-
How AWS Network Firewall session state replication maximizes high availability for your application traffic
AWS Network Firewall is a managed, stateful network firewall and intrusion protection service that you can use to implement firewall rules for fine grained control over your network traffic. With Network Firewall, you can filter traffic at the perimeter of your virtual private cloud (VPC); including filtering traffic going to and coming from an internet…
-
Installing Ubuntu on WSL in Windows 11 is Now Easier
Windows Subsystem for Linux (WSL) user? If so, you will be pleased to hear that Ubuntu is now available in Microsoft’s new tar-based distro format — no need to use the sluggish Microsoft Store. Canonical announced the news today, noting that “the new tar-based WSL distro format allows developers and system administrators to distribute, install,…
-
Implement effective data authorization mechanisms to secure your data used in generative AI applications – part 2
In part 1 of this blog series, we walked through the risks associated with using sensitive data as part of your generative AI application. This overview provided a baseline of the challenges of using sensitive data with a non-deterministic large language model (LLM) and how to mitigate these challenges with Amazon Bedrock Agents. The next…
-
List top 10 CPU using processes in Linux
With the help of the following command, you can easily find top 10 processes that are consuming high CPU resources on any Linux system. ps is the default command available in most of Linux operating system that provide details about processes in system. ps -eo pid,cmd,%mem,%cpu –sort=-%cpu | head Output will print top 10 processes…
-
Why I switched from VMware to OpenShift Virtualization
I have been using VMware Core products for the last fifteen years—nine of those years as a VMware Administrator. I went from building basic virtual machines (VMs) to being a VMware Administrator, starting with vSphere/ESXi then handling the other VMware Core products vRealize Operations (Aria Ops), Aria Logs, Site Recovery Manager, and Network and Security…
-
How MIG maximizes GPU efficiency on OpenShift AI
Modern data science workloads demand high computational power, and Graphic Processing Units (GPUs) are often at the heart of these operations. However, sharing GPU resources efficiently among multiple users or workloads can be challenging. NVIDIA Multi-Instance GPU (MIG) technology offers a solution. This article explores how I tested MIG on Red Hat OpenShift AI using…
-
How to analyze changes to enum types using abidiff
It is required to have a stable application binary interface (ABI) when maintaining a stable shared library that is written in C or C++ and shipped as part of a complex software stack. Developers must comply with this requirement. When building a newer version of a shared library, developers may try the following approach: Analyze…
-
Evolving our middleware strategy
Editor’s note: Earlier today, president and chief executive officer of Red Hat, Matt Hicks, shared the following email with Red Hatters.–Hi all,Today, we’re sharing that Red Hat and IBM will join forces to secure the future of the Java application ecosystem for our customers. The Red Hat middleware engineering and product teams will join the…
-
Migration toolkit for virtualization: FAQs from the field
The migration toolkit for virtualization (MTV) is an included feature of Red Hat OpenShift and provides a suite of tools to migrate virtual machines (VMs) quickly and at scale. Given the heightened focus on virtualization, this becomes an increasingly popular option, allowing organizations to migrate their workloads safely and at speed, with the ability to…
-
Platform engineering and self-service: simplifying complexity with Red Hat Developer Hub
Empowering development teams with self-service and automation capabilities has long been a goal for organizations seeking to reduce bottlenecks and speed up innovation. However, many traditional approaches to self-service fall short, bogged down by ticket queues and overwhelmed operations teams. Additionally, a lack of ownership in maintaining component catalogs, lack of product mindset and constant…