Language Selection

English French German Italian Portuguese Spanish

Red Hat

Fedora 34 Change To Further Compress Install Media Rejected Due To Install Time Concerns

Filed under
Red Hat

The plans to shrink the Fedora install media by ramping up the compression settings were rejected at last week's Fedora Engineering and Steering Committee meeting.

The plan had called for ramping up the XZ compression settings for Fedora's SquashFS image in order to deliver a smaller image. Some numbers being talked about in the proposal were saving around 142MiB for a roughly 6.5% longer install time.

While the smaller image size is a win for those on limited/metered bandwidth as well as reducing the hosting requirements for Fedora mirrors, depending upon your system the increase in install time could be much longer.

Read more

GNOME DMA-BUF Screencasting Now Limited To Intel Drivers Due To Bugs Elsewhere

Filed under
Red Hat

Prior to tagging Mutter 3.38 for this week's GNOME 3.38 desktop release there was a last-minute change around the DMA-BUF screencasting feature.

Earlier this year GNOME developers wired up DMA-BUF screencasting support for GNOME on Wayland. With making use of DMA-BUF for buffer sharing to avoid excess image copies between CPU and GPU memory, the screencasting functionality is much more efficient. GNOME screencasting is just one of many projects making use of this zero-copy buffer sharing support.

Read more

Also: Bilal Elmoussaoui: Oxidizing portals with zbus

IBM/Red Hat Leftovers

Filed under
Red Hat
  • The future of virtual conferences, service mesh, and more industry trends

    As part of my role as a principal communication strategist at an enterprise software company with an open source development model, I publish a regular update about open source community, market, and industry trends. Here are some of my and their favorite articles from that update.

  • Walicki with Watson

    “Walicki with Watson” seems to be an appropriate way to introduce myself. As a member of the IBM Developer Advocacy team, I am eager to share my experiences with IBM Cloud and the powerful IBM Watson AI APIs. As an edge computing and IoT expert, I’m passionate about helping developers build custom edge, IoT and embedded Linux solutions for their industrial and enterprise use cases.

    If you peer back in time, the computing industry has undergone epochal transformations. Once you experience that transformational technology, you’re quick to realize “This changes everything…” As a way of introducing myself to developers, I’ll rewind the cassette tape a bit and give you some background about my personal career evolution during important inflection points of the computing era.


    Linux – In 1999, I was a founding member of the Linux Technology Leadership Council which established IBM’s Linux strategy and led to the establishment of the Linux Technology Center. For 17 years, I was the architect for the world’s largest enterprise Linux client desktop and desktop virtualization deployment ever conceived. Based on Red Hat Enterprise Linux, the internal Linux@IBM Open Client initiative paved the way for corporate adoption of Linux. Open technologies, open standards, open source, and Linux have been a core IBM strategy.

    I was at LinuxWorld 2001 when Sam Palmisano announced IBM’s billion dollar investment in Linux. Unequivocally, Linux has won. An entire generation of developers have contributed to making Linux great. Today, linux runs the internet and is the foundation of cloud computing. Arguably, Linux saved the mainframe, powers the world’s largest supercomputers, runs on the majority of smartphones in the world and it powers billions of IoT and edge devices. I could not imagine a greater opportunity to help Linux become even more pervasive!

  • Using Debian and RHEL troubleshootings containers on Kubernetes & OpenShift

    You can connect to a running pod with oc/kubectl rsh pod_name, or start a copy of a running pod with oc debug pod_name, but as best practises recommend unprivileged, slim container images, where do you get sosreport, kdump, dig and nmap for troubleshooting ?

  • 25 years and going strong: Why Java matters to the future of banks

    Java has a long history with banks and financial institutions, but what about its future? Does Java have a place in a containerized, cloud-native future? We'd argue yes, especially with Quarkus a full-stack, Kubernetes-native Java framework.

    Earlier this year, Java celebrated its 25th anniversary. As customer needs evolve, Java continues to stand the test of time, being one of the most in-demand and useful programming languages used in a variety of business applications. Banks and financial institutions, which are well-known for being conservative in the use of technology and hesitant to change, were early adopters of Java. They liked its stability, security models and innovation it has allowed.

