Language Selection

English French German Italian Portuguese Spanish

IBM/Red Hat: Security Enhanced Linux, Open Data Hub and More

  • SELinux Sees Nice Optimizations With Linux 5.8

    Security Enhanced Linux is seeing some nice optimizations with the in-development Linux 5.8 kernel.

    One of the optimizations in Linux 5.8 for SELinux is changing around some of their internal data structures for improving performance. One notable area is using a hash table for SELinux role transitions. For storing role transitions within a hash table, on Fedora where there are around 428 role transitions, the run-time was cut by about 50% when testing with Stress-NG benchmarks.

  • [Red Hat] Edge investments, data navigators, and more industry trends

    As part of my role as a senior product marketing manager at an enterprise software company with an open source development model, I publish a regular update about open source community, market, and industry trends for product marketers, managers, and other influencers. Here are five of my and their favorite articles from that update.

  • Open Data Hub 0.6.1: Bug fix release to smooth out redesign regressions

    It is just a few short weeks since we released Open Data Hub (ODH) 0.6.0, bringing many changes to the underlying architecture and some new features. We found a few issues in this new version with the Kubeflow Operator and a few regressions that came in with the new JupyterHub updates. To make sure your experience with ODH 0.6 does not suffer because we wanted to release early, we offer a new (mostly) bugfix release: Open Data Hub 0.6.1.

  • Open Sourcing Red Hat Advanced Cluster Management for Kubernetes

    Recently, at Red Hat Summit Virtual Event, we announced Red Hat Advanced Cluster Management for Kubernetes, a new management solution designed to help organizations further extend and scale Red Hat OpenShift, the leading enterprise Kubernetes platform.

    This new product is based on technology that originated with IBM, and that technology was not fully open source. In accordance with Red Hat policy, we are in the process of opening the source code for this new product. This same open source technology will then also be used by IBM for its CloudPak for Multicloud Management. At Red Hat, we believe using an open development model helps create more secure, stable and innovative technologies. And the commitment to that open source model is what we have based our business model on. Even after joining forces with IBM, this commitment remains unchanged. We have worked more than 25 years to invest in open projects and technologies.

  • Role of APIs in an increasingly digital world

    COVID-19 has had a major impact on the world. It has affected the way we do business, where we work, how we provide services and how we communicate. We must find new ways to accomplish these pursuits, and application programming interfaces (APIs) can help.

    In a digital-driven world, applications have become fundamental to our economy and even our society – and these applications commonly need to communicate and integrate with a range of other applications and systems in order to perform their essential functions. APIs are one way to unlock the change.

  • RHEL 7.8 and the final update to container tools

    Before we get started with the updates for Red Hat Enterprise Linux 7.8, we recommend taking a serious look at moving to Red Hat Enterprise Linux 8. RHEL 7 is now in Maintenance Support and will no longer receive newer versions of container tools. Users who need access to the latest versions of Podman, Buildah and Skopeo, should move to RHEL 8 where the container-tools module is updated once a quarter. For those of you required to use containers on RHEL 7, this post will provide you a strategic and technical update.

    Red Hat understands that many customers cannot upgrade immediately. So, similar to our update of container tools in RHEL 7.7, we have released one final update to the container tools provided in RHEL 7.8.

  • Advancing open source in telecom demands interoperability: How do we get there?

    More and more, open source technologies are gaining traction in the telecommunications industry as service providers reinvent their networks and push the boundaries with cloud-native networking functions and principles. But challenges remain, in particular around integration and interoperability of the many components that make up their infrastructures.

    This was a central theme at the Open Networking Summit Europe in Antwerp, Belgium, an event focused on the future of open source networking and aimed at enabling collaborative development and innovation across enterprises, service providers, and cloud providers.

    As digital service providers begin realizing value from open source platforms like OpenStack – including faster time to market, reduced costs, and improved reliability, scalability, and agility – they are in a better position to deliver the services their customers want: mobile 5G streaming video, audio, and more.

  • Exploring and modeling COVID data

    “If your prediction proves to be very good, then it’s probably too good to be true,” says IBM developer advocate and data scientist Damiaan Zwietering.

    Damiaan loves his profession, which he has been practicing for almost 25 years, and by now he has come across most of the pitfalls. He likes to share his knowledge and experience with others, from developers to people in the business, and therefore, has a prominent role during the June 12, 2020, Code @ Think digital event. To register for this event, click here.

    In two sessions, he’ll introduce anyone who wants to know more about data science into the world of COVID-19 data and where the opportunities and pitfalls lie.

More in Tux Machines

Interview – NXP Linux BSP and Timesys Vigiles Maintenance Service & Security Updates

I’ve been interviewing Ed White, Manager of NXP’s Professional Support and Engineering Services, and Akshay Bhat, Director of Engineering, Security Solutions at Timesys by email to find out more about NXP Linux BSP development process, and how Timesys can help to keep it updated and secure with its Vigiles service. Read more

Screen Zoom and Mouse Indicator on Ubuntu 20.04

Ubuntu can help you to enlarge screen items and easily display cursor movements to your audience. This article is a company to Focal For Teachers and continuation to Screen Zoom on KDE. This is practicable to every GNOME operating system not only Ubuntu but also Fedora, Red Hat, Zorin and others. You can watch practical examples in this new video below and also image editing videos I published recently. For teachers and tutorial makers, this article is for you. Enjoy! Read more

Python Programming

  • Find the coefficients of the Quadratic Equation of the given two roots with Python

    In this example, you are expected to find the coefficients of the quadratic equation of the given two roots (x1 and x2) with a python function. The Quadratic Equation looks like this ax^2 + bx + c = 0. Our mission is to find the coefficients of the equations which is a, b, and c. The return type from the function is a Vector containing coefficients of the equations in the order (a, b, c). Since there are infinitely many solutions to this problem, we fix a = 1. Below is the method to find the return Vector.

  • Episode #188: Will the be a "switch" in Python the language?
  • Python 3.9.0b4

    Python 3.9 is still in development. This release, 3.9.0b4, is the fourth of five planned beta release previews. Beta release previews are intended to give the wider community the opportunity to test new features and bug fixes and to prepare their projects to support the new feature release.

  • Python 3.9.0b4 is now ready for testing

    On behalf of the entire Python development community, and the currently serving Python release team in particular, I’m pleased to announce the release of Python 3.9.0b4.

  • 10 most useful Python Dictionary Methods

    Dictionary is used in python to store multiple data with key-value pairs. It works like an associative array of other programming languages. The curly ({}) brackets are used to define a dictionary and the key-value is defined by the colon(:). The content of the key and value can be numeric or string. Python has many built-in methods to do different types of tasks on the dictionary data such as add, update, delete, search, count, etc. 10 most useful dictionary methods of python are explained in this article.

  • 10 most useful Python String Methods

    The string data is the characters of an array that contains one or more characters as value for any programming language. All printable characters such as alphabets, numbers, special characters, etc. are commonly used in the string data. ASCII code and Unicode are mainly used for converting any character to a number that the computer can understand. Python uses Unicode characters for string data. We need to perform different types of tasks based on the programming purpose on the string data such as searching the particular character or characters, capitalizing the first character, making all characters uppercase, etc. Python has many built-in string methods to do these types of tasks very easily. The 10 most useful python string methods are explained in this article.

Shell/Bash Picks