Red Hat Federation Story: Ipsilon & Keycloak… a “Clash of the Titans”

Some time ago, two different projects were started in the open source community, namely: Ipsilon and Keycloak. These projects were started by groups with different backgrounds and different perspectives. In the beginning, it seemed like these two projects would have very little in common… though both aimed to include

Continue reading “Red Hat Federation Story: Ipsilon & Keycloak… a “Clash of the Titans””

Identity Management and Application Integration

Identity management solutions integrate systems, services, and applications into a single ecosystem that provides authentication, access control, enterprise SSO, identity information and the policies related to those identities. While I have dedicated time to explaining how to provide these capabilities to Linux systems – it is now time to broaden the scope and talk a little bit about services and applications.

In some ways, services and applications are very similar. They are both usually

Continue reading “Identity Management and Application Integration”

Connecting the Dots at Linaro Connect

Red Hat has long advocated for the importance of cross-industry IT standards, with the intention of enabling ecosystems with broad industry participation and providing a common basis for innovation. Perhaps even more importantly, these standards can help drive adoption of new technologies within enterprises, pushing the cycle of innovation even further along.

With ARM being one of these emerging ecosystems, we wanted to provide a snapshot of a recent event that highlights some of the standards-based work happening in this growing community: last week’s Linaro Connect conference in Bangkok, Thailand.

Continue reading “Connecting the Dots at Linaro Connect”

Yogi Berra, Predictive Analytics, and SAP HANA Running on Red Hat Enterprise Linux for SAP HANA

Yogi Berra, the late baseball great and oft-quoted source of humorous statements about the condition of the world, once said, “It’s tough to make predictions, especially about the future.” Some of his most celebrated remarks were eerily prescient on the subject of using technology to predict the future. As many IT managers today ponder the best way forward with predictive analytics, it might be interesting to think about it from his perspective. Consider predictive analytics in the context of the following classic Yogi-isms

Continue reading “Yogi Berra, Predictive Analytics, and SAP HANA Running on Red Hat Enterprise Linux for SAP HANA”

When to Migrate: Red Hat Identity Management vs. Third-Party Solutions

Over last several months, in meetings with many Red Hat customers, I have been asked about best practices related to migration from an existing third-party identity management solution to Red Hat’s Identity Management (IdM) solution. In today’s post I will share some of my thoughts on this matter…

Continue reading “When to Migrate: Red Hat Identity Management vs. Third-Party Solutions”

Container Tidbits: Can Good Supply Chain Hygiene Mitigate Base Image Sizes?

With Docker moving all of their official images to Alpine, base image size is a hot topic.  Sure, having sane and minimal base images is important, but software supply chain hygiene is equally (if not more) important – interested to understand why?

Among other things, it’s important in a production container environment to have provenance (i.e. knowledge of where your container images came from). Using

Continue reading “Container Tidbits: Can Good Supply Chain Hygiene Mitigate Base Image Sizes?”

Back to Blogging: New Identity Management Features in RHEL 7.2

Hello again! I have not had time to blog in awhile. What happened? I picked up some additional responsibilities and these consumed a lot of my time. But now… I am back and will be blogging once again.

Time goes on and there are (many) new topics that are worth sharing with you. The first subject that I want to cover is the new Identity Management (IdM) features in Red Hat Enterprise Linux 7.2. While the release happened nearly three months ago – it’s still worth me providing an overview of new features and functionality. Another subject that people often ask about nowadays is the conversion from 3rd party vendor solutions to the IdM offering from Red Hat. We see a lot of interest in this area and I want to share some hints for when it is a good idea to use what we offer and when it might not be. Finally, there are also some emerging technologies

Continue reading “Back to Blogging: New Identity Management Features in RHEL 7.2”

The Red Hat Ecosystem for Microservice and Container Development

Over the last couple years, microservices and containers have started to redefine the software development landscape. The traditional large Java or C# application has been replaced with multiple smaller components (microservices) which coordinate to provide the required functionality. These microservices typically run inside containers, which provide isolation and portability.

This approach has numerous benefits including being able to scale and replace microservices independently as well as reducing the complexity of individual components. However, it also brings more complexity to the system level; it takes extra effort and tooling to manage and orchestrate the microservices and their interactions.

This post will describe how Red Hat technology and services can be used to develop, deploy and run an effective microservice-based system.

Continue reading “The Red Hat Ecosystem for Microservice and Container Development”

Conversations from the Field: Building a Bridge to the Cloud

Cloud conversations are evolving at a seemingly ever increasing pace. In my experience, nearly all “…what is the cloud?” type conversations have long since past. In fact, for some organizations, private and public clouds are now central to daily business operations. For the both the early and late majority, however, their (usually large) install base of traditional applications makes the cloud far from reality. These organizations tend to have significant investments in proprietary virtualization, management, and operations technologies, and it’s not a given that these applications are cloud ready (today). While many proprietary technology vendors offer re-packaged versions of existing products to create a thin veil of “cloudiness” – this style of cloud enablement usually comes at a heavy price

Continue reading “Conversations from the Field: Building a Bridge to the Cloud”

Real-Time with Less Downtime: Red Hat Enterprise Linux and SAP HANA

The information demands of today’s organizations are, in a sense, limitless. Access to more data, faster, and in more usable formats is the new standard—and for good reason. This big data holds insights that can let enterprises act more surely and quickly…and even create new opportunities. This model of instant access to information is often referred to as the real-time enterprise.

Just as importantly, IT systems and the information they provide have to be available. High availability (HA) has been an important metric for a long time and has been supported by numerous hardware and software solutions over the years. However, the definition has gotten tighter as the digital, always-on economy has become more pervasive. Hence the term “five-nines,” (i.e. 99.999 percent uptime) has become commonplace.

Real-time is good, it’s cool, and it enables the future. But uptime is a requirement. So one question that business and technical leaders need to answer before moving to a modern database platform is “what are the trade-offs, if any, between real-time and uptime?”

Continue reading “Real-Time with Less Downtime: Red Hat Enterprise Linux and SAP HANA”