Tags » Red Hat Enterprise Linux

Container Image Signing

Red Hat engineers have been working to more securely distribute container images. In this post we look at where we’ve come from, where we need to go, and how we hope to get there. 818 more words

Red Hat Enterprise Linux

The Benefits of Red Hat Enterprise Linux for Real Time

To deliver the best of predictability on real-time workloads, the Red Hat Enterprise Linux for Real Time provides state-of-art on determinism for the bullet-proof RHEL (Red Hat Enterprise Linux) platform. 2,309 more words

Red Hat Enterprise Linux

Thinking Through an Identity Management Deployment

As the number of production deployments of Identity Management (IdM) grows and as many more pilots and proof of concepts come into being, it becomes (more and more) important to talk about best practices. 1,089 more words

Red Hat Enterprise Linux

Combining PTP with NTP to Get the Best of Both Worlds

There are two supported protocols in Red Hat Enterprise Linux for synchronization of computer clocks over a network. The older and more well-known protocol is the Network Time Protocol (NTP). 5,492 more words

Red Hat Enterprise Linux

Choosing a Platform Based on Workload Characteristics

Paradoxically, there has never been a better or more confusing time to discuss which platform is most appropriate for a given workload.  As we seek to solve problems around automation, continuous integration / continuous delivery, ease of upgrades, operational complexity, uptime, compliance, and many other complex issues – it quickly becomes clear that there are more than a few viable options.  986 more words

Red Hat Enterprise Linux

I Really Can't Rename My Hosts!

Hello again! In this post I will be sharing some ideas about what you can do to solve a complex identity management challenge.

As the adoption of Identity Management (IdM) grows and especially in the case of heterogeneous environments where some systems are running Linux and user accounts are in the Active Directory (AD) – the question of renaming hosts becomes more and more relevant. 1,180 more words

Red Hat Enterprise Linux

In Defense of the Pet Container, Part 2: Wrappers, Aggregates and Models... Oh My!

In our first post defending the pet container, we looked at the challenge of complexity facing modern software stacks and one way that containers address this challenge through aggregation. 518 more words

Red Hat Enterprise Linux