L8ist Sh9y public
[search 0]
More
Download the App!
show episodes
 
Loading …
show series
 
We dive deep into the technical details of BootC - a Red Hat-led technology that uses container-like definitions to describe machine boot processes. BootC is an important development, especially as companies embrace containers and seek a unified approach to machine configuration. RackN CTO, Greg Althaus, provides an in-depth overview of how BootC w…
  continue reading
 
This episode explores the challenges of processing events and logs in technical operations. The discussion covers the importance of understanding the intent and purpose of building systems downstream from eventing and logging systems. Key topics include the trade-offs between real-time and delayed event processing, the principle of least privilege,…
  continue reading
 
We dive deep into logging, tracing, metrics, observability, with a specific filter for automation and systems and infrastructure. There's a real challenge here of how you capture information from a running system in a way that provides the right information at the right time. That fundamentally is the question that we are working to answer througho…
  continue reading
 
Reference: https://en.wikipedia.org/wiki/Pebble-bed_reactorDo nuclear power and a potential renaissance in nuclear power, driven by the voracious power demands for data centers, have the potential of becoming accepted, local and an economic boom for communities? If you're scratching your head thinking, no way, maybe this conversation will change yo…
  continue reading
 
This TechOps episode explores the challenges of processing events and logs in technical operations. The discussion covers the importance of understanding the intent and purpose of building systems downstream from eventing and logging systems. Key topics include the trade-offs between real-time and delayed event processing, the principle of least pr…
  continue reading
 
In this episode, we dive deep into the emerging world of building and training small language models. We'll discuss the benefits, risks, and challenges companies face as they work to create more targeted and efficient AI models. From managing hardware and power requirements to ensuring data privacy and governance, we'll cover the key considerations…
  continue reading
 
This podcast episode explores the challenges of process improvement in IT operations, using examples from data centers, automotive, and cybersecurity. The discussion covers the slow evolution of secure boot, the difficulties cloud providers face in translating their processes to the broader market, and the emergence of vehicle-to-anything ecosystem…
  continue reading
 
In this episode, we continue our TechOps series, diving deep into the topic of container management. As containers become increasingly mainstream, the need to effectively manage and orchestrate these lightweight, purpose-built environments is crucial. We'll explore the distinctions between container management and orchestration, discussing the diff…
  continue reading
 
In this episode, we dive deep into a recent and highly sophisticated SSH intrusion attack that was discovered in the Linux kernel. We'll discuss how the attackers were able to inject a backdoor into a critical compression library, leveraging social engineering tactics to become a trusted maintainer over several years. The attack was designed to byp…
  continue reading
 
A software bill of materials is the idea that we can define and document exactly what goes into a system. We look at governance today and SBOMs as we put it together, both from a software and an operation side. From an operations perspective, it truly is a big challenge. This conversation is a little bit more theoretical than some of the TechOps di…
  continue reading
 
SSH and Secure Shell is one of those topics that people take for granted because it is a ubiquitous way to log in and access systems. True to form for the TechOps series, though, we break that down into much more detailed and granular components. We talk about how to secure it and what best practices are. We also discuss how to use it for tunneling…
  continue reading
 
Is high availability always a good thing? Today our discussion takes an operations perspective. We look at places where you were over or under committing high availability, where you were confusing disaster recovery for high availability, and perhaps even securing the wrong service or looking at it the wrong way. We cover all of these scenarios wit…
  continue reading
 
We dive into AI, manufacturing and how to improve manufacturing outcomes by better analyzing data. If you are interested in manufacturing or advanced applications of AI and digital twins - which is where we create accurate representations of physical items - this episode will hit all of your favorite topics!Transcript: https://otter.ai/u/xNB0GZQXB4…
  continue reading
 
We explore the UEFI certificate issue in which secure boot is potentially compromised. Certificates that are included in most UEFI BIOSes have been compromised in ways that could easily be used as an attack vector, a very significant flaw and something that should be on your purview and radar to fix and patch. We're going to talk about what the iss…
  continue reading
 
We discuss the impact AI and data sovereignty data protection will have on platforms, consolidated management of your data like in Office by Microsoft or Google, on premises, and systems. This includes a whole bunch of data that you will want to use to train AI models to improve your day to day operations, but you probably don't want a lot of vendo…
  continue reading
 
This episode is one of our book club episodes starring John Walpole, who wrote the Two But Rule, which is very tongue in cheek while also very serious about momentum thinking and using a negative bouncy discussion pattern. I like to think of it as a bouncy discussion pattern to really explore ideas and drive ideation in a positive way by asking and…
  continue reading
 