    In the 25 years since its release, Java has become an important language and platform for financial institutions. You'll find it running important workloads in many banks and financial institutions. When asked to choose between starting over or updating their existing applications to use cloud-native platforms, banks are likely to choose updating. With the introduction of Quarkus, banks can now continue to leverage Java, while also remaining competitive and innovative in the cloud-native, modern world.

  • Certificate transparency for web and mobile apps

    If you have been following the area of security on the web closely, you’ve probably heard the term certificate transparency, but if you haven’t heard of certificate transparency, fret not. This blog post has you covered.

    In this post, I’ll introduce you to the concept of certificate transparency and then delve into the actions you must take as an app developer in your web or mobile app to implement certificate transparency.


    How much client-side validation is really necessary is a matter of debate. Most browsers perform client-side certificate transparency checks on certificates.

    A compromised certificate affects all users of the certificate. Therefore, the malicious certificate needs to be detected only once whether you have a single user or a million users.

    Third party tools exist that monitor certificate transparency logs for malicious certificates. Depending on your requirements, you can either choose to use such third party tools or simply perform client-side certificate transparency checks each time your mobile app connects to your server.

  • Red Hat Reinforces Red Hat Enterprise Linux as a Foundation for Sensitive Computing with Common Criteria Certification, Commercial Solutions for Classified Status
  • Join IBM Z’s Chief Penguin: 30 startups accepted in IBM’s Hyper Protect Accelerator

    Last year, the IBM Hyper Protect Accelerator introduced 15 startups in the program’s very first cohort, and this year we will be announcing 30 additional companies in our upcoming Cohorts 2 & 3 during IBM Z Day on September 15!

    Our team has spent the past four months assessing and interviewing global early-stage fintech, healthtech, and insurtech startups that handle highly sensitive personally identifiable information and increase access to essential services.

    In an increasingly digital world, the value of customer data has never been greater, and the challenges of keeping data secure have never been more important to businesses and startups alike. ForgeRock reported that 97% of data breaches in 2018 targeted personally identifiable information, and nearly 60% of data breaches targeted health or financial data. As these incidents increase each year, it is our mission to support companies that prioritize keeping this customer information secure from tampering or hacking. Whether it is a healthtech startup disrupting how medical professionals share patient data, or a fintech startup innovating frictionless money transfer in Africa — the impact of keeping data secure will expand who can use and access these essential services.

  • How BBVA has automated processes with Red Hat’s open technologies

    BBVA USA offers customer-focused retail and digital banking and serves thousands of customers a day. To maintain a high standard of customer experience, we realized that our back-end technology solutions needed an upgrade. That meant migrating the dozens of automated business rules engines that were running in legacy technology - and serving more than 150,000 business process requests per month, including requests for commercial loans, mortgages, and other critical services that are both crucial for building trust with customers and advancing the business. Historically, the framework that handled these requests was expensive and cumbersome to maintain, but in just six months, we have successfully implemented Red Hat technologies to migrate to BBVA Nextgen Platform RuleS Cloud Service. Seems impossible, right? Well, not when you have the right technologies - like enterprise open source tools from Red Hat - in place. Read on to learn how we did it.


    The platform uses a combination of public and private clouds, with Red Hat OpenStack as the base on which to deploy and the business process management as a service process engine and RuleS rules engine for automation. There is also a monitoring component, with a real-time KPI dashboard. This means that there is just one console for every task.

  • Women Of Mainframe | Observability In Mainframe DevOps | Open Mainframe Summit

IBM/Red Hat Leftovers

Filed under
Red Hat
  • Red Hat Marketplace Aims to Accelerate Open Hybrid Cloud Innovation With Certified Software Solutions Ready to Run on Any Cloud

    Red Hat, Inc., the world's leading provider of open source solutions, and IBM (NYSE: IBM), today announced the general availability of Red Hat Marketplace, a one-stop-shop to find, try, buy, deploy and manage enterprise applications across an organization’s hybrid IT infrastructure, including on-premises and multicloud environments.

