Vital for helping Red Hat’s strategic partners facilitate full certification of their applications and systems with Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 7 RC is now accessible to all interested parties, from end users to enterprises, seeking to gain insight into how Red Hat redefines the enterprise operating system.
Earlier this morning, Richard Morrell (@EMEACloudGuy) posted his interview with Tim Burke, VP of Infrastructure Engineering, from Red Hat Summit 2014. Listen here as Tim describes the evolution of Red Hat Enterprise Linux and how infrastructure continues to evolve to meet the needs of developers, new innovations like OpenStack and OpenShift, and even new requirements from segments like telecommunications and financial services.
For those not attending Red Hat Summit 2014 or not tracking the latest news and updates (available on the official Red Hat Summit Blog), you may have missed two important and exciting announcements, namely:
- A Red Hat Enterprise Linux 7 Release Candidate (RC) will be made publicly available (starting next week). As a pre-release build of Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 7 RC offers a near-final look at the only operating system crafted for the open hybrid cloud, building upon the feedback collected during the beta program for Red Hat Enterprise Linux 7.
- Also, Red Hat plans to introduce Red Hat Enterprise Linux Atomic Host as a new addition to the Red Hat Enterprise Linux family. Red Hat Enterprise Linux Atomic Host couples the flexible, lightweight and modular capabilities of Linux Containers with the reliability and security of Red Hat Enterprise Linux in a reduced image size that will enable easy movement of Red Hat Enterprise Linux-certified applications across bare metal systems, virtual machines and private and public clouds.
Red Hat CEO and President Jim Whitehurst kicks off the 2014 Red Hat Summit… catch up on the latest news via the official Red Hat Summit Blog.
Distributed Denial of Service (DDoS) attacks are becoming increasingly commonplace as business becomes more and more dependent on delivering services over the Internet. One of the most common types of DDoS attacks is the well-known SYN-flood attack. It is a basic end-host resource attack designed to bring your server to its knees. As a result, your server is unable to properly handle any new incoming connection requests.
Recently at DevConf.cz 2014, I gave a talk focusing on how you can survive TCP SYN-flooding attacks by implementing some recently developed kernel level Netfilter/iptables defense mechanisms. In this post I will provide a more condensed version of the talk highlighting how you can use these same techniques to protect your servers running Red Hat Enterprise Linux 7 Beta.