Language Selection

English French German Italian Portuguese Spanish

Red Hat

Red Hat News

Filed under
Red Hat
  • Top Indian carriers taking "open telco" approach to build future networks for new services: Red Hat

    Top Indian telecom service providers are taking “Open Telco” approach in building next-generation networks using networks functions virtualisation technology to bring flexibility to offer new services, and to prepare for 5G in coming years, according to the US-based open source solutions provider, Red Hat.

    Ben Panic, Director of Sales, Asia Pacific Region (Telecommunications) at Red Hat told ET that Indian telcos have already deployed open source technology-based solutions in the core functions of their mobile networks. “The target goal of NFV is to open, be multi-vendor, be flexible and agile,” he said.

  • Celebrating Red Hat’s 25th anniversary: How partners play an important role [Ed: reposted from Red Hat's site]

    As Red Hat celebrates 25 years, I would be remiss not to mention the role Red Hat partners have played in our company’s story. Partners have been an important multiplier for Red Hat and building our customer success. They are important to our future.

    Early endeavours in the channel

    In 2006, I joined Red Hat to expand the partner ecosystem. I’d been working in the channel since Moses was around, or at least since 1981. Although we were mainly selling direct, there was growing confidence that we could make the transformation to support a robust partner ecosystem.

  • Analysts Set Red Hat Inc (RHT) Target Price at $157.79
  • Buy Red Hat, An Attractive Cloud Computing Play

Red Hat News, Scientific Linux, and Fedora 29 Dropping GCC From Their Default Build Root

Filed under
Red Hat
  • Red Hat OpenStack platform adopted by Fujitsu

    Red Hat recently announced that Fujitsu has adopted Red Hat OpenStack Platform as an Infrastructure-as-a-Service (IaaS) component of Fujitsu Cloud Service for OSS, its global hybrid cloud service offering.

    As a backbone for an open hybrid cloud, Fujitsu Cloud Service for OSS is designed to help enterprises more quickly develop cloud-native and traditional applications and services in an environment built from innovative, more reliable, and more secure open technologies.

    This announcement shows the continued, long-standing collaboration between Red Hat and Fujitsu to offer hybrid cloud solutions based on open source.

  • Fujitsu Adopts Red Hat OpenStack Platform for Fujitsu Cloud Service for OSS
  • Entando Announces OEM Agreement with Red Hat on Modern Applications

    Entando, a leader in open source Digital Experience Platforms, today announced that Red Hat has agreed to include access to a set of Entando’s open source low-code tools as part of Red Hat’s newly launched Red Hat Process Automation Manager. Entando has optimized the tools to run effectively on Red Hat Process Automation Manager. Together, these technologies offer customers expanded next-generation business process automation capabilities native to Red Hat OpenShift Container Platform and a user experience (UX) designed to help them create cloud-native applications faster.

  • STT Connect builds webscale private cloud infrastructure on Red Hat

    To build its cloud on a flexible, supported open source platform, STT Connect partnered with Red Hat to deploy Red Hat OpenStack Platform, Red Hat Ansible Tower, and other enterprise Red Hat software.

    These solutions helped the company create an agile and efficient — yet secure — webscale cloud infrastructure. STT Connect became the first cloud company in Singapore to achieve the highest level Multi-Tier Cloud Security (MTCS) certification with an OpenStack private cloud.

  • The Final Build of Scientific Linux 6.10 Legacy Branch Released

    Scientific Linux has announced that the 6.10 release will be the final build of their legacy branch based on Red Hat 6.10. It will only receive security updates and major bug fixes and will be supported until November 2020.

    Fermi National Accelerator Laboratory (Fermilab) and European Organization for Nuclear Research (CERN) co-develop Scientific Linux with the aim of creating a stable operating system that is supplied with packages and applications that support scientific research. They also list using “the free exchange of ideas, designs, and implementations to prepare a computing platform for the next generation of scientific computing” as one of their goals.

