The Red Hat X podcast series - discussing topics around open source, application development, platforms, solutions, and partnering with Red Hat.
RHC4TP - The Red Hat X podcast series
You are about to explore computer science and start developing the first applications. What should be your first programming language? Should it be adorable JavaScript, glorious Python, legendary Java, or... something else? Well, as always, it depends.Join Brian and Denis Magda, Head of Developer Relations at Yugabyte, in reflecting on their experiences in an attempt to find that mysterious programming language X for beginners.
Borderline paranoia – a robot in the 50s has become something that we couldn't recognize. Today, robots are more compact, and the computers inside are tinier than ever. From the 2018 recognition of the hardware hack from China or the 2022 Starlink hack:: https://threatpost.com/starlink-hack/180389/Aronetics features Jerod Brennen of Brennen Consulting to join our ongoing conversation that discovers issues with black boxes in your home or business and the complex implicit trust.
Modern cloud-native environments using Kubernetes or OpenShift are driving innovation and speed for development teams but these technologies do not come with a framework or set of rules for implementing container security. Choices for security tooling are often down to what development teams and operations teams regard as best practices. In this session, the Jetstack team will cover why machine identity management is fundamental to delivering container security and discuss what organizations can do to improve best-practice container security.
Enterprises are building and delivering containers and Kubernetes-based applications to their customers. With a distributed architecture, microservices are communicating with each other and 3rd party APIs to enable information exchange and present it to the customers. Such communication via the internet makes these applications vulnerable to external network-based attacks. In this podcast, we will discuss how traditional runtime threat defense solutions fall short of preventing attacks, and a new approach is required that provides: Workload-based Intrusion Detection and Prevention Systems (IDS/IPS)Deep Packet Inspection (DPI) and application-level visibility for containerized workloadsContainer runtime security with malware protection and zero-day attack protection
Building on our previous discussion on First Mile Observability (Red Hat X Episode 123 - April 26, 2022), we'll focus on tools and methods organizations can use to optimize their Enterprise Observability Pipelines. Specifically, we'll discuss 1) Fluentd and Fluent Bit - the evolution of these open-source projects for data collection and transport that have now been deployed over one billion times, 2) Strategies for multi-output distribution to send data from anywhere to anywhere and 3) How Calyptia Core can aggregate your observability data to easily define and manage your pipelines, no matter how complex your environment.
threat detection at runtime is a crytical component of securing containers and cloud. how can you spot malicious activity in a dynamic orchestrated environment based on kubernetes? Today we will discuss runtime security practices using Red Hat opensource.
Event-sourcing has been around for a long time. When humans first created money thousands of years ago, accountants invented the earliest forms of event-sourcing when they realized it was not a good idea to throw away data while keeping track of other people's money. Fast forward to today, accountants continue to use event-sourcing. It may surprise some developers, but event-sourcing is a crucial component of the software development process in the form of git. A more general form of event-sourcing for data other than financial data was introduced around 2007 by Greg Young. While the event-sourcing concepts are solid, based on thousands of years of experience, the adoption by the development community has been slow.In this session, we will look at event-sourcing from a perspective as an indispensable component of modern, distributed, cloud-based microservice systems. We will also examine why event-sourcing adoption has been slow and why things are changing, making it easier to include event-sourcing in your microservice systems.
Have you ever wondered how a geo-distributed app such as a Slack-like corporate messenger is architected and functions? How hundreds of microservices are deployed and communicate across distant geographies? How thousands of user messages and events flow in real-time across the countries? How are petabytes of data stored and accessed across continents?By taking a Slack-like corporate messenger as an example, we'll discuss the fundamental design principles for geo-distributed apps that are born to work across geographies.
Making a data pipeline fit for machine learning use cases requires more than just additional data monitoring. Furthermore, bringing machine learning into production has traditionally required a lot of manual setup and configuration, even for toy ML pipelines. These manual methods are not reproducible, don't autoscale, require significant technical expertise, and are error-prone. Among other things, this episode will go over MLOps, a set of practices aiming to deploy and maintain machine learning models in production reliably and efficiently.
