As container use gains popularity, container security is more important than ever. This talk is split into 4 parts detailing security measures in containers, signing, authentication and authorization with the daemon, and mandatory access control.
Karen Noel — Senior Manager, Software Engineering, Red Hat
In this 2-hour session, Jeremy Eder, D. John Shakshober, and Larry Woodman explore how to configure and tune Red Hat Enterprise Linux for optimal performance while running a variety of common applications.
You’ll learn how to:
Ken Goetz — Vice President, Red Hat Global Learning Services, Red Hat
Pete Hnath — Director Of Curriculum, Red Hat
Randolph Russell — Director, Red Hat Certification, Red Hat