Engineering Blog

                            
Avatar

Konika Sitoula

What’s New in Linkerd 2.16? A Practical Workshop

What’s New in Linkerd 2.16? A Practical Workshop

The Linkerd team is excited to announce the release of Linkerd 2.16! This latest version brings a host of new features and improvements to the popular service mesh platform. Key Highlights of Linkerd 2.16: What You’ll Learn: Join this informative Service Mesh Academy session to delve deeper into Linkerd 2.16 and discover how it can…

DevSecOps Roundtable: Balancing Speed and Security

DevSecOps Roundtable: Balancing Speed and Security

The software supply chain has become a prime target for cyberattacks, making robust security an imperative. DevSecOps offers a promising solution, but integrating security into the development process without hindering speed is a significant challenge. To address this, a roundtable discussion will be held on Monday, August 12th at 1 pm ET. Industry experts will…

5 Reasons Why Kubernetes is Ideal for AI Inference

5 Reasons Why Kubernetes is Ideal for AI Inference

Kubernetes, the industry-standard container orchestration platform, has emerged as a powerful tool for managing AI inference workloads. Its ability to efficiently deploy, scale, and manage complex applications makes it an ideal choice for organizations looking to harness the power of AI. In this blog, we’ll explore five key reasons why Kubernetes is the perfect fit…

Kubernetes 1.30: A Comprehensive Overview of New Features

Kubernetes 1.30: A Comprehensive Overview of New Features

Kubernetes 1.30, codenamed “Uwubernetes,” has arrived, packing a powerful punch with 45 enhancements designed to elevate your container orchestration experience. Let’s delve into the key features that will empower developers and operators alike: Stable Powerhouse: Alpha Innovations: Beta Breakthroughs: Ready to experience the difference? Unlock the full potential of your Kubernetes clusters with our platform….

TRACTOR: Automating the Transition from C to Rust for Security

TRACTOR: Automating the Transition from C to Rust for Security

For years, programmers have wrestled with the memory safety vulnerabilities inherent in C and C++. These vulnerabilities can lead to crashes, security exploits, and unpredictable program behavior. Bug-finding tools have been a bandage solution, but the software engineering community has finally reached a turning point. The answer? Safe programming languages! These languages, like Rust, have…

Thrive in Any Cloud: Building a Secure, Scalable Platform with Kubernetes

Thrive in Any Cloud: Building a Secure, Scalable Platform with Kubernetes

The cloud landscape is ever-evolving, and managing Kubernetes applications across various environments – multi-cloud, edge, and on-premises – can be a complex task. This complexity brings operational and security challenges that require innovative solutions. Empowering Your Cloud Journey This webinar, co-hosted by Kubermatic and Aqua Security, will equip you with the knowledge and strategies to…

Free Up Your Engineers: How Pulumi Copilot Saves Time & Boosts Efficiency

Free Up Your Engineers: How Pulumi Copilot Saves Time & Boosts Efficiency

Do you ever feel like you’re spending more time wrestling with cloud infrastructure than actually building innovative solutions? You’re not alone. Pulumi Copilot, the AI assistant for Pulumi Cloud, is here to change that. This powerful tool leverages artificial intelligence to streamline cloud management, boosting your productivity and simplifying operational tasks for both developers and…

Shift Up Your Security: A Developer’s Guide to Efficiency

Shift Up Your Security: A Developer’s Guide to Efficiency

Calling all cloud-native developers! Struggling to balance development speed with robust security? This webinar is for you! Join us next Wednesday, July 17th, 2024 at 9:00 AM PT for a panel session titled “Empowering Developers: Unlocking Efficiency and Security with Shift-Down Security Practices“. Co-hosted by Intellyx and Nirmata, this session promises valuable insights for developers…

Calling All Developers: Streamline Workflows, Elevate Security with Shift Left Practices

Calling All Developers: Streamline Workflows, Elevate Security with Shift Left Practices

Tired of the code-security tug-of-war? Want a streamlined workflow that prioritizes both? Join Nirmata’s upcoming panel session, “Empowering Developers: Unlocking Efficiency and Security with Shift Left Security Practices.” Partnering with industry experts at Intellyx, we’ll explore the transformative power of Shift Left Security. What is Shift Left Security? This innovative approach integrates security throughout the…

Mastering AWS Security: A Beginner’s Guide

Mastering AWS Security: A Beginner’s Guide

The cloud revolution has transformed how businesses operate, offering scalability, agility, and cost-effectiveness. However, migrating your data, applications, and services to the cloud introduces new security considerations. AWS Security Foundations For Dummies provides a comprehensive and user-friendly guide to securing your AWS environment. Whether you’re a cloud novice or an IT professional seeking to strengthen…