Ansible Automation Platform extends beyond traditional tools for server and software installations, to encompass the entirety of IT infrastructure, including network resources. The Infoblox BloxOne Collections for Ansible Automation Platform is a package of modules and plug-ins that allow managing BloxOne DDI objects and functions through APIs that leverage Ansible Playbooks. This enables network professionals to utilize Infoblox infrastructure for DNS automation of VMs and containerized workloads deployed across multiple platforms.Infoblox Ansible Collections for BloxOne allows you to interact with the BloxOne DDI through APIs. DDI information is presented as variables to an Ansible Playbook: a YAML-based text file that helps to automate managed systems found in inventory. Playbooks allow an administrator to configure an entire environment by leveraging a block of code that is known as a module that executes on Linux and Windows systems, networks, and cloud instances. The Collections let an Ansible Playbook automate the provisioning of the network service infrastructure
A recent VPN advertisement ensured security by using their VPN. Join us for trust and truth in marketing, computing ethics, and pirating 30-pound cannonballs.
Zero Trust is a security strategy which is generating a lot of buzz. Supply chain security is a topic that is so critical that the US White House issued an executive order mandating it. Join Glen Kosaka, Head of Product Security for NeuVector, as he explains why these are hot topics and how they affect the security controls for container and Kubernetes pipelines.
You can connect your Kubernetes cluster with GitLab to deploy, manage, and monitor your cloud-native solutions. The agent allows you to communicate with your cluster, enable a cache of Kubernetes objects, and much more. Then add in Infrastructure as code (IaC) scanning to make sure what you are deploying into your cluster won't compromise your system.This podcast will go over both of these concepts in order to get you deploying safer, more secure code even faster with GitLab.
As organisations grow their cloud initiatives, there is always a deadly undercurrent growing beneath the surface: waste. Multiple teams solving the same problems, over and over again, in different ways, using different technologies every time. This is remedied with a heavy dose of central control, which only leads to stifled innovation and excessive process. There is, however, a third option - platform thinking. Join Chris Cooney, Developer Advocate for Coralogix, as he discusses the power of platform thinking and how it impacts collaboration and system reliability, as it grows a community of likeminded engineers within an organisation who are set on solving a problem precisely once, and making that solution available to everyone.
Web 1,2, and 3 have privacy issues and problems with the perimeter that vanished. Aronetics features Jerod Brennen of Brennen Consulting to join our conversation that discover issues with black boxes in your home or business and the complex implicit trust. How could you secure devices on the edge on a unsecure place? Explore limits of ignorance on the edge.
It's common to hear "everything is so complicated nowadays" followed by a list of common tech industry scapegoats. Kubernetes, front end frameworks, microservices, "hip" technologies. It's a relatable reaction but beyond being cathartic it's a little off the mark. This feeling boils down to a real increase in cognitive load - and not cognitive load in terms just dealing with increasingly heavy frameworks. To better understand the problem, it pays to talk more holistically about cognitive load as it exists between different disciplines, experience levels, and contexts. We have to acknowledge it as a combination of technical, organizational, and psychological issues if we want to get a start on managing it. We may not have definitive solutions but there are a few adjustments to your way of thinking that can be helpful to those in the trenches.
Infrastructure is one of the four pillars of IT Modernization, along with theDevelopment Process, Application Architecture and Deployment methodology. Leveraging the promise of Cloud Native means using the best of each of these. However, most organizations have a spectrum of applications in their portfolio to manage from the traditional VM based to the fully Cloud Native, microservices based apps deployed in containers. The challenge for today's CIO has is to ensure the Dev teams have access to the modern tooling, processes, and infrastructure they need, while simultaneously providing a modern platform for the traditional parts of their application portfolio. All while ensuring security, and compliance, reducing complexity, and being cost effective.
Moving to the cloud and edge comes with big rewards such as new use-cases and business opportunities. But how to efficiently build cloud and edge applications can be a confusing journey, mainly due to the lack of managed platforms that unifies Developer Experience (DX), ZeroOps Experience, and a Reactive Runtime. With Kalix, we set out to create a powerful PaaS that addresses these challenges for the cloud-to-edge continuum. An API PaaS that enables any developer with any language to build high-performance, data-centric applications without the complexity that often slows down engineering teams.
In this podcast, Dhiraj Sehgal, Director, Product and Solution Marketing for Tigera will talkabout key takeaways shared by Openshift and Calico enterprise users to address the securityand compliance issues with active security initiatives. Tigera inventor of Calico, one of the most widely deployed Kubernetes CNI in the world with over 2M nodes and 500K clusters. Dhiraj will also touch upon how Calico and OpenShift jointly address the container security, cloud-native network security, and compliance challenges and consequently accelerate your cloud-native application deployments.
Clear the fog of the cyberwar and see through the unknown on your computer with Aronetics in Red Hat Enterprise Linux and learn a new level of relaxation and security.
