2024-10-28

  • 5 things to know from our LinkedIn Live Security Deep Dive >_
  • A practical GitHub Actions pipeline example with Rails >_
  • AWS Weekly Roundup: New code editor in AWS Lambda console, Amazon Q Business analytics, Claude 3.5 upgrades, and more (October 28, 2024) >_
  • Abandonware in Popular Open Source Databases >_
  • Adding threat detection to custom authentication flow with Amazon Cognito advanced security features >_
  • Automation Platform v2: Improving Conversational AI at Airbnb >_
  • Bad Bots: 6 Common Bot Attacks and Why They Happen >_
  • Boost productivity with an AI writer >_
  • Celebrating 10 Years of Amazon ECS: Powering a Decade of Containerized Innovation >_
  • Chinese Hackers Toolkit Uncovered And Activity History Uncovered >_
  • Customized model monitoring for near real-time batch inference with Amazon SageMaker >_
  • Datadog vs. Grafana: Finding Your Ideal Monitoring Tool >_
  • Ephemeral OpenShift clusters in Konflux CI using the Cluster-as-a-Service operator >_
  • Faster Redis: Client library support for client-side caching >_
  • From firefighting to future-proofing: Atlassian’s journey with a multi-account strategy >_
  • Fujian Telecom Unlimited Speed Removal: How to Lift Speed Limits on Fujian Telecom’s Data Plans >_
  • GitHub Universe 2024: 150+ speakers, 100+ sessions, endless possibilities >_
  • GitHub Universe 2024: Stepping into style with custom sneakers >_
  • Hackers Exploit SonicWall VPNs to Deploy Fog & Akira Ransomware >_
  • Hands-on introduction to Apache Iceberg >_
  • How ARC zonal Shift enhances application availability in Amazon EKS >_
  • How Claroty Improved Database Performance and Scaled the Claroty xDome Platform using Amazon Aurora Optimized Reads >_
  • How to Build Your Career in AI [pdf] >_
  • How to Call External REST Webservice Using WebClient in Spring Boot >_
  • How to Create a Timeshift Snapshot Before Upgrading Linux Mint >_
  • How to Enable and Manage Clipboard Access in Vim on Linux >_
  • How to Redirect URLs Using Nginx >_
  • How to add SSO login option on CPQ login page >_
  • How to get errors logs visible in Google Error Reporting >_
  • How to implement AI in customer service >_
  • How to implement trusted identity propagation for applications protected by Amazon Cognito >_
  • How to use passkeys to authenticate to MySQL >_
  • Hybrid Russian Espionage and Influence Campaign Aims to Compromise Ukrainian Military Recruits and Deliver Anti-Mobilization Narratives >_
  • INE Launches Initiative to Optimize Year-End Training Budgets with Enhanced Cybersecurity and Networking Programs >_
  • Import data from Google Cloud Platform BigQuery for no-code machine learning with Amazon SageMaker Canvas >_
  • Lambda function with GraalVM Native Image - Part 3 Measuring cold and warm starts >_
  • Learn how to write AI prompts in 5 easy steps with this new course from Google >_
  • Maximizing ROI With Enterprise Container Solutions >_
  • NVIDIA GPU Vulnerabilities Allow Attackers To Execute Remote Code on Windows & Linux >_
  • NVIDIA vGPU Software Vulnerabilities Lets Attackers Escalate The Privilege Remotely >_
  • New Windows Downgrade Attack Let Hackers Downgrade Patched Systems >_
  • No new Azure DevOps OAuth apps beginning February 2025 >_
  • Operation Magnus Disrupted Redline and Meta Infostealer Malware >_
  • PoC Published for VMWare vCenter Server RCE Vulnerability CVE-2024-38812 >_
  • Public TLS Certificate Automation in LKE using Certbot & KIC >_
  • RAG That Drafts: How to Sharpen AI with a Draft-and-Refine Strategy >_
  • Realtek SD Card Reader Driver Flaws Impact Dell, Lenovo, And Other Laptops >_
  • SQLite Rsync: Database Remote-Copy Tool for SQLite >_
  • Schedule modifications of Amazon RDS using Amazon EventBridge Scheduler and AWS Lambda >_
  • SingleStore Database Branching: How to Boost Developer Productivity >_
  • Spooky Cyber Stats and Trends In Time for Halloween >_
  • Spotlight on Kubernetes Upstream Training in Japan >_
  • Spring 2024 PCI DSS and 3DS compliance packages available now >_
  • Transform and enrich your logs at query time with Calculated Fields >_
  • Unity Ads uses Memorystore to power up to 10 million operations per second >_
  • Visualize GitHub repos, projects, and more: get started with the GitHub data source for Grafana >_
  • What Docker should have been >_
  • What is AWS Karpenter ? >_

