POPULARITY
Categories
Joseph Avanzato is the Security Operations and Forensics Group Leader at Varonis. In this episode, he joins host Paul John Spaulding to discuss the common tactics attackers exploit and mistakes made by enterprises that lead breaches, as well as how Varonis is uniquely positioned to help public and private customers around the world investigate, contain, and evict attackers from their network. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://www.Varonis.com.
Today we delve into the tech expertise deficit and why technical depth and decades of doing the work matter more than social media followers and content creation hype. Our guest is Russ White, engineer, author, teacher, and certification developer. We begin with current events in AI, and then investigate the differences between career and influence... Read more »
Send us a textQuantum threats aren't waiting politely on the horizon, and neither should we. We kick off with Signal's bold move to deploy post-quantum encryption, unpacking the “belt and suspenders” approach that blends classical cryptography with quantum-resistant algorithms. No jargon traps—just clear takeaways on why this matters for privacy, resilience, and the pressure it puts on other messaging platforms to evolve. We point you to smart reads from Ars Technica and Bruce Schneier that make the technical guts approachable and actionable.From there, we switch gears into a focused CISSP Domain 8 walkthrough: how to weave security into every phase of the software development lifecycle. We talk practical integration across waterfall, agile, and DevOps; show why change management, continuous monitoring, and application-aware incident response are non-negotiable; and explain how maturity models like CMMI and BSIMM help teams move from reactive to repeatable. We also break down the developer's toolbox—secure language choices, vetted libraries with SCA, hardened runtimes, and IDE plugins that surface issues in real time—so teams can ship faster without trading away safety.Speed meets rigor in the CI/CD pipeline, where shift-left security comes alive with SAST, DAST, and SOAR-driven checks. We cover repository hygiene, secret scanning, and how to measure effectiveness with audit trails and risk analysis that map code issues to business impact. You'll get a clear view of third-party risk across COTS and open source, the shared responsibility model for SaaS, PaaS, and IaaS, and the daily practices that keep APIs from leaking data: least privilege, strict authorization, input validation, and rate limiting. We close with software-defined security—policies as code—bringing consistency, versioning, and automation to your defenses. Subscribe, share with a teammate who owns your pipeline, and leave a review to tell us the next Domain 8 topic you want us to deep-dive.Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
No cenário dinâmico do marketing digital e das vendas, a busca pela previsibilidade e eficiência tornou-se uma obsessão. Empresas de todos os portes anseiam por transformar o processo de vendas de uma “arte” intuitiva e, por vezes, caótica, em uma “ciência” replicável e escalável. Mas, seria essa transição meramente técnica? Ou há um profundo embate cultural e psicológico em jogo? O episódio do podcast Growth Diaries, com a participação de Daniel Lestinge, fundador da Blue Forecast, desvenda as complexidades dessa jornada, expondo a tensão entre a natureza humana dos vendedores e a frieza implacável dos dados. Mais do que um mero relatório de vendas, o que emerge é um manifesto sobre como a gestão de dados pode, paradoxalmente, humanizar e otimizar a máquina de receita, desde que se compreenda a intrincada dança entre pessoas, processos e algoritmos.A Evolução da Gestão Comercial: Do Grito ao AlgoritmoA história da gestão comercial é uma jornada fascinante, pontuada por transformações radicais. Houve um tempo em que o sucesso em vendas era sinônimo de carisma, persuasão e, muitas vezes, de uma boa dose de “gritos e motivação” por parte dos gestores. Era uma era onde a intuição reinava soberana, e a performance individual era celebrada, mas dificilmente replicável ou escalável. Max Weber, o sociólogo alemão, já observava no início do século XX a tendência da sociedade moderna à racionalização, onde a eficiência e a calculabilidade suplantariam a tradição e a emoção (Weber, 1978). Essa racionalização, que ele via nas burocracias, hoje se manifesta na busca incessante por métricas e processos no universo das vendas.Daniel Lestinge, com sua trajetória que migra de vendas para dados, é um testemunho vivo dessa evolução. Ele representa a nova guarda, que entende que a paixão e a motivação continuam sendo cruciais, mas precisam ser ancoradas em um arcabouço de dados e processos. O modelo artesanal, onde o “feeling” do vendedor era o KPI supremo, cede lugar a uma gestão que busca transformar a operação de vendas em uma “fábrica de receita” previsível. Não se trata de desumanizar, mas de otimizar. Como argumenta Peter Drucker, “o que não pode ser medido, não pode ser gerenciado” (Drucker, 1954). E no mundo das vendas, gerenciar significa entender o que funciona, por que funciona, e como replicar esse sucesso em escala.O Calcanhar de Aquiles Humano: Vendedores e o CRMApesar da inegável lógica por trás da gestão de vendas baseada em dados, o maior desafio reside, ironicamente, no elemento humano. Vendedores, por sua própria natureza, são movidos pela emoção, pela conexão pessoal e pela liberdade de ação. A ideia de preencher meticulosamente um CRM, seguir roteiros rígidos ou aderir a processos padronizados pode soar como uma camisa de força para muitos. Essa resistência não é meramente uma questão de preguiça ou má vontade; é um reflexo de vieses cognitivos e da aversão à perda, conceitos explorados por Daniel Kahneman e Amos Tversky em sua Teoria da Perspectiva (Kahneman & Tversky, 1979). A mudança de um método familiar para um novo, mesmo que comprovadamente mais eficiente, é percebida como uma perda de autonomia ou de um “jeito de fazer” que já trouxe resultados.A Blue Forecast, ao se deparar com essa realidade, precisou desenvolver uma abordagem que não apenas implementasse ferramentas de dados, mas que também promovesse uma profunda mudança cultural. A solução não está em impor, mas em demonstrar o valor. Quando os vendedores percebem que o CRM não é um instrumento de controle, mas uma ferramenta que os ajuda a fechar mais negócios, a gerenciar melhor seu pipeline e a identificar oportunidades que antes passariam despercebidas, a resistência diminui. É uma questão de traduzir a linguagem dos dados para a linguagem dos resultados tangíveis na vida do vendedor. Como Lestinge aponta, a gestão comercial precisa de visibilidade e controle, especialmente em ambientes remotos, e essa visibilidade só é alcançada com dados confiáveis, gerados por processos bem definidos.Data as a Service: O Modelo Blue Forecast e a Democratização da AnáliseA complexidade de montar e manter uma equipe de dados interna é um obstáculo significativo para muitas empresas, especialmente as de médio porte que faturam acima de 10 milhões por ano, mas que ainda não possuem a maturidade para um departamento de dados robusto. É nesse vácuo que o modelo “time de dados por assinatura” da Blue Forecast se posiciona como uma solução estratégica. Esse modelo reflete uma tendência econômica mais ampla: a “economia de serviços” ou “as-a-service” (SaaS, PaaS, IaaS), onde empresas podem acessar expertise e infraestrutura de ponta sem os custos fixos e os desafios de recrutamento e retenção de talentos.Ao oferecer times de dados por assinatura, a Blue Forecast democratiza o acesso à inteligência de negócios avançada. Empresas como Embracon e Ser Ronda, que talvez hesitassem em investir em uma estrutura de dados própria, podem agora alavancar análises sofisticadas para otimizar suas operações de vendas. Isso permite que se concentrem em seu core business, enquanto especialistas gerenciam a complexidade dos dados. É uma terceirização estratégica que não apenas reduz custos, mas também acelera a curva de aprendizado e a implementação de melhores práticas, conforme o conceito de vantagem competitiva de Michael Porter (Porter, 1985).A “Fábrica de Receita”: Previsibilidade em um Mundo IncertoA visão de transformar a operação de vendas em uma “fábrica de receita” é o cerne da proposta da Blue Forecast e um conceito poderoso para o marketing digital. Em um mercado cada vez mais volátil e competitivo, a previsibilidade é um ativo inestimável. Uma “fábrica de receita” implica um sistema onde as entradas (leads, atividades de vendas) são processadas de forma consistente para gerar saídas (vendas, receita) com uma taxa de conversão conhecida e gerenciável. Isso exige a aplicação de princípios de gestão de processos, como os popularizados pelo Lean Manufacturing e Six Sigma na indústria, adaptados para o universo das vendas (Womack & Jones, 2003).A chave para essa previsibilidade é a definição clara de processos e a medição constante de KPIs. Sem dados confiáveis, a “fábrica” operaria no escuro, sujeita a flutuações e ineficiências. Com eles, é possível identificar gargalos, otimizar etapas e prever resultados com maior acurácia. A previsibilidade não elimina a necessidade de inovação ou de adaptação a mudanças de mercado, mas fornece uma base sólida para a tomada de decisões, permitindo que as empresas reajam de forma proativa, e não apenas reativa.Governança de Dados: O Alicerce InvisívelUm dos pontos cruciais levantados por Lestinge é a necessidade de homologação dos dados. Em muitos casos, as empresas sequer possuem uma definição clara do que constitui uma “venda” ou um “lead qualificado”. Sem essa padronização, qualquer análise de dados será falha, construída sobre areia movediça. A governança de dados, portanto, torna-se o alicerce invisível sobre o qual toda a “fábrica de receita” é construída.A homologação envolve alinhar critérios, criar campos padronizados no CRM e garantir que todos os membros da equipe compreendam e sigam esses padrões. É um trabalho minucioso, mas essencial. Filosoficamente, pode-se traçar um paralelo com a busca pela verdade e consistência