Glen Knight

NYC Based IT Professional

Akamai Launches Gecko Edge Computing Services

Akamai’s Gecko initiative promises to make it simpler to centrally manage and deploy application workloads on edge computing platforms. Source: DevOps.com

0 Comments

Read More

The Practicalities of Open Sourcing

If you’re contemplating the daring act of open sourcing your projects, here are some things to know before you set out. Source: DevOps.com

0 Comments

Read More

Improve Efficiency With Smaller Code Reviews

Breaking down code reviews into more manageable portions can yield great benefits including efficiency, security and accuracy. Source: DevOps.com

0 Comments

Read More

Perceptions and Presentations

Source: DevOps.com

0 Comments

Read More

Knowledge Bases for Amazon Bedrock now supports Amazon Aurora PostgreSQL and Cohere embedding models

During AWS re:Invent 2023, we announced the general availability of Knowledge Bases for Amazon Bedrock. With a knowledge base, you can securely connect foundation models (FMs) in Amazon Bedrock to your company data for Retrieval Augmented Generation (RAG). In my previous post, I described how Knowledge Bases for Amazon Bedrock manages the end-to-end RAG workflow […]

0 Comments

Read More

AWS Weekly Roundup — Happy Lunar New Year, IaC generator, NFL’s digital athlete, AWS Cloud Clubs, and more — February 12, 2024

Happy Lunar New Year! Wishing you a year filled with joy, success, and endless opportunities! May the Year of the Dragon bring uninterrupted connections and limitless growth In case you missed it, here’s outstanding news you need to know as you plan your year in early 2024. AWS was named as a Leader in the […]

0 Comments

Read More

Survey: Cyberattacks Aimed at Software Supply Chains are Pervasive

A survey found the vast majority of respondents work for organizations that experienced a software supply chain incident in the past 12 months. Source: DevOps.com

0 Comments

Read More

The Code Caveat: When Developer Credentials Become the Hacker’s Pickaxe

Quiz #19 was: One morning, you receive an alert about unusual activity within your cloud environment. Upon investigation, you discover that a malicious actor has gained access to your company’s cloud resources and deployed a cryptocurrency mining script, siphoning off valuable computing power. After tracing the breach, you realize the attacker infiltrated the system using […]

0 Comments

Read More

Addressing the Developer Skills Gap

Cloud architecture investments are rising, but the developer and database market is experiencing a severe skills shortage. Source: DevOps.com

0 Comments

Read More

GitGuardian Allies With CyberArk to Better Protect App Secrets

GitGuardian has allied with CyberArk to streamline secrets detection and management by making it easier to share insights. Source: DevOps.com

0 Comments

Read More