How to create data sharing and collaboration services in kubernetes environments

Introduction Customer requirements are constantly changing and the digital transformation of any company requires not only support for cultural aspects in the collaboration between departments and colleagues, but also the adaptation of processes, modernisation of programmes and the management of company-related data. In my article “How to create a data pipeline for Next Generation Sequencing”, […]

Quantum Computing – How to start and how to say “Hello World!”

Introduction In my previous post on Open Source and Quantum Computing Quantum Computing: Open Source from the Start we learned about Quantum Computing in general and how Open Source is used to provide access to this new computing paradigm. This post will now focus on how to get started and provide a very easy guide […]

Banking 2030: What can we expect?

This text takes a look at the next couple of years regarding the banking industry and its repercussions on the underlying IT, makes assumptions and then some theories how it might develop. So up front a disclaimer: I do not have a glass orb and therefore my guess is probably as good as anyone’s. Executive […]

Optimizing a systemd service for security

First of all: What is a systemd service ? systemd is an init system in the Linux world, similar but not identical to init or SysVinit init systems (see [8]). There has been much discussion about this, but in the end all major distributions have for some time now switched to systemd. Essentially, systemd moves […]

Using OpenTelemetry and Jaeger with Your Own Services/Application

In this blog I will guide you on How to use OpenTelemetry with a Quarkus application. How to display your OpenTeleemtry information on Jaeger UI. In this blog I will use distributed tracing to instrument my services to gather insights into my service architecture. I am using distributed tracing for monitoring, network profiling, and troubleshooting […]

Red Hat Advanced Cluster Security with OpenShift Pipelines and Slack Integration

Summary This article describes the installation of Red Hat Advanced Cluster Security (RHACS) using the Operator. It also covers the integration of Tekton Pipelines for the deployment of two different containers and the configuration of a Slack notification. A special feature here is that the installation and configuration is largely automated by scripts and can […]

Correct Estimates? A personal perspective

Motivation A while ago I paused an exchange on twitter. I have been in a strong disagreement with what was stated from Alex. To avoid being bullish on a short reply, it took some time to reply in due respect and also purposefully.  Nevertheless, I need to agree to some extend: There might be cases […]

“This space intentionally left blank”

We’ll be back next week…

Security aspects with OpenShift – an overview

Today more than ever availability and performance depend on resilience against increasingly frequent and powerful attacks on the confidentiality, availability and integrity of information and IT systems. It is not just that our systems are being threatened with continuous automated attacks, but also with highly sophisticated approaches, such as Advanced Persistent Threats (APTs), Ransomware, Side […]

Ansible Middleware : Automation of JBoss Web Server (JWS)

In a previous article, we discussed the importance of Ansible from a Middleware perspective and why making Middleware a first-class citizen in the Ansible ecosystem is crucial. In this post, we’ll explore the technical details of utilizing Ansible for automating a Middleware solution.  We’ll focus on one of the most used middleware software: Apache Tomcat. […]

close

Subscribe to our newsletter.

Please select all the ways you would like to hear from Open Sourcerers:

You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our website.

We use Mailchimp as our newsletter platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.