Filter & Sort
  1. Information sent using unencrypted channels

    Information sent using unencrypted channels refers to data transmitted over a network without encryption, making it vulnerable to interception, modification, or unauthorized access.

  2. Ingenico Financial Solutions provides high availability e-Money solutions with MariaDB

    Ingenico Financial Solutions, an e-Money provider, sought a robust, high-availability database solution and flexible support for its fast-growing business. Already using MariaDB, they faced downtime issues and needed a scalable partner. MariaDB provided a comprehensive solution, including a health check, infrastructure validation, performance optimizations, and assistance in setting up MariaDB Galera Cluster for high availability. This partnership resulted in a secure, scalable, and reliable database environment, ensuring business continuity and supporting Ingenico's growth.

  3. Inside DeepSeek-R1: How it revolutionizes AI with efficiency and advanced reasoning

    Discover DeepSeek-R1’s architecture, advantages, challenges, and its comparison with ChatGPT and Gemini.

  4. Integrated password security with Bitwarden SSO

    Enhance your organization’s security and simplify user access with Bitwarden Login with SSO. This feature integrates identity-based single sign-on (SSO) with Bitwarden’s zero-knowledge encrypted password manager, supporting SAML 2.0 and OpenID Connect. Ideal for enterprises, it enables seamless authentication through existing identity providers while extending protection to all apps—even those without native SSO support.

  5. Introducing AI Security Code Review

    Traditional AppSec misses critical design flaws? Discover Endor Labs' AI Security Code Review, a revolutionary agentic AI platform that analyzes pull requests for hidden architectural changes, new API endpoints, and authentication logic modifications, ensuring you catch high-impact security risks that rule-based tools miss.

  6. Introducing Cloud Efficiency Posture Management (CEPM): An Evolution in Cloud Optimization

    PointFive introduces a new approach to cloud cost management with Cloud Efficiency Posture Management (CEPM) — a discipline focused on optimizing cloud resource configuration, scaling, and architecture. Unlike traditional FinOps tools that emphasize spend visibility and discounts, CEPM continuously identifies root causes of inefficiency, delivers actionable insights, and embeds optimization into engineering workflows. From misconfigured DynamoDB tables to inefficient Aurora storage settings, PointFive helps teams move beyond surface-level cost savings to drive sustained performance, reliability, and cloud efficiency at scale.

  7. Intuitive Machines enables historic Moon landing with GitLab

    Founded in 2013, Intuitive Machines has evolved from a think tank into a space exploration company that provides space infrastructure and services required to commercialize the Solar System.

  8. Is AI already replacing me? Insights from Civo Navigate

    Are you keeping up with AI's rapid evolution? Dive into key takeaways from Civo Navigate, exploring multimodal AI, agentic systems, and anomaly detection. Discover how AI is augmenting, not replacing, humans, the impact of open-source models, and the crucial debate on responsible AI adoption.

  9. Is PaaS Still Used in Container Orchestration Technologies Like Kubernetes in 2025

    Learn about PaaS’s relevance in container orchestration platforms like Kubernetes ruling infrastructures.

  10. Is Speed Better than Security? Resolving the DevOps Dilemma with Checkmarx

    Is speed more important than security in DevOps? With Checkmarx, you don’t have to choose. Learn how AI-powered security integrates seamlessly into your workflows.

  11. Is the future a hybrid mix of public and private cloud

    How are businesses blending public and private clouds to prioritize flexibility and control in evolving cloud strategies.

  12. Is traditional VPN enough to meet modern zero-trust security measures

    Discover how Netmaker blends VPN and Zero Trust security with WireGuard to create scalable, secure networks.

Items 157 to 168 of 265 total

Show per page