  • Schlumberger, IBM and Red Hat Announce Major Hybrid Cloud Collaboration for the Energy Industry

    Schlumberger, IBM and Red Hat, announced today a major collaboration to accelerate digital transformation across the oil and gas industry. The joint initiative will provide global access to Schlumberger’s leading exploration and production (E&P) cloud-based environment and cognitive applications by leveraging IBM’s hybrid cloud technology, built on the Red Hat OpenShift container platform.

  • Enterprises say data integration is key to business, but it’s weighed down by challenges

    Market disruptions driven by advanced technologies, increased competition from startups, increasingly savvy and more demanding customers — these are just some of the more visible pressures companies face today. To help relieve those pressures and remain competitive, companies are trying to accelerate their ability to deliver innovative products and services, and that requires the ability to make changes to business models, processes, and applications more quickly, as needed. One way to make those changes is to employ Red Hat’s agile integration approach. Why? Because it combines integration technologies, Agile delivery techniques, and cloud-native platforms so apps and data across multiple systems can work together more quickly and seamlessly.

    Data is considered a linchpin, and a challenge, in companies’ ongoing integration efforts that are central to their top IT priorities such as emerging technology initiatives and public cloud adoption. In fact, many of the obstacles companies face revolve around data, and those challenges are shifting. This is one of the takeaways of Red Hat’s survey of decision makers including IT architects, developers, managers, directors, and C-level executives. The research helps to characterize how the market operates in relation to data integration and where organizations are in their use of agile processes. It also delineates differences between technical and business users when it comes to these topics.

  • Peter Czanik: Insider 2020-09: Prometheus; proxy; ESK;

    This is the 84th issue of syslog-ng Insider, a monthly newsletter that brings you syslog-ng-related news.

  • Madeline Peck: September Blog Post

    I’ve shifted from working full time hours during the summer at Red Hat, to working ten hours (give or take) part time remotely while I’m starting classes again. I’ve decided to also chat about my thesis work on here, and I’m still deciding whether or not to make their own posts on the off weeks in between my intern posts, simply because neither probably has enough to talk about every week.

    Let’s catch up though. The latest thing that’s been on my mind preparing for a sketch note session today on Hopin for a research talk, from 1:30-2:30 EST by Jose Renau and Karsten Wade. So basically Jose will be giving a talk about Live Hardware Development at UCSC and Karsten will help lead the conversation, and then at 2:00 it will be an open round table discussion. While they talk and give their slides virtually, there will be artists sketching on screen about the topic, which is my job.

    On Friday I met with Heidi Dempsey, Sarah Coghlan, and Mo Duffy to go over the website and program and make sure we were all sure how it was going to work. During that session these were the doodles I came up with. I’m very intrigued by super heroes and detectives who are the champions of code and besides drawing what I imagined Sarah’s dog, and Heidi, that filled up the page pretty much.

  • From monoliths to microservices: Modernize your apps now

    Using a modular microservices architecture is becoming a standard for cloud development, much like using prepared ingredients is while cooking. According to a recent survey by O’Reilly, more than 75% of organizations are currently using microservices. What’s the appeal of microservices? Just like in cooking, relying on pre-made ingredients lets you skip the repetitive prep and get right to the creative stuff that makes your app stand out.

  • The 2020 Call for Code Awards

    2020 has been unprecedented in terms of what society has faced. It has also been unprecedented in the degree to which you, the Call for Code community, have stepped up to make a difference. Be sure to mark your calendar for October 13 at 7:30 p.m. ET and join our host, CNN Political Commentator Van Jones, in commemorating the largest tech-for-good initiative of its kind: Call for Code©. The 2020 Call for Code Awards Celebration is going digital this year, making it easier than ever to tune in and be inspired by what we have achieved. Here are just a few reasons why you should attend.

