Join us

heart Curated links by FAUN
Sponsored Link
@faun shared a link, 1 year, 1 month ago

The art and science of developing intelligent apps with OpenAI GPT-3, DALL·E 2, CLIP, and Whisper.

Explore the fascinating world of Artificial Intelligence and solve real-world problems!

In this practical guide, you will build intelligent real-world applications using GPT-3, DALL-E, Whisper, CLIP, and more tools from the OpenAI and ML ecosystem.

Rest assured, you don't need to be a data scientist or machine learning engineer to follow this guide!

The art and science of developing intelligent apps with OpenAI GPT-3, DALL·E 2, CLIP, and Whisper.
Link
@faun shared a link, 4 days, 4 hours ago

The Top 15 Real-Time Dashboard Examples

Realtime dashboards enable users to monitor multiple data sources and aspects of operations simultaneously, providing a dynamic and interactive overview that allows for in-depth analysis and customization. Examples include cluster health dashboards for monitoring Kubernetes clusters, simple monitori..

The Top 15 Real-Time Dashboard Examples
Link
@faun shared a link, 4 days, 4 hours ago

Automating Ephemeral Environments with Kubernetes: A Quick Guide

The blog post discusses the role of ephemeral environments in software development and testing. It builds on previous discussions about the basics and benefits of these temporary, isolated, yet fully functional deployment environments. The focus of the post is on the practical steps for integrating ..

Automating Ephemeral Environments with Kubernetes: A Quick Guide
Link
@faun shared a link, 1 week, 4 days ago

Distributed SQLite: Paradigm shift or hype?

SQLite is a fast embedded database designed for client-side applications. Projects like Cloudflare D1, fly.io, and Turso are trying to use SQLite as an edge database, but they face challenges with eventual consistency and lack of support for interactive transactions. Using HTTP caching may be a simp..

Link
@faun shared a link, 1 week, 4 days ago

Redis is forked

Redis has played a significant role in many developers' work on high-scale, low-latency web services for the past fifteen years. It is a reliable and efficient tool that empowers developers and handles high throughput with low latency, making it a go-to choice in the industry. The recent licensing c..

Redis is forked
Link
@faun shared a link, 1 week, 3 days ago

The Scary Thing About Automating Deploys

Most of Slack runs on a monolithic service called "The Webapp" with hundreds of developers making hundreds of changes weekly. Deploying at this scale poses a unique challenge, especially in implementing continuous deployment. Slack deploys from its Webapp repository 30-40 times a day to its producti..

The Scary Thing About Automating Deploys
Link
@faun shared a link, 1 week, 3 days ago

Transitioning to OpenTelemetry

In this guest blog, Einar Norðfjörð walks through Birdie's journey moving from logs to OpenTelemetry and Honeycomb's tracing...

Transitioning to OpenTelemetry
Link
@faun shared a link, 1 week, 3 days ago

Kubernetes v1.30: Uwubernetes

Kubernetes v1.30 introduces new stable, beta, and alpha features with 45 enhancements, including 17 stable, 18 in beta, and 10 in alpha. The release theme and logo for Kubernetes v1.30 is Uwubernetes. Some of the improvements that graduated to stable include volume manager refactoring, pod schedulin..

Kubernetes v1.30: Uwubernetes
Link
@faun shared a link, 1 week, 3 days ago

We discovered an AWS access vulnerability

AWS IAM was used extensively by Stedi to enforce role-based access control for customers. A vulnerability was discovered in AWS STS where role trust policy statements were evaluated incorrectly, allowing unauthorized access to AWS accounts. Stedi shared their discovery process and collaboration with..

We discovered an AWS access vulnerability
Link
@faun shared a link, 1 week, 3 days ago

State of DevSecOps

An analysis of security posture across a range of applications written in various programming languages found that Java services are disproportionately affected by vulnerabilities, with a high percentage of services vulnerable to critical, high-severity issues introduced by third-party libraries. Vu..

State of DevSecOps
Link
@faun shared a link, 1 week, 3 days ago

How to Build a Data Center in 5 Steps

Establishing internal network infrastructure: Configuring a robust internal network infrastructure is key to efficient data center operations. This involves setting up switches, routers, and firewalls to manage data flow and protect against intrusions. Redundancy is critical for ensuring high availa..

How to Build a Data Center in 5 Steps