Join us

ContentUpdates and recent posts about Tor..
Link
@faun shared a link, 7 months, 2 weeks ago
FAUN.dev()

v1.34: DRA Consumable Capacity

Kubernetes 1.34 rolls in **consumable capacity** for Dynamic Resource Allocation (DRA). That means device plugins can now carve up resources—GPU memory, NIC bandwidth, etc.—into precise slices for Pods, ResourceClaims, and namespaces. The scheduler tracks it all, so nothing spills over... read more  

Story
@laura_garcia shared a post, 7 months, 2 weeks ago
Software Developer, RELIANOID

Secure Boot Advanced Targeting (SBAT): Scaling Boot Security 🔐

Discover how SBAT enhances Secure Boot by introducing a smarter way to handle vulnerabilities, reducing overhead, and ensuring your system's boot process stays secure. Learn how it works, how it addresses scalability, and why it's a game-changer for modern boot security across Linux and Windows envi..

KB-Secure Boot Advanced Targeting
Story
@laura_garcia shared a post, 7 months, 2 weeks ago
Software Developer, RELIANOID

Cyber Security & Cloud Expo Europe in Amsterdam

🔐 On 24–25 September 2025, RELIANOID will be at Cyber Security & Cloud Expo Europe in Amsterdam! Join us to explore how we enable secure, scalable, and Zero Trust–ready application delivery. 👉 https://www.relianoid.com/about-us/events/cyber-security-cloud-expo-2025/ #CyberSecurity#Cloud#ZeroTrust#De..

cybersecurity and cloud expo amsterdam event
Story
@laura_garcia shared a post, 7 months, 2 weeks ago
Software Developer, RELIANOID

Cyber Security & Cloud Expo Europe in Amsterdam

🔐 On 24–25 September 2025, RELIANOID will be at Cyber Security & Cloud Expo Europe in Amsterdam! Join us to explore how we enable secure, scalable, and Zero Trust–ready application delivery. 👉 https://www.relianoid.com/about-us/events/cyber-security-cloud-expo-2025/ #CyberSecurity#Cloud#ZeroTrust#De..

cybersecurity and cloud expo amsterdam event
Story
@laura_garcia shared a post, 7 months, 2 weeks ago
Software Developer, RELIANOID

🔐 Industrial networks face increasing complexity and evolving cyber threats.

To strengthen defenses, many organizations are moving beyond traditional segmentation and adopting microsegmentation — a strategy that creates independent, secure zones to better protect critical assets. We’ve prepared a clear diagram to illustrate how defense-in-depth and microsegmentation can be a..

Industrial Zero-Trust Micro-Segmentation
Link
@anjali shared a link, 7 months, 2 weeks ago
Customer Marketing Manager, Last9

What is Asynchronous Job Monitoring?

Know how asynchronous job monitoring tracks background tasks, ensuring they finish reliably, perform well, and stay visible at scale.

async_job_monitoring
Story
@laura_garcia shared a post, 7 months, 2 weeks ago
Software Developer, RELIANOID

🚀 We’re heading to TechEx Europe 2025 in Amsterdam on 24–25 September!

Join us at Europe’s premier enterprise technology event to explore the future of AI, cybersecurity, IoT, cloud, and digital transformation—and discover how RELIANOID ensures secure, scalable, and high-performance application delivery for modern enterprises. #TechExEurope#DigitalTransformation#Enterp..

techex amsterdam event
Link
@anjali shared a link, 7 months, 2 weeks ago
Customer Marketing Manager, Last9

Kubernetes Service Discovery Explained with Practical Examples

Understand Kubernetes Service Discovery with clear examples of Services, Endpoints, DNS, Ingress, and headless setups in action.

kubernetes
Link
@faun shared a link, 7 months, 3 weeks ago
FAUN.dev()

Is Java Still Used? Current Trends and Market Demand in 2025

Java’s not just hanging on in 2025—it’s running the show. Over 90% of the Fortune 500 still trust it to power cloud platforms, big data pipelines, and IoT sprawl. What’s keeping it sharp? A brisk six-month release cadence. A battle-hardened ecosystem through OpenJDK and Jakarta EE. And a JVM that k.. read more  

Is Java Still Used? Current Trends and Market Demand in 2025
Link
@faun shared a link, 7 months, 3 weeks ago
FAUN.dev()

Esoteric Languages Challenge Coders to Think Way Outside the Box

Daniel Temkin has written a book about44 esoteric programming languages, including Valence, which uses ancient Greek measuring symbols. Temkin emphasizes the significance of esoteric languages in promoting creativity and investigating the complicated nature of modern programming. These languages hav.. read more  

Tor (The Onion Router) is an open-source network and software suite designed to protect user privacy and enable anonymous communication on the internet. It works by routing network traffic through a distributed, volunteer-run network of relays, encrypting data in multiple layers so that no single relay knows both the source and destination of the traffic. Tor is widely used to defend against traffic analysis, surveillance, and censorship. By obscuring IP addresses and routing paths, it helps users browse the web anonymously, publish information safely, and access services without revealing their location or identity. The network supports standard web traffic as well as specialized .onion services, which allow websites and services to operate anonymously without exposing their physical hosting location. Beyond web browsing, Tor is used as a foundational privacy layer for secure messaging, whistleblowing platforms, journalism, activism, academic research, and secure system administration. It is also integrated into many privacy-focused operating systems and tools. While Tor can reduce traceability, it does not make users invulnerable and must be used with proper operational security to avoid deanonymization risks. Tor is developed and maintained by the Tor Project, a nonprofit organization dedicated to advancing digital privacy and freedom worldwide