Language Selection

English French German Italian Portuguese Spanish

IBM, Red Hat and Fedora Leftovers

Filed under
Red Hat
  • Hypercalers Lead The Way To The Future With SmartNICs

    The RISC processor, invented by John Cocke at IBM Research in 1974, was originally intended to be put into a telephone switch that could handle the then-huge workload of 1 million calls per hour. But this 801 processor, as IBM called its first RISC chip, ended up as an intelligent controller in mainframe disk drives and eventually migrated down into the RT PC as the Unix workstation market was coalescing in the mid-1980s. With the rise of Hewlett-Packard, Sun Microsystems, and Data General in the Unix workstation and then server businesses, IBM launched project “America,” which put a revamped RISC architecture, known as Power, with lots of oomph at the center of a new line of systems, called the RS/6000. Ironically, IBM’s System/38 and AS/400 minicomputers, launched in 1978 and 1988, respectively, had a relatively modest CISC engine – we always thought this CISC processor was a licensed Motorola 68K processor with its memory addressing and processing extended from 32 bits to 48 bits, and that was because these systems had what IBM called “intelligent I/O processors” that ran chunks of the operating system microcode remotely from the CPUs. And these IOPs were all based on Motorola 68K chips. So why not keep the architecture all similar and make a funky 48-bit 68K? In any event, IBM eventually consolidated the AS/400 and RS/6000 minicomputer designs, and one of the things that got dropped into the bucket of history was the IOP; all of the I/O processing was brought back into the processor. And here we are, now two decades later, and it looks like the industry is getting ready to offload it back onto SmartNICs because, once again, CPU processing is to be cherished and optimized.

  • Building Cloud Native Apps that Scale with NuoDB on OpenShift – OpenShift Commons Briefing

    In this briefing, Joe Leslie, Senior Product Manager for NuoDB and Tom Gates (lead Operator developer) gives us an update/overview on Nuodb’s recently developed NuoDB Operator for OpenShift developed in Go. Joe walks us thru building cloud-native applications with a container-native SQL database leveraging OpenShift and NuoDB.

    He demos the NuoDB Operator, deploy a NuoDB database, a SQL workload, and on-cluster NuoDB Insights visual monitoring. He shows how to scale the database using OpenShift and create failure events to demonstrate auto-recovery.

  • OpenShift Commons Gathering on AI and ML – San Francisco [Slides and Videos]

    The OpenShift Commons Gathering on Artificial Intelligence and Machine Learning in San Francisco at ODSC/West brought together data scientists and Kubernetes experts from all over the world to discuss the container technologies, operators, the operator framework, best practices for cloud-native application developers and the open source software projects that underpin the OpenShift ecosystem to help take us all to the next level in delivering cloud-native computing resources for AI & ML workloads. This gathering featured data scientists, developers, project leads, cloud architects, operator builders, sysadmins, and cloud-native practitioners coming together to explore the next steps in making container technologies successful and secure at scale.

  • Join us in #redhat-cpe on Freenode

    Many moons ago, Red Hat merged the CentOS infrastructure team with the Fedora Infrastructure team, into a team known as "Community Platform Engineering" (CPE). Most of the individuals on the combined team have mostly continued to focus on the project they were assigned to before the merger, but as time has gone by we have looked for opportunities to collaborate more.

  • Miroslav Suchý: New hope for Packages app

    Jun Aruga and I worked on a rewrite of Fedora Packages

    While this application is useful, it is written in Python 2. To quote current maintainer Clement Verna:

    “… the big problem is the technology stack it is built on TurboGears2 and making heavy use of Moksha (, while TG2 is still active upstream, this is not the case with Moksha and some of the TG2 dependencies the application has. The effort to move away from these two frameworks is quite high, and I don’t think we currently have the cycles for it…”

    We offered help and rewritten the application in Python 3, Flask, and PatternFly. We were able to rewrite around 40 percent of the code/templates. T

  • Fedora-related FOSDEM activities

    FOSDEM is a free-to-attend event held every year in Brussels, Belgium. It is a community-run event for developers to meet and work together. In 2020 it will be held on 1–2 February—the weekend following DevConf.CZ. The main track proposals are closed, but there are a few Fedora-related or -adjacent activities if you’re interested.

