Engineering Blog

                            

Blog – 1 Column & Sidebar

Free Event: See How Generative AI Can Transform Your Business

Struggling to understand how generative AI can benefit your business? Feeling overwhelmed by the potential of this rapidly evolving technology? You’re not alone. But the good news is, generative AI offers a wealth of untapped potential waiting to be unleashed. Join the Generative AI Success Stories event on June 12th! This free, non-member event hosted…

Crossplane v1.16 Delivers Enhanced Manageability and Developer Experience

Crossplane is excited to announce the release of v1.16.0! This latest version focuses on stability, performance, and empowering the developer community. Let’s dive into the highlights: Community Engagement Soars! v1.16 boasts a record number of first-time contributors, demonstrating the project’s growing community involvement. A huge thank you to everyone who contributed for the first time,…

Empowering Developers: Feature Flags and Authorization in Focus

Date : May 22 2024Time : 5:00 pm CEST, 11:00 am EDT This webinar highlights the crucial roles of feature flags and authorization in software development. Feature flags, exemplified by Flagsmith, empower developers to control feature deployments and manage testing environments effectively, enabling controlled rollouts and A/B testing. Meanwhile, Cerbos emphasizes the pivotal role of…

KubeFM: Building a Home Lab on Kubernetes with Talos (ft. Mircea-Pavel Anton)

Have you ever dreamt of taking your home lab to the next level with the power and flexibility of Kubernetes? Today, we’re thrilled to unlock some valuable insights for you! This blog post delves into the recent KubeFM episode featuring Mircea-Pavel Anton. Mircea embarked on a fascinating journey, migrating his home lab to the exciting…

Achieve Namespace Isolation with Calico in Kubernetes

Many DevOps and platform engineers we talk to share a common concern: securing their Kubernetes clusters. By default, Kubernetes allows unrestricted communication between workloads, creating a vulnerability. An attacker breaching one container could move freely within the cluster, compromising others. The “least privilege” approach, while ideal for restricting workload communication, can leave your applications exposed…

Mastering NoSQL: Transitioning from SQL with Ease

Date : May 23 2024Time : 10am PT | 1pm ET | 5pm GMT Transitioning from SQL to NoSQL databases entails embracing a paradigm shift in database management. Developers need to understand the flexibility, scalability, and schema-less nature of NoSQL databases, as well as the diverse data models and querying mechanisms they employ. Data modeling…

Unlocking the Potential: How NIST CSF 2.0 Redefines Cybersecurity Governance

Date : May 29Time : 8.30 pm (Virtual) The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is a widely recognized set of guidelines and best practices for managing cybersecurity risks. Recently, NIST released version 2.0 of the CSF, marking the first major upgrade in a decade. This update introduces several new requirements,…

From Alerts to Attacks: Let AI Drive Your Security Strategy with Elastic Security

Traditional SIEMs have long relied on human intervention for effective threat detection and response. However, the emergence of AI-driven security analytics solutions is revolutionizing the landscape of Security Operations Centers (SOCs). Elastic Security, powered by the Elastic Search AI platform, is leading this transformation by replacing manual processes with automated, AI-driven capabilities. With features like…