We’ve long moved past the era where open source was just a collection of parts; today, it’s the factory itself. Whether you are building AI agents with MCP or migrating legacy virtual machines (VMs) to a unified platform, the value isn't just in the code—it’s in the 'golden path' that gets that code into production safely. This roundup takes a look behind the curtain at the tools and frameworks, like Konflux and llm-d, that are turning complex engineering challenges into repeatable enterprise successes.
In an era of shifting global regulations, digital sovereignty has moved from a compliance "check-box" to a strategic necessity for operational freedom. To help navigate this transition, Red Hat has introduced a new self-service tool designed to help you move past "black box" stacks and establish a clear baseline for your IT estate. This post breaks down the 7 critical domains of sovereignty—from data and technical control to open source awareness—and explains how to use our maturity scale to map a practical roadmap toward a more resilient, independent digital future.
The "works on my machine" problem has long been a hurdle for shifting to cloud-native practices, often because local development tools don't align with hardened production environments. To bridge this gap, we’ve announced the general availability of the Red Hat build of Podman Desktop. This enterprise-ready distribution brings the user-friendly experience of the Podman Desktop community into the professional fold with full Red Hat support, secure-by-design architecture, and a consistent workflow that ensures what you build on your laptop performs predictably on Red Hat OpenShift.
As we move further into 2026, IT leaders are navigating a perfect storm of complexity—from shifting virtualization landscapes to the pressure of making AI a business reality. In this executive perspective, Red Hat outlines a strategic focus on building the trusted, open platforms that redefine how organizations operate. By taking advantage of the combined power of Red Hat Enterprise Linux (RHEL) 10, Red Hat OpenShift, and Red Hat Ansible Automation Platform, we’re moving beyond black box AI to provide high-performance, open source-driven solutions that give you full control over your data and your future.
Faced with a surge in infrastructure requests, The PNC Financial Services Group needed to move faster than their legacy hypervisor allowed. By migrating to Red Hat OpenShift Virtualization, the bank transitioned to a standardized one VM-type model, successfully cutting delivery times from 8 weeks down to just 4—with an eye on a 5-day target. This post explores how PNC uses a unified platform to run critical VMs alongside modern containers, managing their entire estate centrally with Red Hat Advanced Cluster Management for Kubernetes.
As agentic AI moves from experimental to operational, the Model Context Protocol (MCP) has emerged as a key standard for connecting LLMs to enterprise data. However, with increased capability comes increased risk. This article—the first in a new series—examines the current security landscape of MCP, including recent vulnerabilities like "NeighborJack" and sandbox-break flaws. We explore why a secure-by-design approach is non-negotiable for AI agents and how Red Hat is working to provide the guardrails necessary to prevent remote code execution and data exfiltration in your AI deployments.
In highly regulated industries, zero Common Vulnerabilities and Exposures (CVEs) is often more than a goal—it’s a mandate. However, with the explosion of open source software, maintaining a clean sheet is an elusive "holy grail." Enter Project Hummingbird: Red Hat’s initiative to deliver minimal, hardened container images that target a "near zero" standard. By providing a base that is practically free of known vulnerabilities, we’re helping security teams cut through the scanner noise and "ping-pong" matches between development and security, allowing them to focus on the vulnerabilities that actually matter in their specific application code.
Speed and predictability are the 2 biggest requirements for any migration strategy. With the general availability of the migration toolkit for virtualization 2.11, we’ve introduced storage offloading to help you move critical workloads up to 10 times faster than traditional network migrations. By offloading data transfer to the storage array, you can preserve network bandwidth for production traffic and shrink migration windows from hours to minutes. This post walks you through the new storage mapping features and support for our expanded partner ecosystem, including Hitachi, IBM, and NetApp.
What does it feel like to bring 3 years of engineering hard work to the global stage? In the final installment of our "Behind the scenes" series, we hear from the engineers and leaders who moved RHEL 10 from conceptual stages to the keynote stage at Red Hat Summit. This post captures the pinnacle of the launch, reflecting on the surreal experience of seeing the world react to innovations like image mode and RHEL Lightspeed. It’s a celebration of the people who ensure the operating system remains dependable while continuing to push the boundaries of what Linux can do.
While the industry often focuses on the final container image, the real key to security lies in the process used to build it. In this post, we look behind the curtain at Konflux—Red Hat’s internal secure software factory. By modernizing our build system from the ground up using open source projects like Tekton and Sigstore, we’ve achieved SLSA Level 3 integrity and fully reproducible builds at an enterprise scale. Learn how we’re democratizing these capabilities so you can build your own predictable, security-focused framework for software delivery, ensuring that what leaves your pipeline is tamper-free and trusted.
The ultimate goal for service providers is the ability to run AI and radio access network (RAN) workloads on the same hardware without sacrificing performance. In a groundbreaking collaboration with SoftBank Corp., we’ve integrated the open source llm-d framework into their AITRAS orchestrator. This integration allows for the intelligent distribution of Large Language Model (LLM) inference across the network edge, ensuring that AI-powered applications can co-exist with critical 5G/6G functions. By automating resource allocation and disaggregating compute-intensive tasks, we’re proving that AI-RAN isn't just a concept—it’s a commercially viable, power-efficient reality.
Wrap up
As these stories show, "production-ready" in 2026 isn't just about having the latest tools; it’s about having the right foundation. Whether you’re modernizing your virtualization strategy like PNC or building a security-hardened software factory with Konflux, the goal is the same: operational freedom. We’re committed to providing the blueprints and open standards so that you aren't just keeping up with the pace of AI and the hybrid cloud, but leading it.
Risorsa
L'adattabilità enterprise: predisporsi all'IA per essere pronti a un'innovazione radicale
Sull'autore
Isabel Lee is the Managing Editor on the Editorial team at Red Hat. She supports the content publishing process by managing submissions, facilitating cross-functional reviews, and coordinating timelines. Isabel works closely with authors to shape clear, engaging blog content that aligns with Red Hat’s voice and values. She also helps with blog planning, internal communications, and editorial operations. With a background in public relations and a passion for thoughtful storytelling, she brings creativity, curiosity, and attention to detail to the team’s work.
Altri risultati simili a questo
Friday Five — March 20, 2026 | Red Hat
Get the most out of Red Hat Enterprise Linux for Microsoft Azure
Keeping Track Of Vulnerabilities With CVEs | Compiler
Post-quantum Cryptography | Compiler
Ricerca per canale
Automazione
Novità sull'automazione IT di tecnologie, team e ambienti
Intelligenza artificiale
Aggiornamenti sulle piattaforme che consentono alle aziende di eseguire carichi di lavoro IA ovunque
Hybrid cloud open source
Scopri come affrontare il futuro in modo più agile grazie al cloud ibrido
Sicurezza
Le ultime novità sulle nostre soluzioni per ridurre i rischi nelle tecnologie e negli ambienti
Edge computing
Aggiornamenti sulle piattaforme che semplificano l'operatività edge
Infrastruttura
Le ultime novità sulla piattaforma Linux aziendale leader a livello mondiale
Applicazioni
Approfondimenti sulle nostre soluzioni alle sfide applicative più difficili
Virtualizzazione
Il futuro della virtualizzazione negli ambienti aziendali per i carichi di lavoro on premise o nel cloud