More in Tux Machines

Native Linux & Raspberry Pi support for checkra1n jailbreak hinted by developer

Despite hitting the market first, iPhone comes behind Android in terms of popularity. We admit the price plays a significant role here. But, a Samsung or Huawei flagship user who can afford an iPhone will tell you the level of customisation or convenience is what brought them to Android. Let’s set the convenience part aside because it is not really an issue after we get accustomed to the whole ecosystem of a device. However when it comes to the customisation, we can’t deny Android from bagging the pole position. Read more

today's howtos

Linux Kernel Security in a Nutshell: How to Secure Your Linux System

The Linux kernel is the core component of the Linux operating system, maintaining complete control over everything in the system. It is the interface between applications and data processing at the hardware level, connecting the system hardware to the application software. The kernel manages input/output requests from software, memory, processes, peripherals and security, among other hefty responsibilities. Needless to say, the Linux kernel is pretty important. However, with power comes great responsibility, and the Linux kernel is no exception to this rule. Kernel security is critical: it determines the security of the Linux operating system as a whole, as well as the security of every individual system that runs on Linux. Vulnerabilities in the kernel can have serious implications for Linux users, and it is extremely important that users stay up-to-date on news and advisories pertaining to kernel security. Read more

Mozilla: Webcompat, Firefox 71, Privacy Advice and Rust

  • Karl Dubost: Saving Webcompat images as a microservice

    Thinking out loud on separating our images into a separate service. The initial goal was to push the images to the cloud, but I think we could probably have a first step. We could keep the images on our server, but instead of the current save, we could send them to another service, let say with a HTTP PUT. And this service would save them locally.

  • Multiple-column Layout and column-span in Firefox 71

    Firefox 71 is an exciting release for anyone who cares about CSS Layout. While I am very excited to have subgrid available in Firefox, there is another property that I’ve been keeping an eye on. Firefox 71 implements column-span from Multiple-column Layout. In this post I’ll explain what it is and a little about the progress of the Multiple-column Layout specification. Multiple-column Layout, usually referred to as multicol, is a layout method that does something quite different to layout methods such as flexbox and grid. If you have some content marked up and displaying in Normal Flow, and turn that into a multicol container using the column-width or column-count properties, it will display as a set of columns. Unlike Flexbox or Grid however, the content inside the columns flows just as it did in Normal Flow. The difference is that it now flows into a number of anonymous column boxes, much like content in a newspaper.

  • The Mozilla Blog: Can Your Holiday Gift Spy on You?

    Mozilla today launches the third-annual *Privacy Not Included, a report and shopping guide identifying which connected gadgets and toys are secure and trustworthy — and which aren’t. The goal is two-fold: arm shoppers with the information they need to choose gifts that protect the privacy of their friends and family. And, spur the tech industry to do more to safeguard consumers. Mozilla researchers reviewed 76 popular connected gifts available for purchase in the United States across six categories: Toys & Games; Smart Home; Entertainment; Wearables; Health & Exercise; and Pets. Researchers combed through privacy policies, sifted through product and app specifications, reached out to companies about their encryption and bug bounty programs, and more. As a result, we can answer questions like: How accessible is the privacy policy, if there is one? Does the product require strong passwords? Does it collect biometric data? And, Are there automatic security updates?

  • This Week In Rust: This Week in Rust 313

    Hello and welcome to another issue of This Week in Rust! Rust is a systems language pursuing the trifecta: safety, concurrency, and speed. This is a weekly summary of its progress and community. Want something mentioned? Tweet us at @ThisWeekInRust or send us a pull request. Want to get involved? We love contributions.