As companies continue to embrace containers and Kubernetes at a rapid pace there's a growing need to address security. Security is one of the major concerns with container and Kubernetes adoption. Security issues continue to cause delays in deploying containerized applications into production. Therefore, security needs to be “baked in” to DevOps workflows. The only way to do this is to form a tighter relationship between Security and DevOps teams and learn how to harmonize their tooling and processes to run fast in a DevOps-driven world. During this podcast we'll discuss several ways the Security and DevOps teams can work in glorious harmony to achieve secure container and Kubernetes nirvana.
Enterprise IT Leaders are working to figure out what Cloud Native means to theirorganizations and how to get there. Many leaders are looking out over a chasm, a gulf between what their organization looks like now and a distant “destination” that isn't distinctly clear. How do you build for the future, without throwing out all the applications and infrastructure you've already invested in, the very systems that are, in many cases supporting your business? How do you cut through all the hype and “Irrational Exuberance,” and craft an executable plan to take your organization into the Cloud Era? That's likely going to involve running your legacy applications alongside your new cloud apps, let's talk about how that can be done at scale and with cloud agility & economics.
A basic introduction to the Elixir programming language and its ecosystem from a developer who has spent the last five writing and deploying modern applications in it. If you've never heard of Elixir, it is a dynamic, functional language that has seen strong uptake in the web development with additional competencies in IoT and recently machine learning.
In the last episode we learned about Backstage, an open platform for building developer portals, and how it has evolved into a global open source community since Spotify released it in 2020. Now, let's take a look at who uses Backstage in the wild, common use cases, and where the project is headed in the future.
In this episode we discuss the impacts of some of the latest vulnerabilities and how Dynatrace can help prevent the exploits of such vulnerabilities. We will also cover general trends in cyber defense, and why it is harder to defend than attack and what role does AI play in modern cyber security.
Spotify's mission is to unlock the power of human creativity by creatingopportunities for artists and fans alike. And underpinning that missionare thousands of developers managing tens of thousands of softwarecomponents. So add unlocking developer creativity to that list —streamlining their workflows, making it easier to share knowledge, andgetting the messy parts of infrastructure out of their way.In this episode, we'll go behind the scenes of Spotify to learn abouthow Spotify exports their internal engineering culture to a globalcommunity with an open source project called Backstage.
LINBIT SDS is a software-defined storage, that perfectly fits with Red Hat's OpenShift. It provides persistent volumes, exposed through the CSI interface. You can use it to build out of internal storage devices the persistent volumes for your cloud-native container workload.While it was initially designed for the on-prem data center, it is also a fit for multi-cloud and edge deployments. It is a good fit for IO demanding workloads, like OLTP and OLAP databases, message queuing, and AI.
Learn about retaining control of your security controls to take action against unknown future events. Join John Aron again with the discussion from Aronetics where we understand more of the cybersecurity battle.
Akka is a toolkit for building scalable, resilient, and resource-efficient applications on the JVM in Java or Scala. With Akka, you can build applications composed of a single JVM to a fleet of JVMs distributed across a cluster of servers. We will tour Akka from the humble actor up to the systems level and how Akka is used by some of the world's most recognized brands to build distributed clustered systems composed of clusters within clusters for optimal customer experiences.
There are many definitions of Observability that are thrown around. Some definitions reference control theory. We take the more pragmatic approach advocated by Bryan Cantrill as the “capability to allow a human to ask and answer questions.” As such, when creating a new system or wrangling long-standing systems, discovering the questions that we want to ask systems has been a valuable exercise. So often, we jump to the tools or implementation without taking a step back and looking at what we are trying to accomplish. One of the key questions that many of us want answered for our system is where an application was spending the most time in its flow of execution. In order to answer that question, NGINX embarked on a journey to integrate Open Telemetry with their application's Modern App Reference Architecture (MARA).
Join us this week to learn about how Aronetics redefines security from your pocket. Learn about retaining and controlling your security system to take action against unknown future events.
In this conversation, Jim Walker (@jaymce, Principal Product Evangelist at Cockroach Labs) discusses how serverless has moved from compute to backing data services, and focuses on improving application developer productivity. Plus, we address why developers love consuming a serverless SQL database, how CockroachDB thinks about serverless, and what the future of application development is going to look like with a serverless SQL database.
