Join us

ContentUpdates and recent posts about Tor..
Link
@faun shared a link, 7 months, 3 weeks ago
FAUN.dev()

Amazon EKS Enables Ultra-Scale AI/ML Workloads with Support for 100K Nodes per Cluster

Amazon EKS just cranked its Kubernetes cluster limit to100,000 nodes—a 10x jump. The secret sauce? A reworkedetcdwith an internaljournalsystem andin-memorystorage. Toss in tightAPI server tuningand network tweaks, and the result is wild: 500 pods per second, 900K pods, 10M+ objects, no sweat—even un.. read more  

Amazon EKS Enables Ultra-Scale AI/ML Workloads with Support for 100K Nodes per Cluster
Link
@faun shared a link, 7 months, 3 weeks ago
FAUN.dev()

Why I Ditched Docker for Podman (And You Should Too)

Older container technologies like Docker have been prone to security vulnerabilities, such as CVE-2019-5736 and CVE-2022-0847, which allowed for potential host system compromise. Podman changes the game by eliminating the need for a persistent background service like the Docker daemon, enhancing sec.. read more  

Link
@faun shared a link, 7 months, 3 weeks ago
FAUN.dev()

Kubernetes VPA: Limitations, Best Practices, and the Future of Pod Rightsizing

Kubernetes'Vertical Pod Autoscaler (VPA)tries to be helpful by tweaking CPU and memory requests on the fly. Problem is, it needs to bounce your pods to do it. And if you're also runningHorizontal Pod Autoscaler (HPA)on the same metrics? Now they're fighting over control. VPA sees a narrow slice of .. read more  

Kubernetes VPA: Limitations, Best Practices, and the Future of Pod Rightsizing
Story
@laura_garcia shared a post, 7 months, 3 weeks ago
Software Developer, RELIANOID

🌐 NIS2 is reshaping cybersecurity compliance across Europe.

At RELIANOID, we are fully aligned and compliant with NIS2 requirements, helping organizations strengthen their security posture. 👉 Explore more: https://www.relianoid.com/security-compliances/relianoid-nis2-compliance/ #NIS2#CyberSecurity#Compliance#Regulation#EUCompliance#InfoSec#DataProtection#Go..

nis2 compliance RELIANOID
Story
@ketbostoganashvili shared a post, 7 months, 3 weeks ago
Technical Content Writer

Send emails with Vercel and Mailtrap

Next.js Vercel Mailtrap.io

Learn how to integrate Mailtrap with your Vercel-hosted applications to send transactional emails with reliable delivery and comprehensive analytics.

Story
@ketbostoganashvili shared a post, 7 months, 3 weeks ago
Technical Content Writer

Send emails with Bolt.new and Mailtrap

Bolt Mailtrap.io

Learn how to integrate Mailtrap with your Bolt.new application to send transactional emails and manage contacts without writing complex code.

Link
@anjali shared a link, 7 months, 3 weeks ago
Customer Marketing Manager, Last9

APM for Kubernetes: Monitor Distributed Applications at Scale

Understand Kubernetes APM by linking request flows with pod, node, and cluster data to get complete visibility at scale.

k8
Story
@laura_garcia shared a post, 7 months, 4 weeks ago
Software Developer, RELIANOID

🌊 Load Balancing Smart Wave with RELIANOID — Built for Marine Telemetry

The Smart Wave platform is key for real-time telemetry from offshore buoys, vessels, and coastal stations. But how do you ensure it performs reliably — even over satellite links? We've published a new technical guide showing how to load balance Smart Wave using RELIANOID: ✅ MQTT & TCP ingestion for ..

Knowledge base_how to load balance SMART WAVE_blue economy
Link
@faun shared a link, 7 months, 4 weeks ago
FAUN.dev()

The Programming Skills You Need for Today's Data Roles

New tutorials dig into usingLabel Studio + Dockerto tighten up object detection pipelines—and how to squeeze more out ofRabbitMQ + Celerywithout breaking your queue (or your spirit). Other writeups get into the weeds with LLM monitoring,Bayesian hyperparameter search, and Google’s freshly droppedLan.. read more  

The Programming Skills You Need for Today's Data Roles
Link
@faun shared a link, 7 months, 4 weeks ago
FAUN.dev()

My Own DNS Server At Home

RunningBIND on Fedora with Podmanputs you in the driver’s seat—local DNS, full zone control, and no third-party middlemen. It handles staticforward/reverse zonesacross multiple IPv4 subnets, skips the mess of dynamic updates, and plugs into your router as a recursiveforwarding resolver. Call it a se.. read more  

My Own DNS Server At Home
Tor (The Onion Router) is an open-source network and software suite designed to protect user privacy and enable anonymous communication on the internet. It works by routing network traffic through a distributed, volunteer-run network of relays, encrypting data in multiple layers so that no single relay knows both the source and destination of the traffic. Tor is widely used to defend against traffic analysis, surveillance, and censorship. By obscuring IP addresses and routing paths, it helps users browse the web anonymously, publish information safely, and access services without revealing their location or identity. The network supports standard web traffic as well as specialized .onion services, which allow websites and services to operate anonymously without exposing their physical hosting location. Beyond web browsing, Tor is used as a foundational privacy layer for secure messaging, whistleblowing platforms, journalism, activism, academic research, and secure system administration. It is also integrated into many privacy-focused operating systems and tools. While Tor can reduce traceability, it does not make users invulnerable and must be used with proper operational security to avoid deanonymization risks. Tor is developed and maintained by the Tor Project, a nonprofit organization dedicated to advancing digital privacy and freedom worldwide