-
Own Your Big Data Infrastructure With the Hadoop Service Bundle
In this blog, Senior Product Manager Matthew Weier O'Phinney explains why OpenLogic created the Hadoop Service Bundle, and the benefits of switching from proprietary platforms to a fully
-
RHEL Source Code Restriction: What It Means for Rocky Linux and AlmaLinux
On June 21, 2023, Red Hat announced changes in access to RHEL source code, impacting downstream rebuilds like AlmaLinux and Rocky Linux. Read about what this means for those Linux
-
Now Available: Full Data Set From 2023 State of Open Source Report
Explore the full data set from the 2023 State of Open Source Report.
-
5 Apache Tomcat Performance Tips
In this blog, our expert discusses the top Apache Tomcat performance best practices enterprises can employ for big performance improvements.
-
A Guide to Application Logging in Tomcat
In this blog, our expert explains the types of Tomcat logs and configuration best practices, as well as common mistakes with application logging in Tomcat.
-
AngularJS Overview: History, Features, Alternatives, and EOL Support
In this blog, our expert gives an overview of the development history of AngularJS, explaining key features, how it compares to similar frameworks, and support options for those running
-
PostgreSQL vs. MongoDB: Features and Benefits Comparison
In this blog, our open source database expert compares PostgreSQL vs. MongoDB, with comparisons on performance, scalability, and potential use cases.
-
Using Apache Kafka for Stream Processing: Common Use Cases
Using Apache Kafka for stream processing is a popular option for teams who want to manage and route their streaming data. Get details, including use cases, in this blog.
-
Open Source Support Vendor Consolidation Is Possible
In this blog, our expert details the advantages of open source vendor consolidation and the benefits of a unified and consolidated support strategy.
-
Best Practices for Web Server Security
In this overview of web server security, learn best practices and steps for securing your web server and what the most common types of attacks are.