2024-11-04

  • 280+ Typosquat Malicious Packages Attacking npm Developers >_
  • 5 Ways You’re Probably Misusing ML Models (And How to Correct Them) >_
  • A Call For Cybersecurity Awareness Month All Year Round >_
  • A practical guide to synthetic data generation with Gretel and BigQuery DataFrames >_
  • APT37 Hackers Actively Conducting Reconnaissance To Gather Targets’ Data >_
  • AWS Weekly Roundup: AWS Lambda, Amazon Bedrock, Amazon Redshift, Amazon CloudWatch, and more (Nov 4, 2024) >_
  • Amazon Web Services (AWS) has announced today a new edge location in #Qatar >_
  • Announcing GitHub Copilot in Data Wrangler >_
  • Automating AWS DNS Firewall Domain List Updates Using S3, Lambda, and CLI >_
  • Can AI eliminate manual processing for insurance claims? Loadsure built a solution to find >_
  • Chinese Hackers Attacking Microsoft Customers With Password Spray Attacks >_
  • Creating alerts from panels in Kubernetes Monitoring: an overlooked, powerhouse feature >_
  • Critical QNAP Zero-day Flaw in QuRouter Patched, Update Now! >_
  • Docker Desktop 4.35: Organization Access Tokens, Docker Home, Volumes Export, and Terminal in Docker Desktop >_
  • Elia Group helps businesses and consumers reduce carbon emissions with Vertex AI >_
  • Exploring Artificial Intelligence: Is AI Overhyped? >_
  • Exposing PostgreSQL with NGINX Ingress Controller >_
  • Fast Python Flask server deployment with GitLab + Google Cloud >_
  • Flipping out: Modernizing a classic pinball machine with cloud connectivity >_
  • Get started with OpenShift APIs for data protection >_
  • Hackers Using AV/EDR Tool “EDRSandBlast” To Bypass Endpoints >_
  • Help us improve our alt text generation model >_
  • How Retailers Are Adopting Technology to Thrive in a Fast-Paced Market >_
  • How to Boost Spring Boot 3 Performance Using Class Data Sharing (CDS) >_
  • How to Build RAG Agents in the OpenAI’s Swarm Framework >_
  • How to Create an AI-Powered Newsletter Aggregator with React and AI Agents >_
  • How to Handle Complex Use Cases in Your OpenAPI Specifications – API Documentation Guide >_
  • How to Stay Relevant as a Developer in the AI Era >_
  • How to take a Red Hat Remote Exam >_
  • How to transform a Map to an Object or Array in JavaScript >_
  • Lambda function with GraalVM Native Image - Part 4 Measuring cold and warm starts using different Lambda memory settings >_
  • Less Common HTML Elements and How to Use Them in Your Code >_
  • Mandatory MFA is coming to Google Cloud. Here’s what you need to know >_
  • Maximizing Docker Desktop: How Signing In Unlocks Advanced Features >_
  • MediaTek Smartphone Chipsets Vulnerabilities Let Attackers Escalate Privileges >_
  • Microsoft at SOSP 2024: Innovations in systems research >_
  • Moving from idea to action with Confluence and Jira >_
  • MySQL RDS Data Integration Into SingleStore >_
  • Okta Verify Agent Windows Flaw Let Attackers Steal User Passwords >_
  • Opera Browser 0-Day Flaw Allows Malicious Extensions to Takeover Browser >_
  • Overview of Cybersecurity Regulations in the Middle East Region, Part 1 >_
  • PfSense Stored XSS Vulnerability Leads To RCE Attacks, PoC Published >_
  • RAG Chatbot with Amazon Bedrock & LangChain >_
  • SOC Pricing: Practical Guide to Securing Your Business Without Surprises >_
  • SYS01 InfoStealer Malware Attacking Meta Business Page To Steal Logins >_
  • Speed Up Microservices Development with Dapr on AWS EK >_
  • Threat Actors Planted ‘Pygmy Goat’ Backdoor On Hacked Sophos XG Firewall >_
  • Track and troubleshoot MongoDB performance with Datadog Database Monitoring >_
  • Try Redis 8.0-M02 today. The fastest Redis ever. >_
  • Unauthorized tactic spotlight: Initial access through a third-party identity provider >_
  • Using AI Tools to Convert a PDF into Images >_

