Image generated with Dall-E: Modern data center surrounded by nature, with wind turbines, solar panels, and greenery, emphasizing eco-friendly technology and clean energy. Introduction The digital revolution has transformed our world, but at what cost to our environment? Greenhouse gas (GHG) emissions from data centers have already surpassed those of the global airline industry and […]
This blog post provides a detailed look at using TCP for log forwarding, leveraging custom handlers, and managing container-specific logs. Everything is also documented in this Github repository: https://github.com/marcoklaassen/jboss-eap-rsyslog. Centralized logging is essential for monitoring and troubleshooting in distributed enterprise systems. JBoss EAP, a robust application server platform, can integrate seamlessly with rsyslog for centralized […]
Imagine deploying your applications in environments where resources are scarce, connectivity is unreliable, and every hardware decision counts. Whether it’s edge computing sites, remote data centers, or on-premises installations with limited infrastructure, ensuring high performance and availability can be challenging. OpenShift Compact Clusters emerge as a transformative solution tailored to address these exact scenarios, offering […]
I’ve been with Red Hat since 2019 as a Solution Architect. I started in the area of IT in 2001 only to experience, just 2 years later, that we can use ONE physical server to deploy MANY Operating Systems! At that time we deployed our very first VMware vSphere cluster in a medium-sized company in Trier, […]
tl;dr The rise of AI, particularly large language models (LLMs) like ChatGPT, has been transformative, making advanced technology accessible and widely used. However, with their growing adoption comes a pressing concern: the sustainability of their energy consumption. This article explores a practical approach to evaluating the power usage of different LLMs using a sample chatbot […]
Welcome to the Women+ in Data and AI (W+DAI) event—a true highlight in the tech community calendar that’s all about embracing diversity and empowerment. This isn’t just any tech conference; it’s a celebration where the latest in AI and data science meets a vibrant and supportive network. Here, everyone from industry veterans to budding speakers […]
In this blog entry it is explained what confidential computing is and how it works. Have a look at this https://www.opensourcerers.org/2023/12/11/confidentiality-in-a-crazy-world/ to find out more. We now know how it works. But now we are looking into the use cases of Confidential Computing I have seen so far. The basic principle Confidential Computing revolves around […]
When on the road, some of us bring a handheld Linux computer such as the Steam Deck for entertainment. But after some time of hunting ghosts and shooting portals the desire to be productive returns. How about quitting the game and starting OpenShift on our handheld gaming companion? In late 2023 I was on a […]
This is the follow-up article to my Introduction to the Advanced Intrusion Detection Environment (AIDE). It presents a Proof of Concept (PoC) that shows how AIDE can be remotely controlled using an Ansible role. Knowledge of the introductory article is assumed. Basic Ansible knowledge, such as the use of Ansible roles and the execution of […]
This introduction provides answers to the following questions: For this introduction I used RHEL 9 as my operating system of choice, but AIDE is available for other Linux distributions as well. In order to follow this introduction, you should be familiar with the basics of Linux system administration and at least know the following terms: […]