Red Hat X Podcast Series

Red Hat X Podcast Series

Podcast de The Red Hat X podcast series

Red Hat's software partners discuss topics such as application modernization, cloud-native development, workload security in the cloud, and partnering with Red Hat. Check out our new partner podcast called "Code Comments" at:https://www.redhat.com/en/code-comments-podcast

Empieza 7 días de prueba

$99.00 / mes después de la prueba.Cancela cuando quieras.

Prueba gratis

Todos los episodios

167 episodios
episode The Impact of ML and AI in Different Industries feat. Michael Galarnyk of CNVRG.IO artwork
The Impact of ML and AI in Different Industries feat. Michael Galarnyk of CNVRG.IO

Machine learning is transforming the tech sector and other industries like retail, manufacturing, supply chain, banking, healthcare, education, and insurance. The problem is that bringing machine learning into these fields requires not only experts who can train models, but also the ability to deploy and maintain ML models in production. This is a common pain point in many organizations. This is where MLOps is useful. MLOps is a set of practices that aims to deploy and maintain machine learning models in production reliably and efficiently. Link to academic paper discussed in this episode: https://arxiv.org/pdf/2209.09125.pdf

10 ene 2023 - 29 min
episode As a beginner, what programming language should you start with? feat. Denis Magda at Yugabyte artwork
As a beginner, what programming language should you start with? feat. Denis Magda at Yugabyte

You are about to explore computer science and start developing the first applications. What should be your first programming language? Should it be adorable JavaScript, glorious Python, legendary Java, or... something else? Well, as always, it depends. Join Brian and Denis Magda, Head of Developer Relations at Yugabyte, in reflecting on their experiences in an attempt to find that mysterious programming language X for beginners.

04 ene 2023 - 37 min
episode Red Hat Tech Talk with Aronetics: Part 6 "How do you protect the network perimeter that no longer exists?" artwork
Red Hat Tech Talk with Aronetics: Part 6 "How do you protect the network perimeter that no longer exists?"

Borderline paranoia – a robot in the 50s has become something that we couldn’t recognize. Today, robots are more compact, and the computers inside are tinier than ever.  From the 2018 recognition of the hardware hack from China or the 2022 Starlink hack:: https://threatpost.com/starlink-hack/180389/ Aronetics features Jerod Brennen of Brennen Consulting to join our ongoing conversation that discovers issues with black boxes in your home or business and the complex implicit trust.

27 dic 2022 - 42 min
episode Tech Talk with Jetstack: Securing Machine Identities across Kubernetes & cloud native environments artwork
Tech Talk with Jetstack: Securing Machine Identities across Kubernetes & cloud native environments

Modern cloud-native environments using Kubernetes or OpenShift are driving innovation and speed for development teams but these technologies do not come with a framework or set of rules for implementing container security. Choices for security tooling are often down to what development teams and operations teams regard as best practices. In this session, the Jetstack team will cover why machine identity management is fundamental to delivering container security and discuss what organizations can do to improve best-practice container security.

20 dic 2022 - 42 min
episode How to prevent a security breach in OpenShift using Calico Cloud runtime threat defense artwork
How to prevent a security breach in OpenShift using Calico Cloud runtime threat defense

Enterprises are building and delivering containers and Kubernetes-based applications to their customers. With a distributed architecture, microservices are communicating with each other and 3rd party APIs to enable information exchange and present it to the customers. Such communication via the internet makes these applications vulnerable to external network-based attacks. In this podcast, we will discuss how traditional runtime threat defense solutions fall short of preventing attacks, and a new approach is required that provides: * Workload-based Intrusion Detection and Prevention Systems (IDS/IPS) * Deep Packet Inspection (DPI) and application-level visibility for containerized workloads * Container runtime security with malware protection and zero-day attack protection

15 dic 2022 - 25 min
Muy buenos Podcasts , entretenido y con historias educativas y divertidas depende de lo que cada uno busque. Yo lo suelo usar en el trabajo ya que estoy muchas horas y necesito cancelar el ruido de al rededor , Auriculares y a disfrutar ..!!
Fantástica aplicación. Yo solo uso los podcast. Por un precio módico los tienes variados y cada vez más.
Me encanta la app, concentra los mejores podcast y bueno ya era ora de pagarles a todos estos creadores de contenido

Empieza 7 días de prueba

$99.00 / mes después de la prueba.Cancela cuando quieras.

Podcasts exclusivos

Sin anuncios

Podcast gratuitos

Audiolibros

20 horas / mes

Prueba gratis

Sólo en Podimo

Audiolibros populares