2024-11-03

  • Analysis of AWS Certification Question: AWS Solutions Architect Professional — VPC Flow Logs — Kinesis Data Firehose >_
  • Creating a simple and fast EKS Cluster >_
  • Datasentinel Release 2024.10 >_
  • How to avoid stdout and stderr out-of-order when pipe is used? >_
  • Open Unclickable Instagram Post Description Links with AWS Lambda and iOS Shortcuts >_
  • Practice AWS Certification Question: AWS Solutions Architect Professional — Lambda — ECR >_
  • TCapture is compatible with Postgres 16 version >_

2024-11-02

  • AWS Lambda with RDS Data API (TypeScript) >_
  • Azure Virtual Desktop May Experience 30 mins Black Screen During Logon >_
  • DDoS Attacks Service Provider Websites Seized by Authorities >_
  • How to Train Yourself to Go to Sleep Earlier >_
  • LastPass Warns of Hackers Misusing Reviews for Fake Support Numbers >_
  • Okta AD/LDAP Authentication Vulnerability Allows Unauthorized Access >_
  • The Parquet Files: A Surprisingly Entertaining Guide to Columnar Storage >_

2024-11-01

  • 5 Tips for Creating a Dynamic Intranet for Your Org >_
  • 8 proven leadership principles and the psychology behind them >_
  • AI-powered microgrids facilitate energy resilience and equity in regional communities >_
  • Advance environmental sustainability in clinical trials using AWS >_
  • After Ticketmaster’s data breach, it’s time to secure your info >_
  • Best practices and lessons for fine-tuning Anthropic’s Claude 3 Haiku on Amazon Bedrock >_
  • Building Production-Grade ECS Anywhere Infrastructure with Custom Capacity Providers >_
  • Cluster Autoscaler configure on AWS EKS -1.24 >_
  • Critical qBittorrent RCE Vulnerability Let Attackers Inject Malicious Script >_
  • Email Phishing Playbook for Efficient Phishing Handling: Attack That’s Hard to Ignore >_
  • Ensure high service availability with Datadog Service Management >_
  • Evolving Atlassian’s deployment controls enforcement >_
  • FEDRAMP High Development in the Cloud: Code with Cloud Workstations >_
  • FOSDEM PGDay 2025 - dates announced and call for papers open >_
  • FakeCall Malware Employs Vishing to Gain Full Control Over Mobile Devices >_
  • Fine-tuning for Anthropic’s Claude 3 Haiku model in Amazon Bedrock is now generally available >_
  • Grafana Cloud in Indonesia: Learn how we're meeting users where they are with our latest region >_
  • Hackers Exploiting SharePoint RCE Vulnerability to Compromise Entire Domain >_
  • Hikvision Network Camera Flaw Let Attackers Intercept Dynamic DNS Credentials >_
  • How AlloyDB unifies OLTP and OLAP workloads for Tricent >_
  • How Can MySQL Catch Up with PostgreSQL’s Momentum? >_
  • How Druva used Amazon Bedrock to address foundation model complexity when building Dru, Druva’s backup AI copilot >_
  • How I spent a few hours using advanced technology to save $2 >_
  • How Ransomware Is Delivered and How to Prevent Attacks >_
  • How To Fail at Microservices >_
  • How To Get More Followers on Instagram: 25 Strategies >_
  • How To Get More Followers on TikTok >_
  • How eBPF makes observability awesome >_
  • How to Handle “MysqlDataTruncation: Data truncation: Data too long for column” >_
  • How to Overcome Common AI Mistakes [with on-demand webinar] >_
  • How to Replicate PostgreSQL Array Data Vectors to Oracle Database with Oracle GoldenGate 23ai >_
  • How to Style MUI Line Chart Components >_
  • How to mount in Ubuntu >_
  • How to rebase to Fedora Linux 41 on Silverblue >_
  • Integrating Zero Trust Container Security in CI/CD Pipelines: Best Practices and Tools >_
  • LINBIT Software-Defined Storage now supports Oracle Linux Virtualization Manager >_
  • Linux Lite 7.2 Released >_
  • Mastercard Arms Small Businesses With Cybersecurity >_
  • Serverless containers at AWS re:Invent 2024 >_
  • Share a multiplayer Factorio server over Tailscale >_
  • Track, allocate, and manage your generative AI cost and usage with Amazon Bedrock >_
  • Use Amazon Q to find answers on Google Drive in an enterprise >_
  • Use a DAO to govern LLM training data, Part 1: Retrieval Augmented Generation >_
  • Use a DAO to govern LLM training data, Part 2: The smart contract >_
  • Use a DAO to govern LLM training data, Part 3: From IPFS to the knowledge base >_
  • Use a DAO to govern LLM training data, Part 4: MetaMask authentication >_
  • Visibility is key: Strengthening security with Sysdig >_
  • What’s new in two – October edition >_
  • zcommands: Read gzip Compressed Text Files On a Fly on Linux and Unix >_

