Links
AddThe classic UNIX magic poster by Overacre was distributed at past USENIX conferences and featured a white bearded wizard with UNIX related things around him,...
Fake image-generating app allowed man to download 1.1TB of Disney-owned data.
The Settings app has taken over, but Control Panels aren’t going anywhere yet.
Winamp released its source code with a license that drew a lot of attention. That’s when other apps’ code was found inside.
With soldered RAM and eMMC storage, this is not “a consumer-ready experience.”…
In our new 3-part series, we remember the people and ideas that made the Internet.
The Web Era arrives, the browser wars flare, and a bubble bursts.
Instead of doom-scrolling through my phone in the morning, I built an alternative with a Raspberry Pi, a dot matrix printer, and some PHP.
Manage multiple runtime versions with a single CLI tool
An interactive exploration of the planets, moons, asteroids, and other objects in the Solar System.
Thinking about how we can make computing better.
Discover more about what's new at AWS with Mountpoint for Amazon S3 now lets you automatically mount your S3 buckets using fstab
As I have discussed in the past, sophisticated AWS customers invariably control multiple AWS accounts. Some of these are the results of acquisitions or a holdover from bottom-up, departmental adoption of cloud computing. Others create multiple accounts in order to isolate developers, projects, or departments from each other. We strongly endorse this as a best […]
AWS introduces a new service to streamline security event response, providing automated triage, coordinated communication, and expert guidance to recover from cybersecurity threats.
Almost a decade ago, my colleague Deepak Singh introduced the AWS Public Datasets in his post Paging Researchers, Analysts, and Developers. I’m happy to report that Deepak is still an important part of the AWS team and that the Public Datasets program is still going strong! Today we are announcing a new take on open […]
Running a complex network is not an easy job. In addition to simply keeping it up and running, you need to keep an ever-watchful eye out for unusual traffic patterns or content that could signify a network intrusion, a compromised instance, or some other anomaly. VPC Traffic Mirroring Today we are launching VPC Traffic Mirroring. […]