ContentPosts from @truongan8212..
Link
@kaptain shared a link, 1 day, 21 hours ago
FAUN.dev()

Kubernetes 1.35 - New security features

Kubernetes 1.35 is done with legacy baggage. cgroups v1? Deprecated. Image pull credentials? Now re-verified by default—no more freeloading. kubectl SPDY API upgrades? Locked down. You’ll needcreatepermissions just to speak the protocol. Expect breakage if your workflows leaned on old assumptions. U.. read more  

Kubernetes 1.35 - New security features
Link
@kaptain shared a link, 1 day, 21 hours ago
FAUN.dev()

How to Troubleshoot Common Kubernetes Errors

A fresh Kubernetes troubleshooting guide lays out real-world tactics for tracking down 12 common cluster headaches. Think:kubectlsleuthing, poking through system logs, scraping observability metrics, and jumping intodebug containers. The guide breaks down howAIOpsis stepping in, digesting event data.. read more  

How to Troubleshoot Common Kubernetes Errors
Story
@jamesmiller shared a post, 1 day, 21 hours ago

Automating Penetration Testing in CI/CD: A Practical Guide for Developers

All in One SEO Pack SEMrush SquirrelMail Yoast SEO SchemaHero

Automating pentesting in CI/CD helps developers catch vulnerabilities early, reduce MTTR, and keep releases secure without slowing the pipeline. This guide breaks down why automation matters, the tools developers rely on, common mistakes to avoid, and practical steps to build a reliable pentesting workflow inside modern CI/CD pipelines.

Automating Penetration Testing in CI/CD
Story
@elenamia shared a post, 1 day, 21 hours ago
Technical Consultant, Damco Solutions

Google Cloud Services: A Comprehensive Overview for Modern Businesses

Read this blog to learn about Google Cloud Platform services and its key features, pricing, and use cases across industries.

6086042_22246
Link
@kala shared a link, 1 day, 21 hours ago
FAUN.dev()

How to Create an Effective Prompt for Nano Banana Pro

The author details how to effectively prompt Google’s Nano Banana Pro, a visual reasoning model, emphasizing that success relies on structured design documents rather than vague requests. The method prioritizes four key steps: defining the Work Surface (e.g., dashboard or comic), specifying the prec.. read more  

Link
@kala shared a link, 1 day, 21 hours ago
FAUN.dev()

So you wanna build a local RAG?

Skald spun up a full local RAG stack, withpgvector,Sentence Transformers,Docling, andllama.cpp, in under 10 minutes. The thing hums on English point queries. Benchmarks show open-source models and rerankers can go toe-to-toe with SaaS tools in most tasks. They stumble, though, on multilingual prompt.. read more  

Link
@kala shared a link, 1 day, 21 hours ago
FAUN.dev()

Learning Collatz - The Mother of all Rabbit Holes

Researchers trained small transformer models to predict the "long Collatz step," an arithmetic rule for the infamous unsolved Collatz conjecture, achieving surprisingly high accuracy up to 99.8%. The models did not learn the universal algorithm, but instead showed quantized learning, mastering speci.. read more  

Link
@kala shared a link, 1 day, 21 hours ago
FAUN.dev()

200k Tokens Is Plenty

Amp’s team isn’t chasing token limits. Even with ~200k available via Opus 4.5, they stick toshort, modular threads, around 80k tokens each. Why? Smaller threads are cheaper, more stable, and just work better. Instead of stuffing everything into a single mega-context, they slice big tasks into focuse.. read more  

200k Tokens Is Plenty
Link
@kala shared a link, 1 day, 21 hours ago
FAUN.dev()

Google tests new Gemini 3 models on LM Arena

Google’s been quietly field-testing two shadow models,Fierce FalconandGhost Falcon, on LM Arena. Early signs? They're probably warm-ups for the next Gemini 3 Flash or Pro drop. Classic Google move: float a checkpoint, stir up curiosity, then go GA... read more  

Google tests new Gemini 3 models on LM Arena
Link
@kala shared a link, 1 day, 21 hours ago
FAUN.dev()

Practical LLM Security Advice from the NVIDIA AI Red Team

NVIDIA’s AI Red Team nailed three security sinkholes in LLMs:reckless use ofexec/eval,RAG pipelines that grab too much data, andmarkdown that doesn't get cleaned. These cracks open doors to remote code execution, sneaky prompt injection, and link-based data leaks. The fix-it trend:App security’s lea.. read more