I’ve been with Red Hat since 2019 as a Solution Architect. I started in the area of IT in 2001 only to experience, just 2 years later, that we can use ONE physical server to deploy MANY Operating Systems! At that time we deployed our very first VMware vSphere cluster in a medium-sized company in Trier, […]
tl;dr The rise of AI, particularly large language models (LLMs) like ChatGPT, has been transformative, making advanced technology accessible and widely used. However, with their growing adoption comes a pressing concern: the sustainability of their energy consumption. This article explores a practical approach to evaluating the power usage of different LLMs using a sample chatbot […]
Welcome to the Women+ in Data and AI (W+DAI) event—a true highlight in the tech community calendar that’s all about embracing diversity and empowerment. This isn’t just any tech conference; it’s a celebration where the latest in AI and data science meets a vibrant and supportive network. Here, everyone from industry veterans to budding speakers […]
In this blog entry it is explained what confidential computing is and how it works. Have a look at this https://www.opensourcerers.org/2023/12/11/confidentiality-in-a-crazy-world/ to find out more. We now know how it works. But now we are looking into the use cases of Confidential Computing I have seen so far. The basic principle Confidential Computing revolves around […]
When on the road, some of us bring a handheld Linux computer such as the Steam Deck for entertainment. But after some time of hunting ghosts and shooting portals the desire to be productive returns. How about quitting the game and starting OpenShift on our handheld gaming companion? In late 2023 I was on a […]
This is the follow-up article to my Introduction to the Advanced Intrusion Detection Environment (AIDE). It presents a Proof of Concept (PoC) that shows how AIDE can be remotely controlled using an Ansible role. Knowledge of the introductory article is assumed. Basic Ansible knowledge, such as the use of Ansible roles and the execution of […]
This introduction provides answers to the following questions: For this introduction I used RHEL 9 as my operating system of choice, but AIDE is available for other Linux distributions as well. In order to follow this introduction, you should be familiar with the basics of Linux system administration and at least know the following terms: […]
A Guide to Seamless Connectivity in OpenShift and OKD In today’s rapidly evolving technological landscape, the integration of complex architectures into our systems is becoming more prevalent than ever. One of these challenges is to consolidate a multi-cloud architecture into a true hybrid cloud one. In this blog post we will delve into the motivations, solutions, and considerations […]
Source: https://commons.wikimedia.org/wiki/File:Grand_Turk(34).jpg (Georges Jansoone) Abstract In the rapidly evolving landscape of software development, documentation of modifications and updates is crucial for maintaining project continuity and ensuring team alignment. This blog article introduces Conventional Changelog, a tool developed to address this very challenge. The tool transforms a project’s commit history into a detailed, readable changelog. Its […]
Introduction In this article I will put the spotlight on some aspects of the Open Source activities in the public sector in germany. While I have a few insights in some of these, I am currently unable to cover everything that is going on. So if I missed parts, please let me know through the […]