Links
AddSeptember 12, 2022: This blog post has been updated to reflect the new name of AWS Single Sign-On (SSO) – AWS IAM Identity Center. Read more about the name change here. Today, AWS introduced AWS IAM Identity Center (AWS IAM Identity Center), a service that makes it easy for you to centrally manage IAM Identity […]
In this article, I will present some cool tools that can be used to test and ensure the quality of your Docker image. Tagged with testing, docker.
Stay organized and focused by using Kanban boards in Obsidian
At <a href="https://www.datawire.io" target="_blank">Datawire</a>, all of our cloud services are developed and deployed on Kubernetes. When we started developing services, we noticed that getting code changes into Kubernetes was a fairly tedious process. Typically, we had to:
People often over-engineer solutions, and it leads to them running into problems with their CSS. In this article, we'll take a look at the least amount of CSS that you need to make a decent looking page.
The NNSA has unveiled El Capitan, the world's most powerful supercomputer, at the SC Conference. Housed at Lawrence Livermore National Laboratory, El Capitan can perform over 2700 quadrillion operations per second. It will be used to model nuclear weapon performance, aging effects, and safety, as well as inertial confinement fusion and AI training.
This picture represents the largest fully open “list of books” ever assembled in the history of humanity.
Revolt is the chat app that's truly built with you in mind.
A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business functions. Includes automated scoring, contextual recommendations, and evidence-based evaluation. - devsecflow/Cloud-Native-Assurance-Maturity-Model
VMware has announced that its VMware Fusion and VMware Workstation desktop hypervisors are now free to everyone for commercial, educational, and personal use.
Running a complex network is not an easy job. In addition to simply keeping it up and running, you need to keep an ever-watchful eye out for unusual traffic patterns or content that could signify a network intrusion, a compromised instance, or some other anomaly. VPC Traffic Mirroring Today we are launching VPC Traffic Mirroring. […]
Amazon Web Services (AWS) is excited to announce that a new Information Security Registered Assessors Program (IRAP) report (2023 H1) is now available through AWS Artifact. An independent Australian Signals Directorate (ASD) certified IRAP assessor completed the IRAP assessment of AWS in August 2023. The new IRAP report includes an additional six AWS services, as well as the new AWS […]
Dive into Rubin's Cosmic Treasure Chest — there's so much to explore
August 31, 2021:AWS KMS is replacing the term customer master key (CMK) with AWS KMS key and KMS key. The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term. More info. Typically, when you protect data in Amazon Simple Storage Service (Amazon S3), you use a combination […]
Computing, coffee, and me in 2008 Fair warning reader: this post has nothing to do with Ubuntu, or even Linux for that matter. Instead, the following 600
Let’s take a brief trip back to our school years and recall some lessons in mathematics and physics. Do you remember what the number π equals? And what is π squared? That’s a strange question too. Of course, it’s 9.87. And do you remember the value of the acceleration due to gravity, g? Of course, that number was drilled into our memory so thoroughly that it’s impossible to forget: 9.81 m/s². Naturally, it can vary, but for solving basic school problems, we typically used this value.
Feb 17, 2025: This blog post references AWS CloudHSM Client SDK 3, which is no longer the recommended version. AWS recommends that you use the latest version, AWS CloudHSM Client SDK 5, which provides updated functionality and commands. We are currently working on an updated blog post for CloudHSM Client SDK 5. See the AWS […]
Sick of scrolling through junk results, AI-generated ads and links to lookalike products? The author and activist behind the term ‘enshittification’ explains what’s gone wrong with the internet – and what we can do about it
In this post, I’ll show you how to build a continuous integration and continuous delivery (CI/CD) pipeline using AWS Developer Tools, as well as Aqua Security‘s open source container vulnerability scanner, Trivy. You’ll build two Docker images, one with vulnerabilities and one without, to learn the capabilities of Trivy and how to send all vulnerability […]
Videogaming-related online strip by Mike Krahulik and Jerry Holkins. Includes news and commentary.