At last year’s International supercomputing conference (ISC) we noted the trend of Linux underpinning the vast majority of supercomputers that are being built using sophisticated acceleration and interconnect technologies, effectively redefining the term “commodity“ in high performance computing (HPC).
Fast forward to ISC18 and Linux is the defacto standard operating system for all top supercomputers with Red Hat Enterprise Linux powering some of the largest and most intelligent supercomputers on the planet – Summit and Sierra. Red Hat is looking forward to seeing how these two newest US-based supercomputers have scored on the latest iteration of the Top500 list.
Continue reading “Scale better with open technologies from Red Hat”
Organizations today are seeking to increase productivity, flexibility and innovation to deliver services faster without sacrificing security, stability and performance. As hybrid IT environments continue to expand and evolve, security must be automated to scale and mitigate risks to achieve compliance and meet the needs of the business.
Why should security and compliance be automated? According to the 2017 Verizon Data Breach Report, “81% of hacking-related breaches leveraged either stolen and/or weak passwords”. Ensuring protection against stolen and/or weak passwords is preventable by defining and implementing strong password policies using automation. In this article by Gartner, “99% of the vulnerabilities exploited by the end of 2020 will continue to be ones known by security and IT professionals at the time of the incident”. Automation can help enforce and ensure security and compliance and help protect against security vulnerabilities and security breaches.
Continue reading “Automating Security Compliance with Ease”
Special guest blogger: Ashish Nadkarni, Program Vice President, Worldwide Infrastructure Practice, IDC
Applications are crucial to the functioning of a modern enterprise. Firms that constantly evolve and update their application strategy are the ones that are successful at expanding their competitive differentiation in the digital economy. They infuse their applications portfolio with new-generation applications that run in the cloud, are delivered as microservices, leverage open-source technologies, and are increasingly (infrastructure) platform independent. During application design, the choice of database management systems (DBMS) and operating system environments (OSE) heavily influences the scalability and reliability of the overall stack.
Continue reading “Application Modernization with Enterprise Linux”