2024-10-27

  • How to create new pdf with watermark, string and signatur with a script? >_
  • I bought us-east-1.com: A Look at Security, DNS Traffic, and Protecting AWS Users >_
  • Protecting Privacy and Safety in AI: The Role of AWS Bedrock Guardrails >_
  • So long DocumentDB, hello MongoDB Atlas >_
  • Using less memory to look up IP addresses in Mess With DNS >_
  • Weekly Cybersecurity Newsletter: Data Breaches, Vulnerabilities, Cyber Attacks, and Other Updates >_

2024-10-26

  • AWS Console-to-Code: Convert Console Actions to Reusable IaC >_
  • Amazon EKS Best Practices Guide >_
  • Bash Scripting Tutorial: How to Write a Bash Script >_
  • Black Basta Ransomware Operators Using Microsoft Teams To Breach Organizations >_
  • How to Save a Script on Terminal >_
  • How to configure an Ethernet connection between iPad and RaspberryPi through USB-C >_
  • Matching IPs to Subnets in Python in an Efficient Way >_
  • Top 10 Best Server Monitoring Tools in 2024 >_
  • Top 10 Mobile Device Management (MDM) Tools in 2024 >_
  • Top 10 Programming Languages For Cyber Security – 2024 >_
  • Understanding Cluster Autoscaler: Automating Kubernetes Resource Management >_
  • Wi-Fi Test Suite Command Injection Vulnerability Found in Arcadyan Routers >_

2024-10-25

  • AI Hypercomputer software updates: Faster training and inference, a new resource hub, and more >_
  • AWS CDK Vulnerabilities Let Attackers Gain Admin Access to AWS Accounts >_
  • Achieve a high-speed InnoDB purge on Amazon RDS for MySQL and Amazon Aurora MySQL >_
  • Activation Functions Simplified >_
  • Best Open Source Hosting Control Panels for 2024 >_
  • Better together: How to break down persistent IT and security silos >_
  • BigQuery's AI-assisted data preparation is now in preview >_
  • CISA Warns of Cisco ASA & Roundcube Vulnerabilities Exploited in Wild >_
  • Celebrating Chicago’s creators and small businesses at Firefox’s ‘Free to Browse’ event >_
  • Diff Authoring Time: Measuring developer productivity at Meta >_
  • Elephants in tunnels: how Hyperdrive connects to databases inside your VPC networks >_
  • FortiManager Devices Mass Compromise Exploiting CVE-2024-47575 Vulnerability >_
  • From on-prem to cloud: Detect lateral movement in hybrid Azure environments >_
  • Getting Started with Host Metrics Using OpenTelemetry >_
  • Google Dorking: How to Find Hidden Information on the Web >_
  • Grant Graph API Permission to Azure Automation System assigned Managed Identity >_
  • Hackers Allegedly Claiming Breach NoBroker Users Data & Demands Ransom >_
  • Hackers Using Weaponized RDP Setup Files to Attack Windows Servers >_
  • How Planview built a scalable AI Assistant for portfolio and project management using Amazon Bedrock >_
  • How To Define an AI Agent Persona by Tweaking LLM Prompts >_
  • How to Allow Short Passwords in Linux >_
  • How to Avoid Concurrent Modification Exceptions in Java Collections >_
  • How to Capture Your Screen in Linux with OBS Studio >_
  • How to Create Tech Videos for YouTube with Josh Cirre >_
  • How to Deploy Your Project On Vercel With A Custom Domain >_
  • How to Install and Use uv: A Python Installer and Resolver >_
  • How to Monitor Apache Load with mod_status in Linux >_
  • How to Run Databases on Kubernetes: An 8-Step Guide >_
  • How to Set Up Hadoop for Big Data >_
  • How to Use Object-Oriented Programming in Python – Key OOP Concepts and Interview Questions for Beginners >_
  • How to Write Cleaner JavaScript Code with The Ternary Operator >_
  • How to mitigate bot traffic by implementing Challenge actions in your AWS WAF custom rules >_
  • How to take a Red Hat Remote Exam >_
  • How to use LazyConnectionDataSourceProxy with Spring Data JPA >_
  • Live Patching and Immutable System >_
  • Location tracking of phones is out of control. Heres how to fight back. >_
  • Mercedes-Benz & GitHub: A Data Center on Wheels >_
  • New Cybersecurity Programs Launched By U.S. Schools >_
  • NixOS & Flux: Open Source Innovation and Sustainable Community Growth >_
  • ObservabilityCON 2024: On-demand sessions available now! >_
  • Social Media Dashboard: How To Make Your Marketing Efforts A Whole Lot Easier >_
  • Test: We Need to Talk: Breaking up with Your SIEM Vendor >_
  • Top Security Considerations for Enterprise Implementations of Generative AI >_
  • UnitedHealth Data Breach Impacts Over 100 Million American Users >_
  • Unlock cost savings using compression with Amazon DocumentDB >_
  • Windows 11 CLFS Driver Vulnerability Allow Attackers To Escalate Privileges: PoC Exploit Released >_

