Red Hat's Sponsored Puff Pieces and Technical Articles
-
How to design a payments system that never fails ["This content has been created by the Finextra editorial team with inputs from subject matter experts at the funding sponsor." So Red Hat probably paid for this puff piece, then linked to it]
-
How We Built an MLOps Platform and the Lessons We Learned [Ed: "INSIGHTS FROM OUR SPONSOR"... Red Hat buying space in sites, then links to its promotional stuff from this "marketing manager"]
-
Application modernization: The importance of an opinionated workflow
In earlier discussions, we highlighted the importance of aligning modernization efforts with business outcomes and corporate strategic alignment. We also explored the challenges associated with modernizing applications in an enterprise environment, including siloed culture and unexpected regulation or policy problems. Considering these factors, it becomes clear that achieving the desired value from modernization requires an approach that takes into account enterprise-specific details. It's important to note that this approach may not always result in the ideal or perfect technical solution. To help us navigate these challenges and achieve the desired outcome, let's explore the concept of opinionated workflows.
-
Troubleshooting Open vSwitch: Is the kernel to blame?
Often, when troubleshooting Open vSwitch (OVS) in the field, you might be left wondering if the issue is really OVS-related, or if it's a problem with the kernel being overloaded. The kernel_delay.py tool can help you quickly identify if the focus of your investigation should be OVS or the Linux kernel.
-
How to integrate Spring Boot 3, Spring Security, and Keycloak
Quite some time ago, Keycloak deprecated its adapters, including OpenID connect for Java adapters. For Spring Boot developers, this means we need to use Spring Security for OpenID and OAuth2 connectivity with Keycloak instead of relying on Keycloak adapters.
In this article, we'll create a sample Java application on top of Spring Boot 3 and protect it by using Spring Security and Keycloak, without having to use Keycloak adapters.