  • Call for Code Daily: Kode With Klossy, intern innovation, & mental health

    The power of Call for Code® is in the global community that we have built around this major #TechforGood initiative. Whether it is the deployments that are underway across pivotal projects, developers leveraging the starter kits in the cloud, or ecosystem partners joining the fight, everyone has a story to tell. Call for Code Daily highlights all the amazing #TechforGood stories taking place around the world. Every day, you can count on us to share these stories with you. Check out the stories from the week of September 7th:

Red Hat Leftovers

Filed under
Red Hat
  • The amazing new observability features of Open vSwitch

    People working in the telco space with DPDK accelerated Open vSwitch have probably seen questions about packet drops a number of times and with multiple customers. Is it OVS-DPDK, or is it the VNF? Why is it happening, and where? What happened, and more importantly, what can we do about it? In this post we'll look at troubleshooting and answering some of these questions.

  • Test your Red Hat OpenStack Platform skills before you certify

    Today’s organizations are looking to accelerate application and service delivery and innovate faster to differentiate their businesses while empowering IT teams to support digital initiatives. Extending compute and storage power to the edge is key for organizations looking to act on data faster and scale infrastructure while also providing higher-quality experiences for latency-sensitive applications.

    By placing IT resources in edge sites using Red Hat OpenStack Platform distributed compute nodes, organizations - specifically in the telco space - may offer a better quality of experience to customers through faster application processing. Additionally, the smaller OpenStack footprint can create a lower cost solution with consistent operations. In order to support the shift towards edge computing and open compute solutions, Red Hat Certification has developed the Preliminary Exam in Red Hat OpenStack Administration (PE110).

  • Red Hat Academy launches user platform for improved learning experience

    In order to better serve our Red Hat Academy educational institutions around the world, the Red Hat Academy team has launched an enhanced learning environment on Sept. 1, 2020. With a new interface and improved user experience, students and instructors will be able to more easily navigate their courses, access supplemental learning materials, track course progress, and interact and engage with one another more effectively.

    The Red Hat Academy program partners with academic institutions to offer education programs on Red Hat technologies to help students reach their academic and career potential. Red Hat Academy’s curriculum involves hands-on instruction across platform, middleware, and cloud technologies built with input from Red Hat development, support, and field consulting teams.

  • Stop unauthorized applications with RHEL 8's File Access Policy Daemon

    Application allowlisting is the practice of specifying an index of approved applications or executable files that are permitted to run on a system by a specific user. This is often used on a multi-user system or some kind of a shared hosting server, where multiple users exist and they have to be given limited permissions, so that they can only run approved applications on the shared system.

    Note: A lot of external documentation uses the term "whitelist" in the place of allowlist and "blacklist" in the place of denylist. Red Hat is trying to be more inclusive by eradicating problematic language.

    Red Hat Enterprise Linux (RHEL) and many other distributions have SELinux available, which can be used to effectively block applications which are not explicitly allow listed, and commercial products are also available. However technologies like SELinux are designed to control application behaviour but do not know which applications are trusted. Therefore SELinux is complementary to other technologies because they handle different aspects of system security.

Ankur Sinha: How do you Fedora?

Filed under
Red Hat

Ankur is a Computational Neuroscientist and has just started his first post-doctoral fellowship at University College London and a FLOSS enthusiast trying to spread the message of FOSS and evidence based science. Ankur started using Linux a decade ago, when he was introduced to Linux in a LUG doing an install fest during his undergraduate degree.

Ankur found about Fedora after a distro hopping phase in 2008, and since then he has been a fedora user. His first memory of the Fedora community is an IRC workshop on packaging fonts that the Fedora India community had organised back in 2008. Talking to and meeting other community members has been one of the most exciting parts of the Fedora community for him. “I found this great bunch of people to hang out and geek out with! It was so much fun, and extremely educational both in terms of technical knowledge and the social/philosophical side of FOSS and life in general.”

Read more

Red Hat Leftovers

Filed under
Red Hat
  • OpenShift 101: Web console and CLI

    In the first blog post in this introductory series on RedHat OpenShift, you learned about its architecture and components. In this blog post, you will explore the OpenShift web console and command-line interface (CLI) and learn about the capabilities of the Developer and Administrator perspectives on the platform.

    The new web console UI is one of the major improvements in OpenShift 4. If you used OpenShift 3, you will notice this improvement. When you first log in to the cluster, the navigation list is on the left. If you click on Administrator, that’s where you can switch the view to Developer, and you will notice how different the listed tabs are.

