2024-11-18

  • 20 years of Firefox: How a community project changed the web >_
  • AWS Lambda SnapStart for Python and .NET functions is now generally available >_
  • AWS Lambda turns ten – looking back and looking ahead >_
  • AWS Weekly Roundup: AWS BuilderCards at re:Invent 2024, AWS Community Day, Amazon Bedrock, vector databases, and more (Nov 18, 2024) >_
  • Amazon EKS enhances Kubernetes control plane observability >_
  • Announcing the General Availability of Managed DevOps Pools (MDP) for Azure DevOps >_
  • Apache HertzBeat Vulnerability Let Attackers Exfiltrate Sensitive Data >_
  • Automate cloud security vulnerability assessment and alerting using Amazon Bedrock >_
  • BiomedParse: A foundation model for smarter, all-in-one biomedical image analysis >_
  • Build and modify apps using natural language with AWS App Studio, now generally available >_
  • Build cost-effective RAG applications with Binary Embeddings in Amazon Titan Text Embeddings V2, Amazon OpenSearch Serverless, and Amazon Bedrock Knowledge Bases >_
  • Business Leader’s Guide for a Successful Microsegmentation Project >_
  • Charging ahead on AI openness and safety >_
  • Citrix Virtual Apps & Desktops Vulnerability Actively Exploited in Attacks >_
  • DXC transforms data exploration for their oil and gas customers with LLM-powered tools >_
  • Django Weblog: 2025 DSF Board Election Results >_
  • Dynamically build Mail, DB, and Cache configurations in Laravel >_
  • Efficiently Handling High Concurrency with AWS Lambda SnapStart: A Step-by-Step Guide >_
  • Extending the Interaction Between AI Agents and Editors >_
  • Five Ways to Prevent and Protect Against Ransomware Attacks >_
  • Fueling engagement: the power of knowledge in employee retention >_
  • Generate AWS Resilience Hub findings in natural language using Amazon Bedrock >_
  • Generate and evaluate images in Amazon Bedrock with Amazon Titan Image Generator G1 v2 and Anthropic Claude 3.5 Sonnet >_
  • Google Announces Shielded Email Feature To Hide Your Main Email Address >_
  • Grep Command in Linux >_
  • Guide to Docker Compose Context >_
  • Host your own metasearch engine to avoid tracking and profiling >_
  • How InsuranceDekho transformed insurance agent interactions using Amazon Bedrock and generative AI >_
  • How MSD uses Amazon Bedrock to translate natural language into SQL for complex healthcare databases >_
  • How to Automatically Rotate Docker Logs >_
  • How to Configure SSO with Entra ID (formerly Azure AD) and Google Cloud Identity SSO >_
  • How to Use the Option Key as Alt in Alacritty on macOS >_
  • How to install Ubuntu 24.04 or Ubuntu 24.10 on a MacBook Air >_
  • How to setup self hosted wiki for your startup >_
  • Importing a frontend Javascript library without a build system >_
  • Kubernetes Observability with OpenTelemetry Operator >_
  • Linux kernel 6.12 has been released >_
  • Migrating MongoDB to GKE: A Secure and Scalable Solution >_
  • More Power at the Edge: Introducing Distributed Compute Regions >_
  • New Cassandra to Spanner adapter simplifies Yahoo's migration journey >_
  • Open-Source Apps & Frameworks For Software Development On Linux >_
  • OpenTelemetry vs OpenTracing - Key Differences and Migration Path >_
  • PostgreSQL 12 End of Life: Upgrade Now with Percona >_
  • Samba AD Vulnerability Let Attackers Escalate Privilege >_
  • Secure Java applications: A deep look into 3 different issues >_
  • Sonatype Nexus Repository Manager Hit By RCE & XSS Vulnerability >_
  • Streamline container application networking with built-in Amazon ECS support in Amazon VPC Lattice >_
  • Team Software Breach, Hackers Gain Unauthorized Access To Network Infrastructure >_
  • Threat modeling your generative AI workload to evaluate security risk >_
  • Using the Python zip() Function for Parallel Iteration >_
  • Why Golden Signals Matter for Monitoring >_
  • Women In Cybersecurity On The Cybercrime Magazine Podcast >_
  • Zohocorp ManageEngine ADAudit Plus Vulnerable To SQL Injection Attacks >_

