Why customers are choosing Red Hat AI for real business outcomes
Most leaders I speak with are well past the hype cycle of AI. The question is no longer whether AI matters. The question is how to move from experimentation to production in a way that is security-focused, supportable, and repeatable across teams.From where I sit—leading strategy and operations for AI Platform Core Components (AIPCC), an engineering function within Red Hat’s AI Engineering organization—that shift changes everything. The conversation moves from a tooling decision to an operating model decision. A strong AI platform is the foundation that helps teams ship AI-enabled capabi
Red Hat AI tops MLPerf Inference v6.0 with vLLM on Qwen3-VL, Whisper, and GPT-OSS-120B
Red Hat is proud to announce our strong results from the latest industry-standard MLPerf Inference v6.0 benchmark. Our submission includes four AI workloads (Whisper-Large-v3, GPT-OSS-120B, Qwen3-VL-235B-A22B, and Llama-2-70b) on NVIDIA (H200, B200, L40S) and AMD (MI350X) GPUs, running on Red Hat Enterprise Linux (RHEL) and Red Hat OpenShift AI with our open source inference stack: vLLM, and llm-d. We achieved top scores across several configurations, including the highest offline throughput on B200 for GPT-OSS-120B, the leading H200 result on Whisper, and the top B200 submission on Qwen3-VL,
Using containers to bring software engineering rigor to AI workloads
As AI workloads move from experimental prototypes into production environments, enterprises face a familiar challenge—how do you protect, manage, and govern these new components with the same rigor you apply to traditional software applications? A key piece of the puzzle lies in something your organization likely already uses extensively—containers, specifically Open Container Initiative (OCI) containers.What is the Open Container Initiative?The Open Container Initiative defines open specifications for image formats, container runtimes, and distribution, helping organizations avoid vendor
Our journey to AI-centricity, part 2: Crafting a strategy that scales
In the first part of this series, we discussed the messy and challenging work of fixing our foundation—standardizing on Red Hat OpenShift and cleaning up years of fragmented data. With that foundation in place, we faced a new challenge: how to integrate AI into how Red Hatters work without creating new internal barriers or security risks.Moving from policy to participationWhen gen AI first arrived, we made a mistake common to many enterprises: we led with a policy of "no." Our first move was to release a dense legal document so restrictive that it inadvertently discouraged people from explor
Introducing the Red Hat Universal Base Image
There are a lot of choices when it comes to container base images, so why should you select Red Hat Universal Base Image (UBI)? First of all, the code in Red Hat Universal Base Image is derived from Red Hat Enterprise Linux (RHEL), and the mission of RHEL is to be your source for safe and reliable Linux innovation that makes your workloads successful. Because all containers are Linux, and UBI is derived from RHEL, the same values apply to UBI, including:Innovate: Organizations are constantly looking to innovate quickly without friction and provide consistency from the data center to the edge b
Strengthening Spain's digital sovereignty: Red Hat Enterprise Linux achieves top-tier ENS security certification
Red Hat Enterprise Linux (RHEL) 9.0 Extended Update Support (EUS) has been included in the Catalogue of Information and Communication Technology Security Products and Services (CPSTIC) of the National Cryptologic Centre (CCN). This inclusion enables RHEL for deployment in public sector bodies operating under the strictest requirements of Spain's National Security Framework (ENS).The ENS is the rigorous cybersecurity framework mandatory not only for all Spanish public administrations but also for the extensive network of private companies that provide them with services. It is a regulation aime
Red Hat Enterprise Linux now supported for Microsoft SQL Server on Azure VMs with SQL IaaS Agent extension
Organizations running Microsoft SQL Server 2025 on Red Hat Enterprise Linux (RHEL) in Azure can now install and integrate with the SQL IaaS Agent extension (see SQL Server IaaS Agent Extension for Linux - SQL Server on Azure VMs), which enables full licensing flexibility for their SQL deployment. As of today, the extension supports three licensing options. When registering in lightweight mode, you can choose:PAYG (Pay-As-You-Go): Pay per usage. The pay-as-you-go model means that the per-second cost of running the Azure VM includes the cost of the SQL Server license.AHB (Azure Hybrid Benefit):
Our journey to AI-centricity, part 1: Building on a stable foundation
At Red Hat, our IT and Engineering functions encounter the same challenges and make the same decisions our customers face every day, from infrastructure optimization and application delivery to automating and enhancing the security of our global business. Right now, almost every organization we talk to is navigating the complexities of an AI journey, and we’re in that same boat. As users of our own products—because we love and believe in the technology we build—we want to pull back the curtain on our internal experience. We hope that the lessons we’ve learned through some foresight an
From network telemetry to operational intelligence
The data is there. The insight isn't.Telecommunications networks generate unprecedented volumes of telemetry. Every authentication attempt, packet flow, device heartbeat, controller update, and service interaction produces telemetry. As networks expand into Wi-Fi offload, 5G standalone, and distributed edge deployments, that volume continues to grow. Yet turning that data into operational intelligence remains one of the industry's hardest challenges.The challenge for operators today is not collection. It is a correlation. Modern networks produce multiple operational signals simultaneously: Net
Announcing Red Hat Advanced Cluster Security for Kubernetes 4.10
Security is an important aspect of any digital undertaking, and Kubernetes is no different. We’ve built Red Hat Advanced Cluster Security for Kubernetes to form a foundational layer of security across fleets, estates, and platforms, be it public, private, or hybrid clouds. Today we release Red Hat Advanced Cluster Security for Kubernetes version 4.10 as part of our ongoing effort to make life easier for Red Hat OpenShift users when it comes to building and enforcing security policies for their clusters.Chief among these updates is the new integration of vulnerability management into OpenShif
