Everyone knows that building containers is easy. Or is it? Have you ever wondered if it’s too easy? Are you following all the “best practices?” Which ones are relevant? What about security considerations?
Open source thrives on exploration and expansion—and collaboration makes it possible.
Avoid the pitfalls of starting an API initative without a structured approach by considering what you want to achieve. With a structured API strategy, you'll magnify the success of your API programs.
Security has never been a more important topic. Red Hat has been a leader in open source security for more than a decade, pushing for open standards and supporting security technologies throughout our products.
The last day of Red Hat Summit 2018 starts with a continuation of the day 1 infrastructure demo, adding automation and management tools to load balance deployments across the hybrid cloud.
As the world of Tensorflow (an open source software library for dataflow programming across a range of tasks) and K8s (Kubernetes, an open source orchestration framework for containerized applications) come together there is a need for a consistent development workflow, model management, and stre
Red Hat OpenShift is an amazing, award-winning tool for application developers. It is also a great management tool for operations teams due to its built-in power, flexibility, and scalability.
Now that CoreOS has joined Red Hat, what does the future hold for Container Linux? What about Red Hat Enterprise Linux Atomic Host? Will there be four Linux distributions in the Red Hat family?
As we build distributed systems, break apart monoliths, and move to cloud, one of the biggest challenges is handling the network. Service meshes abstract the network away from your application, providing visibility, reliability, resiliency, and security transparently to applications.
At last year's Red Hat Summit, we outlined the security roadmap strategy and vision for Red Hat OpenStack Platform. Since then, significant security advances have been made. In this session, we'll share what's new in key management, encryption at rest and in flight, compliance, and more.