Balancing size and features is a universal challenge when building software. So, it’s unsurprising that this holds true when building container images. If you don’t include enough packages in your base image, you end up with images which are difficult to troubleshoot, missing something you need, or just cause different development teams to add the exact same package to layered images (causing duplication). If you build it too big, people complain because it takes too long to download – especially for quick and dirty projects or demos. This is where Buildah comes in.
At last year’s International supercomputing conference (ISC) we noted the trend of Linux underpinning the vast majority of supercomputers that are being built using sophisticated acceleration and interconnect technologies, effectively redefining the term “commodity“ in high performance computing (HPC).
Fast forward to ISC18 and Linux is the defacto standard operating system for all top supercomputers with Red Hat Enterprise Linux powering some of the largest and most intelligent supercomputers on the planet – Summit and Sierra. Red Hat is looking forward to seeing how these two newest US-based supercomputers have scored on the latest iteration of the Top500 list.
Organizations today are seeking to increase productivity, flexibility and innovation to deliver services faster without sacrificing security, stability and performance. As hybrid IT environments continue to expand and evolve, security must be automated to scale and mitigate risks to achieve compliance and meet the needs of the business.
Why should security and compliance be automated? According to the 2017 Verizon Data Breach Report, “81% of hacking-related breaches leveraged either stolen and/or weak passwords”. Ensuring protection against stolen and/or weak passwords is preventable by defining and implementing strong password policies using automation. In this article by Gartner, “99% of the vulnerabilities exploited by the end of 2020 will continue to be ones known by security and IT professionals at the time of the incident”. Automation can help enforce and ensure security and compliance and help protect against security vulnerabilities and security breaches.
Special guest blogger: Ashish Nadkarni, Program Vice President, Worldwide Infrastructure Practice, IDC
Applications are crucial to the functioning of a modern enterprise. Firms that constantly evolve and update their application strategy are the ones that are successful at expanding their competitive differentiation in the digital economy. They infuse their applications portfolio with new-generation applications that run in the cloud, are delivered as microservices, leverage open-source technologies, and are increasingly (infrastructure) platform independent. During application design, the choice of database management systems (DBMS) and operating system environments (OSE) heavily influences the scalability and reliability of the overall stack.
Identity Management in Red Hat Enterprise Linux (IdM) supports two different integration options with Active Directory: synchronization and trust.
Hi folks, it is now official – Red Hat Virtualization 4.2 (RHV) has been released! This is a huge milestone for the RHV team as 4.2 delivers more in the themes of ease-of-use, automation, and continued tighter integration with the Red Hat portfolio. As many of you know we have been working on this for awhile –
Every year, Red Hat brings customers, partners, and some of the most knowledgeable Red Hatters to our annual event – Red Hat Summit. Next week in San Francisco, May 8-10, we expect thousands of people to join us to learn more about the latest technology trends and our product portfolio, to participate in various sessions, panels and labs, and to take part in numerous fun activities.
Hi folks, in this post I wanted to share with you some of the cool activities we have happening next week at the Red Hat Summit in San Francisco. For virtualization there’s a ton of things going on – to say that we are ‘RHV’ed up is an understatement! (sorry, @RedHatRex wrote that joke…) Here’s a short video that will get you goin on RHV:
Welcome to the fourth installment of the ITO series on the Red Hat Enterprise Linux blog. I started the IT Optimization saga with the basics- what does it mean to optimize IT? Then, I illustrated how having the right platform can help modernize your IT infrastructure by not only maintaining stability but also poised towards innovation. Last week, I talked about another key component of every IT infrastructure- Storage and how Red Hat Storage solutions can help your organization modernize storage and reduce cost. This week, let me walk you through a Red Hat offering that can dramatically decrease your IT spending- Virtualization.
Happy Tuesday! Welcome to another new week and brand new post in the IT Optimization series. If you are new here, check out my first post, on what IT Optimization is and the latest post on the demand for a Modern OS. In this post, I will walk you through optimizing another key piece of your infrastructure – storage.
In my first post about IT Optimization, I likened IT infrastructure to a car. Let’s talk about trunk space for a second. Imagine that you are going camping with a couple of friends. You need a car with enough trunk space to fit all your gear, tents and backpacks. In this situation, you would do one of three things – own, rent or borrow an SUV. Owning an SUV for the sake of the occasional camping trip is expensive; a rental or borrowed car won’t have the same ease of driving as your own car. Now, what if you had a sedan, that could magically transform into an SUV, only when you needed it? Seems like a dream, right?