- 5 things to know from our LinkedIn Live Security Deep Dive >_
- A practical GitHub Actions pipeline example with Rails >_
- AWS Weekly Roundup: New code editor in AWS Lambda console, Amazon Q Business analytics, Claude 3.5 upgrades, and more (October 28, 2024) >_
- Abandonware in Popular Open Source Databases >_
- Adding threat detection to custom authentication flow with Amazon Cognito advanced security features >_
- Automation Platform v2: Improving Conversational AI at Airbnb >_
- Bad Bots: 6 Common Bot Attacks and Why They Happen >_
- Boost productivity with an AI writer >_
- Celebrating 10 Years of Amazon ECS: Powering a Decade of Containerized Innovation >_
- Chinese Hackers Toolkit Uncovered And Activity History Uncovered >_
- Customized model monitoring for near real-time batch inference with Amazon SageMaker >_
- Datadog vs. Grafana: Finding Your Ideal Monitoring Tool >_
- Ephemeral OpenShift clusters in Konflux CI using the Cluster-as-a-Service operator >_
- Faster Redis: Client library support for client-side caching >_
- From firefighting to future-proofing: Atlassian’s journey with a multi-account strategy >_
- Fujian Telecom Unlimited Speed Removal: How to Lift Speed Limits on Fujian Telecom’s Data Plans >_
- GitHub Universe 2024: 150+ speakers, 100+ sessions, endless possibilities >_
- GitHub Universe 2024: Stepping into style with custom sneakers >_
- Hackers Exploit SonicWall VPNs to Deploy Fog & Akira Ransomware >_
- Hands-on introduction to Apache Iceberg >_
- How ARC zonal Shift enhances application availability in Amazon EKS >_
- How Claroty Improved Database Performance and Scaled the Claroty xDome Platform using Amazon Aurora Optimized Reads >_
- How to Build Your Career in AI [pdf] >_
- How to Call External REST Webservice Using WebClient in Spring Boot >_
- How to Create a Timeshift Snapshot Before Upgrading Linux Mint >_
- How to Enable and Manage Clipboard Access in Vim on Linux >_
- How to Redirect URLs Using Nginx >_
- How to add SSO login option on CPQ login page >_
- How to get errors logs visible in Google Error Reporting >_
- How to implement AI in customer service >_
- How to implement trusted identity propagation for applications protected by Amazon Cognito >_
- How to use passkeys to authenticate to MySQL >_
- Hybrid Russian Espionage and Influence Campaign Aims to Compromise Ukrainian Military Recruits and Deliver Anti-Mobilization Narratives >_
- INE Launches Initiative to Optimize Year-End Training Budgets with Enhanced Cybersecurity and Networking Programs >_
- Import data from Google Cloud Platform BigQuery for no-code machine learning with Amazon SageMaker Canvas >_
- Lambda function with GraalVM Native Image - Part 3 Measuring cold and warm starts >_
- Learn how to write AI prompts in 5 easy steps with this new course from Google >_
- Maximizing ROI With Enterprise Container Solutions >_
- NVIDIA GPU Vulnerabilities Allow Attackers To Execute Remote Code on Windows & Linux >_
- NVIDIA vGPU Software Vulnerabilities Lets Attackers Escalate The Privilege Remotely >_
- New Windows Downgrade Attack Let Hackers Downgrade Patched Systems >_
- No new Azure DevOps OAuth apps beginning February 2025 >_
- Operation Magnus Disrupted Redline and Meta Infostealer Malware >_
- PoC Published for VMWare vCenter Server RCE Vulnerability CVE-2024-38812 >_
- Public TLS Certificate Automation in LKE using Certbot & KIC >_
- RAG That Drafts: How to Sharpen AI with a Draft-and-Refine Strategy >_
- Realtek SD Card Reader Driver Flaws Impact Dell, Lenovo, And Other Laptops >_
- SQLite Rsync: Database Remote-Copy Tool for SQLite >_
- Schedule modifications of Amazon RDS using Amazon EventBridge Scheduler and AWS Lambda >_
- SingleStore Database Branching: How to Boost Developer Productivity >_
- Spooky Cyber Stats and Trends In Time for Halloween >_
- Spotlight on Kubernetes Upstream Training in Japan >_
- Spring 2024 PCI DSS and 3DS compliance packages available now >_
- Transform and enrich your logs at query time with Calculated Fields >_