2024-10-31

  • ASCII control characters in my terminal >_
  • AWS Bedrock Knowledge - Base Testing Script >_
  • Accelerate custom labeling workflows in Amazon SageMaker Ground Truth without using AWS Lambda >_
  • Accelerate retail media success with EPAM and Google Cloud >_
  • All Ruby treats, no tricks >_
  • Amazon Aurora PostgreSQL Limitless Database is now generally available >_
  • Arize, Vertex AI API: Evaluation workflows to accelerate generative app development and AI ROI >_
  • Best practices for monitoring cloud costs with Datadog Scorecards >_
  • Best practices to keep secrets out of GitLab repositories >_
  • Beyond Video Tutorials: 15 AWS Resources to Enhance Your Cloud Skills >_
  • Build a streaming ETL pipeline on Amazon RDS using Amazon MSK >_
  • Building an AI-Powered iOS Chat App with Amazon Bedrock and Swift >_
  • CloudBees vs GitHub Actions: Choosing a CI/CD Platform for Your Business >_
  • Create a generative AI–powered custom Google Chat application using Amazon Bedrock >_
  • Detect issues, manage incidents, and streamline workflows with Datadog’s Microsoft Teams integration >_
  • Discover insights from Gmail using the Gmail connector for Amazon Q Business >_
  • Do I need Multi-Region? >_
  • Gemini API and Google AI Studio now offer Grounding with Google Search >_
  • GitOps: How To Use _____ (Not YAML) To Manage Kubernetes Resources With GitOps? >_
  • Google Cloud Security in Under 10 Minutes >_
  • Google Cloud database news roundup, October 2024 edition >_
  • Grafana dashboards are now powered by Scenes: big changes, same UI >_
  • How Dafiti migrated its most critical database to Amazon Aurora MySQL with minimal downtime and improved operational efficiency >_
  • How IT leaders can help HR deliver exceptional support >_
  • How To Create Software Diagrams With ChatGPT and Claude >_
  • How To Properly Introduce AI Bots to Your App Using Permit.io and Arcjet >_
  • How to Code a Subtle Shader Background Effect with React Three Fiber >_
  • How to Convert OpenAPI 2.0 to OpenAPI 3.0 in Java >_
  • How to Install Notepad++ on Linux (and 5 Alternatives to Try) >_
  • How to Tear Down or Empty HSQLDB Database After Test >_
  • How to Write Extension Methods in C# >_
  • How to execute command once a month on specific weekday >_
  • Implementing AI in a startup is transformative but requires the right strategy. >_
  • In the Dark about Shadow APIs? >_
  • Introducing Azure DevOps Backup Tool 1.1.2.0: Security update >_
  • Introducing DRIFT Search: Combining global and local search methods to improve quality and efficiency >_
  • LightSpy iOS Malware Upgraded To Include 28 Plugins With Destructive Capabilities >_
  • Load vector embeddings up to 67x faster with pgvector and Amazon Aurora >_
  • Malware Analysis in 5 Simple Steps >_
  • Microsoft Cost Management updates—September 2024 >_
  • Moving Baselime from AWS to Cloudflare: simpler architecture, improved performance, over 80% lower cloud costs >_
  • Nearly 90% of our AI Crawler Traffic is From TikTok Parent Bytedance – Lessons Learned >_
  • New AWS Secure Builder training available through SANS Institute >_
  • October project goals update >_
  • Our Q1 FY25 letter to shareholders >_
  • PyTorch/XLA 2.5: vLLM support and an improved developer experience >_
  • Russian Hackers Attacking Ukraine Military With Windows & Android Malware >_
  • Securing Your REST API with JWT Authorizers and Amazon Cognito >_
  • Sharing our latest differential privacy milestones and advancements >_
  • Tackling the Complexities of Kubernetes Fleet Management >_
  • Tenable Web Application Cerdential Scans For Web Appications and APIs >_
  • The AI problem we can’t ignore >_
  • TikTok Hashtags: How to Use the Best Hashtags for More Views >_
  • Tracking Dual Passwords in MySQL >_
  • Tutorial: Implement custom policies in 3scale API Management >_
  • Unlock the potential of your supply chain data and gain actionable insights with AWS Supply Chain Analytics >_
  • Unlocking the power of Spanner: 10 partners to revolutionize your data >_
  • Women Know Cybersecurity: Every Young Girl Has A Story To Tell >_
  • Workers Builds: integrated CI/CD built on the Workers platform >_

