Episodes

Green Data Centers

What’s going on with green data centers, why does it matter, and how do we think about it in a wider context? In this short conversation, we discuss green data centers and creating carbon neutral infrastructure. This isn’t just about servers using electrons – the actual conversation about making our infrastructure carbon neutral includes thinking…More

WTF My MFA is MIA

How do authorization systems need to be built and made resilient for distributed infrastructure? We discuss how having a single centralized authorization system is incredibly fragile compared to distributed edge infrastructure. Everything we build has some element of distributed component tree and resiliency in it, and we need to make sure that the authorization systems…More

OSS, Promotions, and Lava Lamps

How can promotion boards be hostile or hurtful to open source technology? We talk about the dynamics of corporate support in open source technology, and if being rewarded for internal work at companies translates into challenges for open source technology. This discussion starts to peel apart what makes open source technology sustainable, and what it…More

APIs With Composable State

What makes API’s complex? In this episode, we talk about how we compose APIs into higher level systems, and how we think about the design elements that go into building durable, reusable API’s. This is a classic topic for us, and in this discussion we looked beyond the API itself and started talking about the…More

Musk, Twitter and Web3 Social Media

Will Elon Musk take over Twitter? What are the tech and societal motivations for creating distributed social media? In today’s episode, we discuss the future of social media and if we can create distributed social media and distributed user interactions. We also question how these systems could be monetized and controlled, and who would benefit…More

Can Kubernetes Prevent Vendor Lock In?

How does Kubernetes create lock in versus how could Kubernetes be used to prevent lock in? Lock in is not always a bad thing. When you avoid committing to a single vendor, you may have to work to the lowest common denominator or deal with heterogeneity in your infrastructure. Heterogeneity is pretty normal, and you…More

Orchestration Automation Workflow [with Terraform]

Building reliable automation at scale for infrastructure presents challenges. In this episode, we discuss orchestration, workflow automation, and the reconciler pattern in the context of Terraform. We refer to the pattern of Terraform, automation, and orchestration systems as “TACOS” and today we dig into how you test it and check it against drift. These are…More

Does Your Metaverse Take MasterCard or Visa

How are Metaverse environments built? Today we talk about how we use intellectual property to build these Metaverse environments, and who has access to what and who’s going to create it. That turns into a discussion on how you’re going to pay for it. Typically, Metaverse is framed as a platform, but we got interested…More

Uses for Distributed Ledger Technology

Today’s discussion was about distributed ledger technology (DLT), also known as blockchain and the technology behind Bitcoin. We had a balanced discussion: some people who were excited about the technology and others who were skeptical. That interplay really created one of the best conversations I’ve heard about DLT and its applications Throughout the conversation, we…More

Everything As Code !

What makes Everything as Code and Infrastructure as Code interesting? In today’s episode, we discuss what makes something code-like and the idea of Everything as Code, based on Patrick Dubois’ article “In depth research and trends analyzed from 50+ different concepts as code.” Reference: www.jedi.be/blog/2022/02/23/tre…0-as-code-concepts/ Some of our conclusions were practical, like if a concept is…More

How Lock in Creates Risk

Organizations take a risk when they get locked into a vendor. In today’s episode, we talk a lot about the risks of lock in, both in general and in the context of Oracle. That discussion takes us into a question of insurance, and if insurance policies could ultimately drive people to reduce lock in exposure.…More

Goldilocks Platforms [w James Urquhart]

A Goldilocks’ balance challenges us to trade off prescriptive and flexible platforms. James Urquhart shares his experiences with Cloud Foundry, VMware, and Amazon about trying to find the right balance between building it yourself versus a prescriptive service approach. We’ve decided that there needs to be a middle zone with enough opportunity for customization, as…More

Complexity vs Value [& Okta hack]

The Okta hack highlights the value versus complexity trade off. In today’s episode, we ask if the complexity of using single sign on is the right move in this context. We also think about how to deal with these interconnected systems that have high degrees of complexity. We also discussed API design, and whether or…More

Improving Automation Safety

Making automation safe is essential to making it usable at scale. How do we make automation safe? We found a lot of great insights drawing from space craft design, aircraft, aircraft design and other systems where safety is super important. Automation is a force multiplier. If we don’t factor in safety when we build it,then…More