- Unity Ads uses Memorystore to power up to 10 million operations per second >_
- Visualize GitHub repos, projects, and more: get started with the GitHub data source for Grafana >_
- What Docker should have been >_
- What is AWS Karpenter ? >_
- How to create new pdf with watermark, string and signatur with a script? >_
- I bought us-east-1.com: A Look at Security, DNS Traffic, and Protecting AWS Users >_
- Protecting Privacy and Safety in AI: The Role of AWS Bedrock Guardrails >_
- So long DocumentDB, hello MongoDB Atlas >_
- Using less memory to look up IP addresses in Mess With DNS >_
- Weekly Cybersecurity Newsletter: Data Breaches, Vulnerabilities, Cyber Attacks, and Other Updates >_
- AWS Console-to-Code: Convert Console Actions to Reusable IaC >_
- Amazon EKS Best Practices Guide >_
- Bash Scripting Tutorial: How to Write a Bash Script >_
- Black Basta Ransomware Operators Using Microsoft Teams To Breach Organizations >_
- How to Save a Script on Terminal >_
- How to configure an Ethernet connection between iPad and RaspberryPi through USB-C >_
- Matching IPs to Subnets in Python in an Efficient Way >_
- Top 10 Best Server Monitoring Tools in 2024 >_
- Top 10 Mobile Device Management (MDM) Tools in 2024 >_
- Top 10 Programming Languages For Cyber Security – 2024 >_
- Understanding Cluster Autoscaler: Automating Kubernetes Resource Management >_
- Wi-Fi Test Suite Command Injection Vulnerability Found in Arcadyan Routers >_
- AI Hypercomputer software updates: Faster training and inference, a new resource hub, and more >_
- AWS CDK Vulnerabilities Let Attackers Gain Admin Access to AWS Accounts >_
- Achieve a high-speed InnoDB purge on Amazon RDS for MySQL and Amazon Aurora MySQL >_
- Activation Functions Simplified >_
- Best Open Source Hosting Control Panels for 2024 >_
- Better together: How to break down persistent IT and security silos >_
- BigQuery's AI-assisted data preparation is now in preview >_
- CISA Warns of Cisco ASA & Roundcube Vulnerabilities Exploited in Wild >_
- Celebrating Chicago’s creators and small businesses at Firefox’s ‘Free to Browse’ event >_
- Diff Authoring Time: Measuring developer productivity at Meta >_
- Elephants in tunnels: how Hyperdrive connects to databases inside your VPC networks >_
- FortiManager Devices Mass Compromise Exploiting CVE-2024-47575 Vulnerability >_
- From on-prem to cloud: Detect lateral movement in hybrid Azure environments >_
- Getting Started with Host Metrics Using OpenTelemetry >_
- Google Dorking: How to Find Hidden Information on the Web >_
- Grant Graph API Permission to Azure Automation System assigned Managed Identity >_
- Hackers Allegedly Claiming Breach NoBroker Users Data & Demands Ransom >_
- Hackers Using Weaponized RDP Setup Files to Attack Windows Servers >_
- How Planview built a scalable AI Assistant for portfolio and project management using Amazon Bedrock >_
- How To Define an AI Agent Persona by Tweaking LLM Prompts >_
- How to Allow Short Passwords in Linux >_
- How to Avoid Concurrent Modification Exceptions in Java Collections >_
- How to Capture Your Screen in Linux with OBS Studio >_
- How to Create Tech Videos for YouTube with Josh Cirre >_
- How to Deploy Your Project On Vercel With A Custom Domain >_
- How to Install and Use uv: A Python Installer and Resolver >_
- How to Monitor Apache Load with mod_status in Linux >_
- How to Run Databases on Kubernetes: An 8-Step Guide >_
- How to Set Up Hadoop for Big Data >_
- How to Use Object-Oriented Programming in Python – Key OOP Concepts and Interview Questions for Beginners >_
- How to Write Cleaner JavaScript Code with The Ternary Operator >_
- How to mitigate bot traffic by implementing Challenge actions in your AWS WAF custom rules >_
- How to take a Red Hat Remote Exam >_
- How to use LazyConnectionDataSourceProxy with Spring Data JPA >_
- Live Patching and Immutable System >_
- Location tracking of phones is out of control. Heres how to fight back. >_
- Mercedes-Benz & GitHub: A Data Center on Wheels >_
- New Cybersecurity Programs Launched By U.S. Schools >_
