
Simplifying Cloud Migration Strategy at Tidal with David Colebatch
Screaming in the Cloud
00:00
Introduction
With tail scale, I can use trusted identity providers like Google or Octa to authenticate users. Tail scale automatically generates and rotate keys to authenticate devices. Your data is protected by the simple yet powerful social dynamics of small groups that you trust. It's free forever for personal use. Try now.
Transcript
Play full episode


