Language Selection

English French German Italian Portuguese Spanish

Red Hat

Red Hat's Surveillance-Centric Alliance (Open Hybrid Architecture) and Dip

Filed under
Red Hat

Red Hat News: IBM, Ansible Tower, Federal Source Code Policy and More

Filed under
Red Hat
  • Hortonworks, IBM & Red Hat Partner on Open Hybrid Architecture Initiative

    Hortonworks (Nasdaq: HDP), IBM (NYSE: IBM) and Red Hat (NYSE: RHT) have entered into a partnership in an effort to help customers utilize hybrid cloud environments to field and run big data workloads, ExecutiveBiz reported Tuesday.

    Red Hat said Monday the collaborative Open Hybrid Architecture Initiative aims to develop a common enterprise deployment model for big data workloads and utilize the Red Hat OpenShift enterprise container and Kubernetes platform to support Hortonworks Data Platform, Hortonworks DataFlow, Hortonworks DataPlane and IBM Cloud Private for Data.

  • Red Hat Announces Red Hat Ansible Tower 3.3

    Red Hat, Inc. recently introduced Red Hat Ansible Tower 3.3 - the newest iteration of its enterprise framework for automating and orchestrating IT operations. Red Hat Ansible Tower 3.3 gets improved scaling and the ability to run Ansible Tower on Red Hat OpenShift Container Platform, enterprise-grade Kubernetes container application platform, and an updated user interface.

  • IBM Relies on Kubernetes to Advance Analytics Strategy

    IBM this week extended the reach of the IBM Cloud Private (ICP) for Data platform to include the Red Hat OpenShift platform based on Kubernetes. ICP also aligns with Red Hat and Hortonworks on the Open Hybrid Architecture Initiative for building hybrid big data applications on the Red Hat OpenShift platform.

    In addition, IBM today announced it has extended ICP for Data to enable analytics queries to access data anywhere, by leveraging container-based technologies.

  • Innovation, we deliver! The Red Hat Mobile Portfolio Center is on the move

    Pay attention when you’re driving - you might just see Red Hat’s Shadowman in the next lane. You see, innovation is on the move at Red Hat! Or as Program Manager, Chris Hawver would say – the Mobile Portfolio Center (MPC) – is bringing Red Hat’s innovative solutions to the customer at venues near their offices.

    The annual Red Hat Summit, or the Red Hat Executive Briefing Centers around the globe, are great ways to catch up with the latest from Red Hat. But, due to travel and scheduling constraints, many of our customers miss those opportunities. So we’re expanding our reach with the MPC. We have many more stops planned as part of this initiative, there is a good chance the MPC is coming to a venue near you.

  • Red Hat’s OPEN FIRST road tour rolls on -- and into D.C.

    Two years ago, the U.S. government took an important step towards its technological future. The issuance of the Federal Source Code Policy in 2016 called for “efficiency, transparency, and innovation through reusable and open source software.” Since then, a number of important programs and initiatives have been created, including Code.gov, code.mil and others.

    Yet we believe there is still a significant amount of untapped potential for open source in government. That’s why we have created the Red Hat OPEN FIRST Road Tour, a nationwide seminar series aimed at bringing the open source discussion to government leaders across the U.S.

  • Futures Directions for Red Hat, Inc. (RHT)
  • Flagship Harbor Advisors LLC Grows Holdings in Red Hat Inc (RHT)
  • Financial Review: Red Hat (RHT) vs. Weibo (WB)
  • Fedora: LibreOffice remote connection.

Red Hat Business News

Filed under
Red Hat

Red Hat and Fedora Leftovers

Filed under
Red Hat
  • [Podcast] PodCTL #49 – Security & Service Meshes

    As we use PodCTL to help educate the market on Containers, Kubernetes and associated technologies, we’ve found that Service Meshes (and Istio) are one of the most popular topics. While it’s still a newer technology, just recently achieving v1.0 GA, we find that many people want to learn more. So this week we went deeper on how the discussion around Security begins to integration with Service Meshes, with John Morello (CTO, Twistlock).

  • Red Hat infrastructure platforms to data analytics workloads: "Welcome!"

    You’ve heard the adage that every company now is a software company. The fuel that drives it is data.

