Overview How can we secure the integrity of our Software Supply Chains and have confidence that our software has not been tampered with and can be traced to its source? Which are the main parts of the software supply chain security? Before explaining how to secure the Software Supply Chain, we need first to understand […]
Tag: Red Hat
In Part II of our 4-part blog series “You’ve written a Kubernetes-native Application? Here is how OpenShift helps you to run, develop, build and deliver it”, we will focus on the aspect of developing our application with and directly on OpenShift. In Part I, we’ve introduced our sample application “the Local News Application”, and showed […]
Are you a developer or just a curious individual who wants to dip their toes in the Cloud, but are not sure whether to go for OpenShift Local or Single Node OpenShift? You’ve come to the right place. In this article, I will explore the differences and similarities between these two variants of OpenShift, so […]
Summary This article describes the installation of Red Hat Advanced Cluster Security (RHACS) using the Operator. It also covers the integration of Tekton Pipelines for the deployment of two different containers and the configuration of a Slack notification. A special feature here is that the installation and configuration is largely automated by scripts and can […]
In a previous article, we discussed the importance of Ansible from a Middleware perspective and why making Middleware a first-class citizen in the Ansible ecosystem is crucial. In this post, we’ll explore the technical details of utilizing Ansible for automating a Middleware solution. We’ll focus on one of the most used middleware software: Apache Tomcat. […]
For english content please see the blog post by Chris Jenkins at https://www.redhat.com/en/blog/openshift-security-hardening-healthcare-industry which essentially presents the same information as this post. Because of the importance of the topic and the ask from our german-language customers we wanted to also present this information in german. “Security is not a product, it itself is a process” […]
Kelsey Hightower stated already in 2017, that Kubernetes is not a Platform by itself, but rather a better way to start to build a platform. But what does that really mean? From my point of view, this means that Kubernetes is a platform that provides a core abstraction- and Service layer for cloud-native applications to […]
Adopting Kubernetes in an Enterprise is a daunting task. In this series of articles I am trying to give you an opinionated view on what you might need to consider when you are in the middle of rolling out Kubernetes within your organisation. Whether you are a developer or an IT operator, I am trying […]
How we came here Everyday we get in touch with the hottest trends in IT, try out thrilling (new) Open Source projects, and hear from our customers about the business perspective on technology. This has been happening for years now. We realized that all this knowledge and experience was more or less distributed across our […]
Retailers who operate facilities, both physical stores and online stores want to constantly optimize the shopping experience of their customers. Why? Because an easy and pleasant experience increases sales. Simple as that. So shopping experience need to be permanently changed for the better. But does really every change lead to increased sales? How can this […]