Operations | Monitoring | ITSM | DevOps | Cloud

Webinar

Innovator Preview: Risk Based and Patch Management Solutions #patchmanagement #ivanti

The video discusses enhancements to the Q2 2024 release. It covers challenges, beta opportunities, upcoming user group meetings, and the Ivanti Solutions Summit 2024. The emerging technology, Ivanti Neurons for ESM External Tax Office Management, is introduced with a focus on asset discovery, attack surface, and dashboard overview. The video also explains the process of auto ticket creation based on findings collections and encourages viewers to provide feedback.

Secure your AI workloads with confidential VMs

AI models run on large amounts of good quality data, and when it comes to sensitive tasks like medical diagnosis or financial risk assessments, you need access to private data during both training and inference. When performing machine learning tasks in the cloud, enterprises are understandably concerned about data privacy as well as their model’s intellectual property. Additionally, stringent industry regulations often prohibit the sharing of such data.

Innovator Preview: Ivanti Neurons for ITSM & ITAM 2024.2 #itsm #itam

This Ivanti Neurons preview session delves into its innovative features and opportunities for innovators. It introduces the ITSM, ITAM, and the Ivanti Neurons IPAs offering for external integrations. The session also highlights the self-service experience, AI capabilities, and Microsoft Teams integration. It concludes with an introduction to the improved survey designer in Ivanti Neurons. Action items include exploring opportunities with the UX team, product marketing, and experimenting with new features.

How to enhance engineering agility and maximize ROI in Microsoft Azure

Developing a successful cloud operations practice is the key to unlocking the full benefits of Microsoft’s Azure cloud platform in your organization. Learn how to get started adopting the CloudOps practices, processes, and tooling that will enhance engineering agility in your organization, reduce team burnout, and maximize your ROI from Azure cloud. Relevant Links: 🔔 Don't forget to hit the notification bell to get notified whenever we release a new video.

How to find Kubernetes reliability risks with Gremlin

Part of the Gremlin Office Hours series: A monthly deep dive with Gremlin experts. Most Kubernetes clusters have reliability risks lurking just below the surface. You could spend hours or even days manually finding these risks, but what if someone could find them for you? With Detected Risks, Gremlin automates the work involved in finding and tracking reliability risks across your Kubernetes clusters. Surface failed Pods, mismatched image versions, missing resource definitions, and single points of failure, all without having to run a single test.

Rancher Live: The legal aspects of open source

Kubernetes and cloud-native technologies have become widely adopted in the last decade, making them ubiquitous. This has significantly contributed to the open-source movement and highlighted the importance of policymaking in the successful adoption and sustainability of the ecosystem. However, understanding and navigating the complex legal landscape on the path to production can be challenging, particularly for developers seeking to understand the ecosystem. That’s why, in this episode of Rancher Live, we will take a slight detour from talking tech to deconstructing some key policy issues associated with open-source software with OpenUK's CEO, Amanda Brock.

Network Automation: Are You the Only One Not Doing It?

In this lively webinar, Corey Quinn from the Duckbill Group, alongside Kentik's Rosalind Whitley and Phil Gervasi, explore network automation, pondering the question, "Am I the only one not doing it?" They explore the current landscape of network automation, discussing tools, value, and the realness of Net DevOps. The trio also considers the future role of AI in networking, debating its potential beyond hype. This conversation sheds light on the cultural and technological factors influencing network automation's adoption and evolution.

Prevent and Recover from Ransomware Attacks with Layered Security

Delivering effective security requires a layered approach varying from comprehensive backups, endpoint hardening, effective patch management for both the operating system as well as third-party applications, AV/EDR products like SentinelOne, and more. This list just scratches the surface of the myriad of tools and methods for maintaining a proactive security posture.