This episode explores the intersection of infrastructure automation and security through the lens of the Crowd Strike outage. We'll discuss the tension between maintaining stable, reliable data center infrastructure and the need to embrace change and innovation.Recent events like the CrowdStrike outage demonstrate the paradox that infrastructure te…
  continue reading
 
We start talking about walled gardens and the momentum and push that causes us to get into vendor active environments in this episode. This is going to be a multi-part discussion where we look at the drivers of AI in the future. In this case, we used up a lot of time before this recording talking about Kubernetes and what's next for Kubernetes and …
  continue reading
 
Power, electrical power, and how the upcoming trend of AI data centers is intersecting as a load with generation, storage, transportation, Bitcoin mining and mining all use power. These are all highly interconnected in how we use and manage the grid, but are using power in different ways.Transcript: https://otter.ai/u/mszdgZE5_TG_H6lywY6S8-RqPsw?ut…
  continue reading
 
Analog computing is the idea of non-digital computing. Not quanta, but non-digital, basically using analog circuits, either electrical circuits or potentially even mechanical or fluid circuits, to perform calculations and control systems. These are surprisingly common, especially in older devices, but less common in current and modern devices. But …
  continue reading
 
We revisit where we are with Crypto - more specifically where we are with distributed ledger technology or DLT. We give pertinent and real examples of places where the core technology behind Crypto is thriving and making a big difference, as well as has regained its value. We discuss the human impacts of that and what went wrong.Transcript: https:/…
  continue reading
 
Martez Reed and I have an in depth conversation about the challenges of propagating technology inside of enterprises, this core challenge of selling silos and individual technologies. What Martez describes as beneficial tool sprawl versus building up systems and integrating things and end to end technology. This is what I've been calling infrastruc…
  continue reading
 
We dive into Shoshana Zuboff’s book The Age of Surveillance Capitalism. Full of amazing insights, predictions and really insightful work, you can literally scan every page and read something fascinating. You don't need the book to follow today’s discussion. We start by watching Apple's new iPad ad before we dive into the book, and I highly recommen…
  continue reading
 
How do you define infrastructure to support inferencing? Today we discuss that and more, including training. We walk through what it's going to take to understand what to buy, what to build, how to build, how to put it together, and how hard it is to actually know what goes into the infrastructure behind an AI cluster. Importantly, exploring why we…
  continue reading
 
We continue our TechOps series, this case diving deep and cheap into out of band management. One of the things about out of band management is that it quickly turns into an alphabet soup of protocol names, vendor names, specific pieces and even the way we talk about out of band management. We have different acronyms for the same action. In this con…
  continue reading
 
System D is our topic for today discussing system processes, how do you manage and control processes, services, and fundamental components of Linux operating systems. In this discussion, we cover how to think about it, how it works, alternatives, process controls, and even how they get applied to containers. Containers were a nice bridge from our p…
  continue reading
 
Edge technology versus OT was the focus of discussion today, and in this conversation we cover infrastructure information technology versus operations technology, and the ongoing dilemma of edge sites specifically. This includes factories, retail locations, data center technology and 10th standard cloud with operational tech. Operational tech being…
  continue reading
 
DHCP PXE is our subject today. We cover UEFI BIOS and all of the things necessary to do network installs of servers. This incidentally includes thin clients, PCs and other network switches. Specifically, we talked about the process of having secure and robust network provisioning. We go through all the pieces that you need to know how the processes…
  continue reading
 
This episode really highlights the danger of contributor burnout and overload. But it also shows that we're not very good as an industry at sustaining work.Today we dissect what the XZ SSH intrusion attack is, how it happened, what the social engineering was, and the pressure that involved to make that happen.Transcript: https://otter.ai/u/kRqADDwa…
  continue reading
 
We explore the synergy of humanoid robots and LLM AI. This episode delves into how robots can learn and interpret their environment in human-like ways, based on a key video listed below. Whether or not you view the video, the discussion offers deep insights into AI's evolving role in human interaction.Transcript: https://otter.ai/u/VqiTSDMDLAKcaF1X…
  continue reading
 
We delve into spatial computing today and discuss Apple's Vision Pro face computer. Everyone in the club2030 group is very interested in augmented reality and virtual reality, and the release of thApple Vision Pro, seems to meet many thresholds that make us surprisingly optimistic about its potential. We discuss aspects we like as well as what we t…
  continue reading
 
The compliance death curve is something I’ve been working on as an evolving concept that tries to explain how companies fight compliance governance and standardization efforts, something that is critical to platform team and infrastructure operations. Today we try to decompose some of the mathematics that I've been using into more universal, more e…
  continue reading
 
TechOps series episode 3 covers how to automate against API's. We discuss exactly the ways in which you can use API's effectively, and ways you can run into trouble. We also discuss how we should be consuming API's, both as a consumer but also in times when we have produced API's. Many ideas discussed were pulled from learning how people consume ou…
  continue reading
 