2024-11-17

  • 3 Best Free and Open Source Scheme Static Site Generators >_
  • Announcing SUSE AI: An Enterprise ready AI platform >_
  • BrazenBamboo APT Exploiting FortiClient Zero-Day to Steal User Credentials >_
  • Certbot: Automating Nginx SSL Renewal >_
  • Discord API Errors >_
  • Distributed Systems 4th Edition >_
  • How To Configure Nginx as a Reverse Proxy on Ubuntu 24.04 >_
  • How to Assume a different AWS IAM role using AWS Cloud Shell >_
  • Linux 6.12 Preps For Release With Real-Time, Sched_Ext, Stable Xe2 & Raspberry Pi 5 >_
  • Ubuntu Server: A Cheat Sheet >_
  • Understanding backoffLimit in Kubernetes Jobs >_
  • Upgrading Lambda function from Python 3.8 to Higher >_
  • What I wrote this week about Ruby >_

2024-11-16

  • Advanced Applications of Dynamic Code in Java >_
  • Amazon EKS and Kubernetes sessions at AWS re:Invent 2024 >_
  • Boost Your PostgreSQL Performance With Auto Chunk Size Recommendations >_
  • Boosting Postgres INSERT Performance by 50% With UNNEST >_
  • ELK & Zabbix Monitoring >_
  • Essential Skills for DevSecOps Engineers - Analytics Insight >_
  • Go-taskflow: A taskflow-like General-purpose Task-parallel Programming Framework >_
  • How Can AIOPs Secure Your Business’s IT Infrastructure? >_
  • How to find hard disk (SSD) serial numbers in Linux >_
  • How to install kvm-ok on Debian or Ubuntu Linux >_
  • How to use JavaScript in GitHub Actions without committing node_modules >_
  • Integrating Google Cloud Managed Kafka with Dataflow >_
  • Llama-OCR: An Open-Source Llama 3.2 Based OCR Tool >_
  • NSO Continuously Used Pegasus WhatsApp Spyware Even After Blocked >_
  • OpenBSD Double-Free Vulnerability Let Attackers Exploit NFS Client & Server >_
  • Red Hat Enterprise Linux 9.5 gains security, networking upgrades >_
  • SUSE Says Rancher Observability Is Better Than Pure Plays >_
  • T-Mobile Hacked – China Launched Massive Cyber Attack on U.S. Telecom Networks >_
  • Taming the Data Chaos: A Deep Dive into Google Cloud’s Data Lineage API >_
  • The Practical Guide to Scaling Django >_
  • Two Overlooked Uses of Enums in Java >_
  • Using OCI Observability services to monitor Enterprise Manager health >_

