Join us

ContentUpdates and recent posts about Magika..
Link
@faun shared a link, 9 months ago
FAUN.dev()

SUSE Adds Arm Support to HCI Platform for Running Monolithic Apps on Kubernetes

SUSE Virtualization 1.5 lands with64-bit Arm and Intelsupport,CSIstorage compatibility, and a tighter4-month release loopsynced with Kubernetes. Built on Harvester and KubeVirt, the update pushes harder on a clear trend: legacy VMs and cloud-native apps sharing the same Kubernetes real estate. Sys.. read more  

SUSE Adds Arm Support to HCI Platform for Running Monolithic Apps on Kubernetes
Link
@faun shared a link, 9 months ago
FAUN.dev()

Scale AI/ML Workloads with Amazon EKS: Up to 100K Nodes

Amazon EKS just leveled up—clusters can now run withup to 100,000 nodeswith support ofKubernetes 1.30and up. That's not just big—it’s AI-and-ML-scale big. Cluster setup got a lot less manual, too. The AWS Console’s"auto mode"auto-builds your VPC and IAM configs.eksctlplugs right into the flow... read more  

Scale AI/ML Workloads with Amazon EKS: Up to 100K Nodes
Link
@faun shared a link, 9 months ago
FAUN.dev()

Building a RAG chat-based assistant on Amazon EKS Auto Mode and NVIDIA NIMs

AWS and NVIDIA just dropped a full-stack recipe for running Retrieval-Augmented Generation (RAG) onAmazon EKS Auto Mode—built on top ofNVIDIA NIM microservices. It's LLMs on Kubernetes, but without the hair-pulling. Inference? GPU-accelerated. Embeddings? Covered. Vector search? Handled byAmazon Op.. read more  

Building a RAG chat-based assistant on Amazon EKS Auto Mode and NVIDIA NIMs
Link
@faun shared a link, 9 months ago
FAUN.dev()

AI is changing Kubernetes faster than most teams can keep up

AI workloads are taking over Kubernetes. Fastest-growing use case on the block. 90% of orgs expect that growth to keep climbing. 92% are betting on AI-driven ops tools to keep up. Edge Kubernetes? Up from 38% to 50% in a year. Real-time inference is pushing workloads closer to the source.System shif.. read more  

AI is changing Kubernetes faster than most teams can keep up
Link
@faun shared a link, 9 months ago
FAUN.dev()

Kubernetes: Web UI Headlamp gets an AI assistant

Headlamp 0.34 drops an alphaAI Assistantplugin—natural language for your cluster, powered by OpenAI, Anthropic, or Mistral. Ask it to explain logs, troubleshoot issues, manage resources. It speaks Kubernetes, with tooling and model config baked in.System shift:Cluster UIs are getting chatty. Less cl.. read more  

Kubernetes: Web UI Headlamp gets an AI assistant
Link
@mmk4mmk_simplifies shared a link, 9 months, 1 week ago

Workload Identity Federation: The School Trip Analogy You’ll Remember

Secrets in repos, API keys in scripts, and forgotten credentials create massive security gaps. Workload Identity Federation (WIF) solves this with short-lived tokens and trust-based authentication across clouds.

To explain it clearly, I’ve put together a 2-minute video that uses a school trip analogy (students, teachers, and wristbands) to break it down step by step.

Video: https://youtu.be/UZa5LWndb8k

Reade more at : https://medium.com/@mmk4mmk.mrani/how-my-kids-school-trip-helped-me-understand-workload-identity-federation-f680a2f4672b

ChatGPT Image Aug 16, 2025, 05_51_02 PM_compressed
Link
@anjali shared a link, 9 months, 1 week ago
Customer Marketing Manager, Last9

Top 12 LogicMonitor Alternatives for Developers in 2025

LogicMonitor fits traditional infra, but for microservices, high-cardinality data, and Kubernetes, these 12 alternatives work better.

image
Story
@laura_garcia shared a post, 9 months, 1 week ago
Software Developer, RELIANOID

🎮 gamescom 2025 | Aug 20–24, Cologne

The world’s biggest gaming event is back—AAA reveals, indie gems, esports, VR/AR & more. RELIANOID powers secure, scalable gaming back-ends for real-time, high-volume play. Let’s connect in Cologne! #gamescom2025#GameDev#RELIANOID#Esports https://www.relianoid.com/about-us/events/gamescom-2025/..

evento gamescom cologne RELIANOID august
Story
@laura_garcia shared a post, 9 months, 1 week ago
Software Developer, RELIANOID

🚨 New SharePoint vulnerabilities under active attack

Microsoft has issued an alert for 4 serious CVEs affecting on-premises SharePoint servers. In our latest blog post, we explain the risks and how RELIANOID helps mitigate them with advanced reverse proxy, WAF, and security automation. 💡 Plus: RELIANOID is now available on Azure Marketplace for instan..

Story
@laura_garcia shared a post, 9 months, 1 week ago
Software Developer, RELIANOID

🔐 New Technical Guide: ISA/IEC 62443 Industrial Cybersecurity Standards

Industrial Automation and Control Systems (IACS) power critical sectors — from energy and manufacturing to water treatment and transportation. But protecting them requires more than just traditional IT security. Our latest 5-minute read breaks down the ISA/IEC 62443 framework — the globally recogniz..

Knowledge base ISAIEC-62443 Industrial Cybersecurity Standards RELIANOID
Magika is an open-source file type identification engine developed by Google that uses machine learning instead of traditional signature-based heuristics. Unlike classic tools such as file, which rely on magic bytes and handcrafted rules, Magika analyzes file content holistically using a trained model to infer the true file type.

It is designed to be both highly accurate and extremely fast, capable of classifying files in milliseconds. Magika excels at detecting edge cases where file extensions are incorrect, intentionally spoofed, or absent altogether. This makes it particularly valuable for security scanning, malware analysis, digital forensics, and large-scale content ingestion pipelines.

Magika supports hundreds of file formats, including programming languages, configuration files, documents, archives, executables, media formats, and data files. It is available as a Python library, a CLI, and integrates cleanly into automated workflows. The project is maintained by Google and released under an open-source license, making it suitable for both enterprise and research use.

Magika is commonly used in scenarios such as:

- Secure file uploads and content validation
- Malware detection and sandboxing pipelines
- Code repository scanning
- Data lake ingestion and classification
- Digital forensics and incident response