    There are mainly two perspectives on the web console: Administrator and Developer. You can have different accounts with different permissions that are managed by the Administrator using cluster role binding or project role binding. For now, I will stick to introducing the roles of Administrator and Developer on the web console.

  • The evolution of Red Hat Summit 2021: Announcing a hybrid approach

    As poet Tuli Kupferberg said, "when patterns are broken, new worlds emerge." If there is one thing we can say for 2020, it’s that it shattered many of our old patterns and shook up how we do things. When we moved this year’s Red Hat Summit from an in-person event to an all-virtual experience, we had no idea what the outcome would be. It was brand new territory. But it’s safe to say that it was a success!

    We could take the same approach with Red Hat Summit next year, it would certainly be the safer and simpler option. But that's not Red Hat. Instead of repeating what we've already done we've decided this is a good time to explore new worlds and build on our successes while also trying new things.

    We're pleased to announce that Red Hat Summit 2021 will be a three-part experience that includes two virtual components in the spring and summer and a series of in-person events later in the year!

  • Getting started with the Red Hat Insights patch capability

    One of the most important aspects of system security is keeping systems up to date with patches. Many organizations have hundreds or thousands of Red Hat Enterprise Linux (RHEL) servers in their environments, so keeping track of patches on servers can be challenging. If critical patches are missed on systems, it could result in the systems being compromised, having unscheduled downtime, or other issues.

    Red Hat Insights is a software-as-a-service (SaaS) offering that is included with your Red Hat Enterprise Linux subscription. It includes several capabilities to help with various aspects of management. The Patch capability can help customers understand which advisories are applicable in their environments, and can help automate the process of patching via Ansible playbooks.

  • Red Hat on Red Hat: How collaboration can transform configuration management in IT

    As in most IT organizations, configuration management can be complex and crosses both infrastructure and software development disciplines. Red Hat IT worked to remove much of that complexity and drive consistency by directly involving infrastructure, software, information security engineers, and enterprise architects across the organization to create a set of clearly defined standards and best practices.

    But, before we get into our successes with this collaboration, it’s important to begin with a clear description of the business problems we faced, and what specific challenges we needed to address. For starters, our then-current configuration management solution, Puppet, was not what most of our team wanted to use, nor what we were recommending to customers.

  • Systemd 247 Still Aiming To Integrate systemd-oomd

    Systemd developers are still hoping to introduce systemd-oomd as part of the next release.

    Systemd-oomd is the effort to provide better Linux out-of-memory / low-memory handling. Systemd-oomd is being spun from Facebook's out-of-memory daemon and adapted to not only work on Linux servers but desktops as well.

    The systemd-oomd daemon polls for OOMD-enabled cgroups to monitor and will kill based on memory pressure or swap usage. The systemd-oomd behavior is configurable via a new oomd.conf file. This daemon will only kill groups if EnableOomdKill is set as obviously not wanting to kill random processes over memory use.

  • Installing latest syslog-ng on openSUSE, RHEL and other RPM distributions

    The syslog-ng application is included in all major Linux distributions, and you can usually install syslog-ng from the official repositories. If the core functionality of syslog-ng meets your needs, use the package in your distribution repository (yum install syslog-ng), and you can stop reading here. However, if you want to use the features of newer syslog-ng versions (for example, sending log messages to Elasticsearch or Apache Kafka), you have to either compile syslog-ng from source, or install it from unofficial repositories. This post explains you how to do that.

    For information on all platforms that could be relevant to you, check out all my blog posts about installing syslog-ng on major Linux distributions, collected in one place.

    In addition, syslog-ng is also available as a Docker image. To learn more, read our tutorial about logging in Docker using syslog-ng.

  • IBM/Red Hat open hybrid cloud application market

    IBM and its Red Hat company have opened up what they call a one-stop-shop for customers looking to build, deploy and manage hybrid-cloud applications on-premises or in multicloud environments.

    With Red Hat Marketplace, enterprise customers can find and buy the tools and services they need to build cloud-native applications across public and private cloud environments through one curated repository, Red Hat executives said.

