A Report about the Visit of KubeCon + CloudNativeCon Europe 2025

A Report about the Visit of KubeCon + CloudNativeCon Europe 2025
In the last several months we have seen security concerns are raised more and more. Volatility has become the new curse word. Companies are refocusing their efforts to an on premise data center. See here how confidential computing can help to implement and use case based usage of the public cloud with confidential computing as […]
More and more companies reevaluate their presence in the cloud and the on-premise data center. And some who pledged to move most of it or even all of it into the cloud have seen that it is not one or the other it is a mixture of both. To read up on why I think […]
I’ve been with Red Hat since 2019 as a Solution Architect. I started in the area of IT in 2001 only to experience, just 2 years later, that we can use ONE physical server to deploy MANY Operating Systems! At that time we deployed our very first VMware vSphere cluster in a medium-sized company in Trier, […]
tl;dr The rise of AI, particularly large language models (LLMs) like ChatGPT, has been transformative, making advanced technology accessible and widely used. However, with their growing adoption comes a pressing concern: the sustainability of their energy consumption. This article explores a practical approach to evaluating the power usage of different LLMs using a sample chatbot […]
In this blog entry it is explained what confidential computing is and how it works. Have a look at this https://www.opensourcerers.org/2023/12/11/confidentiality-in-a-crazy-world/ to find out more. We now know how it works. But now we are looking into the use cases of Confidential Computing I have seen so far. The basic principle Confidential Computing revolves around […]
When on the road, some of us bring a handheld Linux computer such as the Steam Deck for entertainment. But after some time of hunting ghosts and shooting portals the desire to be productive returns. How about quitting the game and starting OpenShift on our handheld gaming companion? In late 2023 I was on a […]
This is the follow-up article to my Introduction to the Advanced Intrusion Detection Environment (AIDE). It presents a Proof of Concept (PoC) that shows how AIDE can be remotely controlled using an Ansible role. Knowledge of the introductory article is assumed. Basic Ansible knowledge, such as the use of Ansible roles and the execution of […]
Introduction The topic “Denial of Service” (DoS) and “Distributed Denial of Service” (DDoS) is always a hot topic because it could happen at any time for any Service at any Layers. To understand what a (D)DoS is, let us explain what a “service” is, what possible attacks are available and why such a denial of […]
In just two months, ChatGPT reached 100 million users, outpacing TikTok and WhatsApp. This shows AI’s growing popularity, especially versatile generative AI. In 2024, generative AI’s influence in tech and finance is undeniable. This article looks at key generative AI trends in finance for 2024. Artificial Intelligence (AI) is a broad field that aims to […]