Red Hat Enterprise Linux (RHEL) 7.5 beta Releases for testing

Red Hat Enterprise Linux (RHEL) 7.5 beta: Red Hat's main goal with the new release is security.

RHEL 7.5 Beta is designed to provide a solid foundation in the hybrid cloud. It also brings key new and improved features for its security, compliance, efficiency and the ability to manage.RHEL

The youngest member of the RHEL 7 family supports not only x86 chips but also IBM Power, IBM System z and ARM.

For security reasons, in addition to improvements for Meltdown and Specter, Red Hat also brings the following security features to RHEL 7.5:

  • Security and usability improvements for cloud and remote hosted systems that can more securely unlock encrypted devices connected to during startup. This will eliminate the need for manual intervention in an often timed startup process.
  • Embedding Red Hat Ansoft DevOps Automation with OpenSCAP will facilitate the automation of damage recovery. It will also allow administrators to more effectively process policies on servers and clouds.
  • Compliance Improvements for Accurate Timing and Synchronization Needs with the addition of failover with connection interfaces for Precision Time Protocol (PTP) and Network Time Protocol (NTP).

In addition to RHEL's greater security, Red Hat is also looking to improve storage capacity by introducing the virtualizer ς (from virtual data optimizer or VDO). This is a new technology that comes from Red Hat's acquisition of Permabit.

Want to know more about the beta version? You can read the release notes of RHEL 7.5. Or better, you can download RHEL 7.5 and try it yourself.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).