How to implement a cloud-native application architecture
Red Hat Middleware Blog
by
3M ago
Application transformation is the driving force behind modernizing how an organization builds and manages applications. It fosters speed, efficiency and adaptability, and behind all of these facets, cloud-native architecture plays a crucial role.In this article, I explore the journey of creating a cloud-native application using Red Hat solutions, including Red Hat OpenShift, Red Hat Runtimes and Red Hat Quay. I outline key phases from development to production deployment, demonstrating how these tools can help organizations excel.Why application transformation mattersIn today's ever-evolving d ..read more
Visit website
Red Hat OpenShift Dev Spaces - A consistent, more secure collaborative development environment
Red Hat Middleware Blog
by
5M ago
In this blog post, I will discuss how developers can work together using the integrated development environment. Red Hat OpenShift Dev Spaces uses Kubernetes and containers to provide any member of the development or IT team with a consistent, secure, and zero-configuration development environment. The experience is as fast and familiar as an integrated development environment on your laptop. Admins can define DevFile and developers can create workspace based on DevFile. Developers typically want to reduce the time to deliver the applications for business. But applications need to be flexib ..read more
Visit website
How to Containerize EAP with Move2Kube and Deploy on EKS
Red Hat Middleware Blog
by
5M ago
Containerization has emerged as a game-changer for modern enterprises seeking unparalleled agility and efficiency. By containerizing JBoss EAP applications, businesses can seamlessly encapsulate their complex Java applications and their dependencies, enabling rapid deployment, scalability, and simplified management. This transformative approach empowers organizations to respond swiftly to evolving market demands, reduce deployment friction, and fully harness the exceptional performance and reliability that JBoss EAP is renowned for. Deploying a JBoss EAP application on Kubernetes involves sev ..read more
Visit website
Streamlining Enterprise Application Deployment with the EAP Operator: A Beginner's Guide
Red Hat Middleware Blog
by
5M ago
If you're a Java developer looking for a powerful platform to build highly transactional and scalable applications, you've come to the right place. In this article, we'll highlight the benefits of the JBoss Enterprise Application Platform and provide a detailed step-by-step guide on deploying and managing it effortlessly on OpenShift using the EAP Operator. So, let's dive in and unlock the true potential of your Java applications! What Is Red Hat JBoss Enterprise Application Platform (JBoss EAP)? JBoss EAP is an open-source platform for building highly transactional and scalable Java ..read more
Visit website
How to deploy JBoss EAP for Red Hat OpenShift Service on AWS (ROSA)
Red Hat Middleware Blog
by
5M ago
Redhat OpenShift Service on AWS (ROSA) is a joint venture between Red Hat and AWS, providing a managed way to run OpenShift for organizations. This way the development teams can focus on innovation, and quickly build, deploy and scale applications. Learn more on ROSA homepage and ROSA on AWS marketplace. Today’s post is on how to deploy a JBoss EAP application on a ROSA environment, using the Red Hat Container registry base image. Let’s get started! Prerequisite Once you provision the ROSA cluster via AWS Management console, you will get access to Redhat OpenShift console, it will look si ..read more
Visit website
Learn about Confidential Computing Attestation
Red Hat Middleware Blog
by
8M ago
This post series presents various forms of attestation for various Confidential Computing use cases. Confidential Computing is a set of technologies designed to protect data in use, for example using memory encryption. Data at rest (on disk) and data in transit (over the network) can already be protected using existing technologies. Attestation, generally speaking, is the process of proving some properties of a system. Attestation plays a central role in asserting that confidential systems are indeed confidential. This series focuses on four primary use cases: Confidential virtual mach ..read more
Visit website
Using system tags to enable extended security hardening recommendations
Red Hat Middleware Blog
by
1y ago
<p>Today we present a new way to use the <strong><a href="https://www.redhat.com/en/technologies/management/insights">Red Hat Insights</a></strong> Advisor service by <a href="https://access.redhat.com/articles/6981482">using system tags</a> to enable extended security hardening recommendations.</p> <p>Not all systems are equal. For example, a web server and a workstation have different security profiles. For systems with extended ..read more
Visit website
Modernizing SCADA system interfaces
Red Hat Middleware Blog
by
1y ago
<p><span><span><span><span><span><span>If you are reading this post, you will most likely know what SCADA systems are. But in case you don’t, <strong>SCADA</strong> is an acronym for Supervisory Control and Data Acquisition. SCADA systems refer to control system architectures for high-level supervision of machine processes. These architectures combine hardware (edge devices, like sensors and control valves, programmable logic controllers and remote terminal units) wit ..read more
Visit website
Deploy enterprise applications on Red Hat Enterprise Linux in Microsoft Azure
Red Hat Middleware Blog
by
1y ago
Red Hat Enterprise Linux (RHEL) provides the stable foundation for advanced workloads both on-premises and in public clouds such as Microsoft Azure. For Azure, Red Hat and Microsoft have been working together to provide the tools needed to deliver workloads faster, with less effort — backed by tightly integrated, enterprise-grade support ..read more
Visit website
API Management (3scale): The service provider use case
Red Hat Middleware Blog
by
1y ago
As part of digital transformation, and in anticipation of the 5G evolution, service providers have found it necessary to redesign portions of the network’s layers and components, using cloudification and containerization.  ..read more
Visit website

Follow Red Hat Middleware Blog on FeedSpot

Continue with Google
Continue with Apple
OR