The open source community and the IT industry as a whole continue to discuss how they can use different hardware architectures to solve hard computational problems and address specific workloads. Customers value choice in their technology implementations, and choice is a key benefit of open source solutions. To best meet these needs, the software ecosystem has to
Continue reading “Keeping pace with multiple architectures (Part 1)”
Increasing Interest in Identity Management
During last several months I’ve seen a rapid growth of interest in Red Hat’s Identity Management (IdM) solution. This might have been due to different reasons.
We’re adopting a new marketing mantra for Red Hat Enterprise Linux: Listen. Learn. Build. Which probably doesn’t seem all that revolutionary. That’s pretty much the mantra of open source. But compare that to how tech marketing usually happens.
There’s a lot of building–assets and advertisements and the whole nine yards. But the listening and learning parts usually happen afterwards, if at all.
So we’re making a conscious effort to explicitly apply the principles of open source to the way that we market our flagship open source technology. We’re starting with the listening part.
And who exactly are we listening to? You.
And what exactly are we listening to you talk about? Your OS adventures.
And what exactly do we mean by “OS adventures”?–
–Actually, here’s a better idea. Instead of telling you what we’re doing and why, let’s show you…
Continue reading “We’re changing up our marketing approach. And it involves comic books.”
While there is a lot more than just the “Regulatory Technical Standard 25”, abbreviated to RTS 25 from now on, in the EU’s MiFID II regulations, the focus of this blog is all around RTS 25 and achieving compliance with the time synchronisation requirements this entails.
At a high level, the goal of MiFID ii is
Continue reading “MiFID ii, RTS 25 and time synchronisation in Red Hat Enterprise Linux and Red Hat Virtualization”
Questions related to DNS and service discovery regularly come up during deployments of Identity Management (IdM) in Red Hat Enterprise Linux in a trust configuration with Active Directory. This blog article will shed some light of this aspect of the integration.
We will start with a description of the environment. Let us say that the Active Directory environment consist of
Continue reading “Discovery and Affinity”
Most people don’t consider their average USB memory stick to be a security threat. In fact, in a social engineering experiment conducted in 2016 at the University of Illinois and detailed in this research paper, a group of researchers dropped 297 USB sticks outside in the parking lot, in the hallway, and classrooms. Of the 297 USB sticks dropped,
Continue reading “Built-in protection against USB security attacks with USBGuard”
In Part 1, we created a working BIND container with local data storage. We can make changes on the local system that will get picked up in the running container. In this part, we’ll explore how we can manage the service from the host with
Continue reading “Containing System Services in Red Hat Enterprise Linux – Part 2”
At the 2017 Red Hat Summit, several people asked me “We normally use full VMs to separate network services like DNS and DHCP, can we use containers instead?”. The answer is
Continue reading “Containing System Services in Red Hat Enterprise Linux – Part 1”
Last week, Intel launched the new family of Intel® Xeon® scalable processors with new features such as Intel Advanced Vector Extensions 512 (Intel AVX-512), which boost performance of computationally intensive tasks, a new Intel Mesh Architecture for reduced system latency, Intel QuickAssist Technology for hardware acceleration of cryptography and data compression operations and integrated high-speed fabric with Intel Omni-Path Architecture. According to Intel,
Continue reading “Red Hat Enterprise Linux Brings Forth Performance and Scalability Features of New Intel Xeon Processor Family”
Twice a year the most prominent supercomputing sites in the world get to showcase their capabilities and compete for a Top500 spot. With Linux dominating the list, Red Hat is paying close attention to the latest changes that will be announced at International Supercomputing (ISC) show in Frankfurt, Germany between June 18 to June 22, 2017.
While supercomputers of the past were often proprietary, the trend of building them out of commodity components has dominated the landscape in the past two decades. But recently the definition of “commodity“ in HPC has been morphing. Traditional solutions are routinely augmented by various acceleration technologies, cache-coherent interconnects are becoming mainstream and boutique hardware and software technologies previously reserved for highly specialized solutions are being adopted by major HPC sites at scale.
Developing new and adapting existing highly scalable applications to take advantage of the new technological advances across multiple deployment domains is the greatest challenge facing HPC sites. This is where the operating system can provide
Continue reading “Supercomputing & Red Hat: What’s Happening at ISC 2017?”