{"version":"https://jsonfeed.org/version/1","title":"What Lies Beneath","home_page_url":"https://whatliesbeneath.fireside.fm","feed_url":"https://whatliesbeneath.fireside.fm/json","description":"Applications today are loosely connected assemblies of small, often widely distributed parts, some of which may be sourced outside your organization. This enables delivery of great new capabilities faster and more easily than ever before, but it also introduces risk—security risks and risks associated with latency or maintenance of external components over time.","_fireside":{"subtitle":"What Lies Beneath","pubdate":"2020-07-21T15:00:00.000-04:00","explicit":false,"owner":"Terri Patrick","image":"https://assets.fireside.fm/file/fireside-images/podcasts/images/3/3fea16ef-0ed4-4c86-b673-63cd685b7782/cover.jpg?v=2"},"items":[{"id":"bb05724c-406d-4905-adb9-43b6b518a981","title":"Season 1: Episode 4 - Understanding Artificial Intelligence","url":"https://whatliesbeneath.fireside.fm/s1e4","content_text":"What do people mean when they talk about artificial intelligence? In this episode, F5’s Joel Moses breaks down the three primary types of artificial intelligence, discusses the various systems of learning they use, and addresses the tradeoffs involved with each.Special Guest: Joel Moses.","content_html":"

What do people mean when they talk about artificial intelligence? In this episode, F5’s Joel Moses breaks down the three primary types of artificial intelligence, discusses the various systems of learning they use, and addresses the tradeoffs involved with each.

Special Guest: Joel Moses.

","summary":"What do people mean when they talk about artificial intelligence? In this episode, F5’s Joel Moses breaks down the three primary types of artificial intelligence, discusses the various systems of learning they use, and addresses the tradeoffs involved with each.","date_published":"2020-07-21T15:00:00.000-04:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/3fea16ef-0ed4-4c86-b673-63cd685b7782/bb05724c-406d-4905-adb9-43b6b518a981.mp3","mime_type":"audio/mpeg","size_in_bytes":48244133,"duration_in_seconds":1202}]},{"id":"0a115242-7616-4b3a-bcc7-83c4dfc39ccf","title":"Season 1: Episode 3 - Alternatives to Service Mesh","url":"https://whatliesbeneath.fireside.fm/s1e3","content_text":"Service mesh offers a lot of benefits, but it’s not the right fit for every organization. Owen Garret of NGINX talks about alternatives to Service Mesh and offers guidance on selecting the right solutions for your applications.Special Guest: Owen Garret.","content_html":"

Service mesh offers a lot of benefits, but it’s not the right fit for every organization. Owen Garret of NGINX talks about alternatives to Service Mesh and offers guidance on selecting the right solutions for your applications.

Special Guest: Owen Garret.

","summary":"\r\nService mesh offers a lot of benefits, but it’s not the right fit for every organization. Owen Garret of NGINX talks about alternatives to Service Mesh and offers guidance on selecting the right solutions for your applications. \r\n","date_published":"2020-04-20T14:00:00.000-04:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/3fea16ef-0ed4-4c86-b673-63cd685b7782/0a115242-7616-4b3a-bcc7-83c4dfc39ccf.mp3","mime_type":"audio/mp3","size_in_bytes":44962296,"duration_in_seconds":1404}]},{"id":"ab8d61ea-cfd6-45ca-9c4a-3ae977e43cee","title":"Season1: Episode 2 - Service Mesh 101","url":"https://whatliesbeneath.fireside.fm/s1e2","content_text":"What is Service Mesh? What problems does it solve? Do you need one? If so, where and how should you start? In this episode, Andrew Jenkins and Zach Jory of Aspen Mesh dig into the history of service mesh and speak to the reasons you should or should not implement a service mesh in your environment. Special Guests: Andrew Jenkins and Zach Jory .","content_html":"

What is Service Mesh? What problems does it solve? Do you need one? If so, where and how should you start? In this episode, Andrew Jenkins and Zach Jory of Aspen Mesh dig into the history of service mesh and speak to the reasons you should or should not implement a service mesh in your environment.

Special Guests: Andrew Jenkins and Zach Jory .

","summary":"What is Service Mesh? What problems does it solve? Do you need one? If so, where and how should you start? In this episode, Andrew Jenkins and Zach Jory of Aspen Mesh dig into the history of service mesh and speak to the reasons you should or should not implement a service mesh in your environment. Not ready for Service Mesh? Check out this podcast [link to Alternatives to Service Mesh podcast]. \r\n\r\n","date_published":"2020-04-20T14:00:00.000-04:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/3fea16ef-0ed4-4c86-b673-63cd685b7782/ab8d61ea-cfd6-45ca-9c4a-3ae977e43cee.mp3","mime_type":"audio/mp3","size_in_bytes":43765467,"duration_in_seconds":2188}]},{"id":"ea582cd9-5444-4308-85a7-a4f6e9e7a61c","title":"Season 1: Episode 1 - The Monsters We Make: Understanding New Model Applications ","url":"https://whatliesbeneath.fireside.fm/s1e1","content_text":"The Monsters We Make: Understanding New Model Applications \nApplications today are loosely connected assemblies of small, often widely distributed parts, some of which may be sourced outside your organization. This enables delivery of great new capabilities faster and more easily than ever before, but it also introduces risk—security risks and risks associated with latency or maintenance of external components over time. In the first episode of F5’s podcast series What Lies Beneath, A Deep Dive into the Underpinnings of Our Digital Lives, Joel Moses from F5’s Office of the CTO talks about learning to live with (and maybe even love) the monsters we make. ","content_html":"

The Monsters We Make: Understanding New Model Applications 
\nApplications today are loosely connected assemblies of small, often widely distributed parts, some of which may be sourced outside your organization. This enables delivery of great new capabilities faster and more easily than ever before, but it also introduces risk—security risks and risks associated with latency or maintenance of external components over time. In the first episode of F5’s podcast series What Lies Beneath, A Deep Dive into the Underpinnings of Our Digital Lives, Joel Moses from F5’s Office of the CTO talks about learning to live with (and maybe even love) the monsters we make. 

","summary":"","date_published":"2019-12-23T20:00:00.000-05:00","attachments":[{"url":"https://aphid.fireside.fm/d/1437767933/3fea16ef-0ed4-4c86-b673-63cd685b7782/ea582cd9-5444-4308-85a7-a4f6e9e7a61c.mp3","mime_type":"audio/mpeg","size_in_bytes":81407630,"duration_in_seconds":2018}]}]}