ContentPosts from @mudit009..
Link
@faun shared a link, 2 years, 5 months ago
FAUN.dev()

How we learned to program with atoms in 24 hours flat

QuEra Computing, in collaboration with AWS, sponsored iQuHack 2023, the first-ever public hackathon with a neutral-atom quantum computer. Competing teams used QuEra's Aquila quantum processor on Amazon Braket to develop innovative solutions to the maximum independent set problem over a 24-hour perio.. read more  

How we learned to program with atoms in 24 hours flat
Story
@squadcast shared a post, 2 years, 5 months ago

Top SRE Automation Tools 2023

Using SRE automation tools in incident management is like making your system capable of living almost independently!

Top 5 SRE Automation Tools.jpg
Link
@prathamesh-sonpatki shared a link, 2 years, 5 months ago
SRE, Last9.io

MTTF vs. MTBF vs. MTTD vs. MTTR

MTTF vs. MTBF vs. MTTD vs. MTTR
Link
@prathamesh-sonpatki shared a link, 2 years, 5 months ago
SRE, Last9.io

Using Golanf package in Pyyhon using Gopy

Using Golanf package in Pyyhon using Gopy
Link
@cmakkaya shared a link, 2 years, 5 months ago
DevOps, Upwork

AWS EC2 Instance Connect Endpoint: New feature, Great convenience, Its installation step by step. We will miss you Bastion Host/Jump Box…

Amazon Web Services

AWS gave customers new ways to securely and seamlessly connect their EC2 instances in the public and private subnets without the need for a bastion host, at its annual re:Inforce security conference: AWS Instance Connect Endpoint (EIC Endpoint). Thanks to EIC Endpoint, we now have SSH and RDP connectivity to our EC2 instances using private IP addresses, without using Bastion Host.

In this article, we will create step-by-step an AWS Instance Connect Endpoint to Amazon Elastic Compute Cloud (Amazon EC2) instances in private subnets and we will connect it without the need for a Bastion Host.

Also, we will talk about AWS Instance Connect Endpoint, its feature, limitations, and the ways to use it.

We will do it all step by step.

AWS EC2 Instance Connect Endpoint: New feature, Great convenience, Its installation step by step.  We will miss you Bastion Host/Jump Box…
Story
@daryna_dmytriievska shared a post, 2 years, 5 months ago
MArketing Specialist, Railsware

DMARС explained: how to set up your email security

DMARC is one of the key methods for protecting your emails from spoofing. Yet, only half of Fortune 500 companies have implemented it so far. Is it because the setup is difficult? Absolutely not. Setting up DMARC is really easy and won’t take more than 15 minutes. Learn how to do it with our guide. ..

for_green_background-700x364.png
Link
@faun shared a link, 2 years, 5 months ago
FAUN.dev()

Linux 6.5 Brings New "cachestat" Syscall For Querying Page Cache Stats Of A File

A new system call found in Linux 6.5 is 'cachestat' that allows user-space to query page cache statistics for a file in order to make more informed decisions... read more  

Link
@faun shared a link, 2 years, 5 months ago
FAUN.dev()

Deno 1.35: A fast and convenient way to build web servers

Deno's latest release brings us closer to its vision of making programming simple by offering a stable and high-performance web server API, Deno.serve(). It also improves npm support and adds highly anticipated packages, along with other improvements and bug fixes. Additionally, this release include.. read more  

Deno 1.35: A fast and convenient way to build web servers
Link
@faun shared a link, 2 years, 5 months ago
FAUN.dev()

Computer Vision and Its Application in Facial Recognition and Object Classification.

Computer vision is a field that aims to enable computers to understand and interpret visual data like humans do, using techniques such as the Viola-Jones algorithm for face detection and convolutional neural networks for object classification. Recent advancements include state-of-the-art object dete.. read more  

Computer Vision and Its Application in Facial Recognition and Object Classification.
Link
@faun shared a link, 2 years, 5 months ago
FAUN.dev()

Red Hat strikes a crushing blow against RHEL downstreams

Red Hat has made the decision to no longer provide the source code of Red Hat Enterprise Linux (RHEL) to the public. The code will only be available to paying customers, who are legally restricted from sharing it. This move has significant implications for downstream projects and distributions that .. read more  

Red Hat strikes a crushing blow against RHEL downstreams