OpenShift Compact Clusters: Revolutionizing Deployments

Imagine deploying your applications in environments where resources are scarce, connectivity is unreliable, and every hardware decision counts. Whether it’s edge computing sites, remote data centers, or on-premises installations with limited infrastructure, ensuring high performance and availability can be challenging. OpenShift Compact Clusters emerge as a transformative solution tailored to address these exact scenarios, offering […]

OpenShift Virtualization – Surprisingly mature, even for my high standards!

I’ve been with Red Hat since 2019 as a Solution Architect. I started in the area of IT in 2001 only to experience, just 2 years later, that we can use ONE physical server to deploy MANY Operating Systems!  At that time we deployed our very first VMware vSphere cluster in a medium-sized company in Trier, […]

Sustainability in the Age of Local LLMs: Who’s Watching the Electricity Bill?

tl;dr The rise of AI, particularly large language models (LLMs) like ChatGPT, has been transformative, making advanced technology accessible and widely used. However, with their growing adoption comes a pressing concern: the sustainability of their energy consumption. This article explores a practical approach to evaluating the power usage of different LLMs using a sample chatbot […]

This isn’t just any Tech Conference

Welcome to the Women+ in Data and AI (W+DAI) event—a true highlight in the tech community calendar that’s all about embracing diversity and empowerment. This isn’t just any tech conference; it’s a celebration where the latest in AI and data science meets a vibrant and supportive network. Here, everyone from industry veterans to budding speakers […]

Confidential Computing in Action

In this blog entry it is explained what confidential computing is and how it works. Have a look at this https://www.opensourcerers.org/2023/12/11/confidentiality-in-a-crazy-world/ to find out more. We now know how it works. But now we are looking into the use cases of Confidential Computing I have seen so far. The basic principle Confidential Computing revolves around […]

Sailing away on the Steam Deck with OpenShift Virtualization (Part 1)

When on the road, some of us bring a handheld Linux computer such as the Steam Deck for entertainment. But after some time of hunting ghosts and shooting portals the desire to be productive returns. How about quitting the game and starting OpenShift on our handheld gaming companion? In late 2023 I was on a […]

Proof of Concept: Use Ansible to manage the Advanced Intrusion Detection Environment (AIDE)

This is the follow-up article to my Introduction to the Advanced Intrusion Detection Environment (AIDE). It presents a Proof of Concept (PoC) that shows how AIDE can be remotely controlled using an Ansible role. Knowledge of the introductory article is assumed. Basic Ansible knowledge, such as the use of Ansible roles and the execution of […]

Introduction to the Advanced Intrusion Detection Environment (AIDE)

This introduction provides answers to the following questions: For this introduction I used RHEL 9 as my operating system of choice, but AIDE is available for other Linux distributions as well. In order to follow this introduction, you should be familiar with the basics of Linux system administration and at least know the following terms: […]

Navigating Multi-Cluster Challenges

A Guide to Seamless Connectivity in OpenShift and OKD In today’s rapidly evolving technological landscape, the integration of complex architectures into our systems is becoming more prevalent than ever. One of these challenges is to consolidate a multi-cloud architecture into a true hybrid cloud one.  In this blog post we will delve into the motivations, solutions, and considerations […]

Enhancing Code Project Documentation through Automated Changelogs

Source: https://commons.wikimedia.org/wiki/File:Grand_Turk(34).jpg (Georges Jansoone) Abstract In the rapidly evolving landscape of software development, documentation of modifications and updates is crucial for maintaining project continuity and ensuring team alignment. This blog article introduces Conventional Changelog, a tool developed to address this very challenge. The tool transforms a project’s commit history into a detailed, readable changelog. Its […]

close

Subscribe to our newsletter.

Please select all the ways you would like to hear from Open Sourcerers:

You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our website.

We use Mailchimp as our newsletter platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.