Episodes
Machine learning is transforming the tech sector and other industries like retail, manufacturing, supply chain, banking, healthcare, education, and insurance. The problem is that bringing machine learning into these fields requires not only experts who can train models, but also the ability to deploy and maintain ML models in production. This is a common pain point in many organizations. This is where MLOps is useful. MLOps is a set of practices that aims to deploy and maintain machine...
Published 01/10/23
Published 01/10/23
You are about to explore computer science and start developing the first applications. What should be your first programming language? Should it be adorable JavaScript, glorious Python, legendary Java, or... something else? Well, as always, it depends. Join Brian and Denis Magda, Head of Developer Relations at Yugabyte, in reflecting on their experiences in an attempt to find that mysterious programming language X for beginners.
Published 01/04/23
Borderline paranoia – a robot in the 50s has become something that we couldn’t recognize. Today, robots are more compact, and the computers inside are tinier than ever.  From the 2018 recognition of the hardware hack from China or the 2022 Starlink hack:: https://threatpost.com/starlink-hack/180389/ Aronetics features Jerod Brennen of Brennen Consulting to join our ongoing conversation that discovers issues with black boxes in your home or business and the complex implicit trust. 
Published 12/27/22
Modern cloud-native environments using Kubernetes or OpenShift are driving innovation and speed for development teams but these technologies do not come with a framework or set of rules for implementing container security. Choices for security tooling are often down to what development teams and operations teams regard as best practices. In this session, the Jetstack team will cover why machine identity management is fundamental to delivering container security and discuss what organizations...
Published 12/20/22
Enterprises are building and delivering containers and Kubernetes-based applications to their customers. With a distributed architecture, microservices are communicating with each other and 3rd party APIs to enable information exchange and present it to the customers. Such communication via the internet makes these applications vulnerable to external network-based attacks.  In this podcast, we will discuss how traditional runtime threat defense solutions fall short of preventing attacks, and...
Published 12/15/22
Building on our previous discussion on First Mile Observability (Red Hat X Episode 123 - April 26, 2022), we’ll focus on tools and methods organizations can use to optimize their Enterprise Observability Pipelines. Specifically, we’ll discuss 1) Fluentd and Fluent Bit - the evolution of these open-source projects for data collection and transport that have now been deployed over one billion times, 2) Strategies for multi-output distribution to send data from anywhere to anywhere and 3) How...
Published 12/08/22
threat detection at runtime is a crytical component of securing containers and cloud. how can you spot malicious activity in a dynamic orchestrated environment based on kubernetes? Today we will discuss runtime security practices using Red Hat opensource.
Published 12/01/22
Event-sourcing has been around for a long time. When humans first created money thousands of years ago, accountants invented the earliest forms of event-sourcing when they realized it was not a good idea to throw away data while keeping track of other people's money. Fast forward to today, accountants continue to use event-sourcing. It may surprise some developers, but event-sourcing is a crucial component of the software development process in the form of git.  A more general form of...
Published 11/29/22
Have you ever wondered how a geo-distributed app such as a Slack-like corporate messenger is architected and functions? How hundreds of microservices are deployed and communicate across distant geographies? How thousands of user messages and events flow in real-time across the countries? How are petabytes of data stored and accessed across continents? By taking a Slack-like corporate messenger as an example, we'll discuss the fundamental design principles for geo-distributed apps that are...
Published 11/22/22
Making a data pipeline fit for machine learning use cases requires more than just additional data monitoring. Furthermore, bringing machine learning into production has traditionally required a lot of manual setup and configuration, even for toy ML pipelines. These manual methods are not reproducible, don’t autoscale, require significant technical expertise, and are error-prone. Among other things, this episode will go over MLOps, a set of practices aiming to deploy and maintain machine...
Published 11/17/22
Ansible Automation Platform extends beyond traditional tools for server and software installations, to encompass the entirety of IT infrastructure, including network resources. The Infoblox BloxOne Collections for Ansible Automation Platform is a package of modules and plug-ins that allow managing BloxOne DDI objects and functions through APIs that leverage Ansible Playbooks. This enables network professionals to utilize Infoblox infrastructure for DNS automation of VMs and containerized...
Published 11/15/22
A recent VPN advertisement ensured security by using their VPN. Join us for trust and truth in marketing, computing ethics, and pirating 30-pound cannonballs.
