Latest Added Blogs
Turning Customer Data into Strategic Advantage with Splunk MLTK
Turn customer data into strategic advantage with Splunk MLTK. Machine learning anomaly detection, security, and Splunk Enterprise Security.
Read More
Turning Customer Data into Strategic Advantage with Splunk MLTK
Turn customer data into strategic advantage with Splunk MLTK. Machine learning anomaly detection, security, and Splunk Enterprise Security.
Read More
A New Era in Security Operations with Splunk Mission Control
Unify alerts, automate response, and gain full visibility with Splunk Mission Control. Accelerate SOC efficiency—take control today!
Read More
The Power Behind Real-Time Web Applications
Learn how WebSocket and Socket.IO enable real-time features like chat, notifications, and live data in modern React and Node.js applications.
Read More
Understanding Modern Systems: End-to-End Visibility with Splunk Observability
Discover how Splunk Observability provides visibility and faster root cause analysis across systems. Start your observability journey today.
Read More
Smart Log Analysis with Splunk Machine Learning Toolkit (MLTK)
Unlock insights with Splunk’s Machine Learning Toolkit (MLTK). Detect anomalies, predict trends, optimize operations using machine data.
Read More
Export Jira Worklog Data with Python and Send It to Your Team via Email
Transfer Jira worklogs to Excel using Python and Jira API. Send via email. Save time with this detailed guide and troubleshooting tips!
Read More
Jira Time Tracking Automation with Python: Daily API and Cron-Based Solution
Automate daily time tracking using Python, Jira REST API, and cron. A quick guide to holiday-aware reporting and Teams alerts!
Read More
Cisco Meraki: As If Above the Clouds
Discover the ease, security, and performance of cloud-based network management with Cisco Meraki. Solutions that enhance efficiency.
Read More
BThaber CxO Roundtable Meeting: Continuity and Efficiency of IT Infrastructure 2
CxOs comprehensively evaluated the strategic impact of IT infrastructure on operational service quality, efficiency, and business continuity.
Read More
We Were a Sponsor of the BThaber CxO Roundtable Meeting!
As Sekom, we sponsored the BT Haber CXO Roundtable Meeting, where the digital transformation agenda was discussed.
Read More
AI Developments and OpenShift AI Platform
Discover the latest advancements in AI with the OpenShift AI platform. Get ready for the future with enterprise AI applications.
Read More
What is SD-WAN (Software-Defined Wide Area Network)?
Enhance network performance and maximize security with SD-WAN solutions. Discover details about flexible and scalable SD-WAN solutions.
Read More
Red Hat OpenShift 4.15/4.16 & Satellite 6.14/6.15: New Features
Explore the security, AI/ML, automation, and performance enhancements introduced with OpenShift 4.15, 4.16, and Satellite 6.14, 6.15 updates.
Read More
Easily Adapt to Different Solutions with Linux!
Learn how Linux powers hybrid cloud solutions with flexibility, scalability, and expert support from Sekom and Red Hat.
Read More
How to Protect Yourself Against Cyber Threats and Ransomware with RUBRIK Shield?
Learn how Rubrik’s converged backup solution protects data against ransomware with immutable storage and rapid recovery features.
Read More
Transitioning from CentOS to RHEL: Why, How? & The Impact of Sekom in the Migration Process
Explore how Sekom streamlines the transition from CentOS to RHEL, leveraging Red Hat’s robust security, scalability, and enterprise support.
Read More
Sekom Joined the Red Hat Partner Practice Accelerator Program
Sekom is making a difference in transformation by specializing in hybrid cloud solutions through the Red Hat Partner Practice Accelerator.
Read More
Cisco and Red Hat Strengthen Collaboration for Digital Transformation
Discover how Cisco and Red Hat drive transformation with AI/ML, observability, security bundles, and hybrid cloud solutions.
Read More
Red Hat OpenShift 4.12, 4.13, 4.14 Versions: New Features, Advantages, and Upcoming Developments
Discover the latest innovations and key advantages in Red Hat OpenShift 4.12–4.14. Explore the developments awaiting you in the future!
Read More
Webex Calling Cloud Security and Media Path Optimization
Optimize security and reduce latency in Webex Calling with ICE, CUBE, and KMS integration. Secure communication effectively.
Read More
ExtraHop NDR Solution: A Revolutionary Advanced Approach in Network Security
Discover how ExtraHop NDR leverages AI and machine learning for real-time threat detection, comprehensive visibility, and rapid response.
Read More
New Features in Ansible Automation Platform 2.4
Uncover the latest innovations in Red Hat AAP 2.4, including Event-Driven Ansible, ARM support, and AI-powered Ansible Lightspeed.
Read More
How to Prepare for Red Hat Exams?
Boost your skills and validate them with Red Hat’s hands-on training and certification exams. Access expert resources and lab environments!
