Red Hat nyilvános
[search 0]
Több

Download the App!

show episodes
 
The political musings of two of DC's most devoted Trump supporters. We bring you weekly discussions of current events and add our own spin and flavor. Check back weekly for new episodes! Check out our website at: www.redhatchat.com Email us with comments or feedback at: redhatfeedback@gmail.com. If you’d like to donate, click here: paypal.me/flakeybrunette. You can also donate through Patreon at patreon.com/flakeybrain. We’ll give you a shout out on the show and all proceeds will go towards ...
 
Loading …
show series
 
Building on our previous discussion on First Mile Observability (Red Hat X Episode 123 - April 26, 2022), we’ll focus on tools and methods organizations can use to optimize their Enterprise Observability Pipelines. Specifically, we’ll discuss 1) Fluentd and Fluent Bit - the evolution of these open-source projects for data collection and transport t…
 
threat detection at runtime is a crytical component of securing containers and cloud. how can you spot malicious activity in a dynamic orchestrated environment based on kubernetes? Today we will discuss runtime security practices using Red Hat opensource.The Red Hat X podcast series által
 
Event-sourcing has been around for a long time. When humans first created money thousands of years ago, accountants invented the earliest forms of event-sourcing when they realized it was not a good idea to throw away data while keeping track of other people's money. Fast forward to today, accountants continue to use event-sourcing. It may surprise…
 
Have you ever wondered how a geo-distributed app such as a Slack-like corporate messenger is architected and functions? How hundreds of microservices are deployed and communicate across distant geographies? How thousands of user messages and events flow in real-time across the countries? How are petabytes of data stored and accessed across continen…
 
Making a data pipeline fit for machine learning use cases requires more than just additional data monitoring. Furthermore, bringing machine learning into production has traditionally required a lot of manual setup and configuration, even for toy ML pipelines. These manual methods are not reproducible, don’t autoscale, require significant technical …
 
Ansible Automation Platform extends beyond traditional tools for server and software installations, to encompass the entirety of IT infrastructure, including network resources. The Infoblox BloxOne Collections for Ansible Automation Platform is a package of modules and plug-ins that allow managing BloxOne DDI objects and functions through APIs that…
 
Zero Trust is a security strategy which is generating a lot of buzz. Supply chain security is a topic that is so critical that the US White House issued an executive order mandating it. Join Glen Kosaka, Head of Product Security for NeuVector, as he explains why these are hot topics and how they affect the security controls for container and Kubern…
 
You can connect your Kubernetes cluster with GitLab to deploy, manage, and monitor your cloud-native solutions. The agent allows you to communicate with your cluster, enable a cache of Kubernetes objects, and much more. Then add in Infrastructure as code (IaC) scanning to make sure what you are deploying into your cluster won’t compromise your syst…
 
As organisations grow their cloud initiatives, there is always a deadly undercurrent growing beneath the surface: waste. Multiple teams solving the same problems, over and over again, in different ways, using different technologies every time. This is remedied with a heavy dose of central control, which only leads to stifled innovation and excessiv…
 
Web 1,2, and 3 have privacy issues and problems with the perimeter that vanished. Aronetics features Jerod Brennen of Brennen Consulting to join our conversation that discover issues with black boxes in your home or business and the complex implicit trust. How could you secure devices on the edge on a unsecure place? Explore limits of ignorance on …
 
It's common to hear "everything is so complicated nowadays" followed by a list of common tech industry scapegoats. Kubernetes, front end frameworks, microservices, "hip" technologies. It's a relatable reaction but beyond being cathartic it's a little off the mark. This feeling boils down to a real increase in cognitive load - and not cognitive load…
 
Infrastructure is one of the four pillars of IT Modernization, along with the Development Process, Application Architecture and Deployment methodology. Leveraging the promise of Cloud Native means using the best of each of these. However, most organizations have a spectrum of applications in their portfolio to manage from the traditional VM based t…
 
Moving to the cloud and edge comes with big rewards such as new use-cases and business opportunities. But how to efficiently build cloud and edge applications can be a confusing journey, mainly due to the lack of managed platforms that unifies Developer Experience (DX), ZeroOps Experience, and a Reactive Runtime. With Kalix, we set out to create a …
 
In this podcast, Dhiraj Sehgal, Director, Product and Solution Marketing for Tigera will talk about key takeaways shared by Openshift and Calico enterprise users to address the security and compliance issues with active security initiatives. Tigera inventor of Calico, one of the most widely deployed Kubernetes CNI in the world with over 2M nodes an…
 
As companies continue to embrace containers and Kubernetes at a rapid pace, there’s a growing need to address security. Security is one of the major concerns with container and Kubernetes adoption. Security issues continue to cause delays in deploying containerized applications into production. Therefore, security needs to be “baked in” to DevOps w…
 
Enterprise IT Leaders are working to figure out what Cloud Native means to their organizations and how to get there. Many leaders are looking out over a chasm, a gulf between what their organization looks like now and a distant “destination” that isn’t distinctly clear. How do you build for the future, without throwing out all the applications and …
 
A basic introduction to the Elixir programming language and its ecosystem from a developer who has spent the last five writing and deploying modern applications in it. If you've never heard of Elixir, it is a dynamic, functional language that has seen strong uptake in the web development with additional competencies in IoT and recently machine lear…
 
In the last episode we learned about Backstage, an open platform for building developer portals, and how it has evolved into a global open source community since Spotify released it in 2020. Now, let’s take a look at who uses Backstage in the wild, common use cases, and where the project is headed in the future.…
 
In this episode we discuss the impacts of some of the latest vulnerabilities and how Dynatrace can help prevent the exploits of such vulnerabilities. We will also cover general trends in cyber defense, and why it is harder to defend than attack and what role does AI play in modern cyber security.Dynatrace által
 
Spotify’s mission is to unlock the power of human creativity by creating opportunities for artists and fans alike. And underpinning that mission are thousands of developers managing tens of thousands of software components. So add unlocking developer creativity to that list — streamlining their workflows, making it easier to share knowledge, and ge…
 
LINBIT SDS is a software-defined storage, that perfectly fits with Red Hat's OpenShift. It provides persistent volumes, exposed through the CSI interface. You can use it to build out of internal storage devices the persistent volumes for your cloud-native container workload. While it was initially designed for the on-prem data center, it is also a …
 
Akka is a toolkit for building scalable, resilient, and resource-efficient applications on the JVM in Java or Scala. With Akka, you can build applications composed of a single JVM to a fleet of JVMs distributed across a cluster of servers. We will tour Akka from the humble actor up to the systems level and how Akka is used by some of the world’s mo…
 
Loading …

Gyors referencia kézikönyv

Google login Twitter login Classic login