Unleash powerful Linux container-building capabilities with Buildah

Balancing size and features is a universal challenge when building software. So, it’s unsurprising that this holds true when building container images. If you don’t include enough packages in your base image, you end up with images which are difficult to troubleshoot, missing something you need, or just cause different development teams to add the exact same package to layered images (causing duplication). If you build it too big, people complain because it takes too long to download – especially for quick and dirty projects or demos. This is where Buildah comes in.

Continue reading “Unleash powerful Linux container-building capabilities with Buildah”

Scale better with open technologies from Red Hat

At last year’s International supercomputing conference (ISC) we noted the trend of Linux underpinning the vast majority of supercomputers that are being built using sophisticated acceleration and interconnect technologies, effectively redefining the term “commodity“ in high performance computing (HPC).

Fast forward to ISC18 and Linux is the defacto standard operating system for all top supercomputers with Red Hat Enterprise Linux powering some of the largest and most intelligent supercomputers on the planet – Summit and Sierra. Red Hat is looking forward to seeing how these two newest US-based supercomputers have scored on the latest iteration of the Top500 list.

Continue reading “Scale better with open technologies from Red Hat”

Automating Security Compliance with Ease

Organizations today are seeking to increase productivity, flexibility and innovation to deliver services faster without sacrificing security, stability and performance. As hybrid IT environments continue to expand and evolve, security must be automated to scale and mitigate risks to achieve compliance and meet the needs of the business.

Why should security and compliance be automated? According to the 2017 Verizon Data Breach Report, “81% of hacking-related breaches leveraged either stolen and/or weak passwords”. Ensuring protection against stolen and/or weak passwords is preventable by defining and implementing strong password policies using automation. In this article by Gartner, “99% of the vulnerabilities exploited by the end of 2020 will continue to be ones known by security and IT professionals at the time of the incident”.  Automation can help enforce and ensure security and compliance and help protect against security vulnerabilities and security breaches.

Continue reading “Automating Security Compliance with Ease”

Application Modernization with Enterprise Linux

Special guest blogger: Ashish Nadkarni, Program Vice President, Worldwide Infrastructure Practice, IDC

Applications are crucial to the functioning of a modern enterprise. Firms that constantly evolve and update their application strategy are the ones that are successful at expanding their competitive differentiation in the digital economy. They infuse their applications portfolio with new-generation applications that run in the cloud, are delivered as microservices, leverage open-source technologies, and are increasingly (infrastructure) platform independent. During application design, the choice of database management systems (DBMS) and operating system environments (OSE) heavily influences the scalability and reliability of the overall stack.

Continue reading “Application Modernization with Enterprise Linux”

Sync vs. Trust: Red Hat Enterprise Linux Identify Management Integration with Active Directory

Identity Management in Red Hat Enterprise Linux (IdM) supports two different integration options with Active Directory: synchronization and trust.

I recently got a question about comparison of the two. I was surprised to find that I haven’t yet covered this topic in my blog. So let us close this gap!

Continue reading “Sync vs. Trust: Red Hat Enterprise Linux Identify Management Integration with Active Directory”

Immerse Yourself in Open IT Infrastructure at Red Hat Summit

Every year, Red Hat brings customers, partners, and some of the most knowledgeable Red Hatters to our annual event – Red Hat Summit. Next week in San Francisco, May 8-10, we expect thousands of people to join us to learn more about the latest technology trends and our product portfolio, to participate in various sessions, panels and labs, and to take part in numerous fun activities.

Continue reading “Immerse Yourself in Open IT Infrastructure at Red Hat Summit”

Red Hat Virtualization at Red Hat Summit 2018

Hi folks, in this post I wanted to share with you some of the cool activities we have happening next week at the Red Hat Summit in San Francisco. For virtualization there’s a ton of things going on – to say that we are ‘RHV’ed up is an understatement! (sorry, @RedHatRex wrote that joke…) Here’s a short video that will get you goin on RHV:

Continue reading “Red Hat Virtualization at Red Hat Summit 2018”

Red Hat Virtualization

Welcome to the fourth installment of the ITO series on the Red Hat Enterprise Linux blog. I started the IT Optimization saga with the basics- what does it mean to optimize IT? Then, I illustrated how having the right platform can help modernize your IT infrastructure by not only maintaining stability but also poised towards innovation. Last week, I talked about another key component of every IT infrastructure- Storage and how Red Hat Storage solutions can help your organization modernize storage and reduce cost. This week, let me walk you through a Red Hat offering that can dramatically decrease your IT spending- Virtualization.

Continue reading “Red Hat Virtualization”

How Red Hat Storage Fosters IT Optimization and Modernization

Happy Tuesday! Welcome to another new week and brand new post in the IT Optimization series. If you are new here, check out my first post, on what IT Optimization is and the latest post on the demand for a Modern OS. In this post, I will walk you through optimizing another key piece of your infrastructure – storage.

In my first post about IT Optimization, I likened IT infrastructure to a car. Let’s talk about trunk space for a second. Imagine that you are going camping with a couple of friends. You need a car with enough trunk space to fit all your gear, tents and backpacks. In this situation, you would do one of three things – own, rent or borrow an SUV. Owning an SUV for the sake of the occasional camping trip is expensive; a rental or borrowed car won’t have the same ease of driving as your own car. Now, what if you had a sedan, that could magically transform into an SUV, only when you needed it? Seems like a dream, right?

Continue reading “How Red Hat Storage Fosters IT Optimization and Modernization”