Red Hat's software partners discuss topics such as application modernization, cloud-native development, workload security in the cloud, and partnering with Red Hat. Visit our website catalog.redhat.com/podcasts
R
Red Hat X Podcast Series


1
The Impact of ML and AI in Different Industries feat. Michael Galarnyk of CNVRG.IO
29:33
29:33
Play later
Play later
Lists
Like
Liked
29:33
Machine learning is transforming the tech sector and other industries like retail, manufacturing, supply chain, banking, healthcare, education, and insurance. The problem is that bringing machine learning into these fields requires not only experts who can train models, but also the ability to deploy and maintain ML models in production. This is a …
R
Red Hat X Podcast Series


1
As a beginner, what programming language should you start with? feat. Denis Magda at Yugabyte
37:31
37:31
Play later
Play later
Lists
Like
Liked
37:31
You are about to explore computer science and start developing the first applications. What should be your first programming language? Should it be adorable JavaScript, glorious Python, legendary Java, or... something else? Well, as always, it depends. Join Brian and Denis Magda, Head of Developer Relations at Yugabyte, in reflecting on their exper…
R
Red Hat X Podcast Series


1
Red Hat Tech Talk with Aronetics: Part 6 "How do you protect the network perimeter that no longer exists?"
42:07
42:07
Play later
Play later
Lists
Like
Liked
42:07
Borderline paranoia – a robot in the 50s has become something that we couldn’t recognize. Today, robots are more compact, and the computers inside are tinier than ever. From the 2018 recognition of the hardware hack from China or the 2022 Starlink hack:: https://threatpost.com/starlink-hack/180389/ Aronetics features Jerod Brennen of Brennen Consul…
R
Red Hat X Podcast Series


1
Tech Talk with Jetstack: Securing Machine Identities across Kubernetes & cloud native environments
42:12
42:12
Play later
Play later
Lists
Like
Liked
42:12
Modern cloud-native environments using Kubernetes or OpenShift are driving innovation and speed for development teams but these technologies do not come with a framework or set of rules for implementing container security. Choices for security tooling are often down to what development teams and operations teams regard as best practices. In this se…
R
Red Hat X Podcast Series


1
How to prevent a security breach in OpenShift using Calico Cloud runtime threat defense
25:20
25:20
Play later
Play later
Lists
Like
Liked
25:20
Enterprises are building and delivering containers and Kubernetes-based applications to their customers. With a distributed architecture, microservices are communicating with each other and 3rd party APIs to enable information exchange and present it to the customers. Such communication via the internet makes these applications vulnerable to extern…
R
Red Hat X Podcast Series


1
Optimizing Your Observability Pipelines with Fluent Bit and Calyptia Core
27:07
27:07
Play later
Play later
Lists
Like
Liked
27:07
Building on our previous discussion on First Mile Observability (Red Hat X Episode 123 - April 26, 2022), we’ll focus on tools and methods organizations can use to optimize their Enterprise Observability Pipelines. Specifically, we’ll discuss 1) Fluentd and Fluent Bit - the evolution of these open-source projects for data collection and transport t…
R
Red Hat X Podcast Series


1
Tech Talk with Sysdig: Threat Detection at Runtime
26:41
26:41
Play later
Play later
Lists
Like
Liked
26:41
threat detection at runtime is a crytical component of securing containers and cloud. how can you spot malicious activity in a dynamic orchestrated environment based on kubernetes? Today we will discuss runtime security practices using Red Hat opensource.By The Red Hat X podcast series
R
Red Hat X Podcast Series


1
Why you should be using Event Sourcing Microservices feat. Hugh McKee at Lightbend
39:18
39:18
Play later
Play later
Lists
Like
Liked
39:18
Event-sourcing has been around for a long time. When humans first created money thousands of years ago, accountants invented the earliest forms of event-sourcing when they realized it was not a good idea to throw away data while keeping track of other people's money. Fast forward to today, accountants continue to use event-sourcing. It may surprise…
R
Red Hat X Podcast Series


1
Geo-Distributed Apps: Be Ready to Scale From Day 1
38:18
38:18
Play later
Play later
Lists
Like
Liked
38:18
Have you ever wondered how a geo-distributed app such as a Slack-like corporate messenger is architected and functions? How hundreds of microservices are deployed and communicate across distant geographies? How thousands of user messages and events flow in real-time across the countries? How are petabytes of data stored and accessed across continen…
R
Red Hat X Podcast Series


1
Bridging the Gap between Data Pipelines and Machine Learning with MLOps feat. Michael Galarnyk of cnvrg.io
27:56
27:56
Play later
Play later
Lists
Like
Liked
27:56
Making a data pipeline fit for machine learning use cases requires more than just additional data monitoring. Furthermore, bringing machine learning into production has traditionally required a lot of manual setup and configuration, even for toy ML pipelines. These manual methods are not reproducible, don’t autoscale, require significant technical …
R
Red Hat X Podcast Series


1
First ever cloud-based DNS and IPAM Ansible Collections now available using Infoblox BloxOneDDI
33:11
33:11
Play later
Play later
Lists
Like
Liked
33:11
Ansible Automation Platform extends beyond traditional tools for server and software installations, to encompass the entirety of IT infrastructure, including network resources. The Infoblox BloxOne Collections for Ansible Automation Platform is a package of modules and plug-ins that allow managing BloxOne DDI objects and functions through APIs that…
R
Red Hat X Podcast Series


1
Red Hat Tech Talk with Aronetics: Part 5 "Aronetics knows edges"
38:33
38:33
Play later
Play later
Lists
Like
Liked
38:33
A recent VPN advertisement ensured security by using their VPN. Join us for trust and truth in marketing, computing ethics, and pirating 30-pound cannonballs.By The Red Hat X podcast series
R
Red Hat X Podcast Series


