Hi [[ session.user.profile.firstName ]]

Open Source Innovation in Government

  • Date
  • Rating
  • Views
  • Container-native storage for the OpenShift masses
    Container-native storage for the OpenShift masses Jamie Duncan, cloud solutions architect, Red Hat Recorded: Jun 20 2018 61 mins
    Containers are a developer's best friend. Quickly developing your code, dropping it into a container and running it anywhere you like can be intoxicating. But what happens to that container once it leaves your laptop? What do your Ops teams have to know, and what do they have to do to keep your containers happy and healthy and scaled up for production?

    Join this webinar about how container-native storage offers developers the ability to dynamically provision storage for their modern applications. Exploring your containers' journey using practical examples, we'll cover:

    -What actually happens when you create a Linux® container with Red Hat® OpenShift Container Platform.
    -How container-native storage lets you dynamically provision storage for your modern applications.
    -How to persist your Red Hat Gluster Storage container registry with Red Hat OpenShift Container Platform 3.5.
  • Secure mobile application development for government
    Secure mobile application development for government Vincent Sritapan, DHS science & technology directorate; Steve O'Keefe, Red Hat; Dr. Tom Karygiannis, Kryptowire Recorded: Jun 6 2018 44 mins
    Building secure mobile applications for government use comes with a diverse set of technology and policy constraints designed largely at ensuring the security of the mobile application. Resolving these insecurities or policy violations in the application code after the application has been built requires considerable time and cost, and it can introduce delays in the release of the application.

    Join this webinar to:

    -Gain insights on secure mobile application development for the federal government and the developing policy picture in that area.
    -Learn about a solution to close gaps in the mobile application development life cycle, gaps where insecure code or policy violations can be introduced, either unintentionally or with ill intent.
    -See a demo of Kryptowire code-scanning technology with the Red Hat® Mobile Application Platform that automatically enforces checks throughout the mobile app development process to ensure code and third-party library compliance with U.S. mobile security standards.
  • Reduce mainframe cost and innovate faster with Red Hat’s Emerging Technologies
    Reduce mainframe cost and innovate faster with Red Hat’s Emerging Technologies Zohaib Khan, application modernization practice lead, North America Public Sector, Red Hat Recorded: May 29 2018 53 mins
    About your mainframe:

    -Does it house a significant portion of your application portfolio and have long release cycles that hamper innovation?
    -Are its costs increasing without adding significant new capabilities, and do you wonder what part it could play in moving to the cloud?
    -Does it contain production code that current staff can no longer support and that the market no longer has skills to hire for support?
    Join this webinar to learn about emerging technologies, approaches, and expertise that can modernize your application stack incrementally, without having to make expensive code changes on the mainframe. We'll cover this way to reduce your mainframe costs while integrating faster, including:

    -A structured approach to application modernization from Red Hat.
    -How emerging technologies from Red Hat can get you to the cloud and DevOps faster.
    -How to discover business workflows in your mainframe using new tools.
    -How to expose mainframe workflows as APIs without writing a single line of code.
    -A live demonstration of the entire approach.
  • Open containers with persistent storage for government agencies
    Open containers with persistent storage for government agencies Jamie Duncan, cloud solutions architect, Red Hat Recorded: May 23 2018 50 mins
    Containers are a developer's best friend. Quickly developing your code, dropping it into a container, and running it anywhere you like can be intoxicating. But what happens to that container once it leaves your laptop? What do your ops teams have to know, and what do they have to do to keep your containers happy and healthy and scaled up for production?

    Join this webinar to explore your containers' journey. Using practical examples, we'll cover:

    -What actually happens to create a container in OpenShift and how it all works inside Linux®.
    -How container-native storage works to let you dynamically provision storage for your modern applications.
    -How to persist your Red Hat® Gluster Storage container registry with Red Hat OpenShift Container Platform 3.5.
  • Putting the Ops in DevOps: Optimizing an agency with orchestration & automation
    Putting the Ops in DevOps: Optimizing an agency with orchestration & automation Frank DiMuzio, emerging technology specialist, Red Hat Recorded: May 15 2018 63 mins
    Imagine automating away the drudgery of repetitive daily tasks and manual processes to focus on delivering more value to your business. Consider your current process: Do you find that delivering an application into production involves a multitude of trivial tasks? Do these tasks create friction between developer teams and IT operations?