Data Center Users: Majors vs Miners

Majors versus minors are enterprise data centers versus blockchain, bitcoin and distributed ledger data centers. We dive into the differences in processing and environmental requirements for those two different use cases. While the idea of blockchain and distributed ledgers generate very different computational profiles, what we’re building keeps coming back to the design of a…More

Expanding GitOps Beyond K8s

GitOps is a really important way of collaborating and communicating about infrastructure. But can GitOps escape from Kubernetes? While we did talk about Kubernetes too, we mainly talked about what it takes to implement GitOps outside of Kubernetes. We considered building a GitOps architecture and then having people understand and use it. We also cover…More

Resourcing the Metaverse (+ Feedback aaS)

What resources does the Metaverse require? In this episode, we think of the metaverse as a distributed environment and ask if it could be owned by the people who are hosting the environments instead of centralized. One of the complicating factors is figuring out if the Metaverse is AR, VR, augmented or virtual systems. Consensus…More

Is Complexity Real?

Today’s episode is about measuring complexity. Complexity is a topic that we cover a lot. And in this case, we really went past the idea that we could measure complexity, and into looking at the causes and costs of complexity. We had a remarkable conversation about what it means to say something’s too complex? What…More

Is Web3 Legit?

Today’s episode is about Web3. By now hopefully you’ve heard of Web3, but… what is Web3 really!?! That’s exactly what this conversation is about! We really talked about how Web3 is more than tech bros marketing Bitcoin. There actually are real legitimate business interests around Web3. Uses like breaking transaction log jams when a small…More

Scaling Continuous Delivery

We went beyond what the Continuous Delivery Foundation is doing to talk about how to scale Continuous Delivery. Especially around the continuous reconciler pattern. So what does CD take beyond committing something in git? To make scalable continuous delivery systems and cross team continuous delivery systems means building things beyond GitOps that really scale and…More

The Real Augmentation Leading AR/VR

This discussion is about the infrastructure behind augmented reality. We really dive into how augmented reality will take place in our environment. And the spoiler is it AR is already here! We are actually building augmented reality systems everywhere and they’re showing up in our daily lives. The group believes very strongly that the automotive…More

Migrating Long Term Applications

How should we think about migrating legacy workloads to new infrastructure and modernize them? The group addresses this question methodically incuding how databases get linked, how they get used, how they get migrated, how important it is to maintain languages and what it would take to migrate in language. In the end, we look back…More

Can We Measure Complexity?

We seem to be very worried about complexity in technology, but how bad is it really? Do we have a way of measuring complexity? Figuring out how to actually quantify it could help eliminate and manage it. We started by discussing mathematical concepts to capture the systemic nature of complexity. That turns out to be…More

Can Machines Update Themselves?

We know that humans have trouble keeping systems updated, but… how can we address the challenge of knowing which updates are required and, critically, if the updates with break other systems? Even knowing if they worked is a really thorny problem! In this episode, we focus on actions about what’s going on and why this…More

What’s up with Containers for 2022

This discussion sifts into tactical concerns for containers in the near term. We’ve gotten far with containers and Kubernetes. But what about process controls that we need to wrap around containers? We talked through how we need to be thinking about containers now that we have good control surfaces around them to make things work.…More

Reliable License Models

We talk about software licensing in open source, and what it means to the broader market. In fact, we cover how it’s changing what the market actually is! This is not not just open source licensing in general because at the end we didn’t care about the license. We are more concerned about utility, serviceability…More

Serverless vs Digital Twins

We discussed the intersection of serverless and digital twinning. These two concepts are really tightly intermingled! We discarded the idea of a central single serverless hub managing everything; instead, we think sites would actually have a mesh of serverless, interconnected event processing and stream processing systems. This approach is much more function dependent, but really…More

Can DevOps Be More Collaborative / MSFT & Activision

We have a lot of questions about improving collaboration in organizations:How do we deal with change in organizationsHow can we get organizations to work together better?How do we encourage collaboration around the automation spaces that we’re trying to build in DevOps. In our discussion, a lot came back to something as simple as version control!…More

Using Blockchain for Edge Computing

We started talking about blockchain and the edge, but that is not where it ended up at all! Our fascinating journey started with web3, and surprisingly, it’s potential for distributed infrastructure and distributed web. That led us to edge: managing and trusting devices on the edge through distributed ledger (DLT). That led us to the…More

