red hat Бета-выпуск Red Hat Enterprise Linux 10 и релиз RHEL 9.5 By www.opennet.ru Published On :: Wed, 13 Nov 2024 23:20:51 +0300 Компания Red Hat представила бета-версию дистрибутива Red Hat Enterprise Linux 10 и релиз Red Hat Enterprise Linux 9.5. Готовые установочные образы подготовлены для зарегистрированных пользователей Red Hat Customer Portal (для оценки функциональности также можно использовать iso-образы CentOS Stream 10 и CentOS Stream 9.5, а также бесплатные сборки RHEL для разработчиков). Репозитории с бинарными пакетами RHEL 10 доступны публично. Выпуски сформированы для архитектур x86_64, s390x (IBM System z), ppc64le и Aarch64 (ARM64). Full Article
red hat C I Host Upgrading to Red Hat Enterprise Linux 4 By hostsearch.com Published On :: Wed, 2 Mar 2005 8:00:23 EST Full Article
red hat Incognito Software Systems Achieves Red Hat OpenShift Certification for Service Activation Center By www.24-7pressrelease.com Published On :: Tue, 09 May 2023 08:00:00 GMT Incognito's award-winning Service Activation Center (SAC) now available in Red Hat Container Catalog. Full Article
red hat Ceres Technology Achieves Red Hat Enterprise Linux Certification By www.24-7pressrelease.com Published On :: Thu, 12 Oct 2023 08:00:00 GMT Certification enables customers to deploy Ceres Nostradamus on the Red Hat Linux Platform with less complexity and increased scalability Full Article
red hat Positioning Red Hat OpenShift AI (RHOAI) to Win | Your Learning By yourlearning.ibm.com Published On :: 2024-11-13T08:54:26+00:00 Full Article
red hat Red Hat is Acquiring AI Optimization Startup Neural Magic By linux.slashdot.org Published On :: 2024-11-12T21:32:00+00:00 Red Hat, the IBM-owned open source software firm, is acquiring Neural Magic, a startup that optimizes AI models to run faster on commodity processors and GPUs. From a report: The terms of the deal weren't disclosed. MIT research scientist Alex Matveev and professor Nir Shavit founded Somerville, Massachusetts-based Neural Magic in 2018, inspired by their work in high-performance execution engines for AI. Neural Magic's software aims to process AI workloads on processors and GPUs at speeds equivalent to specialized AI chips (e.g. TPUs). By running models on off-the-shelf processors, which usually have more available memory, the company's software can realize these performance gains. Big tech companies like AMD and a host of other startups, including NeuReality, Deci, CoCoPie, OctoML and DeepCube, offer some sort of AI optimization software. But Neural Magic is one of the few with a free platform and a collection of open source tools to complement it. Neural Magic had so far managed to raise $50 million in venture capital from backers like Andreessen Horowitz, New Enterprise Associations, Amdocs, Comcast Ventures, Pillar VC and Ridgeline Ventures. Read more of this story at Slashdot. Full Article
red hat Red Hat Acquisition Charts Path to Open Accelerated AI By www.hpcwire.com Published On :: Wed, 13 Nov 2024 01:20:02 +0000 Red Hat has announced a signed agreement to acquire Neural Magic, a developer of software and algorithms that accelerate generative AI (gen AI) inference workloads. Red Hat mentions Neural Magic’s […] The post Red Hat Acquisition Charts Path to Open Accelerated AI appeared first on HPCwire. Full Article Features AVX-512 DeepSparse GPU LLM MLPerf
red hat Automate and Orchestrate Your IBM FlashSystem Hybrid Cloud with Red Hat Ansible Version 1 Release 1 By www.redbooks.ibm.com Published On :: Thu, 23 Apr 2020 13:30:00 GMT Blueprint, published: Thu, 23 Apr 2020 This document is intended to facilitate the deployment of Red Hat Ansible for the IBM FlashSystem®. Full Article
red hat IBM adquiere Red Hat, cambiando el panorama de la Nube y convirtiéndose en el proveedor de Nube Híbrida #1 del mundo By www.ibm.com Published On :: lun, 29 oct 2018 04:38:19 GMT IBM y Red Hat, líder mundial de software de nube de código abierto, anunciaron un acuerdo en el que IBM adquirirá todas las acciones comunes emitidas y en circulación de Red Hat por USD$190.00 por acción en efectivo, lo que representa un valor total para la empresa de aproximadamente USD$34 mil millones. Full Article All Topics
red hat Bank of New Zealand Reduces Carbon Footprint with Red Hat on the Mainframe By www.ibm.com Published On :: Wed, 11 Feb 2009 08:08:52 GMT red hat, open source, bank of new zealand, enterprise linux 5, system z, National Australia Bank Group, data center Full Article Linux and Open Source
red hat Red Hat's Virtual Summit Crowds Hint at Future Conference Models By www.technewsworld.com Published On :: 2020-05-07T04:00:00-07:00 In what could be a trial run for more of the same, Red Hat last week held a first-ever virtual technical summit to spread the word about its latest cloud tech offerings. CEO Paul Cormier welcomed online viewers to the conference, which attracted more than 80,000 virtual attendees. The company made several key announcements during the online gathering and highlighted customer innovations. Full Article
red hat Delhi violence: Day after it ordered hate speech FIRs, HC grants four weeks to police, govt By www.financialexpress.com Published On :: 2020-02-28T07:40:00+05:30 Unlike Wednesday, when Justices Muralidhar and Talwant Singh questioned the Solicitor General repeatedly over the delay in lodging FIRs and had video clips of the hate speeches played in open court with proceedings lasting through the day, the hearing Thursday was over in less than an hour. Full Article India
red hat Oracle Tempts Red Hat Users With Ksplice Kernel Security Patch Trial By packetstormsecurity.com Published On :: Thu, 23 Feb 2012 16:25:19 GMT Full Article headline linux kernel patch oracle
