2024-11-18
- 20 years of Firefox: How a community project changed the web >_
- AWS Lambda SnapStart for Python and .NET functions is now generally available >_
- AWS Lambda turns ten – looking back and looking ahead >_
- AWS Weekly Roundup: AWS BuilderCards at re:Invent 2024, AWS Community Day, Amazon Bedrock, vector databases, and more (Nov 18, 2024) >_
- Amazon EKS enhances Kubernetes control plane observability >_
- Announcing the General Availability of Managed DevOps Pools (MDP) for Azure DevOps >_
- Apache HertzBeat Vulnerability Let Attackers Exfiltrate Sensitive Data >_
- Automate cloud security vulnerability assessment and alerting using Amazon Bedrock >_
- BiomedParse: A foundation model for smarter, all-in-one biomedical image analysis >_
- Build and modify apps using natural language with AWS App Studio, now generally available >_
- Build cost-effective RAG applications with Binary Embeddings in Amazon Titan Text Embeddings V2, Amazon OpenSearch Serverless, and Amazon Bedrock Knowledge Bases >_
- Business Leader’s Guide for a Successful Microsegmentation Project >_
- Charging ahead on AI openness and safety >_
- Citrix Virtual Apps & Desktops Vulnerability Actively Exploited in Attacks >_
- DXC transforms data exploration for their oil and gas customers with LLM-powered tools >_
- Django Weblog: 2025 DSF Board Election Results >_
- Dynamically build Mail, DB, and Cache configurations in Laravel >_
- Efficiently Handling High Concurrency with AWS Lambda SnapStart: A Step-by-Step Guide >_
- Extending the Interaction Between AI Agents and Editors >_
- Five Ways to Prevent and Protect Against Ransomware Attacks >_
- Fueling engagement: the power of knowledge in employee retention >_
- Generate AWS Resilience Hub findings in natural language using Amazon Bedrock >_
- Generate and evaluate images in Amazon Bedrock with Amazon Titan Image Generator G1 v2 and Anthropic Claude 3.5 Sonnet >_
- Google Announces Shielded Email Feature To Hide Your Main Email Address >_
- Grep Command in Linux >_
- Guide to Docker Compose Context >_
- Host your own metasearch engine to avoid tracking and profiling >_
- How InsuranceDekho transformed insurance agent interactions using Amazon Bedrock and generative AI >_
- How MSD uses Amazon Bedrock to translate natural language into SQL for complex healthcare databases >_
- How to Automatically Rotate Docker Logs >_
- How to Configure SSO with Entra ID (formerly Azure AD) and Google Cloud Identity SSO >_
- How to Use the Option Key as Alt in Alacritty on macOS >_
- How to install Ubuntu 24.04 or Ubuntu 24.10 on a MacBook Air >_
- How to setup self hosted wiki for your startup >_
- Importing a frontend Javascript library without a build system >_
- Kubernetes Observability with OpenTelemetry Operator >_
- Linux kernel 6.12 has been released >_
- Migrating MongoDB to GKE: A Secure and Scalable Solution >_
- More Power at the Edge: Introducing Distributed Compute Regions >_
- New Cassandra to Spanner adapter simplifies Yahoo's migration journey >_
- Open-Source Apps & Frameworks For Software Development On Linux >_
- OpenTelemetry vs OpenTracing - Key Differences and Migration Path >_
- PostgreSQL 12 End of Life: Upgrade Now with Percona >_
- Samba AD Vulnerability Let Attackers Escalate Privilege >_
- Secure Java applications: A deep look into 3 different issues >_
- Sonatype Nexus Repository Manager Hit By RCE & XSS Vulnerability >_
- Streamline container application networking with built-in Amazon ECS support in Amazon VPC Lattice >_
- Team Software Breach, Hackers Gain Unauthorized Access To Network Infrastructure >_
- Threat modeling your generative AI workload to evaluate security risk >_
- Using the Python zip() Function for Parallel Iteration >_
- Why Golden Signals Matter for Monitoring >_
- Women In Cybersecurity On The Cybercrime Magazine Podcast >_
- Zohocorp ManageEngine ADAudit Plus Vulnerable To SQL Injection Attacks >_