Hi [[ session.user.profile.firstName ]]

Emergency Response Demo: A Community-Driven Example from Red Hat

Red Hat, the leading provider of integrated, hybrid-cloud, enterprise software, has created an example of a humanitarian solution that enables neighbors to support each other during a disaster. Red Hat's Emergency Response Demo is an example of how community-powered open source innovation, which Red Hat makes available in an enterprise-ready form, can be used to support the efforts of another community - volunteers in a “Cajun Navy” type response as emerged during Hurricane Harvey. We also harness the power of yet another community: the passionate and talented developers and operators from across different divisions of an organization.

The emergence of new technology, via collaboration between individuals of a community, has led to unprecedented improvements to the human race. This is the Power of Communities. The innovation created from open-source collaboration between some of the world’s greatest minds, in particular in the past 15 years, is undeniable and unprecedented. The open-source collaboration model is not a “disease” as it was labelled by some in its infancy 20 years ago. On the contrary, the recent personification of innovation itself is the open-source collaboration model. Open-source is synonymous with Red Hat. Red Hat embodies the Power of Communities.

You are invited to spend an hour with Red Hat discovering more about the Power of Communities and how we can help you leverage that power to deliver on your organization’s mission with greater agility, security, and scalability. You will be introduced to Red Hat’s portfolio of capabilities via their use in the Emergency Response Demo, and will learn how Red Hat’s integrated portfolio of enterprise products can accelerate your organization’s business solutions to the hybrid-cloud.
Recorded Apr 22 2020 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jeffrey Bride, Business Automation Specialist, Red Hat
Presentation preview: Emergency Response Demo: A Community-Driven Example from Red Hat

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Optimizing Serverless and OpenShift with Knative Oct 7 2020 6:00 pm UTC 60 mins
    Jason Dudash, Chris Kang and Jon Keam | Red Hat
    Serverless computing allows developers to optimize their application usage, by executing and billing on application resource consumption. Traditionally this execution model was offered by cloud providers in a non-portable manner. Today - the serverless paradigm is offered in OpenShift via the Knative upstream project, adding a key toolkit for developers to build portable, cloud native applications in hybrid and multi-cloud environments.

    Join us for a fireside chat with seasoned Red Hat architects to learn about this new development paradigm and how it can be effectively leveraged in your organization or government agency.

    Jason Dudash, Principal Solutions Architect, Public Sector, Red Hat @DudashTweets
    Chris Kang, Emerging Technology Solutions Architect, Public Sector, Red Hat @TheCKang
    Jon Keam, Senior Solutions Architect, Public Sector, Red Hat @JonnyMan9
  • Public Sector Coffee Hour - Amy Vetter Recorded: Sep 22 2020 57 mins
    Amy Vetter, The Mindful Technologist & Yasir Syeed, Mindwell (Mindfulness + Wellbeing) Community Practice Lead, Red Hat
    Amy Vetter is the “Mindful Technologist”, with a focus on mindful relationships between people and technology, as well as leaders. Her experience as a serial entrepreneur and technology business executive brings a unique perspective on work-life balance and productivity in the time of Covid-19. We’ll talk about open leadership principles, the open organization and how all of this impacts the world of working remotely alongside a family.
  • Making Legacy Applications Modern Recorded: Sep 16 2020 61 mins
    Jon Calalang, F5 | Tim Keating, CDW | Sompop Noiwan, Red Hat
    Join us for a webinar to discuss how current agencies and entities are leveraging the power of CDWG, Red Hat, & F5 t to successfully modernize their legacy apps.

    You'll gain an understanding of:
    - CDWG's orchestrations, DevOps, and App Modernization services
    - Red Hat's hybrid cloud infrastructure, cloud native development, & automation portfolio
    - F5’s suite of products to assist in delivery, application security and visibility to optimize performance, enable ease of deployment and provide protection for your modern environment

    With a strong partnership and strength of capabilities, these organizations are working together to help state and local governments and educational institutions develop secure applications that have immediate impacts while delivering long-term results.

