The open source community and the IT industry as a whole continue to discuss how they can use different hardware architectures to solve hard computational problems and address specific workloads. Customers value choice in their technology implementations, and choice is a key benefit of open source solutions. To best meet these needs, the software ecosystem has to
Increasing Interest in Identity Management
During last several months I’ve seen a rapid growth of interest in Red Hat’s Identity Management (IdM) solution. This might have been due to different reasons.
- First of all IdM has become much more mature and well known. In the past you come to a conference and talk about FreeIPA (community version of IdM) and IdM and you get a lot of people in the audience that have never heard about it.
Continue reading “Evaluating Total Cost of Ownership of the Identity Management Solution”
We’re adopting a new marketing mantra for Red Hat Enterprise Linux: Listen. Learn. Build. Which probably doesn’t seem all that revolutionary. That’s pretty much the mantra of open source. But compare that to how tech marketing usually happens.
There’s a lot of building–assets and advertisements and the whole nine yards. But the listening and learning parts usually happen afterwards, if at all.
So we’re making a conscious effort to explicitly apply the principles of open source to the way that we market our flagship open source technology. We’re starting with the listening part.
And who exactly are we listening to? You.
And what exactly are we listening to you talk about? Your OS adventures.
And what exactly do we mean by “OS adventures”?–
–Actually, here’s a better idea. Instead of telling you what we’re doing and why, let’s show you…
While there is a lot more than just the “Regulatory Technical Standard 25”, abbreviated to RTS 25 from now on, in the EU’s MiFID II regulations, the focus of this blog is all around RTS 25 and achieving compliance with the time synchronisation requirements this entails.
Questions related to DNS and service discovery regularly come up during deployments of Identity Management (IdM) in Red Hat Enterprise Linux in a trust configuration with Active Directory. This blog article will shed some light of this aspect of the integration.
We’re proud to announce that one of our partners, HPE, posted results to the SPECvirt_sc2013 benchmark that affirms the leadership position for Red Hat Virtualization (RHV) and the HPE ProLiant DL380 Gen10 Server. RHEL with KVM has held several performance records for 2, 4, and 8 socket results over the last few years and as of August 17, 2017, RHV now holds the 2 socket record.
Let’s imagine you’ve had many meetings, internal deliberations, workshops, and decided to put your “Continuous Integration/Continuous Development” environment on Red Hat OpenShift Container Platform (OCP). You’ve defined a problem, a strategy, and a solution. It’s now time to decide where in your datacenter to deploy it.
Most people don’t consider their average USB memory stick to be a security threat. In fact, in a social engineering experiment conducted in 2016 at the University of Illinois and detailed in this research paper, a group of researchers dropped 297 USB sticks outside in the parking lot, in the hallway, and classrooms. Of the 297 USB sticks dropped,
We’re pleased to announce that Red Hat Enterprise Linux Atomic Host 7.4 is now generally available. Red Hat Enterprise Linux Atomic Host is a lightweight, container-optimized version of Red Hat Enterprise Linux. Red Hat Enterprise Linux Atomic Host couples the flexible, modular capabilities of Linux containers with the reliability and security of Red Hat Enterprise Linux in a reduced footprint, to decrease the attack surface and provide only the packages needed to light up hardware and run containers. Here’s a look at some of the major changes in 7.4.
In Part 1, we created a working BIND container with local data storage. We can make changes on the local system that will get picked up in the running container. In this part, we’ll explore how we can manage the service from the host with