ContentPosts from @jfree..
Link
@faun shared a link, 7 months, 1 week ago
FAUN.dev()

NSEnter and Kubernetes

nsenteris your backstage pass to aKubernetesnode. It plays with Linux namespaces, crashing through isolation walls for a direct look inside. Summon it withPID1 and proper permissions, and you're deep in the node's core. No middleman required... read more  

NSEnter and Kubernetes
Link
@faun shared a link, 7 months, 1 week ago
FAUN.dev()

How We Designed Model Runner and What’s Next

Docker's just unleashed a new gadget with Desktop4.40. Meet theModel Runner, your ticket to running AI models on your local machine. Imagine it as the Peacekeeper of container-host diplomacy. It’s powered byllama.cppand can ride GPUs like a pro skater. Oh, and it plays nice with theOpenAI API. Model.. read more  

How We Designed Model Runner and What’s Next
Link
@faun shared a link, 7 months, 1 week ago
FAUN.dev()

State of App Dev: Security

Securityisn’t just for the IT crowd anymore. Everyone's on duty.Only 1%of developers bother to look the other way. A mere20%of organizations throw money at outsiders to handle it. The real trip wire? Planning. It derails teams faster than you'd believe... read more  

Link
@faun shared a link, 7 months, 1 week ago
FAUN.dev()

AWS’ EKS Kubernetes ‘Critical Security’ Flaw Exposes Credentials, Says Trend Micro

Trend Microblows the lid off Amazon's EKS snafu—misconfigured Kubernetes containers brazenly leaking AWS credentials. Cue privilege escalation chaos. AWS shrugs, hiding behind the "Shared Responsibility" mantra. Trend Micro, undeterred, sounds the alarm: secure those configurations, and embrace the .. read more  

AWS’ EKS Kubernetes ‘Critical Security’ Flaw Exposes Credentials, Says Trend Micro
Link
@faun shared a link, 7 months, 1 week ago
FAUN.dev()

F5, Inc Announces New Capabilities for F5 BIG-IP Next for Kubernetes

F5, Inc. announced new capabilities for F5 BIG-IP Next for Kubernetes in collaboration with NVIDIA Corporation. The F5 BIG-IP Next for Kubernetes will be accelerated with NVIDIA’s BlueField-3 DPUs and the NVIDIA DOCA software framework... read more  

Link
@anjali shared a link, 7 months, 1 week ago
Customer Marketing Manager, Last9

11 Best Log Monitoring Tools for Developers in 2025

A technical comparison of 11 log monitoring tools developers use in 2025—features, trade-offs, pricing, and platform compatibility

Microservices logging
Story
@laura_garcia shared a post, 7 months, 1 week ago
Software Developer, RELIANOID

🚨 Industrial Cybersecurity: Are You Ready?

📘 We’ve published a Technical Guide to ISA/IEC 62443 Standards – your 5-minute roadmap to securing Industrial Automation and Control Systems (IACS). 🔐 ISA/IEC 62443 is the gold standard for industrial cybersecurity. From zones and conduits to secure development lifecycles, it addresses the full spec..

Knowledge base ISAIEC-62443 Industrial Cybersecurity Standards RELIANOID
Story
@laura_garcia shared a post, 7 months, 1 week ago
Software Developer, RELIANOID

💸 The Cost of Cyber Insecurity

The average data breach in 2024 costs $4.45M — over $10M in finance and healthcare. Cyber incidents = market value loss, sales drop, and reputation damage. But there’s good news: 💡 Invest $500K in security → avoid $2M in losses = 300% ROI 🧠 Microsegmentation users saw 152% ROI, saved $2.9M, cut staf..

Blog Cybersecurity ROI RELIANOID
Link
@anjali shared a link, 7 months, 2 weeks ago
Customer Marketing Manager, Last9

Prometheus Logging Explained for Developers

Understand how Prometheus logging captures structured metrics, improves query performance, and scales observability in production systems.

Prometheus_logging
Link
@anjali shared a link, 7 months, 2 weeks ago
Customer Marketing Manager, Last9

Docker Stop vs Kill: When to Use Each Command

docker stop gives containers time to shut down cleanly. docker kill doesn't—use it only when you need an immediate shutdown.

docker