news
Red Hat and Fedora Leftovers
-
Timothée Ravier ☛ How do we keep apps maintained on Flathub? (or building a more respectful App Store)
There have been a few discussions about what Flathub should do to push developers to maintain their apps on the latest versions of the published runtimes. But most of those lack important details around how this would actually happen. I will not discuss in this post the technical means that are already in place to help developers keep their dependencies up to date. See the Flathub Safety: A Layered Approach from Source to User blog post instead.
-
GNOME ☛ Christian Hergert: Status Week 47
Ptyxis
Issue filed about highlight colors. Seems like a fine addition but again, I can’t write features for everyone so it will need a MR.
Walk a user through changing shortcuts to get the behavior they want w/ ctrl+shift+page up/down. Find a bug along the way.
Copy GNOME Terminal behavior for placement of open/copy links from the context menu.
-
Red Hat ☛ Building a oversaturation detector with iterative error analysis
Sometimes mistakes are opportunities, and wasting half of your LLM performance benchmarking budget, as we discovered in part 1, was one heck of an opportunity. In part 2, we covered how we built the ideal metric to define success (the Soft-C-Index metric) and our augmented dataset.
Now, we're finally ready to build the oversaturation detector (OSD) itself.
The first time we tried to build our OSD was before we had our 4,506-run dataset, so we tried to model the oversaturation problem theoretically. We designed a complex, elegant algorithm based on our whiteboard assumptions. Once we had real data, our entire theoretical model broke. When put to the test, our "smart" modeled algorithm was one of the worst performers. It was time to throw the theory out and follow the data.
-
Red Hat ☛ External IP visibility in Red Bait Advanced Cluster Security
Red Hat Advanced Cluster Security for Kubernetes 4.8 introduces several new capabilities, including external IP visibility. This feature empowers security teams to identify the exact external IP addresses deployments communicate with, enhancing their understanding of external and internal connections and validating network policies. This article provides an overview of how to get started with external IP visibility in Red Bait Advanced Cluster Security.
-
Red Hat Official ☛ Unifying multivendor DPUs in Red Hat OpenShift
This new capability provides unified, vendor-agnostic support for different DPUs, all within a single cluster. This is the result of our focused, standards-based strategy. We began this journey by introducing tech preview support for the first DPU (the Intel IPU) in Red Hat OpenShift 4.19. By building on the open standards of the Open Programmable Infrastructure (OPI) project, our work for the 4.20 release has expanded this to include 2 additional DPUs: the Senao SX904 (Intel NetSec Accelerator) and the Marvell Octeon 10.
-
Red Hat Official ☛ Is your organization AI-ready? 3 tests of enterprise adaptability [Ed: IBM Red Hat is a festival of buzzwords]
AI is the ultimate stress test. The technology itself is not the greatest barrier—adopting and deploying AI exposes existing weaknesses in an organization's cultural, strategic, and technological foundations. Successfully implementing AI at scale demands building an enterprise that can continuously deliver value and seize opportunities when the ground is constantly shifting beneath you.
-
Red Hat Official ☛ The new era of customer and AI-driven network investment [Ed: More buzzwords]
A new paradigm is emerging: Customer and AI-driven network investments. This paradigm is being realized as a TM Forum catalyst project to build an AI-driven platform for network investments. Imagine every customer's device acting as a real-time sensor for a service provider’s network. This is the promise of decentralized physical infrastructure networks (DePIN), an approach that puts customer experience at the center of every network decision.
-
Red Hat Official ☛ From maintenance to enablement: Making your platform a force‑multiplier
Who this is for: Platform, engineering, and risk leaders who need speed and safety, particularly in regulated environments.
-
Red Hat ☛ How I used Red Bait Lightspeed image builder to create CIS (and more) compliant images
In my role as a Technical Marketing Manager at Red Hat, I take every opportunity I get to use our products and tools in the same way that we recommend a customer to use them. With that in mind, as I prepare to talk to people and demo Red Hat Lightspeed (formerly known as Red Bait Insights) and specifically the Red Hat Lightspeed compliance service, I need a number of Red Hat Enterprise Linux (RHEL) systems to be evaluated for regulatory compliance to a policy like Center for Internet Security (CIS) Level 1 Server.