The GCC open-source compiler has landed initial targeting support for Arm's newly-announced AGI CPU...
With the vast majority of x86/x86_64 systems supporting restarting the system using ACPi, BIOS, or even the KBD keyboard controller, with Linux 7.1 is now support in place for using custom restart handlers registered by drivers, such as in place for other CPU architectures...
All of the hardware monitoring "HWMON" subsystem updates were merged this week for the Linux 7.1 kernel...
Making today very exciting in Linux 7.1 merge window land was a pull request being sent out for introducing the new, modern NTFS file-system driver. Linus Torvalds has yet to comment if he's going to merge the new driver but it looks like it's ready for providing a better Linux NTFS experience over the current NTFS3 driver that was upstreamed by Paragon Software a few years ago and hasn't seen too much feature progress...
Confidential computing is a complex topic, and often requires a deep understanding of hardware, kernel, and orchestration layers. The generic definition is "protecting data in use," but it's more than that. It's about verifying that the environment we are running has not been tampered with, that we don't need to trust Kubernetes administrators and the platform or even hardware we are running our application on.Confidential computing is a major pillar when it comes to data sovereignty and the Red Hat zero trust security principle. Confidential containers aims to bring this technology at the Kub
At MWC 2026, Telstra announced a major step forward in its journey towards building one of the world’s most advanced autonomous networks in collaboration with Red Hat and other industry partners. Telstra executed a proof-of-concept within a live telecommunication (telco) cloud environment to autonomously detect and resolve an unplanned infrastructure outage by shifting critical network applications to healthy infrastructure in just minutes. The result shows how a multivendor, AI-native architecture can enable self-healing operations at scale. Central to this exciting new capability are the o
In our previous 3 articles, we laid the groundwork for a protected Model Context Protocol (MCP) ecosystem by analyzing the current threat landscape, implementing robust authentication and authorization, and exploring critical logging and runtime security measures. These focused on who can access what, and how to monitor those interactions. Now, we'll shift the focus to the physical and virtual environments in which these systems live. Of course, security-focused development is only half the battle. Deploying an MCP server with weak security protections can negate even the most robust code, as
InformationWeek - Red Hat CIO Marco Bill: Resource control is key for AI sovereigntyRed Hat CIO, Marco Bill, explains why a comprehensive inventory of data, infrastructure, and architecture is essential for maintaining security, ensuring regulatory compliance, and navigating the complexities of a globally interconnected AI ecosystem. Learn more Navigating the Mythos-haunted world of platform securityAdvanced AI models like Claude Mythos are revolutionizing vulnerability discovery, but they also risk industrializing cyberattacks. This Red Hat blog explores how context and curation remain the
Pages