Searching We.Love.Privacy.Club

Twts matching #blog
Sort by: Newest, Oldest, Most Relevant

Open Source PaaS Cozystack Becomes a CNCF Sandbox Project
On February 28, members of the CNCF Technical Oversight Committee completed their voting and unanimously accepted Cozystack, a platform for building private clouds and PaaS, into the CNCF Sandbox. The project is currently undergoing the onboarding… ⌘ Read more

⤋ Read More

Computers in school (updated)

Introduction

A much shorter version of this post was initially published on
2022-05-23 (Pungenday, the 70 day of Discord in the YOLD 3188) in my
gemlog at:

gemini://gem.hack.org/log/computers-in-school.gmi

The text has been edited after speaking with some old school mates and
trying to remember more. I also added a few photos.

The beginning

When I started upper secondary school as a sixteen year-old in 1988 my
school had what I think were IBM PC/XT computers, one classroom of
… ⌘ Read more

⤋ Read More

Computers in school (updated)

Introduction

A much shorter version of this post was initially published on
2022-05-23 (Pungenday, the 70 day of Discord in the YOLD 3188) in my
gemlog at:

gemini://gem.hack.org/log/computers-in-school.gmi

The text has been edited after speaking with some old school mates and
trying to remember more. I also added a few photos.

The beginning

When I started upper secondary school as a sixteen year-old in 1988 my
school had wha … ⌘ Read more

⤋ Read More

The return of the tilde
As some of you may have noticed my web page is now under /~mc instead
of just /mc. This is a return to olden times.

The Apache web server, and probably many other web servers, had a
simple way of adding personal web pages for local users. This meant
that an URL ending with ~mc led directly to a subdirectory of user
mc’s home directory. Whatever they put in that directory was
immediately available on the Intertubes! Neat, huh?

We need to bring this back to the modern net! Many tilde pubnixe … ⌘ Read more

⤋ Read More

Computers in school

Introduction

A version of this post was initially published on 2022-05-23
(Pungenday, the 70 day of Discord in the YOLD 3188) in my gemlog at:

gemini://gem.hack.org/log/computers-in-school.gmi

The text has been edited after speaking with some old school mates and
trying to remember more. I also added a few photos.

The beginning

When I started upper secondary school as a sixteen year-old in 1988 my
school had what I think were IBM PC/XT computers, one classroom of
16(?) computers with co … ⌘ Read more

⤋ Read More

The VTech Socratic method
We’ve had a lot of fun with VTech’s computers in the past on this blog. Usually, they’re relatively spartan computers with limited functionality, but they did make something very interesting in the late 80s. The Socrates is their hybrid video game console/computer design from 1988, and today we’ll start tearing into it. ↫ Leaded Solder web log Now we’re in for the good stuff. A weird educational computer/game console/toy thing from the late ’80s, by VTech. I have a massive soft s … ⌘ Read more

⤋ Read More

How to build and deliver an MCP server for production
In December of 2024, we published a blog with Anthropic about their totally new spec (back then) to run tools with AI agents: the Model Context Protocol, or MCP. Since then, we’ve seen an explosion in developer appetite to build, share, and run their tools with Agentic AI – all using MCP. We’ve seen new […] ⌘ Read more

⤋ Read More

Fluent Bit v4.0: Celebrating new features and 10th anniversary
The Fluent Bit maintainers have exciting news to share! Fluent Bit version 4 is out and just in time to celebrate the project’s 10-year anniversary. The journey: From embedded logging to multi-Signal observability With over 15… ⌘ Read more

⤋ Read More

Building trust with OpenID Federation trust chain on Keycloak
OpenID Federation 1.0 provides a framework to build trust between a Relying Party and an OpenID Provider that have no direct relationship so that the Relying Party can  send OIDC/OAuth requests to the OpenID Provider without being previously… ⌘ Read more

⤋ Read More

LitmusChaos at KubeCon + CloudNativeCon Europe 2025: A Recap
The cloud native community recently converged in London from April 1 – 4, 2025, for an incredible edition of KubeCon + CloudNativeCon Europe. From our perspective at LitmusChaos, it was a week filled with inspiring sessions,… ⌘ Read more

⤋ Read More

Prepare your application landscape for zero trust with Keycloak 26.2
Strong identity and access management is a key component of a zero trust architecture for cloud native applications. Keycloak is well-known for its single-sign-on capabilities based on open standards. It provides you all the building blocks… ⌘ Read more

⤋ Read More

Erlang Solutions: Reduce, Reuse… Refactor: Clearer Elixir with the Enum Module

“When an operation cannot be expressed by any of the functions in the Enum module, developers will most likely resort to reduce/3.”

From the docs for Enum.reduce/3

In many Elixir applications, I find Enum.reduce is used frequently. Enum.reduce can do anything, but that doesn’t mean it should. In many cases, other Enum functions are more readable, practically as fast, and easier … ⌘ Read more

⤋ Read More

Protecting NATS and the integrity of open source: CNCF’s commitment to the community
When a company contributes a project to the Cloud Native Computing Foundation (CNCF), it’s not just sharing code—it’s making a commitment to the open source community. It’s a pledge to uphold open collaboration, shared community ownership,… ⌘ Read more

⤋ Read More

OSTIF Announces NATS Security Audit Results
OSTIF is proud to share the results of our security audit of NATS.  NATS is an open source project made by Synadia Communications for secure always-on messaging for a variety of digital formats and clients. With… ⌘ Read more

⤋ Read More

Istio publishes results of ztunnel security audit
Passes with flying colors Istio’s ambient mode splits the service mesh into two distinct layers: Layer 7 processing (the “waypoint proxy”), which remains powered by the traditional Envoy proxy; and a secure overlay (the “zero-trust tunnel”… ⌘ Read more

⤋ Read More

Building AuthZed with the power of cloud native: A CNCF success story
At the Cloud Native Computing Foundation (CNCF), we celebrate organizations that turn cloud native technologies into real-world impact. AuthZed, a CNCF Silver member, is one such story—a company built from the ground up on open source,… ⌘ Read more

⤋ Read More

These Kubernetes mistakes will make you an easy target for hackers
Kubernetes is exceedingly powerful for orchestrating containerized applications at scale. But without proper monitoring and observability—especially in self-managed infrastructure—it can quickly become a security disaster waiting to happen. This is not due to inherent flaws in… ⌘ Read more

⤋ Read More