    The first 80 registrants who attend will receive a $20 Amazon gift card or a charity donation. If you are unable to accept the gift card and/or would prefer a charity donation, please let us know by emailing rperlen@redhat.com.

    Jon Calalang, Solutions Architect, F5
    Tim Keating, Hyperscale Architect, CDW
    John Rubin, Executive Technology Strategist, CDW
    Sompop Noiwan, Business Development Programs, Emerging Technologies, Red Hat
  • Cybersecurity Workshop Recorded: Sep 16 2020 25 mins
    Michael Epley, Red Hat
    Fending off cyber threats and preserving cybersecurity has never been more challenging. Among federal, state and local executives, cybersecurity consistently tops the list of concerns that keep them up at night. Attack surfaces are larger; the universe of bad actors seeking to breach security is expanding; techniques for exploiting vulnerabilities are more sophisticated; and in a digitally transformed environment, the stakes are higher, as well. Having a strong perimeter defense is no longer sufficient. In the era of cloud computing and massive mobility, the perimeter is pixilated. Everyone with a smart phone who seeks access to your network is a potential threat.
  • Public Sector Social Hour - Next Gen Mission Apps Recorded: Sep 11 2020 63 mins
    Jeff Bride, Red Hat; Ben Cushing, Red Hat; Kevin Tunks, Red Hat and Keith Babo, Red Hat
    If you had the opportunity for an open discussion with a Red Hat® expert, what would you ask? In our series, “Public Sector Social Hours", we give you that chance. We will be doing it weekly on Thursdays with new experts each time focusing on specific trending topics in the industry - like cloud, containers, and networking. Any question - from beginner to advanced - is welcome, and will be addressed in an open forum.
  • Improve continuously or lose to shadow IT Recorded: Sep 9 2020 59 mins
    Yasir Syeed and Kevin Behr
    In many IT organizations the notion of improvement is often tied to a capital project. High- performing organizations create consistent learning and challenge at the edge, with no additional budget or staff. The secret? The power of the improvement kata pioneered at Toyota, which is a proven methodology for continuous improvement that can be used by organizations.

    Learn how it is possible to improve nearly every process and outcome everyday. We will discuss a very simple set of tools designed to increase our decision-making capabilities, navigate uncertainty with a scientific approach, and reignite purpose and passion in idle management with a new focus on developing thinking and judgment versus telling people what to do.

    This session will be presented by Yasir Syeed North American Public Sector Transformation Office, Red Hat and Kevin Behr Global Senior Director, Global Transformation Office, Red Hat; co-author, The Phoenix Project
  • Public Sector Coffee Hour - Noramay Cadena Recorded: Sep 8 2020 53 mins
    Noramay Cadena, Cofounder and Managing Director, MiLA Capital & Adam Clater, Chief Architect, Red Hat
    Noramay Cadena is the Co-founder of an early stage hardware accelerator in Los Angeles, with a strong history of helping to bring digital knowledge and entrepreneurship to women and the latin community. Adam and Noramay will talk about powering your way through MIT and the ability of open source technology to close the digital divide and enable early stage, open hardware platforms and STEM.
  • When change management stops change: How to increase velocity and reduce risk Recorded: Sep 3 2020 60 mins
    Kevin Behr and Yasir Syeed
    We did not invent brakes merely to stop cars. Change management is a process that is designed to increase change velocity and reduce risk. In this session, Kevin Behr, co-author of the best selling book, The Phoenix Project, will show that this key process area and associated rationale are a major determinant of organizational throughput and operational excellence. More people are frustrated with managing changes to their infrastructure and applications and often see the activity as annoying, or even worse, impeding progress.

    All of our collective work results in change, so let’s get the most out of it by understanding that we designed brakes to allow us to go faster. Stop driving with your foot on the brake, and rather use those brakes to achieve a higher velocity of successful changes. You’ll walk away with key metrics that will illuminate the process, and the opportunity to self-reflect on how you are measuring change and progress.