    These painful deployments not only lead to poor quality, but may also create shadow IT or deter deploying to production altogether, which results in lower citizen satisfaction. Operations teams play a crucial role in implementing new DevOps processes and speeding time to market for new apps.

    Join this webinar to learn how to:

    -Reduce complexity with consolidation.
    -Decrease security concerns and delays.
    -Give your team more time to innovate.
  • Government data management in a microservices architecture
    Government data management in a microservices architecture Tariq Islam, senior specialist solutions architect, Red Hat Recorded: May 10 2018 50 mins
    Microservices are quickly becoming the defacto standard for building and deploying applications and containers, and container orchestration engines, such as docker and Kubernetes, have made their way to the forefront of our industry. Traditionally, microservices architectures are discussed in the context of developers and operations. However, a critical organizational component is often left out of these conversations: the data and the data owners.

    In this webinar, we will discuss:

    -The benefits of microservices architectures and deployments.
    -How current data management processes impact and inhibit microservices architectures.
    -How to address these inhibiting factors.
    We will also explore ways in which organizations and teams of developers can decouple the life cycle of their applications and microservices from the data management life cycle, and what it means to "own" your data. Join us as we discuss how you can use microservices architectures, and the data upon which they operate, to improve the agility of your business.
  • Hybrid cloud automation challenges for government agencies
    Hybrid cloud automation challenges for government agencies Cameron Wyatt, Senior cloud consultant, Red Hat and Henry Grover, Cloud consultant, Red Hat Recorded: May 2 2018 44 mins
    Hybrid cloud automation has become an essential part of modern IT workflows. Automation provides repeatable processes that increase agility and reduce human error.

    In this webinar, we'll cover:

    -Challenges organizations face in using and automating hybrid cloud environments.
    -Strategies for introducing automation into hybrid cloud environments.
    -Organizational changes needed to support hybrid cloud automation.
  • Offensive security with Ansible
    Offensive security with Ansible Christopher Grimm, consulting architect, Red Hat and Greg Tinsley, consultant, Red Hat Recorded: Apr 26 2018 55 mins
    Cybersecurity has increasingly become an area of concern across every organization today. Automation tools are growing within the enterprise and security testers can use these tools to their advantage. Advanced solutions focus on malware and identifying malicious code, which results in attackers finding ways to operate without downloading specialized malicious tools. As security testers, we need to be doing the same and using already-in-place tools, such as Ansible, that help our testing be as authentic and as successful as possible.

    Join this webinar to learn how Ansible is a great automation tool for the administrator. We'll cover:

    - The highlights of Ansible as an automation tool.
    - The benefits of Ansible as an offensive tool.
    - How an attacker might use Ansible against us.
    - Some defensive methodologies to protect ourselves.
  • Storage and its role in the software-defined datacenter
    Storage and its role in the software-defined datacenter Steve Bohac, senior principal product marketing manager, Red Hat Recorded: Mar 7 2018 51 mins
    Deploying open, software-defined, scale-out storage solutions to industry standard servers can allow you to easily manage unstructured data for physical, virtual, and cloud environments.

    Join this webinar to learn about:
    > How you can benefit from added business agility and cost-efficiencies.
    > Traditional, monolithic storage vs. seamlessly, scalable, software-defined storage.
    >How Red® Hat Gluster Storage provides the durability, security, and performance you require.
  • Automating Security & Compliance for Physical, Virtual, and Cloud environments
    Automating Security & Compliance for Physical, Virtual, and Cloud environments Lucy Kerner, Principal Technical Markering Manager - Security, Red Hat Recorded: Feb 7 2018 27 mins
    Maintaining visibility, control, and compliance remains paramount, but it becomes more difficult in a hybrid infrastructure consisting of multiple, different environments. With disparate environments, having visibility into, controlling, and ensuring governance and compliance, becomes more challenging and time consuming.

    In this session, you’ll learn how Red Hat management technologies and OpenSCAP can help you automate security and compliance across private or public cloud environments, virtual environments, and container environments. Learn how to automate compliance against various security or regulatory profiles such as the Defense Information Systems Agency Security Technical Implementation Guide (DISA STIG) and the Payment Card Industry Data Security Standard (PCI-DSS), your custom policies, and many others. You’ll also learn how to perform audit scans and automate remediations on your systems.

Embed in website or blog