20 episodes

Putting new technology to use is an exciting prospect. But going from purchase to production isn’t always smooth—even when it’s something everyone is looking forward to. Code Comments covers the bumps, the hiccups, and the setbacks teams face when adjusting to new technology—and the triumphs they pull off once they really get going.

Code Comments Red Hat

    • Technology
    • 5.0 • 10 Ratings

Putting new technology to use is an exciting prospect. But going from purchase to production isn’t always smooth—even when it’s something everyone is looking forward to. Code Comments covers the bumps, the hiccups, and the setbacks teams face when adjusting to new technology—and the triumphs they pull off once they really get going.

    Transforming Your Database

    Transforming Your Database

    Databases are rarely the stars of digital transformation. That’s not necessarily a bad thing. But that doesn’t mean they should be an afterthought either.

    Craig Kerstiens of Crunchy Data covers the state of the database—and how the database tools you choose have implications beyond the databases themselves.

    • 23 min
    Transforming Your Secrets Management

    Transforming Your Secrets Management

    We’ve been taught to stash our secrets. Passwords, credentials, and tokens shouldn’t be shared lest they fall into the wrong hands. When it comes to building and running large-scale systems, that thinking has to change. But maybe only a little bit.

    Rosemary Wang and Steve Almy of HashiCorp share how business as usual for secrets management means putting your business at risk.

    • 19 min
    Transforming Your Identity Management

    Transforming Your Identity Management

    Modern IT systems have a lot of components—components people have to use, and components who need to talk to each other. That’s a lot of traffic and exchanging of sensitive information. How do you sort the legitimate users from the potential intruders?

    Niels Van Bennekom shares how CyberArk helps organizations set up identity management systems that can keep up with expansive, ever-changing IT systems.

    • 20 min
    Season 3: Charting Digital Transformation

    Season 3: Charting Digital Transformation

    A journey of 1,000 upgrades starts with a single commit. It’s not always clear how much change digital transformation entails. But it’s likely more than expected.

    Season 3 of Code Comments travels the well-trodden paths of IT modernization, cloud migration, and the unmentioned necessities to make it all work.

    • 1 min
    You Can't Automate The Fire

    You Can't Automate The Fire

    Is there such a thing as too much enthusiasm for automation? Probably not. But it can be difficult to unify an organization with strong opinions.

    Vincenzo Sposito shares how Discover harnessed its teams’ passions to build a unified automation solution—while preserving debate and experimentation.

    • 21 min
    You Can’t Automate The Difficult Decisions

    You Can’t Automate The Difficult Decisions

    The tensions between security and operations and developer teams are the stuff of legend. DevSecOps is trying to change that, and automation is a big part of making it possible. But automation alone can’t overcome entrenched behavior.

    Joylynn Kirui shares how Microsoft is helping shift security considerations to the left—and alleviating the headaches that process can bring. Because in the long run, everyone is better off with better security.

    • 19 min

Customer Reviews

5.0 out of 5
10 Ratings

10 Ratings

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
Dwarkesh Podcast
Dwarkesh Patel
TED Radio Hour
NPR
The Neuron: AI Explained
The Neuron

You Might Also Like

Compiler
Red Hat
CyberWire Daily
N2K Networks
Click Here
Recorded Future News
Hacking Humans
N2K Networks
Malicious Life
Malicious Life
Grumpy Old Geeks
Jason DeFillippo & Brian Schulmeister with Dave Bittner