Red Hat X Podcast Series

Red Hat X Podcast Series

Podcast by The Red Hat X podcast series

Red Hat's software partners discuss topics such as application modernization, cloud-native development, workload security in the cloud, and partnering with Red Hat. Check out our new partner podcast called "Code Comments" at:https://www.redhat.com/en/code-comments-podcast

Aloita 7 vrk maksuton tilaus

Kokeilun jälkeen 7,99 € / kuukausi.Peru milloin tahansa.

Aloita maksutta

Kaikki jaksot

167 jaksot
episode The Impact of ML and AI in Different Industries feat. Michael Galarnyk of CNVRG.IO artwork
The Impact of ML and AI in Different Industries feat. Michael Galarnyk of CNVRG.IO

Machine learning is transforming the tech sector and other industries like retail, manufacturing, supply chain, banking, healthcare, education, and insurance. The problem is that bringing machine learning into these fields requires not only experts who can train models, but also the ability to deploy and maintain ML models in production. This is a common pain point in many organizations. This is where MLOps is useful. MLOps is a set of practices that aims to deploy and maintain machine learning models in production reliably and efficiently. Link to academic paper discussed in this episode: https://arxiv.org/pdf/2209.09125.pdf

10. tammik. 2023 - 29 min
episode As a beginner, what programming language should you start with? feat. Denis Magda at Yugabyte artwork
As a beginner, what programming language should you start with? feat. Denis Magda at Yugabyte

You are about to explore computer science and start developing the first applications. What should be your first programming language? Should it be adorable JavaScript, glorious Python, legendary Java, or... something else? Well, as always, it depends. Join Brian and Denis Magda, Head of Developer Relations at Yugabyte, in reflecting on their experiences in an attempt to find that mysterious programming language X for beginners.

04. tammik. 2023 - 37 min
episode Red Hat Tech Talk with Aronetics: Part 6 "How do you protect the network perimeter that no longer exists?" artwork
Red Hat Tech Talk with Aronetics: Part 6 "How do you protect the network perimeter that no longer exists?"

Borderline paranoia – a robot in the 50s has become something that we couldn’t recognize. Today, robots are more compact, and the computers inside are tinier than ever.  From the 2018 recognition of the hardware hack from China or the 2022 Starlink hack:: https://threatpost.com/starlink-hack/180389/ Aronetics features Jerod Brennen of Brennen Consulting to join our ongoing conversation that discovers issues with black boxes in your home or business and the complex implicit trust.

27. jouluk. 2022 - 42 min
episode Tech Talk with Jetstack: Securing Machine Identities across Kubernetes & cloud native environments artwork
Tech Talk with Jetstack: Securing Machine Identities across Kubernetes & cloud native environments

Modern cloud-native environments using Kubernetes or OpenShift are driving innovation and speed for development teams but these technologies do not come with a framework or set of rules for implementing container security. Choices for security tooling are often down to what development teams and operations teams regard as best practices. In this session, the Jetstack team will cover why machine identity management is fundamental to delivering container security and discuss what organizations can do to improve best-practice container security.

20. jouluk. 2022 - 42 min
episode How to prevent a security breach in OpenShift using Calico Cloud runtime threat defense artwork
How to prevent a security breach in OpenShift using Calico Cloud runtime threat defense

Enterprises are building and delivering containers and Kubernetes-based applications to their customers. With a distributed architecture, microservices are communicating with each other and 3rd party APIs to enable information exchange and present it to the customers. Such communication via the internet makes these applications vulnerable to external network-based attacks. In this podcast, we will discuss how traditional runtime threat defense solutions fall short of preventing attacks, and a new approach is required that provides: * Workload-based Intrusion Detection and Prevention Systems (IDS/IPS) * Deep Packet Inspection (DPI) and application-level visibility for containerized workloads * Container runtime security with malware protection and zero-day attack protection

15. jouluk. 2022 - 25 min
Loistava design ja vihdoin on helppo löytää podcasteja, joista oikeasti tykkää
Kiva sovellus podcastien kuunteluun, ja sisältö on monipuolista ja kiinnostavaa
Todella kiva äppi, helppo käyttää ja paljon podcasteja, joita en tiennyt ennestään.

Aloita 7 vrk maksuton tilaus

Kokeilun jälkeen 7,99 € / kuukausi.Peru milloin tahansa.

Podimon podcastit

Mainoksista vapaa

Maksuttomat podcastit

Aloita maksutta

Vain Podimossa

Suosittuja äänikirjoja