    This session is presented by Kevin Behr Global Senior Director, Global Transformation Office, Red Hat; co-author, The Phoenix Project and Yasir Syeed North American Public Sector Transformation Office, Red Hat.
  • New paradigms for modern development: Orchestrating containers with OpenShift 4 Recorded: Sep 1 2020 85 mins
    Donald Grant, Senior Consultant, Red Hat and Joe Charles, Consultant, Red Hat
    Containers enable the adaptation of many new delivery methods that lead to quicker innovation and reliable delivery of software. Red Hat OpenShift 4 allows IT organizations to deploy both new and existing applications on secure, scalable resources with minimal configuration and management overhead. Giving developers the freedom to be creative while enabling stable and secure performance that operations groups demand is a key component of success in the containerized cloud environment. These new abilities create a need to address team dynamics to facilitate the transformation needed in the to get to market faster while maintaining reliability and security.

    Red Hat OpenShift Container Platform (RHOCP) is the perfect tool for accomplishing complete transformation of your delivery methodology. Join us as we talk about the different ways containers can benefit your entire organization's software delivery process and acceleration to cloud native applications.
  • Data integration in the Hybrid Cloud v2 Recorded: Aug 27 2020 44 mins
    Dan Domkowski, Software Delivery Specialist, Red Hat
    As technology platforms and cloud providers have simplified the availability of tooling for the study and analysis of data, the delivery of intelligent applications has gone from experimental to the mainstream. The rapid emergence of data science and intelligent application delivery can be attributed to both an increase in integration of data and data types across environments, and the availability of platforms and cloud solutions for building applications around the study of their data.

    Platforms capable of delivering services around application and data integration, intelligent application development, and process automation across the Open Hybrid Cloud allow organizations to turn meaningful analysis into meaningful action.
  • Next-Gen Mission Apps Built on Kubernetes w/Event-Driven & Serverless Approaches Recorded: Aug 18 2020 59 mins
    Ken Johnson, Vice President, Application Services Business Unit, Red Hat
    Whether you’re trying to better manage fraudulent claims, citizen interaction, respond to weather events or health crises, mitigate cyber attacks or route fleets of equipment and vehicles, a comprehensive, real-time event processing portfolio gives you the flexibility to produce sophisticated solutions with assurance of stability, simplicity, and proven enterprise patterns. Developing a solution that reacts and produces insights to real-time events requires an event driven architecture built to run across agency and infrastructure boundaries. The speed and volume of streaming data requires a high performance and scalable data event processing architecture and adds a layer of complexity regarding fault tolerance, data durability, and scalability. If properly analyzed, these real-time data streams can identify pain points, successes, behavioral habits, and provide real-time situational awareness. Critical to the adoption of these solutions are their innate portability. They must be able to run anywhere (on-premise, cloud, or hybrid cloud) and must be designed as decoupled, microservices, deployed within a robust container orchestration platform.

    Want to continue the conversation? Have more questions about mission applications? Join us again on Thursday, August 20 for Public Sector Social Hours, where we will demonstrate a complete fraud detection application, running on OpenShift and leveraging Kafka, KNative-based Serverless, Istio and other modern techs and architectures. The panel of experts will discuss key points of the demo and ask architectural questions. Attendees are also encouraged to ask questions. Register: https://events.redhat.com/profile/form/index.cfm?PKformID=0x211262abcd&sc_cid=7013a000002goyuAAA
  • Security Automation: IBM Qradar and Ansible Automation Platform Recorded: Aug 17 2020 63 mins
    Parag Pathak, Product Marketing IBM Security; Jamie Beck, Product Marketing, Red Hat; Adam Miller Software Engineer, Red Hat
    Ansible is the open and powerful language security teams can use to interoperate across the various security technologies involved in their day-to-day activities. Ansible modules enable users to integrate IBM Security QRadar in sophisticated security automated workflows through the automation of the following functionalities: log sources configuration, offense rules enablement and offense management.