  • Red Hat Marketplace: The open hybrid cloud game changer

    Hybrid and multicloud environments are quickly becoming a standard for global enterprises, as flexibility, freedom of choice and workload portability become necessities in successfully building and deploying applications. When public cloud providers first entered the market, many insisted that all workloads be deployed on a single public cloud. At Red Hat, we recognized early on that users wanted and needed the flexibility to operate across many different environments, from public and private clouds to virtual systems and bare metal.

    Over the past eight years, Red Hat has been defining and building hybrid clouds with Red Hat OpenShift to provide operational consistency and portability across any environment. By leveraging the enterprise-grade Kubernetes and cloud-native capabilities of OpenShift, organizations can more seamlessly follow a hybrid cloud strategy and achieve the agility they need to generate impactful business results.

Fedora/IBM/Red Hat Leftovers

Filed under
Red Hat
  • Fedora 34 KDE Spin Planning Switch To Wayland

    For four years now since Fedora 25 the default GNOME Shell desktop environment has been using Wayland by default. Next spring with Fedora 34, the KDE Spin is finally planning a similar migration to use Wayland by default with the KDE Plasma desktop.

    The Wayland support with Plasma and related KDE components has improved in recent times with many bugs being ironed out and other improvements now that they have a Wayland-first mentality to X11. In early 2021 with Fedora 34 the plan is to switch from using an X.Org based session by default for the Fedora KDE Spin to now using the modern Wayland session.

  • Relive summer of OSCON: Building reactive apps for a modern infrastructure

    If you’re a developer who’s heard the phrase reactive programming, watch our video to see how you can use its guiding principles to make your application more responsive, resilient, and elastic, watc.

    With the advances over the past decade in hardware, containerization, and virtualization technologies, architecture patterns like reactive systems are becoming increasingly popular for taking advantage of this improving infrastructure. Join Mary Grygleski and Grace Jansen to get hands-on as you learn how to build your own simple reactive systems.

  • Simplify the development process with Red Hat Marketplace

    Today Red Hat and IBM announced the launch of Red Hat Marketplace, a one-stop-shop to find, try, buy, deploy, and manage enterprise applications across an organization’s hybrid IT infrastructure, including on-premises and multicloud environments. Red Hat Marketplace gives developers a streamlined view of software that is certified to work in Kubernetes container environments and minimizes red tape for developer managers.

    I’m excited for how this helps lift the burden for enterprise developers who are being asked to develop strong, secure, compliant apps in hybrid cloud environments. Being able to choose from selected products that reliably run on Red Hat OpenShift frees developers up to worry less about their guard-rails, and focus on delivering more innovative solutions.

    Let’s look at some of the benefits that Red Hat Marketplace offers to developers and to partners who offer their products on the marketplace.

  • Global developer relations with empathy and compassion

    Johanna Koester is Director of Worldwide Developer Advocacy for IBM, where she oversees a team of dozens of developer advocates around the world. Their mission is to promote open source and cloud services. I sat down with Johanna to discuss developer relations in enterprise companies and the value of open source and empathy to developers, to developer advocates and to managers and executives.

  • Red Hat Academy launches user platform for improved learning experience

    In order to better serve our Red Hat Academy educational institutions around the world, the Red Hat Academy team has launched an enhanced learning environment on Sept. 1, 2020. With a new interface and improved user experience, students and instructors will be able to more easily navigate their courses, access supplemental learning materials, track course progress, and interact and engage with one another more effectively.

    The Red Hat Academy program partners with academic institutions to offer education programs on Red Hat technologies to help students reach their academic and career potential. Red Hat Academy’s curriculum involves hands-on instruction across platform, middleware, and cloud technologies built with input from Red Hat development, support, and field consulting teams.

  • Deploy a deep learning model on Kubernetes

    As enterprises increase their use of artificial intelligence (AI), machine learning (ML), and deep learning (DL), a critical question arises: How can they scale and industrialize ML development? These conversations often focus on the ML model; however, this is only one step along the way to a complete solution. To achieve in-production application and scale, model development must include a repeatable process that accounts for the critical activities that precede and follow development, including getting the model into a public-facing deployment.

