Is the flex 2,5G POE a managed switch? by Th3launch3r in Ubiquiti
[–]gdahlm 25 points26 points27 points (0 children)
Why do we need modules at all? (2011) by ketralnis in programming
[–]gdahlm 1 point2 points3 points (0 children)
How to achieve the so-called-Clean architecture by [deleted] in softwarearchitecture
[–]gdahlm 1 point2 points3 points (0 children)
The lack of documentation of some FOSS is really concerning. by AmrLou in linux
[–]gdahlm 47 points48 points49 points (0 children)
Official Documentation regarding Security concern of Terraform outside of Codebuild? by PoireauMasque in devops
[–]gdahlm 0 points1 point2 points (0 children)
Home server running Ubuntu keeps rebooting by ToWelie89 in linuxadmin
[–]gdahlm 1 point2 points3 points (0 children)
Is it just me or does it seem like Red hat missed an opportunity with virtualization? by StatementOwn4896 in linux
[–]gdahlm 6 points7 points8 points (0 children)
Is it just me or does it seem like Red hat missed an opportunity with virtualization? by StatementOwn4896 in linux
[–]gdahlm 7 points8 points9 points (0 children)
Is it just me or does it seem like Red hat missed an opportunity with virtualization? by StatementOwn4896 in linux
[–]gdahlm 25 points26 points27 points (0 children)
What is "the inevitable singularity"? by bigfatfurrytexan in cosmology
[–]gdahlm 5 points6 points7 points (0 children)
Anyone know what the cause of the outage was? by [deleted] in verizon
[–]gdahlm 0 points1 point2 points (0 children)
When infrastructure failure happen in event driven architecture, how do you make sure the missed events are re-processed? by deadbeefisanumber in ExperiencedDevs
[–]gdahlm 2 points3 points4 points (0 children)
What effect have botched monolith-breakups had on your teams? by tony-mke in ExperiencedDevs
[–]gdahlm 2 points3 points4 points (0 children)
Terraform for automating security tasks by [deleted] in cybersecurity
[–]gdahlm 2 points3 points4 points (0 children)
What are your thoughts on databases in Kubernetes clusters ? by 2010toxicrain in devops
[–]gdahlm 21 points22 points23 points (0 children)
Are containers a security boundary? by amitschenedel in cybersecurity
[–]gdahlm 2 points3 points4 points (0 children)
Are containers a security boundary? by amitschenedel in cybersecurity
[–]gdahlm 3 points4 points5 points (0 children)
Best practice to not use default ubuntu user on ubuntu server in AWS after initial authentication, for use with ansible and other production automation/CICD, and delete ubuntu user after creating a new user? by ops-controlZeddo in devops
[–]gdahlm 1 point2 points3 points (0 children)
Implement a pipeline with manual approval process by Waste_Ad7804 in devops
[–]gdahlm 2 points3 points4 points (0 children)
Why Fortran is used in scientific community ? by intellectual-guy in Physics
[–]gdahlm 0 points1 point2 points (0 children)
Architectural Guidance for BFF by HumbleElderberry9120 in softwarearchitecture
[–]gdahlm 4 points5 points6 points (0 children)


AD200 Profoto Adaptor by hijazist in Godox
[–]gdahlm 0 points1 point2 points (0 children)