Navigating Multi-Cluster Challenges

A Guide to Seamless Connectivity in OpenShift and OKD In today’s rapidly evolving technological landscape, the integration of complex architectures into our systems is becoming more prevalent than ever. One of these challenges is to consolidate a multi-cloud architecture into a true hybrid cloud one.  In this blog post we will delve into the motivations, solutions, and considerations […]

Enhancing Code Project Documentation through Automated Changelogs

Source: https://commons.wikimedia.org/wiki/File:Grand_Turk(34).jpg (Georges Jansoone) Abstract In the rapidly evolving landscape of software development, documentation of modifications and updates is crucial for maintaining project continuity and ensuring team alignment. This blog article introduces Conventional Changelog, a tool developed to address this very challenge. The tool transforms a project’s commit history into a detailed, readable changelog. Its […]

Open Source in the Public Sector (Germany/Europe)- some spotlights

Introduction In this article I will put the spotlight on some aspects of the Open Source activities in the public sector in germany. While I have a few insights in some of these, I am currently unable to cover everything that is going on. So if I missed parts, please let me know through the […]

A Path to a More Sustainable IT by Effective Power Monitoring

The Problem It’s getting worse. Every day. The global emissions of carbon dioxide are still increasing , while our global budget to stay in the range of 1.5° C and 2° C is rapidly exhausting. The main emissions are produced by burning fossil fuels for energy generation, transportation and industrial production. Another big source of […]

Why to embrace Data as a Product & Data Mesh

The potential of AI has been acknowledged for years, along with the understanding that data is the key driver of this potential. This realization sparked a gold rush to amass data, a pursuit driven more by the allure of future possibilities than by practical use cases. Consequently, this rush resulted in piles of rubble rather […]

Multi-architecture image builds in OpenShift x86_64 infrastructures

We all know the limitations of building multi-architecture images on an infrastructure that is not providing all the expected CPU architectures. We also know that emulation of those architectures is something that can help us out of that dilemma. Unfortunately, switching CPU architectures within a highly restricted environment like an OpenShift cluster is hard to […]

The Power of Open in Data Science

Open source has become widely adopted as a default, making it easy to overlook its significance in the field of Data science. There is a need to appreciate the greater value in this area. Data scientists can enhance efficiency and improve work performance by utilizing Open source tools and frameworks, unlocking their full potential through […]

What’s a (D)DoS “(Distributed) Denial of Service” and how to protect against such an attack – technical.

Introduction The topic “Denial of Service” (DoS) and “Distributed Denial of Service” (DDoS) is always a hot topic because it could happen at any time for any Service at any Layers. To understand what a (D)DoS is, let us explain what a “service” is, what possible attacks are available and why such a denial of […]

The Future of generative AI in the Financial Sector

In just two months, ChatGPT reached 100 million users, outpacing TikTok and WhatsApp. This shows AI’s growing popularity, especially versatile generative AI. In 2024, generative AI’s influence in tech and finance is undeniable. This article looks at key generative AI trends in finance for 2024. Artificial Intelligence (AI) is a broad field that aims to […]

Patterns III – How to start

After discussing the theoretical background why patterns are useful in common IT-architectures in our first post and discussing the various levels of utilizing patterns in section two, we will now dive a little deeper and look how a pattern can be applied for a practical business problem. Requirements Let us assume we have an application […]