na epistemologia. Para que o conhecimento (neste caso, os insights de dados) seja válido, ele precisa ser fundamentado em premissas claras e consistentes. Dados inconsistentes levam a conclusões equivocadas e, consequentemente, a decisões de negócios erradas. Como alertam Davenport e Dyché, sem uma boa governança, os dados podem se tornar um passivo, não um ativo (Davenport & Dyché, 2013).Além dos Dashboards: A Cultura Data-Driven na PráticaTer dashboards bonitos é um bom começo, mas a verdadeira transformação acontece quando os dados permeiam a cultura organizacional. Daniel Lestinge destaca como as reuniões se transformam após a implementação das soluções da Blue Forecast. De debates improdutivos focados em atribuição de culpa, elas evoluem para sessões focadas em soluções e acompanhamento de iniciativas, utilizando ferramentas como PDCA (Plan-Do-Check-Act) e 5W2H.Essa mudança de cultura é um desafio sociológico e psicológico complexo. Requer que os líderes modelem o comportamento desejado, que a equipe seja treinada para interpretar e agir com base nos dados, e que haja um ambiente de segurança psicológica onde os erros sejam vistos como oportunidades de aprendizado, não de punição. Edgar Schein, renomado teórico da cultura organizacional, enfatiza que a cultura é moldada por artefatos, valores e pressupostos básicos, e que a mudança cultural é um processo lento e deliberado (Schein, 2017). Ao transformar a forma como as reuniões são conduzidas, a Blue Forecast está, de fato, reescrevendo os rituais e as normas que sustentam a cultura de vendas de seus clientes.O Dilema da Imagem vs. Entrega: Lições do Ecossistema DigitalUm dos insights mais provocadores do episódio do Growth Diaries foi a reflexão sobre a influência das redes sociais e os “influenciadores corporativos”. Daniel e Victor observaram que, muitas vezes, há um foco excessivo na imagem dos fundadores e na retórica inspiradora, em detrimento da entrega real de valor estruturado. Essa crítica ressoa com a teoria da “sociedade do espetáculo” de Guy Debord, que descrevia uma sociedade onde as relações sociais são mediadas por imagens e o consumo de representações se sobrepõe à experiência direta e autêntica (Debord, 1994).No contexto do marketing digital e da educação corporativa, essa tendência pode ser perigosa. Empresas e indivíduos que constroem sua reputação apenas na imagem, sem a substância de processos sólidos e resultados concretos, correm o risco de se tornar “castelos de areia”. A mensagem de Daniel é clara: a entrega de resultados tangíveis e a transformação contínua são o que realmente fidelizam o cliente. Em uma era de excesso de informação e de “gurus” instantâneos, a autenticidade e a capacidade de gerar valor real são os diferenciais competitivos mais poderosos.A Autonomia do Cliente: Infraestrutura e FlexibilidadeUm aspecto técnico, mas de grande impacto estratégico, é a decisão da Blue Forecast de implantar todas as soluções na infraestrutura do cliente. Essa abordagem, que pode parecer mais trabalhosa à primeira vista, é fundamental para garantir a autonomia do cliente e evitar a chamada “dependência de fornecedor” (vendor lock-in). Ao hospedar os dados e as ferramentas na própria infraestrutura do cliente (seja AWS, GCP ou outra), a Blue Forecast assegura que o cliente mantém a posse e o controle de seus ativos digitais.Essa estratégia reflete uma compreensão profunda do valor a longo prazo para o cliente. Não se trata apenas de entregar uma solução, mas de capacitar o cliente. Em um mundo onde a segurança e a soberania dos dados são cada vez mais críticas, essa escolha técnica se traduz em um benefício estratégico, reforçando a confiança e a parceria. Além disso, a flexibilidade em adaptar-se à stack tecnológica do cliente demonstra uma abordagem centrada no cliente, um pilar fundamental para o sucesso de qualquer empresa de serviços, como ressaltado por autores como Frederick Reichheld sobre a lealdade do cliente (Reichheld, 1996).O ROI da Transparência: Casos de Sucesso e RetençãoO valor da análise de dados em vendas é mais bem ilustrado pelos casos de sucesso. Lestinge citou o exemplo de uma empresa de Telecom do Espírito Santo que, após a implementação de dashboards e processos estruturados, viu sua retenção (Customer Success) saltar de 27% para 54%. Esse é um testemunho poderoso do ROI da transparência e da governança de dados. A retenção de clientes é, muitas vezes, mais lucrativa do que a aquisição de novos, um princípio econômico bem estabelecido no marketing.O aumento da retenção não é um resultado mágico; é a consequência direta de uma melhor compreensão do cliente, da identificação proativa de riscos de churn e da capacidade de agir com base em insights. Quando a equipe de CS tem acesso a dados confiáveis sobre o comportamento do cliente, o uso do produto e o histórico de interações, ela pode intervir de forma mais eficaz, oferecendo soluções personalizadas e fortalecendo o relacionamento. Esse é o poder de transformar dados em ações estratégicas que impactam diretamente o resultado final.O Caminho à Frente: Priorizando o EssencialA mensagem final de Daniel Lestinge é um lembrete valioso em um mundo saturado de informações e soluções complexas: comece simples. Ele orienta focar inicialmente em construir processos claros, definir poucos KPIs essenciais e garantir que o time de vendas funcione de forma coesa, antes de buscar soluções excessivamente complexas. Essa abordagem minimalista e pragmática ecoa o Princípio de Pareto (80/20), onde a maioria dos resultados advém de um número limitado de causas (Koch, 1998).No contexto do marketing digital e da gestão de vendas, isso significa resistir à tentação de implementar todas as ferramentas e métricas disponíveis de uma vez. Em vez disso, a prioridade deve ser estabelecer uma base sólida de dados confiáveis e processos operacionais eficientes. A jornada é gradual, e o principal é progredir com foco e “mão na massa”. É um convite à ação deliberada e estratégica, em vez de uma corrida desenfreada por todas as inovações tecnológicas.Conclusão: A Sinfonia de Dados e HumanidadeO bate-papo no Growth Diaries com Daniel Lestinge transcendeu a mera discussão sobre análise de dados e vendas. Ele nos convidou a uma reflexão profunda sobre a natureza do trabalho, a psicologia humana e a evolução da gestão na era digital. A “fábrica de receita” não é um ideal frio e desumano; é a materialização da busca por eficiência e previsibilidade, que, quando bem implementada, pode liberar os vendedores para se concentrarem no que fazem de melhor: conectar-se com pessoas.A verdadeira maestria reside em orquestrar a sinfonia entre a precisão dos algoritmos e a intuição humana, entre a rigidez dos processos e a flexibilidade da criatividade. O futuro das vendas e do marketing digital não é apenas sobre coletar dados, mas sobre interpretá-los com sabedoria, aplicar essa sabedoria com propósito e, acima de tudo, lembrar que, no final das contas, estamos lidando com pessoas. A jornada é contínua, os desafios são constantes, mas a promessa de uma operação de receita mais eficiente e previsível, que respeita e amplifica o potencial humano, é um horizonte que vale a pena perseguir. É hora de salvar, reparar e decidir: vamos construir fábricas de receita que nutrem a alma humana ou nos perderemos na busca incessante por métricas vazias? A escolha é nossa.Referências (Estilo MLA)Davenport, Thomas H., and Jill Dyché. The New IT: How Technology Leaders Are Shaping the Digital Future. McGraw-Hill Education, 2013.Debord, Guy. The Society of the Spectacle. Translated by Donald Nicholson-Smith, Zone Books, 1994.Drucker, Peter F. The Practice of Management. Harper & Row, 1954.Kahneman, Daniel, and Amos Tversky. “Prospect Theory: An Analysis of Decision under Risk.” Econometrica, vol. 47, no. 2, 1979, pp. 263–91.Koch, Richard. The 80/20 Principle: The Secret to Achieving More with Less. Doubleday, 1998.Porter, Michael E. Competitive Advantage: Creating and Sustaining Superior Performance. Free Press, 1985.Reichheld, Frederick F. The Loyalty Effect: The Hidden Force Behind Growth, Profits, and Lasting Value. Harvard Business School Press, 1996.Schein, Edgar H. Organizational Culture and Leadership. 5th ed., Wiley, 2017.Weber, Max. Economy and Society: An Outline of Interpretive Sociology. Edited by Guenther Roth and Claus Wittich, University of California Press, 1978.Womack, James P., and Daniel T. Jones. Lean Thinking: Banish Waste and Create Wealth in Your Corporation. Free Press, 2003. To hear more, visit victormignone.substack.com
Join William Collins and Evyonne Sharp as they catch up on all things AI. They discuss the AI bubble and how it relates to venture capital, stock, and company evaluations. They talk about the AI experience for the average person, the adoption rate of AI tools, and how the AI infrastructure buildout might affect the... Read more »
