StrategyMix Videos


Cloud Mobility: The adoption of Containers and Kubernetes Q3

Cloud Mobility

Are containers a “stepping stone” to implementing a truly serverless environment? Has their been a powershift from central control to the application developers?


Cloud Mobility: The adoption of Containers and Kubernetes Q4

Cloud Mobility

Just as we seem to be settling on Docker and Kubernetes as a platform agnostic approach to building modern solutions, serverless rears it’s head. Amazon in particular, appears to be pushing customers towards Lambdas, which are definitely not platform agnostic. Should we as an industry be rejecting this approach in favor of Kubernetes-based approaches to serverless such as KNative, or should we concede to Amazon and once again, head down the platform specific path?


Cloud Mobility: The adoption of Containers and Kubernetes Q5

Cloud Mobility

What optimisation process should we use for optimal efficiency and maximize the value of our investments?


Cloud Mobility: The adoption of Containers and Kubernetes Q6

Cloud Mobility

What is the minimum number of applications / level of complexity, we should have to start thinking about moving to containers?


Cloud Mobility: The adoption of Containers and Kubernetes Q7

Cloud Mobility

What operational benefits that you can easily demonstrate to a board of directors, will be realised by improving your cloud mobility?


Cloud Mobility: The adoption of Containers and Kubernetes Q8

Cloud Mobility

The arguments against vendor lock in seem less relevant with the major cloud vendors. Trying to span different cloud vendors is harder, more costly and restrictive to new tech.


Cloud Mobility: The adoption of Containers and Kubernetes Q9

Cloud Mobility

What is the best way to get started, so you can realise the true value of containers and ensure reliability?


Zero Trust Endpoint Protection Q1

Endpoint Protection

What is zero trust, in reality?


Zero Trust Endpoint Protection Q3

Endpoint Protection

How can we measure our own ability to implement preventive containment of an attack?


Zero Trust Endpoint Protection Q5

Endpoint Protection

What do you see is different in using policies vs rules and what are the advantages of each?