meta_pixel
Tapesearch Logo
Log in
Coding Blocks

The DevOps Handbook – Anticipating Problems

Coding Blocks

Allen Underwood, Michael Outlaw, Joe Zack

Education, Careers, Business, Technology, How To

5 β€’ 1K Ratings

πŸ—“οΈ 17 August 2020

⏱️ 82 minutes

🧾️ Download transcript

Summary

We're using telemetry to fill in the gaps and anticipate problems while discussing The DevOps Handbook, while Michael is still weird about LinkedIn, Joe knows who's your favorite JZ, and Allen might have gone on vacation.

Transcript

Click on a timestamp to play from that location

0:00.0

You're listening to coding blocks episode 139.

0:05.0

Subscribe to us, leave us a review on iTunes, Spotify, Stitcher, I don't know, wherever you like to find your podcast.

0:11.0

You can probably find us there, and if you can't let. You can probably ping

0:14.7

Jay-Z on Slack, be my best advice to you.

0:18.0

Awesome. If you never been to the website, it's super good, Looks really nice. It's got a lot of

0:24.8

social links there at the top and lots of show notes. So you can send questions

0:29.2

feedbacks and rants to an email address that you could probably find on there

0:31.8

somewhere. So we just add a living in this whole thing.

0:34.4

You forgot to mention what the website is though.

0:37.4

You sure did.

0:38.4

Yeah, you talked about it, but you never said like the HTTP colon oh wait

0:44.6

H.T.P. S. colon forward slash forward slash

0:48.0

W. W. W. dot dot coding blocks dot net. Yeah there you go very good. Well we're off to a good start so you can also follow us on Twitter at

1:00.7

coding blocks or head to w w w dot coding blocks or head to to W.W. dot coding blocks

1:04.4

dot net and find all our social links there

1:06.3

at the top of the page.

1:07.3

With that, I am Alan Underwood.

1:09.8

I am Josac.

1:11.1

And I'm Michael Outlaw. This episode is sponsored by Data Dog, the CloudScale

1:16.7

Monitoring and Analytics platform for end-to-end visibility into modern applications and secure code warrior build your

1:25.3

security posture and defend your organization from cyber security

1:28.8

threats by empowering your developers with the skills and expertise they need to write secure code from the start.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from Allen Underwood, Michael Outlaw, Joe Zack, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of Allen Underwood, Michael Outlaw, Joe Zack and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright Β© Tapesearch 2025.