1
Tech Talk with NeuVectors Glen Kosaka: Supply Chain Security
33:58
33:58
Play later
Play later
Lists
Like
Liked
33:58
Zero Trust is a security strategy which is generating a lot of buzz. Supply chain security is a topic that is so critical that the US White House issued an executive order mandating it. Join Glen Kosaka, Head of Product Security for NeuVector, as he explains why these are hot topics and how they affect the security controls for container and Kubern…
R
Red Hat X Podcast Series


1
GitLab Kubernetes Agent on OpenShift and Infrastructure as Code Scanning
31:30
31:30
Play later
Play later
Lists
Like
Liked
31:30
You can connect your Kubernetes cluster with GitLab to deploy, manage, and monitor your cloud-native solutions. The agent allows you to communicate with your cluster, enable a cache of Kubernetes objects, and much more. Then add in Infrastructure as code (IaC) scanning to make sure what you are deploying into your cluster won’t compromise your syst…
R
Red Hat X Podcast Series


1
The magic of joining Kubernetes with Platform thinking
38:28
38:28
Play later
Play later
Lists
Like
Liked
38:28
As organisations grow their cloud initiatives, there is always a deadly undercurrent growing beneath the surface: waste. Multiple teams solving the same problems, over and over again, in different ways, using different technologies every time. This is remedied with a heavy dose of central control, which only leads to stifled innovation and excessiv…
R
Red Hat X Podcast Series


1
Red Hat Tech Talk with Aronetics: Part 4 "Secure devices on the edge"
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05
Web 1,2, and 3 have privacy issues and problems with the perimeter that vanished. Aronetics features Jerod Brennen of Brennen Consulting to join our conversation that discover issues with black boxes in your home or business and the complex implicit trust. How could you secure devices on the edge on a unsecure place? Explore limits of ignorance on …
R
Red Hat X Podcast Series


1
Cognitive Load and the effect on Technical Workers
34:15
34:15
Play later
Play later
Lists
Like
Liked
34:15
It's common to hear "everything is so complicated nowadays" followed by a list of common tech industry scapegoats. Kubernetes, front end frameworks, microservices, "hip" technologies. It's a relatable reaction but beyond being cathartic it's a little off the mark. This feeling boils down to a real increase in cognitive load - and not cognitive load…
R
Red Hat X Podcast Series


1
Build Your Cloud – Nutanix Cloud Platform is the ideal infrastructure for Modernization
33:11
33:11
Play later
Play later
Lists
Like
Liked
33:11
Infrastructure is one of the four pillars of IT Modernization, along with the Development Process, Application Architecture and Deployment methodology. Leveraging the promise of Cloud Native means using the best of each of these. However, most organizations have a spectrum of applications in their portfolio to manage from the traditional VM based t…
R
Red Hat X Podcast Series


1
Move to the Cloud. Extend to the Edge. Go Beyond.
39:00
39:00
Play later
Play later
Lists
Like
Liked
39:00
Moving to the cloud and edge comes with big rewards such as new use-cases and business opportunities. But how to efficiently build cloud and edge applications can be a confusing journey, mainly due to the lack of managed platforms that unifies Developer Experience (DX), ZeroOps Experience, and a Reactive Runtime. With Kalix, we set out to create a …
R
Red Hat X Podcast Series


1
Securing cloud-native applications in Openshift with Calico
28:03
28:03
Play later
Play later
Lists
Like
Liked
28:03
In this podcast, Dhiraj Sehgal, Director, Product and Solution Marketing for Tigera will talk about key takeaways shared by Openshift and Calico enterprise users to address the security and compliance issues with active security initiatives. Tigera inventor of Calico, one of the most widely deployed Kubernetes CNI in the world with over 2M nodes an…
Clear the fog of the cyberwar and see through the unknown on your computer with Aronetics in Red Hat Enterprise Linux and learn a new level of relaxation and security.By The Red Hat X podcast series
R
Red Hat X Podcast Series


1
Achieving Kubernetes Security Nirvana with David Stevens, Chief Solutions Architect at Entrust
26:39
26:39
Play later
Play later
Lists
Like
Liked
26:39
As companies continue to embrace containers and Kubernetes at a rapid pace, there’s a growing need to address security. Security is one of the major concerns with container and Kubernetes adoption. Security issues continue to cause delays in deploying containerized applications into production. Therefore, security needs to be “baked in” to DevOps w…
R
Red Hat X Podcast Series


1
Cloud Native, companies are trying to figure out what this means, how to get there and what the real value is.
32:03
32:03
Play later
Play later
Lists
Like
Liked
32:03
Enterprise IT Leaders are working to figure out what Cloud Native means to their organizations and how to get there. Many leaders are looking out over a chasm, a gulf between what their organization looks like now and a distant “destination” that isn’t distinctly clear. How do you build for the future, without throwing out all the applications and …
R
Red Hat X Podcast Series


1
An Introduction to the Elixir Programming Language
28:27
28:27
Play later
Play later
Lists
Like
Liked
28:27
A basic introduction to the Elixir programming language and its ecosystem from a developer who has spent the last five writing and deploying modern applications in it. If you've never heard of Elixir, it is a dynamic, functional language that has seen strong uptake in the web development with additional competencies in IoT and recently machine lear…
R
Red Hat X Podcast Series


1
How Spotify ships developer happiness through Backstage (Part 2)
28:37
28:37
Play later
Play later
Lists
Like
Liked
28:37
In the last episode we learned about Backstage, an open platform for building developer portals, and how it has evolved into a global open source community since Spotify released it in 2020. Now, let’s take a look at who uses Backstage in the wild, common use cases, and where the project is headed in the future.…