Red Hat Enterprise Linux (RHEL) 7.5 beta Releases for testing

Red Hat Enterprise Linux (RHEL) 7.5 beta: Red Hat's main goal with the new release is security.

RHEL 7.5 Beta is designed to provide a solid foundation in the hybrid cloud. It also brings key new and improved features for security, compliance, platform efficiency and capability s.RHEL

The youngest member of the RHEL 7 family supports not only x86 chips but also IBM Power, IBM System z and ARM.

For security purposes, in addition to improvements for Meltdown and Specter, Red Hat also brings the following features on RHEL 7.5:

  • Security and usability improvements for cloud and remote hosted systems that can more securely unlock encrypted devices connected to according to. This will eliminate the need for manual intervention in an often timed startup process.
  • Embedding Red Hat Ansoft DevOps Automation with OpenSCAP will facilitate the automation of damage recovery. It will also allow administrators to more effectively process policies on servers and clouds.
  • Compliance Improvements for Accurate Timing and Synchronization Needs with the addition of failover with connection interfaces for Precision Time Protocol (PTP) and Network Time Protocol (NTP).

In addition to RHEL's greater security, Red Hat is also looking to improve storage capacity by introducing the virtual data optimizer (from virtual data optimizer or VDO). This is a new technology that comes from the by Permabit from Red Hat.

Want to know more about the beta version? You can read the release notes of RHEL 7.5. Or better, you can download RHEL 7.5 and try it yourself.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.083 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).