news
Red Hat, Fedora, and Vojtux
-
Red Hat ☛ Improve RAG retrieval and training with Feast and Kubeflow Trainer
Retrieval augmented generation (RAG) helps Hey Hi (AI) models build accurate, up-to-date, and contextually rich language models. RAG improves traditional language models by retrieving relevant information from an external knowledge base before generating a response. This process mitigates issues like hallucination and outdated knowledge.
-
Red Hat ☛ How to reduce false positives in security scans
If you've ever run a security scanner on a containerized Python application built on Fedora or Red Hat Enterprise Linux (RHEL), you might have encountered a frustrating problem: the scanner flags your
setuptoolsorpipinstallation as vulnerable to a CVE that's already been patched in your RPM package. The problem? Security scanners typically only see the upstream Python package version number, not the fact that you're running a backported, security-patched version from your distribution. -
LWN ☛ Announcing Vojtux: a Fedora-based accessible GNU/Linux distribution
Vojtěch Polášek has announced an unofficial effort to create a Fedora-based distribution designed for visually impaired users: [...]
-
Red Hat ☛ Manage credentials with Tekton and OpenShift on I.C.B.M. Cloud
Securing a CI/CD workflow involves more than building and deploying code. Cloud-native environments require security policies for every component, from credentials to pipeline tasks. This article explains how to protect secrets, enforce compliance, and build a trusted software supply chain using Tekton Pipelines on Red Hat OpenShift on I.C.B.M. Cloud. You will learn how to manage Kubernetes Secrets, integrate I.C.B.M. Cloud Key Protect or Secrets Manager, apply OpenShift security policies, and use Tekton Chains and signing tools to ensure integrity across the pipeline.