Thought writing 200 lines of YAML in 1 minute was easy? This video shows you how to write nearly 650 lines of YAML in under 2 minutes... without writing a single line.
TruMethods president Gary Pica and Patrick Albert, AVP of Auvik Networks share proven methods for pricing and packaging your IT service offerings. How you approach your support offering is the most important decision most IT providers will make.
Kubernetes can be a great orchestration platform for your microservices but these services can grow complex and difficult to manage. Enter Istio, an integrated way to create a network of your services and manage load balancing, authentication, and more! Join us as we walk you through Istio and several ways it can help you wrangle your applications.
Helm is a great framework for deploying Kubernetes applications, and in Rancher we've made it possible to leverage that framework to create a catalog of application blueprints that can be configured and deployed in a repeatable way.
Join Matthew Long and Wayne Plummer as we take you on a deep dive through the all new Visual Application Discovery & Analysis (VADA) features in Squared Up v4.
Learn how Splunk for Industrial IoT generates real-time and predictive insights for industrial operations. Use industrial data to ensure uptime with real-time monitoring, reduce cost with predictive maintence strategies and secure OT operations against cyber threats.
This ManageEngine Webinar series introduces industry best practices required to be followed in 2019. The importance of privileged access to critical information and data loss prevention (DLP) against insider threats will be discussed. It will also highlight the rising significance of Unified Endpoint Security and Management, trends in Log Management, compliance standards.
This ManageEngine Webinar series introduces industry best practices required to be followed in 2019. The importance of privileged access to critical information and data loss prevention (DLP) against insider threats will be discussed. It will also highlight the rising significance of Unified Endpoint Security and Management, trends in Log Management, compliance standards.