2024-10-30

  • 1.8 Trillion Events Per Day with Kafka: How Agoda Handles it >_
  • 6 Steps for Cyber Resilience During the 2024 U.S. Presidential Election >_
  • A guide to setting up a development environment >_
  • ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues >_
  • Achieve multi-Region resiliency for your conversational AI chatbots with Amazon Lex >_
  • Amazon WorkSpaces vs. Amazon EC2: a helpful guide >_
  • Announcing Vitess 21 >_
  • Azure at GitHub Universe: New tools to help simplify AI app development >_
  • Balancing AWS Certification and Parenting: A Guide for Busy Professionals >_
  • Bringing AI Agents to production with Gemini API >_
  • Building a SOC: Should You Go In-House or Outsource? >_
  • C4A VMs now GA: Our first custom Arm-based Axion CPU >_
  • Cloud CISO Perspectives: 10 ways to make cyber-physical systems more resilient >_
  • Cloudflare’s perspective of the October 30 OVHcloud outage >_
  • Confluence for Figma Integration: Bridging Design and Documentation >_
  • Create and fine-tune sentence transformers for enhanced classification accuracy >_
  • Critical Chrome Security Update: Patch for Out-of-Bounds & WebRTC Vulnerability >_
  • Cynet Security Achieves 426% ROI in Forrester Total Economic Impact™ Study >_
  • EMERALDWHALE:  15k Cloud Credentials Stolen in Operation Targeting Exposed Git Config Files >_
  • Embed textual data in Amazon RDS for SQL Server using Amazon Bedrock >_
  • Enhance Customer Engagement with Go and Twilio SMS >_
  • Fedora Linux 41 has been released with DNF 5, GNOME 47, and other exciting updates >_
  • From idea to impact: Real-world success stories of building intelligent apps with Azure >_
  • Grafana variables: what they are and how they create dynamic dashboards >_
  • Here’s a cybersecurity problem: there just aren’t enough young people. >_
  • How Grainger optimized RUM costs by removing unwanted bot traffic >_
  • How To Design Effective Access Control for Generative AI >_
  • How To Write A Malware Analysis Report In One Click Using ANY.RUN Sandbox >_
  • How to Automatically Create & Update Embeddings in PostgreSQL—With One SQL Query >_
  • How to Build and Grow a Powerful Social Media Presence >_
  • How to Install Seafile Self-Hosted Cloud Storage on Debian 12 >_
  • How to Remove All Saved Posts from Facebook Using JavaScript >_
  • How to Stand Out in Your AWS Community Builders Application (And Re-Application) >_
  • How to Use Bash Autoincrement Variables and Counters Effectively >_
  • How to query MongoDB Atlas from a shell script? >_
  • How we reduced peak memory and CPU usage of the product configuration management SDK >_
  • IBM Flexible Service Processor Vulnerability Lets Attackers Gain Service Privileges >_
  • Identify the secrets that make your cloud environment more vulnerable >_
  • Introducing an industry first: application awareness on Cloud Interconnect >_
  • Introduction to Kubernetes and AWS EKS - Part 1 >_
  • K4 – High performance open-source transactional, durable embedded storage engine >_
  • Limitations of frame pointer unwinding >_
  • Massive Midnight Blizzard Phishing Attack Via Weaponized RDP Files >_
  • Modernize your legacy databases with AWS data lakes, Part 1: Migrate SQL Server using AWS DMS >_
  • New Windows Theme Zero-Day Vulnerability Let Attackers Steal Credentials >_
  • Optimization and Automation of AWS Resources to reduce costs without impacting operations >_
  • Powerful infrastructure innovations for your AI-first future >_
  • Seth Michael Larson: How to export OPML from Omnivore >_
  • Simplify and enhance Amazon S3 static website hosting with AWS Amplify Hosting >_
  • Speed, scale and reliability: 25 years of Google data-center networking evolution >_
  • The AI-native developer experience >_
  • The Only Kubectl Commands Cheat Sheet You’ll Ever Need >_
  • Trust Through Transparency: Regulation’s Role in Consumer Confidence >_
  • Unlock organizational wisdom using voice-driven knowledge capture with Amazon Transcribe and Amazon Bedrock >_
  • What is conversational AI? >_
  • gcbd 0.2.7 on CRAN: More Mere Maintenance >_
  • scsi-cli - SCSI device query utility >_