Read More
Firewall Changes Required for Container Image Pull Operations
Red Hat is updating container image pull processes, affecting registry access. Ensure your firewall settings are configured by May 1, 2023.
Read More
Overview of Opportunities Offered Through Red Hat Training
Gain essential open-source skills with Sekom, Turkey’s Red Hat Advanced Training Partner. Explore Red Hat’s comprehensive training courses.
Read More
Traffic Management, Monitoring, and Security in Microservices Framework with Citrix ADC
Citrix ADC enhances traffic management, security, and visibility in microservices frameworks with flexible deployment options.
Read More
New “Security Context Constraints” Policies Introduced with Red Hat OpenShift 4.11
Explore SCC in Red Hat OpenShift, its default policies, security strategies, and how to manage pod permissions effectively.
Read More
Juniper BNG Solutions
Explore how Juniper MX Routers enhance BNG operations with PTA, LAC, LNS modes, IPv4/IPv6 support, and integrated CGNAT for ISPs.
Read More
Red Hat Enterprise Linux 9.1 and 8.7 Released
Discover the latest in Red Hat Enterprise Linux 9.1 and 8.7 — security enhancements, malware detection, and advanced container support.
Read More
What Do Backup and Application Mobility for Your Kubernetes Environments Provide?
Discover how Veeam and Kasten K10 streamline backup, disaster recovery, and application mobility for Kubernetes deployments.
Read More
Data Center Network Automation and Apstra Solution
Optimize EVPN-VXLAN data centers with Apstra's Intent-Based Networking. Reduce complexity, increase uptime, and monitor network health.
Read More
Sekom Offers Customized Solutions and Services to Companies
Explore how Sekom leverages cloud, data security, and Edge Computing to drive digital transformation across industries.
Read More
Red Hat Advanced Cluster Security for Kubernetes: A Comprehensive Overview
Explore how Red Hat StackRox, now Advanced Cluster Security, fortifies Kubernetes pods, runtimes, and infrastructure against threats.
Read More
OpenShift and Kubernetes Application Management Core Concepts
Discover why OpenShift is essential for Kubernetes users. Learn its core concepts, integration benefits, and deployment strategies.
Read More
What is Red Hat OpenShift Pipelines
Learn how OpenShift Pipelines, built on Tekton, automates CI/CD for cloud-native apps with containerized workflows and reusable pipelines.
Read More
We Aim to Play a Key Role in the Digital Transformation of the Public Sector
Sekom and Red Hat showcased the latest digital transformation technologies to public sector IT managers in Ankara, focusing on solutions.
Read More
Security Vulnerability in CRI-O Could Affect OpenShift Users
Crowdstrike identifies "cr8escape" exploit in CRI-O, enabling container escapes and root access. Update to version 1.23.2 for security.
Read More
Welcome to the World of Webex Calling
Seamlessly migrate your IP phones and PSTN lines to the cloud with Webex Calling - manage devices centrally and access calling features.
Read More
Red Hat OpenShift vs. Kubernetes Comparison
OpenShift simplifies container management with integrated CI/CD, security, and storage solutions, surpassing Kubernetes setups.
Read More
Cisco Meraki: Bringing the Comfort of the Office to Your Home
Enhance remote work with Cisco Meraki — improve connectivity, security, and productivity while working from home efficiently.
Read More
Cisco Webex: The Platform That Turns Your Ideal Video Conferencing Experience into Reality
Cisco Webex enhances meeting experiences with AI-driven features like real-time translation, noise removal, and immersive presenter.
Read More
Red Hat StackRox Security – Securing Cloud-Native Applications and Containers
Red Hat strengthens its DevSecOps infrastructure by acquiring StackRox, a Kubernetes-native security platform, enhancing OpenShift security.
Read More
4 Benefits of Cisco Meraki Solution – The Star of SD-WAN Technology
Discover how Cisco Meraki empowers businesses with centralized control, enhanced security, and cost-effective SD-WAN network management.
Read More
What is Red Hat OpenShift?
Leverage Red Hat OpenShift for agile, cloud-native app development. Boost efficiency, scalability, and speed with Sekom’s training expertise.
Read More
Cisco SD-WAN: A Whole New WAN Experience!
Discover how Cisco SD-WAN delivers enterprise-scale simplicity, real-time visibility, and cost savings with advanced security features.
Read More
Is Cloud Collaboration Secure? Cloud or On-Premise Solution?
Explore Cisco’s secure cloud and on-premise solutions, including DUO MFA and Cloudlock DLP, for seamless digital transformation.
Read More
Why Cisco Collaboration Solutions?
Streamline communication infrastructure with Cisco’s AI-powered solutions, integrating calling, meetings, and contact centers.
Read More
Visibility in Modern Data Centers: Discover Cisco MDS SAN Analytics
Monitor your storage network, enhance performance, and identify issues with Cisco SAN Analytics to boost efficiency in your data center.
Read More