Traditionally, enterprise observability solutions have required event data to be routed to back-end storage before any centralized analysis and reporting could take place. First Mile Observability shifts this whole process left, enabling observability immediately when and where the data is created. This empowers the enterprise with immediate, actionable intelligence on system performance and real-time troubleshooting and performance optimization. As a bonus, First Mile Observability solutions from Calyptia, powered by open source Fluent Bit and Red Hat OpenShift, can leverage your existing IT infrastructure.
Starburst Galaxy is a self-service platform that provides all the benefits of the best-in-class MPP SQL engine, Trino, on an easy to use, fully-managed and enterprise-ready SaaS platform designed by the open source project's original creator and its experts. Users can end their data silos by querying their data across sources and clouds to open doors to new insights.
As Kubernetes becomes more and more popular there's a growing need to address compliance concerns. While development teams face constant demands based on customer and organizational equirements, they must also ensure that data and systems adhere to mandates and frameworks like GDPR, NIST 800-53, HIPAA and others. The only way to keep up is to automate processes everywhere possible – including compliance.During this podcast we'll discuss the current and future state of compliance requirements and how developers can use a template-based approach to simplify the administration and management of compliance.
It seems like everyone is moving to modern application architectures. What modern means can vary from person to person, but you can safely assume it is going to involve cloud native and kubernetes. While there are many upsides to these architectures, they do add a new level of complication to observability and troubleshooting. With constant changing and evolving applications and infrastructure you need to approach troubleshooting differently.
Empowering developers to use the tools and services that they are comfortable using is mandatory in today's application development world. How can security team gain observability in the highly distributed system where the definition of perimeter is not easy to define?Gain an understanding of what Machine Identity Management means to an organization where there is an ever growing ecosystem of application development and deployment stack.
Has there been a more exciting time in enterprise IT than now-- the age of cloud native? Containers, Kubernetes, and the expansive ecosystem of technologies around them have brought about game-changing new approaches to building, deploying, and managing applications. But as many enterprise organizations undertake ambitious cloud native projects, they face big new challenges in operationalizing and managing Kubernetes environments, particularly with respect to networking, storage, observability, and security.
In today's explosion of network end-point devices (think IoT), the management of IP addresses and domain names become exponentially more difficult to address. This is where automation tools like Ansible can be a savior when packaged with IP and Domain Name solutions such as Infoblox. Infoblox Ansible Collection for vNIOS enables the DNS and IPAM automation of VM workloads that are deployed across multiple platforms. It allows managing your NIOS objects by leveraging the REST APIsin the backend. With the new Infoblox NIOS Collection-1.1.0 for Ansible, organizations can now leverageAnsible to automate the configuration and management of the DNS Traffic Control functionality offered by Infoblox. Infoblox DNS Traffic Control (DTC) integrates GSLB functionality with core DDI network services. Highly automated, it provides the performance, scalability, and availability that organizations require. DTC load balances DNS traffic based on client location, server location, and server availability.
Running a Cloud Native Database in Public Cloud and Hybrid Cloud environments, one gets to see a number of security issues. These are nearly always obvious in hindsight. This is a list of five that Matt Ingenthron, Sr. Director of Engineering and in charge of Cloud Native Development, has seen with Couchbase Database Deployments.Resources: Matt's Scale 17x talk: https://www.socallinuxexpo.org/scale/17x/presentations/tyrannical-9s-solved-opentracing-your-apps-and-couchbaseJeff Dean and Luiz BarrosoThe Tail at Scale - CACM February 2013Rick L. HudsonInternational Symposium on Memory Management July 2018
Red Hat with its Linux distribution, container environments and Ansible managementframework is one of the fastest growing software infrastructure solutions in the world. In this episode we invite Eric Herzog, CMO at Infinidat, to discuss how they have been incorporating compatibility and optimization in Red Hat environments for several years.
The trend of Infrastructure-as-Code (IaC) and GitOps continues to gain momentum with DevOps and cloud teams as a way to achieve complete operational control of infrastructure. As teams codify infrastructure using IaC tools like Terraform, Helm, and YAML, it can be easy to overlook misconfigurations and security gaps that can leave you exposed to risk. Using a policy-as-code approach, you can ensure security and compliance within your IaC and across your pipeline – from source to production. In this podcast, you'll hear from Maor Goldberg, VP of Security Product Management at Sysdig who brings a wealth of cybersecurity experience having led large-scale, high-demanding security, identity, and networking projects and companies. Join us to learn about the challenges and opportunities of securing IaC for cloud, Kubernetes, and OpenShift.