- NixOS & Flux: Open Source Innovation and Sustainable Community Growth >_
- ObservabilityCON 2024: On-demand sessions available now! >_
- Social Media Dashboard: How To Make Your Marketing Efforts A Whole Lot Easier >_
- Test: We Need to Talk: Breaking up with Your SIEM Vendor >_
- Top Security Considerations for Enterprise Implementations of Generative AI >_
- UnitedHealth Data Breach Impacts Over 100 Million American Users >_
- Unlock cost savings using compression with Amazon DocumentDB >_
- Windows 11 CLFS Driver Vulnerability Allow Attackers To Escalate Privileges: PoC Exploit Released >_
- AWS Client VPN Caveat: Knowing this can save you hours of troubleshooting >_
- Adapting model risk management for financial institutions in the generative AI era >_
- Amazon identified internet domains abused by APT29 >_
- Automate Red Hat OpenShift on Alibaba Cloud >_
- Autoscaling Azure DevOps Pipelines Agents with KEDA >_
- Billions and billions (of logs): scaling AI Gateway with the Cloudflare Developer Platform >_
- Browser testing in Grafana Cloud k6: how to optimize frontend web performance >_
- Build durable applications on Cloudflare Workers: you write the Workflows, we take care of the rest >_
- Building Resilient Public Networking on AWS: Part 4 >_
- CISA Warns Active Exploitation of Microsoft SharePoint Vulnerability >_
- Chrome on Android to support third-party autofill services natively >_
- Create a generative AI-based application builder assistant using Amazon Bedrock Agents >_
- Critical Cisco ASA Flaw Allows SSH Remote Command Injection >_
- Cross-examining cybercrime at GITEX GLOBAL 2024, world’s largest tech event >_
- DarkComet RAT – A Remote Access Tool Lets Attackers Remotely Control Windows >_
- Datadog named a Leader in first ever 2024 Gartner® Magic Quadrant™ for Digital Experience Monitoring >_
- Durable Objects aren't just durable, they're fast: a 10x speedup for Cloudflare Queues >_
- Embargo Ransomware Actors Abuses Safe Mode To Disable Security Solutions >_
- Empower innovation and transformation through AI and data-driven insights on Azure >_
- Enhance your Amazon Redshift cloud data warehouse with easier, simpler, and faster machine learning using Amazon SageMaker Canvas >_
- Exploring digital sovereignty: learning opportunities at re:Invent 2024 >_
- From RAG to fabric: Lessons learned from building real-world RAGs at GenAIIC – Part 1 >_
- GitLab Patches Critical HTML Injection Flaw Leading To XSS Attacks >_
- GitLab vs GitHub: Ultimate Guide to Choosing the Best DevOps >_
- Google Cloud Apigee named a Leader in the 2024 Gartner® Magic Quadrant™ for API Management >_
- How To: Know What Happens to Hadoop with Small Files ? >_
- How can you store persistent data for a Kubernetes application running on EKS? >_
- How to Automate Documentation Conversion with Pandoc in CI/CD Pipelines >_
- How to Build Your Own Private Hacking Lab with VirtualBox >_
- How to Build a CRUD Application using React and Convex >_
- How to Build a Simple Secure Chat System Using Netcat >_
- How to Create a Facebook Business Page: A Quick Guide for Entrepreneurs >_
- How to Enable/Disable Directory Listing on Nginx (in Ubuntu) >_
- How to Grip Bronze Age Swords >_
- How to Implement Fine-Grained Authorization in Java and SpringBoot >_
- How to Incorporate AWS Lambda into a Distributed System >_
- How to Secure JavaScript Applications: Common Vulnerabilities and Best Practices >_
- How to Set Your Video as Animated Wallpaper in Ubuntu 24.04 >_
- How to Use @Qualifier Annotation with Strategy Pattern in Spring Boot >_
- How to Use Skeleton Screens to Improve Perceived Website Performance >_
- How to alter default session type using D-Bus interface >_
- How to know if the network is configured through /etc/network/interfaces, NetworkManager, Systemd or Netplan? >_
- How to pipe input to an interactive shell in Bash >_
- Install of Packages with NPM-Store Using AWS CodeArtifact >_
- Intellij Idea – How to Build Project Automatically >_
