KubeCon + CloudNativeCon Europe 2025 Report

A Report about the Visit of KubeCon + CloudNativeCon Europe 2025

Securing the Core: Advancing Datacenter Security with Confidential Computing

In the last several months we have seen security concerns are raised more and more. Volatility has become the new curse word. Companies are refocusing their efforts to an on premise data center. See here how confidential computing can help to implement and use case based usage of the public cloud with confidential computing as […]

The on-premise data center is back. Or better: It was never gone

More and more companies reevaluate their presence in the cloud and the on-premise data center. And some who pledged to move most of it or even all of it into the cloud have seen that it is not one or the other it is a mixture of both. To read up on why I think […]

OpenShift Virtualization – Surprisingly mature, even for my high standards!

I’ve been with Red Hat since 2019 as a Solution Architect. I started in the area of IT in 2001 only to experience, just 2 years later, that we can use ONE physical server to deploy MANY Operating Systems!  At that time we deployed our very first VMware vSphere cluster in a medium-sized company in Trier, […]

Sustainability in the Age of Local LLMs: Who’s Watching the Electricity Bill?

tl;dr The rise of AI, particularly large language models (LLMs) like ChatGPT, has been transformative, making advanced technology accessible and widely used. However, with their growing adoption comes a pressing concern: the sustainability of their energy consumption. This article explores a practical approach to evaluating the power usage of different LLMs using a sample chatbot […]

Confidential Computing in Action

In this blog entry it is explained what confidential computing is and how it works. Have a look at this https://www.opensourcerers.org/2023/12/11/confidentiality-in-a-crazy-world/ to find out more. We now know how it works. But now we are looking into the use cases of Confidential Computing I have seen so far. The basic principle Confidential Computing revolves around […]

Sailing away on the Steam Deck with OpenShift Virtualization (Part 1)

When on the road, some of us bring a handheld Linux computer such as the Steam Deck for entertainment. But after some time of hunting ghosts and shooting portals the desire to be productive returns. How about quitting the game and starting OpenShift on our handheld gaming companion? In late 2023 I was on a […]

Proof of Concept: Use Ansible to manage the Advanced Intrusion Detection Environment (AIDE)

This is the follow-up article to my Introduction to the Advanced Intrusion Detection Environment (AIDE). It presents a Proof of Concept (PoC) that shows how AIDE can be remotely controlled using an Ansible role. Knowledge of the introductory article is assumed. Basic Ansible knowledge, such as the use of Ansible roles and the execution of […]

What’s a (D)DoS “(Distributed) Denial of Service” and how to protect against such an attack – technical.

Introduction The topic “Denial of Service” (DoS) and “Distributed Denial of Service” (DDoS) is always a hot topic because it could happen at any time for any Service at any Layers. To understand what a (D)DoS is, let us explain what a “service” is, what possible attacks are available and why such a denial of […]

The Future of generative AI in the Financial Sector

In just two months, ChatGPT reached 100 million users, outpacing TikTok and WhatsApp. This shows AI’s growing popularity, especially versatile generative AI. In 2024, generative AI’s influence in tech and finance is undeniable. This article looks at key generative AI trends in finance for 2024. Artificial Intelligence (AI) is a broad field that aims to […]