Red Hat Middleware Blog
7 FOLLOWERS
We're the world's leading provider of enterprise open source solutions - including Linux, cloud, container, and Kubernetes. We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core data center to the network edge. Explore our middleware blog to get the latest updates and information, technology updates, features and more!
Red Hat Middleware Blog
3M ago
Application transformation is the driving force behind modernizing how an organization builds and manages applications. It fosters speed, efficiency and adaptability, and behind all of these facets, cloud-native architecture plays a crucial role.In this article, I explore the journey of creating a cloud-native application using Red Hat solutions, including Red Hat OpenShift, Red Hat Runtimes and Red Hat Quay. I outline key phases from development to production deployment, demonstrating how these tools can help organizations excel.Why application transformation mattersIn today's ever-evolving d ..read more
Red Hat Middleware Blog
5M ago
In this blog post, I will discuss how developers can work together using the integrated development environment. Red Hat OpenShift Dev Spaces uses Kubernetes and containers to provide any member of the development or IT team with a consistent, secure, and zero-configuration development environment. The experience is as fast and familiar as an integrated development environment on your laptop. Admins can define DevFile and developers can create workspace based on DevFile. Developers typically want to reduce the time to deliver the applications for business. But applications need to be flexib ..read more
Red Hat Middleware Blog
5M ago
Containerization has emerged as a game-changer for modern enterprises seeking unparalleled agility and efficiency. By containerizing JBoss EAP applications, businesses can seamlessly encapsulate their complex Java applications and their dependencies, enabling rapid deployment, scalability, and simplified management. This transformative approach empowers organizations to respond swiftly to evolving market demands, reduce deployment friction, and fully harness the exceptional performance and reliability that JBoss EAP is renowned for. Deploying a JBoss EAP application on Kubernetes involves sev ..read more
Red Hat Middleware Blog
5M ago
If you're a Java developer looking for a powerful platform to build highly transactional and scalable applications, you've come to the right place. In this article, we'll highlight the benefits of the JBoss Enterprise Application Platform and provide a detailed step-by-step guide on deploying and managing it effortlessly on OpenShift using the EAP Operator. So, let's dive in and unlock the true potential of your Java applications! What Is Red Hat JBoss Enterprise Application Platform (JBoss EAP)? JBoss EAP is an open-source platform for building highly transactional and scalable Java ..read more
Red Hat Middleware Blog
5M ago
Redhat OpenShift Service on AWS (ROSA) is a joint venture between Red Hat and AWS, providing a managed way to run OpenShift for organizations. This way the development teams can focus on innovation, and quickly build, deploy and scale applications. Learn more on ROSA homepage and ROSA on AWS marketplace. Today’s post is on how to deploy a JBoss EAP application on a ROSA environment, using the Red Hat Container registry base image. Let’s get started! Prerequisite Once you provision the ROSA cluster via AWS Management console, you will get access to Redhat OpenShift console, it will look si ..read more
Red Hat Middleware Blog
8M ago
This post series presents various forms of attestation for various Confidential Computing use cases. Confidential Computing is a set of technologies designed to protect data in use, for example using memory encryption. Data at rest (on disk) and data in transit (over the network) can already be protected using existing technologies. Attestation, generally speaking, is the process of proving some properties of a system. Attestation plays a central role in asserting that confidential systems are indeed confidential. This series focuses on four primary use cases: Confidential virtual mach ..read more
Red Hat Middleware Blog
1y ago
<p>Today we present a new way to use the <strong><a href="https://www.redhat.com/en/technologies/management/insights">Red Hat Insights</a></strong> Advisor service by <a href="https://access.redhat.com/articles/6981482">using system tags</a> to enable extended security hardening recommendations.</p> <p>Not all systems are equal. For example, a web server and a workstation have different security profiles. For systems with extended ..read more
Red Hat Middleware Blog
1y ago
<p><span><span><span><span><span><span>If you are reading this post, you will most likely know what SCADA systems are. But in case you don’t, <strong>SCADA</strong> is an acronym for Supervisory Control and Data Acquisition. SCADA systems refer to control system architectures for high-level supervision of machine processes. These architectures combine hardware (edge devices, like sensors and control valves, programmable logic controllers and remote terminal units) wit ..read more
Red Hat Middleware Blog
1y ago
Red Hat Enterprise Linux (RHEL) provides the stable foundation for advanced workloads both on-premises and in public clouds such as Microsoft Azure. For Azure, Red Hat and Microsoft have been working together to provide the tools needed to deliver workloads faster, with less effort — backed by tightly integrated, enterprise-grade support ..read more
Red Hat Middleware Blog
1y ago
As part of digital transformation, and in anticipation of the 5G evolution, service providers have found it necessary to redesign portions of the network’s layers and components, using cloudification and containerization.  ..read more