21 avsnitt

Putting new technology to use is an exciting prospect. But going from purchase to production isn’t always smooth—even when it’s something everyone is looking forward to. Code Comments covers the bumps, the hiccups, and the setbacks teams face when adjusting to new technology—and the triumphs they pull off once they really get going.

Code Comments Red Hat

    • Teknologi

Putting new technology to use is an exciting prospect. But going from purchase to production isn’t always smooth—even when it’s something everyone is looking forward to. Code Comments covers the bumps, the hiccups, and the setbacks teams face when adjusting to new technology—and the triumphs they pull off once they really get going.

    Transforming Your Priorities

    Transforming Your Priorities

    It can be difficult to know the full outcome of your choices. Not having clear priorities makes it impossible to know which choice is the right one, because those should inform your direction.

    Adam Timm of Crunchy Data explains how multiple factors influence outcomes—and how keeping your priorities at the forefront of your decision-making process makes it easier to pick the right choice for your organization.

    • 17 min
    Transforming Your Database

    Transforming Your Database

    Databases are rarely the stars of digital transformation. That’s not necessarily a bad thing. But that doesn’t mean they should be an afterthought either.

    Craig Kerstiens of Crunchy Data covers the state of the database—and how the database tools you choose have implications beyond the databases themselves.

    • 23 min
    Transforming Your Secrets Management

    Transforming Your Secrets Management

    We’ve been taught to stash our secrets. Passwords, credentials, and tokens shouldn’t be shared lest they fall into the wrong hands. When it comes to building and running large-scale systems, that thinking has to change. But maybe only a little bit.

    Rosemary Wang and Steve Almy of HashiCorp share how business as usual for secrets management means putting your business at risk.

    • 19 min
    Transforming Your Identity Management

    Transforming Your Identity Management

    Modern IT systems have a lot of components—components people have to use, and components who need to talk to each other. That’s a lot of traffic and exchanging of sensitive information. How do you sort the legitimate users from the potential intruders?

    Niels Van Bennekom shares how CyberArk helps organizations set up identity management systems that can keep up with expansive, ever-changing IT systems.

    • 20 min
    Season 3: Charting Digital Transformation

    Season 3: Charting Digital Transformation

    A journey of 1,000 upgrades starts with a single commit. It’s not always clear how much change digital transformation entails. But it’s likely more than expected.

    Season 3 of Code Comments travels the well-trodden paths of IT modernization, cloud migration, and the unmentioned necessities to make it all work.

    • 1 min.
    You Can't Automate The Fire

    You Can't Automate The Fire

    Is there such a thing as too much enthusiasm for automation? Probably not. But it can be difficult to unify an organization with strong opinions.

    Vincenzo Sposito shares how Discover harnessed its teams’ passions to build a unified automation solution—while preserving debate and experimentation.

    • 21 min

Mest populära poddar inom Teknologi

Lex Fridman Podcast
Lex Fridman
Acquired
Ben Gilbert and David Rosenthal
Darknet Diaries
Jack Rhysider
SvD Tech brief
Svenska Dagbladet
Internetpionjärerna
Tele2
Elbilsveckan
Peter Esse & Christoffer Gullin

Du kanske också gillar

Compiler
Red Hat
CyberWire Daily
N2K Networks
CodeNewbie
CodeNewbie
Hacking Humans
N2K Networks
The Cloudcast
Massive Studios
Security Now (Audio)
TWiT