With the vast majority of x86/x86_64 systems supporting restarting the system using ACPi, BIOS, or even the KBD keyboard controller, with Linux 7.1 is now support in place for using custom restart handlers registered by drivers, such as in place for other CPU architectures...
Confidential computing is a complex topic, and often requires a deep understanding of hardware, kernel, and orchestration layers. The generic definition is "protecting data in use," but it's more than that. It's about verifying that the environment we are running has not been tampered with, that we don't need to trust Kubernetes administrators and the platform or even hardware we are running our application on.Confidential computing is a major pillar when it comes to data sovereignty and the Red Hat zero trust security principle. Confidential containers aims to bring this technology at the Kub
At MWC 2026, Telstra announced a major step forward in its journey towards building one of the world’s most advanced autonomous networks in collaboration with Red Hat and other industry partners. Telstra executed a proof-of-concept within a live telecommunication (telco) cloud environment to autonomously detect and resolve an unplanned infrastructure outage by shifting critical network applications to healthy infrastructure in just minutes. The result shows how a multivendor, AI-native architecture can enable self-healing operations at scale. Central to this exciting new capability are the o