Join us

heart Curated links by FAUN
Link
@faun shared a link, 1 week, 6 days ago

Engineering Principles for Building a Successful Cloud-Prem Solution

Cloud-Premmarries cloud's nimble speed with on-prem's tight grip. It fuses avendor-managed control planewith acustomer-owned data plane—a dream match for regulated sectors.Redpanda's BYOCslashed costs tenfold by axing egress fees. Meanwhile,Couchbase's Capellaserves up hybrid deployment like a maste..

Engineering Principles for Building a Successful Cloud-Prem Solution
Link
@faun shared a link, 1 week, 6 days ago

Go is 80/20 language

Gokeeps it simple, delivering 80% of the goods with just 20% of the mess. But some critics sniff around, demanding more for their extra 36% effort.Swiftproves the point that more isn’t always better with its extra baggage...

Link
@faun shared a link, 1 week, 6 days ago

Agentic DevOps: Evolving software development with GitHub Copilot and Microsoft Azure

GitHub Copilot'slatest release? A digital Swiss Army knife. It slices through complex code, automates your drudge work, and resurrects forgotten legacy systems, so you can dive into creative coding. Now it moonlights as your SRE onAzureand invites AI model tinkering straight into your workflow...

Agentic DevOps: Evolving software development with GitHub Copilot and Microsoft Azure
Link
@faun shared a link, 1 week, 6 days ago

Kafka in 2025: A Clean Docker Compose Setup Without ZooKeeper

KafkakickedZookeeperto the curb as of version 4.0. And by 2023, Docker images were no longer invited to the party. Want to set it up locally?Bitnami'sversion steps in, offering custom settings to play with...

Link
@faun shared a link, 1 week, 6 days ago

5 Cloud Storage Best Practices for AI Workloads

AI teamssegment data lifecyclesto reduce costs by moving inactive datasets to cheaper storage tiers. Theycheckpoint training progressregularly andback up checkpointsto cloud storage to prevent loss from failures. Models getprotected via object locks, automated backups, andgeo-redundant storagefor di..

5 Cloud Storage Best Practices for AI Workloads
Link
@faun shared a link, 1 week, 6 days ago

Bots are overwhelming websites with their hunger for AI data

Rampaging AI bots are wreaking havoc on39 out of 43cultural institutions, bulldozing their way through digital collections and often causing epic crashes.Robots.txtis waving the white flag. AWS and Cloudflare put up a decent fight, but the bot swarms still drain money like a leaky faucet...

Bots are overwhelming websites with their hunger for AI data
Link
@faun shared a link, 1 week, 6 days ago

Oracle Linux 10 Officially Released: Next-Gen Security, Developer Tooling and a Strategic Edge Over Red Hat Enterprise Linux 10

Oracle Linux 10struts in withquantum-resistant cryptographyandzero-downtime patching. It swoops pastRHEL 10in a security showdown, showing off sleek flexibility...

Oracle Linux 10 Officially Released: Next-Gen Security, Developer Tooling and a Strategic Edge Over Red Hat Enterprise Linux 10
Link
@faun shared a link, 1 week, 6 days ago

GitHub Advisory Database by the numbers: Known security vulnerabilities and what you can do about them

GitHub Advisory Database curates22 000+reviewed and30 000+imported advisories from the NVD, repo advisories, and community sources. It fuels Dependabot, CVSS & EPSS ratings, and CNA services to ruthlessly prioritize and patch vulnerabilities at scale..

Link
@faun shared a link, 1 week, 6 days ago

Introducing Northguard and Xinfra: scalable log storage at LinkedIn

LinkedIn's shake-up:NorthguardkicksKafkato the curb to handle its1.2 billion users. The prize? Sharper operability, striped logs, and nimble metadata management.Xinfrasteps up to virtualize Pub/Sub, easing the Kafka-to-Northguard leap. Kafka's client-centric stubbornness? Not a problem...

Link
@faun shared a link, 1 week, 6 days ago

The Journey of Bypassing Ubuntu’s Unprivileged Namespace Restriction

Ubuntu's sandbox for unprivileged namespaces flops like a soggy cardboard box; one keen Twitter user blew wide open a glaring weakness.Billed as invincible, these post-exploitation defenses crumbled when a process shimmies into an unconfined AppArmor profile. Suddenly, infamous attack paths throw up..

The Journey of Bypassing Ubuntu’s Unprivileged Namespace Restriction
loading...