DiscoverRed Hat X Podcast Series
Red Hat X Podcast Series
Claim Ownership

Red Hat X Podcast Series

Author: The Red Hat X podcast series

Subscribed: 230Played: 2,919
Share

Description

Red Hat's software partners discuss topics such as application modernization, cloud-native development, workload security in the cloud, and partnering with Red Hat. Check out our new partner podcast called "Code Comments" at:https://www.redhat.com/en/code-comments-podcast
159 Episodes
Reverse
Machine learning is transforming the tech sector and other industries like retail, manufacturing, supply chain, banking, healthcare, education, and insurance. The problem is that bringing machine learning into these fields requires not only experts who can train models, but also the ability to deploy and maintain ML models in production. This is a common pain point in many organizations. This is where MLOps is useful. MLOps is a set of practices that aims to deploy and maintain machine learning models in production reliably and efficiently.Link to academic paper discussed in this episode:https://arxiv.org/pdf/2209.09125.pdf
You are about to explore computer science and start developing the first applications. What should be your first programming language? Should it be adorable JavaScript, glorious Python, legendary Java, or... something else? Well, as always, it depends.Join Brian and Denis Magda, Head of Developer Relations at Yugabyte, in reflecting on their experiences in an attempt to find that mysterious programming language X for beginners.
Borderline paranoia – a robot in the 50s has become something that we couldn’t recognize. Today, robots are more compact, and the computers inside are tinier than ever.  From the 2018 recognition of the hardware hack from China or the 2022 Starlink hack:: https://threatpost.com/starlink-hack/180389/Aronetics features Jerod Brennen of Brennen Consulting to join our ongoing conversation that discovers issues with black boxes in your home or business and the complex implicit trust. 
Modern cloud-native environments using Kubernetes or OpenShift are driving innovation and speed for development teams but these technologies do not come with a framework or set of rules for implementing container security. Choices for security tooling are often down to what development teams and operations teams regard as best practices. In this session, the Jetstack team will cover why machine identity management is fundamental to delivering container security and discuss what organizations can do to improve best-practice container security.
Enterprises are building and delivering containers and Kubernetes-based applications to their customers. With a distributed architecture, microservices are communicating with each other and 3rd party APIs to enable information exchange and present it to the customers. Such communication via the internet makes these applications vulnerable to external network-based attacks. In this podcast, we will discuss how traditional runtime threat defense solutions fall short of preventing attacks, and a new approach is required that provides: Workload-based Intrusion Detection and Prevention Systems (IDS/IPS)Deep Packet Inspection (DPI) and application-level visibility for containerized workloadsContainer runtime security with malware protection and zero-day attack protection
Building on our previous discussion on First Mile Observability (Red Hat X Episode 123 - April 26, 2022), we’ll focus on tools and methods organizations can use to optimize their Enterprise Observability Pipelines. Specifically, we’ll discuss 1) Fluentd and Fluent Bit - the evolution of these open-source projects for data collection and transport that have now been deployed over one billion times, 2) Strategies for multi-output distribution to send data from anywhere to anywhere and 3) How Calyptia Core can aggregate your observability data to easily define and manage your pipelines, no matter how complex your environment.
threat detection at runtime is a crytical component of securing containers and cloud. how can you spot malicious activity in a dynamic orchestrated environment based on kubernetes? Today we will discuss runtime security practices using Red Hat opensource.
Event-sourcing has been around for a long time. When humans first created money thousands of years ago, accountants invented the earliest forms of event-sourcing when they realized it was not a good idea to throw away data while keeping track of other people's money. Fast forward to today, accountants continue to use event-sourcing. It may surprise some developers, but event-sourcing is a crucial component of the software development process in the form of git. A more general form of event-sourcing for data other than financial data was introduced around 2007 by Greg Young. While the event-sourcing concepts are solid, based on thousands of years of experience, the adoption by the development community has been slow.In this session, we will look at event-sourcing from a perspective as an indispensable component of modern, distributed, cloud-based microservice systems. We will also examine why event-sourcing adoption has been slow and why things are changing, making it easier to include event-sourcing in your microservice systems.
Have you ever wondered how a geo-distributed app such as a Slack-like corporate messenger is architected and functions? How hundreds of microservices are deployed and communicate across distant geographies? How thousands of user messages and events flow in real-time across the countries? How are petabytes of data stored and accessed across continents?By taking a Slack-like corporate messenger as an example, we'll discuss the fundamental design principles for geo-distributed apps that are born to work across geographies.
Making a data pipeline fit for machine learning use cases requires more than just additional data monitoring. Furthermore, bringing machine learning into production has traditionally required a lot of manual setup and configuration, even for toy ML pipelines. These manual methods are not reproducible, don’t autoscale, require significant technical expertise, and are error-prone. Among other things, this episode will go over MLOps, a set of practices aiming to deploy and maintain machine learning models in production reliably and efficiently.
