Red Hat Blog
The Friday Five is a weekly Red Hat® blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.
Red Hat Product Security has been made aware of vulnerabilities affecting modern microprocessors and operating systems on major hardware platforms including x86 (Intel and AMD chipsets), POWER 8, POWER 9, System z, and ARM, that could allow unauthorized read access to memory. Red Hat is actively developing several scripts to assist users in understanding the impact of these issues to their systems.
Hear the epic true tales of how developers, programmers, hackers, geeks, and open source rebels are revolutionizing the technology landscape. Command Line Heroes is a new podcast hosted by Saron Yitbarek and produced by Red Hat.
As we ring in a new year, we can’t help but reflect on all of the great announcements and innovations, insights, tips, and more that we shared on the Red Hat blog in 2017. To celebrate, we’ve compiled last year’s most popular posts.s.
Red Hat is proud to announce that we are making a donation to the Shelton Leadership Center in honor of General H. Hugh Shelton’s (U.S. Army Retired) years of service to the company. General Shelton served on Red Hat’s board of directors for more than 14 years, seven of those as chairman.
Hybrid cloud management needs functions like self-service access under policy-based control, metering and billing, intelligent workload placement, system image provisioning, capacity planning, governance, and lifecycle management—features that often go above and beyond what’s baked into the cloud infrastructure. At the same time, hybrid cloud management needs to fulfill its overarching goal of providing consistency across hybrid infrastructures.
About the author
Red Hat is the world’s leading provider of enterprise open source solutions, using a community-powered approach to deliver high-performing Linux, cloud, container, and Kubernetes technologies.