2024-11-15

  • 65,000 nodes and counting: Google Kubernetes Engine is ready for trillion-parameter AI models >_
  • A safer internet: policy recommendations for fighting scams and fraud together >_
  • AlloyDB Omni supercharges performance: Faster transactions, analytics, and vector search >_
  • Behind the scenes of a major Grafana release: the journey to Grafana 11 and what’s next >_
  • Best practices for creating least-privilege AWS IAM policies >_
  • CEOs need to act today to outsmart adversaries with AI >_
  • CISA Warns of Hackers Actively Exploiting Multiple Palo Alto Networks Vulnerabilities >_
  • Centrally managing root access for customers using AWS Organizations >_
  • CloudBees Platform: October 2024 Edition >_
  • Cohere Embed multimodal embeddings model is now available on Amazon SageMaker JumpStart >_
  • Considerations for addressing the core dimensions of responsible AI for Amazon Bedrock applications >_
  • Critical Laravel Vulnerability Let Hackers Gain Unauthorized Access >_
  • DHCP Vulnerability in TP-Link Lets Attackers Takeover Routers Remotely – PoC Released >_
  • Dataproc Serverless: Now faster, easier and smarter >_
  • Detect and troubleshoot Windows Blue Screen errors with Datadog >_
  • Empowering Holiday Retail Success: How Edge Technology Drives Seamless Operations and Customer Satisfaction >_
  • Fine-tune multimodal models for vision and text use cases on Amazon SageMaker JumpStart >_
  • GitHub Availability Report: October 2024 >_
  • GitHub CLI RCE Vulnerability Let Attackers Execute Malicious Commands >_
  • GraphRAG: Improving global search via dynamic community selection >_
  • How AI Is Transforming Enterprise Business Operations >_
  • How GoDaddy built Lighthouse, an interaction analytics solution to generate insights on support interactions using Amazon Bedrock >_
  • How Runtime Insights Help with Container Security >_
  • How we handle sensitive data in BigQuery >_
  • Introducing Platform Encryption for Data Cloud >_
  • JPCert Details on Event Tracing Over EventLog for Windows Forensics >_
  • LodaRAT Malware Attacking Windows Users To Steal Login Details >_
  • MongoDB Database Observability: Integrating with Monitoring Tools >_
  • MultiXacts in PostgreSQL: usage, side effects, and monitoring >_
  • Optimize your database storage for Oracle workloads on AWS, Part 1: Using ADO and ILM data compression policies >_
  • Palo Alto Warns of Hackers Exploiting RCE Flaw in Firewall Management Interfaces >_
  • Principal Financial Group uses QnABot on AWS and Amazon Q Business to enhance workforce productivity with generative AI >_
  • PyPI Introduces Digital Attestations to Strengthen Python Package Security >_
  • Python Morsels: Inspecting objects in Python >_
  • Python Virtual Environments for Machine Learning: A Comprehensive Guide >_
  • Researchers Detailed WezRat, Know for Executing Attackers Commands >_
  • Retrofitting Spatial Safety to hundreds of millions of lines of C++ >_
  • Scaling Document Data Extraction With LLMs & Vector Databases >_
  • Secure by Design: AWS enhances centralized security controls as MFA requirements expand >_
  • Shift-left your cloud compliance auditing with Audit Manager >_
  • Strengthening SUSE’s Security Commitment: Introducing SUSE Long Term Service Pack Support Extended Security. >_
  • The Gemini app is now available on iPhone >_
  • Updated whitepaper: Architecting for PCI DSS Segmentation and Scoping on AWS >_
  • VPC: Behind The Scenes >_
  • What’s new with HPC and AI infrastructure at Google Cloud >_
  • WordPress Plugin Vulnerability Exposes 4M+ Websites To Hackers >_

