IBM Cloud

Red Hat

Podman vs. Docker

Docker is synonymous with containers, but that doesn’t mean it’s the only choice. PodMan is an open source alternative container engine based on the same OCI standard. In this video, Cedric Clyburn from Red Hat explains how compares PodMan and Docker, showing their relative advantages and disadvantages.

Read More
Security

What is Continuous Automated Red Teaming (CART)?

While red teaming evaluates an organization’s security stance at a specific time, it can prove costly and time-consuming. Enter Continuous Automated Red Teaming (CART), a game-changing approach that revolutionizes red teaming in cybersecurity. In this video, Sam Hector explains how by operating seamlessly round-the-clock, CART tackles these challenges head-on, delivering dynamic and cost-effective security assessments […]

Read More
Containers Red Hat

Containers at the Edge

IBM Developer Advocate Dan Kehn explains the importance of Containers at the Edge and how this helps us to bring tech out of the cloud and onto the devices we use every day in a scalable and secure way.

Read More
AI Red Hat

How to Add AI to Your Apps Faster with Embedded AI

Wondering what embeddable AI is, how one actually goes about embedding AI and where? In this video, Martin Keen talks about AI deployment, specifically how to deploy embeddable AI, and centers his discussion on the 2 major methods: containerized libraries and applications.

Read More
Security

Cybersecurity Modernization

Advances in AI are impacting many industry disciplines and cybersecurity is no different. The tried-and-true strategies for threat management and detection are evolving to take advantage of AI, making their approach more proactive. In this video from IBM Technology, Bob Kalka of presents the developing landscape of cybersecurity based on years of consulting with companies like […]

Read More
Python

NumPy vs SciPy

NumPy and SciPy are two Python libraries that on the surface, appear to overlap significantly, but there’s a reason: SciPy is actually built on top of NumPy. So where does SciPy add functionality beyond NumPy? In this video, Martin Keen explains how SciPy enhances NumPy by adding further functionality for more complex mathematical and scientific […]

Read More
Data

Data Pipelines Explained

Data is a lot like water; it often needs to be refined as it travels between a source and its final destination. That’s where data pipelines come in – they merge, filter, and summarize raw data, providing the end user with a clean product to analyze. Luv Aggarwal, a Data Solution Engineer at IBM, explains […]

Read More
Quantum Computing

Quantum Error Mitigation and the Path to Useful Quantum Computing

A research paper from IBM Quantum and UC Berkeley has delivered compelling evidence suggesting that today’s noisy, error-prone quantum computers will soon be able to solve truly useful problems that are beyond the reach of classical computation. In this video, co-authors and IBM Quantum researchers Andrew Eddins and Youngseok Kim explain the experiment they used […]

Read More
Quantum Computing

Quantum Error Mitigation and the Path to Useful Quantum Computing

A research paper from IBM Quantum and UC Berkeley has delivered compelling evidence suggesting that today’s noisy, error-prone quantum computers will soon be able to solve truly useful problems that are beyond the reach of classical computation. In this video, co-authors and IBM Quantum researchers Andrew Eddins and Youngseok Kim explain the experiment they used […]

Read More
AI Ethics Large Language Models

Why Do Large Language Models Hallucinate

In this video, Martin Keen explains the different types of “LLMs hallucinations”, why they happen, and ends with recommending steps that you, as a LLM user, can take to minimize their occurrence. Large language models (LLMs) like chatGPT can generate authoritative-sounding prose on many topics and domains, they are also prone to just “make stuff […]

Read More