In this episode, hosts Lois Houston and Nikita Abraham, along with Principal OCI Instructor Orlando Gentil, break down the differences between Infrastructure-as-a-Service, Platform-as-a-Service, and Software-as-a-Service. The conversation explores how each framework influences control, cost efficiency, expansion, reliability, and contingency planning. Cloud Tech Jumpstart: https://mylearn.oracle.com/ou/course/cloud-tech-jumpstart/152992 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu Special thanks to Arijit Ghosh, David Wright, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode. ----------------------------------------------------- Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:25 Nikita: Welcome to the Oracle University Podcast! I'm Nikita Abraham, Team Lead: Editorial Services with Oracle University, and with me is Lois Houston, Director of Innovation Programs. Lois: Hey there! Last week, we spoke about how hypervisors, virtual machines, and containers have transformed data centers. Today, we're moving on to something just as important—the main cloud models that drive modern cloud computing. Nikita: Orlando Gentil, Principal OCI Instructor at Oracle University, joins us once again for part four of our discussion on cloud data centers. 01:01 Lois: Hi Orlando! Glad to have you with us today. Can you walk us through the different types of cloud models? Orlando: These are commonly categorized into three main service models: Infrastructure-as-a-Service, Platform-as-a-Service, and Software-as-a-Service. Let's use the idea of getting around town to understand cloud service models. IaaS is like renting a car. You don't own the car, but you control where it goes, how fast, and when to stop. In cloud terms, the provider gives you the infrastructure—virtual machines, storage, and networking—but you manage everything on top—the OS, middleware, runtime, and application. Thus, it's like using a shuttle service. You bring your bags—your code, pick your destination—your app requirements, but someone else drives and maintains the vehicle. You don't worry about the engine, fuel, or routing planning. That's the platform's job. Your focus stays on development and deployment, not on servers or patching. SaaS is like ordering a taxi. You say where you want to go and everything else is handled for you. It's the full-service experience. In the cloud, SaaS is software UXs over the web—Email, CRM, project management. No infrastructure, no updates, just productivity. 02:32 Nikita: Ok. How do the trade-offs between control and convenience differ across SaaS, PaaS, and IaaS? Orlando: With IaaS, much like renting a car, you gain high control. You are managing components like the operating system, runtime, your applications, and your data. In return, the provider expertly handles the underlying virtual machines, storage, and networking. This model gives you immense flexibility. Moving to PaaS, our shuttle service, you shift to a medium level of control but gain significantly higher convenience. Your primary focus remains on your application code and data. The provider now takes on the heavy lifting of managing the runtime environment, the operating system, the servers themselves, and even the scaling. Finally, SaaS, our taxi service, offers the highest convenience with the lowest control level. Here, your responsibility is essentially just using the application and managing your specific configurations or data within it. The cloud provider manages absolutely everything else—the entire infrastructure, the platform, and the application itself. 03:52 Nikita: One of the top concerns for cloud users is cost optimization. How can we manage this? Orlando: Each cloud service model offers distinct strategies to help you manage and reduce your spending effectively, as well as different factors that drives those costs. For Infrastructure-as-a-Service, where you have more control, optimization largely revolves around smart resource management. This means rightsizing your VMs, ensuring they are not overprovisioned, and actively turning off idle resources when not in use. Leveraging preemptible or spot instances for flexible workloads can also significantly cut costs. Your charges here are directly tied to your compute, storage, and network usage, so efficiency is key. Moving to Platform-as-a-Service, where the platform is managed for you, optimization shifts slightly. Strategies include choosing scalable platforms that can efficiently handle fluctuating demand, opting for consumption-based pricing where available, and diligently optimizing your runtime usage to minimize processing time. Costs in PaaS are typically based on your application usage, runtime hours, and storage consumed. Finally, for Software-as-a-Service where you can consume a ready-to-use application, cost optimization centers on licensing and usage. This involves consolidating tools to avoid redundant subscriptions, selecting usage-based plans if they align better with your needs, and crucially, eliminating any unused license. SaaS costs are generally based on subscription or per user fees. Understanding these nuances is essential for effective cloud financial management. 05:52 Lois: Ok. And what about scalability? How does each model handle the ability to grow and shrink with demand, without needing manual hardware changes? Orlando: How you achieve and manage that scalability varies significantly across our three service models. For Infrastructure-as-a-Service, you have the most direct control over scaling. You can implement manual or auto scaling by adding or removing virtual machines as needed, often leveraging load balancers to distribute traffic. In this model, you configure the scaling policies and parameters based on your specific workload. Moving to Platform-as-a-Service, the scaling becomes more automated and elastic. The platform automatically adjusts resources based on your application's demand, allowing it to seamlessly handle traffic spikes or dips. Here, the provider manages the underlying scaling behavior, freeing you from that operational burden. Finally, with Software-as-a-Service, scalability is largely abstracted and invisible to the user. The application scales automatically in the background, with the entire process fully managed by the provider. As a user, you simply benefit from the application's ability to handle millions of users without ever needing to worry about the infrastructure. Understanding these scaling differences is crucial for selecting the right model for your application's need. 07:34 Join the Oracle University Learning Community and tap into a vibrant network of over 1 million members, including Oracle experts and fellow learners. This dynamic community is the perfect place to grow your skills, connect with likeminded learners, and celebrate your successes. As a MyLearn subscriber, you have access to engage with your fellow learners and participate in activities in the community. Visit community.oracle.com/ou to check things out today! 08:05 Nikita: Welcome back! We've talked about cost optimization and scalability in cloud environments. But what about ensuring availability? How does that work? Orlando: Availability refers to the ability of a system or service to remain accessible in operational, even in the face of failures or extremely high demand. The approach of achieving and managing availability, and crucially, your role versus the provider's differs greatly across each model. With Infrastructure-as-a-Service, you have the most direct control over your availability strategy. You will be responsible for designing an architecture that includes redundant VMs, deploying load balancers, and potentially even multi-region setups for disaster recovery. Your specific roles involves designing this architecture and managing your failover process and data backups. The provider's role, in turn, is to deliver the underlying infrastructure with defined service level agreements, SLAs, and health monitoring. For Platform-as-a-Service, the platform itself offers a higher degree of built-in, high availability, and automated failover. While the provider maintains the runtime platform's availability, your role shifts. You need to ensure your application's logic is designed to gracefully handle retries and potential transient failures that might occur. Finally, with Software-as-a-Service, availability is almost entirely handled for you. The provider ensures fully abstracted redundancy and failover behind the scenes. Your role becomes largely minimal, often just involving a specific application's configurations. The provider is entirely responsible for the full application uptime and the underlying high availability infrastructure. Understanding these distinct roles in ensuring availability is essential for setting expectations and designing your cloud strategy efficiently. 10:19 Lois: Building on availability, let's talk Disaster Recovery. Orlando: DR is about ensuring your systems and data can be recovered and brought back online in the event of a significant failure, whether it's a hardware crash, a natural disaster, or even human error. Just like the other aspects, the strategy and responsibilities for DR vary significantly across the cloud service models. For Infrastructure-as-a Service, you have the most direct involvement in your DR strategy. You need to design and execute custom DR plans. This involves leveraging capabilities like multi-region backups, taking VM snapshots, and setting up failover clusters. A real-world example might be using Oracle Cloud compute to replicate your VMs to a secondary region with block volume backups to ensure business continuity. Essentially, you manage your entire DR process here. Moving to Platform-as-a-Service, disaster recovery becomes a shared responsibility. The platform itself offers built-in redundancy and provide APIs for backup and restore. Your role will be to configure the application-level recovery and ensure your data is backed up appropriately, while the provider handles the underlying infrastructure's DR capability. An example could be Azure app service, Oracle APEX applications, where your apps are redeployed from source control like Git after an incident. Finally, with Software-as-a-Service, disaster recovery is almost entirely vendor managed. The provider takes full responsibility, offering features like auto replication and continuous backup, often backed by specific Recovery Point Objective (RPO) and Recovery Time Objective (RTO) SLAs. A common example is how Microsoft 365 or Salesforce manage user data backups in restoration. It's all handled seamlessly by the provider without your direct intervention. Understanding these different approaches to DR is crucial for defining your own business continuity plans in the cloud. 12:46 Lois: Thank you, Orlando, for this insightful discussion. To recap, we spoke about the three main cloud models: IaaS, PaaS, and SaaS, and how each one offers a different mix of control and convenience, impacting cost, scalability, availability, and recovery. Nikita: Yeah, hopefully this helps you pick the right cloud solution for your needs. If you want to learn more about the topics we discussed today, head over to mylearn.oracle.com and search for the Cloud Tech Jumpstart course. In our next episode, we'll take a close look at the essentials of networking. Until then, this is Nikita Abraham… Lois: And Lois Houston, signing off! 13:26 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.
