michaelepley (@michaelepley) 's Twitter Profile
michaelepley

@michaelepley

Chief Architect & Security Strategist at @RedHatGov. Has fun with the cloud! as long as its built with kubernetes & lots of RPi and legos.

ID: 14404710

linkhttps://www.linkedin.com/in/epleymichael/ calendar_today16-04-2008 04:54:14

1,1K Tweet

223 Takipçi

1,1K Takip Edilen

michaelepley (@michaelepley) 's Twitter Profile Photo

Hooray! I've been waiting for a process like this for the 10+ yrs #Fedora has been my daily driver. Looking forward to another decade ;) fedoramagazine.org/something-bugg…

michaelepley (@michaelepley) 's Twitter Profile Photo

Long been a proponent of this idea! API and implementation should be separated & high coupling in kubernetes always bugged me. It's extremely important now as kube matures tackling more & more uses cases: edge or HPC. Implementation will matter though -- scrutinize for your case.

Red Hat Government (@redhatgov) 's Twitter Profile Photo

.DevNation Federal is back! #DNF2021 is a three-day, virtual experience that will bring the public sector the most exciting developer and technology updates about cloud native applications, and highlight organizations driving innovation. Registration is open: red.ht/3fncRJe

.<a href="/DevNationFed/">DevNation Federal</a> is back! #DNF2021 is a three-day, virtual experience that will bring the public sector the most exciting developer and technology updates about cloud native applications, and highlight organizations driving innovation. Registration is open: red.ht/3fncRJe
michaelepley (@michaelepley) 's Twitter Profile Photo

Always love these pictures with the menacing looking missile-like things hanging from the jets....which are usually innocuous fuel/drop tanks.

Red Hat Government (@redhatgov) 's Twitter Profile Photo

Calling all #developers - complement your development and deployment efforts with human considerations using the 5Es to design compelling #MicroServices experiences during Jim Tyrrell's breakout session at Red Hat Summit tomorrow! Register here: red.ht/3s0UvSW

Calling all #developers - complement your development and deployment efforts with human considerations using the 5Es to design compelling #MicroServices experiences during <a href="/DesignaticJim/">Jim Tyrrell</a>'s breakout session at <a href="/RedHatSummit/">Red Hat Summit</a> tomorrow! Register here: red.ht/3s0UvSW
David Egts (@davidegts) 's Twitter Profile Photo

"Using encryption to create mutual hostage relationships might offer a useful solution to the dilemma of how to proportionally respond to malicious cyber campaigns without violating international norms" politico.com/news/magazine/…

michaelepley (@michaelepley) 's Twitter Profile Photo

An easy read on the history of the ACA challenges, with great context on how we got into this crazy situation. healthaffairs.org/do/10.1377/hbl…

michaelepley (@michaelepley) 's Twitter Profile Photo

Google meet needs a feature where it will do a person-network analysis on meeting participants, find people that haven't met before, and present a bio/primer to each person on those participants.

michaelepley (@michaelepley) 's Twitter Profile Photo

Thanks to availability heuristic, everyone now assumes selection bias. What we really need is more easy to grok diagrams (with interesting backstories) of *other* cognitive biases.

Thanks to availability heuristic, everyone now assumes selection bias. What we really need is more easy to grok diagrams (with interesting backstories) of *other* cognitive biases.
Mohammed Naser (@_mnaser) 's Twitter Profile Photo

honestly Ceph is just dark magic. Over the past few days, we’ve moved hundreds of terabytes of a customer data across systems from SSDs to NVMe.. and not a single blip, no one notices a thing, VMs just hum along. Open source is awesome.

Dan Lorenc (@lorenc_dan) 's Twitter Profile Photo

Patch your software. The root cause here was running Kubernetes v1.8.4 (released Nov. 2017!!!) and runc 1.0.0-rc2 (released Oct. 2016!!!). Both of these were ***years*** past their security fix EOL.

michaelepley (@michaelepley) 's Twitter Profile Photo

Is "zero trust" over-used and ill defined? Yes. Will it help us get to a security centric architectures we've wanted for decades? Maybe! I'm going to tack to the zeitgeist if it helps forward that goal (while using it appropriately & defining/scoping it). csoonline.com/article/363811…

michaelepley (@michaelepley) 's Twitter Profile Photo

Makes a compelling case for focusing on fleets and buses in particular. This focuses on the infrastructure side; I imagine there are huge benefits all around for consumers, city planners, and transportation managers too. cleantechnica.com/2021/11/03/tra…

michaelepley (@michaelepley) 's Twitter Profile Photo

Now sure why stevia seems to be everywhere these days, but this needs to stop. It tastes awful to some of us. These are plenty of alternatives to offer.

michaelepley (@michaelepley) 's Twitter Profile Photo

Apropos of nothing...a reminder that when implementing a zero trust architecture, make sure your control plane is also zero trust.