Review of 2023

OpenSourcerers 2023 is a wrap! It was packed with interesting articles covering a wide range of topics. There are 52 articles available covering high level topics down to the dirty technical details of using Red Hat’s products and other OpenSource technologies. Your Opensourcerers blog editors followed along of course! As we come from varying backgrounds […]

Happy Holidays

Without many words, the OpenSourcerers Chief Editors wish you all a relaxing vacation period, Merry Christmas and a happy New Year! We want to take the opportunity to thank all authors, supporters and readers of our blog entries. Stay safe and healthy and stay prudent of the reindeers – and have a dance here and […]

Backstage: The Internal Developer Platform for Boosting IT Productivity

Abstract As technology rapidly advances and organizations expand, a diverse array of tools and infrastructures are being integrated into our IT ecosystems. This growth presents challenges in managing service complexity, increasing the risk of fragmentation and reduced reliability. Internal Developer Platforms (IDPs), such as the open-source Backstage, provide a solution by offering a unified layer […]

Confidentiality in a crazy world

This blog takes a log of the current state and the future of confidential computing and how it will change our perception of secure computing. Executive summary As like the opening image, companies rightfully guard their secrets like a 3 headed dog. Especially when it comes to implementing regulatory requirements. They not only fear the […]

Empowering Tomorrow’s Innovators: Red Hat’s Commitment to WRO and STEM Education

At Red Hat, we develop enterprise software through an open-source development model. This implies that communities play a pivotal role in shaping everything we do – from our products and culture to the solutions we provide to our customers. Naturally, communities are at the center of our attention, and it is in our best interest […]

What’s a (D)DoS and how to protect against such an attack – non technical.

Introduction The topic “Denial of Service” (DoS) and “Distributed Denial of Service” (DDoS) is always a hot topic because it could happen at any time for any Service at any Level. To understand what a (D)DoS is, let us explain what a “Service” is, what possible attacks are available and why such a denial of […]

Kubernetes at the Edge: MicroShift on Raspberry Pi 4 using Fedora IoT

This guide will show you how to run the newly GA’ed bits of MicroShift on a Raspberry Pi 4 using Fedora IoT 38 or 39. It can announce routes via mDNS so hosting applications in an mDNS aware LAN is a breeze. THIS IS COMPLETELY UNSUPPORTED. DON’T EVEN THINK OF RED HAT SUPPORT WHEN YOU […]

Podman Desktop Integration with MicroShift in a RHEL Virtual Machine

This blog elaborates on how to configure Podman Desktop to be used together with MicroShift in a RHEL virtual machine (VM). Please note that the presented setup is not supported by Red Hat. 1. Introduction and use case One of the challenges in software development is a difference between development environment and target production. In […]

A personal AI assistant for developers that doesn’t phone home

tl;dr It’s no surprise that developers are looking for ways to include powerful new technologies like AI Assistants to improve their workflow and productivity. However, many companies are reluctant to allow such technology due to concerns about privacy, security and IP law. This article addresses the concerns about privacy and security and describes how to […]

Patterns II – The Approach

ˈpætɚns Image source https://vecteezy.com/ Recap In the first article, we discussed the need for patterns as an architectural paradigm, in order to achieve re-usability across complex environments such as Hybrid Cloud scenarios. We identified the benefits of a pattern based approach. We talked about automation, Hybrid Cloud, and about organizational aspects We’ve learned that patterns […]