Red Hat X Podcast Series

Red Hat X Podcast Series

Podcast af The Red Hat X podcast series

Red Hat's software partners discuss topics such as application modernization, cloud-native development, workload security in the cloud, and partnering with Red Hat. Check out our new partner podcast called "Code Comments" at:https://www.redhat.com/en/code-comments-podcast

Prøv gratis i 7 dage

99,00 kr. / måned efter prøveperiode.Ingen binding.

Prøv gratis

Alle episoder

167 episoder
episode The Impact of ML and AI in Different Industries feat. Michael Galarnyk of CNVRG.IO artwork
The Impact of ML and AI in Different Industries feat. Michael Galarnyk of CNVRG.IO

Machine learning is transforming the tech sector and other industries like retail, manufacturing, supply chain, banking, healthcare, education, and insurance. The problem is that bringing machine learning into these fields requires not only experts who can train models, but also the ability to deploy and maintain ML models in production. This is a common pain point in many organizations. This is where MLOps is useful. MLOps is a set of practices that aims to deploy and maintain machine learning models in production reliably and efficiently. Link to academic paper discussed in this episode: https://arxiv.org/pdf/2209.09125.pdf

10. jan. 2023 - 29 min
episode As a beginner, what programming language should you start with? feat. Denis Magda at Yugabyte artwork
As a beginner, what programming language should you start with? feat. Denis Magda at Yugabyte

You are about to explore computer science and start developing the first applications. What should be your first programming language? Should it be adorable JavaScript, glorious Python, legendary Java, or... something else? Well, as always, it depends. Join Brian and Denis Magda, Head of Developer Relations at Yugabyte, in reflecting on their experiences in an attempt to find that mysterious programming language X for beginners.

04. jan. 2023 - 37 min
episode Red Hat Tech Talk with Aronetics: Part 6 "How do you protect the network perimeter that no longer exists?" artwork
Red Hat Tech Talk with Aronetics: Part 6 "How do you protect the network perimeter that no longer exists?"

Borderline paranoia – a robot in the 50s has become something that we couldn’t recognize. Today, robots are more compact, and the computers inside are tinier than ever.  From the 2018 recognition of the hardware hack from China or the 2022 Starlink hack:: https://threatpost.com/starlink-hack/180389/ Aronetics features Jerod Brennen of Brennen Consulting to join our ongoing conversation that discovers issues with black boxes in your home or business and the complex implicit trust.

27. dec. 2022 - 42 min
episode Tech Talk with Jetstack: Securing Machine Identities across Kubernetes & cloud native environments artwork
Tech Talk with Jetstack: Securing Machine Identities across Kubernetes & cloud native environments

Modern cloud-native environments using Kubernetes or OpenShift are driving innovation and speed for development teams but these technologies do not come with a framework or set of rules for implementing container security. Choices for security tooling are often down to what development teams and operations teams regard as best practices. In this session, the Jetstack team will cover why machine identity management is fundamental to delivering container security and discuss what organizations can do to improve best-practice container security.

20. dec. 2022 - 42 min
episode How to prevent a security breach in OpenShift using Calico Cloud runtime threat defense artwork
How to prevent a security breach in OpenShift using Calico Cloud runtime threat defense

Enterprises are building and delivering containers and Kubernetes-based applications to their customers. With a distributed architecture, microservices are communicating with each other and 3rd party APIs to enable information exchange and present it to the customers. Such communication via the internet makes these applications vulnerable to external network-based attacks. In this podcast, we will discuss how traditional runtime threat defense solutions fall short of preventing attacks, and a new approach is required that provides: * Workload-based Intrusion Detection and Prevention Systems (IDS/IPS) * Deep Packet Inspection (DPI) and application-level visibility for containerized workloads * Container runtime security with malware protection and zero-day attack protection

15. dec. 2022 - 25 min
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
Rigtig god tjeneste med gode eksklusive podcasts og derudover et kæmpe udvalg af podcasts og lydbøger. Kan varmt anbefales, om ikke andet så udelukkende pga Dårligdommerne, Klovn podcast, Hakkedrengene og Han duo 😁 👍
Podimo er blevet uundværlig! Til lange bilture, hverdagen, rengøringen og i det hele taget, når man trænger til lidt adspredelse.

Prøv gratis i 7 dage

99,00 kr. / måned efter prøveperiode.Ingen binding.

Eksklusive podcasts

Uden reklamer

Gratis podcasts

Lydbøger

20 timer / måned

Prøv gratis

Kun på Podimo

Populære lydbøger