Language Selection

English French German Italian Portuguese Spanish

Red Hat: Kubernetes, RHEL Impact and Halloween Release

Filed under
Red Hat
  • Why you don't have to be afraid of Kubernetes

    It was fun to work at a large web property in the late 1990s and early 2000s. My experience takes me back to American Greetings Interactive, where on Valentine's Day, we had one of the top 10 sites on the internet (measured by web traffic). We delivered e-cards for AmericanGreetings.com, BlueMountain.com, and others, as well as providing e-cards for partners like MSN and AOL. Veterans of the organization fondly remember epic stories of doing great battle with other e-card sites like Hallmark. As an aside, I also ran large web properties for Holly Hobbie, Care Bears, and Strawberry Shortcake.

    I remember like it was yesterday the first time we had a real problem. Normally, we had about 200Mbps of traffic coming in our front doors (routers, firewalls, and load balancers). But, suddenly, out of nowhere, the Multi Router Traffic Grapher (MRTG) graphs spiked to 2Gbps in a few minutes. I was running around, scrambling like crazy. I understood our entire technology stack, from the routers, switches, firewalls, and load balancers, to the Linux/Apache web servers, to our Python stack (a meta version of FastCGI), and the Network File System (NFS) servers. I knew where all of the config files were, I had access to all of the admin interfaces, and I was a seasoned, battle-hardened sysadmin with years of experience troubleshooting complex problems.

    But, I couldn't figure out what was happening...

    Five minutes feels like an eternity when you are frantically typing commands across a thousand Linux servers. I knew the site was going to go down any second because it's fairly easy to overwhelm a thousand-node cluster when it's divided up and compartmentalized into smaller clusters.

  • The economic impact of Red Hat Enterprise Linux: How IT professionals benefit

    It’s not overstated to say that the IT landscape completely changed with the introduction of Red Hat Enterprise Linux, more than a decade and a half ago. For 2019, IDC estimated a global business revenue of $188 trillion. Of this, they estimate that at least 40% is touched by software, leaving the IT footprint to be an estimated $81 trillion. Yes, you read that right, $81 trillion. As all of this software forming the global business IT footprint has to run on an operating system, IDC estimates that over 50% is running on Linux, with Red Hat Enterprise Linux accounting for 25% of that.

    That’s a lot of big numbers but what does it all mean? It means that Red Hat Enterprise Linux has changed the experience of many IT professionals around the globe. In a software-centric world, ongoing we have seen higher demand in support and IT services which in turn further helps fuel the global IT ecosystem.

    When IDC asked IT organizations how Red Hat Enterprise Linux benefitted them, they discovered a 12% savings in IT staff productivity. This means that IT professionals spend less time managing servers, doing routine IT tasks, resolving support calls, deploying new business apps and upgrading mission-critical apps. But that’s not all.

  • The spooktacular tale of Red Hat's Halloween release

    In many stories and myths, naming is important. Knowing the proper name of something gives you power over it. Likewise, naming has been important for Red Hat Linux over the years.

    The Halloween release was actually a paid beta and not a 1.0. The Halloween release was dubbed Red Hat Software Linux 0.9, and started a tradition of having a codename for the release that lasted through the final Red Hat Linux release (9.0.93, "Severn"), and carried over to Fedora for many years.

    The tradition was to have a name for a release that was somewhat related to the previous release name. For example, the 1.0 release was "Mother's Day," and "Rembrandt" followed "Picasso," and "Colgate" followed it. (For the record, the best release name was a Fedora release, dubbed "Zod." Allowing many fun headlines playing off the Superman II villain.)

More in Tux Machines

Native Linux & Raspberry Pi support for checkra1n jailbreak hinted by developer

Despite hitting the market first, iPhone comes behind Android in terms of popularity. We admit the price plays a significant role here. But, a Samsung or Huawei flagship user who can afford an iPhone will tell you the level of customisation or convenience is what brought them to Android. Let’s set the convenience part aside because it is not really an issue after we get accustomed to the whole ecosystem of a device. However when it comes to the customisation, we can’t deny Android from bagging the pole position. Read more

today's howtos

Linux Kernel Security in a Nutshell: How to Secure Your Linux System

The Linux kernel is the core component of the Linux operating system, maintaining complete control over everything in the system. It is the interface between applications and data processing at the hardware level, connecting the system hardware to the application software. The kernel manages input/output requests from software, memory, processes, peripherals and security, among other hefty responsibilities. Needless to say, the Linux kernel is pretty important. However, with power comes great responsibility, and the Linux kernel is no exception to this rule. Kernel security is critical: it determines the security of the Linux operating system as a whole, as well as the security of every individual system that runs on Linux. Vulnerabilities in the kernel can have serious implications for Linux users, and it is extremely important that users stay up-to-date on news and advisories pertaining to kernel security. Read more

Mozilla: Webcompat, Firefox 71, Privacy Advice and Rust

  • Karl Dubost: Saving Webcompat images as a microservice

    Thinking out loud on separating our images into a separate service. The initial goal was to push the images to the cloud, but I think we could probably have a first step. We could keep the images on our server, but instead of the current save, we could send them to another service, let say upload.webcompat.com with a HTTP PUT. And this service would save them locally.

  • Multiple-column Layout and column-span in Firefox 71

    Firefox 71 is an exciting release for anyone who cares about CSS Layout. While I am very excited to have subgrid available in Firefox, there is another property that I’ve been keeping an eye on. Firefox 71 implements column-span from Multiple-column Layout. In this post I’ll explain what it is and a little about the progress of the Multiple-column Layout specification. Multiple-column Layout, usually referred to as multicol, is a layout method that does something quite different to layout methods such as flexbox and grid. If you have some content marked up and displaying in Normal Flow, and turn that into a multicol container using the column-width or column-count properties, it will display as a set of columns. Unlike Flexbox or Grid however, the content inside the columns flows just as it did in Normal Flow. The difference is that it now flows into a number of anonymous column boxes, much like content in a newspaper.

  • The Mozilla Blog: Can Your Holiday Gift Spy on You?

    Mozilla today launches the third-annual *Privacy Not Included, a report and shopping guide identifying which connected gadgets and toys are secure and trustworthy — and which aren’t. The goal is two-fold: arm shoppers with the information they need to choose gifts that protect the privacy of their friends and family. And, spur the tech industry to do more to safeguard consumers. Mozilla researchers reviewed 76 popular connected gifts available for purchase in the United States across six categories: Toys & Games; Smart Home; Entertainment; Wearables; Health & Exercise; and Pets. Researchers combed through privacy policies, sifted through product and app specifications, reached out to companies about their encryption and bug bounty programs, and more. As a result, we can answer questions like: How accessible is the privacy policy, if there is one? Does the product require strong passwords? Does it collect biometric data? And, Are there automatic security updates?

  • This Week In Rust: This Week in Rust 313

    Hello and welcome to another issue of This Week in Rust! Rust is a systems language pursuing the trifecta: safety, concurrency, and speed. This is a weekly summary of its progress and community. Want something mentioned? Tweet us at @ThisWeekInRust or send us a pull request. Want to get involved? We love contributions.