AWS Docs GPT

1_r/devopsish
Alright! Where is my arm alternative?!? I have three of these and was considering upgrading | Intel Exiting the PC Business as it Stops Investment in the Intel NUC
Intel is exiting the PC business as it stops investment in the pioneering and popular Intel NUC line of mini PCs
Sending a Difficult Email
Dear new developer, Sometimes you have to send a difficult or awkward email. But, before you send it, think about whether it should be an email or if an in-person conversation, phone call, or video…
Phishing campaign targets Ukraine, allies ahead of NATO summit
Documents lobbying for Ukraine's membership in the alliance are being used as lures by a campaign that appears to be linked to the RomCom hacking group, according to researchers at BlackBerry. trying to infect guests with malicious software, according cybersecurity firm BlackBerry.
Smuggler Nabbed with 306 CPUs Stuffed in Girdle
Like the SSD smuggler earlier in the week, the man had fashioned a tech stuffed girdle.
Apple Issues Urgent Patch for Zero-Day Flaw Targeting iOS, iPadOS, macOS, and Safari
Apple just released critical updates to combat an actively exploited zero-day flaw. Update to iOS 16.5.1 (a), iPadOS 16.5.1 (a), macOS Ventura 13.
Evernote, the memory app people forgot about, lays off entire US staff
Launched in 2004, the company once sought to be the world's brain dump.
SUSE Preserves Choice in Enterprise Linux by Forking RHEL with a $10+ Million Investment | SUSE
Investment reinforces SUSE’s commitment to innovate and support SUSE Linux Enterprise distributions and related open source projects
SUSE plans to contribute its code to an open source foundation
SUSE Announces Its Forking RHEL, To Maintain A RHEL-Compatible Distro
Yesterday Oracle published an interesting announcement and doubled down on their intentions of keeping Oracle Linux compatible with Red Hat Enterprise Linux following Red Hat's controversial announcement last month
Opinion | Why I Regret Debating Robert F. Kennedy Jr. (Gift Article)
Opinion columnist Farhad Manjoo on why conspiracy theorists should never be debated.
Berryville Institute of Machine Learning
How to securely build product features using AI APIs
A Practitioner’s Guide to Consuming AI
Show Me Your Architecture Vol. 2: Platform Engineering on AWS
Through the AWS documentation, books like AWS in Action or AWS training, you can gain theoretical knowledge. But beyond that,...
Bad managers and people mailing it in are giving those of us that have worked from home for decades a bad name. | The debate over 'fake work' in the tech industry misses the real culprit: lazy managers
Tech executives and investors have claimed that loafing employees are dragging down companies. But experts say the real problem is "lazy management."
Microsoft confirms more job cuts on top of 10,000 layoffs announced in January
On top of the 10,000 layoffs Microsoft announced in January, the company is now slimming down its number of salespeople.
Shortening the Let's Encrypt Chain of Trust
When Let’s Encrypt first launched, we needed to ensure that our certificates were widely trusted. To that end, we arranged to have our intermediate certificates cross-signed by IdenTrust’s DST Root CA X3. This meant that all certificates issued by those intermediates would be trusted, even while our own ISRG Root X1 wasn’t yet. During subsequent years, our Root X1 became widely trusted on its own. Come late 2021, our cross-signed intermediates and DST Root CA X3 itself were expiring.
Resilience requires helping each other out
A common failure mode in complex systems is that some part of the system hits a limit and falls over. In the software world, we call this phenomenon resource exhaustion, and a classic example of th…
OMG y’all!!! Hallmark Paper Wonder Funny Blank Pop Up Card (Dumpster Fire)
Amazon.com : Hallmark Paper Wonder Funny Blank Pop Up Card (Dumpster Fire) : Office Products
DevOps’ish Super Sponsor Honeycomb Named a Leader in 2023 Gartner® Magic Quadrant™ for APM & Observability
Honeycomb announces it is a leader in Gartner’s Magic Quadrant for APM & Observability for the second year in a row. Read more.
Lima: a nice way to run Linux VMs on Mac
Trinidad and Tobago facing outages after cyberattack
Trinidad and Tobago’s justice department is dealing with a cyberattack that has impacted the ministry’s operations.
When does an old Mac become unsafe to use? - The Mac Security Blog
Macs can last a long time, far longer than Apple will support them with macOS updates. If your Mac cannot run the latest version of macOS, it is unsafe to use online. Here are some tips for getting the most out of your old Mac, safely.
Canonical's Leading LXD Engineer Quits - OMG! Ubuntu
Stéphane Graber has announced their resignation from Canonical after 12 years of working at the company, mostly on LXD. The decision follows news last
PoisonGPT: How we hid a lobotomized LLM on Hugging Face to spread fake news
We will show in this article how one can surgically modify an open-source model, GPT-J-6B, and upload it to Hugging Face to make it spread misinformation while being undetected by standard benchmarks.
As the industrial IoT looks more like IT, security must change - Stacey on IoT | Internet of Things news and analysis
This story was originally published in my July 07, 2023 newsletter. You can sign up for the newsletter here. As tensions rise between the U.S. and China and Russia continues sponsoring cybersecurity attacks around the globe, it’s clear cybersecurity is never going back to being a niche issue CEOs and boards can foist off to a CSO or IT […]
Must read! I remember a time in my life where if I got hacked I’d basically loose my job. Sucks but that’s the kind of commitment some employers want | Analyzing Attack Opportunities Against Information Security Practitioners
Security researchers are increasingly targeted for attack. In this guest post, Jared Stroud explores the risks and how practitioners can protect themselves.
YouTube Copyright ID Claims Reach a New High * TorrentFreak
YouTube's latest transparency report shows that the number of Content ID system claims has reached a new high.
Hackers Exploit Flaws in Revolut's Payment System, Stealing $20 Million
Follow us on Twitter @Hackread - Facebook @ /Hackread
Razer Data Breach: Alleged Database and Backend Access Sold for $100k
Follow us on Twitter @Hackread - Facebook @ /Hackread
Apple supplier Foxconn pulls out of $19.5 billion India chip project
The top Apple supplier didn't provide a reason for the breakup, but the $19.5 billion project would have been one of its largest moves outside China.