- Introduction to Apache Commons Validator >_
- Investigating FortiManager Zero-Day Exploitation (CVE-2024-47575) >_
- Logstash vs. Kafka >_
- Mainsail Introduces Quantum-Hardened Security at KubeCon Salt Lake City 2024 >_
- Managed SIEM Pricing – 2025 : A Guide to Cost and Value >_
- Maximizing design impact with Confluence >_
- Migrate or upgrade your like-to-like databases using AWS DMS homogeneous migration >_
- OpenSSL 3.4 Series Release Notes >_
- Prague PostgreSQL Developer Day 2025 / Call for Papers & Sponsors >_
- Preparing Valgrind Memcheck for x86-64-v3 >_
- Product Review: BlueSleuth-Lite BLE Tag Detector >_
- Prometheus Alertmanager: What You Need to Know >_
- Promoting Apps to Production: How To Ensure That a Change Only Deploys to Lower Environments? >_
- Recover a Git Branch After Its Deletion >_
- Redis Users Want a Change >_
- Rust in Enterprise Kernels >_
- Rust-Written Rustls Now Reportedly Outperforming OpenSSL & BoringSSL >_
- Scrub EXIF Image Data in Your DevOps Pipeline >_
- Spark on GKE: A Guide to using GKEStartPodOperator for Spark workloads >_
- Super charge your LLMs with RAG at scale using AWS Glue for Apache Spark >_
- Tailscale and 1Password Device Trust, now generally available >_
- TechXchange: Making Real-Time Analytics and Decisioning a Reality with SingleStore, watsonx.data and IBM StreamSets >_
- Toasty, an Async ORM for Rust >_
- Top 10 Java Performance Optimization Tips >_
- Tor Browser 14.0 Launches with Enhanced Security >_
- Trace your applications end to end with Datadog and OpenTelemetry >_
- Transitioning from Amazon Rekognition people pathing: Exploring other alternatives >_
- Tutorial : Multi-Agent interactions with Autogen and Gemini — Part 8: Group Chat >_
- U.S. Govt Announces Rewards Up To $10 Million For Info On Iranian Hackers >_
- Using Entra profile information in Azure DevOps >_
- Visualize vector embeddings stored in Amazon Aurora PostgreSQL and explore semantic similarities >_
- What’s new in PostgreSQL 17, now available in Cloud SQL >_
- k8s-pvc-tagger: The Swiss Army Knife of AWS EBS Tagging >_
- 4.2 Tbps of bad packets and a whole lot more: Cloudflare's Q3 DDoS report >_
- AWS X-Ray vs Jaeger - Choosing the Right Distributed Tracing Tool >_
- Automating document indexing into Azure Cosmos DB with Logic Apps >_
- Boost Your Linux Terminal Productivity with Terminator >_
- Boost post-call analytics with Amazon Q in QuickSight >_
- Build containerized applications for Amazon DocumentDB that run on Amazon ECS on AWS Fargate >_
- CSI Forensics: Unraveling Kubernetes Crime Scenes >_
- Create a next generation chat assistant with Amazon Bedrock, Amazon Connect, Amazon Lex, LangChain, and WhatsApp >_
- Deliver Secure and Reliable Live Streaming with Generalized Edge Compute >_
- EC2 Image Builder now supports building and testing macOS images >_
- End-user computing that’s made for today and ready for what’s next >_
- Evaluating the right fit for your Amazon Aurora workloads: provisioned or Serverless v2 >_
- Evolving the Responsible Generative AI Toolkit with new tools for every LLM >_
- Fine-tune a BGE embedding model using synthetic data from Amazon Bedrock >_
- Flaky tests: their hidden costs and how to address flaky behavior >_
- Google is a Leader in Gartner Magic Quadrant for Strategic Cloud Platform Services >_
- Grafana 11.3 release: Scenes-powered dashboards, visualization and panel updates, and more >_
- How IBM and Palo Alto Networks team up to combat cyberthreats >_
- How To Stop Worrying and Start Loving Databases on Kubernetes >_
- How do you deploy a web application on AWS using Amazon EKS and expose it to the internet? >_
- How higher education is reimagining student experiences with Azure OpenAI Service >_
- How secure are containers & Kubernetes vs. microVMs for self-hosted CI? >_
- How to Automate Documentation Conversion with Pandoc in CI/CD Pipelines >_
- How to Build Secure Okta Node.js Integrations with DPoP >_
- How to Create Filling CSS Loaders Using One Element >_
