2025-11-21

  • A Pre-Built CNCF Pipeline: From Git to Running on Kubernetes >_
  • AWS Multi-Account Guardrails: A Complete Blueprint for Secure, Automated Cloud Governance >_
  • Accelerate container troubleshooting with the fully managed Amazon ECS MCP server (preview) >_
  • Accelerate investigations with AWS Security Incident Response AI-powered capabilities >_
  • Beyond the Hype: How to Use AI to Actually Increase Your Productivity as a Dev >_
  • Breaking siloes: How to use cross-store correlations with Grafana >_
  • Build production-ready applications without infrastructure complexity using Amazon ECS Express Mode >_
  • Building a Cloud-to-Edge Architecture Across 40K Global Locations >_
  • CKS Notes — Kube-bench >_
  • Coordinate large-scale engineering initiatives with IDP Campaigns >_
  • Databricks and AWS Partner to Simplify Infrastructure Setup >_
  • Deploy geospatial agents with Foursquare Spatial H3 Hub and Amazon SageMaker AI >_
  • Distributed Edge Inference Changes Everything >_
  • GitHub and Microsoft Use AI To Fix Security Debt Crisis >_
  • Guide to Amazon EKS and Kubernetes sessions at AWS re:Invent 2025 >_
  • Hacktoberfest 2025 Comes to a Close >_
  • How Docker Hardened Images Patches Vulnerabilities in 24 hours >_
  • How Google Does It: Building the largest known Kubernetes cluster, with 130,000 nodes >_
  • How Wipro PARI accelerates PLC code generation using Amazon Bedrock >_
  • How to Deploy a Stand-By/Ad-Hoc Cluster Based on Percona Operator for PostgreSQL >_
  • How to make space for AI experimentation on your team >_
  • Improving GCC Buffer Overflow Detection for C Flexible Array Members >_
  • IntelliJ IDEA 2025.2.5 Is Out! >_
  • Introducing VPC encryption controls: Enforce encryption in transit within and across VPCs in a Region >_
  • Introducing attribute-based access control for Amazon S3 general purpose buckets >_
  • Introducing the fully managed Amazon EKS MCP Server (preview) >_
  • Introduction to distributed inference with llm-d >_
  • Kubernetes Architecture — A Simple Explanation Backed by my Real Story >_
  • Kyber vs. RSA-2048 >_
  • Mastering AKS: Performance, Security and Cost Optimization in the Cloud  >_
  • MySQL 8.4 Memory Limits: tmp_table_size vs. temptable_max_ram >_
  • Navigating AWS EKS with Terraform: Configuring Karpenter for Just-in-Time Node Provisioning >_
  • OpenAI Partners With Foxconn to Develop AI Data Center Kit >_
  • Optimize database performance using resource governor on Amazon RDS for SQL Server >_
  • PHP 8.5 Released with Pipe Operator, URI Extension, and Clone With Functionality >_
  • Practical steps to minimize key exposure using AWS Security Services >_
  • Run Docker containers natively in Proxmox 9.1 (OCI images) >_
  • Secure your APIs at the edge with Datadog App and API Protection >_
  • Smart Performance Hacks for Faster Python Code >_
  • Solving the Kubernetes Namespace Silo: How to Automatically Sync Secrets (and SSL Certs) Across… >_
  • Streamline AI operations with the Multi-Provider Generative AI Gateway reference architecture >_
  • Streamline container image signatures with Amazon ECR managed signing >_
  • The Agentic AI Security Scoping Matrix: A framework for securing autonomous AI systems >_
  • The Complete DevOps Roadmap (2025): From Beginner to Expert — Skills, Tools, and Certifications >_
  • The Rising Importance of Governance at SwampUP Berlin 2025 >_
  • This Week in Rails: November 21, 2025 >_
  • What to Expect When You Migrate to Atatus APM >_
  • Why Cybersecurity Mesh Failed and What SSE Offers Data Centers Instead >_
  • Wireshark 4.6.1 Released with Updated Protocol Support and Various Bug Fixes >_
  • Zoomer: Powering AI Performance at Meta’s Scale Through Intelligent Debugging and Optimization >_
  • Zorin OS 18 Hits 1 Million Downloads in Just One Month >_