Data Science: Deploy machine learning (ML) workloads
Managed cloud services provide stable training and workload platforms for development.
What's new in Data Science?

Article
4 essentials to prevent OS command injection attacks
Learn about OS command injection attacks and 4 essential best practices to prevent them.

Article
Building machine learning models in the cloud
Get hands-on resources for building machine learning models using Red Hat OpenShift Data Science. Learn how to use NLP, Jupyter notebooks, and more.

Article
AI software stack inspection with Thoth and TensorFlow
Learn how Thoth gathers and analyzes data to create advice through a case study about a recent runtime issue inspection when importing TensorFlow 2.1.0.

Article
Five layers of security for Red Hat Data Grid on OpenShift
This article talks about multiple layers of security available while deploying Red Hat Data Grid on OpenShift. The layers of security offer a combination of security measures provided by Data Grid as well as by OpenShift/Kubernetes.

Article
Wearable Tech: A Developer’s Security Nightmare
Web developers and IT professionals are the foundations of any quality business’ data security. However, with technology constantly changing and evolving as well as becoming more consumer-friendly, this data’s vulnerability only increases and it can often be hard to even notice how this new technology can actually affect your company until it occurs. Despite this, ignorance to modern hacking techniques does not refute their inability to transform even the smallest of devices into a weapon with which to infect or...