Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Session 2: Protect Your Apps and APIs across a Distributed Cloud Richard Bible, F5 Senior Solutions Engineer With cloud architectures, protecting both the application business logic and the underlying infrastructure is paramount. With the F5 Distributed Cloud... May 30, 2023 9:00am Reduce Complexity of Scaling Cloud-Native Applications with Red Hat & Nutanix Harsha Kotikela, Director of Product and Solutions Marketing When creating modern cloud-native applications that span from edge to datacenter to cloud, legacy 3-tier infrastructure is just not enough. Scalabilit... May 31, 2023 5:00pm Session 1: Protect Your Apps and APIs across a Distributed Cloud Matthieu Dierick, F5 Senior Solutions Architect With cloud architectures, protecting both the application business logic and the underlying application infrastructure is paramount. With the F5 Distr... 5 days ago | 52 mins Protect Your Apps and APIs to Thrive in a Multi-Cloud World Keiron Shepherd, Senior Solutions Architect - F5 With cloud architectures, protecting both the application business logic and the underlying application infrastructure is paramount. However, as appli... June 8, 2023 9:00am A new approach for browser-based performance testing Bryan Cole To effectively verify performance under load, your performance testing strategy should include both protocol and browser-based testing. But traditiona... June 6, 2023 4:00pm Top Challenges With Shifting Security to Development Melinda Marks, Enterprise Strategy Research Group (ESG) & Tim Mackey, Synopsys With modern processes, software developers can quickly build and release applications by deploying them to the cloud. But security teams are strugglin... 2 weeks ago | 53 mins Code to Cloud Sec. Hour Series: Detecting & Preventing Supply Chain Attacks Sai Krishna Kumar Vootukuru, Senior Cloud Security Architect, Palo Alto Networks All software supply chain attacks share a core trait in common: they allow threat actors to break into organizations’ IT estate by exploiting vulnerab... May 30, 2023 3:00am How to Easily Deploy Data Services for Cloud Native Applications Aaron Delp, Cloud Native Marketing & Jeff Kelly, DBaaS Marketing Managing both database and storage services in Kubernetes environments is challenging, usually requiring multiple disparate tools and services. How do... 2 days ago | 38 mins Managed GitOps in the clouds Natale Vinto, Head of Developer Relations, Red Hat and Markus Eisele, Head of Developer Tools Marketing, Red Hat GitOps has become a standard in deploying applications to Kubernetes and is a common methodology adopted by many companies for their DevOps and cloud-... 2 days ago | 66 mins 5 considerations for architecting across hybrid cloud environments Trevor Royer, MLOps Architect, Red Hat We’ll discuss several lessons learned from working with enterprise customers on how to best plan application architecture in a hybrid cloud. We’ll als... 2 days ago | 19 mins Load more