Ansible Automation Platform extends beyond traditional tools for server and software installations, to encompass the entirety of IT infrastructure, including network resources. The Infoblox BloxOne Collections for Ansible Automation Platform is a package of modules and plug-ins that allow managing BloxOne DDI objects and functions through APIs that leverage Ansible Playbooks. This enables network professionals to utilize Infoblox infrastructure for DNS automation of VMs and containerized workloads deployed across multiple platforms.Infoblox Ansible Collections for BloxOne allows you to interact with the BloxOne DDI through APIs. DDI information is presented as variables to an Ansible Playbook: a YAML-based text file that helps to automate managed systems found in inventory. Playbooks allow an administrator to configure an entire environment by leveraging a block of code that is known as a module that executes on Linux and Windows systems, networks, and cloud instances. The Collections let an Ansible Playbook automate the provisioning of the network service infrastructure
A recent VPN advertisement ensured security by using their VPN. Join us for trust and truth in marketing, computing ethics, and pirating 30-pound cannonballs.
Zero Trust is a security strategy which is generating a lot of buzz. Supply chain security is a topic that is so critical that the US White House issued an executive order mandating it. Join Glen Kosaka, Head of Product Security for NeuVector, as he explains why these are hot topics and how they affect  the security controls for container and Kubernetes pipelines.
You can connect your Kubernetes cluster with GitLab to deploy, manage, and monitor your cloud-native solutions. The agent allows you to communicate with your cluster, enable a cache of Kubernetes objects, and much more. Then add in Infrastructure as code (IaC) scanning to make sure what you are deploying into your cluster won’t compromise your system.This podcast will go over both of these concepts in order to get you deploying safer, more secure code even faster with GitLab.
As organisations grow their cloud initiatives, there is always a deadly undercurrent growing beneath the surface: waste. Multiple teams solving the same problems, over and over again, in different ways, using different technologies every time. This is remedied with a heavy dose of central control, which only leads to stifled innovation and excessive process. There is, however, a third option - platform thinking. Join Chris Cooney, Developer Advocate for Coralogix, as he discusses the power of platform thinking and how it impacts collaboration and system reliability, as it grows a community of likeminded engineers within an organisation who are set on solving a problem precisely once, and making that solution available to everyone.
Web 1,2, and 3 have privacy issues and problems with the perimeter that vanished. Aronetics features Jerod Brennen of Brennen Consulting to join our conversation that discover issues with black boxes in your home or business and the complex implicit trust. How could you secure devices on the edge on a unsecure place? Explore limits of ignorance on the edge.
It's common to hear "everything is so complicated nowadays" followed by a list of common tech industry scapegoats. Kubernetes, front end frameworks, microservices, "hip" technologies. It's a relatable reaction but beyond being cathartic it's a little off the mark. This feeling boils down to a real increase in cognitive load - and not cognitive load in terms just dealing with increasingly heavy frameworks. To better understand the problem, it pays to talk more holistically about cognitive load as it exists between different disciplines, experience levels, and contexts. We have to acknowledge it as a combination of technical, organizational, and psychological issues if we want to get a start on managing it. We may not have definitive solutions but there are a few adjustments to your way of thinking that can be helpful to those in the trenches.
Infrastructure is one of the four pillars of IT Modernization, along with theDevelopment Process, Application Architecture and Deployment methodology. Leveraging the promise of Cloud Native means using the best of each of these. However, most organizations have a spectrum of applications in their portfolio to manage from the traditional VM based to the fully Cloud Native, microservices based apps deployed in containers. The challenge for today’s CIO has is to ensure the Dev teams have access to the modern tooling, processes, and infrastructure they need, while simultaneously providing a modern platform for the traditional parts of their application portfolio. All while ensuring security, and compliance, reducing complexity, and being cost effective.
Moving to the cloud and edge comes with big rewards such as new use-cases and business opportunities. But how to efficiently build cloud and edge applications can be a confusing journey, mainly due to the lack of managed platforms that unifies Developer Experience (DX), ZeroOps Experience, and a Reactive Runtime. With Kalix, we set out to create a powerful PaaS that addresses these challenges for the cloud-to-edge continuum. An API PaaS that enables any developer with any language to build high-performance, data-centric applications without the complexity that often slows down engineering teams.
In this podcast, Dhiraj Sehgal, Director, Product and Solution Marketing for Tigera will talkabout key takeaways shared by Openshift and Calico enterprise users to address the securityand compliance issues with active security initiatives. Tigera  inventor of Calico, one of the most widely deployed Kubernetes CNI in the world with over 2M nodes and 500K clusters. Dhiraj will also touch upon how Calico and OpenShift jointly address the container security, cloud-native network security, and compliance challenges and consequently accelerate your cloud-native application deployments.
loading
Comments (1)

Gee Eazy

lol

Aug 18th
Reply
Download from Google Play
Download from App Store