    By the same token, many enterprises are considering cloud-native technologies based on Kubernetes and microservices for business innovation. However many enterprises dealing with extremely large data sets have not been able to run data analytics applications on the same IT infrastructure running the rest of their workloads.

  • Deploying a React App with an Express Backend on OpenShift
  • Flock- 2018

    I attended Flock this year which is the Fedora Project's annual contributor-focused conference. This was my first Flock and it turned out be one of the best conferences I have attended so far.

Red Hat News (Financial Results Imminent)

Filed under
Red Hat

Hortonworks, IBM, Red Hat Team Up on Open Hybrid Architecture

Filed under
Red Hat

Systemd, Red Hat's Marketing as Podcast, Microsoft EEE, Upcoming Financial Results and More

Filed under
Red Hat

Red Hat: OpenShift, Al Zollar, Microservices, Matthew Miller of Fedora and More

Filed under
Red Hat

Red Hat Development and News

Filed under
Red Hat

Red Hat and Fedora News

Filed under
Red Hat
  • Cloudera Launches Modular IoT Architecture with Red Hat and Eurotech

    Cloudera, Inc., together with Red Hat and Eurotech, recently launched an end-to-end, open source Internet of Things (IoT) architecture. This empowers enterprises with a modern IoT architecture that is not only secure but also scalable and technologically advanced sans the vendor lock-in. Cloudera with Red Hat and Eurotech collaborated to create an end-to-end architecture underpinned by open standards and is integrated, flexible and operates on the hybrid- or multi-cloud environments. This architecture is aimed at delivering the basic components that organizations need to swiftly and safely launch IoT use cases.

  • Active Volume Stock Update: Red Hat, Inc. (NYSE:RHT)
  • GAM Holding AG Acquires Shares of 2,300 Red Hat Inc (RHT)
  • On Flatpak dependencies

    Package managers have to deal with dependencies – too many of them. Over time things have gotten complicated: there are now soft dependencies, reverse dependencies and boolean conditions. So complicated that you can probably do general computation in the dependency solver now.

    [...]

    There is still more fine-tuning to be done. For example, Flatpak will happily use a runtime from the system installation to run an application from the user installation. But the uninstall command works only on a single installation, so it does not see these dependencies, and might remove the runtime. Thankfully, it is easy to recover, should this happen to you: just install the runtime again.

  • FPgM report: 2018–36
Syndicate content

More in Tux Machines

Debian Patches for Intel's Defects, Canonical to Fix Ubuntu Security Flaws for a Fee

  • Debian Outs Updated Intel Microcode to Mitigate Spectre V4 and V3a on More CPUs
    The Debian Project released an updated Intel microcode firmware for users of the Debian GNU/Linux 9 "Stretch" operating system series to mitigate two of the latest Spectre vulnerabilities on more Intel CPUs. Last month, on August 16, Debian's Moritz Muehlenhoff announced the availability of an Intel microcode update that provided Speculative Store Bypass Disable (SSBD) support needed to address both the Spectre Variant 4 and Spectre Variant 3a security vulnerabilities. However, the Intel microcode update released last month was available only for some types of Intel CPUs, so now the Debian Project released an updated version that implements SSBD support for additional Intel CPU models to mitigate both Spectre V4 and V3a on Debian GNU/Linux 9 "Stretch" systems.
  • Announcing Extended Security Maintenance for Ubuntu 14.04 LTS – “Trusty Tahr” [Ed: Canonical looking to profit from security flaws in Ubuntu like Microsoft does in Windows.]
    Ubuntu is the basis for the majority of cloud-based workloads today. With over 450 million public cloud instances launched since the release of Ubuntu 16.04 LTS, a number that keeps accelerating on a day-per-day basis since, many of the largest web-scale deployments are using Ubuntu. This includes financial, big data, media, and many other workloads and use cases, which rely on the stability and continuity of the underlying operating system to provide the mission-critical service their customers rely on. Extended Security Maintenance (ESM) was introduced for Ubuntu 12.04 LTS as a way to extend the availability of critical and important security patches beyond the nominal End of Life date of Ubuntu 12.04. Organisations use ESM to address security compliance concerns while they manage the upgrade process to newer versions of Ubuntu under full support. The ability to plan application upgrades in a failsafe environment continues to be cited as the main value for adoption of ESM. With the End of Life of Ubuntu 14.04 LTS in April 2019, and to support the planning efforts of developers worldwide, Canonical is announcing the availability of ESM for Ubuntu 14.04.
  • Canonical Announces Ubuntu 14.04 LTS (Trusty Tahr) Extended Security Maintenance
    Canonical announced today that it would extend its commercial Extended Security Maintenance (ESM) offering to the Ubuntu 14.04 LTS (Trusty Tahr) operating system series starting May 2019. Last year on April 28, 2017, when the Ubuntu 12.04 LTS (Precise Pangolin) operating system series reached end of life, Canonical announced a new way for corporate users and enterprises to receive security updates if they wanted to keep their current Ubuntu 12.04 LTS installations and had no plans to upgrade to a newer LTS (Long Term Support) release. The offering was called Extended Security Maintenance (ESM) and had a great success among businesses.

