Techstrong TV Interviews
Techstrong TV interviews with technology leaders, founders, practitioners, analysts and executives across AI, cybersecurity, DevOps, cloud and digital transformation.
-
Monitoring as Code - Hannes Lenke, Checkly
Elevate DevOps practices through the adoption of Monitoring as Code (MaC), a movement just added to Gartner's Hype Cycle for Monitoring and Observability. Uniting end-to-end testing and monitoring in one MaC workflow transforms the development process with a code-based monitoring process, enablin...
-
IT Costs in the Cloud Computing Era - Ben DeBow, Fortified
Fortified CEO Ben DeBow explains why IT costs have spun out of control in the cloud computing era and what to do about it after publishing his book End of Abundance in Tech: How IT Leaders Can Find Efficiencies to Drive Business Value.
-
Application Performance Monitoring 360 - Jemiah Sius, New Relic
New Relic launched New Relic APM 360, the next evolution of application performance monitoring that goes beyond incident troubleshooting insights for select experts to daily performance, security and development insights for all engineers. APM 360 correlates all essential telemetry data across th...
-
Application Security Progress Check - George Prichici, OPSWAT
George Prichici, vice president of product for OPSWAT, dives into a survey that shows where progress on application security is and is not being made at a time when cybercriminals are increasingly focused on exploiting vulnerabilities.
-
Upskilling with AI - Jonathan Siddharth, Turing
Many developers fear artificial intelligence (AI) poses a threat to their job security. In this interview, Jonathan Siddharth, CEO and co-founder of the Palo Alto-based tech unicorn Turing, shares his insights on how companies and developers alike can leverage AI to upskill and future-proof thems...
-
Why Fork RHEL - Vojtech Pavlik, SUSE
Vojtech Pavlik, SUSE GM Business-Critical Linux, discusses SUSE's decision to fork publicly available Red Hat Enterprise Linux (RHEL). SUSE will develop and maintain a RHEL-compatible distribution available to all without restriction and plans to contribute this project to an open source foundati...
-
Migrate Cloud Block Storage - Wayne Lam, Cirrus Data
Users can now migrate block-level data from anywhere into any of Azure’s block storage offerings using the Cirrus Migrate Cloud Block storage. It delivers high performance and provides granular access to raw data, making it highly suitable for Tier-1 business critical applications. The versatilit...
-
AI and Customer-Centric Leadership - Min Wang, Splunk
Min Wang recently joined Splunk as CTO. Following her keynote talk at Splunk .conf23, Min shares how her research background (Google, IBM and HP), passion for improving customer outcomes, AI and data experiences shape her contributions to Splunk over the coming months and years.
-
Cost of Breaches - John Dwyer, IBM
John Dwyer, IBM Security X-Force, assesses the cost of breaches for organizations in today's industry.
-
Cybersecurity Priorities and Embracing Zero-Trust - Jason Loomis, Freshworks
Jason Loomis is the chief information security officer at Freshworks, the company creating business software that anyone can use. In this interview, Jason and Alan discuss the importance of prioritizing people in cybersecurity, the shift to a zero-trust approach and the challenges faced by CISOs ...
-
Cyber Resilience Act - Brian Fox, Sonatype
Representatives of member states of the European Union (EU) reached a common agreement yesterday regarding the proposed Cyber Resilience Act (CRA). While the intent of the CRA is to improve cybersecurity and cyber resilience, the seemingly purposeful omission of exemptions for open source would p...
-
AI-Powered DevSecOps for the Enterprise - Derek Holt, Digital.ai
What is it? AI-powered DevSecOps for the enterprise is not just another innovation; it is the catalyst for scaling and accelerating innovation across the enterprise. It is the fusion of three AI capabilities that until now have been implemented ad-hoc in the development and delivery lifecycle: AI...
-
Evolving VDI - Amitabh Sinha, Workspot
Amitabh Sinha, CEO of Workspot, joins Mike Rothman to discuss the challenges of scaling virtual desktops infrastructure to hundreds of thousands of users, and how the cloud provides a means to provide the scale and reliability needed for enterprises. They also discuss some of the security issues ...
-
Traffic Safety Hackathon - Mark Hanson, Sony Semiconductor
Sony Semiconductor is teaming up with San Jose Mayor Matt Mahan's office, the tinyML Foundation and San Jose's Department of Transportation to launch a global traffic safety hackathon. The hope for the collaboration is to utilize community ideas on how to use "tiny machine learning's AI software"...
-
Mitigating Application Security Gaps - Jens Eckels, JFrog
According to IDC's DevSecOps Adoption, Techniques, and Tools Survey 2023, the top two application security gaps at their organizations were the growing use of open source software among development teams (30.9%) and a vulnerable software supply chain (28.9%). JFrog Curation offers a seamless way ...
-
Unveiling the Future of Cyber - Zohar Alon, Cybereason
Zohar Alon is one of the most accomplished leaders in cybersecurity. After a career at Check Point, he started his own company, Dome 9, which was acquired by Check Point. Alon then helped several new startups as an investor/advisor before taking on the next great challenge in his career as presid...
-
Continuous Automated Root Cause Analysis Platform - Manish Gupta, webb.ai
Webb.ai has created the industry’s first Continuous Automated Root Cause Analysis Platform. The modern cloud platforms are very dynamic with changes happening across code, infrastructure, and configuration to deliver the desired features to customers ever-faster. This change of pace is a key comp...
-
Enhancing AppSec: The Importance of API Security - Ory Segal, Palo Alto Networks
Ory Segal, CTO for Prisma Cloud at Palo Alto Networks, explains why API security needs to be addressed as part of a holistic approach to application security.
-
Developer-Led Landscape: Secure Software Supply Chain (Part 1) - Tyler Jewell, Dell Technologies Capital
Dell Technologies Capital managing director Tyler Jewell released his latest in-depth report on the developer market, “Developer-Led Landscape: Secure Software Supply Chain.” The report includes observations and industry insights from a curated database of 1,500 companies whose products are sold ...
-
Automating IT Operations with Generative AI - Muddu Sudhakar, Aisera
Aisera CEO Dr. Muddu Sudhakar explains how generative artificial intelligence (AI) will be applied alongside existing machine learning algorithms to automate IT operations.
-
Open Source Sunbeam OpenStack - Tytus Kurek, Canonical
During OpenInfra Summit 2023, Canonical announced the extension of its commercial OpenStack offering to small-scale cloud environments with a new project, Sunbeam. The project is 100% open source and is available free of charge. Tytus Kurek, Canonical's product manager, discusses open source Sunb...
-
Mastering Value Stream Management - Mik Kersten, Planview
Planview CTO Dr. Mik Kersten explains why every company that aspires to be a software company needs to master value stream management (VSM).
-
CNCF's Kubeflow Incubation Journey - Josh Bottum, Kubeflow
Kubeflow is an open source, community-driven project for deploying and managing a Machine Learning (ML) stack on Kubernetes. The CNCF Technical Oversight Committee (TOC) has voted to accept Kubeflow as a CNCF incubating project. This discussion will review the benefits of this important transition.
-
New Relic Interactive Application Security Testing - Esteban Gutierrez, New Relic
New Relic, the all-in-one observability platform for every engineer, announced the public preview of New Relic Interactive Application Security Testing (IAST). New Relic IAST goes beyond current approaches by providing visibility and context to security findings, advanced detection accuracy with ...