Links
AddThe CA/Browser Forum has voted to significantly reduce the lifespan of SSL/TLS certificates over the next 4 years, with a final lifespan of just 47 days starting in 2029.
The examples use off-the-shelf commercial technologies, giving organizations valuable starting points
Eastman Kodak, the 133-year-old photography company, is warning investors thats it might not survive much longer.
September 9, 2021: Amazon Elasticsearch Service has been renamed to Amazon OpenSearch Service. See details. Introduced at AWS re:Invent 2017, Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads. In an AWS Blog post, Jeff Barr shows you how to […]
Over the past couple of weeks, Cloudflare's DDoS protection systems have automatically and successfully mitigated multiple hyper-volumetric L3/4 DDoS attacks exceeding 3 billion packets per second (Bpps). Our systems also automatically mitigated multiple attacks exceeding 3 terabits per second (Tbps), with the largest ones exceeding 3.65 Tbps. The scale of these attacks is unprecedented.
A web extension that redirects YouTube, Twitter, Instagram, etc. requests to alternative privacy-friendly frontends
Native performance. Remote storage for Virtual Machines. Many integrations including GitHub, GitLab and more.
The what, when, why and how of the incoming speed tier
TypeSchema is a JSON specification to describe data models in a programming language neutral format.
Use roles to grant an IAM user access through identity federation (authorization by an external service).
Power your real-time app with PubNub—the world's largest pub/sub network. Scale to 3 trillion API calls/month, with <30ms global delivery. Start building now!
Winamp released its source code with a license that drew a lot of attention. That’s when other apps’ code was found inside.
A full look at agent mode in GitHub Copilot, including what it can do, when to use it, and best practices.
Today, AWS released a new IAM feature that makes it easier for you to delegate permissions management to trusted employees. As your organization grows, you might want to allow trusted employees to configure and manage IAM permissions to help your organization scale permission management and move workloads to AWS faster. For example, you might want […]
Spend less time worrying about bugs. Leave that to us. Our platform continuously searches your software for problems, enabling efficient debugging of the most complex issues.
Explore Boundary product documentation, tutorials, and examples.
My writings about Ghostty, the terminal emulator I work on.
Introducing fnox: A secret manager that pairs well with mise