Graphics: NVIDIA and AMD

  • Initial NVIDIA GeForce RTX 2080 Ti Linux Benchmarks
    This article is going to be short and sweet as just receiving the GeForce RTX 2080 Ti yesterday and then not receiving the Linux driver build until earlier today... The GeForce RTX 2080 Ti has been busy now for a few hours with the Phoronix Test Suite on the Core i7 8086K system running Ubuntu 18.04 LTS with the latest drivers.
  • NVIDIA Introduces A Number Of New OpenGL Extensions For Turing
    As part of the GeForce RTX 2080 series launching with the new GPU architecture, NVIDIA has published a number of new OpenGL extensions for making use of some of Turing's new capabilities.
  • Vulkan 1.1.85 Released With Raytracing, Mesh Shaders & Other New NVIDIA Extensions
    Leading up to the Turing launch we weren't sure if NVIDIA was going to deliver same-day Vulkan support for RTX/ray-tracing with the GeForce RTX graphics cards or if it was going to be left up to Direct3D 12 on Windows for a while... Fortunately, as already reported, their new driver has Vulkan RTX support. Additionally, the NVX_raytracing extension and other NVIDIA updates made it into today's Vulkan 1.1.85 release.
  • Radeon/GPUOpen OCAT 1.2 Released But No Linux Support Yet
    A new feature release is out for the Radeon/GPUOpen "OCAT" open-source capture and analytics tool. OCAT 1.2 is their first release of the year and includes VR head-mounted display (HMD) support, new visualization tools, system information detection, new settings, and other enhancements.

Security: Updates, US Demand for Back Doors, and Microsoft's Collusion with the NSA Keeps Serving Crackers

  • Security updates for Wednesday
  • State Department Still Sucks At Basic Cybersecurity And Senators Want To Know Why
    The senators are hoping the State Department will have answers to a handful of cybersecurity-related questions by October 12th, but given the agency's progress to compliance with a law that's been on the book for two years at this point, I wouldn't expect responses to be delivered in a timelier fashion. The agency's track record on security isn't great and these recent developments only further cement its reputation as a government ripe for exploitation. The agency's asset-tracking program only tracks Windows devices, its employees are routinely careless with their handling of classified info, and, lest we forget, its former boss ran her own email server, rather than use the agency's. Of course, given this long list of security failures, there's a good possibility an off-site server had more baked-in security than the agency's homebrew.
  • EternalBlue Vulnerability Puts Pirated Windows Systems at Malware Risk [Ed: Microsoft's collusion with the NSA (for US-controlled back doors) continues to cost billions... paid by people who foolishly chose or accepted PCs with Windows.]
    A particular vulnerability that has been codenamed EternalBlue is to be blamed for this misfortune. The malware risk especially affects computers which use pirated Windows versions. This gap in security has its traces back in the legacies of US secret service NSA. Even after several years, many systems continue to be vulnerable. For more than three years, US intelligence was using it for performing hidden attacks on all kinds of targets. The agency finally had to leak the vulnerability to Microsoft due to the danger of hacking by a famous hacker group, Shadow Brokers. Microsoft then consequently had to abandon a patch day for the very first time in the company’s history for filling in the gap as quickly as possible.

today's howtos