  • ISVs in APAC Showcase Increased Red Hat OpenShift Adoption Across Verticals
  • Should You Buy Red Hat, Inc. (RHT) or Marsh & McLennan Companies, Inc. (MMC)?
  • Red Hat, Inc. (RHT) P/E ratio is noted at 62.01
  • Is this stock Risky for You?: Red Hat, Inc. (RHT)
  • Analyst Buzz: Red Hat, Inc. (NYSE:RHT)
  • Red Hat: Ready For Multiple Expansion
  • Fedora 29 Dropping GCC From Their Default Build Root Has Been Causing A Heated Debate

    One of the surprisingly controversial changes being implemented for Fedora 29 is dropping GCC and GCC-C++ from the default BuildRoot for assembling Fedora packages with Koji and Mock.

    Up to now it's always just been implied that GCC (including the GCC C++ compiler) is there by default with every build-root. But these days with more packages being written in languages like Go, Rust, Python, Node.js, and other modern languages, the proportion of C/C++ applications is decreasing. As such, the GCC C/C++ support is no longer being implied with the default build environments in Koji/Mock, which in turn should help package build times for non-C/C++ packages as they will no longer need to pull in the gcc/gcc-c++ packages and in turn a cleaner buildroot environment too.

Hiding the Fedora boot menu

Filed under
Red Hat

The venerable Linux boot menu has made its appearance at boot time since the days when LILO was the standard boot loader, through the days of GRUB, and onward to today's GRUB 2 and others. It is sometimes configured out by distributions as something that will potentially confuse less-technical users, but it has been a mainstay of Fedora for many releases. A recent proposal to hide the menu, starting in Fedora 29, has met a mixed reaction, but those who are not in favor are also those most able to revert to the existing behavior.

Hans de Goede raised the issue back at the end of May. He suggested that Fedora had at one time hidden the boot menu, but changed. As a longtime Fedora user, I don't remember that switch, but my memory is faulty and that may be the case here. In any case, De Goede's idea is to not have the distribution print any confusing messages at boot time: "the end goal being a user pressing the on button and then going to the graphical login manager without him seeing any text messages / menus filled with technical jargon."

The response was somewhat mixed, as might be expected. Stephen Gallagher was concerned about boots that failed and gave the user no alternatives to try. De Goede said that the plan was to detect failed boots and then show the boot menu on the next boot. He muddied the waters somewhat by mentioning a "fastboot" feature that he is planning for Fedora 30. It would effectively provide no way for a user sitting at the console to override the boot sequence (with a key press, say) and get the boot menu once the system has started booting.

Read more

Also: Fedora tackles Southeast Linux Fest 2018

Red Hat News, Mostly APAC

Filed under
Red Hat

Red Hat News

Filed under
Red Hat
  • Red Hat targets regional system integrators through program launch

    Red Hat has launched an Asia Pacific (APAC) program targeted at helping system integrators (SIs) build and modernise applications for the cloud.

    The new initiative is designed to allow partners to deliver new services at a lower cost and accelerate development for faster return on investment.

    Specifically, the Red Hat OpenShift Practice Builder Program has been designed to do just that, using the vendor's container application platform, Openshift, and a portfolio of enterprise-class application and integration middleware software products, JBoss Middleware.

  • Virtualize your OpenStack control plane with Red Hat Virtualization and Red Hat OpenStack Platform 13

    With the release of Red Hat OpenStack Platform 13 (Queens) we’ve added support to Red Hat OpenStack Platform director to deploy the overcloud controllers as virtual machines in a Red Hat Virtualization cluster. This allows you to have your controllers, along with other supporting services such as Red Hat Satellite, Red Hat CloudForms, Red Hat Ansible Tower, DNS servers, monitoring servers, and of course, the undercloud node (which hosts director), all within a Red Hat Virtualization cluster. This can reduce the physical server footprint of your architecture and provide an extra layer of availability.

    Please note: this is not using Red Hat Virtualization as an OpenStack hypervisor (i.e. the compute service, which is already nicely done with nova via libvirt and KVM) nor is this about hosting the OpenStack control plane on OpenStack compute nodes.

  • ORock Technologies Achieves FedRAMP Moderate Authorization for ORockCloud

    As a Red Hat Premier Certified Cloud and Service Provider (CCSP), ORock Technologies architected ORockCloud as a "pure-play" Red Hat cloud that incorporates a suite of Red Hat's open source solutions for enhanced flexibility, security features and control. These include: Red Hat Enterprise Linux; Red Hat OpenStack Platform; Red Hat Virtualization; Red Hat Ceph Storage; Red Hat CloudForms; Red Hat Ansible Tower; Red Hat Satellite; and associated cloud APIs.

