Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Enterprise Security Controls for Kubernetes

In this talk, we will explore how to meet common enterprise security control needs when running Kubernetes. We will look at a range of common enterprise security needs and how you can meet these with standard Kubernetes primitives and open source projects such as Calico, or take it a step further with the additional features of Calico Enterprise.

How to Troubleshoot Citrix and Google Chromebook Issues

Watch to learn how SSI, a Platinum Level Citrix provider, uses Goliath’s software to troubleshoot Citrix and Google Chromebook issues to; isolate root cause and resolve quickly, document the fix action to prove resolution to their customers and end users, and prevent future issues with threshold-based alerts.

JFrog & RedHat - Pizza Delivery vs. DevOps Pipeline On OpenShift

In this webinar, Baruch Sadogursky of JFrog and Aubrey Muhlach of Red Hat will demonstrate the ease of supporting DevOps with a fully-fledged pipeline in a cloud. From source control, CI server, artifact repository, security vulnerability and license compliance scanner, Docker registry, Helm repository... all the way to runtime, with OpenShift, tracing and monitoring tools. We mean EVERYTHING! So, by using the K.I.S.S. principle (keep it simple) applied to a bunch of SaaS tools, we can create an entire DevOps pipeline in 30 minutes or less! Or can’t we?