6 techniques to reduce cloud observability cost
Cloud observability is really important for most modern organizations in that it dives deep when it comes down to keeping application functionality, problems, and those little bumps in the road along the way, a smooth overall user experience. Meanwhil...
Meet the SDV Committers: Elena Gantner from Eclipse S-CORE
Meet the SDV Committers: Elena Gantner from Eclipse S-CORE In this edition of our Meet the SDV Committers series, we spotlight Elena Gantner, committer to the Eclipse S-CORE project and an emerging voice in the software-defined vehicle (SDV) space. Fro...
What you need to know about Java wrapper classes
Have you ever wondered how Java seamlessly combines its primitive data types with object-oriented programming? Enter wrapper classes, an important but often overlooked Java feature. These special classes bridge the gap between primitive types (like in...
AiSuite: An open-source AI gateway for unified LLM access
The proliferation of large language models (LLMs) has given developers a range of choices. While developers now have access to cutting-edge models from OpenAI, Anthropic, Google, AWS, and numerous other providers, each comes with its own unique API st...
Working with Microsoft 365’s new Copilot APIs
Microsoft has been adding AI features to its Microsoft 365 productivity platform for some time now, even renaming its desktop Office portal app “Microsoft 365 Copilot.” Under the hype is a mix of useful tools that gives you new ways of working wit...
2025 Embedded and IoT Developer Survey: 10th Time is the Charm
2025 Embedded and IoT Developer Survey: 10th Time is the Charm The 2025 edition of the Eclipse Embedded and IoT developer survey is now underway! Take the survey now – it only takes a few minutes. Your insights and opinions will help shape the future...
Meet Zig: The modern alternative to C
The Zig programming language continues its gradual advance into the world of systems programming. Even though it has yet to hit version 1.0, Zig is already in use with several production projects and attracts admirers with its slew of good ideas and ...
How to use editable installs for Python packages
When you install Python packages into a given instance of Python, the default behavior is for the package’s files to be copied into the target installation. But sometimes you don’t want to copy the files—sometimes, you want to link to them, so a...
Anonymity should not be free
I started using the Internet in the early 1990s, when it was mostly used by government officials and academics. Everyone was pretty friendly, and more importantly, everyone was themselves. There was even a system called the finger protocol, where you...
Eclipse Open VSX Registry Security Advisory
Eclipse Open VSX Registry Security Advisory This security advisory provides additional technical details following our initial statement and the corresponding CVE record. TL;DR A vulnerability in the Eclipse Open VSX Registry’s automated publishing s...
How to shift left on finops, and why you need to
One of the most frustrating experiences for IT leaders is receiving a cloud invoice with costs well above expectations. It’s not as bad as a security issue or a major incident in a critical business system, but spiking cloud costs can have a similar...
The private cloud comeback
For years, the dominant cloud narrative emphasized the scalability, flexibility, and ostensibly lower costs of public cloud solutions, compelling thousands of organizations to migrate their operations to these platforms. Today, however, there is a cle...
A Brazilian Dream: Otavio Santana’s Rise Through Open Source
A Brazilian Dream: Otavio Santana’s Rise Through Open Source “Sometimes, all someone needs is to believe it's possible”Brazil stands at the heart of the Global South, shaping global technology and community movements. Follow us as we explore Otav...
Three steps to boost Amazon S3 data security
The amount of data in modern systems has skyrocketed beyond what traditional security tools can handle. As organizations embrace AI to boost productivity, security teams face mounting pressure to protect sensitive information across sprawling cloud in...