Day: February 15, 2023

Red Hat

How to Create a Trusted Software Supply Chain with Sonatype and OpenShift

Get your espresso ready for another EMEA OpenShift Coffee Break as Paul Smith, Solutions Architect at Sonatype, talks about how Sonatype combined with Red Hat OpenShift creates synergies and an automated process that encourages component integrity and provides enhanced security features.

Read More
Security

Denial of Service Attacks Explained

Denial of Service attacks are one of the many tactics malicious actors may use. In this video Jeff Crume explains the different types of DoS attacks and what kind measures can be taken to mitigate the threat posed by these kinds of attacks. This video is from IBM Technology.

Read More
AI Generative AI

How to Create Your Own AI Animated Avatar: A Step-by-Step Guide

Prompt Engineering teaches us how to create your own AI avatar with cutting-edge AI tools and techniques. Our AI avatar was created using MidJourney, Chat GPT, ElevenLabels, and D-ID, and you’ll see how you can use these tools to bring your own avatar to life. Get ready to explore the exciting world of AI and see […]

Read More
Linux

How Logging and Observability Work in Openshift

OpenShift TV hosts Jamie Parker, product manager for OpenShift logging, to discuss the changes which have been happening with the logging service. Want to learn more? Try Red Hat OpenShift: https://red.ht/3uVxkya

Read More