red hat Red Hat Security Advisory 2020-1797-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:19:47 GMT Red Hat Security Advisory 2020-1797-01 - The binutils packages provide a collection of binary utilities for the manipulation of object code in various object file formats. It includes the ar, as, gprof, ld, nm, objcopy, objdump, ranlib, readelf, size, strings, strip, and addr2line utilities. Issues addressed include denial of service, integer overflow, and out of bounds read vulnerabilities. Full Article
red hat Red Hat Security Advisory 2020-1787-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:28:03 GMT Red Hat Security Advisory 2020-1787-01 - The unzip utility is used to list, test, and extract files from zip archives. Issues addressed include a denial of service vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1665-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:30:08 GMT Red Hat Security Advisory 2020-1665-01 - Qt is a software toolkit for developing applications. The qt5-base packages contain base tools for string, xml, and network handling in Qt. Issues addressed include a denial of service vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1581-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:30:46 GMT Red Hat Security Advisory 2020-1581-01 - WavPack is a completely open audio compression format providing lossless, high-quality lossy, and a unique hybrid compression mode. Issues addressed include denial of service and out of bounds read vulnerabilities. Full Article
red hat Red Hat Security Advisory 2020-1659-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:40:11 GMT Red Hat Security Advisory 2020-1659-01 - Grafana is an open source, feature rich metrics dashboard and graph editor for Graphite, InfluxDB and OpenTSDB. Issues addressed include a denial of service vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1351-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:41:56 GMT Red Hat Security Advisory 2020-1351-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1378-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:04 GMT Red Hat Security Advisory 2020-1378-01 - The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Issues addressed include a use-after-free vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1352-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:20 GMT Red Hat Security Advisory 2020-1352-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. Issues addressed include an out of bounds access vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1372-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:42:47 GMT Red Hat Security Advisory 2020-1372-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1358-01 By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:43:19 GMT Red Hat Security Advisory 2020-1358-01 - Kernel-based Virtual Machine offers a full virtualization solution for Linux on numerous hardware platforms. The virt:rhel module contains packages which provide user-space components used to run virtual machines using KVM. The packages also provide APIs for managing and interacting with the virtualized systems. Issues addressed include an out of bounds access vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1403-01 By packetstormsecurity.com Published On :: Wed, 08 Apr 2020 16:52:52 GMT Red Hat Security Advisory 2020-1403-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm packages provide the user-space component for running virtual machines that use KVM. Issues addressed include an out of bounds access vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1460-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 15:40:41 GMT Red Hat Security Advisory 2020-1460-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. BR/EDR encryption key negotiation attacks were addressed. Full Article
red hat Red Hat Security Advisory 2020-1473-01 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 23:02:22 GMT Red Hat Security Advisory 2020-1473-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1465-01 By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 00:12:24 GMT Red Hat Security Advisory 2020-1465-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1493-01 By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:34:41 GMT Red Hat Security Advisory 2020-1493-01 - The kernel-alt packages provide the Linux kernel version 4.x. Issues addressed include buffer overflow, denial of service, heap overflow, and null pointer vulnerabilities. Full Article
red hat Red Hat Security Advisory 2020-1505-01 By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:53:17 GMT Red Hat Security Advisory 2020-1505-01 - Kernel-based Virtual Machine is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-ma packages provide the user-space component for running virtual machines that use KVM on the IBM z Systems, IBM Power, and 64-bit ARM architectures. An out-of-bounds heap access vulnerability was addressed. Full Article
red hat Red Hat Security Advisory 2020-1524-01 By packetstormsecurity.com Published On :: Wed, 22 Apr 2020 15:10:47 GMT Red Hat Security Advisory 2020-1524-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a buffer overflow vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1769-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:19:01 GMT Red Hat Security Advisory 2020-1769-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include denial of service, information leakage, integer overflow, null pointer, out of bounds read, and use-after-free vulnerabilities. Full Article
