Links
AddManage your dotfiles across multiple machines, securely.
AWS serverless experts Chris Munns & Ronald Widha walk you through developing a simple serverless application. You will learn how to use AWS Lambda, Amazon...
You Wouldn't Download a Hacker News
A new version of the GNU project's Bourne Again SHell (better known to most of us as Bash) has been released, nearly 3 years after the last. According the
An artistic parody of the ultimate classic
This Word Does Not Exist uses an artificial intelligence model named GPT-2 to invent new English words.
Self-hostable clone of lazydocker for the web. Manage your Docker fleet with ease - will-moss/isaiah
Today, we’re excited to announce the general availability of our new organization and enterprise-level security overview dashboards, alongside enhanced secret scanning metrics and the enablement trends reports. These features are…
Better security for Ubuntu users. A good step.
Kuldeep Chowhan, Principle Engineer at Expedia, shows us how Expedia built a scalable CI/CD platform on AWS using Github, Jenkins, Amazon EC2 Container servi...
A tool for exploring each layer in a docker image. Contribute to wagoodman/dive development by creating an account on GitHub.
As a security best practice, AWS Identity and Access Management (IAM) recommends that you use temporary security credentials from AWS Security Token Service (STS) when you access your AWS resources. Temporary credentials are short-term credentials generated dynamically and provided to the user upon request. Today, one of the most widely used mechanisms for requesting temporary […]
ASSIGNED (dcbugzillaresponse) in CA Program - CA Certificate Root Program. Last updated 2025-05-27.