    This article demonstrates how to deploy, scale, and manage a deep learning model that serves up image recognition predictions using Kubermatic Kubernetes Platform.

  • GitOps: Stop, collaborate and deploy

    DevNation Tech Talks are hosted by the Red Hat technologists who create our products. These sessions include real solutions plus code and sample projects to help you get started. In this talk, you’ll learn about GitOps from Ryan Cook and Burr Sutter.

    The barrier to using Kubernetes and OpenShift has never been lower, but how do we manage the applications that run on these clusters? During this presentation, we provide a live demonstration of deploying a GitOps tool and then using it to manage both your applications as well as cluster resources. We will also migrate an application live across the United States on multiple clusters with zero downtime, all managed through git.

  • New report finds automation paves the way for business and technical benefits alike

    Today’s businesses are challenged with moving faster than ever before and often with less resources, both in terms of budget and personnel. The tumultuous landscape and shifting global dynamics that organizations currently face with more workforces moving remote is leading many IT departments to evaluate how they can continue to support their customers and grow their business in uncertain times.

    To continue to scale, automation needs to be made a priority investment. Automation allows organizations to get the most "bang for their buck" when it comes to IT investments, and not because it will eliminate jobs, but because it will free IT staff to focus on more important business initiatives. It also can be a make or break for companies as they move to smaller in-office teams managing vast networks and infrastructure.

    According to a new Forrester report commissioned by Red Hat, organizations are taking note of this, prioritizing automation initiatives over competing goals. The report, "Automation based in open source drives innovation,"1 looks at how organizations are turning to automation, where they are looking to go from here with the technology and how leadership and implementers can align their goals when it comes to implementing automation.

Servers: IBM/Red Hat and Uptime Records

Filed under
Red Hat
  • 10 Years of OpenStack – Julia Kreger at Red Hat
  • Keeping Kubernetes secrets secret

    DevNation Tech Talks are hosted by the Red Hat technologists who create our products. These sessions include real solutions plus code and sample projects to help you get started. In this talk, you’ll learn how to manage Kubernetes secrets from Alex Soto Bueno and Burr Sutter.

    Everyone is talking about microservices and serverless architecture, and how to deploy them using cluster managers like Kubernetes. But, what about the secrets (such as certificates, passwords, SSH, and API keys)? The current trend increases the number of secrets required to run our services. This fact places a new level of maintenance on our security teams.

    How can we share and manage these secrets for our services in dynamic scenarios where instances are started automatically, or where there are multiple instances of the same services for scalability reasons? Are you keeping up?

  • A teenage aspiring SysOp in the age of the text-only BBS

    This was when I got into "computer things." I was a young teenager in 1993 when my dad brought home his first PC—a Gateway 2000 486/SX with a whopping 4MB of RAM, and a whole 320MB hard drive. It ran MS-DOS 6.21 and Windows (for workgroups) 3.11.

    In those days, computers just weren't that fast. That little 486 had trouble running Doom; forget about the multimedia experience that is today's internet. So, the majority of what you could do online was text. On top of that, the internet was still a very new thing, and not everyone could get access to it. Broadband was not a thing. Couple that with the fact that my dad was a telco guy, and knew that the internet was pretty much the wild west at the time—I wasn't allowed anywhere near it. That, however, just made me want to explore it that much more.

  • Most Reliable Hosting Company Sites in August 2020 [Ed: Almost everything GNU/Linux]

    The most reliable hosting company site in August 2020 belonged to, with no failed requests and the fastest average connection time. has now had the most reliable hosting company site three times in 2020. The company provides a range of services including cloud hosting, dedicated servers, colocation and managed services from four locations across the US, Europe and Asia.

    Swishmail appeared in second place, also responding to all of Netcraft's requests in August. Swishmail provides business email services alongside hosting solutions.

    Rackspace, Bigstep and EveryCity appear in third, fourth and fifth places. Rackspace had the second fastest average connection time and has appeared in the top 10 six times in 2020. Bigstep offers "bare metal" cloud hosting to provide the flexibility of cloud hosting but without the associated overhead and performance reductions of virtualization. EveryCity has appeared in the top 10 seven times in 2020 and is the only site that uses SmartOS.