2024-10-24

  • AWS Client VPN Caveat: Knowing this can save you hours of troubleshooting >_
  • Adapting model risk management for financial institutions in the generative AI era >_
  • Amazon identified internet domains abused by APT29 >_
  • Automate Red Hat OpenShift on Alibaba Cloud >_
  • Autoscaling Azure DevOps Pipelines Agents with KEDA >_
  • Billions and billions (of logs): scaling AI Gateway with the Cloudflare Developer Platform >_
  • Browser testing in Grafana Cloud k6: how to optimize frontend web performance >_
  • Build durable applications on Cloudflare Workers: you write the Workflows, we take care of the rest >_
  • Building Resilient Public Networking on AWS: Part 4 >_
  • CISA Warns Active Exploitation of Microsoft SharePoint Vulnerability >_
  • Chrome on Android to support third-party autofill services natively >_
  • Create a generative AI-based application builder assistant using Amazon Bedrock Agents >_
  • Critical Cisco ASA Flaw Allows SSH Remote Command Injection >_
  • Cross-examining cybercrime at GITEX GLOBAL 2024, world’s largest tech event >_
  • DarkComet RAT – A Remote Access Tool Lets Attackers Remotely Control Windows >_
  • Datadog named a Leader in first ever 2024 Gartner® Magic Quadrant™ for Digital Experience Monitoring >_
  • Durable Objects aren't just durable, they're fast: a 10x speedup for Cloudflare Queues >_
  • Embargo Ransomware Actors Abuses Safe Mode To Disable Security Solutions >_
  • Empower innovation and transformation through AI and data-driven insights on Azure >_
  • Enhance your Amazon Redshift cloud data warehouse with easier, simpler, and faster machine learning using Amazon SageMaker Canvas >_
  • Exploring digital sovereignty: learning opportunities at re:Invent 2024 >_
  • From RAG to fabric: Lessons learned from building real-world RAGs at GenAIIC – Part 1 >_
  • GitLab Patches Critical HTML Injection Flaw Leading To XSS Attacks >_
  • GitLab vs GitHub: Ultimate Guide to Choosing the Best DevOps >_
  • Google Cloud Apigee named a Leader in the 2024 Gartner® Magic Quadrant™ for API Management >_
  • How To: Know What Happens to Hadoop with Small Files ? >_
  • How can you store persistent data for a Kubernetes application running on EKS? >_
  • How to Automate Documentation Conversion with Pandoc in CI/CD Pipelines >_
  • How to Build Your Own Private Hacking Lab with VirtualBox >_
  • How to Build a CRUD Application using React and Convex >_
  • How to Build a Simple Secure Chat System Using Netcat >_
  • How to Create a Facebook Business Page: A Quick Guide for Entrepreneurs >_
  • How to Enable/Disable Directory Listing on Nginx (in Ubuntu) >_
  • How to Grip Bronze Age Swords >_
  • How to Implement Fine-Grained Authorization in Java and SpringBoot >_
  • How to Incorporate AWS Lambda into a Distributed System >_
  • How to Secure JavaScript Applications: Common Vulnerabilities and Best Practices >_
  • How to Set Your Video as Animated Wallpaper in Ubuntu 24.04 >_
  • How to Use @Qualifier Annotation with Strategy Pattern in Spring Boot >_
  • How to Use Skeleton Screens to Improve Perceived Website Performance >_
  • How to alter default session type using D-Bus interface >_
  • How to know if the network is configured through /etc/network/interfaces, NetworkManager, Systemd or Netplan? >_
  • How to pipe input to an interactive shell in Bash >_
  • Install of Packages with NPM-Store Using AWS CodeArtifact >_
  • Intellij Idea – How to Build Project Automatically >_
  • Introduction to Apache Commons Validator >_
  • Investigating FortiManager Zero-Day Exploitation (CVE-2024-47575) >_
  • Logstash vs. Kafka >_
  • Mainsail Introduces Quantum-Hardened Security at KubeCon Salt Lake City 2024 >_
  • Managed SIEM Pricing – 2025 : A Guide to Cost and Value >_
  • Maximizing design impact with Confluence >_
  • Migrate or upgrade your like-to-like databases using AWS DMS homogeneous migration >_
  • OpenSSL 3.4 Series Release Notes >_
  • Prague PostgreSQL Developer Day 2025 / Call for Papers & Sponsors >_
  • Preparing Valgrind Memcheck for x86-64-v3 >_
  • Product Review: BlueSleuth-Lite BLE Tag Detector >_
  • Prometheus Alertmanager: What You Need to Know >_
  • Promoting Apps to Production: How To Ensure That a Change Only Deploys to Lower Environments? >_
  • Recover a Git Branch After Its Deletion >_
  • Redis Users Want a Change >_
  • Rust in Enterprise Kernels >_
  • Rust-Written Rustls Now Reportedly Outperforming OpenSSL & BoringSSL >_
  • Scrub EXIF Image Data in Your DevOps Pipeline >_
  • Spark on GKE: A Guide to using GKEStartPodOperator for Spark workloads >_
  • Super charge your LLMs with RAG at scale using AWS Glue for Apache Spark >_
  • Tailscale and 1Password Device Trust, now generally available >_
  • TechXchange: Making Real-Time Analytics and Decisioning a Reality with SingleStore, watsonx.data and IBM StreamSets >_
  • Toasty, an Async ORM for Rust >_
  • Top 10 Java Performance Optimization Tips >_
  • Tor Browser 14.0 Launches with Enhanced Security >_
  • Trace your applications end to end with Datadog and OpenTelemetry >_
  • Transitioning from Amazon Rekognition people pathing: Exploring other alternatives >_
  • Tutorial : Multi-Agent interactions with Autogen and Gemini — Part 8: Group Chat >_
  • U.S. Govt Announces Rewards Up To $10 Million For Info On Iranian Hackers >_
  • Using Entra profile information in Azure DevOps >_
  • Visualize vector embeddings stored in Amazon Aurora PostgreSQL and explore semantic similarities >_
  • What’s new in PostgreSQL 17, now available in Cloud SQL >_
  • k8s-pvc-tagger: The Swiss Army Knife of AWS EBS Tagging >_

