Red Hat OpenShift Data Foundation

Featured image for ML with OpenShift
Article

Implement AI-driven edge to core data pipelines

Bruno Meseguer

The Edge to Core Pipeline Pattern automates a continuous cycle for releasing and deploying new AI/ML models using Red Hat build of Apache Camel and more.

Page Thumbnail
Page

All Development topics

Insights and news on Red Hat developer tools, platforms, programming languages, and more. Explore what is trending now.

OpenShift in the public cloud graphic
Article

Multi-cloud storage strategies for SaaS applications

Michael Hrivnak

Learn how a Kubernetes platform with software-defined storage supports a multi-cloud strategy for SaaS applications that run in the same physical locations as end customers' data.

Page Thumbnail
Page

DevNation Day 2020

DevNation Day is a free, all-day immersive virtual experience created to bring you the most exciting developer and technology updates. It will cover four topics areas: Kubernetes/OpenShift, JavaScript, Python, and Java. You will hear from Red Hat Developer experts as well as leaders from across a number of companies and industries, including Google, MongoDB, Redis, Snyk, Tail, Auth0, Ionic, and more. Stay up-to-date on the latest technologies from the comfort of your own desk, and interface with our speakers through polls, chats, and on-stage participation. We look forward to ‘seeing’ you there!

Page Thumbnail
Page

Contact Sales

Contact Sales - Red Hat Developer

Page Thumbnail
Page

DevNation

The place for all things DevNation. Join developers across the globe for live and virtual events led by the Red Hat technologists who create our products. Sessions include weekly tech talks, deep dives on key developer topics, and live events.

Page Thumbnail
Page

All products page

Red Hat software downloads and more for developers

Internet of things feature image
Article

Wearable Tech: A Developer’s Security Nightmare

Samantha Donaldson

Web developers and IT professionals are the foundations of any quality business’ data security. However, with technology constantly changing and evolving as well as becoming more consumer-friendly, this data’s vulnerability only increases and it can often be hard to even notice how this new technology can actually affect your company until it occurs. Despite this, ignorance to modern hacking techniques does not refute their inability to transform even the smallest of devices into a weapon with which to infect or...