Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Secure Your Cloud Transformation with Continuous Intelligence

CrowdStrike and Sumo Logic work together to identify security threats and defend against IOCs in a hybrid environment. Customers gain knowledge on adversaries which may be targeting their assets and organisation via strategic, operational and technical reporting and alerts. During this session, we’ll hear from Australian private health provider, NIB, on how Sumo Logic and CrowdStrike have worked together to help NIB secure its digital transformation and cloud environment.

Sips - "Monolith to Microservices: The Developer Experience - 'It's so Complicated!'"

Coffee and Containers "Sips" are short clips from the regular Coffee and Containers web series. By 2022, IDC predicts that 90% of all new apps will feature a microservices architecture. Some of the drivers behind that are the improved ability to design, debug, update and leverage third-party code, and more. However, transitioning an existing application from a traditional monolith architecture to microservices architecture can be very challenging. How do we get started down the microservices path?

Cohort 7 StartupTalks with Cloudhedge Technologies by #NetAppExcellerator

A quick interview with Abhijit Joshi Co-Founder, and CEO of CloudHedge Technologies by #NetAppExcellerator on the lines of how its patented and automated App Modernization Studio enables enterprise customers to modernize applications and accelerate to the cloud.

Improving Container Security with VMware Tanzu Build Service and VMware Tanzu Application Catalog

In this demo, you will see one method for how VMware Tanzu Build Service and VMware Tanzu Application Catalog can be used together to build a functional application stack. Each layer within these stacks will be automatically monitored for any patches or upgrades, and automatically rebuilt and ready to deploy. Not only will these systems keep all your containerized applications up to date, but further tools are provided to automatically scan all contained code for vulnerabilities, report on what is included in each container, and hashed to ensure a secure application dependency supply chain.

Enabling Secure Kubernetes Multi-Tenancy with Calico Enterprise

When you have different teams interacting with a Kubernetes cluster you need to think about the security, privacy, and observability challenges associated with multi-tenancy: How to provide each team with access to the specific resources they need, in a way that allows the team to be agile, without risking impacting other teams? In this session, we’ll explore the Kubernetes multi tenancy concepts and design patterns needed for successful enablement of multi-tenancy within your Kubernetes clusters using key capabilities of Calico Enterprise.