Red Hat Product Security was made aware of a vulnerability affecting the Linux kernel’s implementation of the Bluetooth L2CAP protocol. The vulnerability was named BlueBorne and was assigned an ID – CVE-2017-1000251.
A vulnerable system would need to have Bluetooth (hardware + service) enabled and an attacking device would need to be within
Continue reading “BlueBorne – An Analysis”
While there is a lot more than just the “Regulatory Technical Standard 25”, abbreviated to RTS 25 from now on, in the EU’s MiFID II regulations, the focus of this blog is all around RTS 25 and achieving compliance with the time synchronisation requirements this entails.
At a high level, the goal of MiFID ii is
Continue reading “MiFID ii, RTS 25 and time synchronisation in Red Hat Enterprise Linux and Red Hat Virtualization”
Questions related to DNS and service discovery regularly come up during deployments of Identity Management (IdM) in Red Hat Enterprise Linux in a trust configuration with Active Directory. This blog article will shed some light of this aspect of the integration.
We will start with a description of the environment. Let us say that the Active Directory environment consist of
Continue reading “Discovery and Affinity”
Is your server running slowly?
Has your network tuning run amuck?
Is Red Hat OpenShift not scaling for you?
If you’re attending Red Hat Summit, whatever your performance
Continue reading “Bring Your Performance & Scale Problems to the Experts. Beer Included.”
Red Hat is best known for Red Hat Enterprise Linux (RHEL) and for being a leader in driving open source development projects. In many cases, the upstream projects then become Red Hat products that provide enterprise functionality elsewhere in the stack.
In a previous blog post, I detailed how we use Red Hat Single Sign On (SSO) to provide a robust and scalable authentication system for public web properties. Applications, such a Red Hat SSO, can obviously be deployed in a variety of platforms. Red Hat IT selected to adopt a hybrid-cloud deployment model for Red Hat SSO, as the majority of normal traffic for https://sso.redhat.com is serviced out of one of our corporate data centers. SSO and virtually every other application runs on top of Red Hat Virtualization.
Continue reading “Red Hat IT Single Sign On(SSO) Runs on Red Hat Virtualization”
When working with container-based applications, admins and developers need a place to store and share container images, a way to deploy them, as well as a way to monitor and administer them once they’re deployed. Join Red Hat software engineers Aaron Weitekamp and Stef Walter for this webcast, Using the Atomic Registry for Secure Container Image Management, on January 27th at 11:00 ET, to gain a better understanding of sharing, deploying, and managing container images.
Continue reading “27-JAN Webcast: Using the Atomic Registry for Secure Container Image Management”
Next week from 16-17 November, many of us are heading to Barcelona for DockerCon Europe 2015. If you’re heading to Barcelona as well, you can learn how developers, operations, DevOps and sysadmins are using Linux containers. From use cases to roadmaps to tutorials and advanced technical
talks, DockerCon will offer attendees a deep dive into the technology.
Continue reading “Must-See: Vincent Batts Next Week at DockerCon Europe”
If you’re looking at running Linux containers, you should be heading to ContainerCon in Seattle next week. Co-located with LinuxCon and CloudOpen, ContainerCon is where leading contributors in Linux containers, the Linux kernel, and related projects will get together to educate the community on containers and related innovations.
Red Hatters are contributing to over 40 sessions on this year’s agenda, including a keynote from Red Hat VP of Engineering Matt Hicks. In “Revolutionizing Application Delivery with Linux and Containers,” Matt will focus on how Linux containers are changing the way that companies develop, consume and manage applications and will emphasize how open source communities and projects like Docker and Kubernetes are delivering this next wave of enterprise application architecture.
If you’re attending ContainerCon, check out Matt’s keynote and some of the sessions below:
Continue reading “See You at ContainerCon in Seattle”
Now that Red Hat Enterprise Linux 7 is generally available, we are re-casting the Red Hat Enterprise Linux High Touch Beta program into a series of Red Hat Enterprise Linux 7 special interest groups (SIGs), the first of which is focused on application containers. The Red Hat Enterprise Linux Atomic Host SIG encompasses technologies that are required to create, deploy, and manage application containers.
This is the first of several SIGs that we plan to create to focus on specific technology domains within Red Hat Enterprise Linux 7. By participating in SIGs, Red Hat Enterprise Linux customers can provide feedback on the active development of new capabilities to meet the needs of their specific use cases.
Continue reading “Going Atomic with the Red Hat Enterprise Linux 7 High-Touch Beta”