Reading view

There are new articles available, click to refresh the page.

Getting started with Red Hat Ansible Lightspeed with IBM watsonx Code Assistant

Note from the editor: This blog post was originally published in November 2023 and has been updated to include the latest feature enhancements as well as the addition of a 90-day trial option for Red Hat Ansible Automation Platform subscribers. Red Hat Ansible Lightspeed with IBM watsonx Code Assistant is a generative AI (gen AI) service within Red Hat Ansible Automation Platform that is engineered to help automation teams create, adopt and maintain Ansible content more efficiently.In this post, we’ll walk through the capabilities of Ansible Lightspeed with IBM watsonx Code Assistant to hel

What’s new with the command line interface in RHEL AI 1.4?

How many times have you had to start running a program on your terminal, and then… you’re just stuck there? Suddenly, you can’t close out your terminal or multi-task.Well, no more–kind of!With the release of Red Hat Enterprise Linux (RHEL) AI 1.4, Red Hat is introducing background process management for developer preview. This feature enables you to run the synthetic data generation (SDG) process in the background by allowing you to detach it from the terminal, spin off child processes to remain running in the background, monitor the status, reattach the process to bring it back and te

Virtualization in 2025 and beyond

Looking back, every decade has brought a new wave of innovation based on unmet customer needs and technology advancements. The 1990s brought about the information transition to digitization resulting in the popularity of the World Wide Web. 2000s began with applications gaining hardware independence by adopting server virtualization made possible due to advancements in hypervisor technologies. 2010s introduced on-demand infrastructure and shortening application lifecycles from years to hours through the adoption of DevOps and Kubernetes. The 2020s are shaping up to bring about the adoption of

Friday Five — February 14, 2025

Compiler - Rising with the Machines | AI 101Everyone’s talking about AI. Everyone says it’s the future. To find out where we’re going, we should know how we got here—and what we’re working with. Follow along with Compiler's season on AI, wherever you get your podcasts. Learn more News Observer - IBM is overhauling its core business through Raleigh’s reliable Red HatAt IBM’s Investor Day event in New York City, a word executives stressed was “software.” And two other words top IBM brass highlighted again and again were “Red Hat.” Learn more Migration toolkit for virtua

EPMS: the cornerstone of cybersecurity in defense operations

In a landscape where cyber threats evolve daily, the Defense Information Systems Agency’s (DISA) Enterprise Patch Management System (EPMS) plays a critical role in maintaining the cybersecurity of the Department of Defense (DoD). EPMS is not just a tool—it's a strategy, bridging software, efficiency and innovation to enhance the security posture of critical systems.The Importance of EPMSEPMS addresses a core cybersecurity challenge: verifying that all systems are consistently patched against known vulnerabilities. With cyber adversaries growing more sophisticated, leaving any endpoint exp

Democratize security processes in your software development lifecycle

IT security is no longer the responsibility of a single, specialized team. To help protect your organization from growing cyber threats, IT security should be a priority for everyone. By integrating security processes and functions into every stage of the software development lifecycle, you not only better protect your products but you also build trust with your users. Here's how you can democratize security processes and make it a shared responsibility across your organization, while giving your developers what they need to create applications quickly.Software supply chain security tools and

Unlocking the Effective Context Length: Benchmarking the Granite-3.1-8b Model

Large language models (LLMs) are evolving rapidly enabling applications such as chatbots, code generation, and knowledge extraction. One crucial factor influencing their effectiveness is the context length - the number of tokens a model can look at once. While theoretical context lengths continue to grow, the practical, effective context length (ECL) determines real-world usability.In this blog post, we will explore the ECL of the Granite-3.1-8b instruct model and validate its capabilities across various tasks. The study takes its inspiration from the paper "Measuring Effective Context Length

Navigating an era of perpetual change: a fresh perspective for telecommunications

Every year, new innovations and emerging technologies bring us closer to a fully connected society. As the industry is hard at work to meet the demands of constant connectivity, telecommunications service providers face the challenge of standing out in a crowded market. They must navigate a surge of new solutions and technologies that promise lucrative opportunities, while balancing the need to reduce costs on existing services with the imperative to drive meaningful business outcomes by investing in innovative applications, technologies and services.In recently taking on the role of chief tec

Introducing RHEL AI 1.4: Powering the Next Wave of Generative AI Innovation

The field of generative AI (gen AI) is evolving rapidly, and Red Hat Enterprise Linux AI (RHEL AI) is at the forefront of this transformation. RHEL AI 1.4 introduces support for a new, powerful Granite 3.1 model with multi-language support and a larger context window. The latest version also adds capabilities for evaluating customized and trained models with Document-Knowledge bench (DK-bench), a benchmark designed to measure the knowledge a model has acquired. Finally, we’re introducing the developer preview of our new graphical UI that helps to simplify data ingestion and writing InstructL

Empowering non-technical users to contribute knowledge and enhance model responses

In every release of our products, the User Experience Design team at Red Hat (UXD) prioritizes implementing work that directly relates to customer feedback and insights. For a nascent product like RHEL AI, we have had to be creative about doing so. Feedback channels we used for this upcoming release to help us continuously improve the experience include upstream community engagement and direct feedback from users via Slack, interviews with internal team members, interviews with AI users and enthusiasts who may be interested in adopting RHEL AI, and examining our competitive landscape. This has

