-
Upskilling and reskilling in 2025: Advance your career with Red Hat Training and Certification
The year ahead promises to be one of celebration as it marks over 25 years since we introduced the Red Hat Certification program and 10 years of the Red Hat Learning Subscription. Throughout this time, Red Hat has continued to play a key role in upskilling and reskilling teams and meeting learners and students where…
-
Monitoring Red Hat Ansible Automation Platform using Performance Co-Pilot
In this article, you’ll learn about the Performance Co-Pilot (PCP) tool and how we take advantage of it to implement system and application monitoring for Red Hat Ansible Automation Platform.What is Performance Co-Pilot (PCP)PCP is an open source performance monitoring and analysis framework developed by Red Hat. It provides a suite of tools, libraries and…
-
Streamline the connectivity between your environment and Red Hat Insights services
Introducing new connectivity optionsFollowing the announcement of Red Hat Insights proxy in technology preview, we are pleased to announce that this service is now generally available.Red Hat Insights proxy helps streamline the connectivity between your environment and Red Hat’s powerful Insights services. It acts as a lightweight proxy, enabling you to access various lifecycle and…
-
Nominations now open for the OpenShift Superhero Awards
Each member of the OpenShift community is a hero, helping contribute to the project’s success and growth. But some members really stand out – they are the advocates and champions that make the community strong and successful. These are our superheroes.The vibrant OpenShift community is built on the contributions of its members and we are…
-
High Tide is a Promising New Linux TIDAL Client
Linux users hunting for a native client to stream music from TIDAL will want to keep an eye on a promising new open-source app called High Tide. High Tide is an unofficial but native Linux client for the TIDAL music streaming service. It’s written in Python, uses GTK4/libadwaita UI, and leverages official TIDAL APIs for…
-
Thunderbird Moves to Monthly Updates from March 2025
The Thunderbird email client is making its monthly ‘release channel’ builds the default download starting in March. “We’re excited to announce that starting with the 135.0 release in March 2025, the Thunderbird Release channel will be the default download,” Corey Bryant, manager of Thunderbird Release Operations, shares in an update on the project’s discussion hub.…
-
Confirmed: Ubuntu Dev Discussions Moving to Matrix
Ubuntu’s key developers have agreed to switch to Matrix as the primary platform for real-time development communications involving the distro. From March, Matrix will replace IRC as the place where critical Ubuntu development conversations, requests, meetings, and other vital chatter must take place. Developers asked to ensure they have a presence on the platform so…
-
Amazon Redshift enhances security by changing default behavior in 2025
Today, I’m thrilled to announce that Amazon Redshift, a widely used, fully managed, petabyte-scale data warehouse, is taking a significant step forward in strengthening the default security posture of our customers’ data warehouses. Some default security settings for newly created provisioned clusters, Amazon Redshift Serverless workgroups, and clusters restored from snapshots have changed. These changes…
-
How to deploy an Amazon OpenSearch cluster to ingest logs from Amazon Security Lake
July 29, 2024: Original publication date of this post. The current version was updated to make the instructions clearer and compatible with OCSF 1.1. Customers often require multiple log sources across their AWS environment to empower their teams to respond and investigate security events. In part one of this two-part blog post, I show you…
-
Multiple Vulnerabilities in SimpleHelp RMM Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in SimpleHelp RMM that could allow for arbitrary code execution. SimpleHelp is a popular remote access software. Successful exploitation of the most severe of these vulnerabilities when chained together could allow for remote code execution in the context of the system. Depending on the privileges associated with the system, an…