What's new in Red Hat OpenShift Virtualization 4.21
Red Hat OpenShift Virtualization 4.21 is now Generally Available. The release of Red Hat OpenShift Virtualization 4.21 introduces new capabilities that simplify virtual machine (VM) management, enhance operational efficiency, and expand deployment flexibility across hybrid and multi-cloud environments. This release brings streamlined VM administration with multi-cluster management, guided networking configuration through new physical and virtual network creation workflows, and generative AI–powered assistance with OpenShift Lightspeed integrated directly into virtualization operations. Addi
Friday Five — March 27, 2026
Red Hat news and announcements from KubeCon + CloudNativeConSee the latest Red Hat news and content from KubeCon + CloudNativeCon Europe in Amsterdam, including updates on OpenShift 4.21, cloud-native security, and AI. Learn more SiliconANGLE - Red Hat sees inference as AI’s next battleground — with Kubernetes at the coreAs AI demands drive orders-of-magnitude increases in token consumption, the challenge now is less about training larger models than about running them reliably, cost-effectively and at scale. Red Hat has contributed llm-d, an open-source project for running LLMs across K
Closing the gap: Bringing AI and Kubernetes to the source of the data
Moving to the edge isn't just a trend; it’s a response to the need for faster results. By processing data right where it’s created, organizations are finding they can finally unlock real-time decision-making and make their operations significantly more efficient.Whether it’s a factory floor, a wind turbine, or a retail backroom, the edge is where the most impactful business data is being generated. Most operational leaders already recognize that moving processing power closer to that data is the key to transforming how they work. The real challenge, however, isn’t just getting there—
AI security: Identity and access control
In our first 3 articles, we framed AI security as protecting the system, not just the model, across confidentiality, integrity, and availability, and we showed why the traditional secure development lifecycle (SDLC) discipline still applies to modern AI deployments. We also focused on guardrails and different architectural approaches such as dual LLMs and CaMeL to help protect against prompt injection and unsafe actions.This article completes the defense strategy by focusing on the backbone that makes guardrails enforceable in production—identity, authentication, authorization, and zero trus
4 use cases for AI in cyber security
In product security, AI represents a new and critical frontier. As artificial intelligence becomes mainstream in both defense tools and exploitation methods, security professionals must master these technologies to more effectively protect and enhance their systems.What is AI in cyber security?AI in cyber security is the application of advanced technologies like machine learning and automated reasoning to detect, prevent, and respond to digital threats at a scale and speed that exceeds human capabilities.AI systems are able to perform a growing variety of tasks, such as pattern recognition, le
Modernize virtual machines on Google Cloud with Red Hat OpenShift Virtualization
We recently announced that Red Hat OpenShift Virtualization is now available on OpenShift Dedicated on Google Cloud allowing customers the ability to migrate and modernize their VMs to Google Cloud. Running on Google Cloud C3 bare-metal instances, OpenShift Virtualization provides direct access to CPU and memory resources to help support performance-sensitive virtual machine (VM) workloads. Combined with the fully managed experience of OpenShift Dedicated, organizations can migrate and run VMs in the cloud while building a foundation for future innovation with cloud-native technologies.As orga
AIOps and MLOps made simple: Automating Vertex AI with Red Hat Ansible Automation Platform
In the era of gen AI and rapid machine learning (ML) adoption, enterprise AI is no longer just a research experiment—it’s a core business driver. But as organizations rush to operationalize their AI initiatives, they’re hitting a significant roadblock: deployment and management at scale.To help bridge the gap between AI innovation and IT operations, Red Hat Ansible Certified Content Collection for Google Cloud provides native support for Google Cloud’s Vertex AI platform. This release enables a shift in how operations and data science teams manage the lifecycle of their AI services, br
AI security: Defending against prompt injection and unsafe actions
In previous articles, we framed AI security as protecting confidentiality, integrity, and availability of the whole AI system, not just the model. We also mapped AI risks onto familiar secure development lifecycle (SDLC) thinking, treating data and model artifacts as first-class build inputs and outputs.This article examines the primary security risk for enterprise large language model (LLM) applications: prompt injection. This vulnerability occurs when the model fails to distinguish between data and instructions, allowing external prompts to seize control of the system. The risk is particular
Streamline your work with the new learning drawer in the migration toolkit for virtualization
With the migration toolkit for virtualization 2.11 (MTV) release, users gain an improved learning experience.A new “Tips and tricks” drawer was introduced as part of the 2.10 release and further improved in the following 2.11 release, which allows users to access contextual help, tips, and best practices directly within the interface. This feature is designed to reduce the learning curve for new users and provide immediate, in-context guidance for common and complex migration tasks, helping users learn key MTV workflows without ever leaving their current view.Learn while doing: Interactive
Stop searching, start operating: Scale hybrid clusters with Red Hat Advanced Cluster Management for Kubernetes 2.16
If you’ve been following our journey from elevating multicluster operations in 2.12 to expanding hybrid cloud reach in 2.13, then you know our goal has always been unified control. However, as fleets grow, "unified" can quickly turn into "crowded." In our previous 2.15 update, we focused on helping you see more and click less. With Red Hat Advanced Cluster Management for Kubernetes 2.16, we're moving beyond mere visibility into intelligent, self-service operations that work for your entire team.Here are the four ways 2.16 helps you reclaim your nights and weekends.1. Mobility without boundar
