Red Hat Enterprise Linux (RHEL) 7.5 beta Releases for testing

Red Hat Linux (RHEL) 7.5 beta: Red Hat's main goal with the new operating system released is security.

The RHEL 7.5 Beta is designed to provide a solid foundation in the hybrid cloud. It also brings basically new and improved features for security, compliance, platform efficiency and manageability.RHEL

The newest member of the RHEL 7 family supports not only x86 chips but also IBM Power, IBM z and ARM.

For security purposes, in addition to improvements for Meltdown and , Red Hat also brings the following security features to RHEL 7.5:

  • Security and usability improvements for cloud and remote hosted systems that can more securely unlock encrypted devices connected to during startup. This will eliminate the need for manual intervention in an often timed startup process.
  • Embedding Red Hat Ansoft DevOps Automation with OpenSCAP will facilitate the automation of damage recovery. It will also allow administrators to more effectively process policies on servers and clouds.
  • Compliance improvements for precise timing and synchronization needs with the prop failover with connection interfaces for the Precision Time Protocol (PTP) and Network Time Protocol (NTP).

In addition to RHEL's greater security, Red Hat also seeks to improve storage capacity by importing the data optimizer (virtual data optimizer or VDO). It is a new technology that comes from the acquisition of Permabit by Red Hat.

Want to know more about the beta version? You can read the release notes of RHEL 7.5. Or better, you can download RHEL 7.5 and try it yourself.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).