KVM Virtualization: Refining the Virtual World with Red Hat Enterprise Linux...
Ever since Red Hat Enterprise Linux added KVM Virtualization as a kernel-based hypervisor to run virtual machines (way back in Red Hat Enterprise Linux 5.4), the operating system took on a dual...
View ArticleIs Red Hat Enterprise Linux 7 Beta “The 7th Guest”?
Someone out there “gets” the title, right? No, I’m not suggesting that Red Hat Enterprise Linux 7 Beta is an interactive puzzle adventure game. The relationship, I suppose, is in fact based on a much...
View ArticleRed Hat Enterprise Linux: Beyond the World Records
In a recent post, we reviewed the 10 world record results set by Red Hat Enterprise Linux on the Intel Xeon processor E7 v2 family. Besides showcasing the extreme capabilities of Red Hat Enterprise...
View ArticleRed Hat Enterprise Linux: The Leading Platform for Top-Tier Performance
Since its introduction more than a decade ago, Red Hat Enterprise Linux has become the world’s leading enterprise Linux platform. Along the way it has set the industry standard for performance as most...
View ArticleAn Introduction to Interoperability Challenges in the Modern Enterprise
Have you ever purchased a new dishwasher? For those of you who have, you know that the dishes don’t get washed until your “purchase” is picked-up/delivered, the old dishwasher is removed, and the new...
View ArticleClosing the Integration Gap
This post is the second in a series of blog posts about integrating Linux systems into Active Directory environments. In the previous post we discussed dishwashers and, more seriously, some basic...
View ArticleOverview of Direct Integration Options
As mentioned in my previous post there are multiple ways to connect a Linux system to Active Directory (AD) directly. With this in mind, let us review the following list of options… The legacy...
View ArticleOverview of Indirect Active Directory Integration Using Identity Management...
The main alternative to direct integration of Linux/UNIX systems into Active Directory (AD) environments is the indirect approach – where Linux systems are first connected to a central server and this...
View ArticleRed Hat Delivers Leading Application Performance with the Latest Intel Xeon...
With every new Intel Xeon processor generation, the benefits typically span beyond simple increases in transistor counts or the number of cores within each processor. Things like increased memory...
View ArticleRSA Security Conference 2015 in Review: Three Observations
As many specialists in the security world know – the RSA Security Conference is one of the biggest security conferences in North America. This year it was once again held in San Francisco at the...
View ArticleRed Hat Enterprise Linux on Azure? .NET as an RPM and Container from Red Hat?...
Six years ago, we worked closely with Microsoft to deliver on a significant and widespread customer request: the ability for our respective operating systems to function as guests on each other’s...
View ArticleWhat Customers Want
Today, Red Hat and Microsoft announced a broad partnership that includes many facets including Microsoft becoming a Red Hat Certified Cloud and Service Provider (CCSP), the availability of many of our...
View ArticleIdentity Management and Application Integration
Identity management solutions integrate systems, services, and applications into a single ecosystem that provides authentication, access control, enterprise SSO, identity information and the policies...
View ArticleRed Hat Enterprise Linux Sets Record Breaking Performance Results on New...
Yesterday, Intel launched the Xeon E5-2600 v4 processor family with 26 new world records on industry-standard benchmarks. Once again, Intel’s innovation, driven by Moore’s law, has enabled faster...
View Article.NET Core on Red Hat Enterprise Linux
In November 2015, I blogged about the announcement to bring .NET to RHEL from the .NET Core upstream project to enterprise customers and developers, both as an RPM and as a Linux container. That was...
View ArticlePCI Series: Requirement 1 – Install and Maintain a Firewall Configuration to...
This article is one of the blog posts dedicated to use of Identity Management (IdM) and related technologies to address the Payment Card Industry Data Security Standard (PCI DSS). This specific post is...
View ArticleMicrosoft, Red Hat, and HPE Collaboration Delivers Choice & Value to...
In the world of heterogeneous data centers – having multiple operating systems running on different hardware platforms (and architectures) is the norm. Even traditional applications and databases are...
View Article
More Pages to Explore .....