Engineering Blog

                            

Blog

Welcome to 01Cloud Engineering Blog!

Turbocharge Your IT Operations: 3 Must-Try Automations for Maximum Efficiency

Turbocharge Your IT Operations: 3 Must-Try Automations for Maximum Efficiency

If you’ve ever wished for a magic button to handle the repetitive and time-consuming aspects of IT operations, automation is your answer. From keeping an eye on system health to pushing patches, automation takes the heavy lifting off your plate. Here are three smart ways to automate your ITOps for a more efficient and smoother…

Unlocking Peak Kubernetes Performance: Overcoming Networking Challenges with Chelsio T6 SmartNIC

Unlocking Peak Kubernetes Performance: Overcoming Networking Challenges with Chelsio T6 SmartNIC

Date : Nov 7, 1:30 PM – Nov 8, 1:30 PM (GMT+5:30) As Kubernetes continues to dominate the world of container orchestration, the complexity of networking in multi-host environments becomes more apparent. While Kubernetes excels at managing containerized applications, networking performance often struggles, especially when high throughput and low latency are required. Traditional networking solutions can lead to CPU…

Enable modern privileged access management with HashiCorp Boundary

Enable modern privileged access management with HashiCorp Boundary

September 18 12:00 PM EDT | September 19 9:00 AM BST | September 25 10:00 AM SGT Speakers : Dan Rohan Product Manager, Boundary Van Phan Technical Product Marketing Manager, Boundary and Consul Revolutionizing Secure Access with HashiCorp Boundary: Adopting a Modern, Identity-Driven Approach Traditional workflows for accessing infrastructure resources and applications often rely heavily…

The Infrastructure Cloud: Security Lifecycle Management (Europe)

The Infrastructure Cloud: Security Lifecycle Management (Europe)

Date : September 17Time : 02:30 PM GMT+5:30 | 1 hr Enhancing Cloud Security with HashiCorp’s Security Lifecycle Management In today’s fast-paced cloud environments, ensuring the security of sensitive data and infrastructure elements like secrets, certificates, keys, and customer information is a top priority for operations and security teams. However, managing security at scale in…

Deploying policy-guarded infrastructure – Creating and enforcing guardrails (Americas and Europe)

Deploying policy-guarded infrastructure – Creating and enforcing guardrails (Americas and Europe)

Date : September 17Time : 8.30 PM GMT+5.30 Streamlining Multi-Cloud Security with Policy-as-Code and Terraform As organizations expand their cloud environments to meet growing demands, rapid provisioning opens up new possibilities for innovation and growth. However, the speed of cloud infrastructure deployment can also introduce security vulnerabilities if manual checks are not enforced consistently. These…

The Future of Internal Development: Leveraging vClusters

The Future of Internal Development: Leveraging vClusters

Unlocking the Potential of Your Developers In today’s fast-paced software development landscape, providing developers with efficient and scalable tools is essential for driving innovation. Kubernetes, a popular container orchestration platform, has emerged as a powerful solution for managing complex applications. However, setting up and managing Kubernetes clusters can be resource-intensive and time-consuming. Enter Virtual Kubernetes…

Protecting Open Source: A Closer Look at Security Risks

Protecting Open Source: A Closer Look at Security Risks

The OpenJS Foundation, a key organization supporting JavaScript projects, recently faced a wake-up call regarding open-source security. The discovery of a backdoor planted in the XZ Utils library exposed vulnerabilities in the way open-source contributions are vetted. Trust vs. Security: A Lesson Learned Robin Ginn, executive director of the OpenJS Foundation, emphasizes the distinction between…

Beyond the Perimeter: Zero Trust for Modern SaaS Environments

Beyond the Perimeter: Zero Trust for Modern SaaS Environments

In today’s digital age, where sensitive data is increasingly stored in the cloud and organizations rely heavily on SaaS applications, ensuring robust security measures is paramount. This blog post will delve into the importance of Zero Trust principles for safeguarding SaaS applications, focusing on the critical role of CI/CD pipelines in development workflows. The Need…

Level Up Your Deployment Game with IfC

Level Up Your Deployment Game with IfC

In today’s fast-paced software development landscape, efficient and reliable application deployment is crucial. Traditional methods often involve complex infrastructure management, requiring deep expertise in Infrastructure as Code (IaC). However, a new approach, Infrastructure from Code (IfC), is emerging to simplify this process for developers. What is Infrastructure from Code (IfC)? IfC provides developers with a…

Unveiling Resilience: A Conversation with LitmusChaos Co-founder Karthik Satchitanand

Unveiling Resilience: A Conversation with LitmusChaos Co-founder Karthik Satchitanand

In this podcast, we delve into the world of Chaos Engineering with Karthik Satchitanand, a principal software engineer at Harness and co-founder and maintainer of LitmusChaos, a CNCF incubated project. In this episode, we explore LitmusChaos, an open-source platform designed specifically for chaos engineering within cloud-native environments. Karthik discusses LitmusChaos’ capabilities, from offering pre-built chaos…