The rise of microservices, DevOps, and global applications is putting pressure ontraditional systems of record. Modern transactional applications need databases that can deliver continuous availability, on-demand scale, and geo-distribution without sacrificing ACID guarantees or RDBMS features. These databases should run where the applications are and enable developers to deliver new capabilities quickly.Join Yugabyte's Tim Faulkes and our host for a conversation about the design of high-performance distributed SQL databases, and real-world use cases driving the adoption of distributed SQL databases.
Today's container technologies, kubernetes being the leader here, focus on CPU &memory as the primary resources when scheduling and managing applications in a distributedenvironment. But they tend to ignore the impact of storage and network I/O resources today's containerized applications need. Diamanti considered management of storage and network resources as the first-degree problem under this new paradigm. Gopal Sharma, co-founder and CTO of Diamanti, shares the origin of this thought process and how it is changing the way enterprises are relying on Diamanti to provide the right infrastructure to take their applications from dev to production.
Monday morning special! Take a break from tech with this conversation on working remote. According to GitLab's 2021 Remote Work Report, 82% of respondents agreed that remote work is the future of work, with nearly as many 80% saying that they would recommend working remotely to a friend. This shows us that the way we work is leading towards remote with many praising its benefits.Both RedHat and GitLab are known for their Remote Culture and its flexibility, providing employees the ability to work a sync and handle their personal needs first. This has brought tremendous benefits and enables a culture of family and friends first. In this episode we will speak about our experiences with remote work and how it has affected our lives.
Kubernetes adoption and use is gaining traction for all types of services and applications, but for many the database still runs off to one side. In fact, a recent survey conducted by Cockroach Labs and Red Hat shows that 94% of organizations are using Kubernetes in production today -- and that the number one priority they named is architecting for data-intensive workloads.Please join us for this insightful session, where we will help you gauge your maturity against some of your peers and help identify the trends and approaches organizations are facing with K8s and how to use it for transactional, data intensive workloads.Click here to read the full report.
Today's container technologies, focus on CPU and memory as the primary resources when scheduling and managing applications in a distributed environment, but they tend to ignore the impact of storage and network I/O resources on containerized applications. Diamanti considered management of storage and network resources as the first-degree problem under this new paradigm. Abhay Singh and Naveen Seth, founding engineers at Diamanti, take a deep dive into the vision and the challenges that shaped their solution to this issue.
Kubernetes delivers the greatest flexibility and agility of any infrastructure, but with it comes a level of complexity that makes it impossible to manage manually at scale. Andrew Hillier, co-founder and CTO of Densify, will discuss the latest thinking around capacity operation and how to best handle capacity management for these environments.
Innovation is the goal of every organization today. Whether it is for growth, gaining competitive advantage or just improving the way they do business, it always points back to innovation. The challenge many organizations face when trying to innovate is integration to the siloed legacy systems which are difficult to interact with and certainly not designed to interface with modern systems. So, many customers we speak with have a wealth of Information locked into their legacy mainframe systems, with no easy way to access it, nor any easy way to adapt to changes quickly once they do. In this tech talk we will explore the challenges to innovation when legacy systems are involved, what we have learned from our customers, and some real live case studies highlighting successful innovation stories involving legacy systems. We will also discuss how these innovations play into the Red Hat OpenShift framework.
Adaptigent delivers future-proof solutions that turn yesterday's legacy systems into tomorrow's leading-edge applications, in a fraction of the time and cost that system modernization usually requires. With over 30 years' of industry experience, they have helped over 2,500 organizations across the globe improve their operational efficiency and customer experience. Adaptigent has served an impressive roster of large companies across a variety of industries including banking, insurance, transportation, logistics, and manufacturing, facing many challenges along the way. In this podcast, you'll hear from Adaptigent's Lead Solution Engineer, Dusty Rivers, on the fascinating details behind some of their most interesting and compelling customer stories.
GT Software is now Adaptigent™ but the change is more than just skin-deep. Adaptigent empowers organizations to unlock the potential of their core systems to enable enterprise-level innovation. Their application, led by the Adaptive Integration Fabric, help IT organizations provide real-time, business-ready results by creating a dynamic, no-code layer that allows modern applications to access the full treasure trove of data trapped on legacy systems. With decades of digital transformation expertise, it is trusted by many of the world's largest companies to accelerate their digital transformation efforts. In this 3 part partner spotlight podcast, learn about Adaptigent's history, offerings, and the market trends driving the recent rebranding.