Metrics that matter: How to prove the business value of DevEx
Developer experience DevEx is often dismissed as a “soft” cultural metric. But I can prove to you that DevEx is a reliable predictor of whether your developer p...
115 posts from this source
Developer experience DevEx is often dismissed as a “soft” cultural metric. But I can prove to you that DevEx is a reliable predictor of whether your developer p...
Rethinking Scale in AI In the AI industry, we’ve spent the last three years obsessed with scale. We chased parameter counts into the trillions, believing that...
Every year, when I look at the landscape of the technology industry, I am reminded of why Red Hat exists. We have always thrived at the intersection of complex...
As the technical reality of AI‑RAN comes into focus, many telecommunication service providers are realizing that it’s no longer just about whether they can run...
Virtual training, which flexibly delivers live, instructor‑led learning, has become a core component of modern IT skills development. As demand for scalable, ro...
Last November, we announced that Red Hat Insights is now Red Hat Lightspeed, the next evolution of our predictive analytics service. While the name is new, the...
The “works on my machine” problem has been a thorn in the side of IT since the dawn of distributed development workflows. As organizations accelerate their shif...
At Bradesco, one of the largest financial institutions in Brazil and Latin America, the ability to scale is crucial. Automation plays a central role in this jou...
At Red Hat, we believe the telecommunications landscape is entering its most transformative chapter yet. To thrive, telecommunications service providers must tr...
As we prepare to head to the Fira and MWC Barcelona 2026, I find myself thinking about an industry question I am constantly asked: “Where is the value?” I’ve sp...
Digital sovereignty is the ultimate strategic lever for innovation. It propels organizations beyond compliance into true operational freedom where you, not your...
Red Hat Summit Registration Don't forget to register for Red Hat Summit. Registration is now open for Red Hat Summit—heading to Atlanta, Georgia, in 2026—and t...
Europe stands at a critical digital crossroads. As the European Commission shapes the European Open Digital Ecosystem Strategyhttps://ec.europa.eu/info/law/bett...
In the world of cybersecurity, vulnerability management is frequently a collaborative effort between vendors, software maintainers, and customers. It's a conti...
Europe stands at a critical digital crossroads. As the European Commission shapes the European Open Digital Ecosystem Strategyhttps://ec.europa.eu/info/law/bett...
The modern front line has evolved into a hyper‑connected, software‑driven ecosystem. From reconnaissance drones to thousands of sensors embedded across the thea...
The telecommunications industry is accelerating its digital transformation, driven by the increasing complexity of modern networks and the demand for faster, mo...
Unlock the full Red Hat experience Creating a Red Hat account provides an upgraded experience for Red Hat products, support, and training. Whether you're a han...
If you're modernizing your virtualization infrastructure, you've probably discovered that migrating thousands of virtual machines VMs takes far longer than anyo...
Red Hat Summit 2026 Registration Registration is now open for Red Hat Summit 2026 in Atlanta! Register by February 23 for the lowest rates, or save further wit...
Introduction This series takes a look at the people and planning that went into building and releasing Red Hat Enterprise Linux 10. From the earliest conceptua...
The telecommunications industry is accelerating its digital transformation, driven by the increasing complexity of modern networks and the demand for faster, mo...
In the current geopolitical landscape, governments across Europe, the Middle East, and Africa face a fundamental question: how can they maintain the ability to...
In May 2025, Red Hat Enterprise Linux 10 RHEL shipped with the first steps toward post‑quantum cryptography PQC to protect against attacks by quantum computers,...