Links
AddIntroduction: when the trust model can’t be trusted Secrets vaults are the backbone of digital infrastructure. They store the credentials, tokens, and certificates that govern access to systems, services, APIs, and data. They’re not just a part of the trust model, they are the trust model. In other words, if your vault is compromised, your […]
Hugging Face's LeRobot tutorial revolutionizes DIY robotics, empowering developers to build and train their own AI-powered robots, democratizing access to cutting-edge technology and fostering innovation in the field.
I use xrandr to configure a dual monitor setup with a high DPI and low DPI monitor on Linux. I also use it to switch back and forth between a dual monitor and a single monitor setup.
Microsoft stands out from the authenticator crowd by annihilating accounts when new accounts are introduced via QR code. Despite user complaints for years, no fix has been issued, leaving IT experts wondering, ‘Why would you pick Microsoft?’
Distributed systems runtime daemon written in Rust. - aurae-runtime/aurae
Discover more about what's new at AWS with Mountpoint for Amazon S3 now lets you automatically mount your S3 buckets using fstab
Kubernetes for Prod, Tilt for Dev
We all fart! Some more than others! Some louder than others? Some smellier than others! And some funnier than others!
Raven is an open-source CI/CD pipeline security scanner that makes hidden risks visible by connecting the dots across vulnerabilities.
Learn how to secure your GitHub Actions with these best practices! From controlling credentials to using specific action version tags, this cheat sheet will help you protect against supply-chain attacks. Don't let a malicious actor inject code into your repository - read now!
Generate audiobooks from EPUBs, PDFs and text with synchronized captions. - denizsafak/abogen
AWS Config enables continuous monitoring of your AWS resources, making it simple to assess, audit, and record resource configurations and changes. AWS Config does this through the use of rules that define the desired configuration state of your AWS resources. AWS Config provides a number of AWS managed rules that address a wide range of […]