Join us

ContentUpdates from The Open Source Security Foundation (OpenSSF) is a...
Link
@kala shared a link, 4 months ago
FAUN.dev()

Inside Cursor - Sixty days with the AI coding decacorn

Cursor is shaking up recruiting by treating the hiring process as more about the person than the job, resulting in a fast-growing team of exceptional individuals drawn in by the company's compelling mission and focus on challenging technical problems. Women in product and engineering roles are a kno.. read more  

Link
@kala shared a link, 4 months ago
FAUN.dev()

Introducing structured output for Custom Model Import in Amazon Bedrock

Amazon Bedrock’s Custom Model Import just got structured output support. Now LLMs can lock their responses to your JSON schema - no prompt hacks, no cleanup after... read more  

Link
@kala shared a link, 4 months ago
FAUN.dev()

LaTeX, LLMs and Boring Technology 

LLMs are tearing down LaTeX's old walls. Syntax hell, cryptic errors, clunky formatting - easier now. Whether baked into editors or running solo, these models smooth the pain. Why does it work so well? LaTeX has history. Mountains of examples. It's the perfect training set. That puts newer contender.. read more  

Link
@kala shared a link, 4 months ago
FAUN.dev()

Building a Healthcare Robot from Simulation to Deployment with NVIDIA Isaac

NVIDIA just droppedIsaac for Healthcare v0.4, and it’s a big one. Headliner: the newSO-ARM starter workflow- a full-stack sim2real pipeline built for surgical robotics. It covers the whole loop: spin up synthetic and real-world data capture, train withGR00t N1.5, and deploy straight to 6-DOF hardwar.. read more  

Link
@kala shared a link, 4 months ago
FAUN.dev()

The Fatal Math Error Killing Every AI Architecture - Including The New Ones

LLMs are fading as JEPA (Joint Embedding Predictive Architecture) emerges with joint, embedding, predictive architecture. JEPA is a step towards true intelligence by avoiding the flat, finite spreadsheet trap of Euclidean space and opting for a toroidal model... read more  

Link
@devopslinks shared a link, 4 months ago
FAUN.dev()

Visibility at Scale: How Detects Sensitive Data Exposure

Segment gutted its old permissions table—bloated, slow, tangled in logic - and replaced it with a lean, service-based setup. The new stack runs onPostgres,Redis, and a sharply tunedGo API, cutting query times from 1400ms to under 100ms. Clean, fast, and centralized... read more  

Visibility at Scale: How Detects Sensitive Data Exposure
Link
@devopslinks shared a link, 4 months ago
FAUN.dev()

Terraform vs. Pulumi vs. Crossplane: Choosing the right IaC Tool for your platform

Terraform, Pulumi, and Crossplane take very different routes to Infrastructure as Code.Terraformsticks to a declarative HCL model with a massive provider ecosystem.Pulumiflips the script—developers write infrastructure in real languages, so logic is testable and dynamic.Crossplane? It runs inside Ku.. read more  

Terraform vs. Pulumi vs. Crossplane: Choosing the right IaC Tool for your platform
Link
@devopslinks shared a link, 4 months ago
FAUN.dev()

Notes on switching to Helix from vim

Helix keeps things lean - and that's the point. It ships withLSP support, multi-cursor editing, and smart search baked in. No dotfile gymnastics required. That alone has peeled some loyalists off Vim and Neovim. Still rough around the edges. No persistent undo. No auto-reload. Markdown support's a b.. read more  

Notes on switching to Helix from vim
Link
@devopslinks shared a link, 4 months ago
FAUN.dev()

How Google, Amazon, and CrowdStrike broke millions of systems

AWS. Google Cloud. Azure. CrowdStrike. All hit hard by dumb bugs with big blast radii - race conditions, nulls, misfired configs. Small cracks. Massive fallout. AWS's DNS automation knocked out its DynamoDB endpoint, dragging 113 services down with it. Google Cloud’s global APIs fell over from a str.. read more  

How Google, Amazon, and CrowdStrike broke millions of systems
Link
@devopslinks shared a link, 4 months ago
FAUN.dev()

Creating VMs in separate ZFS filesystems

A dev split KVM/QEMU VMs out of a shared ZFS directory and into their own ZFS filesystems. Why? Snapshot rollbacks. Finer-grained storage control. Clean. The new setup rides a fresh ZFS pool tuned with a 64KBrecordsizefor QCOW2 images. That lines up virtual disk performance with the real IO under th.. read more  

The Open Source Security Foundation (OpenSSF) is an industry-backed foundation focused on strengthening the security of the global open source software ecosystem. It brings together major technology companies, cloud providers, open source communities, and security experts to address systemic security challenges that affect how software is built, distributed, and consumed.

OpenSSF was launched in 2021 and operates under the Linux Foundation, combining efforts from earlier initiatives such as the Core Infrastructure Initiative (CII) and industry-led supply chain security programs. Its mission is to make open source software more trustworthy, resilient, and secure by default, without placing unrealistic burdens on maintainers.

The foundation works across several key areas:

- Supply chain security: Developing frameworks, best practices, and tools to secure the software lifecycle from source to deployment. This includes stewardship of projects like sigstore and leadership on SLSA (Supply-chain Levels for Software Artifacts).

- Security tooling: Supporting and incubating open source tools that help developers detect, prevent, and remediate vulnerabilities at scale.

- Vulnerability management: Improving how vulnerabilities are discovered, disclosed, scored, and fixed across open source projects.

- Education and best practices: Publishing guidance, training, and maturity models such as the OpenSSF Best Practices Badge Program, which helps projects assess and improve their security posture.

- Metrics and research: Advancing data-driven approaches to understanding open source security risks and ecosystem health.

OpenSSF operates through working groups and special interest groups (SIGs) that focus on specific problem areas like securing builds, improving dependency management, or automating provenance generation. This structure allows practitioners to collaborate on concrete, actionable solutions rather than high-level policy alone.

By aligning maintainers, enterprises, and security teams, OpenSSF plays a central role in reducing large-scale risks such as dependency confusion, compromised build systems, and malicious package injection. Its work underpins many modern DevSecOps and cloud-native security practices and is increasingly referenced by governments and enterprises as a baseline for secure software development.