Blog
Developing Circuits Using the Qiskit Operator: Quantum on OpenShift, Part Two
Quantum computing is an emerging paradigm in computer science which aims to bridge gaps in problems that classical computers, meaning those that follow the traditional deterministic model of computing, have difficulty solving. Building off of our previous post,...
Sharding for Security and Scalability
Rekor, sigstore’s transparency log, recently reached an important milestone in its v0.6 release: it now supports log sharding. Log sharding means that the entries associated with a single Rekor server can now be distributed among multiple backend logs, which...
Introducing MicroShift
Exploring a small form factor OpenShift designed for field deployed edge computing devices Edge Computing spans a broad range of use cases and deployment models. On one end, it can refer to micro data centers located in controlled environments that are formed by a...
Collecting and Visualizing OpenTelemetry Traces
Note: Red Hat’s Emerging Technologies blog includes posts that discuss technologies that are under active development in upstream open source communities and at Red Hat. We believe in sharing early and often the things we’re working on, but we want to note that unless...
What’s Happening NEXT!
The Red Hat NEXT! conference is Red Hat’s annual event for deep dives on all things Emerging Technologies. Featuring a keynote from our CTO, Chris Wright, and breakout sessions on edge computing, cloud services, and security, this conference covers all of the most...
OpenTelemetry Tracing in Kubernetes Core
In this post, OpenTelemetry tracing and the OpenTelemetry Protocol (OTLP) is examined. As an example, the instrumentation required to generate and export OTLP traces from CRI-O is explained. CRI-O is an implementation of the Kubernetes Container Runtime Interface, and...
Improving Storage System Reliability with Open Data
This post describes an open data research collaboration between the Ceph open source project and the Red Hat AI Center of Excellence, with a goal of addressing a long-standing problem with preemptively predicting storage device failure in order to improve overall...
Introducing VolSync: your data, anywhere
Organizations face a challenging task of identifying and developing data storage, backup, recovery, and migration solutions for the enterprise. There are a wide variety of tools and solutions in the ecosystem that work well with traditional legacy-type environments,...
Bucket Caching for Kubernetes
Object storage systems can offer simple, scalable and cost-effective means of storing heterogeneous data sets. Traditionally, these systems have been designed for media, backup, and archive. However, the usage of object storage systems is increasingly expanding to...
What is a Trusted Computing Base?
What does it mean for a system or component to be “trusted” in the world of computer systems? And why does it matter? In this post, we’ll provide an overview of what a Trusted Computing Base (TCB) is and provide a framework for how to evaluate a TCB’s security....