Red Hat, Inc. is an American multinational software company providing open-source software products to the enterprise community. Founded in 1993, Red Hat has its corporate headquarters in Raleigh, North Carolina, with satellite offices worldwide.Red Hat has become associated to a large extent with its enterprise operating system Red Hat Enterprise Linux and with the acquisition of open-source enterprise middleware vendor JBoss. Red Hat also offers Red Hat Enterprise Virtualization , an enterprise virtualization product. Red Hat provides storage, operating system platforms, middleware, applications, management products, and support, training, and consulting services.Red Hat creates, maintains, and contributes to many free software projects and has also acquired several proprietary software packages and released their source code mostly under the GNU GPL while holding copyright under a single commercial entity and selling user subscriptions. As of June 2013, Red Hat is the largest corporate contributor to Linux. Wikipedia.
Agency: Cordis | Branch: H2020 | Program: RIA | Phase: ICT-14-2014 | Award Amount: 7.89M | Year: 2015
Superfluidity is a state in which matter behaves like a fluid with zero viscosity. Our project aims at achieving superfluidity in the network: the ability to instantiate services on-the-fly, run them anywhere in the network (core, aggregation, edge) and shift them transparently to different locations. The SUPERFLUIDITY project tackles crucial shortcomings in todays networks: long provisioning times, with wasteful over-provisioning used to meet variable demand; reliance on rigid and cost-ineffective hardware devices; daunting complexity emerging from three forms of heterogeneity: heterogeneous traffic and sources; heterogeneous services and needs; and heterogeneous access technologies, with multi-vendor network components. The SUPERFLUIDITY solution is based on: a decomposition of network components and services into elementary and reusable primitives; a native, converged cloud-based architecture; the virtualization of radio and network processing tasks; platform-independent abstractions, permitting reuse of network functions across heterogeneous hardware platforms, while catering to the vendors need for closed platforms/implementations; and high performance software optimizations along with leveraging of hardware accelerators. As a result, the 5G network will benefit from: i) location-independence: network services deployable in heterogeneous networks; ii) time-independence: near instantaneous deployment and migration of services; iii) scale-independence: transparent service scalability; and iv) hardware-independence: development and deployment of services with high performance irrespective of the underlying hardware. Through these properties, SUPERFLUIDITY will provide a converged cloud-based 5G concept that will enable innovative use cases in the mobile edge, empower new business models, and reduce investment and operational costs. The SUPERFLUIDITY consortium gathers an impressive and uncommon blend of Telco and IT players that can make its vision a reality.
Red Hat | Date: 2015-01-15
The method including, receiving a transfer command at a transfer coordinator node of a first node cluster at a first site to initiate a transfer of data from the first node cluster to a second node cluster at a second site. The method further including causing a status of the second site to be switched from an inactive status to an active status at the nodes of the first node cluster. The method further including initiating a transfer of the data from the first node cluster to the second node cluster. The method further including determining that the second node cluster has the active status at the nodes of the first node cluster and causing the data transaction request to be transferred from the nodes at the first node cluster to the second node cluster during the transfer of the data.
Red Hat | Date: 2015-10-05
A method for providing an activity management tool includes receiving a user request for an activity overview, and identifying installed applications and open windows of the installed applications. The method further includes presenting an activity overview graphical user interface (GUI) having a first area and a second area. The first area includes visual indicators of the installed applications. The second area includes the open windows of the installed applications, where the open windows are resized and positioned in such a way as to be simultaneously viewable by the user.
Red Hat | Date: 2015-01-28
A method including determining, by a processing device, whether a computer system is able to access an authentication server, in response to determining that the computer system is able to access the authentication server, requesting a first set of credentials, authenticating the first set of credentials, assigning a user a first role for performing operations on the computer system in view of the first set of credentials, and in response to determining that the computer system is unable to access the authentication server, requesting a second set of credentials different from the first set of credentials, authenticating one or more credentials provided by the user, and assigning the user a second role for performing operations on the computer system in view of the one or more credentials, wherein the first role specifies a first type of access to at least one object on the computer system, and the second role specifies a second type of access to the at least one object, wherein the first type of access is different from the second type of access.
Red Hat | Date: 2015-06-25
Method, system, apparatus and/or computer program for achieving transparent integration of high-availability services for distributed application programs. Loss-less migration of sub-programs from their respective primary nodes to backup nodes is performed transparently to a client which is connected to the primary node. Migration is performed by high-availability services which are configured for injecting registration codes, registering distributed applications, detecting execution failures, executing from backup nodes in response to failure, and other services. High-availability application services can be utilized by distributed applications having any desired number of sub-programs without the need of modifying or recompiling the application program and without the need of a custom loader. In one example embodiment, a transport driver is responsible for receiving messages, halting and flushing of messages, and for issuing messages directing sub-programs to continue after checkpointing.