-- Leo's gemini proxy

-- Connecting to gemini.tuxmachines.org:1965...

-- Connected

-- Sending request

-- Meta line: 20 text/gemini;lang=en-GB

Tux Machines


Red Hat and Fedora News


Posted by Roy Schestowitz on Dec 15, 2022


Ubuntu HowTos and Canonical on Buzzwords

Security Leftovers



Red Hat and WebAssembly


↺ Red Hat and WebAssembly


> WebAssembly (WASM) is a technology widely used in browsers, video gaming and content streaming. Today, it’s also being adapted for use with containers, and as a back-end technology for enabling Function-as-a-Service (FaaS) and Platform-as-a-Service (PaaS).



Applying DevOps and open source best practices to democratize medical research


↺ Applying DevOps and open source best practices to democratize medical research


> The Boston Children’s Hospital FNNDSC team is using DevOps to improve its delivery on ChRIS, a solution helping to democratize healthcare platforms


> As a leader in open source technology, Red Hat believes in using an open development model and DevOps best practices to create more stable and innovative technologies built with IT security needs in mind. We have spent decades collaborating with customers to develop software solutions that drive our customers—and the world—forward.



Beyond the STIG: The wider world of cybersecurity


↺ Beyond the STIG: The wider world of cybersecurity


> If the first definition resonated, then this new blog series is for you. STIGs, a concept originally designed for the US Department of Defense, are increasingly seen as a critical security guide for security-conscious computing in a variety of places across the public and private sectors, especially in regulated industries or sensitive environments like energy and banking. While STIGs are incredibly important, cybersecurity is built around an ecosystem, good risk management practices and conscientious cyber hygiene, not a single implementation standard.


> STIGs, as a framework for platform hardening, provide incredibly useful guidance for helping to attain the often required approvals to place systems in production, also known to some as an “Authority to Operate” (ATO). They do not, however, address all of an organization’s IT security needs for their environments, Even before a systems hit production, organizations need to consider:



DH2i partners with Red Hat to accelerate container application deployments - Help Net Security


↺ DH2i partners with Red Hat to accelerate container application deployments - Help Net Security


> DH2i’s DxEnterprise multi-platform smart high availability clustering software has earned Red Hat OpenShift certification on Red Hat Enterprise Linux.


> This certification verifies that DxEnterprise is a containerized solution that is fully supported on Red Hat OpenShift and Red Hat Enterprise Linux to accelerate the delivery of intelligent applications across hybrid and multi cloud environments.


> “By combining Red Hat OpenShift with DxEnterprise, organizations can use containers to create lightweight execution environments for applications to help deploy critical workloads faster and more consistently across physical, virtual, private and public cloud, and edge environments. Red Hat is pleased to collaborate with DH2i to certify DxEnterprise containers on Red Hat OpenShift and Red Hat Enterprise Linux to further enable customers across the hybrid cloud,” said Mark Longwell, director of alliances, Hybrid Platforms Business Unit, Red Hat.



How to Install Zoom on Fedora 37/36/35


↺ How to Install Zoom on Fedora 37/36/35


> Zoom is a communications technology platform that provides video telephony and real-time online chat services through a cloud-based peer-to-peer software platform. The client can be used in various ways to improve communication and collaboration. Its easy-to-use platform lets users connect with colleagues, classmates, and customers in real time from any device.



Post-processing RPM build logs - Blog | Tomáš Tomeček


↺ Post-processing RPM build logs - Blog | Tomáš Tomeček


> I’m so happy to write this article. With Packit and Copr, we are improving the RPM ecosystem so much that we can work on User Experience (rather Developer Experience) more and more. Finally \o/


> Context: Sorin recently reached out to us that we should improve readability of RPM build logs by highlighting the cause. Completely valid request. Although I saw much more in the ask, especially after Mirek recently nudged us to be creative with ideas what to work on next (= go big).


> I completely support Sorin’s request. RPM build logs are a pain to process (no offense to RPM). ALL build logs are a pain to process. They are huge, unstructured, plaintext, cryptic and unfriendly. If you don’t have enough experience with building RPMs, they are a puzzle.




gemini.tuxmachines.org

-- Response ended

-- Page fetched on Sat Jun 1 06:34:35 2024