CentOS vs. Fedora: Key Differences

Filed under
Red Hat

Both Fedora and CentOS are RPM-based Linux distributions. The two share a lot of features in common but still have several differences. In this post, we introduce both Fedora and CentOS and look at their key differences in this CentOS vs. Fedora comparison article.

CentOS is an open-source Linux distribution focusing on the entire system’s stability and robustness. Since the source code is derived from the famous Red Hat Enterprise Linux (RHEL), CentOS has many similar features to Red Hat. Introduced in 2004, CentOS is developed and maintained by the very active CentOS community. It is composed of network and system administrators, managers, and core Linux contributors from all around the world.

Read more

Syndicate content

More in Tux Machines

Android Leftovers

Games: art of rally, Navi, Proton

  • art of rally strips down the furious sport into a serene top-down experience

    From the creator of Absolute Drift comes art of rally, a top-down racing game that heavy on style and it has great gameplay to back it up too. Here's the thing: i don't drive. Not in real life and any attempt at doing so seriously in games always comes with massive amount of hilarious failure. I'm terrible at DiRT Rally, I'm equally as crap at the F1 series, back when GRID Autosport came to Linux a lot of my time was spent on my roof and…you get the idea. They're all actually a little brutal for people like me - which is why I've come to appreciate the calmer side of it all thanks to the magnificent art of rally.

  • A Linux update may have let slip AMD Big Navi's mammoth core specs

    The summer of leaks continues, this time with the attention turning to AMD's next-gen GPUs based on the RDNA 2 architecture, which we'll find out more about on October 28. An enterprising redditor (via Tom's Hardware) was digging around the Radeon Open Compute (ROCm) code and discovered what appears to be a specification list for two of AMD's next generation GPUs.

  • Proton: More Games to Play

    Proton is amazing, and it’s easy to lose sight of all that it can do. Here’s a few videos I picked up recently to showcase some of the latest tested games running on Linux via Proton/Steamplay, as captured in video.

Mozilla: Fake News and AI Fund

  • How to spot (and do something) about real fake news

    Think you can spot fake news when you see it? You might be surprised even the most digitally savvy folks can (at times) be fooled into believing a headline or resharing a photo that looks real, but is actually not.

  • Launching the European AI Fund

    Right now, we’re in the early stages of the next phase of computing: AI. First we had the desktop. Then the internet. And smartphones. Increasingly, we’re living in a world where computing is built around vast troves of data and the algorithms that parse them. They power everything from the social platforms and smart speakers we use everyday, to the digital machinery of our governments and economies. In parallel, we’re entering a new phase of how we think about, deploy, and regulate technology. Will the AI era be defined by individual privacy and transparency into how these systems work? Or, will the worst parts of our current internet ecosystem — invasive data collection, monopoly, opaque systems — continue to be the norm? A year ago, a group of funders came together at Mozilla’s Berlin office to talk about just this: how we, as a collective, could help shape the direction of AI in Europe. We agreed on the importance of a landscape where European public interest and civil society organisations — and not just big tech companies — have a real say in shaping policy and technology. The next phase of computing needs input from a diversity of actors that represent society as a whole.

Is Open Source a Religion?

Is open source a religion? There is a persistent myth that free/open source software (F/OSS) supporters think of F/OSS as a religion. SUSE is the largest open source software company, so that would make us, what, a church with the cutest mascot? Of course this is wrong and F/OSS is not a religion, though the idea of working in a hushed cathedral-like atmosphere with pretty stained glass and organ music is appealing. (Visit St. John’s Cathedral in Spokane, Washington, USA to see a real genuine full-sized pipe organ. When it hits the low notes it rattles your bones from the inside.) If I really want stained glass and my own cathedral I can have those for just because, so let us move on to what F/OSS is really about, and what the value is for everyone who touches it, like customers, vendors, learners, hobbyists, governments– you might be surprised at the reach of F/OSS and its affect on the lives of pretty much everyone. Read more