Engineering Blog

Engineering

SWE-agent, Open-Source AI: Stronger Alternative to Devin

SWE-agent, Open-Source AI: Stronger Alternative to Devin

Software development is a complex field, and even experienced engineers can encounter bugs and issues from time to time. But what if there was a way to automate some of the troubleshooting process? This is where SWE-agent comes in. SWE-agent is a new system that leverages the power of large language models (LLMs) like GPT-4…

Notary: Building a Secure Software Supply Chain Ecosystem

Notary: Building a Secure Software Supply Chain Ecosystem

Software supply chains are complex, making security a major concern. This video explores the Notary Project, a collaborative effort to secure the software supply chain ecosystem. The Notary Project tackles these challenges by: Join this session to learn how the Notary Project can empower your organization to build a more secure and trustworthy software supply…

Top 10 Reasons to Automate Kubernetes Security with Kyverno

Top 10 Reasons to Automate Kubernetes Security with Kyverno

Struggling to secure your growing Kubernetes environment? Kyverno can help! This video explores the top 10 features of Kyverno, a powerful tool for automating Kubernetes security with policy as code. From flexible policy creation to built-in reporting, Kyverno simplifies security management and streamlines compliance. Plus, the Kyverno family offers additional tools for enhanced JSON support,…

Securing 900 K8s: Mercedes-Benz’s Journey to VAPs

Securing 900 K8s: Mercedes-Benz’s Journey to VAPs

This talk explores how Mercedes-Benz secures their massive Kubernetes environment (over 900 clusters!). While Pod Security Policies (PSPs) were previously used, they’ve been deprecated. The new Pod Security Standards (PSS) lack the flexibility needed for Mercedes-Benz’s complex setup. Watch the video to learn: This talk is ideal for anyone managing large Kubernetes deployments and seeking…

Kubernetes Alert: Backdoor in XZ Utils! Secure Cluster Now!

Kubernetes Alert: Backdoor in XZ Utils! Secure Cluster Now!

This blog post explores the critical backdoor vulnerability (CVE-2024-3094) discovered in XZ Utils, a data compression library used in major Linux distributions. On March 29, 2024, Red Hat disclosed a critical vulnerability (CVSS rating of 10) affecting the latest versions of XZ tools and libraries (versions 5.6.0 and 5.6.1). This stemmed from a cleverly disguised malicious…

Building Meta’s GenAI Infrastructure

Announcing two 24k GPU clusters, Meta marks a significant investment in its AI future. Details on hardware, network, storage, design, performance, and software, crucial for high throughput and reliability in various AI workloads, are shared. These clusters, utilized for Llama 3 training, underscore Meta’s strong commitment to open compute and source, built atop platforms like…