  • Will Investors Step Up in Red Hat, Inc. (RHT) and Chubb Limited (CB)?
  • Here’s What To Do With Red Hat, Inc. (RHT), EQT Corporation (EQT)

Red Hat News: Security, Celebrating Red Hat’s 25th Anniversary and More

Filed under
Red Hat
  • Red Hat Security: Red Hat’s disclosure process

    Last week, a vulnerability (CVE-2018-10892) that affected CRI-O, Buildah, Podman, and Docker was made public before some affected upstream projects were notified. We regret that this was not handled in a way that lives up to our own standards around responsible disclosure. It has caused us to look back to see what went wrong so as to prevent this from happening in the future.

    Because of how important our relationships with the community and industry partners are and how seriously we treat non-public information irrespective of where it originates, we are taking this event as an opportunity to look internally at improvements and challenge assumptions we have held.

    We conducted a review and are using this to develop training around the handling of non-public information relating to security vulnerabilities, and ensuring that our relevant associates have a full understanding of the importance of engaging with upstreams as per their, and our, responsible disclosure guidelines. We are also clarifying communication mechanisms so that our associates are aware of the importance of and methods for notifying upstream of a vulnerability prior to public disclosure.

  • Celebrating Red Hat’s 25th anniversary: Red Hat partners have played an important role in our company journey

    As Red Hat celebrates 25 years, I would be remiss not to mention the role Red Hat partners have played in our company’s story. Partners have been an important multiplier for Red Hat and building our customer success. They are important to our future.

  • DH2i signs strategic-alignment agreement with Red Hat

    DH2i Co., a Fort Collins-based company that provides disaster-recovery solutions for Windows, Linux and Oracle databases, has signed a strategic-alignment agreement with Red Hat.

    After testing and validation, DH2i will become a Red Hat Technology Partner and has been certified on Red Hat Enterprise Linux 7.

  • How Financially Strong Is Red Hat Inc (NYSE:RHT)?
  • What is the fate of Red Hat, Inc. (RHT) against Blue Apron Holdings, Inc. (APRN),

Red Hat News

Filed under
Red Hat

Red Hat: APAC, Kubernetes, Raleigh and More

Filed under
Red Hat

Scientific Linux 6.10 RC 1

Filed under
Red Hat
  • Scientific Linux 6.10 RC 1 i386/x86_64 is now available for testing
  • CentOS 6.10 Released, Scientific Linux 6.10 Coming Next Week

    Based off last month's Red Hat Enterprise Linux 6.10 update, CentOS 6.10 is available this week while also the Scientific Linux 6.10 release candidate has also been made available.

    Released on Tuesday was the CentOS 6.10 release. This CentOS 6 update is derived from the same sources as RHEL 6.10.

    As such, like with upstream RHEL 6.10, this new release offers Retpolines and KPTI support for Spectre and Meltdown mitigation. Besides security update work, there are also updates to GCC and other system packages. But all in all, not much is happening for EL6 due to the time around on the market it's mostly just receiving security updates and important fixes. Red Hat Enterprise Linux 7 remains their prime focus and prepping the yet-to-be-released Red Hat Enterprise Linux 8.

Fedora 28 KDE - Call the doctor, it's not feeling well

Filed under
Red Hat
Reviews

I didn't get to test a lot of things - apps, hardware compatibility, performance, whatnot, but then, there's really no reason to persist. This is a failing distro, like so many others released recently. No validation, no care, nothing. Just random code. A lackluster showing with no pride or passion or quality. Fedora 28 KDE did give me media playback, but that's about the only thing that worked fine. The rest was all broken. Customization wasn't smooth, the fonts are meh, no smartphone support, mediocre network support, and then, a dead desktop after trying to install Nvidia drivers the same way that worked just fine in Fedora 27. Madness.

If you want to use Fedora for some reason, the Gnome edition is better, but it's still a rather average product and not suitable for day-to-say use. A steady decline since version 25, and I'm 100% sure this is all the result of the carefree approach to software development, the rapid release mania and the total disregard to validation and user needs. This one is a total flop. And I've just wasted a day and a half of my life. We're done.

