Zoom Logo

EdgeX: Core WG Meeting - Shared screen with speaker view
Eric Cotter
34:15
If you can get un secure access to one and it’s say core-metadata
Eric Cotter
34:27
Why can’t a hacker get in the others
Colin Hutchinson
35:15
double negatives are fun
Eric Cotter
35:24
Use….
Eric Cotter
35:52
Or enable
Eric Cotter
50:46
were not encrypting our configs correct
ijohnson
52:03
eric: true not encypted
Anthony Bonafide
56:10
One of the few things I think the Spring framework got right was loading config values. I think it works well for micro-services.
Eric Cotter
56:28
Service Discovery and or Registry Service provider like consul