REST Architecture

“A [person] thinks that by mouthing hard words he or she understands hard things.” – Herman Melville 

 

How many times have you met with a team of engineers, architects, or even clients to talk about the designs of a software feature, and a single word used caused mass confusion because everyone had a slightly different definition? (Ugh, why are words so hard?!)

 

I have never found a more challenging concept to talk about than Representational State Transfer (REST). What does REST and being RESTful mean? Are resources the same thing as entities? Where do representations come into the mix? This blog post will answer these questions and describe the RESTful architectural style.

Continue reading “REST Architecture”

The world’s largest innovation engine works distributed and remotely!

“ When choosing a technology stack, organisations are focused first on maintaining business continuity, efficiency and, now more than ever, the adaptability and flexibility to respond to the unexpected. “

 

It’s not uncommon to see statements like this from technology companies. I couldn’t disagree more.  

 

I think all of the above is what the C-levels of any corporation already take for granted – like switching on the lights.

Continue reading “The world’s largest innovation engine works distributed and remotely!”

Customer Success beyond the stress, part 1

Introduction

Many projects can come with a series of challenges: interpersonal issues with clients, monetary restrictions, or time constraints, for example. These issues can lead to added stress, leaving individuals feeling as if they are facing an impossible task. This blog series will focus on using the Red Hat approach for helping individuals with challenging projects that help overcome rapid burnout and help individuals feel like a contributor. Seeing how one’s contribution to a project impacts the overall end goal is critical, and knowing at what point someone has maxed out that contribution can be even more important.

Continue reading “Customer Success beyond the stress, part 1”

Process Insights with Red Hat Process Automation Manager and Kibana

Red Hat® Process Automation Manager is a platform for developing containerized microservices and applications that automate business decisions and processes. A critical piece of a business process system is having real-time insights into what is happening, and both monitoring KPI metrics and responding to problem trends is an integral part of operations.

In this video, we will take a look at how we can enable integration with Elasticsearch on a Red Hat® OpenShift environment, and how to represent the KPIs in a graphical business-friendly dashboard using Kibana.

Continue reading “Process Insights with Red Hat Process Automation Manager and Kibana”

Receiving “Telegram” messages with Apache Kafka Connect on OpenShift

Do you ever heard about AMQ Streams? It is a Kafka Platform based on Apache Kafka and powered by Red Hat.  A big advantage of AMQ Streams is that as all Red Hat tools, it is prepared to run on the OpenShift platform.

This article’s about a common feature of Apache Kafka, called Kafka Connect. I’ll explain how it works with OpenShift.

Continue reading “Receiving “Telegram” messages with Apache Kafka Connect on OpenShift”

Open Practice Library Basics: Starting a New Team

Simple open practices to facilitate success for a new team

Overview

In this series, we will look at how to use the Open Practice Library to form a team, define and align the team’s goals, and deliver on those goals.

 

In this article, we’ll discuss the process of creating a new team and lay out a set of Open Practices for a firm foundation for success. All of the practices described here can also be found in the Open Practice Library.

Continue reading “Open Practice Library Basics: Starting a New Team”

Ansible to Automate Microsoft Azure

Is Edge Security a weak point

Security is a worry because Edge is perceived as a weak point that will provide hackers and malware with millions of new openings into the digital infrastructure that supports tomorrow’s global economy. Yet, although Edge security poses risks, and there are plenty of holes to fill, there are also many leading ICT companies that focus on the big picture and can provide end-to-end security both for individual devices and for the network as a whole.  

 

There are two types of security with which we must concern ourselves. The first is the security of the actual Edge devices; the second is the security of the data those devices collect and send to other points in the network. 

Continue reading “Is Edge Security a weak point”