Language Selection

English French German Italian Portuguese Spanish

Red Hat: Red Hat Summit 2018, IBM, and Cloudwashing

Filed under
Red Hat
  • View from the airport: Red Hat Summit 2018

    Red Hat proves it's a force to be reckoned with in the hybrid space

    Red Hat's annual meet is a chance for the company and its customers, to celebrate all things open source; yet this year's summit was about something more important.

    With the weight of 25 years behind it, the pressure was on the company to make a bold stand, proving to the industry that it can ward against the likes of Amazon and other goliaths looking to wrestle control of the highly lucrative hybrid cloud market.

    The past few days have proved one thing. Red Hat is poised to become the dominant force in hybrid cloud and open source.

  • IBM, Red Hat expand cloud alliance

    The agreement builds on IBM’s recent move to re-engineer its entire software portfolio with containers, including WebSphere, MQ Series and Db2. Container technologies are fast becoming a safe and reliable way to move applications across multiple IT footprints, from existing data centres to the public cloud and vice versa. Going hand-in-hand with IBM’s shift to containerised software, is Red Hat’s expansive portfolio of enterprise-grade, cloud-native, and hybrid cloud infrastructure solutions, which, when combined, provide a clear pathway for enterprises to adopt hybrid cloud computing.

  • Red Hat lists companies that have deployed full open hybrid cloud infrastructure

    Red Hat, Inc. has announced that organizations across the globe including Banco Multiva; Genesys; and UKCloud have deployed a fully open hybrid cloud infrastructure based on Red Hat technologies. By implementing the Linux container and Kubernetes-based Red Hat OpenShift Container Platform on massively-scalable cloud infrastructure offered through Red Hat OpenStack Platform, these organizations are accelerating their digital transformations with infrastructure that is designed to be as flexible and automated as the workloads running on it.

  • Why Amazon and Red Hat are the two biggest winners in enterprise cloud

    In picking winners in the cloud wars, Amazon Web Services (AWS) is the most obvious choice. As the resident hegemon, it's hard to argue with a company that has accelerated its growth over the past two quarters on top of a run-rate that dwarfs that of all other vendors...combined.

More in Tux Machines

Ubuntu, Debian, RHEL, and CentOS Linux Now Patched Against "Foreshadow" Attacks

Both Canonical and Red Hat emailed us with regards to the L1 Terminal Fault security vulnerability, which are documented as CVE-2018-3620 for operating systems and System Management Mode (SMM), CVE-2018-3646 for impacts to virtualization, as well as CVE-2018-3615 for Intel Software Guard Extensions (Intel SGX). They affect all Linux-based operating system and machines with Intel CPUs. "It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker in a guest virtual machine could use this to expose sensitive information (memory from other guests or the host OS)," reads the Ubuntu security advisory. Read more

Hands-on with Linux Mint Debian Edition 3 Beta

I have been out of touch for the past six months, because I accepted a teaching position in Amsterdam. The amount of time that required, and the weekly commute from Switzerland (yes, really, weekly), was vastly more than I expected, and left me no time to do justice to my blog. But now I am back again, and determined to manage my time more effectively and keep up with blogging. Although I haven't been writing, I certainly have been keeping up with news and developments in the Linux world. What really inspired me to get busy and write again was the announcement of LMDE 3 (Cindy) Beta. Hooray! How long have we been waiting for this? It feels like years. Oh, that's because it has been years. Read more

Security Leftovers

  • Theo on the latest Intel issues

    Theo de Raadt (deraadt@) posted to the tech@ mailing list with some background on how the latest discovered Intel CPU issues relate to OpenBSD.

    [...]

    These 3 issues (CVE-2018-3615, CVE-2018-3620, CVE-2018-3646) together are the currently public artifacts of this one bug.

  • Putting Stickers On Your Laptop Is Probably a Bad Security Idea

    Mitchell said political stickers, for instance, can land you in secondary search or result in being detained while crossing a border. In one case, Mitchell said a hacker friend ended up missing a flight over stickers.

  • Video Shows Hotel Security at DEF CON Joking About Posting Photos of Guests' Belongings to Snapchat

    But the room check captured on video suggests the walkthroughs are subject to abuse by hotel personnel who may use them as opportunity to snoop on guests or take and post images for amusement. And accounts of other searches that involved hotel security staff refusing to show ID or showing insufficient ID, and displaying bullying and threatening behavior to guests in occupied rooms, raises questions about the legality of the searches and the tactics and training of security personnel.

  • Researchers in Finland detect vulnerability in password management software
    Researchers identified a security gap in more than 10 applications used by millions around the world, including an app used by Finland's population registry.
  • Trump ends Obama-era rules on US-led cyberattacks: report
     

    The memorandum required that an extensive interagency process take place before the U.S. government embarks on any cyberattacks. Trump reversed the rules to try and ease some of those restrictions, which critics argued were detrimental to launching the attacks quickly, according to the Journal.

Android Leftovers