Links
AddKairos is an open-source Linux-based operating system designed for securely running Kubernetes at the edge. It provides immutable, declarative infrastructure with features like P2P clustering, trusted boot, and A/B upgrades.
ASIO boss Mike Burgess says he may soon use powers to compel tech companies to cooperate with warrants and unlock encrypted chats to aid national security investigations.
Purple Knight, built by Semperis, is the top Active Directory security assessment tool today. Identify threats and get prioritized guidance.
Raven is an open-source CI/CD pipeline security scanner that makes hidden risks visible by connecting the dots across vulnerabilities.
New Linux tracer analyzes production performance problems and troubleshoots software.
Update: The date for closing down the Ubuntu 20 image has changed to April 15. The following post has been updated to reflect this change. Ubuntu-latest upcoming breaking changes We…
July 24, 2020: The number 9 item in this list, the Auditing Security Checklist, has been replaced by a Cloud Audit Academy course. The following list includes the ten most downloaded AWS security and compliance documents in 2017. Using this list, you can learn about what other AWS customers found most interesting about security and […]
Open, Multi-Cloud, Multi-Cluster Kubernetes Orchestration - karmada-io/karmada
Visualise your CSV files in seconds without sending your data anywhere
Cybercriminals connected to a recent string of ransomware attacks on major British retailers said on Friday they had stolen almost 1 billion records from cloud technology giant Salesforce, opens new tab by focusing on companies that use its software
AI Agents & MCPs & AI Workflow Automation • (~400 MCP servers for AI agents) • AI Automation / AI Agent with MCPs • AI Workflows & AI Agents • MCPs for AI Agents - activepieces/activepieces
I recently learned an interesting fact about Fibonacci numbers while watching a random number theory video on YouTube. Fibonacci numbers can be used to approximately convert from miles to kilometers and back. Here is how. Take two consecutive Fibonacci numbers, for example 5 and 8. And you're done converting. No...
Researchers at the University of New South Wales have made a world-first research breakthrough demonstrating quantum entanglement between two atoms, a crucial underpinning for scaling quantum computers. Entanglement between at least two qubits is the phenomena that enables information to be encoded on a quantum computer and the information to be processed. This was demonstrated by the UNSW-led team between two electrons on separate phosphorus atoms.The phosphorus atoms were implanted on a silicon chip similar to those in the computers and electronics of today, potentially enabling future manufacturing scale up using existing chip fabrication techniques.
Safely shareable TLS root CA for .internal networks using Name Constraints - nh2/internal-contstrained-pki
like jq but for Markdown: find specific elements in a md doc - yshavit/mdq
bgp.tools allows you to do bgp debugging and gives insight into internet routing with ease in a user friendly way