Running the Leapp pre-upgrade analysis - Take the unknowns out of your next RHEL upgrade
Red Hat Enterprise Linux channel
by
6d ago
Seamlessly upgrading an operating system in-place can be one of the biggest challenges due to potential package incompatibility, kernel customizations, or outdated and unsupported modules. This is where a structured tool can make all the difference, guiding the user through the process, from pre-requisite checks to the actual upgrade, along with helpful suggestions and insightful analysis.An overview of the Leapp toolLeapp is the tool offered in Red Hat Enterprise Linux (RHEL) to support you through an in-place upgrade of a system from supported versions of RHEL:RHEL 7.9 to RHEL 8.6/8.8/8.9RHE ..read more
Visit website
Is a slow but low-consumption system more energy efficient? Let’s measure, with RHEL!
Red Hat Enterprise Linux channel
by
6d ago
In my previous article, I introduced the Performance Co-Pilot (PCP) suite in Red Hat Enterprise Linux (RHEL) to help you measure the electrical power consumption of your machines. While performing a series of tests in my lab, I started to wonder whether slower systems could be more energy efficient than fast systems. To test this hypothesis, I'm using a new setup to compare how quickly various Linux systems can perform compute tasks, and how energy efficient they are when performing those tasks:The control system, for doing measurementsThe System Under Test (SUT), which runs workloads while yo ..read more
Visit website
4 use cases for AI in cyber security
Red Hat Enterprise Linux channel
by
1w ago
Artificial intelligence (AI) is being introduced to just about every facet of life these days. AI is being used to develop code, communicate with customers, and write in various media. Cyber security, particularly product security is another place AI can have a significant impact. AI is being built into security tools, and, on the flip side, into the realm of exploitation. AI is now mainstream and won't be going away anytime soon, so security professionals need to learn how to best use it to help enhance the security of their systems and products.AI and its implications for securityThe term "a ..read more
Visit website
Connect hybrid cloud Kubernetes with F5 multicloud networking and Red Hat OpenShift for optimized security footprints
Red Hat Enterprise Linux channel
by
1w ago
Many organizations face numerous challenges when modernizing their applications or migrating from on-premises applications to cloud-native microservices. This can include challenges such as deploying and managing their applications at scale, increased network complexity, managing costs and ensuring security.Red Hat and F5 are collaborating to deliver enhanced networking and security services using Red Hat OpenShift to deploy technology from F5 Distributed Cloud. This technical collaboration aims to provide organizations with a more seamless multi and hybrid cloud application experience, prov ..read more
Visit website
SAS Viya on Red Hat OpenShift Service for AWS (ROSA)
Red Hat Enterprise Linux channel
by
1w ago
In this article, we provide essential “how to” technical information for deploying SAS Institute's SAS Viya platform, on Red Hat OpenShift Service on AWS (ROSA) as well as provide a reference architecture. For some general security, machine management and storage considerations when deploying SAS Viya on Red Hat OpenShift please take a look at our previous two part series (part 1, part 2).Based on the collaboration between Red Hat and SAS, we have adopted a holistic approach to SAS Viya on OpenShift. SAS Viya can now be deployed and supported on most x86_64 platforms where OpenShift can be ..read more
Visit website
Red Hat Enterprise Linux 7: End of compliance content on June 30, 2024
Red Hat Enterprise Linux channel
by
2w ago
As of Jun 30, 2024, the Red Hat Enterprise Linux (RHEL) 7 maintenance support 2 phase ends and Red Hat will no longer update compliance content for RHEL 7. Many policy providers, such as CIS and DISA, will no longer update their policies once maintenance ends.When this support phase ends, you can expect:The RHEL 7 scap-security-guide package will no longer be updated. You can continue to use the content provided after Jun 30, 2024. The content is mature, stable, and still suitable for use by Extended Update Support (EUS) customers after the end of maintenance, however as mentioned before there ..read more
Visit website
Red Hat Enterprise Linux Performance Results on 5th Gen Intel® Xeon® Scalable Processors
Red Hat Enterprise Linux channel
by
3w ago
Intel recently launched the 5th generation of Intel® Xeon® Scalable processors (Intel Xeon SP), code-named Emerald Rapids; a family of high-end, enterprise-focused processors targeted at a diverse range of workloads. To explore how Intel’s new chips measure up, we’ve worked with Intel and others to run benchmarks with Red Hat Enterprise Linux 8.8 / 9.2 and greater. Intel’s 5th Gen Xeon Scalable processors are a drop-in compatible with existing 4th Gen Xeon Scalable motherboards. It now supports up to 64 cores per socket vs 60 cores, can handle DDR5-5600 memory speeds over DDR5-4800 pri ..read more
Visit website
Urgent security alert for Fedora Linux 40 and Fedora Rawhide users
Red Hat Enterprise Linux channel
by
3w ago
No versions of Red Hat Enterprise Linux (RHEL) are affected by this CVE.Updated March 30, 2024: We have determined that Fedora Linux 40 beta does contain two affected versions of xz libraries - xz-libs-5.6.0-1.fc40.x86_64.rpm and xz-libs-5.6.0-2.fc40.x86_64.rpm. At this time, Fedora 40 Linux does not appear to be affected by the actual malware exploit, but we encourage all Fedora 40 Linux beta users to revert to 5.4.x versions.Editor's note: This post has been updated to more clearly articulate the affected versions of Fedora Linux and add additional mitigation methods.Yesterday, Red Hat Infor ..read more
Visit website
Explore new capabilities in Red Hat Enterprise Linux 9.4 and 8.10 beta releases
Red Hat Enterprise Linux channel
by
1M ago
It’s no surprise that today’s IT environments are more complex than ever before. A mix of old and new technologies, disparate teams and outdated manual processes often result in inefficient operations, security and compliance risks and overburdened IT teams.Standardizing on a single operating system throughout your organization is the first step in simplifying and streamlining your IT infrastructure. Standardized operating environments (SOEs) can help you overcome IT complexity to improve efficiency, reduce costs, increase uptime and improve your security posture. IT teams can make the mos ..read more
Visit website
Learn Linux in 2024: New Red Hat training course
Red Hat Enterprise Linux channel
by
1M ago
Every organization incorporates new technology into its business, and that means most people within the organization have plenty of opportunities to learn something new. Maybe you’re responsible for setting up some of that new technology at your organization, or maybe you just want to get a headstart on something new and different. Some of the most exciting innovation happens on Linux, and so Linux is often the foundation, and key to understanding, new ways of computing. Linux can admittedly seem overwhelming when you don’t know where to start or where to go with it once you do start. To h ..read more
Visit website

Follow Red Hat Enterprise Linux channel on FeedSpot

Continue with Google
Continue with Apple
OR