Red Hat Quay

containers
Article

How to use Red Hat Quay as a proxy cache

Ahmed Bashir

Learn to configure Red Hat Quay's proxy cache for on-demand image pulls from remote registries, boosting container distribution.

Internet of things feature image
Article

Wearable Tech: A Developer’s Security Nightmare

Samantha Donaldson

Web developers and IT professionals are the foundations of any quality business’ data security. However, with technology constantly changing and evolving as well as becoming more consumer-friendly, this data’s vulnerability only increases and it can often be hard to even notice how this new technology can actually affect your company until it occurs. Despite this, ignorance to modern hacking techniques does not refute their inability to transform even the smallest of devices into a weapon with which to infect or...