• Backup and Restore of Kubernetes containers

    In an earlier blog post, I discussed the transformation that is occurring in the virtualization industry. That article went on to describe the increased adoption of various open-source hypervisor platforms and how the virtualization market continues to grow at a remarkable rate. Along with that growth and increased adoption comes evolution and new ideas. One

  • Web-based management interface, sessions recording...

    In the third part of this article, we will go through further improvements of the RHEL8 system, like: more efficient and secure graphic environment (GNOME and Wayland), recording of administrative sessions (terminal session recording), web-based management interface (Cockpit and its integration with Red Hat Satellite), simplified support for advanced disk system functions, better use of

  • OpenShift for Developers – Part I: Open sour...

    In this article We’d like to introduce to you set of Openshift Container Platform developer tools which can accelerate application development. New developer oriented Web Console perspective OpenShift Container Platform 4.2 introduces an alternative perspective in the OpenShift Web Console that will sit beside the admin console and focus on developer use cases. This is

  • Safer DNS, e-mail and other improvements of RHEL 8

    In the first part of this article, we wrote about high-performance packet processing at the network adapter level using XDP and eBPF, and about the possibility of achieving greater throughput with lower latency, thanks to the BBR algorithm for TCP. These two new possibilities of the RHEL8 system bring benefits to everyone, regardless of the

  • Why to choose Red Hat Enterprise Linux 8?

    No one likes renovations. Changes in IT systems and data centers will continue to be more and more noticeable and expensive. The reason for this is the increasing complexity of these environments, as well as the growing amount of data, services and applications. This year, on May 7 2019, the 8th version of Red Hat

  • Self-Service Backup Automation using CloudForms wi...

    Growing market expectations to deliver services on demand with minimized waiting time has strong influence on IT services. It can be observed that during past years the central point of interest of IT services is automation of all parts that can be automated. Most business processes went through transformation to exclude as many wastes as

Webinars

Latest from Virtualization

  • Web-based management interface, sessions recording...

    • 10:15 AM, Oct 24

    In the third part of this article, we will go through further improvements of the RHEL8 system, like: more efficient and secure graphic environment (GNOME and Wayland), recording of administrative sessions (terminal session recording), web-based management interface (Cockpit and its integration with Red Hat Satellite), simplified support for advanced disk system functions, better use of

    READ MORE
  • Safer DNS, e-mail and other improvements of RHEL 8

    • 10:09 AM, Oct 1

    In the first part of this article, we wrote about high-performance packet processing at the network adapter level using XDP and eBPF, and about the possibility of achieving greater throughput with lower latency, thanks to the BBR algorithm for TCP. These two new possibilities of the RHEL8 system bring benefits to everyone, regardless of the

    READ MORE
  • Why to choose Red Hat Enterprise Linux 8?

    • 1:04 PM, Sep 24

    No one likes renovations. Changes in IT systems and data centers will continue to be more and more noticeable and expensive. The reason for this is the increasing complexity of these environments, as well as the growing amount of data, services and applications. This year, on May 7 2019, the 8th version of Red Hat

    READ MORE
  • Agent-less backup strategies for oVirt/RHV

    • 8:59 AM, Feb 18

    For oVirt and RHV, like for almost any other virtualization platform, it is possible to provide agent-less backup solution. Actually, there is even more than one way to do this. In this short article I’ll explain 3 different ways to backup VMs in these environments using snapshot mechanism. Let me tell you a short story…

    READ MORE

News

  • Red Hat Enterprise Linux and CentOS Now Patched Ag...

    • 12:34 PM, Nov 19

    “After responding to the latest security vulnerabilities affecting Intel CPU microarchitectures, Red Hat has released new Linux kernel security updates for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7 operating systems to address the well-known ZombieLoad v2 flaw and other issues. The CentOS community also ported the updates for their CentOS Linux

    READ MORE
  • Ransomware sees huge rise in 2019

    • 12:28 PM, Nov 19

    “Cybersecurity experts from Bitdefender have spotted a significant rise in ransomware this year, compared to 2018. In its Mid-Year Threat Landscape Report, the company claims that it registered a 74.23 per cent increase in ransomware in the past 12 months.” – read more at ITProPortal!

    READ MORE
  • Introducing Red Hat Ansible Automation Platform

    • 10:48 AM, Nov 18

    Red Hat introduces Ansible Automation Platform, a new offering that combines the simple and powerful Ansible solutions with new capabilities for cross-team collaboration, governance and analytics, resulting in a platform for building and operating automation at scale. Read more at Ansible.com!

    READ MORE
  • What are 3 cloud backup security guidelines agains...

    • 10:43 AM, Nov 18

    “Cloud security is a top concern for IT. As a result, keeping cloud backups secure should be a priority. Here are three straightforward guidelines to help.” – read at Tech Target!

    READ MORE
  • How to Integrate Mobile Device Security Into Your ...

    • 9:30 AM, Nov 8

    “Mobile security encompasses the protective capabilities for portable devices and the data they contain; they work to deflect and deter malware attacks and unauthorized users attacking mobile devices. These portable devices can include smartphones, laptops, tablets, and wearables.” – says Ben Canner from Solutions Review. READ MORE!

    READ MORE
  • How data breaches happen and why it takes so long ...

    • 9:26 AM, Nov 8

    “When the term “data breaches” is used today, it generally refers to incidents where millions of confidential records have been stolen. These incidents are primarily perpetrated for financial gain and often involve months of “scoping-out” an organization to find any glitches, loopholes, or vulnerabilities that can be exploited.” – says Twain Taylor from TechGenix. READ

    READ MORE