Kubernetes: How a Rejected Internal Project Became a Global Standard

San Francisco, June 9-10, 2014. In the halls of the Marriott Marquis hotel, the first DockerCon is held. “Containers everywhere!” is printed on the back of event T-shirts. The first big news of DockerCon is the launch of Docker 1.0, but there is much more to come. It is the beginning of what is later […]

Kafka and Its Alternatives: A high-level comparison of Proprietary and Open-Source Solutions

Target group: If you are a solution architect or consultant looking for some references of distributed data messaging solutions at a high level, this is an article for you. As well, if you are experiencing significant growth at your company and your messaging system is struggling to handle the volume of traffic, you experience frequent […]

Securing the integrity of Software Supply Chains

Overview How can we secure the integrity of our Software Supply Chains and have confidence that our software has not been tampered with and can be traced to its source? Which are the main parts of the software supply chain security? Before explaining how to secure the Software Supply Chain, we need first to understand […]

Develop: The Inner Loop with OpenShift Dev Spaces (2/4)

In Part II of our 4-part blog series “You’ve written a Kubernetes-native Application? Here is how OpenShift helps you to run, develop, build and deliver it”, we will focus on the aspect of developing our application with and directly on OpenShift. In Part I, we’ve introduced our sample application “the Local News Application”, and showed […]

OpenShift Local or Single Node OpenShift

Are you a developer or just a curious individual who wants to dip their toes in the Cloud, but are not sure whether to go for OpenShift Local or Single Node OpenShift? You’ve come to the right place. In this article, I will explore the differences and similarities between these two variants of OpenShift, so […]

Red Hat Advanced Cluster Security with OpenShift Pipelines and Slack Integration

Summary This article describes the installation of Red Hat Advanced Cluster Security (RHACS) using the Operator. It also covers the integration of Tekton Pipelines for the deployment of two different containers and the configuration of a Slack notification. A special feature here is that the installation and configuration is largely automated by scripts and can […]

Ansible Middleware : Automation of JBoss Web Server (JWS)

In a previous article, we discussed the importance of Ansible from a Middleware perspective and why making Middleware a first-class citizen in the Ansible ecosystem is crucial. In this post, we’ll explore the technical details of utilizing Ansible for automating a Middleware solution.  We’ll focus on one of the most used middleware software: Apache Tomcat. […]

OpenShift absichern für die Gesundheitsbranche

For english content please see the blog post by Chris Jenkins at  https://www.redhat.com/en/blog/openshift-security-hardening-healthcare-industry which essentially presents the same information as this post. Because of the importance of the topic and the ask from our german-language customers we wanted to also present this information in german. “Security is not a product, it itself is a process” […]

Kubernetes is a Platform for building Platforms

Kelsey Hightower stated already in 2017, that Kubernetes is not a Platform by itself, but rather a better way to start to build a platform. But what does that really mean? From my point of view, this means that Kubernetes is a platform that provides a core abstraction- and Service  layer for cloud-native applications to […]

Demystifying Kubernetes Adoption

Adopting Kubernetes in an Enterprise is a daunting task. In this series of articles I am trying to give you an opinionated view on what you might need to consider when you are in the middle of rolling out Kubernetes within your organisation. Whether you are a developer or an IT operator, I am trying […]

close

Subscribe to our newsletter.

Please select all the ways you would like to hear from Open Sourcerers:

You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our website.

We use Mailchimp as our newsletter platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.