19 episodes

Putting new technology to use is an exciting prospect. But going from purchase to production isn’t always smooth—even when it’s something everyone is looking forward to. Code Comments covers the bumps, the hiccups, and the setbacks teams face when adjusting to new technology—and the triumphs they pull off once they really get going.

Code Comments Red Hat

    • Technology
    • 5.0 • 10 Ratings

Putting new technology to use is an exciting prospect. But going from purchase to production isn’t always smooth—even when it’s something everyone is looking forward to. Code Comments covers the bumps, the hiccups, and the setbacks teams face when adjusting to new technology—and the triumphs they pull off once they really get going.

    Transforming Your Secrets Management

    Transforming Your Secrets Management

    We’ve been taught to stash our secrets. Passwords, credentials, and tokens shouldn’t be shared lest they fall into the wrong hands. When it comes to building and running large-scale systems, that thinking has to change. But maybe only a little bit.

    Rosemary Wang and Steve Almy of HashiCorp share how business as usual for secrets management means putting your business at risk.

    • 19 min
    Transforming Your Identity Management

    Transforming Your Identity Management

    Modern IT systems have a lot of components—components people have to use, and components who need to talk to each other. That’s a lot of traffic and exchanging of sensitive information. How do you sort the legitimate users from the potential intruders?

    Niels Van Bennekom shares how CyberArk helps organizations set up identity management systems that can keep up with expansive, ever-changing IT systems.

    • 20 min
    Season 3: Charting Digital Transformation

    Season 3: Charting Digital Transformation

    A journey of 1,000 upgrades starts with a single commit. It’s not always clear how much change digital transformation entails. But it’s likely more than expected.

    Season 3 of Code Comments travels the well-trodden paths of IT modernization, cloud migration, and the unmentioned necessities to make it all work.

    • 1 min
    You Can't Automate The Fire

    You Can't Automate The Fire

    Is there such a thing as too much enthusiasm for automation? Probably not. But it can be difficult to unify an organization with strong opinions.

    Vincenzo Sposito shares how Discover harnessed its teams’ passions to build a unified automation solution—while preserving debate and experimentation.

    • 21 min
    You Can’t Automate The Difficult Decisions

    You Can’t Automate The Difficult Decisions

    The tensions between security and operations and developer teams are the stuff of legend. DevSecOps is trying to change that, and automation is a big part of making it possible. But automation alone can’t overcome entrenched behavior.

    Joylynn Kirui shares how Microsoft is helping shift security considerations to the left—and alleviating the headaches that process can bring. Because in the long run, everyone is better off with better security.

    • 19 min
    You Can’t Automate Collaboration

    You Can’t Automate Collaboration

    No single person can automate a whole company’s IT. Even most teams would need some help. But it’s also not likely you can immediately get everyone to automate their own work right away. So how do you get it done?

    Sudheer Kumar Donthineni explains how Ulta Beauty makes the most of its small team of 3 automation experts. Through the power of collaboration, they’re able to make significant progress with automation—and help their employees grow.

    • 17 min

Customer Reviews

5.0 out of 5
10 Ratings

10 Ratings

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
In Her Ellement
Boston Consulting Group BCG
Acquired
Ben Gilbert and David Rosenthal
Hard Fork
The New York Times
Deep Questions with Cal Newport
Cal Newport

You Might Also Like

Compiler
Red Hat
CyberWire Daily
N2K Networks
The Changelog: Software Development, Open Source
Changelog Media
Malicious Life
Malicious Life
Defense in Depth
David Spark
Hacking Humans
N2K Networks