Archived Events
As the U.S. Air Force looks to streamline and accelerate operations, modernization has become a key initiative for mission critical success. An app-centric approach to application delivery helps to enable intelligent scaling at the point of a bottleneck, eliminating the need to scale infrastructure across the entire ...
Security attacks can be frightening, and manually responding to them is inefficient and ineffective. Organizations that automate extensively are better able to prevent security incidents and business disruptionsHear Red Hat experts explore innovative ways to automate while leveraging ...
Evolving technical demands and resource constraints are spurring public sector teams to embrace innovative solutions that support IT modernization, at scale.Red Hat OpenShift, an enterprise-ready Kubernetes container platform built for an open hybrid cloud strategy, provides your ...
Zero Trust is built around the idea of moving away from a single network perimeter to a layered defense with carefully controlled gateways. This model assumes everything is running independently and is always exposed to potential ...
On May 5th, attendees of this webinar discovered how Red Hat OpenShift on Nutanix and HPE simplifies application modernization efforts. This certified solution of Red Hat Openshift is the industry-leading enterprise Kubernetes platform built for hybrid cloud, powered by the Nutanix Cloud Platform- the market-leading ...
Red Hat's Ansible Automation platform is the leading enterprise-ready automation platform helping network operators save time and reduce risk. Traditional approaches to network configuration can slow applications and make them prone to errors. Simple, powerful, agentless and proven, Ansible Automation Platform brings network ...
Traditional approaches to information security are reactive and antiquated. In an era where technology is on-demand, we can no longer afford to be reactive, we must revolutionize all security practices while increasing our capabilities.Following on the heels of executive directives and combined ...
Federal agencies are now required to adopt a Zero Trust architecture and leaders must develop plans to implement the IT tools necessary to meet regulations. Implementing a Zero Trust architecture should strengthen other existing security practices and tools, it doesn’t require a massive acquisition of new ...
Artificial intelligence (AI) and machine learning (ML) systems provide great value in data processing and are playing a central role in decision-making in state and local government agencies.This panel is part of a larger series, the whole of which can be found on our resource hub -
Security remains a major concern for government agencies as they adopt cloud technologies and develop applications. The Department of Homeland Security (DHS) needs a simple approach to solution delivery that incorporates security into the DevOps lifecycle.During this workshop, Brandon ...