SE Radio 634: Jim Bugwadia on Kubernetes Policy as Code

SE Radio 634: Jim Bugwadia on Kubernetes Poli...

Up next

SE Radio 720: Martin Dilger on Understanding Eventsourcing

Martin Dilger, founder and CEO of Nebuilt GmbH, speaks with host Giovanni Asproni about event sourcing -- a software architecture pattern in which, rather than storing just the current state of your data, you store a sequence of events that represents every change that has ever h ...  Show more

SE Radio 719: Birol Yildiz on Building an Agentic AI SRE

Birol Yildiz, CEO and co-founder of iLert, joins host Kanchan Shringi to explore how iLert built an AI SRE — an autonomous agent for handling production incidents — and what the experience revealed about building AI agents in the real world. Birol explains why incident response i ...  Show more

Recommended Episodes

OpenShift and Kubernetes, with Clayton Coleman
Kubernetes Podcast from Google

Five years ago, Clayton Coleman took a bet on a new open source project that Google was about to announce. He became the first external contributor to Kubernetes, and the architect of Red Hat's reinvention of OpenShift from Paa ...

  Show more

Kubernetes Community Redux, with Paris Pittman
Kubernetes Podcast from Google

To celebrate our 100th episode we welcome back our first ever guest, Paris Pittman, open source program manager at Google Cloud and member of the Kubernetes steering committee - among many other roles. Along with hosts Adam and Cr ...

  Show more

#732: How to gain Multi-Cluster Visibility across Kubernetes Clusters with the EKS Dashboard
AWS Podcast

In this episode, we'll explore how the new Amazon EKS Dashboard solves key challenges in managing Kubernetes at scale across multiple AWS accounts and regions. We'll discuss how it provides centralized visibility into cluster health, versions, and costs - enabling teams to improv ...  Show more

Tech Bytes: Embedding Network Security Into Your Cloud Network (Sponsored)
Tech Bytes

Today on the Tech Bytes podcast we’re talk network security at scale. That is, in a cloud environment, how can you build security capabilities and features into the network while also being able to keep up with security policies, operations, compliance, and more. Our sponsor is A ...  Show more