The Benefits of Open Source Edge Solutions in Rail Transportation 

This article was originally featured on the Red Hat blog. You can read the original in its entirety by clicking HERE. Railway systems have been around for centuries and serve as a highly cost-effective method for freight delivery and rail…

6 Security Tips for Open Source Developers

For many, writing a computer program isn’t that hard—it simply requires a certain amount of structural and logical thinking and a clear understanding of the syntax of the language you are using. Developing software with a greater security posture adds an…

How UTSA Transformed its Student Service Infrastructure

The University of Texas at San Antonio (UTSA) is a critical gateway to higher education and career success for young people across the state of Texas. For Kendra Ketchum, UTSA Vice President for Information Management and Technology, helping students advance…

Four Government Use Cases for Edge Automation

This post is part of a larger article that was originally featured on the Red Hat blog. To read the original in its entirety, click HERE. Edge computing is computing that takes place at or near the physical location of either…

 

Recent News

Four Benefits of Application Performance Optimization

As the waves of digital transformation continue to spread across and reach all corners of…

An introduction to automation mesh

This article is part of a larger piece that was originally featured on the Red…

Four Ways Modernization Adds Value

This article is part of a large piece originally published on the Red Hat blog.…

Seven Reasons Why Modernization is Hard

This article was originally featured on the Red Hat blog. To read the original in…

Modernization: why is it important?

This article is part of a larger piece that was originally featured on the Red…

The Monstrous Challenge of Modernizing Monolithic Systems

The COVID-19 pandemic drove massive digital transformation across both the private sector and the federal…

5 Use Cases for Event-Driven Automation

This article originally was featured on the Red Hat blog. Click HERE to read the…

Gartner Study Finds Adoption of Containerized Databases Increasing

This article was originally published on the Red Hat Blog. Click HERE to read the…

Exploring the Benefits and Challenges of Adopting DevSecOps at Kessel Run

In the last two episodes of the ContinuousX Podcast, hosts Rick Stewart and Mike Fitzurka…

Finding a Modern Approach to Application Delivery

This article was originally featured on the Red Hat blog. To read the original in…

Coldbrew, Ping-Pong, and DevSecOps – a Recipe for Success at Kessel Run

Kessel Run, the operational name for the Air Force Life Cycle Management Center’s (AFLCMC) Detachment…

Five government trends from Red Hat’s State of Enterprise Open Source report

This article was originally published on the Red Hat Blog. Click here to read the…

Newsletter

Enter your email address below to receive all the latest content to your inbox.

Please view our privacy policy and terms of use for more information on how we protect and manage your personal data.

Sponsored By
Powered by

 

 

 

We launched GovDevSecOpsHub to focus on the next evolution of application development, DevSecOps, which brings cybersecurity teams and tools into the development process sooner so that applications are more secure and safeguarded against cyber threats.

In  GovDevSecOpsHub we’ll look at the evolution from traditional software and application development to the DevOps model. We’ll talk about the importance of moving from DevOps to DevSecOps. We’ll highlight the technologies and cultural changes necessary to make this shift happen. And we’ll profile government organizations and executives that are the “boots on the ground” as the government pivots towards the DevSecOps model.