2025-11-21
- A Pre-Built CNCF Pipeline: From Git to Running on Kubernetes >_
- AWS Multi-Account Guardrails: A Complete Blueprint for Secure, Automated Cloud Governance >_
- Accelerate container troubleshooting with the fully managed Amazon ECS MCP server (preview) >_
- Accelerate investigations with AWS Security Incident Response AI-powered capabilities >_
- Beyond the Hype: How to Use AI to Actually Increase Your Productivity as a Dev >_
- Breaking siloes: How to use cross-store correlations with Grafana >_
- Build production-ready applications without infrastructure complexity using Amazon ECS Express Mode >_
- Building a Cloud-to-Edge Architecture Across 40K Global Locations >_
- CKS Notes — Kube-bench >_
- Coordinate large-scale engineering initiatives with IDP Campaigns >_
- Databricks and AWS Partner to Simplify Infrastructure Setup >_
- Deploy geospatial agents with Foursquare Spatial H3 Hub and Amazon SageMaker AI >_
- Distributed Edge Inference Changes Everything >_
- GitHub and Microsoft Use AI To Fix Security Debt Crisis >_
- Guide to Amazon EKS and Kubernetes sessions at AWS re:Invent 2025 >_
- Hacktoberfest 2025 Comes to a Close >_
- How Docker Hardened Images Patches Vulnerabilities in 24 hours >_
- How Google Does It: Building the largest known Kubernetes cluster, with 130,000 nodes >_
- How Wipro PARI accelerates PLC code generation using Amazon Bedrock >_
- How to Deploy a Stand-By/Ad-Hoc Cluster Based on Percona Operator for PostgreSQL >_
- How to make space for AI experimentation on your team >_
- Improving GCC Buffer Overflow Detection for C Flexible Array Members >_
- IntelliJ IDEA 2025.2.5 Is Out! >_
- Introducing VPC encryption controls: Enforce encryption in transit within and across VPCs in a Region >_
- Introducing attribute-based access control for Amazon S3 general purpose buckets >_
- Introducing the fully managed Amazon EKS MCP Server (preview) >_
- Introduction to distributed inference with llm-d >_
- Kubernetes Architecture — A Simple Explanation Backed by my Real Story >_
- Kyber vs. RSA-2048 >_
- Mastering AKS: Performance, Security and Cost Optimization in the Cloud >_
- MySQL 8.4 Memory Limits: tmp_table_size vs. temptable_max_ram >_
- Navigating AWS EKS with Terraform: Configuring Karpenter for Just-in-Time Node Provisioning >_
- OpenAI Partners With Foxconn to Develop AI Data Center Kit >_
- Optimize database performance using resource governor on Amazon RDS for SQL Server >_
- PHP 8.5 Released with Pipe Operator, URI Extension, and Clone With Functionality >_
- Practical steps to minimize key exposure using AWS Security Services >_
- Run Docker containers natively in Proxmox 9.1 (OCI images) >_
- Secure your APIs at the edge with Datadog App and API Protection >_
- Smart Performance Hacks for Faster Python Code >_
- Solving the Kubernetes Namespace Silo: How to Automatically Sync Secrets (and SSL Certs) Across… >_
- Streamline AI operations with the Multi-Provider Generative AI Gateway reference architecture >_
- Streamline container image signatures with Amazon ECR managed signing >_
- The Agentic AI Security Scoping Matrix: A framework for securing autonomous AI systems >_
- The Complete DevOps Roadmap (2025): From Beginner to Expert — Skills, Tools, and Certifications >_
- The Rising Importance of Governance at SwampUP Berlin 2025 >_
- This Week in Rails: November 21, 2025 >_
- What to Expect When You Migrate to Atatus APM >_
- Why Cybersecurity Mesh Failed and What SSE Offers Data Centers Instead >_
- Wireshark 4.6.1 Released with Updated Protocol Support and Various Bug Fixes >_
- Zoomer: Powering AI Performance at Meta’s Scale Through Intelligent Debugging and Optimization >_
- Zorin OS 18 Hits 1 Million Downloads in Just One Month >_