news
Red Hat Hype ("AI") and RHEL
-
Marcin Juszkiewicz ☛ A simple way to automate RHEL VM creation
I needed a quick way to create some virtual machines running RHEL 9 and 10, without going through manual steps.
-
Red Hat ☛ Why some agentic Hey Hi (AI) developers are moving code from Python to Rust
If you’re looking to build agentic Hey Hi (AI) solutions that perform well, one area that doesn’t get discussed nearly often enough is the core runtime environment. For Hey Hi (AI) developers, that term runtime is almost always synonymous with Python.
-
Red Hat ☛ Confidential VMs: The core of confidential containers [Ed: Fake security and back doors]
In this article, we will look at confidential virtual machines (CVMs) and how they play a key role in confidential containers (CoCo). Confidential computing is a set of security technologies that provides the confidentiality of workloads.
-
Red Hat ☛ Benchmarking with GuideLLM in air-gapped OpenShift clusters [Ed: "AI" hype is destroying Red Hat's credibility because IBM is trying to enrol itself in a Ponzi scheme]
The ability to deploy and benchmark large language models (LLMs) in an air-gapped (disconnected) environment is critical for enterprises operating in highly regulated sectors. In this article, we walk through deploying the Red Hat Hey Hi (AI) Inference Server using vLLM and evaluating its performance with GuideLLM—all within a fully disconnected Red Hat OpenShift cluster.
-
Red Hat Official ☛ Preparing your organization for the quantum future [Ed: The typical "quantum" hype of IBM]
The core issue at hand is that many of our current cryptographic systems, like RSA, rely on mathematical problems that are simple for classical computers to do in one direction, but extremely difficult to reverse. For example, multiplying 2 large prime numbers is simple, but factoring the result back to its original prime numbers is very hard. This is modern public-key cryptography, also called asymmetric cryptography. In contrast, symmetric cryptography relies on a single shared secret key for both encryption and decryption and requires a secure method for sharing that secret key beforehand. With public-key cryptography being the most common and practical way for computers to share that secret, we must also be aware that CRQCs can weaken the effectiveness of symmetric keys in addition to compromising the most common method by which those keys are shared.
-
Red Hat Official ☛ AI-assisted development: Supercharging the open source way [Ed: Red Hat trying to float hype]
The world of technology is in the midst of a seismic shift. Artificial intelligence, particularly generative AI (gen AI), is rapidly evolving from a futuristic concept into a tangible tool with the potential to redefine how we build software. For those of us who have built our careers on open source principles of software development, this moment is pivotal. And a bit unnerving. At Red Hat, we've always believed that the most powerful innovations are born from collaboration, transparency, and a shared commitment to solving complex problems. As we head into the AI era, we believe these same principles are not just relevant, but essential.
-
Red Hat Official ☛ A strategic approach to AI inference performance [Ed: And again]
This approach addresses two critical areas: optimizing the inference runtime and optimizing the model itself.