Links
AddWith soldered RAM and eMMC storage, this is not “a consumer-ready experience.”…
Support my projects on Patreon (please only if you have the means): https://patreon.com/posyA video about all forms of equalizers. From one-click bass button...
Complete Claude Code configuration collection - agents, skills, hooks, commands, rules, MCPs. Battle-tested configs from an Anthropic hackathon winner. - affaan-m/everything-claude-code
September 12, 2022: This blog post has been updated to reflect the new name of AWS Single Sign-On (SSO) – AWS IAM Identity Center. Read more about the name change here. December 2, 2019: Since the author wrote this post, AWS Single Sign On (AWS IAM Identity Center) has launched native features that simplify using […]
September 9, 2021: Amazon Elasticsearch Service has been renamed to Amazon OpenSearch Service. See details. Introduced at AWS re:Invent 2017, Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads. In an AWS Blog post, Jeff Barr shows you how to […]
Tunneled Reverse Proxy Server with Identity and Access Control and Dashboard UI - fosrl/pangolin
As a security best practice, AWS Identity and Access Management (IAM) recommends that you use temporary security credentials from AWS Security Token Service (STS) when you access your AWS resources. Temporary credentials are short-term credentials generated dynamically and provided to the user upon request. Today, one of the most widely used mechanisms for requesting temporary […]
a prettier way to inspect network connections. Contribute to karol-broda/snitch development by creating an account on GitHub.
August 31, 2021:AWS KMS is replacing the term customer master key (CMK) with AWS KMS key and KMS key. The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term. More info. Typically, when you protect data in Amazon Simple Storage Service (Amazon S3), you use a combination […]
Formae, from Platform Engineering Labs, addresses the brittleness of Day 2 operations by using Apple's robust Pkl configuration language.
This picture represents the largest fully open “list of books” ever assembled in the history of humanity.
Tired of constantly switching between AWS Console tabs? Cloudash provides a laser-focused view of your AWS API Gateway, Lambda and other resources - all in a single app.
Discover how Anthropic approaches the development of reliable AI agents. Learn about our research on agent capabilities, safety considerations, and technical framework for building trustworthy AI.
Here's a program roughly 0% of programmers know how to write: generate a list of random tweets, without duplication. You may think you know how to do this, but you almost assuredly don't. Say you work at Twitter and have to select just one tweet at random. This is an easy problem. Generate a random…
Explore some of the stunning images shortlisted in the world’s biggest astrophotography competition
Dive into cutting-edge tech, reviews and the latest trends with the expert team at Gizmodo. Your ultimate source for all things tech.
The official status page for services offered by Docker.
Kubernetes Egress Control with Squid proxy (interlaye.red)