Language Selection

English French German Italian Portuguese Spanish

Red Hat

Red Hat: Cloudera, TelecomLead Innovation Leaders, Financial News and LVFS

Filed under
Red Hat

Red Hat: HubSpot, Cloudera and More

Filed under
Red Hat

Servers and Red Hat Leftovers

Filed under
Red Hat
Server
  • Build a secure Docker host environment on Linux systems

    Run the latest stable OS release and patches on container hosts. Unlike VMs, containers share host OS resources and files, so a security issue could affect the entire Docker estate. OS management isn't difficult for enterprise IT teams, but approach with caution -- review all documentation prior to committing an update for Docker hosting systems. Virtual snapshots are a useful tool for this process, providing a log of changes and a rollback target if needed.

    Application security is only as good as what's on the stack below it. Assess the security settings on the host in question. Anyone with administrator-level access to the OS can manipulate the containers in the default configuration. Administrators should use keys for remote login to increase the environment's security level. In addition, implement a firewall, and restrict access to only trusted networks. Keep the attack surface to a minimum.

  • GDB 8.2 Released, Kernel 4.19 Officially the Next LTS Series, Cloudera Launches Open-Source IoT Architecture and Purism's Librem 5 Production Update

    Cloudera has launched an open-source, IoT architecture in collaboration with Red Hat and Eurotech. According to the press release, this end-to-end architecture is "based on open standards and is integrated, flexible and runs on multi- or hybrid-cloud environments", and it's "designed to provide the foundational components that organizations need to quickly and securely roll out IoT use cases".

  • How to feel connected on a distributed team

    In March 2016, I started a new role as a fully remote employee. I was joining a company that I highly respected to do something I loved, and I no longer had to get in a car every day. Not having to commute was a real sell, especially since it’s not uncommon to spend an hour each way to get to work in the DC area. Missing out on lunch with coworkers and free snacks in the office was worth the sacrifice. Plus, I had plenty of friends and family in the area, so I wouldn’t feel the impact of being alone for eight hours a day. I was convinced that I was going to live my dream life.

  • Market Value should Soar in coming Months: Red Hat, Inc. (RHT)

Fedora Versus CentOS

Filed under
Red Hat

Both members of the same family of RPM-based Linux distributions, CentOS and Fedora share many similarities, but they are far from interchangeable. In this article, we introduce where both of these popular Linux distributions come from and explain what they have in common and what makes them different.

Read more

Red Hat News

Filed under
Red Hat

Red Hat: Boston, SELinux, and Financial News

Filed under
Red Hat

Red Hat and Fedora Leftovers

Filed under
Red Hat

Fedora 29 and Red Hat Leftovers

Filed under
Red Hat

Red Hat Leftovers

Filed under
Red Hat

Red Hat Leftovers

Filed under
Red Hat
Syndicate content

More in Tux Machines

Openwashing: Zenko (Dual), Kong (Mere API) and Blackboard (Proprietary and Malicious)

Games: Descenders, War Thunder’s “The Valkyries”

Kernel: Virtme, 2018 Linux Audio Miniconference and Linux Foundation Articles

  • Virtme: The kernel developers' best friend
    When working on the Linux Kernel, testing via QEMU is pretty common. Many virtual drivers have been recently merged, useful either to test the kernel core code, or your application. These virtual drivers make QEMU even more attractive.
  • 2018 Linux Audio Miniconference
    As in previous years we’re trying to organize an audio miniconference so we can get together and talk through issues, especially design decisons, face to face. This year’s event will be held on Sunday October 21st in Edinburgh, the day before ELC Europe starts there.
  • How Writing Can Expand Your Skills and Grow Your Career [Ed: Linux Foundation article]
    At the recent Open Source Summit in Vancouver, I participated in a panel discussion called How Writing can Change Your Career for the Better (Even if You don't Identify as a Writer. The panel was moderated by Rikki Endsley, Community Manager and Editor for Opensource.com, and it included VM (Vicky) Brasseur, Open Source Strategy Consultant; Alex Williams, Founder, Editor in Chief, The New Stack; and Dawn Foster, Consultant, The Scale Factory.
  • At the Crossroads of Open Source and Open Standards [Ed: Another Linux Foundation article]
    A new crop of high-value open source software projects stands ready to make a big impact in enterprise production, but structural issues like governance, IPR, and long-term maintenance plague OSS communities at every turn. Meanwhile, facing significant pressures from open source software and the industry groups that support them, standards development organizations are fighting harder than ever to retain members and publish innovative standards. What can these two vastly different philosophies learn from each other, and can they do it in time to ensure they remain relevant for the next 10 years?

Red Hat: PodCTL, Security Embargos at Red Hat and Energy Sector

  • [Podcast] PodCTL #50 – Listener Mailbag Questions
    As the community around PodCTL has grown (~8000 weekly listeners) we’ve constantly asked them to give us feedback on topics to discuss and areas where they want to learn. This week we discussed and answered a number of questions about big data and analytics, application deployments, routing security, and storage deployment models.
  • Security Embargos at Red Hat
    The software security industry uses the term Embargo to describe the period of time that a security flaw is known privately, prior to a deadline, after which time the details become known to the public. There are no concrete rules for handling embargoed security flaws, but Red Hat uses some industry standard guidelines on how we handle them. When an issue is under embargo, Red Hat cannot share information about that issue prior to it becoming public after an agreed upon deadline. It is likely that any software project will have to deal with an embargoed security flaw at some point, and this is often the case for Red Hat.
  • Transforming oil & gas: Exploration and production will reap the rewards
    Through advanced technologies based on open standards, Red Hat deliver solutions that can support oil and gas companies as they modernize their IT infrastructures and build a framework to meet market and technology challenges. Taking advantage of modern, open architectures can help oil and gas providers attract new customers and provide entry into markets where these kinds of services were technologically impossible a decade ago.