Red Hat Product Security has been made aware of vulnerabilities affecting modern microprocessors and operating systems on major hardware platforms including x86 (Intel and AMD chipsets), POWER 8, POWER 9, System z, and ARM, that could allow unauthorized read access to memory. Red Hat is actively developing several scripts to assist users in understanding the impact of these issues to their systems.
Hear the epic true tales of how developers, programmers, hackers, geeks, and open source rebels are revolutionizing the technology landscape. Command Line Heroes is a new podcast hosted by Saron Yitbarek and produced by Red Hat.
As we ring in a new year, we can’t help but reflect on all of the great announcements and innovations, insights, tips, and more that we shared on the Red Hat blog in 2017. To celebrate, we’ve compiled last year’s most popular posts.s.
Red Hat is proud to announce that we are making a donation to the Shelton Leadership Center in honor of General H. Hugh Shelton’s (U.S. Army Retired) years of service to the company. General Shelton served on Red Hat’s board of directors for more than 14 years, seven of those as chairman.
Hybrid cloud management needs functions like self-service access under policy-based control, metering and billing, intelligent workload placement, system image provisioning, capacity planning, governance, and lifecycle management—features that often go above and beyond what’s baked into the cloud infrastructure. At the same time, hybrid cloud management needs to fulfill its overarching goal of providing consistency across hybrid infrastructures.