2024-10-23

  • 4.2 Tbps of bad packets and a whole lot more: Cloudflare's Q3 DDoS report >_
  • AWS X-Ray vs Jaeger - Choosing the Right Distributed Tracing Tool >_
  • Automating document indexing into Azure Cosmos DB with Logic Apps >_
  • Boost Your Linux Terminal Productivity with Terminator >_
  • Boost post-call analytics with Amazon Q in QuickSight >_
  • Build containerized applications for Amazon DocumentDB that run on Amazon ECS on AWS Fargate >_
  • CSI Forensics: Unraveling Kubernetes Crime Scenes >_
  • Create a next generation chat assistant with Amazon Bedrock, Amazon Connect, Amazon Lex, LangChain, and WhatsApp >_
  • Deliver Secure and Reliable Live Streaming with Generalized Edge Compute >_
  • EC2 Image Builder now supports building and testing macOS images >_
  • End-user computing that’s made for today and ready for what’s next >_
  • Evaluating the right fit for your Amazon Aurora workloads: provisioned or Serverless v2 >_
  • Evolving the Responsible Generative AI Toolkit with new tools for every LLM >_
  • Fine-tune a BGE embedding model using synthetic data from Amazon Bedrock >_
  • Flaky tests: their hidden costs and how to address flaky behavior >_
  • Google is a Leader in Gartner Magic Quadrant for Strategic Cloud Platform Services >_
  • Grafana 11.3 release: Scenes-powered dashboards, visualization and panel updates, and more >_
  • How IBM and Palo Alto Networks team up to combat cyberthreats >_
  • How To Stop Worrying and Start Loving Databases on Kubernetes >_
  • How do you deploy a web application on AWS using Amazon EKS and expose it to the internet? >_
  • How higher education is reimagining student experiences with Azure OpenAI Service >_
  • How secure are containers & Kubernetes vs. microVMs for self-hosted CI? >_
  • How to Automate Documentation Conversion with Pandoc in CI/CD Pipelines >_
  • How to Build Secure Okta Node.js Integrations with DPoP >_
  • How to Create Filling CSS Loaders Using One Element >_
  • How to Install and Use jaq (jq clone) on Linux: Step-by-Step Guide >_
  • How to Use RxStomp with React – Build Chat App with STOMP and React >_
  • How to Use Skeleton Screens to Improve Perceived Website Performance >_
  • How to Use diff3 Command for File Merging in Linux >_
  • How to improve the developer experience in today’s ecommerce world >_
  • Introduction to AI training with openSUSE >_
  • Issue 67 of AWS Cloud Security Weekly >_
  • LLM-assisted vector similarity search >_
  • Log4Shell: The vulnerability that shook the world of software development >_
  • Model-Based Testing with Testcontainers and Jqwik >_
  • Next-generation learning experience using Amazon Bedrock and Anthropic’s Claude: Innovation from Classworks >_
  • Open Source and Flawed Foundations >_
  • SQLite is replacing its canonical build process >_
  • Save on GPUs: Smarter autoscaling for your GKE inferencing workloads >_
  • Spanner and PostgreSQL at Prefab: Flexible, reliable, and cost-effective at any size >_
  • Training a million models per day to save customers of all sizes from DDoS attacks >_
  • Understanding Kubernetes Metrics Server: Your Go-to Guide >_
  • Unlocking generative AI for enterprises: How SnapLogic powers their low-code Agent Creator using Amazon Bedrock >_