Building Green(er) Data Centers

What is a “green datacenter?” Can we make the IT infrastructure we use more environmentally sound? Maybe, but… it’s a challenging problem because fundamentally running servers uses power. We went into how data centers use power with an eye to making them more efficient. But that’s only part of the story. We discussed ways to…More

Machine Learning in Operations

Today’s episode is about how to trust machine learning in operations. This is a really serious issue because the attraction of machine learning is strong, but does not translate into operations. Why doesn’t it translate? Because operations is a closed loop process where we constantly get feedback and have to adapt and adjust. That makes…More

Exploring Edge Applications

This episode explores applications for the edge. We really try to dig in on what will work in the edge from an application perspective. We also explore what’s holding us back. Every time we have a conversation about Edge, we help undangle the components of Edge. In this discussion, we get more concise about what…More

Is Edge HCI Necessary?

To explore HCI at the edge, we started with SUSE’s Harvester. It’s an HCI integration of Kubernetes, KubeVirt, and Longhorn (their storage system) plus some PXE booting magic they threw in there. From there we explored how Kubernetes can fit into Edge HCI. That really morphed into Edge operations more generally. It’s not clear if…More

Resolving Software Dependency Chains

Dependency chains are complex and fragile when you’re depending on software, hardware cloud services that go away or change. In this conversation, we really examine the challenge of having dynamic vendor relationships and what we can do to fix and protect our environments. It’s really hard to fix what can be vulnerable when it also…More

What’s Next for Cloud and Edge?

We reflected on 2021 and our four key panelists talked through what’s coming for 2022. Instead of making broad predictions, we focused on the needs of the market. We felt there were many immediate needs around cloud outages and security challenges. Of course, we also discuss how the edge is coming up along with more…More

A Pathway to Standardization

This episode was a fun and interesting ride from boring standards to locking APIs via NFTs! We started talking about “civilization technology” where standards and regulations are applied to infrastructure. We are expecting this to happen in cloud (eventually) because it allows us to create ecosystems around the infrastructure. The historical patterns that we see…More

A Pathway to Green Data Centers?

How do we make data centers green because, fundamentally, they are going to use electricity. But the sources of that electricity, how we respond to shortages of electricity and cost signals about that electricity are all critical to consider. These are the questions that lead us to how a green data center or green infrastructure…More

Evolution of Networking Systems

How do we evolve technology in the future?  We centered the answer on networking, but in a very general way. The ability for a vendor to distribute technology and then connect things together and then build networks of that technology is a core component of how networking is evolving.   Ultimately, this is about building…More

Software Supply Chains [#Log4Shell]

Our scheduled topic was supply chains generally, but the Log4Shell vulnerability dominated the discussion. We dove into the challenge of patching and fixing a library that is literally in nearly every device or service for years and years. That led us to supply chains in the context of software, and specifically Java Log4j. This is…More

Broader Impacts of AWS Outage

We discussed the Amazon outage of December 7. Instead of simply blaming Amazon, we went looking for how the outage impacted people globally. We considered how hyper scalars are being treated and how these outages can be avoided or understood. We focused on who is impacted and what companies who are building on top of…More

What is Platform Engineering?

What is platform engineering? And why is it necessary and how to make it work compared to DevOps. In this conversation, we really hit on the challenges of creating automation teams for building automation in scalable ways. Frustratingly, we never really came up with a particularly good answer to “what is a platform team” and…More

A Path for Cloud Standardization?

We discuss standards, de facto standards, and cloud standards. It comes down to how we are creating repeatable results for the cloud marketplace. Ideally, we’re creating marketplaces where standards can be shared. We’d consider Amazon as the primary example, but we also talk about hardware and Kubernetes which have their own marketplaces. Ultimately, we asked…More

Securing Software Supply Chains

Today we talked about supply chains, but mainly security and the security aspects of supply chains because we have a very serious challenges here. We have made software and on boarding software for developers so easy, but haven’t put the same efforts in how to manage production systems! The team really talked about what it…More

Serverless At The Edge

Serverless at the edge, part one. This is a dynamic and engaged conversation with key questions like: What is serverless?Do we need serverless?How is edge serverless different than cloud serverless? We see edge environments as collecting data from sensors that needs to be heterogeneous, multi vendor, dynamic and centralized. But where centralized? I think that…More

Ops Research and Mapping

We explored Operations Value mapping. This lead to an a very interesting discussions of complexity budgets and how to measure complexity budgets. This includes managing supply chain, and value pipelines, and system coupling. Complexity budgets could be a very powerful measuring tool for understanding operations value In an organization. Overall, this helps you explain the…More