red hat Red Hat Security Advisory 2020-1966-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:56:45 GMT Red Hat Security Advisory 2020-1966-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include a use-after-free vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1975-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:37 GMT Red Hat Security Advisory 2020-1975-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1979-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:52 GMT Red Hat Security Advisory 2020-1979-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1978-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:05 GMT Red Hat Security Advisory 2020-1978-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1980-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:13 GMT Red Hat Security Advisory 2020-1980-01 - Git is a distributed revision control system with a decentralized architecture. As opposed to centralized version control systems with a client-server model, Git ensures that each working copy of a Git repository is an exact copy with complete revision history. This not only allows the user to work on and contribute to projects without the need to have permission to push the changes to their official repositories, but also makes it possible for the user to work with no network connection. Issues addressed include a password leak vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1422-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:48:30 GMT Red Hat Security Advisory 2020-1422-01 - This release of Red Hat build of Eclipse Vert.x 3.9.0 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Full Article
red hat Red Hat Security Advisory 2019-1790-01 By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 20:10:26 GMT Red Hat Security Advisory 2019-1790-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
red hat Red Hat Security Advisory 2019-1942-01 By packetstormsecurity.com Published On :: Tue, 30 Jul 2019 18:17:37 GMT Red Hat Security Advisory 2019-1942-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
red hat Red Hat Security Advisory 2019-2097-01 By packetstormsecurity.com Published On :: Tue, 06 Aug 2019 21:11:21 GMT Red Hat Security Advisory 2019-2097-01 - The Archive::Tar module provides a mechanism for Perl scripts to manipulate tar archive files. Issues addressed include a traversal vulnerability. Full Article
red hat Red Hat Security Advisory 2019-2400-01 By packetstormsecurity.com Published On :: Wed, 07 Aug 2019 20:08:30 GMT Red Hat Security Advisory 2019-2400-01 - Perl is a high-level programming language that is commonly used for system administration utilities and web programming. Issues addressed include a buffer overflow vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1616-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:22:15 GMT Red Hat Security Advisory 2020-1616-01 - Irssi is a modular IRC client with Perl scripting. Issues addressed include a use-after-free vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1050-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:05:46 GMT Red Hat Security Advisory 2020-1050-01 - The Common UNIX Printing System provides a portable printing layer for Linux, UNIX, and similar operating systems. Issues addressed include a cross site request forgery vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1112-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 14:58:12 GMT Red Hat Security Advisory 2020-1112-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Issues addressed include a cross site scripting vulnerability. Full Article
red hat Red Hat Security Advisory 2020-0850-01 By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:52:32 GMT Red Hat Security Advisory 2020-0850-01 - An update for python-pip is now available for Red Hat Enterprise Linux 7. CRLF injection and credential exposure issues were addressed. Full Article
red hat Red Hat Security Advisory 2020-0870-01 By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:15:11 GMT Red Hat Security Advisory 2020-0870-01 - Flask is a lightweight but extensible web development framework for Python based on the Werkzeug WSGI toolkit, and the Jinja 2 template engine. Issues addressed include a denial of service vulnerability. Full Article
red hat Red Hat Security Advisory 2020-0898-01 By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:17:13 GMT Red Hat Security Advisory 2020-0898-01 - The Python Imaging Library adds image processing capabilities to your Python interpreter. This library provides extensive file format support, an efficient internal representation, and powerful image processing capabilities. An issue where improperly restricted operations on a memory buffer in libImaging/PcxDecode.c were addressed. Full Article
red hat Red Hat Security Advisory 2020-1131-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:07:37 GMT Red Hat Security Advisory 2020-1131-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. Issues addressed include an incorrect parsing vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1132-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:11:58 GMT Red Hat Security Advisory 2020-1132-01 - Python is an interpreted, interactive, object-oriented programming language, which includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems. This package provides the "python3" executable: the reference interpreter for the Python language, version 3. The majority of its standard library is provided in the python3-libs package, which should be installed automatically along with python3. The remaining parts of the Python standard library are broken out into the python3-tkinter and python3-test packages. Issues addressed include an incorrect parsing vulnerability. Full Article
red hat Red Hat Security Advisory 2020-1091-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:18:38 GMT Red Hat Security Advisory 2020-1091-01 - Twisted is an event-based framework for internet applications. Twisted Web is a complete web server, aimed at hosting web applications using Twisted and Python, but fully able to serve static pages too. Issues addressed include an improper neutralization vulnerability. Full Article