Production-ready: Red Hat’s blueprint for 2026
Every year, when I look at the landscape of the technology industry, I am reminded of why Red Hat exists. We have always thrived at the intersection of complex technology challenges and open source-based, community-driven innovation. Over the last few years, that has meant exploring the horizons of new methods of virtualization and artificial intelligence, which were just beginning to take shape.Today, as we move into 2026, I am here to tell you that Red Hat is no longer just a software provider; we have the opportunity to partner with our customers to build the platforms that will redefine th
Innovation is a team sport: Top 10 stories from across the Red Hat ecosystem
No breakthrough in the open hybrid cloud happens in isolation. Whether it’s a developer in a community project, a partner building a specialized solution, or an architect scaling a global fleet, the most impactful stories are those where expertise and collaboration meet. In this month’s roundup, we’re moving beyond the technical specifications to look at how we’re solving real-world challenges together. From the leadership vision guiding our partner ecosystem to new protocols that bridge the gap between human intuition and AI, these stories reflect a shared commitment to building more
Simplify Red Hat Enterprise Linux provisioning in image builder with new Red Hat Lightspeed security and management integrations
Last November, we announced that Red Hat Insights is now Red Hat Lightspeed, the next evolution of our predictive analytics service. While the name is new, the mission is the same: Provide you with powerful, AI-powered insights that help you work faster, smarter, and with an enhanced security profile. If you're already using Red Hat Insights, all the features you rely on—like the advisor, vulnerability, and compliance services—are staying exactly the same. They're just getting a new name that better captures the speed and power they bring to your work.In addition to this update, we release
Red Hat Learning Subscription Course reimagines virtual training
Virtual training, which flexibly delivers live, instructor-led learning, has become a core component of modern IT skills development. As demand for scalable, role-relevant training has grown, virtual training has become a trusted way to accelerate onboarding, upskill teams, and support certification goals without the constraints of physical classrooms.However, virtual training’s delivery model suffers from some of the same limitations as in-person training. The typical virtual course is a single, point-in-time experience with a rigid start and end date. Learners often lack the structured pre
How llm-d brings critical resource optimization with SoftBank’s AI-RAN orchestrator
As the technical reality of AI-RAN comes into focus, many telecommunication service providers are realizing that it’s no longer just about whether they can run AI and radio access network (RAN) on the same hardware – it’s about how they manage AI at scale.In Red Hat’s latest collaboration with SoftBank Corp., we have integrated llm-d into SoftBank’s AI-RAN orchestrator, AITRAS. Founded by Red Hat alongside other industry leaders, llm-d is an open source framework designed to dynamically and intelligently distribute the inferencing of large language models (LLMs) within a RAN more eff
Redefining automation governance: From execution to observability at Bradesco
At Bradesco, one of the largest financial institutions in Brazil and Latin America, the ability to scale is crucial. Automation plays a central role in this journey, and Red Hat Ansible Automation Platform has become the foundation supporting thousands of jobs executed daily across mission-critical environments.As automation expanded across teams, systems, and domains, Bradesco reached a new stage of maturity. Execution at scale was already well established, delivering efficiency and speed. However, operating automation at this level within a highly regulated financial environment introduced a
Introducing Red Hat build of Podman Desktop: Enterprise-ready local container development environments
The "works on my machine" problem has been a thorn in the side of IT since the dawn of distributed development workflows. As organizations accelerate their shift to cloud-native practices, a critical gap has emerged: The tools developers use on their local workstations often don't align with the enterprise security-centric, hardened Kubernetes environments in production. This inconsistency frequently leads to dependency errors, heightened risk of security vulnerabilities, and late-stage deployment surprises that drain productivity and increase technical debt.In response to these challenges, we
How sovereign is your strategy? Introducing the Red Hat Sovereignty Readiness Assessment tool
Digital sovereignty is the ultimate strategic lever for innovation. It propels organizations beyond compliance into true operational freedom where you, not your cloud provider, dictates your business continuity.Red Hat believes that sovereignty shouldn't be a wall but a foundation for the freedom to choose where and how you run your workloads. To accelerate this push towards sovereign independence, we are introducing the Red Hat Digital Sovereignty Readiness Assessment tool. Global regulations have raised the stakes for operational resilience and data jurisdictional control. But for many organ
From legacy VMs to the network brain: Why 2026 is the year of the common telco cloud
As we prepare to head to the Fira and MWC Barcelona 2026, I find myself thinking about an industry question I am constantly asked: “Where is the value?” I’ve spent my career bridging the gap between engineering and the boardroom, worked in the telecoms industry from the days of GPRS to 5G, and I’ve learned one universal truth: Our industry is fantastic at inventing technology, but can occasionally struggle to connect it to the profit and loss (PL). For years, the "State of the Union" in telco was defined by a massive "hype-to-reality" gap.But as I look at the horizon for 2026, the cyni
Building the foundation for an AI-driven, sovereign future with Red Hat partners
At Red Hat, we believe the telecommunications landscape is entering its most transformative chapter yet. To thrive, telecommunications service providers must transcend their traditional role as connectivity providers to become indispensable enablers of digital autonomy. As we head to MWC Barcelona, the industry conversation has reached a decisive pivot. We have moved past the early phase of experimentation into a period of structured industrialization where the question is no longer "what if," but rather "where is the value?".With this in mind, our focus this year with Red Hat’s partner ecos