Supply Chain Disruption and Recovery

Today’s episode is about supply chains but with a Cloud2030 twist. We focused on forward leaning futures by looking into how supply chains are being disrupted. It’s going to be hard to get them working again if they can ever come back! Transcript: otter.ai/u/fBMFUh1TtBwdFvh7q0tKgpwW7kAImage: www.pexels.com/photo/buildings-c…ur-tunnel-262100/More

Can we Secure SaaS? RE: facebook & Twitch

During this 20 minute check-in we dive security and SaaS infrastructure. Can we protect the secrets that people are trusting to SaaS providers to store for us? The topic was inspired by the Twitch leak where a lot of sensitive information was exposed exposed to the public. That comes on the heels of all sorts…More

Implementing Biometric Privacy at the Camera?

We start talking about conferences using biometric security, edge detection, and included your right to be forgotten. In this fascinating conversation, we go into future projections of what it’s going to take for people get privacy including the idea of using AI so face are left out the photographs! Would be possible? If so, what…More

Why are Backups so Tricky?

Why are Backups so Tricky? Backups are really, really tricky! We talk through a lot of different things that you have to consider in making successful backups like security, resilience, how you store the data, how you recover the data and rebuild the systems. Basically, we ran the gamut on backup challenges. You really need…More

Does Business Value Mapping Deliver?

Today’s episode is about business value mapping. Instead of focusing on Ray Wang’s “Who wants to rule the world” book, we got really deep into the why. We discuss what is business value mapping, how it works, why it works, when it doesn’t work, and what it takes to make it succeed. So if you’ve…More

Does Minimal Viable Product (MVP) work?

Today’s episode is about Minimal Viable Product (MVP) which is a product development process focused on learning. It is an important element to building good resilient products and spending the right amount of time doing the right things. But it’s not a cure all! It might be right for what you’re trying to accomplish. In…More

Is AI the Future of Conferences?

What was working what wasn’t working with conferences. But in traditional Cloud2030 style, we dove into the future, what would make great conferences, what makes conferences good, what made them good in the past and what technology changes we think could be coming in the future. We extended that from conferences into meetings and meeting…More

Edge Networking: Facebook, BGP and 5G

Edge networking is hard! Because before we can talk about edge networking, we actually have to talk about edge management and edge control, and what it takes to build resilient infrastructure and train people to use it. In the first half, we’re talking about the challenges of managing infrastructure, using the Facebook outage of the…More

Your next DC… Edge or Cloud?

Cloud versus Edge? This panel dove into what makes edge different than cloud. There are a lot of different technical and commercial drivers. And fundamentally, it matters who owns the sources of data and how data sources are different. This underscores how it is critical to understand data sources, infrastructure ownership, and how everything fits…More

Certificate Management (Let’s Encrypt Expiry)

Understanding and Managing Certificates is a critical operational skill in which we cover the basics and then go deeper. If you are familiar with SSL HTTPS, you are using certificates on a daily basis. And yet, actual management of trust and root CA is and distributing private and public keys or distributing public keys and…More

Modular Automation via Pipelines and Digital Twins

Today’s episode, we talked about the challenge of making Modular Automation. We broke down why that is so hard and really dug into ways in which we can increase the modularity and reuse of automation. That led us to talking about infrastructure pipelines, infrastructure, reuse, and sharing state via digital twins in infrastructure. All of…More

Deep Dive into Secrets Management

We go into the details about Secrets Management. We explore how the process works, and how to do it right. We also cover the alternatives. This podcast is for you if you are trying to understand how secrets management works. We cover different scenarios where it can be applied, and where can go wrong. Transcript: otter.ai/u/SvO6_I3RIiGmc2FLJM70y9xoQB4Photo…More

A Peak Of Trustability?

