Code Comments Red Hat
-
- Technology
-
Putting new technology to use is an exciting prospect. But going from purchase to production isn’t always smooth—even when it’s something everyone is looking forward to. Code Comments covers the bumps, the hiccups, and the setbacks teams face when adjusting to new technology—and the triumphs they pull off once they really get going.
-
Transforming Your Secrets Management
We’ve been taught to stash our secrets. Passwords, credentials, and tokens shouldn’t be shared lest they fall into the wrong hands. When it comes to building and running large-scale systems, that thinking has to change. But maybe only a little bit.
Rosemary Wang and Steve Almy of HashiCorp share how business as usual for secrets management means putting your business at risk. -
Transforming Your Identity Management
Modern IT systems have a lot of components—components people have to use, and components who need to talk to each other. That’s a lot of traffic and exchanging of sensitive information. How do you sort the legitimate users from the potential intruders?
Niels Van Bennekom shares how CyberArk helps organizations set up identity management systems that can keep up with expansive, ever-changing IT systems. -
Season 3: Charting Digital Transformation
A journey of 1,000 upgrades starts with a single commit. It’s not always clear how much change digital transformation entails. But it’s likely more than expected.
Season 3 of Code Comments travels the well-trodden paths of IT modernization, cloud migration, and the unmentioned necessities to make it all work. -
You Can't Automate The Fire
Is there such a thing as too much enthusiasm for automation? Probably not. But it can be difficult to unify an organization with strong opinions.
Vincenzo Sposito shares how Discover harnessed its teams’ passions to build a unified automation solution—while preserving debate and experimentation. -
You Can’t Automate The Difficult Decisions
The tensions between security and operations and developer teams are the stuff of legend. DevSecOps is trying to change that, and automation is a big part of making it possible. But automation alone can’t overcome entrenched behavior.
Joylynn Kirui shares how Microsoft is helping shift security considerations to the left—and alleviating the headaches that process can bring. Because in the long run, everyone is better off with better security. -
You Can’t Automate Collaboration
No single person can automate a whole company’s IT. Even most teams would need some help. But it’s also not likely you can immediately get everyone to automate their own work right away. So how do you get it done?
Sudheer Kumar Donthineni explains how Ulta Beauty makes the most of its small team of 3 automation experts. Through the power of collaboration, they’re able to make significant progress with automation—and help their employees grow.