Red Hat's software partners discussing topics such as application modernization, cloud-native development, workload security in the cloud and partnering with Red Hat. Contact us at firstname.lastname@example.org to learn more about the show. Visit our website catalog.redhat.com/podcasts
Getting Ready For The Next Log4Shell Vulnerability
In this episode we discuss the impacts of some of the latest vulnerabilities and how Dynatrace can help prevent the exploits of such vulnerabilities. We will also cover general trends in cyber defense, and why it is harder to defend than attack and what role does AI play in modern cyber security.
How Spotify ships developer happiness through Backstage
Spotify’s mission is to unlock the power of human creativity by creating
opportunities for artists and fans alike. And underpinning that mission
are thousands of developers managing tens of thousands of software
components. So add unlocking developer creativity to that list —
streamlining their workflows, making it easier to share knowledge, and
getting the messy parts of infrastructure out of their way.
In this episode, we’ll go behind the scenes of Spotify to learn about
how Spotify exports their internal engineering culture to a global
community with an open source project called Backstage.
Red Hat X Tech Talk: LINBIT SDS and OpenShift
LINBIT SDS is a software-defined storage, that perfectly fits with Red Hat's OpenShift. It provides persistent volumes, exposed through the CSI interface. You can use it to build out of internal storage devices the persistent volumes for your cloud-native container workload.
While it was initially designed for the on-prem data center, it is also a fit for multi-cloud and edge deployments. It is a good fit for IO demanding workloads, like OLTP and OLAP databases, message queuing, and AI.
Red Hat Tech Talk: Part 2 of retaining and controling your security system
Learn about retaining control of your security controls to take action against unknown future events. Join John Aron again with the discussion from Aronetics where we understand more of the cybersecurity battle.
Why World Renown Brands turn to Akka for Building their Most Business-Critical Apps
Akka is a toolkit for building scalable, resilient, and resource-efficient applications on the JVM in Java or Scala. With Akka, you can build applications composed of a single JVM to a fleet of JVMs distributed across a cluster of servers. We will tour Akka from the humble actor up to the systems level and how Akka is used by some of the world’s most recognized brands to build distributed clustered systems composed of clusters within clusters for optimal customer experiences.
Demanding Answers from Production Systems
There are many definitions of Observability that are thrown around. Some definitions reference control theory. We take the more pragmatic approach advocated by Bryan Cantrill as the “capability to allow a human to ask and answer questions.” As such, when creating a new system or wrangling long-standing systems, discovering the questions that we want to ask systems has been a valuable exercise. So often, we jump to the tools or implementation without taking a step back and looking at what we are trying to accomplish.
One of the key questions that many of us want answered for our system is where an application was spending the most time in its flow of execution. In order to answer that question, NGINX embarked on a journey to integrate Open Telemetry with their application's Modern App Reference Architecture (MARA).