Most organizations don't discover what they have until crisis strikes. Akhil Bhaskar makes the case for software catalogs, scaffolding templates, and the "undifferentiated heavy lifting" that enables teams to move fast without breaking things. When a major security vulnerability hits, how quickly can you answer "How exposed are we?" For most organizations, it's a scramble. For Akhil Bhaskar's team, it took two hours to assess and four hours to fix—even though the Log4j vulnerability affected...
All content for api connections is the property of Jon Scheele and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Most organizations don't discover what they have until crisis strikes. Akhil Bhaskar makes the case for software catalogs, scaffolding templates, and the "undifferentiated heavy lifting" that enables teams to move fast without breaking things. When a major security vulnerability hits, how quickly can you answer "How exposed are we?" For most organizations, it's a scramble. For Akhil Bhaskar's team, it took two hours to assess and four hours to fix—even though the Log4j vulnerability affected...
SummaryIn this conversation, Jon Scheele and Nilesh Gule discuss the critical role of automation in DevOps, particularly through the use of Kubernetes. They explore the benefits and challenges of Kubernetes, emphasizing the complexities involved in debugging and managing Kubernetes clusters. Nilesh introduces K8sGPT, a generative AI tool designed to assist in diagnosing and resolving issues within Kubernetes environments. The discussion also touches on the future of Kubernetes management, hig...
api connections
Most organizations don't discover what they have until crisis strikes. Akhil Bhaskar makes the case for software catalogs, scaffolding templates, and the "undifferentiated heavy lifting" that enables teams to move fast without breaking things. When a major security vulnerability hits, how quickly can you answer "How exposed are we?" For most organizations, it's a scramble. For Akhil Bhaskar's team, it took two hours to assess and four hours to fix—even though the Log4j vulnerability affected...