Published 11/10/22
Zero Trust is a security strategy which is generating a lot of buzz. Supply chain security is a topic that is so critical that the US White House issued an executive order mandating it. Join Glen Kosaka, Head of Product Security for NeuVector, as he explains why these are hot topics and how they affect  the security controls for container and Kubernetes pipelines.
Published 11/02/22
You can connect your Kubernetes cluster with GitLab to deploy, manage, and monitor your cloud-native solutions. The agent allows you to communicate with your cluster, enable a cache of Kubernetes objects, and much more.  Then add in Infrastructure as code (IaC) scanning to make sure what you are deploying into your cluster won’t compromise your system. This podcast will go over both of these concepts in order to get you deploying safer, more secure code even faster with GitLab.
Published 10/27/22
As organisations grow their cloud initiatives, there is always a deadly undercurrent growing beneath the surface: waste. Multiple teams solving the same problems, over and over again, in different ways, using different technologies every time. This is remedied with a heavy dose of central control, which only leads to stifled innovation and excessive process. There is, however, a third option - platform thinking. Join Chris Cooney, Developer Advocate for Coralogix, as he discusses the power of...
Published 10/25/22
Web 1,2, and 3 have privacy issues and problems with the perimeter that vanished. Aronetics features Jerod Brennen of Brennen Consulting to join our conversation that discover issues with black boxes in your home or business and the complex implicit trust. How could you secure devices on the edge on a unsecure place? Explore limits of ignorance on the edge.
Published 10/18/22
It's common to hear "everything is so complicated nowadays" followed by a list of common tech industry scapegoats. Kubernetes, front end frameworks, microservices, "hip" technologies. It's a relatable reaction but beyond being cathartic it's a little off the mark. This feeling boils down to a real increase in cognitive load - and not cognitive load in terms just dealing with increasingly heavy frameworks.  To better understand the problem, it pays to talk more holistically about cognitive...
Published 10/11/22
Infrastructure is one of the four pillars of IT Modernization, along with the Development Process, Application Architecture and Deployment methodology. Leveraging the promise of Cloud Native means using the best of each of these. However, most organizations have a spectrum of applications in their portfolio to manage from the traditional VM based to the fully Cloud Native, microservices based apps deployed in containers. The challenge for today’s CIO has is to ensure the Dev teams have access...
Published 10/04/22
Moving to the cloud and edge comes with big rewards such as new use-cases and business opportunities. But how to efficiently build cloud and edge applications can be a confusing journey, mainly due to the lack of managed platforms that unifies Developer Experience (DX), ZeroOps Experience, and a Reactive Runtime. With Kalix, we set out to create a powerful PaaS that addresses these challenges for the cloud-to-edge continuum. An API PaaS that enables any developer with any language to build...
Published 09/20/22
In this podcast, Dhiraj Sehgal, Director, Product and Solution Marketing for Tigera will talk about key takeaways shared by Openshift and Calico enterprise users to address the security and compliance issues with active security initiatives. Tigera  inventor of Calico, one of the most widely deployed Kubernetes CNI in the world with over 2M nodes and 500K clusters. Dhiraj will also touch upon how Calico and OpenShift jointly address the container security, cloud-native network security, and...
Published 09/15/22
Clear the fog of the cyberwar and see through the unknown on your computer with Aronetics in Red Hat Enterprise Linux and learn a new level of relaxation and security. 
Published 09/07/22
As companies continue to embrace containers and Kubernetes at a rapid pace there’s a growing need to address security. Security is one of the major concerns with container and Kubernetes adoption. Security issues continue to cause delays in deploying containerized applications into production. Therefore, security needs to be “baked in” to DevOps workflows. The only way to do this is to form a tighter relationship between Security and DevOps teams and learn how to harmonize their tooling and...
Published 08/04/22
Enterprise IT Leaders are working to figure out what Cloud Native means to their organizations and how to get there. Many leaders are looking out over a chasm, a gulf between what their organization looks like now and a distant “destination” that isn’t distinctly clear.  How do you build for the future, without throwing out all the applications and infrastructure you’ve already invested in, the very systems that are, in many cases supporting your business? How do you cut through all the hype...
Published 08/03/22
A basic introduction to the Elixir programming language and its ecosystem from a developer who has spent the last five writing and deploying modern applications in it. If you've never heard of Elixir, it is a dynamic, functional language that has seen strong uptake in the web development with additional competencies in IoT and recently machine learning.
Published 07/19/22