Join us

ContentUpdates and recent posts about Tor..
Link
@faun shared a link, 8 months, 1 week ago
FAUN.dev()

Evolving Kubernetes for generative AI inference

Google Cloud, ByteDance, and Red Hat are wiring AI smarts straight intoKubernetes. Think: faster inference benchmarks, smarter LLM-aware routing, and on-the-fly resource juggling—all built to handle GenAI heat. Their new push,llm-d, bakesvLLMdeep into Kubernetes. That unlocks disaggregated serving .. read more  

Evolving Kubernetes for generative AI inference
Story
@laura_garcia shared a post, 8 months, 1 week ago
Software Developer, RELIANOID

💡 What is a VIP Load Balancer?

AVIP (Virtual IP)load balancer distributes traffic across multiple servers using a single IP. It ensures: ✅ Scalability ✅ High availability ✅ Session persistence ✅ Smart traffic routing 🚀RELIANOIDtakes VIP load balancing to the next level with: 🔒 SSL offloading 📊 Dynamic health monitoring ⚖️ Advance..

Knowledge base VIP LOAD BALANCER
Link
@anjali shared a link, 8 months, 1 week ago
Customer Marketing Manager, Last9

A Practical Guide to Python Application Performance Monitoring(APM)

Monitor, debug, and optimize Python apps in production with APM—track transactions, DB queries, errors, and external calls.

python_apm
Story
@idjuric660 shared a post, 8 months, 1 week ago
Technical Content Writer, Mailtrap

How to Send Emails from Supabase using SMTP or Email API

Whether you’re confirming user signups, sending notifications, or automating workflows, Supabase makes it easy to integrate and send emails with SMTP or third-party APIs. And in this guide, I’ll walk you through every step of the process, including: - Sending emails using Supabase Auth[click here to..

Link
@anjali shared a link, 8 months, 1 week ago
Customer Marketing Manager, Last9

APM Logs: How to Get Started for Faster Debugging

Understand how APM logs connect metrics, traces, and events to speed up debugging and uncover root causes faster.

Prometheus_resource_attributes
Link
@anjali shared a link, 8 months, 1 week ago
Customer Marketing Manager, Last9

OpenTelemetry API vs SDK: Understanding the Architecture

Understand how the OpenTelemetry API and SDK work together, clean instrumentation in code, and flexible data processing in configuration.

Otel_injector
Link
@anjali shared a link, 8 months, 1 week ago
Customer Marketing Manager, Last9

What is Database Monitoring

Database monitoring tracks performance, health, and availability, helping detect issues early and maintain optimal operations.

Db_monitoring
Story
@laura_garcia shared a post, 8 months, 1 week ago
Software Developer, RELIANOID

🔒 Incident Response in 2025: Lessons Learned

June–August 2025 brought a surge in high-profile cyber incidents—from UNFI’s food supply disruption and Qantas’ customer data breach to sector-wide attacks on insurers. At the same time, AI-powered detection and new resilience features showed how fast response capabilities are evolving. At RELIANOID..

Incident Response june, july, august 2025
Story
@idjuric660 shared a post, 8 months, 1 week ago
Technical Content Writer, Mailtrap

Send Emails with Windsurf and Mailtrap

Node.js Mailtrap.io

Learn how to seamlessly integrate Mailtrap with Windsurf to send transactional emails using simple AI prompts.

Story
@laura_garcia shared a post, 8 months, 2 weeks ago
Software Developer, RELIANOID

Japan Ushers in a New Era of Cybersecurity with the Active Cyberdefence Law

Japan has taken a bold step in reshaping its national cybersecurity posture with the new Active Cyberdefence Law (ACD) — a proactive response to the growing wave of cyber threats affecting critical infrastructure, airlines, and financial institutions. 🚨 Key highlights of the ACD Law: Legal authority..

Japan's Active Cyberdefence Law
Tor (The Onion Router) is an open-source network and software suite designed to protect user privacy and enable anonymous communication on the internet. It works by routing network traffic through a distributed, volunteer-run network of relays, encrypting data in multiple layers so that no single relay knows both the source and destination of the traffic. Tor is widely used to defend against traffic analysis, surveillance, and censorship. By obscuring IP addresses and routing paths, it helps users browse the web anonymously, publish information safely, and access services without revealing their location or identity. The network supports standard web traffic as well as specialized .onion services, which allow websites and services to operate anonymously without exposing their physical hosting location. Beyond web browsing, Tor is used as a foundational privacy layer for secure messaging, whistleblowing platforms, journalism, activism, academic research, and secure system administration. It is also integrated into many privacy-focused operating systems and tools. While Tor can reduce traceability, it does not make users invulnerable and must be used with proper operational security to avoid deanonymization risks. Tor is developed and maintained by the Tor Project, a nonprofit organization dedicated to advancing digital privacy and freedom worldwide