Operations | Monitoring | ITSM | DevOps | Cloud

Latest Videos

Kubernetes Master Class - Service Mesh with Istio in Rancher 2.5

The release of Rancher 2.5 introduced some significant changes to the Istio Service Mesh integration. In addition to those changes, the Istio project has also undergone some significant redesign in recent versions. Staying current in this fast moving space can be a challenge. Fear not! In this Master Class, Rancher Field Engineer Jason Skrzypek will summarize the notable changes, discuss the rationale behind some of them, and demonstrate the possibilities that this new implementation unlocks.

Sips - "Monolith to Microservices: What advice can we give for getting started?"

Coffee and Containers "Sips" are short clips from the regular Coffee and Containers web series. By 2022, IDC predicts that 90% of all new apps will feature a microservices architecture. Some of the drivers behind that are the improved ability to design, debug, update and leverage third-party code, and more. However, transitioning an existing application from a traditional monolith architecture to microservices architecture can be very challenging. How do we get started down the microservices path?

How Digital Transformation Catalyze Your Ecommerce Business?

Digital Transformation brings together technology, resources, and processes and integrates all together to form a synergized business throughput. Also, the digital transformation turns your eCommerce business into a customer-focused, agile, and disruptive platform that would keep your business competitive. Join the digital transformation journey and be in a good company. Reach ZiniosEdge for all your #digtialtransfromation requirement for #ecommerce business. Stay Competitive.

Outlier Detection: The Different Types of Outliers

Time series anomaly detection is a tool that detects unusual behavior, whether it's hurtful or advantageous for the business. In either case, quick outlier detection and outlier analysis can enable you to adjust your course quickly, before you lose customers, revenue, or an opportunity. The first step is knowing what types of outliers you’re up against. Chief Data Scientist Ira Cohen, co-founder of Autonomous Business Monitoring platform Anodot, covers the three main categories of outliers and how you'll see them arise in a business context.

Vulnerability Management with ManageEngine Vulnerability Manager Plus

Vulnerability management is the cyclical process of identifying, evaluating, treating, and reporting on threats and vulnerabilities across your network endpoints. In this video, we take an in-depth look at the exhaustive threat and vulnerability management features of ManageEngine Vulnerability Manager Plus.

Securing Kubernetes using Egress Access Controls

A majority of existing workloads are non-Kubernetes, and for the platform teams involved, this creates challenges because the cluster will need to be securely connected to those resources. Calico Enterprise includes several features that enable fine-grained access controls between your microservices and databases, cloud services, APIs, and other applications that may be protected behind a firewall. There are different approaches to managing Kubernetes egress access, depending on your needs and where you want the control point to be