Michael Reid went from studying aerospace engineering to becoming CEO at Megaport, a global network-as-a-service platform. How did he get there, and what can we learn from his journey? We walk his career path, including a pivotal role scaling ThousandEyes from 74 million to over 2.4x ARR post-acquisition, and how those experiences shaped his approach to... Read more »
professorjrod@gmail.comCloud perimeters are fading, identities are multiplying, and threats move faster than patches. We dive into the real mechanics of securing a hybrid world—mapping cloud deployment choices, clarifying shared responsibility across SaaS, PaaS, and IaaS, and showing how Zero Trust reshapes defenses around identity, posture, and context. It's a practical tour from first principles to field-tested patterns, grounded by case studies like Capital One and SolarWinds and anchored in frameworks such as NIST SP 800-207.We start by decoding public, private, hosted private, community, and hybrid models, then connect those choices to risk: multi-tenant isolation, data flows between zones, and the observability challenges of decentralization. From there, we move into reliability engineering—high availability, geo-redundancy, disaster recovery—and the role Kubernetes plays in scaling securely, with a frank look at container pitfalls and how least privilege and image scanning reduce blast radius. Automation takes center stage with infrastructure as code, autoscaling, and software-defined networking, plus how SASE brings secure access to a remote-first workforce without bolting on more complexity.Embedded systems and IoT get a hard look: scarce memory, weak encryption, default credentials, and unpatchable firmware that turns convenience into risk. We offer a simple playbook—segment aggressively, enforce egress controls, rotate credentials, and plan device lifecycles—to stop small sensors from causing big outages. Zero Trust ties it all together: never trust, always verify; microsegment to prevent lateral movement; and evaluate every access request through identity, device health, and real-time signals. Along the way, we weave in Security+ exam-style questions so you can test your knowledge and lock in the fundamentals.If this helped you see your cloud and Zero Trust roadmap more clearly, follow the show, share it with a teammate, and leave a quick review. Got certified recently or put these controls into practice? Email professorjrod@gmail.com—we'd love to shout you out on a future episode.Support the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod
Network automation has a data problem. Traditional tools may hit limitations when managing complex infrastructure relationships. We explore how OpsMill’s InfraHub uses graph databases and temporal versioning to create what our guest calls “the knowledge graph of infrastructure” – enabling true version control at the database level while maintaining the flexibility to model anything from... Read more »
Terry Ray is the Vice President of Product Strategy at Varonis. In this episode, he joins host Paul John Spaulding to discuss database security, including defense against modern cyber threats, risks associated with over-permissioned users and applications, and more. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://www.Varonis.com.
In this deep dive episode, we explore the evolution of networking with Avery Pennarun, Co-Founder and CEO of Tailscale. Avery shares his extensive journey through VPN technologies, from writing his first mesh VPN protocol in 1997 called “Tunnel Vision” to building Tailscale, a zero-trust networking solution. We discuss how Tailscale reimagines the OSI stack by... Read more »
- One of the biggest SaaS security incidents recently of course is the Salesloft Drive/Salesforce incident, which impacted hundreds of organizations and involved compromised OAuth tokens. Can you tell us a bit about the incident and the fallout?- In an AppOmni blog on the incident, you all discuss attackers taking advantage of persistent OAuth access, over-permissive access, limited monitoring, and unsecured secrets. Why do these problems continue to plague organizations despite incidents like this?This is part of a broader trend of increased SaaS supply chain attacks. What makes these attacks so enticing for malicious actors and challenging for organizations to prevent entirely?You recently published your State of SaaS Security Report, which projects SaaS to grow 20% YoY between 2025 and 2032. This is despite 75% of organizations reporting a SaaS security incident in the past year. Why do you think we're seeing continued growth in adoption but still lagging in SaaS security to accompany the adoption?The report discusses the rise of NHIs and GenAI and how this will exacerbate problems around SaaS Access and incidents. Can you unpack that for us?I was shocked to see the report find that just 13% of organizations use SSPM tooling despite SaaS's widespread adoption. When you talk to enterprises, for example, nearly everyone is doing some CSPM activity for IaaS. Why are so many neglecting hygiene and posture for their SaaS footprint?
John Capobianco is back! Just months after our first Model Context Protocol (MCP) discussion, John returns to showcase how this “USB-C of software” has transformed from experimental technology to an enterprise-ready solutions. We explore the game-changing OAuth 2.1 security updates, witness live demonstrations of packet analysis through natural language with Gemini CLI, and discover how... Read more »
Cloud computing can feel overwhelming at first—but it doesn't have to be. In this beginner-to-pro session, InfosecTrain breaks down the fundamentals of cloud computing and explains how Amazon Web Services (AWS) delivers the backbone of today's digital world.Whether you're a student, IT professional, or career switcher, this episode will simplify complex cloud concepts and give you a clear path to understanding modern IT infrastructure.
Cloud computing can feel overwhelming at first—but it doesn't have to be. In this beginner-to-pro session, InfosecTrain breaks down the fundamentals of cloud computing and explains how Amazon Web Services (AWS) delivers the backbone of today's digital world.Whether you're a student, IT professional, or career switcher, this episode will simplify complex cloud concepts and give you a clear path to understanding modern IT infrastructure.
Curious how cloud platforms stay secure? In this session, we explore Domain 3 of the CCSP exam—Cloud Platform & Infrastructure Security. Gain a solid foundation in protecting cloud infrastructure while keeping it scalable, resilient, and compliant.
In this unplanned and unfiltered conversation, we dive deep into network automation realities with Ivan Pepelnjak, networking’s long standing and independent voice from ipSpace.net. We explore why automation projects fail, dissect the tooling landscape (Ansible vs. Terraform vs. Python), and discuss the cultural barriers preventing enterprises from modernizing their networks. Ivan delivers hard truths about... Read more »
Struggling with CCSP Domain 1? This session simplifies Cloud Concepts, Architecture, and Design—the foundation of CCSP success. Whether you're new to cloud or strengthening your expertise, this breakdown prepares you for both the exam and real-world application.
Today we explore how to build sustainable tech companies with Brian Pontarelli, Founder of FusionAuth. Brian shares his path from early programming on an Apple IIe to creating innovative solutions in the complex world of customer identity and access management (CIAM). Brian argues that single-tenancy and local development capabilities are crucial for developers. He also... Read more »
Getting a scholarship isn't just about luck. It is about strategy, persistence, and self-belief. In this episode, we're joined by a Beasiswa Unggulan awardee who shares her journey, tips, and mindset to help you conquer scholarships with confidence!
How is Infrastructure-as-Code (IaC) evolving? How does user experience fit in? Today on The Cloud Gambit, Cory O'Daniel, Co-Founder & CEO of Massdriver, lends his experience as a coder, architect, and founder to help us answer these questions. Cory also discusses what it was like building and funding a startup in the 2021-2022 market, the... Read more »
The Cloud Gambit is joining the Packet Pushers network! Launched in 2023 as an independent podcast, The Cloud Gambit cuts through the hype to deliver what actually matters in cloud and AI. Hosts William Collins and Eyvonne Sharp decode the strategies, technologies, and market forces reshaping enterprise infrastructure. Built for engineers who lead, leaders who... Read more »
Mike Thompson is the Director, Cloud and Security Architecture at Varonis. In this episode, he joins host Paul John Spaulding to discuss Varonis' 2025 State of Data Security report, including the latest threats, how companies can stay protected, and more. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://www.Varonis.com.
Yaki Faitelson is the co-founder and CEO at Varonis. In this episode, he joins host Amanda Glassner to discuss Varonis' AI-powered data security platform, including what CISOs across the industry are saying and whether their goalposts have shifted, as well as how cybersecurity teams of all sizes can address new threats, and more. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://Varonis.com.