2024-10-22

  • 10 Best Open Source Firewalls for Securing Linux Servers >_
  • 5 new protections on Google Messages to help keep you safe >_
  • Amazon RDS Custom for SQL Server now supports Windows Authentication for DB instances >_
  • Announcing Anthropic’s upgraded Claude 3.5 Sonnet on Vertex AI >_
  • Automate fine-tuning of Llama 3.x models with the new visual designer for Amazon SageMaker Pipelines >_
  • Automated Data Cleaning: A Pipeline Approach >_
  • Building the Future, Together - Keynote at Kubernetes Community Days UK, 2024 >_
  • Charting a course for leading an effective organisation >_
  • DigitalOcean Kubernetes (DOKS) Networking, Reimagined >_
  • Docker at Cloud Expo Asia: GenAI, Security, and New Innovations >_
  • From idea to impact: learn from last year’s Codegeist winners >_
  • From multi-line queries to no-code investigations: meeting Grafana users where they are >_
  • Generative AI foundation model training on Amazon SageMaker >_
  • Highlights from the 10th DORA report >_
  • How Scopely scaled “Stumble Guys” for millions of players around the globe with Amazon RDS for SQL Server >_
  • How do you manage Kubernetes cluster upgrades on Amazon EKS? >_
  • How to Build a Weather App in React >_
  • How to Cut Down Amazon CloudWatch Costs >_
  • How to run a Pyspark workload on Dataproc and Dataproc Serverless in GCP >_
  • How to secure your new VPS: a step-by-step guide >_
  • How to use interface VPC endpoints to meet your security objectives >_
  • How to use the Amazon Detective API to investigate GuardDuty security findings and enrich data in Security Hub >_
  • How we use OpenBMC and ACPI power states to monitor the state of our servers >_
  • IPLS: Privacy-preserving storage for your WhatsApp contacts >_
  • Implement Amazon SageMaker domain cross-Region disaster recovery using custom Amazon EFS instances >_
  • Improve SEO with Prerender.io >_
  • Introducing Access for Infrastructure: SSH >_
  • Introducing Keras Hub: Your one-stop shop for pretrained models >_
  • Learn Image Builder in Minutes >_
  • Measuring developer experience with the HEART Framework: A guide for platform engineers >_
  • On Simplicity >_
  • Pulsar 1.122 Code Editor Enhances C & PHP Support, Launcher Fixes >_
  • Quick vulnerability remediation with GitLab Advanced SAST + Duo AI >_
  • Revelations after migrating to Cloud: Splunk’s story >_
  • Rovo for GitHub Copilot leads Atlassian’s new developer focused innovations at GitHub Universe >_
  • SOC Findings Report From RSA Conference 2024 >_
  • Save the date for Firebase Demo Day 2024! >_
  • Scalene: A high-performance, high-precision CPU, GPU, memory profiler for Python >_
  • Speeding up with SIMD and Go assembly >_
  • Sysdig 2024 global threat report >_
  • Upgraded Claude 3.5 Sonnet from Anthropic (available now), computer use (public beta), and Claude 3.5 Haiku (coming soon) in Amazon Bedrock >_
« newer articles | page 78 | older articles »