Engineering Blog

                            
Avatar

Sirisha Badursha

Discover the Power of Service Meshes and API Gateways with Buoyant and Ambassador

Discover the Power of Service Meshes and API Gateways with Buoyant and Ambassador

Date : May 23Time : 10am CST In the rapidly evolving world of cloud-native applications, understanding the nuances of service meshes and API gateways is crucial for ensuring robust, scalable, and reliable infrastructure. Join us as Buoyant’s Tech Evangelist, Flynn, and Ambassador’s Senior Software Engineer, Alice Wasko, delve into this intricate landscape. In their comprehensive…

Meet Your Storage Needs with Hetzner’s Enhanced Server Lineup

Hetzner has unveiled its upgraded series of dedicated storage servers, tailored to address the ever-growing storage requirements of today’s digital landscape. Combining the speed of NVMe SSDs with the vast capacity of HDDs, these servers are perfect for large data storage, database hosting, and more. Each model, from the entry-level SX65 to the robust SX295,…

Empowering Developers: Feature Flags and Authorization in Focus

Empowering Developers: Feature Flags and Authorization in Focus

Date : May 22 2024Time : 5:00 pm CEST, 11:00 am EDT This webinar highlights the crucial roles of feature flags and authorization in software development. Feature flags, exemplified by Flagsmith, empower developers to control feature deployments and manage testing environments effectively, enabling controlled rollouts and A/B testing. Meanwhile, Cerbos emphasizes the pivotal role of…

Mastering NoSQL: Transitioning from SQL with Ease

Mastering NoSQL: Transitioning from SQL with Ease

Date : May 23 2024Time : 10am PT | 1pm ET | 5pm GMT Transitioning from SQL to NoSQL databases entails embracing a paradigm shift in database management. Developers need to understand the flexibility, scalability, and schema-less nature of NoSQL databases, as well as the diverse data models and querying mechanisms they employ. Data modeling…

Unlocking the Potential: How NIST CSF 2.0 Redefines Cybersecurity Governance

Unlocking the Potential: How NIST CSF 2.0 Redefines Cybersecurity Governance

Date : May 29Time : 8.30 pm (Virtual) The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is a widely recognized set of guidelines and best practices for managing cybersecurity risks. Recently, NIST released version 2.0 of the CSF, marking the first major upgrade in a decade. This update introduces several new requirements,…

From Alerts to Attacks: Let AI Drive Your Security Strategy with Elastic Security

From Alerts to Attacks: Let AI Drive Your Security Strategy with Elastic Security

Traditional SIEMs have long relied on human intervention for effective threat detection and response. However, the emergence of AI-driven security analytics solutions is revolutionizing the landscape of Security Operations Centers (SOCs). Elastic Security, powered by the Elastic Search AI platform, is leading this transformation by replacing manual processes with automated, AI-driven capabilities. With features like…

Innovate with Intelligence: Choosing Google Workspace for AI-Driven Transformation

Innovate with Intelligence: Choosing Google Workspace for AI-Driven Transformation

Google Workspace stands out in the new era of AI-powered productivity and collaboration due to its integrated AI capabilities, collaborative tools, enhanced communication features, advanced security measures, and scalability. By leveraging AI technology and providing a comprehensive suite of productivity tools, Google Workspace empowers organizations to work smarter, collaborate effectively, and stay secure in today’s…

Mastering Terraform: Workshop for Infrastructure Automation

Mastering Terraform: Workshop for Infrastructure Automation

Standardize Infrastructure Automation with Terraform 1. Single Workflow for ProvisioningTerraform offers organizations a unified approach to automate the provisioning of their infrastructure across various environments, including cloud, private datacenters, and SaaS platforms. This single workflow streamlines the process of infrastructure deployment and management, providing consistency and efficiency. 2. Continuous Lifecycle ManagementWith Terraform, organizations can continuously…

Securing the Ballot: Safeguarding Digital Voting Systems for Tomorrow

Securing the Ballot: Safeguarding Digital Voting Systems for Tomorrow

With elections on the horizon and memories of past voting controversies fresh, the spotlight is on the security of digital voting booths. Ensuring the integrity of our democracy hinges on a secure voting system and public trust in its safety. Yet, concerns about cyber threats persist. Despite these challenges, digital voting remains the most efficient…

A New Era of Security: Microsoft’s Commitment to Protecting Digital Estates

A New Era of Security: Microsoft’s Commitment to Protecting Digital Estates

Microsoft is undergoing a significant security overhaul in response to recent high-profile attacks, with CEO Satya Nadella declaring security as the company’s “top priority.” In a memo obtained by The Verge, Nadella emphasized the importance of prioritizing security above all else to every one of Microsoft’s 200,000+ employees. He urged them not to make security…