2024-11-14

  • 20 Simple Python Scripts That Will Automate Your Daily Tasks >_
  • 4 Best QR Code Generator Tools for Linux >_
  • 5 Apps to Benchmark or Stress Test Your GPU in Ubuntu Linux >_
  • 8 Best Free and Open Source Network Intrusion Detection Systems >_
  • AWS Lambda turns 10: A rare look at the doc that started it >_
  • Akamai Managed Database Services: Powered by Aiven >_
  • Announcing HAProxy Enterprise 3.0 >_
  • Automate invoice processing with Streamlit and Amazon Bedrock >_
  • Benchmark Amazon RDS for PostgreSQL with Dedicated Log Volumes >_
  • Best practices for monitoring LLM prompt injection attacks to protect sensitive data >_
  • Bitdefender Releases ShrinkLocker Ransomware Decryptor That Recovers BitLocker Files >_
  • Centralize model governance with SageMaker Model Registry Resource Access Manager sharing >_
  • Chinese Hackers Compromised US Govt Officials’ Private Communications >_
  • Cloud CISO Perspectives: The high security cost of legacy tech >_
  • Enhancing AI Powered Developer Tools with Gemini API >_
  • Enhancing Service Reliability with Feature-Based SLOs: A Comprehensive Approach >_
  • Exploring Kubernetes CPU Resources in View of Percona XtraDB Cluster’s Flow Control >_
  • Extend the reach of your team’s knowledge with Confluence databases >_
  • GitLab Webhooks get smarter with self-healing capabilities >_
  • GoLand 2024.3 Is Out! >_
  • Google Announces New Intelligent, Real-Time Protections For Android Users >_
  • Google To Issue CVEs For Critical Google Cloud Vulnerabilities >_
  • Governing ML lifecycle at scale: Best practices to set up cost and usage visibility of ML workloads in multi-account environments >_
  • Grafana Beyla: what’s new and what’s next for the open source eBPF auto-instrumentation tool >_
  • Hackers Leveraging Extended Attributes To Evade Detection In macOS Systems >_
  • Hashdeep: A Powerful Tool for File Verification in Linux >_
  • How to deploy Llama 3.2-1B-Instruct model with Google Cloud Run GPU >_
  • How to integrate GitHub Copilot with Bitbucket, Jira & Confluence >_
  • How to prompt for login name on serial tty device >_
  • How to remove Linux from a dual boot with Windows >_
  • Integrate usage data into your product analytics strategy >_
  • Introducing Stable Diffusion 3.5 Large in Amazon SageMaker JumpStart >_
  • Introducing resource control policies (RCPs), a new type of authorization policy in AWS Organizations >_
  • KubeCon NA 2024 Day 2 Recap >_
  • Microsoft Power Pages Leak Millions of Private Records >_
  • New Glove Stealer Bypass App-Bound Encryption To Steal Data From Browsers >_
  • New NAND Chip Attack Lets Attackers Uncover Secrets And Reverse Engineer Products >_
  • New iOS Security Feature Makes It Harder for Police to Unlock Seized Phones >_
  • New – Amazon DynamoDB lowers pricing for on-demand throughput and global tables >_
  • Orca-AgentInstruct: Agentic flows can be effective synthetic-data generators >_
  • Pirates in the Data Sea: AI Enhancing Your Adversarial Emulation >_
  • PostgreSQL 17.1, 16.5, 15.9, 14.14, 13.17, and 12.21 Released! >_
  • Presentation: Improving Developer Experience Using Automated Data CI/CD Pipelines >_
  • PyPy: Guest Post: Final Encoding in RPython Interpreters >_
  • Rails 8.0 pulls into the station >_
  • Researchers Warn of AI Image Generators Potentially Leaking Sensitive Instructions >_
  • Revolutionize trip planning with Amazon Bedrock and Amazon Location Service >_
  • SQLite Index Visualization >_
  • Secure your data ecosystem: a multi-layered approach with Google Cloud >_
  • Securing Your CI/CD Pipeline with Snyk Open Source and Semaphore >_
  • Self-Service Kubernetes: GKE, GKE Fleet and ArgoCD >_
  • Simplify automotive damage processing with Amazon Bedrock and vector databases >_
  • Single Right-Click Let Hackers Gain Access To System By Exploiting 0-Day >_
  • Stefan Scherfke: Publishing to PyPI with a Trusted Publisher from GitLab CI/CD >_
  • Testing Farm as GitHub Action: User stories >_
  • The Definitive Guide to Linux Process Injection >_
  • The Users Have Spoken: SingleStore Is a Fan Favorite on TrustRadius >_
  • The closest open-source alternatives to Notion and Miro >_
  • TikTok Pixel Privacy Nightmare: A New Case Study >_
  • Top 5 Malware Network Traffic Analysis Tools 2024 >_
  • Transforming DoD's data utilization with generative AI >_
  • Understanding MSSP Pricing: What You Need to Know >_
  • Understanding command injection vulnerabilities in Go >_
  • Understanding prompt engineering: Unlock the creative potential of Stability AI models on AWS >_
  • Use AI to build AI: Save time on prompt design with AI-powered prompt writing >_
  • Using DORA for Sustainable Engineering Performance Improvement >_
  • WebVM 2.0: A complete Linux Desktop Environment in the browser via WebAssembly >_
  • What is Cross-Site Request Forgery? >_
  • What is Git? The ultimate guide to Git's role and functionality >_
  • What is multi-step reasoning? >_
  • What’s new in Cloudflare: Account Owned Tokens and Zaraz Automated Actions >_
  • Why Testcontainers Cloud Is a Game-Changer Compared to Docker-in-Docker for Testing Scenarios >_

