Red Hat Enterprise Linux (RHEL) 7.5 beta Releases for testing

Red Hat Enterprise Linux (RHEL) 7.5 beta: Red Hat's main goal with the new release is security.

RHEL 7.5 Beta is designed to provide a solid foundation in the hybrid cloud. It also brings major new and improved features for its safety, compliance, effectiveness and the ability to manage.RHEL

The youngest member of the RHEL 7 family supports not only x86 chips but also IBM Power, IBM System z and ARM.

For security reasons, in addition to improvements for Meltdown and Specter, Red Hat also brings the following security features to RHEL 7.5:

  • Security and usability improvements for cloud and remote hosted systems that can more securely unlock encrypted devices connected to the network at startup. This will eliminate the need for manual intervention in one startup which is often timed.
  • Integrating Red Hat Ansible DevOps Automation with OpenSCAP will make it easier to automate damage recovery. It will also allow administrators to process policies more efficiently on servers and .
  • Compliance Improvements for Accurate Timing and Synchronization Needs with the addition of failover with connection interfaces for Precision Time Protocol (PTP) and Network Time Protocol (NTP).

In addition to RHEL's greater security, Red Hat also seeks to improve storage capacity by importing the data optimizer (virtual data optimizer or VDO). It is a new technology that comes from the acquisition of Permabit by Red Hat.

Want to know more about the beta version? You can read the release notes of RHEL 7.5. Or better, you can download RHEL 7.5 and try it yourself.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).