Blog
Establishing a Secure Pipeline
In a recent post we walked through using Tekton and Cosign to build, sign and verify container images within Kubernetes. Red Hat utilizes OpenShift, signing and scanning in its own build systems to deliver release artifacts. Red Hat’s secure software delivery is...
Signing Images
The release of Kubernetes 1.24 includes signed images, which highlights the importance of delivering secure images. Whether container images are being distributed to customers or run within your own datacenters, you must ensure that the assets within the software have...
The Future of AI, Security, and the Edge
In recent years, “edge devices” have evolved from simple IoT sensors to autonomous drones driven by powerful artificial intelligence (AI) software. Similarly, the processes to develop and deploy AI software to “the edge” have also seen a rapid evolution. Today, data...
Get Ready for Red Hat NEXT! 2022
Are you a CTO, CISO, CDO, or thought leader responsible for open source strategy for your company? If so, don’t miss out on Red Hat NEXT! This is Red Hat’s annual event for deep dives on all things Emerging Technologies, coming up on September 15th. This year’s...
FetchIt: Life-cycling and configuration of containers using GitOps and Podman
GitOps is a great solution for continuous delivery of Kubernetes applications, as it’s based on Git, a tool that many if not all developers are familiar with. Developers can manage deployed applications by storing their desired state in Git and reap the benefits, such...
The UOR Framework
Universal Object Reference (UOR) is a radically different approach to serverless and decentralized systems. The term “everything is an object” may be familiar to some. It is typically used to convey a fundamental object-oriented programming concept. We can also apply...
Developing Circuits Using the Qiskit Operator: Quantum on OpenShift, Part Two
Quantum computing is an emerging paradigm in computer science which aims to bridge gaps in problems that classical computers, meaning those that follow the traditional deterministic model of computing, have difficulty solving. Building off of our previous post,...
Sharding for Security and Scalability
Rekor, sigstore’s transparency log, recently reached an important milestone in its v0.6 release: it now supports log sharding. Log sharding means that the entries associated with a single Rekor server can now be distributed among multiple backend logs, which...
Introducing MicroShift
Exploring a small form factor OpenShift designed for field deployed edge computing devices Edge Computing spans a broad range of use cases and deployment models. On one end, it can refer to micro data centers located in controlled environments that are formed by a...
Collecting and Visualizing OpenTelemetry Traces
Note: Red Hat’s Emerging Technologies blog includes posts that discuss technologies that are under active development in upstream open source communities and at Red Hat. We believe in sharing early and often the things we’re working on, but we want to note that unless...