“The peak of trustability” came up during our discussion of Trust in general. We really unwound what trust means starting from simple concepts like credentials and certificates and other security items. We got to a point where trust is also about software supply chain! Security includes how much you keep up with changes and what…More

Continuous Infrastructure Automation

Continuous Infrastructure Automation is a critical concept about driving much more resilient and repeatable systems. As we build out applications on infrastructure, we should not treat them as a static deployment. Instead, we should think of infrastructure as constantly evolving, growing and changing. There’s a lot of technology and challenges in building that! In discussion,…More

Edge Control Planes

Building an edge control plane is challenging! It’s not clear even what is currently available. As always, data, data pipelines, data orchestration, and data choreography are all influential for edge infrastructure. Transcript and Photo by Taryn Elliott from Pexels [ID 3889936]More

Challenges of API Design

Good APIs are hard to design! Making them long lasting and scalable is even harder. We discussed two aspects of API design. First, making about Event Bus for system integration and then RackN CTO, Greg Althaus, discusses what his team considers a good API design from Digital Rebar. Transcript: otter.ai/u/2Pz3LwG4qPl58s3ewwGFCCFmg8wPhoto by Tsunami Green from Pexels [ID…More

Is Open Source Working?

Is open source driving innovation? And Is it a necessary component of Right to Repair and ownership? Are there commercial drivers where people want those open capabilities? We transition into a deeper conversation about what’s going on with open source. Is it being innovative? Who is leading? How is it working? Transcript: otter.ai/u/vto0yPpBuZtqngkc_zqMDp9J39MPhoto by Jeffrey Czum…More

Terraform Usage Patterns (Gitops, IaC, Templates)

Cloud provisioning is very difficult when you go beyond simple provisioning and start thinking about how to to stitch together infrastructure in a repeatable way! Specifically, today’s episode is a deep dive into Terraform usage patterns. We get very hands on as we talk about how you manage state files and how you connect things…More

Building our IT Talent Pipeline

In this episode, we question the IT talent pipeline. We really work through boot camps and how we are building talent and skills for the generation of IT workers. We ask some key questions like:Are degrees necessary?Can you teach these things quickly?How do we actually learn the skills that are necessary to build resilient systems?And…More

Designing for 5G and Digital Twins

We talked about 5G, factories and edge infrastructure. They are very interconnected because they live at the network edge and are sensitive to how we need to route traffic. This is important as the basis for using digital twinning as a new user experience (UI/UX) around interacting with systems. This new approach is starting to…More

Do we have a Right To Right for Data & IP?

Right to Repair is the idea that when you buy a product, you’re able to fix it. We’ve been building products lately that don’t have that inherent part of the contract. In this episode, we really took Right to Repair to another level talking about Intellectual Property (IP) and ownership of that IP in the…More

That’s Not Terraform Orchestration!

This episode is about Terraform orchestration, what some people might call a TACO, in which we actually tried to do cloud provisioning in a orchestrated way. But this is a really challenging thing to do! Orchestration is really hard so our discussion kept coming back to saying that this isn’t orchestration at all: it’s Infrastructure…More

Distributed Infrastructure

With Distributed Infrastructure and the Edge, we cover the challenges of managing applications that are, by definition spread out throughout heterogeneous infrastructure. Distributed Control is designed to control systems that are are not in cloud data centers with localized compute and storage. But then how do we manage it? We discussed details about how these…More

Edge Impact of Digital Twins

We talk about Digital Twins and the Edge with Simon Crosby from Swim.AI. They are literally building digital twins in edge locations so he has a lot to share. We work to expand and understand how Simon’s experience translates into general cases and what we’re seeing in the edge. The systems that we’re trying to…More

Topics for a Security Training Course

DevOps Lunch and Learn was about security practices. Specifically, we built an outline of topics in security that we think are necessary for developers and operators to build secure applications. We basically built a week long course curriculum! As we go through what this course curriculum we walk through who needs to know this information…More

Nextgen Servers? IPU & SmartNICs

IPUs, intelligent processing units, are also known as smart NICs, side cars, or supervisory computers. A well known example is Amazon’s Nitro. We discuss the impacts of these supervisory processors, and how they can change the industry. This is clearly the trend of the future. Building supervisory systems as additional processing capability into our core…More

Software Right to Repair? Is that OSS?

The “right to repair” is a really thorny and political issue! We talked a lot about John Deere, Apple and Tesla not letting people fix the products they’ve bought from those companies.We have a lot of questions! Why they do that? What the challenges are with RTR? How we could avoid them? What pressures keep…More

Will Cloud Economics disrupt Hyperscalers?

How can cloud economics of hyperscalar clouds be used to ended or limit their control? We discussed the state of the cloud ecosystem with a focus on where its going to go. After a full, rich, and dynamic conversation, we came back to security security, software (as opposed to SaaS), owning your own infrastructure, and…More

Can we unit test CI/CD Pipelines?