A toolkit for your toolkit: 7 learning resources to migrate to OpenShift Virtualization

Organizations around the world have been using virtual machines for decades, often staying with a single vendor because migrating those virtual machines (VMs) from one hypervisor to another can be such a monumental task. Red Hat’s migration toolkit for virtualization (MTV) facilitates the complex task of migrating VMs to Red Hat OpenShift Virtualization with tools that are easy to use, highly configurable and can be automated to handle even the largest environments.Here are 7 informative resources to learn how to migrate VMs to Red Hat OpenShift Virtualization with the toolkit:1. Introductio

10 Enterprise Linux myths debunked

Linux is over 30 years old, powering businesses all over the world, and yet there are still misconceptions about what it is and how it works. That’s understandable. After all, one reason Linux is special is because it is unique. It doesn’t always work the way other operating systems do, and that’s frankly a good thing. Here are 10 myths about Linux that are getting rather old, and that modern Linux has, quite simply, surpassed.Unstoppable Linux: 3 things Red Hat Enterprise Linux has kept for 30 years1. Myth: Enterprise Linux has a steep learning curveOrigins: When the sky’s the limit,

Leading an effective Static Application Security Testing (SAST) program

The Secure Development Lifecycle (SDLC) is the process of applying a variety of security activities to software under development with the intent of producing robust and more reliable software. These activities are varied, and can be applied at different stages of the development lifecycle. One important activity is Static Application Security Testing (SAST), a testing methodology that analyzes source code of software to identify potential security issues. Typically, this process is conducted using specialized SAST tools and is often integrated into a continuous integration and continuous deli

How to adopt platform engineering in 2025

The sheer amount of technologies today has created a massive boom in innovation, allowing organizations globally to create software in a variety of ways. While having numerous technologies to create software is advantageous, it also presents a challenge—managing the complexity of using so many tools and technologies.Platform engineering is an emerging practice to help organizations streamline their tools and infrastructure into a single cohesive point, known as an internal developer portal(IDP). The goal is to consolidate technologies, knowledge and best practices to boost overall productivi

What’s new on docs.redhat.com

Working in the technology industry keeps you alert. Change is constant, and so you’re constantly learning new tools, new configurations, and new tricks. Just as often, you’re inventing new solutions to emerging problems. Through it all, there are two things standing in the way: Understanding new technology, and making new technology understood to others. The answer to both is documentation.Without documentation, technology is doomed to perpetual reinvention. It’s a quirk of digital tech that it’s often easier to write your own code than it is to comprehend the way existing code works.

SELinux and RHEL: A technical exploration of security hardening

Security in the enterprise world is paramount, and Red Hat Enterprise Linux (RHEL) has long been a leader in integrating robust security mechanisms. Security-Enhanced Linux (SELinux) is a cornerstone technology enabling this security. In this blog, we explore SELinux's workings, its role in RHEL, and its relationship with Red Hat’s approach to vulnerability assessment, as detailed in our four-point impact scale for common vulnerabilities and exposures (CVEs).What is SELinux?SELinux is a Mandatory Access Control (MAC) system integrated into the Linux kernel. Unlike Discretionary Access Contro

DORA is here: is financial services prepared to continue innovating in balance with compliance requirements?

The Digital Operational Resilience Act (DORA) is an EU financial services industry (FSI) regulation that came into force on 16 January 2023 and applies as of 17 January 2025. It is a framework for protecting financial services' operational resilience by establishing uniformed rules for ICT risk management, incident reporting, and third party risk.Other EU regulations, like MiFID II, PSD2 and EMIR, have required firms to implement many elements of DORA but vertically at the product level. DORA requires them to instead implement these elements, such as enhanced third party risk management, horiz

Friday Five — February 7, 2025

Open source AI: Red Hat’s point-of-viewRed Hat views the minimum criteria for open source AI as open source-licensed model weights combined with open source software components. Read more about what Red Hat's Chris Wright has to say. Learn more ZDNet - Red Hat's take on open-source AI: Pragmatism over utopian dreamsOpen source AI is changing everything people thought they knew about AI. Red Hat's pragmatic approach to open source AI reflects a decades-long commitment to open source principles while grappling with the unique complexities of modern AI systems. Learn more CRN - 2025 Channel

Migration toolkit for virtualization: FAQs from the field

The migration toolkit for virtualization (MTV) is an included feature of Red Hat OpenShift and provides a suite of tools to migrate virtual machines (VMs) quickly and at scale. Given the heightened focus on virtualization, this becomes an increasingly popular option, allowing organizations to migrate their workloads safely and at speed, with the ability to consider modernization down the line.This FAQ addresses the most common questions we hear from those exploring how to migrate their VMs to OpenShift.Learn about OpenShift VirtualizationIs MTV a separate product from Red Hat OpenShift? MTV is

Evolving our middleware strategy

Editor’s note: Earlier today, president and chief executive officer of Red Hat, Matt Hicks, shared the following email with Red Hatters.--Hi all,Today, we’re sharing that Red Hat and IBM will join forces to secure the future of the Java application ecosystem for our customers. The Red Hat middleware engineering and product teams will join the IBM Data Security, IAM, and Runtimes organization, forming a single team.* This move supports and grows our combined customer footprint, and builds a unified product strategy for the future of Java applications and Integration solutions in the era of
❌