OpenShift Virtualization – Surprisingly mature, even for my high standards!

I’ve been with Red Hat since 2019 as a Solution Architect. I started in the area of IT in 2001 only to experience, just 2 years later, that we can use ONE physical server to deploy MANY Operating Systems!  At that time we deployed our very first VMware vSphere cluster in a medium-sized company in Trier, […]

Sustainability in the Age of Local LLMs: Who’s Watching the Electricity Bill?

tl;dr The rise of AI, particularly large language models (LLMs) like ChatGPT, has been transformative, making advanced technology accessible and widely used. However, with their growing adoption comes a pressing concern: the sustainability of their energy consumption. This article explores a practical approach to evaluating the power usage of different LLMs using a sample chatbot […]

Confidential Computing in Action

In this blog entry it is explained what confidential computing is and how it works. Have a look at this https://www.opensourcerers.org/2023/12/11/confidentiality-in-a-crazy-world/ to find out more. We now know how it works. But now we are looking into the use cases of Confidential Computing I have seen so far. The basic principle Confidential Computing revolves around […]

Sailing away on the Steam Deck with OpenShift Virtualization (Part 1)

When on the road, some of us bring a handheld Linux computer such as the Steam Deck for entertainment. But after some time of hunting ghosts and shooting portals the desire to be productive returns. How about quitting the game and starting OpenShift on our handheld gaming companion? In late 2023 I was on a […]

Proof of Concept: Use Ansible to manage the Advanced Intrusion Detection Environment (AIDE)

This is the follow-up article to my Introduction to the Advanced Intrusion Detection Environment (AIDE). It presents a Proof of Concept (PoC) that shows how AIDE can be remotely controlled using an Ansible role. Knowledge of the introductory article is assumed. Basic Ansible knowledge, such as the use of Ansible roles and the execution of […]

What’s a (D)DoS “(Distributed) Denial of Service” and how to protect against such an attack – technical.

Introduction The topic “Denial of Service” (DoS) and “Distributed Denial of Service” (DDoS) is always a hot topic because it could happen at any time for any Service at any Layers. To understand what a (D)DoS is, let us explain what a “service” is, what possible attacks are available and why such a denial of […]

The Future of generative AI in the Financial Sector

In just two months, ChatGPT reached 100 million users, outpacing TikTok and WhatsApp. This shows AI’s growing popularity, especially versatile generative AI. In 2024, generative AI’s influence in tech and finance is undeniable. This article looks at key generative AI trends in finance for 2024. Artificial Intelligence (AI) is a broad field that aims to […]

Happy Holidays

Without many words, the OpenSourcerers Chief Editors wish you all a relaxing vacation period, Merry Christmas and a happy New Year! We want to take the opportunity to thank all authors, supporters and readers of our blog entries. Stay safe and healthy and stay prudent of the reindeers – and have a dance here and […]

AI and its hype, some recommendations for reading

Lately we have been seeing many things around AI and most prominently was the advent of ChatGPT, which brought AI within the average person’s viewpoint. Also here on OpenSourcerers we have had some articles around AI and ML lately, just scroll down through the list (one entry point is also linked also below).. What I’m […]

How to secure microservice applications with role-based access control? (7/7)

Foto Source: Darrel Und (www.pexels.com) Option: Service Mesh We have already introduced many different options how to secure micro-service applications based on roles (RBAC). In the last part of this series, we will explore how to use a Service Mesh for RBAC. For the implementation of the Service Mesh we are using the Open Source […]

close

Subscribe to our newsletter.

Please select all the ways you would like to hear from Open Sourcerers:

You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our website.

We use Mailchimp as our newsletter platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.