To understand CI/CD of infrastructure, you have to actually understand how the systems work together. In this podcast, we talked about low code, no code and how you would do integration testing for that. We also explore the idea of unit tests and code coverage for CI/CD presents challenges. Transcript: otter.ai/u/oPGkPe8w-hG2LKXkQJhHAeJebe0Photo by Karolina Grabowska from Pexels…More

Zero Trust Service Mesh

How do we secure service meshes for zero trust? Especially since we don’t know how they’re going to be used or integrated? We went very deep into what it takes to secure service mesh. That included what type of application frameworks are going to be required to provide multi-service infrastructures that are secure and trusted…More

DevOps | Automation | Infrastructure Pipelines

Can you composing infrastructure tasks: provisioning, configuration, security and monitoring, all together? Basically a Linux Pipe for automation? Maybe! We talked about how hard it is to build robust, resilient infrastructure. The theme was supposed to be what could go wrong and finding the weak links in our infrastructure automation. Fundamentally we think that it’s…More

Let’s automate GitOps and IaC! [1×1 w Tim Davis from Env0]

How can GitOps and Infrastructure as Code scale your team’s ability to write automation? We answer how to take your DevOps to the next level. We really dig into what the automation challenges are and how you can do better as you build an integrated infrastructure system. And of course, we did talk about Env0…More

Vendor Gossip about Fastly, Terraform, Anisble and others.

We talk about the impacts of Terraform going 1.0, Ansible, and the Fastly outage. We mix all those things together with a little bit of vendor gossip. How might Terraform being “stable” change things? And is that going to help the industry hurt the industry? And what changes might be in stock? Transcript: otter.ai/u/mL1fLJUiXO7qOhfcdC1f6E2LGEsPhoto by Ba…More

How Can I Learn DevOps

Learning DevOps is a challenge! We discuss using the DevOps Roadmap to coach people to get into the field of DevOps and infrastructure automation. DevOps is hard and challenging because the thing we kept coming back to there being so much to learn and understand. It can be really intimidating to get started! We spent…More

Edge Service Mesh Or Mess?

Our Service Mesh discussion leaned heavily into the needs around edge infrastructure because there are so many missing parts for the edge deployment systems, When we started talking about service meshes, we really realize is that the actual control plane, communications grid and security for edge are not defined enough for us to layer on…More

Test and Config of CD Pipelines

Taking Configuration management for deployment pipelines and make it productive and effective. And we really got into a lot of the challenges about scaling, rolling deployments, split tests, schema, migrations, rollbacks, and multi-site infrastructure. We dug in on the challenges that are related to making this actually work in a scale production environment. Ultimately, we…More

Hybrid Security [1×1 w Emil Sayegh of Ntirety]

1×1 with Emil of Ntirety, which is an MSP that specializes in hybrid security. They’re working with both huge and small customers by helping them build a coherent IT strategy. with a focus on holistic security and hybrid cloud. We had a fantastic discussion about those topics and more. And if you’re into security, you…More

Defending Your Data Moat

We keep coming back to “how do we defend our data advantage” but we don’t know how, or why we should share data with people. It’s very clear that we should be sharing data and that there’s economic benefit to us to do it. But we haven’t figured out how to do it. And that’s…More

Preventing Ransomware Attacks

We discuss security related to the colonial pipeline, and what we could do to improve against ransomware attacks. What are the different things that are impacts in that type of attack. And it’s really a good exercise in thinking about security, especially security of secondary systems, and hard networks. very robust, resilient conversation. transcript: otter.ai/u/rKh9TTyqrBeHxzsdClBtQi2admAimage: Photo…More

Andi Mann 1×1 Podcast

1×1 discussion with Andi Mann, He’s a real leader when it comes to infrastructure, automation, DevOps, analysis, just putting everything together. And we had an amazing conversation, ranging the whole gamut of how to make technology better. complexity, hybrid, open source. You name it, we covered it! Transcription: otter.ai/u/F7jazWNoRp3LJ8FNkWlJ8zPa4yUMore

Hot Topics in DevOps Discussion

General topics of interest: learning DevOps, and tech roadmaps, and how to build up to skills, infrastructure pipelines, release management, and more. These are topics that we want to dig into over the next several months. Transcript: otter.ai/u/WZPhi8R_Uev2Ltc69RC6kl8eepIImage: www.pexels.com/photo/photo-of-gr…building-2600116/More