2024-11-13

  • 10 Essential AWS Security Steps for Your AWS Account >_
  • 65,000 nodes and counting: Google Kubernetes Engine is ready for trillion-parameter AI models >_
  • A Simple Breakdown of Localhost and 127.0.0.1 in Networking >_
  • A civic tech creative on modernizing government sites, MySpace coding and pre-internet memories >_
  • APT Hackers Leverage macOS Flutter Apps To Embed Malicious Codes on Devices >_
  • AWS CloudTrail Guide: Uses, Events, and Setup Explained >_
  • Accelerate your financial statement analysis with Amazon Bedrock and generative AI >_
  • Adding own Documents to your Local AI Using RAG >_
  • Airbnb’s AI-powered photo tour using Vision Transformer >_
  • Announcing Meta’s Llama 3.2 90B and 11B models on OCI Generative AI >_
  • Apache CloudStack Released Fix for Critical KVM Infrastructure Vulnerabilities >_
  • Automate the deployment of Amazon RDS for Db2 Instances with Terraform >_
  • Automatically Update Open Source Project API Documentation Using GitHub Actions >_
  • Build a reverse image search engine with Amazon Titan Multimodal Embeddings in Amazon Bedrock and AWS managed services >_
  • CISA Warns of Microsoft Zero-day Exploited in Attacks >_
  • CISA, NSA, & FBI Release List of 15 Most Exploited Vulnerabilities in 2023 >_
  • Cash App migrated 400TB of data to PlanetScale's cloud >_
  • China-Nexus Hackers Hijack Websites to Deliver Cobalt Strike Malware >_
  • Chrome 131 Released With Fix for 12 Security Vulnerabilities >_
  • Citrix Virtual Apps & Desktops RCE Vulnerability, PoC Exploitation Underway >_
  • Critical Fortinet Product Flaws That Let Hackers Take Control of The System >_
  • Custom Dataproc Spark Monitoring Dashboard: Keep Your Spark Jobs Humming >_
  • Data loading best practices for AI/ML inference on GKE >_
  • Designing a Zero Downtime Migration Solution with Strong Data Consistency – Part I >_
  • Emerging Threats: Cybersecurity Forecast 2025 >_
  • Empower your teams with self-service Kubernetes using GKE fleets and Argo CD >_
  • Empowering Secure, Self-Service Kubernetes with the SUSE® Rancher Prime Application Collection at Kubecon NA 2024 >_
  • Farewell and thank you for the continued partnership, Francois Chollet! >_
  • Fedora Linux Is Getting a New Installer >_
  • Getting Started with Akamai App Platform >_
  • GitLab Ultimate's total economic impact: 483% ROI over 3 years >_
  • Go Serverless with Google Cloud Run Functions >_
  • Grafana Cloud updates: redesigned dashboard filters, more ways to use RBAC, and more >_
  • Hackers Attacking GitHub Users With a New Sophisticated Tool >_
  • How Kubernetes Memory Requests and Limits Actually Work >_
  • How to Build a Dropbox-like Distributed File Storage System Using MinIO and gRPC >_
  • How to Build an Effective Incident Response Plan: A Practical Guide >_
  • How to Improve AWS Cyber Resilience: Actionable Guide for Businesses >_
  • How to read JSON files in Java using Google Gson library? >_
  • Improve governance of models with Amazon SageMaker unified Model Cards and Model Registry >_
  • Inference with Gemma using Dataflow and vLLM >_
  • Introducing the Akamai App Platform >_
  • Issue 70 of AWS Cloud Security Weekly >_
  • KubeCon NA 2024 Day 1 Recap: Observability Day & More >_
  • Learn How to Optimize Docker Hub Costs With Our Usage Dashboards >_
  • Microsoft 365: Guide To Backup And Recovery. What’s At Risk. >_
  • Microsoft Active Directory Certificate Services Vulnerability (CVE-2024-49019) Discovered >_
  • Microsoft November Patch Tuesday: 4 Zero-Days & 89 Vulnerabilities Patched >_
  • Microsoft Released Patch for Exchange Server Email Spoofing Vulnerability – Update Now! >_
  • Multilingual content processing using Amazon Bedrock and Amazon A2I >_
  • New patch adds support for Apple's latest Magic Trackpad to Linux >_
  • November Tailscale newsletter >_
  • Pre-warming Amazon DynamoDB tables with warm throughput >_
  • Providing more data about news results in the EU >_
  • Pulumi Extends Ability to Manage Kubernetes Infrastructure >_
  • Red Hat Enterprise Linux 9.5: What are the top features for developers? >_
  • Runs on Atlassian Gives Partners a New Way to Showcase Strict Data Protections >_
  • SUSE and CloudCasa Lead the Convergence of Kubernetes and Virtualization >_
  • Safer with Google: New intelligent, real-time protections on Android to keep you safe >_
  • Study Reveals Security Teams Feel the Impact of Rising API Threats >_
  • Top challenges for implementing multi-domain correlation in the cloud >_
  • Toward modular models: Collaborative AI development enables model accountability and continuous learning >_
  • Transcribe, translate, and summarize live streams in your browser with AWS AI and generative AI services >_
  • Unlocking LLM training efficiency with Trillium — a performance analysis >_
  • Using AI for DevOps: What Developers and Ops Need To Know >_
  • What is ELK: Core Components, Ecosystem & Setup Guide >_
  • Zoom App Vulnerability Let Attackers Execute Remote Code >_
  • ‘Work,’ your way: Jira’s language is evolving to better represent all teams >_

