Links
AddIg Nobel-winning research could one day be used to treat people with blocked airways or clogged lungs.
Voting system required three keys. One of them has been “irretrievably lost.”…
It’s still legal to pick locks, even when you swing your legs.
Instead of doom-scrolling through my phone in the morning, I built an alternative with a Raspberry Pi, a dot matrix printer, and some PHP.
Manage multiple runtime versions with a single CLI tool
AsteroidOS is an open-source operating system for smartwatches.
Astral has entered into an agreement to join OpenAI as part of the Codex team.
ty is an extremely fast Python type checker and language server, written in Rust, and designed as an alternative to mypy, Pyright, and Pylance.
An interactive exploration of the planets, moons, asteroids, and other objects in the Solar System.
Thinking about how we can make computing better.
Discover more about what's new at AWS with Mountpoint for Amazon S3 now lets you automatically mount your S3 buckets using fstab
As I have discussed in the past, sophisticated AWS customers invariably control multiple AWS accounts. Some of these are the results of acquisitions or a holdover from bottom-up, departmental adoption of cloud computing. Others create multiple accounts in order to isolate developers, projects, or departments from each other. We strongly endorse this as a best […]
AWS introduces a new service to streamline security event response, providing automated triage, coordinated communication, and expert guidance to recover from cybersecurity threats.
Almost a decade ago, my colleague Deepak Singh introduced the AWS Public Datasets in his post Paging Researchers, Analysts, and Developers. I’m happy to report that Deepak is still an important part of the AWS team and that the Public Datasets program is still going strong! Today we are announcing a new take on open […]
Running a complex network is not an easy job. In addition to simply keeping it up and running, you need to keep an ever-watchful eye out for unusual traffic patterns or content that could signify a network intrusion, a compromised instance, or some other anomaly. VPC Traffic Mirroring Today we are launching VPC Traffic Mirroring. […]