Security Supply Chains

How will we secure infrastructure in the future? Why is so hard to get security taken seriously? Because it’s a supply chain problem. a vendor problem, AND a customer problem. We have to solve this because it threatens to undermine very fabrics of what we’ve been building together. Transcript: otter.ai/u/O3DTK6VPhYdSOc7HxbrzFwYElxkImage: www.pexels.com/photo/child-sippi…graffiti-2103127/More

Image and Immutable Deploy Processes

We go DEEPLY into the practice of image base (aka immutable) deployment. Image based deployment is when we building infrastructure by cloning systems. That means actually writing the system image directly to disk. We typically start a VM, where it’s already on the disk, and then clone that to an existing system. Transcription: otter.ai/u/rOrf9VJ8lSOXkjLcRpfAd8R26SIImage: Photo by…More

What’s Ideal tech? How can we get there?!

We started with the idea of what should our infrastructure be if we were going to get the perfect thing, the ideal thing and then work backwards? We focused in on home and industrial uses. That led us into the way we think about building technology. Transciption: otter.ai/u/KcUBUZvpOqXYlY-onF48OFZ7gSAPhoto by Matheus Natan from Pexels [ID 3689875]More

Zero Trust and Homomorphic Data Security

All about security, zero trust data, and shared homomorphic security. If those terms mean something to you, you will find our conversation fascinating. And if they don’t, you better be listening, because these are really important concepts that come together for how we will secure data in the future. And we really believe that these…More

Tea Time? We spill vendor gossip & strategy

We went deep into vendors, specifically Red Hat. So if you like vendor gossip and speculation then you’ll love this. We talked about Red Hat, IBM, Oracle, a couple other vendors of note and speculated on their strategy. Transcript otter.ai/u/L_uP42EK4AVjVmDxERD3f0V-2YwPhoto by Anna Shvets from Pexels [ID 4587991]More

How Much Complexity Is Too Much?

Is there a Jevons Paradox of Complexity? We started by asking key questions like: How much complexity is too much? How do we measure it? What’s the business risk? DId we make complexity cheaper or just hide it away? Is there a price to be paid for building incredibly complex systems? We answered these and…More

Service Mesh – How and Why

How Service Mesh works and why they’re important. Towards the end, we start talking about the rationale and whys and hows of the architecture. Transcript: otter.ai/u/OPEKGyWT6iDjMLVQlHZeKVWkh_IPhoto by Karolina Grabowska from Pexels [ID 5422821]More

More Flow Architectures with James Urquhart

James Urquhart joins the DevOps lunch for an impromptu discussion about the importance of Flow Architecture. You will learn a lot about how flow architecture work and why they are important to infrastructure and application design. This is a great follow-up to our 1×1 interview with him on an earlier episode.More

Designing Businesses For 2030

How businesses need to be thinking in order to respond to the cloud?Tim Crawford led this round table conversation about the challenges facing us. We also talk about managing complexity and what it takes to build a successful business in today’s technology environment Transcript: otter.ai/u/4iOmpqQsAhqW7RPwgz0sthpFC2sPhoto: Photo by Frans Van Heerden from Pexels [ID 624015]More

Why No One Cares About Security [Automation]

We were frustrated that we couldn’t pull security together as cleanly as we want. So we extended the conversation beyond simple security into integrations and what you need to get done in order to automate security, Transcript: otter.ai/u/08NW-tmEEH4E84UunOmfrLuvp4gMore

Our Service Mesh discussion leaned heavily into the needs around edge infrastructure because there are so many missing parts for the edge deployment systems,

When we started talking about service meshes, we really realize is that the actual control plane, communications grid and security for edge are not defined enough for us to layer on what has become sort of a standard in cloud deployments of service mesh into that discussion.

How we got there, how we discussed it, and the components of why that’s important, is much more interesting than the conclusion itself.