When we use the phrase "talent gap" in cybersecurity, we're usually talking about adding headcount. For this interview, however, we're focusing on a gap that is evident within existing teams and practitioners - the often misunderstood soft skills gap. Side note: I really hate the term "soft skills". How about we call them "fundamental business skills", or "invaluable career advancement skills"? Hmm, doesn't quite roll off the tongue the same. Soft skills can impact everything, as they impose the limits of how we interact with our world. That goes for co-worker interactions, career advancements, and how we're perceived by our peers and community. It doesn't matter how brilliant you might be - without soft skills, your potential could be severely limited. Did you know that soft skills issues contributed to the Equifax breach? We'll also discuss how fear is related to some of the same limitations and challenges as soft skills. Segment Resources: https://www.softskillstech.ca/ Order the Book You might know them from their excellent research work on groups like Scattered Spider, or their refreshing branding/marketing style, but Permiso is laying some impressive groundwork for understanding and defending against identity and cloud-based attacks. In this interview, we talk with co-founder and co-CEO Paul Nguyen about understanding the threats against some of cybercriminals' favorite attack surface, insider threats, and non-human identity compromise. Segment Resources: This blog post from our threat research team on Scattered Spider shows how threat actors move laterally in an environment across identity providers, Iaas, PaaS and SaaS environments, and how this lateral movement ultimately creates blind spots for many security teams This great talk by Ian Ahl, from fwd:cloudsec 2024, touches on a lot of great TTPs used by attackers in IDPs and in the cloud Another blog, When AI Gets Hijacked: Exploiting Hosted Models for Dark Roleplaying and another, What Security Teams Can Learn From The Rippling/Deel Lawsuit: Intent Lies in Search Logs This week, in the enterprise security news, we check the vibes we check the funding we check runZero's latest release notes tons of free tools! the latest TTPs supply chain threats certs won't save you GRC needs disruption the latest Rippling/Deel drama All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-401
When we use the phrase "talent gap" in cybersecurity, we're usually talking about adding headcount. For this interview, however, we're focusing on a gap that is evident within existing teams and practitioners - the often misunderstood soft skills gap. Side note: I really hate the term "soft skills". How about we call them "fundamental business skills", or "invaluable career advancement skills"? Hmm, doesn't quite roll off the tongue the same. Soft skills can impact everything, as they impose the limits of how we interact with our world. That goes for co-worker interactions, career advancements, and how we're perceived by our peers and community. It doesn't matter how brilliant you might be - without soft skills, your potential could be severely limited. Did you know that soft skills issues contributed to the Equifax breach? We'll also discuss how fear is related to some of the same limitations and challenges as soft skills. Segment Resources: https://www.softskillstech.ca/ Order the Book You might know them from their excellent research work on groups like Scattered Spider, or their refreshing branding/marketing style, but Permiso is laying some impressive groundwork for understanding and defending against identity and cloud-based attacks. In this interview, we talk with co-founder and co-CEO Paul Nguyen about understanding the threats against some of cybercriminals' favorite attack surface, insider threats, and non-human identity compromise. Segment Resources: This blog post from our threat research team on Scattered Spider shows how threat actors move laterally in an environment across identity providers, Iaas, PaaS and SaaS environments, and how this lateral movement ultimately creates blind spots for many security teams This great talk by Ian Ahl, from fwd:cloudsec 2024, touches on a lot of great TTPs used by attackers in IDPs and in the cloud Another blog, When AI Gets Hijacked: Exploiting Hosted Models for Dark Roleplaying and another, What Security Teams Can Learn From The Rippling/Deel Lawsuit: Intent Lies in Search Logs This week, in the enterprise security news, we check the vibes we check the funding we check runZero's latest release notes tons of free tools! the latest TTPs supply chain threats certs won't save you GRC needs disruption the latest Rippling/Deel drama All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-401
You might know them from their excellent research work on groups like Scattered Spider, or their refreshing branding/marketing style, but Permiso is laying some impressive groundwork for understanding and defending against identity and cloud-based attacks. In this interview, we talk with co-founder and co-CEO Paul Nguyen about understanding the threats against some of cybercriminals' favorite attack surface, insider threats, and non-human identity compromise. Segment Resources: This blog post from our threat research team on Scattered Spider shows how threat actors move laterally in an environment across identity providers, Iaas, PaaS and SaaS environments, and how this lateral movement ultimately creates blind spots for many security teams This great talk by Ian Ahl, from fwd:cloudsec 2024, touches on a lot of great TTPs used by attackers in IDPs and in the cloud Another blog, When AI Gets Hijacked: Exploiting Hosted Models for Dark Roleplaying and another, What Security Teams Can Learn From The Rippling/Deel Lawsuit: Intent Lies in Search Logs Show Notes: https://securityweekly.com/esw-401
You might know them from their excellent research work on groups like Scattered Spider, or their refreshing branding/marketing style, but Permiso is laying some impressive groundwork for understanding and defending against identity and cloud-based attacks. In this interview, we talk with co-founder and co-CEO Paul Nguyen about understanding the threats against some of cybercriminals' favorite attack surface, insider threats, and non-human identity compromise. Segment Resources: This blog post from our threat research team on Scattered Spider shows how threat actors move laterally in an environment across identity providers, Iaas, PaaS and SaaS environments, and how this lateral movement ultimately creates blind spots for many security teams This great talk by Ian Ahl, from fwd:cloudsec 2024, touches on a lot of great TTPs used by attackers in IDPs and in the cloud Another blog, When AI Gets Hijacked: Exploiting Hosted Models for Dark Roleplaying and another, What Security Teams Can Learn From The Rippling/Deel Lawsuit: Intent Lies in Search Logs Show Notes: https://securityweekly.com/esw-401
There are many, many choices for cloud database services these days. I would hope everyone is aware of the various IaaS options in public clouds with EC2, Azure VMs, GCP Compute Engine, and others. These are often the easiest way to move your workload, but you've really just moved a VM from one place to another (likely more expensive) place. For managed databases, there are lots of choices, but you might not be aware of your options. I ran across an article that discusses the various flavors of managed databases in the big three public clouds for SQL Server. In the piece, there is a section that talks about when a managed database makes sense. I like that it discloses the development on a managed service is expensive. Read the rest of The Managed Cloud Database Options
Send us a textCould you navigate the complexities of cybersecurity like a pro and walk confidently into the CISSP exam? Join us as Sean Gerber shares his expert insights on conquering common test pitfalls and emphasizes the crucial strategy of thinking like a manager. From mastering the art of pacing to trusting your instincts, you'll gain valuable knowledge on how to read questions methodically and manage your time effectively. Plus, we're not just examining theoretical knowledge—Sean breaks it down into practical applications, particularly when assessing the security risks associated with commercial off-the-shelf software.In today's cloud-reliant world, understanding service evaluation best practices is essential. We explore the critical considerations in managing services like SaaS, IaaS, and PaaS. Learn which questions to prioritize when engaging with service providers, such as inquiring about their data protection strategies, encryption standards, and compliance with essential frameworks like SOC 2 and ISO 27017. Discover how the shared responsibility model for IaaS impacts your security measures, and unlock the secrets to secure API configurations. We also stress the importance of thorough risk assessment, threat modeling, and adhering to secure development standards like ISO 27034 and IEC 62443.Software selection is a major decision, and due diligence can make all the difference. This episode unravels how to rigorously evaluate software vendors, focusing on credibility, security assessments, and compliance with industry standards. With Sean's guidance, you'll learn to conduct comprehensive code reviews, penetration tests, and evaluate vendor support. We also highlight strategic deployment planning, emphasizing API security, threat modeling, and a robust mitigation plan. Finally, we unveil the extensive cybersecurity services offered by Reduce Cyber Risk, paired with exciting news about an upcoming podcast designed to bolster your cybersecurity knowledge even further.Gain access to 60 FREE CISSP Practice Questions each and every month for the next 6 months by going to FreeCISSPQuestions.com and sign-up to join the team for Free. That is 360 FREE questions to help you study and pass the CISSP Certification. Join Today!
Constance, PMM spécialisée IA depuis 2 ans chez Scaleway vient vulgariser le secteur du cloud, l'hardware, l'intelligence artificielle. Rien que ça !Elle a travaillé sur le développement d'une nouvelle catégorie de produit pour positionner Scaleway comme un fournisseur Cloud européen clé dans le domaine de l'IA et faire face aux GAFAM
“Now more than ever, engineering leaders are being asked to be more transparent with how their work is getting done. Every single thing that an engineering team works on needs to benefit the business.” Laura Tacho is the CTO of DX and a leading voice in the world of developer experience and productivity. In this episode, we explore the ever important role of aligning developer experience with business goals and discuss the DX Core 4, a new developer productivity framework recently published by DX. Laura shares how engineering leaders can leverage intuition for data-driven decisions and effectively communicate the impact of engineering initiatives in business language. We discuss the importance of balancing business goals with engineering needs and delve into the process of building a strong business case for improving developer experience. Discover the new DX Core 4 framework as Laura breaks down its four dimensions, key metrics, and actionable strategies for measuring and enhancing developer productivity. Learn how DX Core 4 complements existing frameworks, such as DORA, SPACE, and DevEx, and why it suggests “diffs per engineer” as a valuable metric to measure. Understand the Developer Experience Index (DXI) and why internal developer platforms and AI play crucial roles in improving developer experience. Tune in to learn new valuable insights on developer experience and how to measure, communicate, and improve developer productivity effectively. Listen out for: Career Turning Points - [00:02:13] Following Your Intuition - [00:05:36] Business Oriented Engineering Leaders - [00:08:06] Explaining Tech Debt - [00:12:01] Balancing Between Engineering and Business Focus - [00:16:53] Building a Case for Improving Developer Experience - [00:21:00] DX Core 4 - [00:22:46] DX Core 4 vs Others (DORA, SPACE, DevEx) - [00:25:19] The DX Core 4 Dimensions - [00:26:49] Diffs per Engineer - [00:30:32] Impact Dimension - [00:33:27] Measuring DX Core 4 - [00:34:59] Developer Experience Index (DXI) - [00:38:19] Impact of Implementing DX Core 4 - [00:41:54] Best Strategy to Improve Developer Experience - [00:44:26] Internal Developer Platform & AI - [00:47:52] The Importance of Talking to the Developers - [00:51:40] 3 Tech Lead Wisdom - [00:54:18] _____ Laura Tacho's BioLaura Tacho is CTO at DX, a developer experience company. She's a technology leader with a successful track record leading engineering and product development teams at companies like CloudBees, Aula Education, and Nova Credit. She's been building developer tools and working on improving developer productivity for over 10 years, all the way from the heyday of IaaS and PaaS on cloud, through Docker and containers, CI/CD, and now as part of DX. She's also an executive coach for engineering leaders and an expert in building world-class engineering organisations that consistently deliver outstanding results. Laura has coached CTOs and other engineering leaders from startups to the Fortune 500, and also facilitates a popular course on metrics and engineering team performance. Follow Laura: Website – lauratacho.com LinkedIn – linkedin.com/in/lauratacho DX Core 4 – getdx.com/research/measuring-developer-productivity-with-the-dx-core-4 Developer Productivity Metrics Course - lauratacho.com/developer-productivity-metrics-course _____ Our Sponsors Enjoy an exceptional developer experience with JetBrains. Whatever programming language and technology you use, JetBrains IDEs provide the tools you need to go beyond simple code editing and excel as a developer.Check out FREE coding software options and special offers on jetbrains.com/store/#discounts.Make it happen. With code. Manning Publications is a premier publisher of technical books on computer and software development topics for both experienced developers and new learners alike. Manning prides itself on being independently owned and operated, and for paving the way for innovative initiatives, such as early access book content and protection-free PDF formats that are now industry standard.Get a 40% discount for Tech Lead Journal listeners by using the code techlead24 for all products in all formats. Like this episode?Show notes & transcript: techleadjournal.dev/episodes/198.Follow @techleadjournal on LinkedIn, Twitter, and Instagram.Buy me a coffee or become a patron.
