Links
AddToday marks two years since I first set up an e-ink display in my mom’s apartment to help her live on her own with amnesia.
Despite Kubernetes' own declarative API, and the obvious benefits of maintaining a cluster's infrastructure and services from the same infrastructure as code repository, Terraform is far from the first choice to provision Kubernetes resources. Kubestack, the open-source Terraform framework I maintain, aims to provide the best developer experience for teams working with Terraform and Kubernetes.
Level up your Obsidian game with Dataview
jless | plaintextsports.com
MicroK8s is the simplest production-grade upstream K8s. Lightweight and focused. Single command install on Linux, Windows and macOS. Made for devops, great for edge, appliances and IoT. Full high availability Kubernetes with autonomous clusters.
The Empathy Quotient (EQ) test is a 60-item questionnaire intended to measure levels of empathy in adults.
Select, put and delete data from JSON, TOML, YAML, XML and CSV files with a single tool. Supports conversion between formats and can be used as a Go package. - TomWright/dasel
To learn more, please visit: In this session, we explore how developers can design, develop, deliver, and monitor cloud applications as they take advantage o...
In mid-May 2025, blocked the largest DDoS attack ever recorded: a staggering 7.3 terabits per second (Tbps).
This articles provides an overview of tools and approaches that can be used to create a MSI package. Advantages and benefits of every method are explained.
August 31, 2021: AWS KMS is replacing the term customer master key (CMK) with AWS KMS key and KMS key. The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term. More info You can now encrypt and decrypt your data at the command line and in scripts—no […]
Design, test, and distribute Agent Skills with reusable templates, collaborative reviews, and multi-surface deployment.
Purple Knight, built by Semperis, is the top Active Directory security assessment tool today. Identify threats and get prioritized guidance.
This post isn’t a detailed line-by-line tutorial on how to set up each individual piece of the setup as those types of guides tend to get out of date really easily, but if you know your way around Linux and the command line, then you can definitely replicate this setup on your own. Over the past few years I’ve been interested in learning about how much energy my computing setup and home appliances use. I’ve used a simple digital energy meter before to get instantaneous readings, but that was not ideal for monitoring how an electrical appliance consumes power over a longer time period.
The federally funded organization behind the Common Vulnerabilities and Exposures (CVE) program confirmed that its contract to support the system will expire on April 16th.