2024-10-29

  • 1200 Servers Of RedLine & META Infostealers Seized By Authorities >_
  • 3 GitLab features to level up DevSecOps workflows >_
  • 5 Tips for Choosing an API Management Tool >_
  • Accelerate scale with Azure OpenAI Service Provisioned offering >_
  • Announcing HAProxy Fusion 1.3 >_
  • Apple visionOS 2.1 Released with Fix for Multiple Security Vulnerabilities >_
  • Automate Amazon Bedrock batch inference: Building a scalable and efficient pipeline >_
  • Automate document processing with Amazon Bedrock Prompt Flows (preview) >_
  • Automate security scans on Amazon EKS with Kubescape, AWS CodeBuild, and AWS CodePipeline >_
  • Awesome Go gets even more awesome >_
  • Axis Bank >_
  • Back to basics - About Private DNS Resolver >_
  • Beyond the Login ? Keeping Accounts Secure with Lifecycle Protection >_
  • Build a video insights and summarization engine using generative AI with Amazon Bedrock >_
  • Canadian Cyber Centre Warns Of Chinese Hackers Scanning IT Systems >_
  • ClickHouse: The Key to Faster Insights >_
  • Cloudflare Overhauls Logging Pipeline with OpenTelemetry >_
  • Dynatrace on Microsoft Azure in Australia enables regional customers to leverage AI-powered observability >_
  • Edit your Git-based Grafana dashboards locally >_
  • Empower your generative AI application with a comprehensive custom observability solution >_
  • Evasive Panda Attacking Cloud Services To Steal Data Using New Toolkit >_
  • Exec to Exec: How to use GenAI in your firm without losing control >_
  • Exploring the Foundations of Linux: A Look at Major Distributions and Their Base Systems >_
  • Fedora Linux 41 is here! >_
  • Forced offline: the Q3 2024 Internet disruption summary >_
  • Gemini models are coming to GitHub Copilot >_
  • GitHub Universe 2024 opening keynote: delivering phase two of AI code generation >_
  • Governing the ML lifecycle at scale: Centralized observability with Amazon SageMaker and Amazon CloudWatch >_
  • Hackers Downgrading Remote Desktop Security Setting For Unauthorized Access >_
  • How Interpol is adapting to the ever-evolving cybercrime landscape >_
  • How One AdTech Company Cut Cloud Costs by 40% by Deploying Demand-Side Platform Instances on Akamai Cloud >_
  • How To Reduce Your Grafana Cloud Costs With Adaptive Metrics >_
  • How to Build a CRUD REST API Using Spring Boot >_
  • How to Choose the Right Authorization Model for Your Multi-Tenant SaaS Application >_
  • How to Install Syncthing on Debian 12 >_
  • How to Learn Things by Yourself >_
  • How to Merge Multiple Google Docs into One Using Apps Script or the Google Docs API >_
  • How to Mock Multiple Responses for the Same Request >_
  • How to Post on Multiple Social Media Platforms at Once >_