As American voters go to the polls, all indications point to a statistical dead-heat between vice president and Democratic Party nominee Kamala Harris and former Republican president Donald Trump. The outcome will likely turn on tens of thousands of voters in a handful of key swing states. According to leading pollsters and polling aggregators, the race in these states is too close to call.In this hotly contested race, one demographic whose political preferences are much discussed, though less studied, is Indian Americans. A new study, the 2024 Indian American Attitudes Survey (IAAS), tries to fill this gap. The IAAS is a nationally representative online survey conducted by the Carnegie Endowment in conjunction with data and analytics firm YouGov. The report is authored by Sumitra Badrinathan of American University, Devesh Kapur of Johns Hopkins-SAIS, and Grand Tamasha host Milan Vaishnav.This week on the show, Milan speaks with Sumitra and Devesh about the main findings of their new report and what they portend for the election as well as future political trends in the United States.Episode notes:1. Sumitra Badrinathan, Devesh Kapur, and Milan Vaishnav, “Indian Americans at the Ballot Box: Results From the 2024 Indian American Attitudes Survey,” Carnegie Endowment for International Peace, October 28, 2024.2. VIDEO: “Deciphering the Indian American Vote,” Carnegie Endowment for International Peace, October 31, 2024.3. Sumitra Badrinathan, Devesh Kapur, and Milan Vaishnav, “How Will Indian Americans Vote? Results From the 2020 Indian American Attitudes Survey,” Carnegie Endowment for International Peace, October 14, 2020.4. Christopher H. Achen and Larry M. Bartels, Democracy for Realists: Why Elections Do Not Produce Responsive Government (Princeton, NJ: Princeton University Press, 2016).5. Sara Sadhwani, “Asian American Mobilization: The Effect of Candidates and Districts on Asian American Voting Behavior,” Political Behavior 44 (2022):105–131.6. Devesh Kapur, Nirvikar Singh, and Sanjoy Chakravorty, The Other One Percent: Indians in America (New York: Oxford University Press, 2016).7. “Sumitra Badrinathan and Devesh Kapur Decode the 2020 Indian American Vote,” Grand Tamasha, October 14, 2020.
На этот раз у нас тема, которую мы потрогали уже со всех сторон с разной глубиной проникновения - SDN. И более конкретно - облачный SDN, но не тот, который SD-WAN или какие-то облачные решения для клиентов - нет, мы говорим про то, как построить SDN для облака, как приватного, так и публичного, как дать пользователю прочувствовать свою уникальность несмотря на то, что на той же самой сети и том же самом сервере он далеко не один. Для разгорева и подготовки можно послушать telecom №101. Оверлейные сети Кто: Владислав Одинцов. Техлид в K2 Cloud (ex CROC Cloud) Александр Попов. Техлид команды Iaas Network в VK Cloud Про что: Будем говорить с позиции российских облаков, т.к. Размеры наши такие, какие есть, а не как AWS или GCP. Основа облаков - это IaaS уровень, вокруг которого достраиваются сервисы. IaaS это компьют + сторадж + сети + хранилище образов. Чтобы сети работали в облаке (между ВМ), все облачные провайдеры используют спец софт — SDN. SDN помогают создавать и управлять виртуальной сетью - делать её изолированной, предоставлять внутри неё сетевые функции: DHCP, routing, balancers. Где брать SDN? L2 против L3. Форкнул и дальше in-house? Или ответственно апстримить? Сложности при эксплуатации - регулярные обновления агентов, зоопарк версий, кросс-AZ изоляция, большое количество control-plane информации. Опыт допиливания OVN. Трудности с OVN. Сообщение telecom №139. Облачные SDN. OVN появились сначала на linkmeup.
What our cloud strategy would be if we were CTOs, how companies should weigh up SaaS, PaaS and IaaS, and trade off building vs buying. Integrating the Ubuntu Snapshot Service into systems management and update tools Send your questions and feedback to show@hybridcloudshow.com Support us on patreon and get... Read More
On this episode of the Virtually Speaking Podcast, we're joined by Dilpreet Bindra, Senior Director of Engineering at Broadcom. As a leader of the VCF Workload Organization, Dilpreet drives the delivery of runtime platforms and automation essential for workloads and clouds. In this episode, Dilpreet discusses his extensive experience with key VMware technologies like ESXi, the kernel, vMotion, Storage vMotion, vCenter, and more. He also explains how VMware by Broadcom enhances the cloud-like experience, enabling customers to deliver greater value for their businesses. Additionally, Dilpreet shares insights into how Private AI empowers VMware by Broadcom to offer a new class of workloads, maintaining the simplicity and resource management principles that VMware was built upon. Links Mentioned Private AI and Advanced Services on VCF: What's Next? Playlist: VMware Explore Las Vegas 2024 The Virtually Speaking Podcast The Virtually Speaking Podcast is a technical podcast dedicated to discussing VMware topics related to private and hybrid cloud. Each week Pete Flecha and John Nicholson bring in various subject matter experts from within the industry to discuss their respective areas of expertise. If you're new to the Virtually Speaking Podcast check out all episodes on vspeakingpodcast.com and follow on TwitterX @VirtSpeaking
Amidst the #Broadcom VMware shake-up, Hosted Network steps up to the plate with a game-changing multi-tenancy solution for #Proxmox, empowering MSPs to transition smoothly and keep getting sh*t done Episode Summary: In Episode 89 of Great Things with Great Tech, we dive into the evolution of an Australian MSP in the cloud and telco services space. Ben Town, CEO of Hosted Network, joins us to explore how the company transformed from a traditional MSP into a leader in wholesale cloud and telco services. We also discuss their exciting new venture, MultiPortal.io, which is filling a crucial gap in the market with a multi-tenant Proxmox IaaS management solution, especially timely given the ongoing disruptions caused by Broadcom's acquisition of VMware. Ben shares the Hosted Network journey, starting as a local MSP in Sydney's west in 2003, transitioning to a channel-only model in 2013, and growing into a key player in the Australian market. We also cover how MultiPortal.io emerged from their development team and is now providing an alternative hypervisor management tool designed to streamline operations for MSPs facing the challenges of today's cloud environments. Key Topics Discussed: Transition from MSP to Service Provider: Hosted Network's shift from a direct customer model to a channel-only model, focusing on delivering wholesale cloud, voice, connectivity, and security solutions to over 250 Australian MSPs. MultiPortal.io: The development and impact of MultiPortal.io, a tool designed for managing multi-tenant Proxmox environments, which has become essential in the wake of Broadcom's acquisition of VMware. In-House Development: Hosted Network's evolution into a development-centric company, creating tools and platforms that address real-world challenges faced by MSPs, including automation, AI integration, and custom billing solutions. Alternative Hypervisors: The increasing relevance of Proxmox as a cost-effective, scalable alternative to traditional hypervisors like VMware, particularly in the APAC region. Challenges and Innovations: How Hosted Network navigated the challenges posed by the changing IT landscape and continued to innovate, creating solutions that empower MSPs to thrive. Technology and Concepts Mentioned: Proxmox, VMware, Broadcom, cloud services, telco, MultiPortal, IaaS, MSP, TSP, virtualization, automation, AI, channel-only model. ☑️ Web: https://hostednetwork.com.au ☑️ MultiPortal: https://multiportal.io ☑️ Crunchbase: https://www.crunchbase.com/organization/hosted-network ☑️ Support the Channel: https://ko-fi.com/gtwgt ☑️ Be on #GTwGT: Contact via Twitter @GTwGTPodcast or visit https://www.gtwgt.com ☑️ Subscribe to YouTube: https://www.youtube.com/@GTwGTPodcast?sub_confirmation=1 Check out the full episode on our platforms: YouTube: https://youtu.be/kmB_pjGb5Js Spotify: https://open.spotify.com/episode/2l9aZpvwhWcdmL0lErpUHC?si=x3YOQw_4Sp-vtdjyroMk3Q Apple Podcasts: https://podcasts.apple.com/us/podcast/darknet-diaries-with-jack-rhysider-episode-83/id1519439787?i=1000654665731 Follow Us: Website: https://gtwgt.com Twitter: https://twitter.com/GTwGTPodcast Instagram: https://instagram.com/GTwGTPodcast ☑️ Music: https://www.bensound.com
All links and images for this episode can be found on CISO Series. This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining us is Patti Titus, CISO, Booking Holdings. In this episode: Defense vs. Resilience Communication is on par with mitigation Preparing like its post-quantum The challenges and opportunities of diversity Thanks to our podcast sponsor, Cyera! Cyera's AI-powered data security platform gives companies visibility over their sensitive data, context over the risk it represents, and actionable, prioritized remediation guidance. As a cloud-native, agentless platform, Cyera provides holistic data security coverage across SaaS, PaaS, IaaS and on-premise environments. Visit www.cyera.io to learn more.
