulate a valid service on all 65535 TCP ports >_
  • Researchers Uncovered Dark Web Operation Acquiring KYC Details >_
  • SRE Incident Management: Process identifying and General Tips. >_
  • Smart Apps with LangChain and Google Cloud AI >_
  • Sometimes I cache: implementing lock-free probabilistic caching >_
  • Streamlining GCP Infrastructure: Automating VM Start/Stop with Python >_
  • The Developer's Guide to Building Linux Kernel 6.x >_
  • The Essentials of SNMP Monitoring in Networks >_
  • Top 10 Data Center Security Stories of 2024 >_
  • Top 5 Notable Cyber Attacks in December 2024 >_
  • Traceparent and Tracestate Explained: A Guide to Distributed Tracing with Atatus >_
« newer articles | page 69 | older articles »