  • How to Revive and Restructure Codebase with AI >_
  • How to Use SonarQube to Improve Code Quality with a Local Setup >_
  • How to get the whole planet to send abuse complaints to your best friends >_
  • How to learn AI for beginners >_
  • How to preserve Bluetooth device configurations >_
  • How to print from Linux using only the command line >_
  • Identity is the Perimeter of the Cloud >_
  • Infostealer Malwares Bypassing Chrome’s Cookie Protection to Steal Data >_
  • Introducing The Source: Insights for the future of software development >_
  • Introducing support for HTTP/2 and gRPC on DigitalOcean App Platform >_
  • Introduction to Apache Iceberg >_
  • Issue 68 of AWS Cloud Security Weekly >_
  • Kubernetes Ingress Configuration for External Services >_
  • Making Adding AI Apps with Postgres Easier for Developers >_
  • Managing Kubernetes Clusters With k9s Command-Line Tool >_
  • Migrate from Redis to Valkey Without Downtime >_
  • Migrating billions of records: moving our active DNS database while it’s in use >_
  • MySQL NDB Cluster 8.4 - What's new >_
  • New CIS GitLab Benchmark scanner boosts security and compliance >_
  • New Encoding Technique Jailbreaks ChatGPT-4o To Write Exploit Codes >_
  • Nintendo Warns Users on Phishing Attack Mimics Company’s Email >_
  • Notorious WrnRAT Delivered Mimic As Gambling Games >_
  • Paolo Melchiorre: 2025 Django Software Foundation board nomination >_
  • Parameter Management at Scale: How Multi-Region Configurations Saved My Application >_
  • Performance testing MySQL migration environments using query playback and traffic mirroring – Part 2 >_
  • Performance testing MySQL migration environments using query playback and traffic mirroring – Part 3 >_
  • Provisioning Kafka topics the easy way! >_
  • PyTorch 2.5 Release Includes Support for Intel GPUs >_
  • Recapping Datadog Summit Tokyo 2024 >_
  • Run OpenShift 4.17 on VCF 5.2.1: What you need to know >_
  • Scaling Prometheus: Tips, Tricks, and Proven Strategies >_
  • Secure Your GKE Services with Auth0 , Identity-Aware Proxy and the Gateway API >_
  • Simplicity Is An Achievement >_
  • Strengthening Cloud Native Security: A Deep Dive Into Container Runtime Protection >_
  • The Power of Market Disruption: How to Detect Fraud With Graph Data >_
  • Understanding responsible AI practices >_
  • Unlocking the Power of Data Lakehouses: The Role of Iceberg and Real-Time Analytics >_
  • Use GitHub Spark to create a travel log app >_
  • Use HammerDB to run performance tests on Amazon RDS for Db2 >_
  • What is GitHub Spark? Introducing a brand new way to build powerful, AI assisted applications >_
  • What's New in POSIX 2024 >_
  • sftp refresher - 101 >_
« newer articles | page 77 | older articles »