Content Paint

Open Source

PlayStation wants to get gameservers running on Kubernetes. Here's why.

Gaming heavyweight wants a quicker way to deploy new multiplayer games…

Kubernetes security audit warns over 19 issues, unfixed 2019 bugs

NCC Group audit puts the spotlight on API, permissions weaknesses.

Job of the Week: CISO, Canonical

Canonical, sponsor of the widely used Ubuntu Linux distribution, is looking for a new Chief Information Security Officer (CISO) with the role advertised as fully remote. The Stack is making it our latest Job of the Week*. We are doing so with the caveat that the privately held company is

Introducing 6 new Top Level open source ASF projects

The Apache Software Foundation (ASF) has graduated six new open source software projects to “Top Level” status in Q1 of 2023. (Getting Top-Level Project status is essentially a vote of confidence in a project’s community and product governance.) Perhaps interestingly to some, more than half (four of the six)

Pssssst, CTOs: Free, open source ChatGPT alternatives are landing

A complete RLHF pipeline that includes supervised data collection, supervised and reinforcement learning fine-tuning

LinkedIn slashes data processing time 94% by unifying batch and stream jobs with Apache Beam

Data "backfilling" jobs cut from seven hours to 25 minutes

What IS this new open source S3 file client from Amazon?

Amazon has open-sourced a new file client for S3 called Mountpoint for Amazon S3 that makes it “easy” for Linux-based applications to connect directly to Amazon S3 buckets and access objects using file APIs – not something that has always been easy or indeed possible for Linux-based large-scale analytics applications. Mountpoint

Deutsche Bank's Peter Thomas: Execs recognising value of OSS ‘mutualisation’

"Take this Waltz..."

Novel cloud attack pivoted from K8s to Lambda, pulled IAM keys from Terraform

A recent attack tracked by researchers at cloud security company Sysdig saw the attackers use an exposed Kubernetes container to move laterally to the victim’s AWS account – gaining initial access by exploiting a public-facing service in a self-managed Kubernetes cluster hosted inside an AWS cloud account. The company'

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.