Avatar photo
By: Vince Matev

November 22, 2023 6:13 pm

573 views

Sebastian Martinez
By: Sebastian Martinez

November 6, 2023 3:49 pm

1,545 views

Why SAP Cloud Adoption Needs a Supported and Secure Enterprise Kubernetes Infrastructure On-Premises to Run Integration Processes

When you run your SAP on-premises, nobody doubts you need a dedicated, certified Linux environment with enterprise support to run this business-critical application. But what happens when you need to run the new containerized SAP Integration Suite component on-premises? Why an enterprise-supported Kubernetes like SUSE’s Rancher Prime is needed and why you should consider […]

Read More


Avatar photo
By: Raul Mahiques

November 5, 2023 7:46 pm

1,246 views

CAPI, Fleet And GitOps: A New Way For Orchestrating Kubernetes Clusters With Rancher

Introduction In this blogpost we will show how to use one of the new and interesting features Rancher 2.8 brings, Rancher Turtles, it will help you deploy clusters using Cluster API (CAPI). It is an addition to the existing methods for deploying Kubernetes clusters using Rancher and it’s currently in early access technology […]

Read More


Avatar photo
By: Sherry Yu

November 5, 2023 5:30 am

1,198 views

New SAP Solutions on Azure by SLES for SAP Applications

SUSE collaborates with Microsoft Azure to secure and safeguard the SAP landscape. Last year we published a blog post with an overview of the high availability solutions on Microsoft Azure by SLES for SAP Applications. Recently several new solutions have been released to help customers reduce downtime and enhance security. High Availability Solutions In the […]

Read More


Avatar photo
By: Raul Mahiques

October 31, 2023 1:09 pm

1,451 views

Confidential Cloud: Introduction to Confidential Computing

Introduction In this blog series, we will embark on a journey into the realm of Confidential Computing, CoCo for friends. Our goal? To help you gain a better understanding of it.   What is confidential computing about? If we seek a definition for 'Confidential Computing,' Wikipedia provides us with the following: “a […]

Read More


Avatar photo
By: Miriam Kang

October 30, 2023 6:05 pm

1,502 views

Three Reasons to Connect with SUSE at HPE Discover Barcelona

This blog is posted on behalf of Bob Fidrych, Global Alliance Director at SUSE for HPE As HPE Discover Barcelona fast approaches, I wanted to share three highlights that you can expect from SUSE, a silver sponsor of the event. Revolutionize your edge operations In today's fast-paced digital landscape, the demand for streamlined operations is […]

Read More


Avatar photo
By: eich@suse.com

October 30, 2023 8:20 am

1,356 views

Simplify GPU Application Development with HMM on SLES or SLE HPC 15 SP5

Recently, NVIDIA has introduced Heterogeneous Memory Management (HMM) in its open source kernel drivers which simplifies GPU Application Development with CUDA. It unifies system memory access across CPUs and GPUs and removes the need to copy memory content between CPU and GPU memory. It extends Unified Memory to cover both system allocated memory as well […]

Read More


Avatar photo
By: dkatsoli@suse.com

October 26, 2023 6:09 pm

1,026 views

Successful SAP Validation for Running HANA on SLES15 SP4 KVM Hypervisor with Intel Cascade Lake CPUs

  As the newest member of the SUSE Product Management Team for SAP Solutions, I am delighted to announce that SUSE Linux Enterprise Server for SAP Applications 15 SP4 is now validated for running SAP HANA on KVM hypervisor on Intel Cascade Lake CPUs.  Customers can now run SAP HANA on SUSE KVM hypervisor […]

Read More


Avatar photo
By: SUSE

October 25, 2023 4:06 pm

1,150 views

What is Container Security?

Introduction to Container Security Container security is a critical aspect in the domain of modern software deployment and development. At its core, container security involves a comprehensive framework comprised of policies, processes, and technologies that are specifically designed to protect containerized applications and the infrastructure they run on. These security measures are implemented throughout the […]

Read More