2024-11-12

  • 20 Best Cybersecurity Website Designs >_
  • 3 Ways to Streamline Kubernetes Operations with PagerDuty Automation by Joseph Mandros >_
  • 5 Ways Behavioral Analytics is Revolutionizing Incident Response >_
  • 9 must-have Atlassian Marketplace Apps >_
  • A guide on scaling out your Kubernetes pods with the Watermark Pod Autoscaler >_
  • A very demure, very mindful issue >_
  • Accelerating AI Development with the Docker AI Catalog >_
  • Adopting Bazel for Web at Scale >_
  • Alternatives to Cloud DBaaS: What to Look For >_
  • Amazon confirms employee data breach after vendor hack >_
  • Announcing SUSE® Cloud Observability Early Access at KubeCon North America 2024 – Your Fast Track to Seamless Kubernetes Visibility >_
  • Announcing support for TLS 1.3 in Oracle Database 23ai >_
  • Automate secure introduction of HashiCorp Vault clients without platform identity >_
  • Better Together: Understanding the Difference Between Sign-In Enforcement and SSO >_
  • Build scalable, event-driven architectures with Amazon DynamoDB and AWS Lambda >_
  • Building Gen AI with MongoDB & AI Partners | October 2024 >_
  • CachyOS Boosts Performance with New THP Shrinker and AMD Cache Optimizer >_
  • CloudBees Continues DevOps World Tour to Jersey City, Santa Clara, and London, Showcasing the Future of DevSecOps and AI-Driven Software Delivery - Business Wire >_
  • Deliver generative AI at scale with NVIDIA NIM on OpenShift AI >_
  • Deliver personalized marketing with Amazon Bedrock Agents >_
  • Dell Enterprise SONiC Vulnerabilities Let Attackers Compromise The System >_
  • Discover duplicate AWS Config rules for streamlined compliance >_
  • Efficiency engine: How three startups deliver results faster with Vertex AI >_
  • Enhance the security and operational capabilities of your Azure Kubernetes Service with Advanced Container Networking Services, now generally available >_
  • Exploring the Firefox Community on r/firefox >_
  • Generate financial industry-specific insights using generative AI and in-context fine-tuning >_
  • Generative AI for agriculture: How Agmatix is improving agriculture with Amazon Bedrock >_
  • Get complete Kubernetes observability by monitoring your CRDs with Datadog Container Monitoring >_
  • Getting Started with MongoDB Atlas >_
  • Hackers Leveraging Microsoft Visio Files & SharePoint For Two-Step Phishing Attack >_
  • Honoring our 2024 Google Cloud Partner All-stars >_
  • How AI is reshaping creativity: Insights from art, tech and policy >_
  • How Meta built large-scale cryptographic monitoring >_
  • How PUMA leverages built-in intelligence with BigQuery for greater customer engagement >_
  • How Structured Logging Makes Troubleshooting Easier >_
  • How to Deploy Django Applications in Production with NGINX and Gunicorn >_
