Red Hat Leftovers
-
DISA releases the first Ansible STIG
As IT environments become more complex, especially as cloud-native technologies, cloud services and traditional hardware all interact to meet evolving business demands, automation remains a key organizational strategy. Automation helps manage and maintain operations at a greater scale, speed and agility. Greater IT complexity also dovetails with requirements for enhanced cybersecurity postures, with threats and vulnerabilities changing on a near daily basis. Automation and IT security are not mutually exclusive, but a guidebook to effective configurations that help keep operations moving smoothly without compromising IT security needs.
For nearly two decades, Red Hat has been helping both public and private entities adapt to changing IT security requirements and concerns. Red Hat achieves a wide range of cybersecurity validations for our products in global markets and by providing actionable information for organizations to improve their system security footprint.
-
The next evolution of Red Hat’s Developer options
Red Hat Enterprise Linux (RHEL) has a storied history, standing at the intersection of our customers, communities and partners, helping each achieve their goals while answering key end user needs, from enterprise-grade development practices and system security enhancements to a stronger software supply chain and end-to-end support backed by Red Hat’s unique expertise..
In 2021 we announced no-cost RHEL options for developers, in certain use cases, which include our proactive analytic capability, Red Hat Insights. Since then, we have listened to and learned from individuals and organizations and have evolved our offerings to meet a broader set of needs.
-
Red Hat’s Adam Clater on taking advantage of cloud FinOps
Adam Clater, chief architect at Red Hat, explores how cloud services are helping agencies retire their legacy IT systems. “Legacy IT systems can be difficult because they’re deeply entrenched in the infrastructure and hard to move out,” he says; however, he explains how some agencies are taking advantage of cloud FinOps to drive financial accountability and accelerate business value.
-
Learn about Confidential Containers [Ed: "Confidential" means outsourced and spied on. The word is being abused to justify the "clown computing" mindset.]
-
Run Git on a mainframe
One of the fascinating things I keep encountering in my journey to learn everything I can about the mainframe world is how my expertise in Linux distributed systems and open source tooling carries over into this realm. I recently discovered zigi, an independently developed open source (GPLv3+) Git interface for IBM z/OS ISPF (Interactive System Productivity Facility).
I had been aware of zigi for some time, but it wasn't until I joined a recent z/OS Open Tools guild call that I could soak in the demo that zigi contributor Lionel B. Dyck gave. That led me to a call with zigi founder Henri Kuiper, who explained that zigi was an answer to a specific pain point of his. That sounds familiar! I could definitely appreciate the story of an open source project born from frustration.
I need to explain ISPF for you to have a good understanding of what zigi provides.
-
IBM's rack mount Z16 mainframe targets edge computing
IBM's new rack mount Z16 mainframe gives edge locations the ability to process workloads locally, taking the burden off systems running workloads in larger data centers.
-
CentOS 7's end of life is in sight. Are you ready?
The clock is ticking for CentOS 7 Linux. While it will get maintenance fixes through June 2024, some sysadmin vendors, such as cPanel, are getting ready to drop support for it.