In this conversation, Katarina Brookfield discusses her career trajectory and her current role at Broadcom. She shares defining moments in her career, including her experience working on the Black Sea Maritime Archaeology project. The conversation then shifts to the newly announced vSphere IaaS control plane and its benefits. Katarina explains that the control plane provides a comprehensive solution for deploying workloads, including additional services like storage provisioning and load balancing. The conversation also covers the self-service nature of the control plane, the different interfaces for consumers and admins, and the integration of HashiCorp Packer for building and customizing VM images. The TKG service, which allows for the deployment of managed Kubernetes clusters, is also discussed, highlighting its ease of use and integration with vSphere. The conversation concludes with a discussion of the new features in the latest version of the TKG service, including cluster auto-scaling and the decoupling of TKG from vCenter.TakeawaysThe vSphere IaaS control plane provides a comprehensive solution for deploying workloads, including additional services like storage provisioning and load balancing.The control plane offers a self-service experience for consumers, allowing them to easily deploy the services they need.Different interfaces, including APIs, CLI, and UI, cater to the preferences of different users, making it accessible to both admins and consumers.The integration of HashiCorp Packer allows for the building and customization of VM images, providing flexibility and automation.The TKG service simplifies the deployment of managed Kubernetes clusters, making it accessible to users with little Kubernetes experience.The latest version of the TKG service decouples it from vCenter, allowing for faster delivery of new Kubernetes versions.New features in the TKG service include cluster auto-scaling and the integration of HashiCorp Packer for building and customizing VM images.Chapters00:00 - Kat's Career Trajectory and the Role of Defining Moments09:20 - The Comprehensive Solution of the vSphere IaaS Control Plane11:02 - Enabling Self-Service and Catering to Different User Preferences18:14 - Flexibility and Automation with HashiCorp Packer Integration22:47 - Simplifying Kubernetes Deployment with the TKG Service29:14 - Decoupling TKG from vCenter for Faster Delivery of Kubernetes Versions38:36 - New Features in the Latest Version of the TKG ServiceDisclaimer: The thoughts and opinions shared in this podcast are our own/guest(s), and not necessarily those of Broadcom or VMware by Broadcom.
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap). Joining us is Bil Harmer, operating partner and CISO, Craft Ventures. In this episode: A time and a place for Field CISOs This isn't a new role Consulting the Field CISO Words mean things Thanks to our podcast sponsor, Cyera Cyera's AI-powered data security platform gives companies visibility over their sensitive data, context over the risk it represents, and actionable, prioritized remediation guidance. As a cloud-native, agentless platform, Cyera provides holistic data security coverage across SaaS, PaaS, IaaS and On-premise environments. Visit www.cyera.io to learn more.
Summary In this episode of the Blue Security Podcast, Andy and Adam discuss Defender CSPM (Cloud Security Posture Management). They explain that CSPM is the process of monitoring cloud-based systems and infrastructure for risks and misconfigurations. They highlight the key capabilities of CSPM, including automation, monitoring and managing IaaS, SaaS, and PaaS platforms, and ensuring regulatory compliance. They also introduce Defender CSPM, a paid subscription service that offers additional features such as agentless scanning, container vulnerability assessments, and DevOps security. They mention the inclusion of Entra Permissions Management and external attack surface management in Defender CSPM. They emphasize the value of Defender CSPM for regulatory compliance and the ease of reporting on security posture against specific standards. Takeaways -CSPM is the process of monitoring cloud-based systems and infrastructure for risks and misconfigurations. -Defender CSPM is a paid subscription service that offers additional features such as agentless scanning, container vulnerability assessments, and DevOps security. -Defender CSPM includes Entra Permissions Management and external attack surface management. -Defender CSPM is valuable for regulatory compliance and provides ease of reporting on security posture against specific standards. ---------------------------------------------------- YouTube Video Link: https://youtu.be/lqvWnxyQqVs ---------------------------------------------------- Documentation: https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-cloud-security-posture-management https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-devops-introduction https://learn.microsoft.com/en-us/azure/defender-for-cloud/defender-for-cloud-introduction#protect-cloud-workloads https://learn.microsoft.com/en-us/azure/defender-for-cloud/concept-devops-environment-posture-management-overview ---------------------------------------------------- Contact Us: Website: https://bluesecuritypod.com Twitter: https://twitter.com/bluesecuritypod Linkedin: https://www.linkedin.com/company/bluesecpod Youtube: https://www.youtube.com/c/BlueSecurityPodcast ----------------------------------------------------------- Andy Jaw Twitter: https://twitter.com/ajawzero LinkedIn: https://www.linkedin.com/in/andyjaw/ Email: andy@bluesecuritypod.com ---------------------------------------------------- Adam Brewer Twitter: https://twitter.com/ajbrewer LinkedIn: https://www.linkedin.com/in/adamjbrewer/ Email: adam@bluesecuritypod.com
Modern applications require modern platforms and team collaboration to deliver velocity, stability and security. So how do we overcome the hurdles to making platform adoption work? SHOW: 840SHOW TRANSCRIPT: The Cloudcast #840 TranscriptSHOW VIDEO: https://youtube.com/@TheCloudcastNET CLOUD NEWS OF THE WEEK: http://bit.ly/cloudcast-cnotwCHECK OUT OUR NEW PODCAST: "CLOUDCAST BASICS"SHOW SPONSOR:Panoptica, Cisco's Cloud Application Security solutionSHOW NOTES:WHY DO PLATFORMS MAKE SENSE FOR MODERN APPLICATIONS?Reduce the cognitive load on application teamsDeliver self-service capabilities where it makes senseDeliver consistent services across teams, with efficient operationsReduce costs, reduce snowflakes, etc.WHAT ARE THE PLATFORM HURDLES, AND HOW TO OVERCOME THEM?The jump from initial projects to scalable delivery across apps and teamsApplication teams wanting snowflake environmentsBuying and budgeting centers not aligning to platform deliveryGetting application team buy-in to platform servicesGetting cross-functional team alignment and coordinationBalancing stability and pace of innovationFEEDBACK?Email: show at the cloudcast dot netTwitter: @cloudcastpodInstagram: @cloudcastpodTikTok: @cloudcastpod
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Christina Shannon, CIO, KIK Consumer Products. Joining us is Andrew Cannata, CISO, Primo Water. In this episode: The lure of an IPO is debatable Does an IPO make you a target or just more vulnerable? M&A changes your context Ambiguity creates risk Thanks to our podcast sponsor, Cyera Cyera's AI-powered data security platform gives companies visibility over their sensitive data, context over the risk it represents, and actionable, prioritized remediation guidance. As a cloud-native, agentless platform, Cyera provides holistic data security coverage across SaaS, PaaS, IaaS and On-premise environments. Visit www.cyera.io to learn more.
All links and images for this episode can be found on CISO Series. This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson, CISO, Rivian. Joining us is our sponsored guest, Jason Clark, chief strategy officer, Cyera. In this episode: Does AI require new security measures? Meeting the new SEC requirements Empowerment through data security Upskilling with Gen AI? Thanks to our podcast sponsor, Cyera! Cyera's AI-powered data security platform gives companies visibility over their sensitive data, context over the risk it represents, and actionable, prioritized remediation guidance. As a cloud-native, agentless platform, Cyera provides holistic data security coverage across SaaS, PaaS, IaaS and On-premise environments. Visit www.cyera.io to learn more.