Transcript: otter.ai/u/RuXigltfMAuE4z-NZETAvNQNbRY
Image: Photo by Zachary DeBottis from Pexels [ID 1888883]





Eric Fouarge on Open Source Tools in Cloud, Business Needs and Microservices, and Reality of Serverless

2019-01-28
Stephen Spector
Cloud Computing, DevOps, Kubernetes, Microservices, Open Source
0 Comments

Joining us this week is Eric Fouarge, CTO at Root Level Technology. About Root Level Root Level Technology is a cloud strategy partner. We are the seamless extension of your development and programming teams. We provide a concierge-style support experience for every client, no matter the size. We are an agile shop at the core,…

Read More








Lee Atchison on Edge impact on DevOps, Edge vs Cloud Scale, and other Challenges

2019-01-22
Stephen Spector
Cloud Computing, DevOps, Edge Computing
0 Comments

Joining us this week is Lee Atchison, Sr. Director of Strategic Architecture, New Relic. Author of Architecting for Scale on O’Reilly (link is not a tracked URL) and recent speaker at AWS ReInvent ’19 – Cloud Computing in an Edge World. About New Relic…

Read More








Mark Collier talks in-depth on the OpenStack Community and the Major Open Source Issues of the Day

2019-01-14
Stephen Spector
Cloud Computing, Kubernetes, Open Source, OpenStack
0 Comments

Joining us this week is Mark Collier, Chief Operating Officer, OpenStack Foundation.   About OpenStack Foundation The OpenStack Foundation (OSF) supports the development and adoption of open infrastructure globally, across a community of 100,000 individuals in 187 countries, by hosting open source projects and communities of practice, including datacenter cloud, edge computing, NFV, CI/CD and…

Read More








Sabjeet Johal on Hybrid Clouds, AWS Outpost and More

2019-01-05
Stephen Spector
Cloud Computing, Data Center, Hybrid, Open Source
0 Comments

Joining us this week is Sarbjeet Johal, Principal Advisor, The Batchery. About The BatcheryFounded in 2015, The Batchery is an Berkeley-based global incubator for seed stage entrepreneurs ready to take their startup to the next level. We are a community of veteran investors and advisers ready to provide you with ideas, insights, and networks. Our…

Read More








2018 Podcast Wrap-Up

2018-12-22
Stephen Spector
Cloud Computing, DevOps, Edge Computing, Kubernetes
0 Comments

Rob Hirschfeld and Stephen Spector, your L8istSh9y Podcast Team, wrap up 2018 with some overall thoughts of the past year of Podcasts and a quick preview of 2019 content and planning.

Read More








Calsoft on the value of NFV for Telecom and Edge Computing

2018-12-15
Stephen Spector
Cloud Computing, Data Center, Edge Computing
0 Comments

About Calsoft Founded in 1998, Calsoft provides end-to-end product development, quality assurance, product sustenance, and solution engineering services to assist customers in achieving their product development and business goals. Our deep domain knowledge across various verticals helps customers create exceptional products and get them to market on time and within budget. Calsoft’s deep technical expertise…

Read More








Daniel Bartholomew on developer applications running at the edge today

2018-12-08
Stephen Spector
Edge Computing, Kubernetes
0 Comments

Joining us this week is Daniel Bartholomew, CTO and Founder of Section. About Section Section offers a developer-centric, multi-purpose Edge PaaS solution that empowers web application engineers to run any workload, anywhere. Built to give developers the flexibility and control that they need, Section’s edge platform is infrastructure agnostic (cloud, on-premise, self-hosted), edge workload agnostic…

Read More








Chris Steffen talks Cloud and Edge Security (and his beard)

2018-12-02
Stephen Spector
Cloud Computing, Edge Computing, Security
0 Comments

Joining us this week is Chris Steffen, Cloud and Edge Security Guru. Follow him at @CloudSecChris and on his blog, The Security Beard. Highlights: Latest Update on Cloud Security Core Challenges to Edge Security Shared Data at the Edge Issues

Read More








Michael DeHaan on the new Vespene project and Open Source Licensing

2018-11-26
Stephen Spector
Docker, Microservices, Open Source
0 Comments

Joining us this week is Michael DeHaan from Vespene.io, a modern, streamlined build and self-service automation platform. Highlights: Vespene Introduction ~ only 3 month old project Open Source Licensing ~ is there a crisis? How best to run an Open Source Project

Read More








Janakiram MSV on Device Edge and Management with Kubernetes

2018-11-19
Stephen Spector
Cloud Computing, Edge Computing, Kubernetes
0 Comments

Joining us this week is Janakiram MSV, founder and principal analyst at Janakiram & Associates. Highlights: • Three Flavors of Edge with Focus on Device Edge • Who Builds Edge? Cloud Providers, Telcos, … • Is Kubernetes the Management Foundation for Edge

Read More