Google will not be spared by the current reorganizations affecting GAFAM, and new technologies in general. The company has announced that it will be laying off…
Latest Articles - Page 2
Securing SSH with a Yubikey
As we talked about recently, a Yubikey can be used to add a layer of physical security to any remote access (applications, servers) but also sometimes hardware (a telephone, for…
WProcket Review: Boost Your Website Speed and Performance
WP Rocket is a popular caching plugin for WordPress that improve website performance by optimizing page speed, reducing page load time, and enhancing user experience. It…
Discord launches another massive round of layoffs
After another wave of layoffs at Twitch and Google, it’s now the turn of Discord to be affected. Back in August, 4% of Twitch’s workforce was fired. But this time…
Firewatch available for under $2
Steam is renowned for its regular sales. This time, for less than $2, you can play one of the most original games of recent years: Firewatch.…
India is definitely not messing around with the tech giants anymore
India is reversing course and taking a rather abrupt regulatory turn for tech companies. And not everyone is happy about it. It’s quite a turnaround for India in 2023. The…
The GPT store is now available
OpenAI has announced the launch of its very first store, where users can download personalised chatbots known as GPTs. Two months ago, OpenAI launched tools for…
Azure Cost CLI – A tool to track Microsoft Azure costs
If you use the Microsoft Azure ecosystem, the Azure Cost CLI can be very useful for tracking costs. Depending on what you do with your Azure instances and services, the…
Yubico YubiKey 5 NFC Review: Is It the Best 2FA Key?
Are you tired of constantly worrying about the security of your online accounts? We’ve been testing out the YubiKey 5 NFC by Yubico, and we’re impressed…
What is a Yubikey and why is it useful?
Yubikeys are USB keys marketed by Yubico. What makes them interesting is that they are physical authentication devices. Several options are available: U2F, 2FA, PGP, etc. These keys are used…