Open-source News

GCC Compiler Adds Arm AGI CPU Target

Phoronix - Fri, 04/17/2026 - 18:19
The GCC open-source compiler has landed initial targeting support for Arm's newly-announced AGI CPU...

Linux 7.1 x86/x86_64 Aligns With Other Architectures Now For Supporting Custom Restart Handlers

Phoronix - Fri, 04/17/2026 - 18:07
With the vast majority of x86/x86_64 systems supporting restarting the system using ACPi, BIOS, or even the KBD keyboard controller, with Linux 7.1 is now support in place for using custom restart handlers registered by drivers, such as in place for other CPU architectures...

New Lenovo Fan Driver, More ASUS Motherboards With Sensor Monitoring For Linux 7.1

Phoronix - Fri, 04/17/2026 - 17:53
All of the hardware monitoring "HWMON" subsystem updates were merged this week for the Linux 7.1 kernel...

New NTFS File-System Driver Submitted For Linux 7.1

Phoronix - Fri, 04/17/2026 - 08:25
Making today very exciting in Linux 7.1 merge window land was a pull request being sent out for introducing the new, modern NTFS file-system driver. Linus Torvalds has yet to comment if he's going to merge the new driver but it looks like it's ready for providing a better Linux NTFS experience over the current NTFS3 driver that was upstreamed by Paragon Software a few years ago and hasn't seen too much feature progress...

Confidential Containers workshop on Microsoft Azure Red Hat OpenShift: Learn interactively

Red Hat News - Fri, 04/17/2026 - 08:00
Confidential computing is a complex topic, and often requires a deep understanding of hardware, kernel, and orchestration layers. The generic definition is "protecting data in use," but it's more than that. It's about verifying that the environment we are running has not been tampered with, that we don't need to trust Kubernetes administrators and the platform or even hardware we are running our application on.Confidential computing is a major pillar when it comes to data sovereignty and the Red Hat zero trust security principle. Confidential containers aims to bring this technology at the Kub

The zero touch future: Enabling Telstra’s path to a fully autonomous, self-healing network

Red Hat News - Fri, 04/17/2026 - 08:00
At MWC 2026, Telstra announced a major step forward in its journey towards building one of the world’s most advanced autonomous networks in collaboration with Red Hat and other industry partners. Telstra executed a proof-of-concept within a live telecommunication (telco) cloud environment to autonomously detect and resolve an unplanned infrastructure outage by shifting critical network applications to healthy infrastructure in just minutes. The result shows how a multivendor, AI-native architecture can enable self-healing operations at scale. Central to this exciting new capability are the o

MCP security: Containerization and Red Hat OpenShift integration

Red Hat News - Fri, 04/17/2026 - 08:00
In our previous 3 articles, we laid the groundwork for a protected Model Context Protocol (MCP) ecosystem by analyzing the current threat landscape, implementing robust authentication and authorization, and exploring critical logging and runtime security measures. These focused on who can access what, and how to monitor those interactions. Now, we'll shift the focus to the physical and virtual environments in which these systems live. Of course, security-focused development is only half the battle. Deploying an MCP server with weak security protections can negate even the most robust code, as

Friday Five — April 17, 2026

Red Hat News - Fri, 04/17/2026 - 08:00
InformationWeek - Red Hat CIO Marco Bill: Resource control is key for AI sovereigntyRed Hat CIO, Marco Bill, explains why a comprehensive inventory of data, infrastructure, and architecture is essential for maintaining security, ensuring regulatory compliance, and navigating the complexities of a globally interconnected AI ecosystem. Learn more Navigating the Mythos-haunted world of platform securityAdvanced AI models like Claude Mythos are revolutionizing vulnerability discovery, but they also risk industrializing cyberattacks. This Red Hat blog explores how context and curation remain the

Pages