- How to Install and Use jaq (jq clone) on Linux: Step-by-Step Guide >_
- How to Use RxStomp with React – Build Chat App with STOMP and React >_
- How to Use Skeleton Screens to Improve Perceived Website Performance >_
- How to Use diff3 Command for File Merging in Linux >_
- How to improve the developer experience in today’s ecommerce world >_
- Introduction to AI training with openSUSE >_
- Issue 67 of AWS Cloud Security Weekly >_
- LLM-assisted vector similarity search >_
- Log4Shell: The vulnerability that shook the world of software development >_
- Model-Based Testing with Testcontainers and Jqwik >_
- Next-generation learning experience using Amazon Bedrock and Anthropic’s Claude: Innovation from Classworks >_
- Open Source and Flawed Foundations >_
- SQLite is replacing its canonical build process >_
- Save on GPUs: Smarter autoscaling for your GKE inferencing workloads >_
- Spanner and PostgreSQL at Prefab: Flexible, reliable, and cost-effective at any size >_
- Training a million models per day to save customers of all sizes from DDoS attacks >_
- Understanding Kubernetes Metrics Server: Your Go-to Guide >_
- Unlocking generative AI for enterprises: How SnapLogic powers their low-code Agent Creator using Amazon Bedrock >_
- 10 Best Open Source Firewalls for Securing Linux Servers >_
- 5 new protections on Google Messages to help keep you safe >_
- Amazon RDS Custom for SQL Server now supports Windows Authentication for DB instances >_
- Announcing Anthropic’s upgraded Claude 3.5 Sonnet on Vertex AI >_
- Automate fine-tuning of Llama 3.x models with the new visual designer for Amazon SageMaker Pipelines >_
- Automated Data Cleaning: A Pipeline Approach >_
- Building the Future, Together - Keynote at Kubernetes Community Days UK, 2024 >_
- Charting a course for leading an effective organisation >_
- DigitalOcean Kubernetes (DOKS) Networking, Reimagined >_
- Docker at Cloud Expo Asia: GenAI, Security, and New Innovations >_
- From idea to impact: learn from last year’s Codegeist winners >_
- From multi-line queries to no-code investigations: meeting Grafana users where they are >_
- Generative AI foundation model training on Amazon SageMaker >_
- Highlights from the 10th DORA report >_
- How Scopely scaled “Stumble Guys” for millions of players around the globe with Amazon RDS for SQL Server >_
- How do you manage Kubernetes cluster upgrades on Amazon EKS? >_
- How to Build a Weather App in React >_
- How to Cut Down Amazon CloudWatch Costs >_
- How to run a Pyspark workload on Dataproc and Dataproc Serverless in GCP >_
- How to secure your new VPS: a step-by-step guide >_
- How to use interface VPC endpoints to meet your security objectives >_
- How to use the Amazon Detective API to investigate GuardDuty security findings and enrich data in Security Hub >_
- How we use OpenBMC and ACPI power states to monitor the state of our servers >_
- IPLS: Privacy-preserving storage for your WhatsApp contacts >_
- Implement Amazon SageMaker domain cross-Region disaster recovery using custom Amazon EFS instances >_
- Improve SEO with Prerender.io >_
- Introducing Access for Infrastructure: SSH >_
- Introducing Keras Hub: Your one-stop shop for pretrained models >_
- Learn Image Builder in Minutes >_
- Measuring developer experience with the HEART Framework: A guide for platform engineers >_
- On Simplicity >_
- Pulsar 1.122 Code Editor Enhances C & PHP Support, Launcher Fixes >_
- Quick vulnerability remediation with GitLab Advanced SAST + Duo AI >_
- Revelations after migrating to Cloud: Splunk’s story >_
- Rovo for GitHub Copilot leads Atlassian’s new developer focused innovations at GitHub Universe >_
- SOC Findings Report From RSA Conference 2024 >_
- Save the date for Firebase Demo Day 2024! >_
- Scalene: A high-performance, high-precision CPU, GPU, memory profiler for Python >_
- Speeding up with SIMD and Go assembly >_
- Sysdig 2024 global threat report >_
- Upgraded Claude 3.5 Sonnet from Anthropic (available now), computer use (public beta), and Claude 3.5 Haiku (coming soon) in Amazon Bedrock >_