Our quarterly book club meeting we picked Never Split the Difference by Chris Voss. This book is about negotiation, which we found fascinating because we are all entrepreneurial in some way and handle sales. Next quarter, we'll talk about a related book that we brought up, which is The Two Butt Rule.https://otter.ai/u/g1zFW444R5NseB8rsVe4StMYWEU?ut…
  continue reading
 
How can we understand agility and adaptability? In this discussion, we get very concrete about the differences between agility and adaptability and why that's important for you as you go on your own innovation journey. This includes looking for places where standards can be applied and accelerate your team, where it's too early, and learning iterat…
  continue reading
 
We dive into data operations in today’s episode! We cover the idea that with all of the work we're doing in AI and ML data analytics analysis, you actually have to steward your data. We also cover processes controls, like what we have with DevOps in infrastructure, but with similar types of concepts (governance controls automation) around how your …
  continue reading
 
We dive into the chaos created by Broadcom’s acquisition of VMware. In this episode, we discuss what Broadcom is doing, why it's a problem, how enterprises are reacting, and what alternatives are on the market. We cover the whole mess in all its glory, and even provide some love for Broadcom.Resources:https://www.thestack.technology/vmware-is-killi…
  continue reading
 
Join us as we embark on a comprehensive journey to master intermediate and advanced skills crucial for operators, DevOps, and platform engineers. From scripting and service setup to running complex systems, we address the critical gap in training for building, automating, and maintaining resilient and robust systems. Over the coming months, the Clo…
  continue reading
 
Departing from our typical podcast format, today’s episode is part of a presentation that I've been preparing about comparing 125 year old house building architecture to modern DevOps. We also analyze as things that work and don't work. There are a lot of home maintenance stories and comparison notes. Particularly in the back half of the episode we…
  continue reading
 
After a brief hiatus, thecloud2030 group is back and deep in tech, talking about things that we think are going to come on the tech front, sans AI. In this episode, we take some time to go through Kubernetes, hardware, software, bill of materials, and some governance. This includes a smattering of predictions to get your year started off with a ban…
  continue reading
 
How can companies, enterprises and individuals become more innovative? We investigate the idea of innovation and disruption and continue past where we were with the three horizons model in our previous discussions. Today’s podcast focuses on breaking this apart into adapting an agile disruption, the use of standardization and the cognitive dissonan…
  continue reading
 
Let's celebrate the work that we've done as a community in the Cloud2030 group this year, and talk about some really exciting things we have planned for next year for 2024. It's remarkable to look back on how this podcast has evolved from a meeting place during COVID, as a place where we could have those hallway tracks that we had been missing, int…
  continue reading
 
This is our annual year review and prediction episode and it is a doozy. We talk through what has been an incredibly busy year in Open Source, cloud repre, repatriation, AI, ML, chatGPT. We laid down some really interesting insights and then looked forward not just into 2024 but two years of predictions and trends that we see happening. We cover wh…
  continue reading
 
How do we apply the principles of lean to data science and data engineering? We discuss this broadly into using AI and machine learning more generally. This is a topic that we had discussed over the summer and wanted to come back to six months later because so much has changed and transformed in the industry. What does agile lean process control lo…
  continue reading
 
If you haven’t had a chance to join in on our book groups, I strongly recommend you take a look at the upcoming books we are reading! Today we discussed Data Science and Context, which is a relatively academic book by a series of doctors, PhDs, Specter, Norvig, Wiggins and Wing. The book gets into some really fascinating analysis techniques, addres…
  continue reading
 
How can digital identity be used to build better trust and systems in our daily transactions? There are really significant challenges and consequences to having a national guaranteed identity - a single identity provider. Knowing who you're interacting with, in every form, in every situation is not as simple as you might think. There's a lot of ana…
  continue reading
 
What incidental, or accidental, surveillance state is being created by all of the video and listening devices that are now embedded in our world? Today we talk through the ramifications of those networks being in private hands in which companies can actually review, analyze and monetize data from these systems. For example - autonomous vehicle came…
  continue reading
 
What is innovation? Today we continue this discussion, specifically drilling into the three horizons model for creating growth and value. We spend a lot of time talking about how companies innovate using that model, what it means and what are examples of it? How does that spark take place? We bridge you further down the innovation learning process …
  continue reading
 
We dive deep into the technical subject of governance and policy enforcement, including the tools, techniques and processes that you need to be aware of to do a good job with policy and governance enforcement. We cover how to get started, what to think about, what to be aware of, and chip away at your governance and policy challenges including deve…
  continue reading
 
Loading …

Quick Reference Guide