Links
AddESO, European Organisation for Astronomical Research in the Southern Hemisphere
Classic Sonic, Shining Force, Crazy Taxi, and other SEGA titles are now free on Android, but they'll be disappearing soon.
Hurl, run and test HTTP requests with plain text and curl. Hurl can run fast automated integration tests.
To learn more, please visit: In this session, we explore how developers can design, develop, deliver, and monitor cloud applications as they take advantage o...
Kill Bill 1 & 2 are returning to theaters in one super-sized cut called “the Whole Bloody Affair”, so to celebrate we’re finally giving Quentin Tarantino’s s...
LACK Side table, white stained oak effect. Easy to assemble. Low weight; easy to move.
Today, we’re introducing Gemini CLI GitHub Actions. It’s a no-cost, powerful AI coding teammate for your repository. It acts both as an autonomous agent for critical routine coding tasks, and an on-demand collaborator you can quickly delegate work to.
like jq but for Markdown: find specific elements in a md doc - yshavit/mdq
A Python tool to visualize + enforce dependencies, using modular architecture 🌎 Open source 🐍 Installable via pip 🔧 Able to be adopted incrementally - ⚡ Implemented with no runtime impact ♾️ Interoperable with your existing systems 🦀 Written in rust - gauge-sh/tach
The powerhouse platform
If you use Obsidian, see why you should be using the Full Calendar plugin.
Betty Webb MBE worked at Bletchley Park during World War Two intercepting enemy messages.
Microsoft said today that the Aisuru botnet hit its Azure network with a 15.72 terabits per second (Tbps) DDoS attack, launched from over 500,000 IP addresses.
Create systems that allow you to be consistently productive
The Internet Archive has suffered a data breach affecting 31 million accounts and is now offline after its site was defaced and DDoS’d.
Today we’d like to walk you through AWS Identity and Access Management (IAM), federated sign-in through Active Directory (AD) and Active Directory Federation Services (ADFS). With IAM, you can centrally manage users, security credentials such as access keys, and permissions that control which resources users can access. Customers have the option of creating users and […]
AWS introduces a new service to streamline security event response, providing automated triage, coordinated communication, and expert guidance to recover from cybersecurity threats.