Zero CVEs: The symptom of a larger problem
There has been much discussion lately regarding the "Zero CVE" movement. At Red Hat, we welcome this focus, emphasized by our recent announcement of Project Hummingbird to provide more frequently updated container images. Hummingbird represents a shift in how customers receive Red Hat's open source artifacts: Faster without sacrificing code integrity. You can read more about Project Hummingbird here. While this project is relatively new, it's built on the years of work and lessons learned in modernizing our own internal build system.While the industry often focuses on the result (the image), w
PNC’s infrastructure modernization journey with Red Hat OpenShift Virtualization
For Marcus Dobeck, vice president and head of container orchestration at The PNC Financial Services Group, if the challenge of 2025 could be summarized in a single word it would be demand. Like many organizations, PNC was moving from a place where they were used to managing a handful of clusters to a reality where they faced hundreds of new requests. In the past, an 8-week delivery window was acceptable, but as the bank’s digital needs expanded, delivery times needed to shrink. We sat down with Dobeck to discuss why PNC made the decision to move to Red Hat OpenShift Virtualization and what i
Extend trust across the software supply chain with Red Hat trusted libraries
Modern software development runs on open source, and that’s not hyperbole. Python alone pulls in dozens—sometimes hundreds—of third‑party libraries for even the simplest applications. While public repositories have fueled innovation at incredible speed, they’ve also created a new class of risk: Opaque build pipelines, unverifiable provenance, and a growing burden on teams to chase vulnerabilities after the fact.Today marks the tech preview of Red Hat trusted libraries, a new package index designed to bring enterprise-grade trust, transparency, and security posture to application depe
Chasing the holy grail: Why Red Hat’s Hummingbird project aims for "near zero" CVEs
In the world of enterprise software security, few metrics are as coveted, or as elusive, as "zero CVEs." Simply put, a zero CVE (Common Vulnerabilities and Exposures) approach aims to deliver software components that are completely free of known security vulnerabilities at the time of shipping. For many organizations, particularly those in highly regulated industries, this is not just a "nice to have," it is a mandate. Initiatives like FedRAMP and various strict security frameworks increasingly demand that software supply chains be clean of known risks before deployment. As the industry has ta
Friday Five — February 13, 2026
Don't forget to register for Red Hat SummitRegistration is now open for Red Hat Summit—heading to Atlanta, Georgia, in 2026—and this year’s event is shaping up to be one of our most impactful yet. Register by February 23 to get our lowest pricing, and save even more when 3+ people from your organization register together at our discounted group rate. Learn more UK Ministry of Defence collaborates with Red Hat to improve digital delivery, unlock AI capabilities and scale its hybrid cloudThe UK Ministry of Defence (MOD) has signed a new enterprise agreement with Red Hat to provide centrali
From challenge to champion: Elevate your vulnerability management strategy
In the world of cybersecurity, vulnerability management is frequently a collaborative effort between vendors, software maintainers, and customers. It's a continuous journey of discovery, prioritization, and remediation that we embark on together. Each challenge that we face provides valuable opportunities to refine our strategies and strengthen our collective security posture.Based on our work with customers, we've identified a few common areas where we can all “level up” our vulnerability management game. Let's explore these patterns and recommendations.Beyond the base score: The art of s
Building bridges to European Digital Sovereignty
Europe stands at a critical digital crossroads. As the European Commission shapes the European Open Digital Ecosystem Strategy, the conversation has shifted toward a vital objective: achieving true digital sovereignty while driving global competitiveness. For decades, Red Hat has catalyzed open source adoption across the European Union. We advocate for ‘default-to-open’ EU policies because they help unlock Europe’s full potential. From improving citizen public services with the València City Council and ITZBund to modernizing IT for major European entities such as BBVA, Volkswagen and
Simplifying modern defence operations with Red Hat Edge Manager
The modern front line has evolved into a hyperconnected, software-driven ecosystem. From reconnaissance drones to thousands of sensors embedded across the theatre, the network’s edge is the new digital frontier. These assets serve as the eyes and ears of contemporary military strategy, powered by real-time data analytics and specialized AI workloads. In the UK, for example, the Ministry of Defence’s Strategic Defence Review highlights the need for a “digital backbone” that points to a resilient, shared digital foundation designed to connect sensors and decision-makers across all enviro
Maximizing your experience: Top 6 benefits of having a Red Hat account
Unlock the full Red Hat experienceCreating a Red Hat account provides an upgraded experience for Red Hat products, support, and training. Whether you're a hands-on-keyboard builder or a technical leader, a Red Hat account will help elevate your experience. By creating an account and logging in, you’re giving us the information we need to provide a personalized site experience, and it gives you immediate access to the product trials, expert training, and deep-dive technical resources you're most interested in.Please note that we only collect your information to manage your profile and provide
More than meets the eye: Behind the scenes of Red Hat Enterprise Linux 10 (Part 5)
This series takes a look at the people and planning that went into building and releasing Red Hat Enterprise Linux 10. From the earliest conceptual stages to the launch at Red Hat Summit 2025, we’ll hear firsthand accounts of how RHEL 10 came into being.Part 1 | Part 2 | Part 3 | Part 4In our previous installment of the story of how Red Hat Enterprise Linux (RHEL) 10 came to be, the team was putting the finishing touches on this major release. In part 5, we learn about the experience of bringing years of hard work to the Red Hat Summit stage and seeing how the world reacts.2025 (0 months unt
