Links
AddFollow these best practices for using AWS Identity and Access Management (IAM) to help secure your AWS account and resources.
Let’s Encrypt is introducing several updates to the certificates we issue, including new root certificates, the deprecation of TLS client authentication, and shortening certificate lifetimes. To help roll out changes gra…
Today, we’re introducing Gemini CLI GitHub Actions. It’s a no-cost, powerful AI coding teammate for your repository. It acts both as an autonomous agent for critical routine coding tasks, and an on-demand collaborator you can quickly delegate work to.
The world of custom mechanical keyboards is vibrant, with new designs emerging weekly. However, keyboards are just one way we interact with computers. Ploopy, an open-source hardware company, focus…
A tale of taming unruly documents to create the ultimate GPT-based chatbot
We are adding more value to infrastructure as code with an addition to the Ansible Certified Content Collection: The Ansible provider for Terraform.
**Learn about building a solution using machine learning with Amazon SageMaker to detect fraud **Learn how Amazon SageMaker along with other relevant AWS ser...
A Python Library for Generating PDFs and Images from HTML, powered by PlutoBook - plutoprint/plutoprint
Tracking configuration changes to your cloud resources can be challenging, especially when resources are dynamic in the cloud and change quickly and frequent...
After a decade in observability, I kept bumping into one question no vendor would answer: how much of your data is waste?
Long-anticipated PixiEditor 2.0 is finally live. Read about the features, roadmap and our mission.
An artistic parody of the ultimate classic
These nine open source MCP projects provide new frameworks, tools, and assistants to unlock AI-native workflows, agentic tooling, and innovation.
Here's a program roughly 0% of programmers know how to write: generate a list of random tweets, without duplication. You may think you know how to do this, but you almost assuredly don't. Say you work at Twitter and have to select just one tweet at random. This is an easy problem. Generate a random…
The cryptography-based networking stack for building unstoppable networks with LoRa, Packet Radio, WiFi and everything in between. - markqvist/Reticulum
It could have been a contemporary of Risk, Diplomacy, and other legendary wargames