Articles:
- Creating container images that won't drive you crazy
- Supply Chain levels for software Artifacts
- New Hyena AI tech that might make Transformer AI obsolete
- How LTSM networks work
- Keep PettiBoot for Odroid HC4 etc
- Better way of keeping track instead of using CVE's (for vulnerability management) Known Exploited Vulneraibilities Catalog
- MS threat matrix for devoops
- LUKS KDF's need to be upgraded between os updates
- 100 Must have cli linux apps
Software:
- ConsentOMatic- Lets you automatically reject cookie notices
- Nice Simple Icons