Red Hat X Podcast Series

Red Hat X Podcast Series

Podcast de The Red Hat X podcast series

Red Hat's software partners discuss topics such as application modernization, cloud-native development, workload security in the cloud, and partnering with Red Hat. Check out our new partner podcast called "Code Comments" at:https://www.redhat.com/en/code-comments-podcast

Disfruta 90 días gratis

4,99 € / mes después de la prueba.Cancela cuando quieras.

Prueba gratis

Todos los episodios

167 episodios
episode The Impact of ML and AI in Different Industries feat. Michael Galarnyk of CNVRG.IO artwork
The Impact of ML and AI in Different Industries feat. Michael Galarnyk of CNVRG.IO

Machine learning is transforming the tech sector and other industries like retail, manufacturing, supply chain, banking, healthcare, education, and insurance. The problem is that bringing machine learning into these fields requires not only experts who can train models, but also the ability to deploy and maintain ML models in production. This is a common pain point in many organizations. This is where MLOps is useful. MLOps is a set of practices that aims to deploy and maintain machine learning models in production reliably and efficiently. Link to academic paper discussed in this episode: https://arxiv.org/pdf/2209.09125.pdf

10 ene 2023 - 29 min
episode As a beginner, what programming language should you start with? feat. Denis Magda at Yugabyte artwork
As a beginner, what programming language should you start with? feat. Denis Magda at Yugabyte

You are about to explore computer science and start developing the first applications. What should be your first programming language? Should it be adorable JavaScript, glorious Python, legendary Java, or... something else? Well, as always, it depends. Join Brian and Denis Magda, Head of Developer Relations at Yugabyte, in reflecting on their experiences in an attempt to find that mysterious programming language X for beginners.

04 ene 2023 - 37 min
episode Red Hat Tech Talk with Aronetics: Part 6 "How do you protect the network perimeter that no longer exists?" artwork
Red Hat Tech Talk with Aronetics: Part 6 "How do you protect the network perimeter that no longer exists?"

Borderline paranoia – a robot in the 50s has become something that we couldn’t recognize. Today, robots are more compact, and the computers inside are tinier than ever.  From the 2018 recognition of the hardware hack from China or the 2022 Starlink hack:: https://threatpost.com/starlink-hack/180389/ Aronetics features Jerod Brennen of Brennen Consulting to join our ongoing conversation that discovers issues with black boxes in your home or business and the complex implicit trust.

27 dic 2022 - 42 min
episode Tech Talk with Jetstack: Securing Machine Identities across Kubernetes & cloud native environments artwork
Tech Talk with Jetstack: Securing Machine Identities across Kubernetes & cloud native environments

Modern cloud-native environments using Kubernetes or OpenShift are driving innovation and speed for development teams but these technologies do not come with a framework or set of rules for implementing container security. Choices for security tooling are often down to what development teams and operations teams regard as best practices. In this session, the Jetstack team will cover why machine identity management is fundamental to delivering container security and discuss what organizations can do to improve best-practice container security.

20 dic 2022 - 42 min
episode How to prevent a security breach in OpenShift using Calico Cloud runtime threat defense artwork
How to prevent a security breach in OpenShift using Calico Cloud runtime threat defense

Enterprises are building and delivering containers and Kubernetes-based applications to their customers. With a distributed architecture, microservices are communicating with each other and 3rd party APIs to enable information exchange and present it to the customers. Such communication via the internet makes these applications vulnerable to external network-based attacks. In this podcast, we will discuss how traditional runtime threat defense solutions fall short of preventing attacks, and a new approach is required that provides: * Workload-based Intrusion Detection and Prevention Systems (IDS/IPS) * Deep Packet Inspection (DPI) and application-level visibility for containerized workloads * Container runtime security with malware protection and zero-day attack protection

15 dic 2022 - 25 min
Soy muy de podcasts. Mientras hago la cama, mientras recojo la casa, mientras trabajo… Y en Podimo encuentro podcast que me encantan. De emprendimiento, de salid, de humor… De lo que quiera! Estoy encantada 👍
Soy muy de podcasts. Mientras hago la cama, mientras recojo la casa, mientras trabajo… Y en Podimo encuentro podcast que me encantan. De emprendimiento, de salid, de humor… De lo que quiera! Estoy encantada 👍
MI TOC es feliz, que maravilla. Ordenador, limpio, sugerencias de categorías nuevas a explorar!!!
Me suscribi con los 14 días de prueba para escuchar el Podcast de Misterios Cotidianos, pero al final me quedo mas tiempo porque hacia tiempo que no me reía tanto. Tiene Podcast muy buenos y la aplicación funciona bien.
App ligera, eficiente, encuentras rápido tus podcast favoritos. Diseño sencillo y bonito. me gustó.
contenidos frescos e inteligentes
La App va francamente bien y el precio me parece muy justo para pagar a gente que nos da horas y horas de contenido. Espero poder seguir usándola asiduamente.

Disfruta 90 días gratis

4,99 € / mes después de la prueba.Cancela cuando quieras.

Podcasts exclusivos

Sin anuncios

Podcast gratuitos

Audiolibros

20 horas / mes

Prueba gratis

Sólo en Podimo

Audiolibros populares