Red Hat открытые
[search 0]
Больше

Download the App!

show episodes
 
R
Red Hat Chat

1
Red Hat Chat

Red Hat Chat

Unsubscribe
Unsubscribe
Ежемесячно+
 
The political musings of two of DC's most devoted Trump supporters. We bring you weekly discussions of current events and add our own spin and flavor. Check back weekly for new episodes! Check out our website at: www.redhatchat.com Email us with comments or feedback at: redhatfeedback@gmail.com. If you’d like to donate, click here: paypal.me/flakeybrunette. You can also donate through Patreon at patreon.com/flakeybrain. We’ll give you a shout out on the show and all proceeds will go towards ...
 
Loading …
show series
 
Today’s container technologies, kubernetes being the leader here, focus on CPU & memory as the primary resources when scheduling and managing applications in a distributed environment. But they tend to ignore the impact of storage and network I/O resources today’s containerized applications need. Diamanti considered management of storage and ne…
 
Monday morning special! Take a break from tech with this conversation on working remote. According to GitLab’s 2021 Remote Work Report, 82% of respondents agreed that remote work is the future of work, with nearly as many 80% saying that they would recommend working remotely to a friend. This shows us that the way we work is leading towards remote …
 
Kubernetes adoption and use is gaining traction for all types of services and applications, but for many the database still runs off to one side. In fact, a recent survey conducted by Cockroach Labs and Red Hat shows that 94% of organizations are using Kubernetes in production today -- and that the number one priority they named is architecting for…
 
Today’s container technologies, focus on CPU and memory as the primary resources when scheduling and managing applications in a distributed environment, but they tend to ignore the impact of storage and network I/O resources on containerized applications. Diamanti considered management of storage and network resources as the first-degree problem un…
 
NGINX is not only the most widely web server on the internet, but it’s also the most commonly used data plane for Ingress controllers. In this episode we’ll discuss how NGINX’s microservices technologies – which include an Ingress controller, WAF, and service mesh – add value to OpenShift deployments by giving developers and platform ops teams cont…
 
Kubernetes delivers the greatest flexibility and agility of any infrastructure, but with it comes a level of complexity that makes it impossible to manage manually at scale. Andrew Hillier, co-founder and CTO of Densify, will discuss the latest thinking around capacity operation and how to best handle capacity management for these environments.…
 
Innovation is the goal of every organization today. Whether it is for growth, gaining competitive advantage or just improving the way they do business, it always points back to innovation. The challenge many organizations face when trying to innovate is integration to the siloed legacy systems which are difficult to interact with and certainly not …
 
Adaptigent delivers future-proof solutions that turn yesterday’s legacy systems into tomorrow’s leading-edge applications, in a fraction of the time and cost that system modernization usually requires. With over 30 years’ of industry experience, they have helped over 2,500 organizations across the globe improve their operational efficiency and cust…
 
GT Software is now Adaptigent™ but the change is more than just skin-deep. Adaptigent empowers organizations to unlock the potential of their core systems to enable enterprise-level innovation. Their application, led by the Adaptive Integration Fabric, help IT organizations provide real-time, business-ready results by creating a dynamic, no-code la…
 
Over the past few decades, Public Key Infrastructure (PKI) has grown – both in use cases it enables and the overall footprint within our digital lives. As a result, certificates are everywhere. What has been used to secure websites, networks, and VPNs, has evolved to meet the demands of newer use cases like IoT and containerization. It‘s these new …
 
For more than 50 years, organizations around the world have trusted Entrust to help protect their sensitive data and applications. On this episode, Peter Galvin, Chief Strategy & Marketing Officer of Digital Security Solutions at Entrust, discusses the company’s evolution from its early days focused on physical security to its presence today as…
 
The current state of applications is growing increasingly complex with distributed microservices, multi cloud networks, and rapid development and deployment practices. This makes troubleshooting and securing those applications much more difficult. However, there is a solution and that is data! Traditional troubleshooting and security relied on coll…
 
Security monitoring is central to the identification and remediation of cyberattacks. Data breaches are inevitable and shrinking the window from detection to action is mission critical. Deploying the proper tools to combat these growing threats is fundamental to any data security strategy. Prevention, detection and remediation take many forms. The …
 
Runtime encompasses the behavior of containers after their parent pods have been created in Kubernetes. Runtime security analysis is concerned with finding the indicators of compromise in this behavior. A Kubernetes focused runtime security strategy should be a combination of what to look for and in what context; who to notify and how that informat…
 
NGINX is not only one of the most widely web server on the internet, but it’s also the most commonly used data plane for Ingress controllers. In this episode, along with NGINX's Damian Curry, we’ll discuss how their different microservices technologies – which include an Ingress controller, WAF, and service mesh – add value to OpenShift deployments…
 
The key to successful digital transformation is being able to drive value and insight from new and existing data as fast as possible. Today’s perfect storm of radical change, supercharged by the impact of a global pandemic, makes this more important than ever. How do organizations ensure they remain compliant with ever-increasing data privacy regul…
 
Kubernetes helps us innovate and automate by eliminating compute infrastructure dependencies, but traditional ‘bolt-on’ networking and security infrastructure impedes automation and innovation, and is actually not secure in a hyperconnected world. We can solve this by eliminating dependencies on security and networking infrastructure with a full as…
 
There’s been a lot of talk in the security industry about a ‘zero-trust’ security model as the new way to secure modern cloud services. In this podcast we’ll talk about what zero-trust is and how it relates to enforcing network controls in a container environment. Join our host and guest speaker Glen Kosaka, VP of Product Management at NeuVector, a…
 
Cert-manager is a highly popular open source project, first created by Jetstack and now part of the CNCF Sandbox, which has grown to become the de facto solution for managing X.509 certificates in Kubernetes and OpenShift environments. On this episode, alongside Jetstack CTO Matthew Bates, we chart the rise of this popular project from its creators…
 
In order to discuss all of the topics we enjoy, we've decided to re-brand ourselves under a new name and a new website. We're moving from RedHatChat to Outpost86 with an emphasis on politics but with the added benefit of discussing topics we enjoy such as gaming, pop culture, and life itself. Check out our new site at www.outpost86.com and be sure …
 
Qualys is currently the only vendor to secure both container and host operating system for the OpenShift Container Platform providing unparalleled visibility, actionable intelligence, and security auditing to the OpenShift stack while using Red Hat CoreOS. Join Qualys' Spencer Brown, Security Solutions Architect and Alex Mandernack, Director of Pro…
 
Red Hat OpenShift and Kubernetes are a fundamental part of successful cloud-native development migrations. Traditional ways of doing application security must adapt to the new dynamism of the cloud-native world because applications continue to be a primary target for anyone looking to steal sensitive data, and organizations continue to be subject t…
 
Security Week is part of Red Hat’s Security monthly series where you learn how Red Hat weaves together DevOps and Security to master the force called DevSecOps. This podcast brings you Red Hat thought leadership to aid in your journey. July is Data Controls month! In this episode, Dave Baker, Principal Product Security Engineer from Red Hat, discus…
 
Loading …

Краткое руководство

Google login Twitter login Classic login