Search

English

English

Log in

Log in/Register

Websites

The Friday Five is a weekly Red Hat® blog post with 5 of the week's top news items and ideas from or about Red Hat and the technology industry. Consider it your weekly digest of things that caught our eye.


IN THE NEWS:

Red Hat Accelerates Cloud-Native Development with Unified Hybrid Cloud Storage for Red Hat OpenShift Container Platform

The announcement of Red Hat OpenShift Container Storage 4 builds on more than three years of rapid adoption by customers worldwide looking for a consistent storage experience for a wide variety of data-centric applications across the open hybrid cloud.

image


LISTEN TO THE PODCAST:

Kubernetes Podcast - OpenShift and Kubernetes, with Clayton Coleman

Five years ago, Clayton Coleman took a bet on a new open source project that Google was about to announce. He became the first external contributor to Kubernetes, and the architect of Red Hat's reinvention of OpenShift from PaaS to "enterprise Kubernetes". Kuberenetes Podcast hosts Adam Glick and Craig Box return for 2020 with the story of OpenShift.

image

 


CHECK IT OUT:

Command Line Heroes season 4 trailer

No one ever said hardware was easy. In Season 4, Command Line Heroes is telling 7 special stories about people and teams who dared to change the rules of hardware and in the process changed how we all interact with technology. Listen to the trailer now.

image


IN THE NEWS:

Introducing Red Hat OpenShift 4.3 to Enhance Kubernetes Security

With security a paramount need for nearly every enterprise, particularly for organizations in the government, financial services and healthcare sectors, Red Hat OpenShift 4.3 delivers FIPS (Federal Information Processing Standard) compliant encryption and additional security enhancements to enterprises across industries.

image


GOOD READ:

TechTarget - Confidential computing promises secure cloud apps

Enterprises, governments and other organizations all sit on vast troves of data that cannot be processed due to security and privacy concerns. To address this limitation, researchers and vendors have developed various confidential computing techniques to safely process sensitive data.

image