    Register today to learn how you can benefit from:

    Automated QRadar configuration deployments
    Programmatic access to data sources to support investigation activities
    Enabling and disabling correlation rules through workflows for incidents prioritization
    Changing the priority of an offense, its ownership and tracking activities in it's note field directly via Ansible
  • Migrating from Oracle to enterprise grade open source databases using IaC Recorded: Aug 13 2020 51 mins
    Stephen Foley, EDB Public Sector | Marc Linster, EDB | Michael Garris, Red Hat
    To deliver business advantages in this new world, organizations must shift IT from traditional infrastructure operations and become service delivery ready organizations. Red Hat and EDB provide enterprises with a secure and consistent foundation across hybrid cloud deployments. These foundational capabilities are needed to deliver these services and workloads faster with less effort - any application on any footprint at any time.

    Joint Red Hat and EDB on August 13th at 2:00 p.m. ET for this live webinar to learn how enterprises are leveraging enterprise-class Red Hat Enterprise Linux and PostgreSQL as a viable alternative for agencies wanting to:

    - Break free from Oracle and reduce databases costs by up to 80%
    - Escape vendor lock-in and embrace open source strategies
    - Easily migrate Oracle applications and alleviate technical pain points
  • Public Sector Coffee Hour - Kevin Mitnick Recorded: Aug 13 2020 56 mins
    Kevin Mitnick, CEO and Chief Hacker, Mitnick Security Consulting & Adam Clater, Chief Architect, Red Hat
    The Public Sector Coffee Hour series is a bi-weekly videocast featuring luminaries from technology, society and the world of STEM. Topics for discussion will include governmental and societal impacts of technology, open source in Sci/Tech/Med., as well as the role of technology and work/life balance.

    Kevin Mitnick, once the FBI’s most wanted hacker. Mr. Mitnick was arrested for what Sun Microsystems would later do themselves - publishing the source code to Sun’s Unix operating system. He and Red Hat’s Chief Architect, Adam Clater, will talk about the importance of transparency in security and the facts around open source technology being more secure than its proprietary, closed source alternatives.
  • How to scale our most constrained resources: The Brent problem V2 Recorded: Aug 11 2020 58 mins
    Kevin Behr & Yasir Syeed
    Nearly every organization has limitations when it comes to adding additional budget and staff. There seem to be a few people who have so much knowledge that we find them tied up in nearly every project and incident. In The Phoenix Project, these concepts are embedded in the character Brent. Brent is the person that knows how to do everything, is responsive to everyone, and generally the most helpful individual in the room. As a result, Brent becomes a bottleneck for all work endeavors.

    How do we begin to more effectively scale these resources and free up our fellow team members? Kevin Behr, co-author of the best selling book, The Phoenix Project, will discuss key elements of the Theory of Constraints and basic steps of constraint management. Learn how to free up those "impossible to get" minds by recognizing the sounds and using key intervention questions to bring clarity and get things moving.

    This session is presented by:
    Kevin Behr Global Senior Director, Global Transformation Office, Red Hat; co-author, The Phoenix Project
    Yasir Syeed North American Public Sector Transformation Office, Red Hat
  • End-to-End Visibility and Control for your Kubernetes Clusters Recorded: Aug 6 2020 49 mins
    Rod Moore, Cloud Domain Architect, Red Hat
    In today's open hybrid datacenter, Applications are moving from a monolithic to a cloud-native approach that leverages Kubernetes. These modern applications may have components that span multiple clusters and multiple cloud providers. In addition, new clusters are being added for specific purposes like edge deployments and reduced latency. This "Cluster Sprawl" introduces several new management issues. For example;

    How can I manage the lifecycle of multiple clusters regardless of where they reside (on-premise or across public clouds) using a single control plane?

    How do I get a simplified understanding of my cluster health and the impact it may have on my application availability?

