Red Hat, Inc. is an American multinational software company providing open-source software products to the enterprise community. Founded in 1993, Red Hat has its corporate headquarters in Raleigh, North Carolina, with satellite offices worldwide.Red Hat has become associated to a large extent with its enterprise operating system Red Hat Enterprise Linux and with the acquisition of open-source enterprise middleware vendor JBoss. Red Hat also offers Red Hat Enterprise Virtualization , an enterprise virtualization product. Red Hat provides storage, operating system platforms, middleware, applications, management products, and support, training, and consulting services.Red Hat creates, maintains, and contributes to many free software projects and has also acquired several proprietary software packages and released their source code mostly under the GNU GPL while holding copyright under a single commercial entity and selling user subscriptions. As of June 2013, Red Hat is the largest corporate contributor to Linux. Wikipedia.
Red Hat | Date: 2016-12-21
An example method of monitoring computing resources in a cloud computing environment may include receiving a request to subscribe to a monitoring service with respect to computing resources associated with a user account, the request specifying access information for a cloud computing system comprising a plurality of virtual machines associated with the computing resources. The method may further include monitoring, using the access information, the plurality of virtual machines. The method may further include identifying, in view of the monitoring, a virus-infected application running on a virtual machine of the plurality of virtual machines. The method may further include terminating the virus-infected application. The method may further include receiving, in view of the monitoring, resource usage data reflecting types and duration of usage of the computing resources. The method may further include generating, in view of the usage data, a report reflecting usage of the computing resources.
Red Hat | Date: 2016-12-20
An apparatus and a method for maintaining a file system is described. A method may include receiving a request for allocating a first block of a file system to a file, the first block comprising a first data and computing, by a processing device, a first hash value of the first block. The method also includes comparing, by the processing device, the first hash value with a plurality of hash values in a tree structure, wherein each of the plurality of values correspond to a block among a plurality of blocks stored in the file system. The method further includes in response to determining that a match exists between the first hash value and at least one of the plurality of hash values in the tree structure, allocating, by the processing device, the corresponding block to the file; and updating, by the processing device, a reference count of the corresponding block in the tree structure.
Red Hat | Date: 2017-01-11
A meta-debugger receives a first debugging command from a debugger client to set a breakpoint in a first service in a first language and sets the breakpoint in a first native debugger. After receiving a service message invoking the first service, the breakpoint is triggered and the meta-debugger provides to the debugger client a first graphical representation of the first native debugger. The meta-debugger receives a second debugging command from the debugger client, converts the second debugging command into a third debugging command to provide to the first native debugger. After invoking a second service in a second language, the meta-debugger provides to the debugger client a second graphical representation of the second native debugger. The meta-debugger receives a fourth debugging command from the debugger client, converts the fourth debugging command into a fifth debugging command to provide to the second native debugger.
Red Hat | Date: 2016-12-21
A method of managing network failure identifying a plurality of hypervisors, each of the plurality of hypervisors being associated with a plurality of networks. The method includes determining whether the plurality of hypervisors satisfies an unavailability condition, and, in response to determining that the plurality of hypervisors satisfies the unavailability condition, re-assigning a first network role of a first network to a back-up network.
Red Hat | Date: 2017-02-01
A software package to be installed on a host system may be identified. A service of the host system that is unavailable during an installation of the software package on the host system may be identified where the installation changes a configuration of the service. A determine may be made as to whether the service that is unavailable during the installation of the software package on the host system is being used by a virtual machine (VM) that is associated with the host system. A notification may be provided in view of the determination of the service associated with the software package being used by the VM that is associated with the host system.
Red Hat | Date: 2016-02-26
In an example embodiment, a hypervisor exposes a first guest device to a first virtual machine. The hypervisor exposes a virtual host device and a pass-through device to a second virtual machine. The hypervisor maps a first memory and a second memory into the second virtual machine at a first base address register and a second base address register associated with the virtual host device and pass-through device. The hypervisor sends a mapping from the first virtual machine to the second virtual machine. The hypervisor sends a first address of a first ring of the first guest device and a second address of a second ring of an assigned device to the second virtual machine.
