Red Hat OpenShift Service Mesh

Kubernetes + OpenShift featured image
Article

Presenting a new Istio operator on OpenShift

Donna Smalls

Learn about a new Istio operator that will serve as the foundation for Red Hat OpenShift Service Mesh 3, bringing simplified configuration and management.

Istio
Article

Video: Introduction to Istio service mesh

Kamesh Sampath

Kamesh Sampath provides an overview of Envoy and Istio, two open source projects that will change the way you write cloud-native Java applications on Kubernetes. We’ll show how to download and set up Istio on your local laptop, then deploy Java microservices as part of the Istio service mesh with Istio sidecar proxy.

Share graphics_Introducing Istio service Mesh for Microservices
E-book

Introducing Istio Service Mesh for Microservices

Burr Sutter +1

Download the Introducing Istio Service Mesh for Microservices e-book and explore key microservices capabilities that Istio provides on Kubernetes and OpenShift.

Video Thumbnail
Video

Doing Open Source (The Right Way) by Charles Nutter

Red Hat Developer Program

Have you ever used an open source project? Of course you have, but have you made any contributions yourself? Filed a bug report? Submitted a patch? Have you ever started your own OSS project, or taken a closed/private project public? What licenses should you use? How do you manage contributions? How do you support contributors and still get work done? What do you do with difficult community members? In this talk we'll go over the basics of OSS: how to get involved, how to start a project, how to manage contributions. We'll discuss project lifecycles, legal CYA tips, and how to keep projects moving. You'll see the inner workings of real OSS projects, and learn how to be a better OSS user and producer.

Internet of things feature image
Article

Wearable Tech: A Developer’s Security Nightmare

Samantha Donaldson

Web developers and IT professionals are the foundations of any quality business’ data security. However, with technology constantly changing and evolving as well as becoming more consumer-friendly, this data’s vulnerability only increases and it can often be hard to even notice how this new technology can actually affect your company until it occurs. Despite this, ignorance to modern hacking techniques does not refute their inability to transform even the smallest of devices into a weapon with which to infect or...