Challenges in Open Source Application Security – Shubhra Kar – ASW #163
Open Source is the new mainstream of software development. However not much attention is paid on security in the upstream
Read moreOpen Source is the new mainstream of software development. However not much attention is paid on security in the upstream
Read moreSecurity and compliance are two hot topics when it comes to container-based applications. In this episode, we take a look
Read moreVMware vSphere 7 introduced many new features and capabilities to their hypervisor and management offerings. This video demonstrates deploying OpenShift
Read moreWhat’s your Recovery Time Objective and Recovery Point Objective? Do you have a disaster recovery plan for both OpenShift and
Read moreWhat happens when you deploy applications across multiple clouds? Wondering how to manage Kubernetes with GitOps with multiple clusters? In
Read moreSeries of videos demonstrating how to use F5 BIG-IP in a RedHat OpenShift 4 cluster. Includes: • How to use
Read moreThere are several different methods to deploy OpenShift to your hyperscaler, hypervisor, or hardware platform of choice. One of the
Read moreWhat does shifting security to the left mean for developers and individual contributors? Join us for a two-part live discussion
Read moreHow do GitOps and enterprises coexist? Today we’ll have Henrik Blixt from Intuit join us to share how they use
Read moreGrant gives a quick explanation of what Red Hat Smart Management is. Learn more here: https://redhat.nzingram.com/ source by Red Hat
Read more