Red Hat | Date: 2017-02-14
A method includes receiving, by a mobile device associated with a distributed transaction, a message via a messaging service provided by a mobile network operator. The method further includes determining, by a content based router of the mobile device, that the message is associated with the distributed transaction by determining that the message includes a transaction identifier that corresponds with an entry in a transaction table of the content based router. The entry identifies the distributed transaction and a destination of where to forward the message. The method further includes forwarding, by a processing device of the mobile device, the message to a resource manager resident on the mobile device. The resource manager corresponds to the destination of where to forward the message. The method further includes performing, by the resource manager, an action associated with the distributed transaction in view of contents of the message.
Red Hat | Date: 2015-11-30
In an example system, a first interface has a first address and a first port number. A second interface has a second address and a second port number. A router is in communication with the first and second interfaces over a network. The router is configured to request, a first set of failover information from the first interface. The router is further configured to receive the first set of failover information from the first interface. The first set of failover information includes the second address and the first port number. The router is configured to detect a failure on the first interface. The router is further configured to modify a network access translation (NAT) table stored within the router by replacing the first address of the first interface with the second address of the second interface while retaining the first port number, such that the first port number remains unchanged.
Agency: European Commission | Branch: H2020 | Program: RIA | Phase: ICT-14-2014 | Award Amount: 7.89M | Year: 2015
Superfluidity is a state in which matter behaves like a fluid with zero viscosity. Our project aims at achieving superfluidity in the network: the ability to instantiate services on-the-fly, run them anywhere in the network (core, aggregation, edge) and shift them transparently to different locations. The SUPERFLUIDITY project tackles crucial shortcomings in todays networks: long provisioning times, with wasteful over-provisioning used to meet variable demand; reliance on rigid and cost-ineffective hardware devices; daunting complexity emerging from three forms of heterogeneity: heterogeneous traffic and sources; heterogeneous services and needs; and heterogeneous access technologies, with multi-vendor network components. The SUPERFLUIDITY solution is based on: a decomposition of network components and services into elementary and reusable primitives; a native, converged cloud-based architecture; the virtualization of radio and network processing tasks; platform-independent abstractions, permitting reuse of network functions across heterogeneous hardware platforms, while catering to the vendors need for closed platforms/implementations; and high performance software optimizations along with leveraging of hardware accelerators. As a result, the 5G network will benefit from: i) location-independence: network services deployable in heterogeneous networks; ii) time-independence: near instantaneous deployment and migration of services; iii) scale-independence: transparent service scalability; and iv) hardware-independence: development and deployment of services with high performance irrespective of the underlying hardware. Through these properties, SUPERFLUIDITY will provide a converged cloud-based 5G concept that will enable innovative use cases in the mobile edge, empower new business models, and reduce investment and operational costs. The SUPERFLUIDITY consortium gathers an impressive and uncommon blend of Telco and IT players that can make its vision a reality.
Agency: European Commission | Branch: H2020 | Program: RIA | Phase: ICT-07-2014 | Award Amount: 3.83M | Year: 2015
Cloud security is of immediate concern to organisations that must comply with strict confidentiality and integrity policies. More broadly, security has emerged as a commercial imperative for cloud computing across a wide range of markets. The lack of adequate security guarantees is becoming the primary barrier to the broad adoption of cloud computing. The Secure Enclaves for REactive Cloud Applications (SERECA) project aims to remove technical impediments to secure cloud computing, and thereby encourage greater uptake of cost-effective and innovative cloud solutions in Europe. It proposes to develop secure enclaves, a new technique that exploits secure commodity CPU hardware for cloud deployments, empowering applications to ensure their own security without relying on public cloud operators. Secure enclaves additionally support regulatory-compliant data localisation by allowing applications to securely span multiple cloud data centres. Although secure enclaves are a general mechanism, SERECA focuses on a particularly important and rapidly growing class of applications: reactive applications for the Internet of Things (IoT), Cyber-Physical Systems (CPS), augmented reality, gaming, computer-mediated social interaction, and the like. These applications are highly interactive, data intensive, and distributed, often involving extremely sensitive societal and personal information. SERECA is validating its results through the development of two innovative and challenging industry-led use cases. One concerns the monitoring of a civil water supply network, a critical infrastructure targeted by malicious attacks. The other concerns a commercial software-as-a-service (SaaS) application for analysing the performance of cloud-deployed applications. Such a service collects sensitive performance metrics about live usage, assets that must be protected from industrial espionage and other criminal activities.