Read more

Also: Call for Fedora Women’s Day 2018 proposals

Syndicate content

More in Tux Machines

Licensing With GPL: Greater Certainty

  • A Movement Builds as a Diverse Group of 14 Additional Leaders Seek Greater Predictability in Open Source Licensing
    Today’s announcement demonstrates the expanded breadth and depth of support for the GPL Cooperation Commitment. Companies adopting the commitment now span geographic regions, include eight Fortune 100 companies, and represent a wide range of industries from enterprise software and hardware to consumer electronics, chip manufacturing to cloud computing, and social networking to automotive. The companies making the commitment represent more than 39 percent of corporate contributions to the Linux kernel, including six of the top 10 corporate contributors.1
  • ARM: Arm joins industry leaders in commitment to fair enforcement of open source licenses
    Today, Red Hat announced that several leading technology companies, including Arm, are joining a diverse coalition of organizations that have come together to promote greater predictability in open source license enforcement. Alongside Amazon, Canonical, Linaro, Toyota, VMware and many others we have committed to ensure fair opportunity for our licensees to correct errors in compliance with their GPL and LGPL licensed software before taking action to terminate the licenses.
  • Debian "stretch" 9.5 Update Now Available, Red Hat Announces New Adopters of the GPL Cooperation Commitment, Linux Audio Conference 2018 Videos Now Available, Latte Dock v0.8 Released and More
    Red Hat announced that 14 additional companies have adopted the GPL Cooperation Commitment, which means that "more than 39 percent of corporate contributions to the Linux kernel, including six of the top 10 contributors" are now represented. According to the Red Hat press release, these commitments "reflect the belief that responsible compliance in open source licensing is important and that license enforcement in the open source ecosystem operates by different norms." Companies joining the growing movement include Amazon, Arm, Canonical, GitLab, Intel Corporation, Liferay, Linaro, MariaDB, NEC, Pivotal, Royal Philips, SAS, Toyota and VMware.

Opinion: GitHub vs GitLab

So, Microsoft bought GitHub, and many people are confused or worried. It's not a new phenomenon when any large company buys any smaller company, and people are right to be worried, although I argue that their timing is wrong. Like Microsoft, GitHub has made some useful contributions to free and open-source software, but let's not forget that GitHub's main product is proprietary software. And, it's not just some innocuous web service either; GitHub makes and sells a proprietary software package you can download and run on your own server called GitHub Enterprise (GHE). Let's remember how we got here. BitMover made a tool called BitKeeper, a proprietary version control system that allowed free-of-charge licenses to free software projects. In 2002, the Linux kernel switched to using BitKeeper for its version control, although some notable developers made the noble choice to refuse to use the proprietary program. Many others did not, and for a number of years, kernel development was hampered by BitKeeper's restrictive noncommercial licenses. In 2005, Andrew Tridgell, working at OSDL, developed a client that bypassed this restriction, and as a result, BitMover removed licenses to BitKeeper from all OSDL employees—including Linus Torvalds. Eventually, all non-commercial licenses were stopped, and new licenses included clauses preventing the development of alternative version control systems. As a result of this, two new projects were born: Mercurial and Git. Created in a few short weeks in 2005, Git quickly became the version control system for Linux development. Proprietary version control tools aren't common in free software development, but proprietary collaboration websites have been around for some time. One of the earliest collaboration websites still around today is Sourceforge. Sourceforge was created in the late 1990s by VA Software, and the code behind the project was released in 2000. Read more

Comparing Latencies and Power consumption with various CPU schedulers

The low-latency kernel offering with Ubuntu provides a kernel tuned for low-latency environments using low-latency kernel configuration options. The x86 kernels by default run with the Intel-Pstate CPU scheduler set to run with the powersave scaling governor biased towards power efficiency. While power efficiency is fine for most use-cases, it can introduce latencies due to the fact that the CPU can be running at a low frequency to save power and also switching from a deep C state when idle to a higher C state when servicing an event can also increase on latencies. Read more

csplit: A Better Way to Split File in Linux Based on its Content

Learn some practical examples of the GNU coreutils csplit command for splitting files in Linux. It’s more useful than the popular split command. Read more