As container use gains popularity, container security is more important than ever. This talk is split into 4 parts detailing security measures in containers, signing, authentication and authorization with the daemon, and mandatory access control.
In this 2-hour session, Jeremy Eder, D. John Shakshober, and Larry Woodman explore how to configure and tune Red Hat Enterprise Linux for optimal performance while running a variety of common applications.
You’ll learn how to:
Sanjay Rao — Principal Software Engineer, Red Hat, Inc.
In this session, we’ll give you recommendations for how to tune Red Hat Enterprise Linux to optimize your database’s performance.
Karen Noel — Senior Manager, Software Engineering, Red Hat
Andrew Hecox—Senior Manager, Software Engineering, Red Hat, Inc.
In this session, you’ll learn how analytics in Red Hat Access Insights provide key operational insights to keep your Red Hat Enterprise Linux stable, secure, and compliant with Red Hat best practices and recommendations.