  • How to Install Kali Linux Tools on Ubuntu Using Docker >_
  • How to Use Rsnapshot for Backup and Restore on Linux Servers >_
  • How to run a local Linux web server running in a Windows 11 window >_
  • How to template AI software in Red Hat Developer Hub >_
  • Important Update: IP Address Change for VirusTotal >_
  • Improvements to Logs Explorer: better performance for loading large volumes of logs, fixes to query builder >_
  • Introducing Last9’s Single Pane for High Cardinality Observability: Support now for Logs & Traces >_
  • Introducing SUSE AI: A Secure, Extensible Deploy and Runtime Platform for GenAI >_
  • Introducing Scalable Storage for DigitalOcean’s Managed MongoDB >_
  • Kingfisher transforming the developer experience with GitLab >_
  • Kubernetes autoscaling guide: determine which solution is right for your use case >_
  • LLMs and Red Hat Developer Hub: How to catalog AI assets >_
  • Linux Optimization Patches Significantly Speed-Up Debuggers Using /proc/kcore >_
  • ML in Go with a Python sidecar >_
  • MOVEit 0-day Breach – Millions of Employee Data Stolen from 25 Major Organizations >_
  • Managing 20,000 Systems with a Single SUSE Manager Server: A Success Story with COOP >_
  • Netflix’s Distributed Counter Abstraction >_
  • New Android Malware SpyAgent Taking Screenshots Of Users’ Devices >_
  • New Relic powers sustainable observability with AWS >_
  • Node v23.2.0 (Current) >_
  • November Patches for Azure DevOps Server >_
  • PAN-OS Access Management RCE Vulnerability, 11k+ Interface IPs Exposed >_
  • Parsing command line arguments in Python >_
  • Preparing for Peak: How Edge Computing Transforms Retail Operations for the Holiday Surge >_
  • Preventing side-channels in the cloud >_
  • Query Editor with LogQL compatibility >_
  • SelectBlinds Data Breach, 200,000+ Customers Card Details Skimmed in Cyberattack >_
  • Send SUSE Security (NeuVector) events to AWS CloudTrail Lake >_
  • Sending and receiving messages via RabbitMQ in Symfony >_
  • Spotlight on SUSE® Virtualization at KubeCon North America 2024 –Innovations Coming in Version 1.4 >_
  • Tailscale log streaming now supports S3 destinations >_
  • Trouble making time for work that matters? Try the $10 Game >_
  • Tutorial: How to set up your first GitLab CI/CD component >_
  • Understanding time-series data and why it matters >_
  • Use Amazon ElastiCache as a cache for Amazon Keyspaces (for Apache Cassandra) >_
  • VMware Workstation & Fusion Now Free For All Users >_
  • VMware makes Workstation and Fusion free for everyone >_
  • Why CDEs should be prioritized before IDPs >_
  • Why Your Application is Slow - The 99% Rule for Performance Problems >_
  • Writing a block I/O filter using libbpf and eBPF tracing framework >_
« newer articles | page 75 | older articles »