ContentPosts from @marmorag..
Discovery IconThat's all from @marmorag โ€” explore more posts below...
Story
@marxjenes shared a post, 43ย minutes ago

State Transition Testing Techniques for Microservices Applications

Learn effective state transition testing techniques for microservices applications. Ensure reliable service behavior, validate workflows, and strengthen regression testing in CI/CD pipelines.

State Transition Testing Techniques for Microservices Applications
ย Activity
@kala added a new tool Claude Code , 2ย hours, 33ย minutes ago.
News FAUN.dev() Team
@kala shared an update, 2ย hours ago
FAUN.dev()

NanoClaw Brings Container-Isolated AI Agents to WhatsApp and Telegram

OpenClaw NanoClaw Claude Code

NanoClaw is a lightweight open-source personal AI agent that runs locally and connects to apps like WhatsApp and Telegram. Built with only ~3,900 lines of code across 15 files, it uses container isolation to securely run agents and aims to offer a simpler, fully auditable alternative to large frameworks like OpenClaw.

ย Activity
@kala added a new tool NanoClaw , 2ย hours, 40ย minutes ago.
News FAUN.dev() Team
@kala shared an update, 6ย hours ago
FAUN.dev()

OpenAI Unveils GPT-5.4, a Stronger Model for Reasoning, Coding, and Real Work

ChatGPT GPT-5.4

OpenAI released GPT-5.4, its new flagship model for ChatGPT, the API, and Codex. It improves reasoning, coding, and agent workflows, introduces native computer-use capabilities, supports up to 1M tokens of context, and adds tool search to make large tool ecosystems more efficient. The model is more accurate, more token-efficient, and better at real professional tasks like coding, spreadsheets, documents, and web research. A higher-performance GPT-5.4 Pro version is also available for complex workloads.

ย Activity
@kala added a new tool GPT-5.4 , 7ย hours, 1ย minute ago.
Story
@laura_garcia shared a post, 1ย day, 3ย hours ago
Software Developer, RELIANOID

๐—ง๐—ต๐—ฒ ๐—™๐˜‚๐˜๐˜‚๐—ฟ๐—ฒ ๐—ผ๐—ณ ๐—œ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐˜๐˜† ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฆ๐˜๐—ฎ๐—ฟ๐˜๐˜€ ๐—ถ๐—ป ๐—Ÿ๐—ผ๐—ป๐—ฑ๐—ผ๐—ป

๐Ÿ” ๐—ง๐—ต๐—ฒ ๐—™๐˜‚๐˜๐˜‚๐—ฟ๐—ฒ ๐—ผ๐—ณ ๐—œ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐˜๐˜† ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฆ๐˜๐—ฎ๐—ฟ๐˜๐˜€ ๐—ถ๐—ป ๐—Ÿ๐—ผ๐—ป๐—ฑ๐—ผ๐—ป The ๐—š๐—ฎ๐—ฟ๐˜๐—ป๐—ฒ๐—ฟ ๐—œ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐˜๐˜† & ๐—”๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐— ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—บ๐—ฒ๐—ป๐˜ ๐—ฆ๐˜‚๐—บ๐—บ๐—ถ๐˜ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ is almost here! On ๐— ๐—ฎ๐—ฟ๐—ฐ๐—ต ๐Ÿตโ€“๐Ÿญ๐Ÿฌ ๐—ถ๐—ป ๐—Ÿ๐—ผ๐—ป๐—ฑ๐—ผ๐—ป, IAM leaders, security architects, and IT executives will gather to tackle the biggest challenges shaping modern identity security. From ๐—œ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐˜๐˜† ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐——๐—ฒ๐˜..

Gartner Identity and Access Management Summit 2026 london relianoid
Story
@viktoriiagolovtseva shared a post, 1ย day, 22ย hours ago

A Free Jira Position Opening Template for Recruitment Teams

The quality of the hiring process defines the quality of the teams working in your organization. Thatโ€™s why itโ€™s paramount to ensure that this process is well-organized and built upon best practices. Using templates in Jira for recruitment tasks is a great way to achieve this. They allow you to document your approaches and policies, promote consistency, and simply save time.

In this article, we explain how to create a position opening template for Jira in two different ways. We also provide you with a reusable checklist template, which you can copy and paste into your Jira task. But first, letโ€™s decide what type of template you need.

Zrzut ekranu 2026-03-05 191343
Story
@laura_garcia shared a post, 2ย days, 4ย hours ago
Software Developer, RELIANOID

๐Ÿ” ๐— ๐—ผ๐˜€๐˜ ๐—ฐ๐—ผ๐—บ๐—ฝ๐—ฎ๐—ป๐—ถ๐—ฒ๐˜€ ๐˜๐—ต๐—ถ๐—ป๐—ธ ๐—ป๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ถ๐˜€ ๐—ฎ๐—ฏ๐—ผ๐˜‚๐˜ ๐˜๐—ผ๐—ผ๐—น๐˜€.

๐Ÿ” ๐— ๐—ผ๐˜€๐˜ ๐—ฐ๐—ผ๐—บ๐—ฝ๐—ฎ๐—ป๐—ถ๐—ฒ๐˜€ ๐˜๐—ต๐—ถ๐—ป๐—ธ ๐—ป๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ถ๐˜€ ๐—ฎ๐—ฏ๐—ผ๐˜‚๐˜ ๐˜๐—ผ๐—ผ๐—น๐˜€. Firewalls. WAFs. IDS. Monitoring platforms. But the truth is simpler: ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐˜€๐˜๐—ฎ๐—ฟ๐˜๐˜€ ๐˜„๐—ถ๐˜๐—ต ๐—ฎ๐—ฟ๐—ฐ๐—ต๐—ถ๐˜๐—ฒ๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ. At RELIANOID, we design our ๐—ฅ๐—˜๐—Ÿ๐—œ๐—”๐—ก๐—ข๐—œ๐—— ๐—Ÿ๐—ผ๐—ฎ๐—ฑ ๐—•๐—ฎ๐—น๐—ฎ๐—ป๐—ฐ๐—ฒ๐—ฟ following the principles of ๐—œ๐—ฆ๐—ข/๐—œ๐—˜๐—– ๐Ÿฎ๐Ÿณ๐Ÿฌ๐Ÿฏ๐Ÿฏ, the international framework for secure netwo..

iso_iec_ 27033_compliance_relianoid
Story
@laura_garcia shared a post, 3ย days, 5ย hours ago
Software Developer, RELIANOID

๐Ÿ”Ž Understanding IP Forwarding and Security

When deploying load balancers, gateways, or firewalls, IP forwarding directly impacts how traffic moves between interfaces โ€” and how secure your architecture really is. Weโ€™ve created a clear diagram explaining: โœ” What IP forwarding is โœ” When itโ€™s required (L4 vs L7) โœ” The main security risks โœ” Best ..

ip forwarding security diagram relianoid