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Lamont Orange, CISO, Cyera. In this episode: The data security check has come due Putting data security at the heart of defense in depth Automation is key You need to know what you're protecting Thanks to our podcast sponsor, Cyera Cyera's AI-powered data security platform gives companies visibility over their sensitive data, context over the risk it represents, and actionable, prioritized remediation guidance. As a cloud-native, agentless platform, Cyera provides holistic data security coverage across SaaS, PaaS, IaaS and On-premise environments. Visit www.cyera.io to learn more.
In this episode of The 5G Factor, our series that focuses on all things across the 5G ecosystem, we review key 5G ecosystem developments including Microsoft's dramatic scale back of Azure for Operators (AfO) unit, Nokia and Dell strengthening their alliance to help accelerate Cloud RAN deployments, and Ericsson spotlight on how private 5G (P5G) can play integral role in streamlining airport operations. Our analytical review drilled down on: Microsoft Conducts Azure for Operators Purge. Microsoft reportedly cut as many as 1,500 jobs at its Azure for Operators and Mission Engineering units, as the move appears to have hit hard the teams responsible for developing network functions, moving on from its 2020 acquisitions of Metaswitch and Affirmed Networks. The move indicates that Microsoft will ultimately look to sell or phase out its Metaswitch and Affirmed-originated application portfolio assets. We explore the ramifications for Microsoft's key telecom rivals such as AWS and Alianza as well as how moving Microsoft's focus on the infrastructure as a service (IaaS) side of the business boosts the likelihood that future engagements will look to combine applications from telco specialists such as Ericsson and Nokia with the Microsoft cloud. Nokia Dell Show AnyRAN Alliance Progress. Nokia's AnyRAN partnership with Dell is now over a year in the making. Nokia's anyRAN proposition is built to allow operators to flexibly deploy RAN functions using cloud-native containerized software on any cloud infrastructure including public, private or hybrid clouds. Nokia's software-centric approach aligns with Dell's strengths in cloud data center solutions. Nokia and Dell have successfully completed an Open RAN trial with Vodafone Italy, alongside testing of the Cloud RAN management system. We assess why we see the alliance is ready to make tangible breakthroughs as the Nokia Cloud RAN solution is now ready for commercial deployments in H2 2024. Ericsson Views P5G as Antidote to Legacy Airline Ops. For many years now, airport communications have relied heavily on legacy systems, such as Terrestrial Trunked Radio (TETRA), Project 25 (P25), and Digital Mobile Radio (DMR). While these systems provide basic voice communication, their limited bandwidth renders them unsatisfactory for meeting the burgeoning demand for data and video communications across airport environments – not good. Deploying and maintaining multiple parallel networks, including Wi-Fi networks, is a costly affair. Workers carrying multiple devices for various purposes face cumbersome workflows, and siloed systems and applications lead to operational inefficiencies. We review how firms like Streamwide and Airbus are providing solutions that support the co-existence of TETRA and cellular networks in airport settings, aiding the transition to modernized communication systems. This includes private 5G networks (P5G) that can provide a unified connectivity that works across applications and with existing connectivity like Wi-Fi, promising a future where airports can operate with enhanced efficiency and flexible connectivity for a streamlined travel experience.
All links and images for this episode can be found on CISO Series. This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Joining me is my guest, Aamir Niazi, executive director and CISO, SMBC Capital Markets. In this episode: Communicating security accomplishments Spotting red flags in an interview What does offensive security look like today? Where Gen AI is fitting into cybersecurity Thanks to our podcast sponsor, Cyera Cyera's AI-powered data security platform gives companies visibility over their sensitive data, context over the risk it represents, and actionable, prioritized remediation guidance. As a cloud-native, agentless platform, Cyera provides holistic data security coverage across SaaS, PaaS, IaaS and On-premise environments. Visit www.cyera.io to learn more.
One of the key insights from the podcast episode is the projection that the global IT services market is expected to reach $2 trillion by 2028. This growth is primarily attributed to cloud modernization, with hyperscalers like AWS, Microsoft, and Google Cloud leading the way. These hyperscalers are driving the growth in the market, particularly in the area of infrastructure-as-a-service (IaaS), where spending is expected to double in the next five years. The rise in the value of GPU sales, as mentioned in the episode, is also contributing to this trend. The increase in GPU sales is linked to the proliferation of artificial intelligence (AI) technologies, which are becoming increasingly prevalent in various industries. This indicates a growing demand for advanced computing capabilities to support AI applications, further fueling the growth of the IT services market. Maryland's enactment of the Maryland Online Data Privacy Act signifies a significant step towards enhancing consumer data protection within the state. The new legislation imposes stricter privacy standards on businesses operating in Maryland, compelling them to limit the data they collect from Maryland consumers. This move aligns with the broader trend of states enhancing consumer data rights through privacy legislation, as seen in the increasing number of states implementing similar laws. Three things to know today00:00 Small vs. Mid-Sized Business Outlooks on Economy and Revenue Growth Diverge03:39 Maryland Joins States Enhancing Consumer Data Rights with New Privacy Legislation06:11 Secure by Design: A Shift in Cybersecurity Paradigm Promoted at RSA Conference Supported by: https://huntress.com/mspradio/ All our Sponsors: https://businessof.tech/sponsors/ Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/ Support the show on Patreon: https://patreon.com/mspradio/ Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social
John Yue (CEO & Co-Founder @ inference.ai) discusses AI workload sizing, matching GPUs to workloads, availability of GPUs vs. costs, and more.SHOW: 815CLOUD NEWS OF THE WEEK - http://bit.ly/cloudcast-cnotwNEW TO CLOUD? CHECK OUT OUR OTHER PODCAST - "CLOUDCAST BASICS"SHOW NOTES:Inference.ai (homepage)TechCrunch postSiliconAngle post on ChatGPUTopic 1 - Our topic for today is sizing and IaaS hosting for AI/ML. We've covered a lot of basics lately, today we're going to dig deeper. There is a surprising amount of depth to AI sizing, and it isn't just speeds and feeds of GPUs. We'd like to welcome John Yue (CEO & Co-Founder @ inference.ai) for this discussion. John, welcome to the showTopic 2 - Let's start with sizing, I've talked to a lot of customers recently with my day job, and it is amazing how deep AI/ML sizing can go. First, you have to size for training/fine-tuning differently than you would for the inference stage. Second, some just think, pick the biggest GPUs you can afford and go. How should your customers approach this? (GPU's, software dependencies, etc.)Topic 2a - Follow-up question what are the business side, what are the business parameters that need to be considered? (budget, cost efficiency, latency/response time, timeline, etc.)Topic 3 - The whole process can be overwhelming and as we mentioned, some organizations may not think of everything. You recently announced a chatbot to help with this exact process, ChatGPU. Tell everyone a bit about that and how it came to be.Topic 4 - This is almost like a match-making service, correct? Everyone wants an H100, but not everyone needs or can afford an H100.Topic 5 - How does GPU availability play into all of this? NVIDIA is sold out for something like 2 years at this point; how is that sustainable? Does everything need to run on a “Ferrari class” NVIDIA GPU?Topic 6 - What's next in the IaaS for AI/ML space? What does a next-generation data center for AI/ML look like? Will the Industry move away from GPUs to reduce dependence on NVIDIA?FEEDBACK?Email: show at the cloudcast dot netTwitter: @cloudcastpodInstagram: @cloudcastpodTikTok: @cloudcastpod
Have you ever wondered about the masterminds shaping the cloud computing landscape? In today's episode of Tech Talks Daily Podcast, we dive into the world of cloud innovation with a special guest, Darren Shepherd, the Chief Architect and co-founder of Acorn Labs. Darren's journey in the cloud space has been nothing short of remarkable. From his early days at GoDaddy to creating CloudStack, the most comprehensive IaaS platform, and his influential projects like Rancher and k3s, he has continuously pushed the boundaries of cloud technology. His latest venture, Acorn Labs, marks a significant step in making cloud computing more accessible and user-friendly with its innovative platform, Acorn. In this episode, we explore how Acorn is changing the game by allowing users to run software in their own cloud sandbox and share their creations effortlessly. We delve into the challenges and triumphs Darren has faced in his over-a-decade-long journey in cloud development. With over 22,000 followers on Twitter, Darren is not just a developer but a voice for the community, constantly influencing and inspiring many in the field. As we navigate this conversation, we'll uncover the opportunities and hurdles in today's cloud computing landscape. What does the future hold for cloud technology, and how can platforms like Acorn simplify the complex world of cloud computing for everyday users and businesses? How does Darren's experience at GoDaddy and his work on CloudStack inform his vision at Acorn Labs? Join us in this enlightening discussion as we seek to understand the nuances of cloud technology from one of its leading innovators. And as always, we're eager to hear your thoughts. What are your views on the evolution of cloud computing, and how do you think platforms like Acorn can shape its future?