cloud2030 cover image

cloud2030

Latest episodes

undefined
May 22, 2022 • 46min

Why Jenkins in DevOps?

What kind of orchestration systems does the industry use for infrastructure, automation and controlling day to day operations? In today’s episode, we talk about infrastructure pipelines at the tooling level, and specifically the use of Jenkins and other CI pipelining tools for ops and orchestration. We dig into why and how you would do this, and what pieces are missing from the system. That conversation leads us into larger day to day challenges. If you are doing infrastructure ops and DevOps automation, you will get a lot out of this session. Transcript: https://otter.ai/u/dbTdHdYTIt5bU1G8SFghKSijhU0 Image: https://www.pexels.com/photo/barista-with-red-beard-with-pigtail-and-tattoo-6205639/
undefined
May 22, 2022 • 38min

PCIv4, NFT, Metaverse, and Crypto! Oh My!

What is the intersection between augmented and virtual reality? In today’s episode, we discuss changes in payment systems, Metaverse, NFTs and micro payments. All of which have to do with PCI and how we handle process payments. We had a fascinating conversation about how all of these technologies intersect, and how one can drive another. Transcript: https://otter.ai/u/Jbj52Opa37Vwmci1myBC7LsSXtY Image: https://www.pexels.com/photo/selective-focus-photography-of-bears-reading-book-figurine-362685/
undefined
May 13, 2022 • 55min

Content Moderation - Safe Social Media?

What type of speech can we control, allow and amplify? Today's episode was about content moderation in social media. The issues here are nuanced, but absolutely critical for our functioning society to get right. We discuss various interlocking issues, including what type of feedback loops we are creating and what the historical precedents for building safe systems are. Transcript: https://otter.ai/u/197TTpOUZd8p2Y6RzDGltLq13i4 Image: https://www.pexels.com/photo/man-wearing-brown-suit-jacket-mocking-on-white-telephone-1587014/
undefined
May 13, 2022 • 50min

Governance As Code (pt 1 - identity)

Our discussion about governance as code today is one of a series that we're going to be starting. In today’s episode, we started out discussing what is Governance as Code. Then we dug into identity and how important it is to know who is doing what in a governance process. Special Guest: Kapil Thangavelu https://twitter.com/kapilvt Along the way, we touch on topics such as Infrastructure as Code, trust, logging, and audit - all essential components for governance. If this is your first time hearing about Governance as Code, you will learn a lot here. Even if you already know the topic, the back half of today’s podcast poses some fantastic conversations and questions. Transcript: https://otter.ai/u/X5xXz3Gw0ot23jFsccZr_k9w-D4 Image: https://www.pexels.com/photo/gray-airplane-control-panel-3402846/
undefined
May 6, 2022 • 22min

Green Data Centers

What’s going on with green data centers, why does it matter, and how do we think about it in a wider context? In this short conversation, we discuss green data centers and creating carbon neutral infrastructure. This isn't just about servers using electrons - the actual conversation about making our infrastructure carbon neutral includes thinking about all of the components that go into our infrastructure. We also have an upcoming series of conversations on green data centers and carbon neutral infrastructure. Transcript: https://otter.ai/u/IYsPlr4r570MmOOW3WWLjenDlWk Image: https://www.pexels.com/photo/clear-light-bulb-planter-on-gray-rock-1108572/
undefined
May 6, 2022 • 45min

WTF My MFA Is MIA

How do authorization systems need to be built and made resilient for distributed infrastructure? We discuss how having a single centralized authorization system is incredibly fragile compared to distributed edge infrastructure. Everything we build has some element of distributed component tree and resiliency in it, and we need to make sure that the authorization systems are included in that analysis. We explored how you can make MFA more resilient and how you can improve the security of authentication by building additional layers of trust based on behaviors. Transcript: https://otter.ai/u/KTg3WSqSKuswLIypoBwD4HyMzcA Image: https://www.pexels.com/photo/hand-holding-a-key-with-a-usb-flash-drive-5474298/
undefined
Apr 29, 2022 • 49min

OSS, Promotions, and Lava Lamps

How can promotion boards be hostile or hurtful to open source technology? We talk about the dynamics of corporate support in open source technology, and if being rewarded for internal work at companies translates into challenges for open source technology. This discussion starts to peel apart what makes open source technology sustainable, and what it works for. We bring up an analogy of a lava lamp where things heat up and then cool down as part of a natural cycle, which can be a normal cycle for all software, and that led us back to how promotion boards work. We covered a lot of ground through the dynamics of corporate software governance and open source and interweaving those together. Transcript: https://otter.ai/u/nZS6rtcam88JUuqMctOiEyWq5G4 Image: https://www.pexels.com/photo/food-cold-drink-glass-5677999/
undefined
Apr 29, 2022 • 36min

APIs With Composable State

What makes API's complex? In this episode, we talk about how we compose APIs into higher level systems, and how we think about the design elements that go into building durable, reusable API's. This is a classic topic for us, and in this discussion we looked beyond the API itself and started talking about the state of the system and how you manage that state. Transcript: https://otter.ai/u/Oae5e_ay0d_l48TmWk3PO3lpIDU Image: https://www.pexels.com/photo/a-nacho-chips-in-a-dipping-sauce-5848731/
undefined
Apr 22, 2022 • 57min

Musk, Twitter and Web3 Social Media

Will Elon Musk take over Twitter? What are the tech and societal motivations for creating distributed social media? In today’s episode, we discuss the future of social media and if we can create distributed social media and distributed user interactions. We also question how these systems could be monetized and controlled, and who would benefit from those changes. This is a fascinating discussion about how we will build human interaction in the future. Transcript: https://otter.ai/u/J2B4oRO5WTohJI1KqqNobfyZsdE Images: https://www.pexels.com/photo/a-group-of-boys-touching-a-spaceship-made-of-aluminum-foil-7105799/
undefined
Apr 22, 2022 • 45min

Can Kubernetes Prevent Vendor Lock In?

How does Kubernetes create lock in versus how could Kubernetes be used to prevent lock in? Lock in is not always a bad thing. When you avoid committing to a single vendor, you may have to work to the lowest common denominator or deal with heterogeneity in your infrastructure. Heterogeneity is pretty normal, and you might have to do this work regardless, but when you commit to a vendor you get to focus on using the vendor’s strengths. In this episode, you’ll pick up some great tips on how to reduce your lock in when using Kubernetes. Transcript: https://otter.ai/u/vIo1p15bb6VmcrWjwgOLbM25nq4 Image: https://www.pexels.com/photo/silhouette-photo-of-person-holding-door-knob-792032/

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app