    In this webinar, you'll learn to address these management concerns and numerous others with Red Hat Advanced Cluster Management for Kubernetes. It offers end-to-end management visibility and control to manage your cluster and application life cycle, along with security and compliance of your entire Kubernetes domain across multiple datacenters and public clouds.

    About the speaker:
    Roderick Moore is a Cloud Domain Architect on Red Hat's North American Public Sector team. He covers the products that comprise Red Hat's management portfolio. His more than 25 years of helping customers choose and implement enterprise management software makes him a valued resource when discussing the management needs of today's open hybrid environments.
  • Public Sector Social Hour - Data Science Recorded: Jul 31 2020 56 mins
    Sherard Griffin, Chris Sexsmith, Ryan Krauss.
    If you had time for an open discussion with a Red Hat® expert, what would you ask? In our series, “Public Sector Social Hours"", we give you that chance to ask any question- from beginner to advanced - and will be addressed in an open forum. This session's topic will be all around Data Science.

    This session will be presented by:
    Sherard Griffin, Director, Software Engineering, Red Hat
    Chris Sexsmith, Cloud and AI/ML Field Strategy Lead, Red Hat
    Ryan Krauss, Senior Solutions Architect, Red Hat
  • Public Sector Social Hour - Containers Recorded: Jul 28 2020 59 mins
    Dan Walsh, Senior Distinguished Engineer, Red Hat Matt Bach, Solutions Architect, Red Hat
    If you had time for an open discussion with a Red Hat® expert, what would you ask? In our series, “Public Sector Social Hours"", we give you that chance to ask any question- from beginner to advanced - and will be addressed in an open forum. This session's topic will be all around containers: best practices and approaches, how to make containers more secure, new features, and some storytelling from the experts.
  • Public Sector Social Hour - Containerize Virtual Workloads Recorded: Jul 21 2020 38 mins
    Rhys Oxenham, Senior Manager, Field Product Management, Red Hat; Jason Rittenour, Domain Architect, Red Hat
    If you had time for an open discussion with a Red Hat® expert, what would you ask? In our series, “Public Sector Social Hours", we give you that chance to ask any question- from beginner to advanced - and will be addressed in an open forum. This session will be around containerizing virtual workloads.
  • Leveraging APIs for IT Modernization Recorded: Jul 17 2020 51 mins
    Janani Ramprasad, Sr. Solutions Architect, Red Hat
    An application programming interface (API)-centric design approach is becoming increasingly popular across various industries including educational institutions. Enterprises are unlocking standalone applications and exposing legacy services to share data across different departments by using an API management platform (AMP), built with security in mind. AMP allows providers to efficiently release legacy data and share with consumers internally and externally. API providers can rest assured given this API management platform has been built for enterprise security and API governance.

    In this webinar, Manav will discuss and demonstrate the following topics to illustrate how enterprises can use AMP to share the legacy and new services while controlling and monitoring a portfolio of APIs.

    Benefit/Value of APIs
    Discuss API life-cycle management
    Discuss API-first design approach
    Design API using API designer
    Build and deploy your APIs
    Control your APIs via usage policies
    Operation your APIs via monitoring, analytics, reporting, and billing
    Engage with developers through Developer Portal and interactive API documentation
    Make your APIs available via API discovery
Learn how open source technologies can support public sector missions
Government agencies demand performance, transparency, and value—exactly what Red Hat and open source offer. Red Hat is the standard choice for Linux in governments worldwide.

Our cloud, virtualization, app development, storage, platform and service-oriented solutions bring real freedom and collaboration to federal, state, local, and academic programs. And Red Hat’s worldwide support, training and consulting services bring the power of open source to your agency.

We are a part of a larger community working together to drive innovation. Learn more at www.redhat.com/government.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Emergency Response Demo: A Community-Driven Example from Red Hat
  • Live at: Apr 22 2020 6:30 pm
  • Presented by: Jeffrey Bride, Business Automation Specialist, Red Hat
  • From:
Your email has been sent.
or close